On this page, cookies are needed if you want to use the full range of the page. Please activate cookies and refresh that page. After refresh a cookie management dialogs will be available.

The cookie settings on this website are set to 'allow only strictly necessary' to give you the very best experience. If you continue without changing these settings, you consent to this - but if you want, you can change your settings at any time at the bottom of this page. Our cookie policy

 

SDK feature matrix

Find an overview of all integration options here. For full download capabilities, please register and become a partner.

 

SDK Overview B/G Series

The Intrusion Integration SDK is available to Bosch integration partners. Features include:

  • Monitor and control functions for Bosch intrusion control panels
  • Support for up to 50 simultaneous control panel connections
  • SDK help includes a reference guide with examples
  • Quick connect guide includes code snippets developers can copy and paste to quickly connect their application to Bosch intrusion control panels

Monitoring function

Applications can monitor these panel events and conditions:

• Armed state by area, account, or panel (all areas)

• Point state (normal, alarm, trouble)

• Output state

• Primary power (AC, mains) status

• Secondary power (battery) status

• SDI bus device status (keypads and modules)

Controlling function

Applications can execute these functions:

• Arm and disarm by area, account, or panel (all areas)

• Reset detectors

• Test sirens

• Silence alarms

• Activate and deactivate outputs

• Bypass points

• Diagnostic functions

 

SDK Overview AMAX

The following AMAX functions can be operated on a 3rd party software when using AMAX SDK.

Control functions

• Arming / disarming one area

• Arming / disarming all areas

• Resetting detectors

• Testing sirens

• Overriding system fault tampers

• Bypassing / unbypassing zones

• Refreshing zone statuses

• Executing a walk test

• Activating / deactivating outputs

Monitoring functions

• Reading the status of outputs

• Reading the status of areas

• Reading the status of zones

• Reading the status of battery and mains

Remote maintenance functions

• Testing: Communication test, domestic / voice dialing test, mains (230V) test, battery test

• Setting new time

• Reading the panel events and saving them to file

• Reading the panel parameters and saving them to file

 
  Legacy Mode 1 Mode 2 SDK v2  
Connection, Authentication, Security          
Serial x x      
TCP x x x x  
Encryption     x x  
Authentication     x x  
Inactivity Timeout     x Communication Timeout  
Identification and Capabilities          
Panel Firmware Version x x x x  
Panel Type x x x x  
Maximum Number of Areas PIF x x x  
Maximum Number of Points PIF x x x  
Maximum Number of Outputs PIF x x x  
Maximum number of Users PIF x x x  
Maximum Number of Keypads PIF x x x  
Maximum Number of Doors PIF x x x  
RPS Protocol Version     x x  
Automation Protocol Version     x x  
Execute Protocol Version     x x  
Panel-wide Functions          
Monitoring          
Event Log Threshold x x x x  
Event Log Wrapped x x x x  
Point Bus Fail x x x x  
Fail to Call RPS x x x x  
User Code Tamper x x x x  
SDI Fail x x x x  
Comm Fail x x x x  
AC Fail x x x x  
Battery Missing x x x x  
Battery Low x x x x  
Parameter Checksum Fail x x x x  
Phone Line Fail x x x x  
Control          
Send Test/Status Report x x x    
Programming          
Request/Change Panel Date and Time x x x x  
View Configured Authority Levels PIF   x    
Areas          
Monitoring          
Enabled/In Use/Configured x x x View Only  
Armed Status x x x x  
Alarm Status x x x x  
Area Points Not Ready to Arm x x   x  
Area Ready To Arm Status     x x  
Area Points Bypassed x x x x  
Area Points Forced x x   x Force Arm  
Area Event Memory x x x+ x + = Enhanced capabilities for more detail
User that Last Changed Arming State x x      
Control          
Disarm x x x x  
Master Delay Arm x x x x  
Master Instant Arm x x x x  
Perimeter/Part Delay Arm x x x x  
Perimeter/Part Instant Arm x x x x  
Watch Mode On x x x    
Silence Alarm Bell x x x x  
Bell Test x x x    
Programming          
View/Change Area Text PIF x x View Only  
Identify Points Assigned To Area PIF x x x  
Doors          
Monitoring          
Status (Locked/Unlocked/Secured) x x x x  
Control          
Set/Terminate Unlock mode x x x x  
Set/Terminate Secure mode x x x x  
Cycle Door x x x x  
Programming          
View Door Text     x x  
Change Door Text     x    
Points          
Monitoring          
Normal/Off Normal x x x x  
Unacknowledged Alarm x x      
Unacknowledged Supervisory x x      
Unacknowledged Trouble x x      
Alarm Memory Events     x x  
Forced x x x    
Bypassed x x x x  
Point Condition (Normal/Open/Short/Missing) x x x x  
Control          
Bypass/Unbypass x x x x  
Programming          
View Point Text   x x x  
View/Change Point Text PIF x x    
Identify Area Assigned PIF x x x  
Identify Point Index PIF x x    
Outputs          
Monitoring          
Status (Active/Inactive) x x x x  
Control          
Set State x x x x  
Programming          
Identify Configured Outputs     x x  
View Output Text     x x  
Change Output Text     x    
Users          
Programming          
View/Change Username PIF x x    
View/Change Passcode PIF x x    
View/Change Authority Level Assigned PIF x x    
View/Change User Group PIF x x    
View/Change Token/Card PIF x      
View/Change Keyfob RF-ID   x      
Event Log          
Monitoring          
Get Raw Events x x x    
Get Text Events     x    
SKEDS          
Programming          
Change SKED Time x x x    
Enable/Disable PIF x      
View/Change Day of Week PIF x      
View/Change Holiday Index PIF x      
View/Change Month PIF x      
View/Change Day of Month PIF x      
View/Change Hours PIF x      
View/Change Minutes PIF x      
View/Change Time Edit PIF x      
View/Change Function Code PIF x      
View/Change Parameters 1-5 PIF x      
           
PIF: The original "Legacy" protocol allowed integrators to directly read and manipulate the panel's configuration parameters as they are stored in the panel's memory. (The block of data and the method for interacting with it was known as the "PIF") This was insecure and prone to breaking changes in new firmware revisions and was therefore not carried over to Mode 1 and Mode 2 protocols.