DSS-Express Users-Manual V8.1.1 20220812
DSS-Express Users-Manual V8.1.1 20220812
User's Manual
Foreword
General
This user’s manual introduces the functions and operations of DSS Express (hereinafter referred to as
"the system" or "the platform").
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
I
User's Manual
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
User's Manual
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Transportation Requirements
● Pack the device with packaging provided by its manufacturer or packaging of the same quality
before transporting it.
● Avoid heavy stress, violent vibration, and immersion during transportation.
● Transport the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the transporting temperature and humidity of the device.
Storage Requirements
● Store the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the storing temperature and humidity of the device.
● Avoid heavy stress, violent vibration, and immersion during storage.
Installation Requirements
● Make sure that the power is off when you connect the cables, install or disassemble the device.
● For devices with earthing systems, make sure they are grounded to avoid being damaged by
static electricity or induced voltage, and prevent electrocution from occurring.
● All installation and operations must conform to local electrical safety regulations.
● Use accessories suggested by the manufacturer, and installed by professionals.
● Do not block the ventilator of the device, and install the device in a well-ventilated place.
● Do not expose the device to heat sources or direct sunlight, such as radiator, heater, stove or
other heating equipment, which is to avoid the risk of fire.
● Do not place the device in explosive, humid, dusty, extremely hot or cold sites with corrosive gas,
strong electromagnetic radiation or unstable illumination.
● Avoid heavy stress, violent vibration, and immersion during installation.
Safe and stable power supply is a prerequisite for proper operation of the device.
● Make sure that the ambient voltage is stable and meet the power supply requirements of the
device.
● Prevent the power cord from being trampled or pressed, especially the plug, power socket and
the junction from the device.
● For devices that can be powered by multiple supplies, do not connect them to two or more kinds
of power supplies; otherwise, the device might be damaged.
III
User's Manual
● Refer to the specific user’s manual for the power requirements of single device.
It is recommended to use the device with a lightning protector for better lightning-proof effect.
Operation Requirements
A suitable operating environment is the foundation for the device to work properly. Confirm
whether the following conditions have been met before use.
● Use the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the operating temperature and humidity of the device.
● Use the device on a stable base.
● Do not let any liquid flow into the device to avoid damage to internal components. When liquid
flows into the device, immediately disconnect the power supply, unplug all cables connected to
it, and contact after-sales service.
● Do not plug or unplug RS-232, RS-485 and other ports with the power on, otherwise, the ports
will be easily damaged.
● Back up data in time during deployment and use, in an effort to avoid data loss caused by
abnormal operation. The company is not liable for data security.
● The company is not responsible for damages to the device or other product problems caused by
excessive use or other improper use.
Maintenance Requirements.
● Contact professionals for regular inspection and maintenance of the device. Do not disassemble
or dismantle the device without a professional present.
● Use accessories suggested by the manufacturer, and maintain the device by professionals.
IV
User's Manual
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings ............................................................................................................................................ III
1 Overview ................................................................................................................................................................................................... 1
1.1 Introduction ................................................................................................................................................................................. 1
1.2 Highlights ...................................................................................................................................................................................... 1
2 Installation and Deployment .......................................................................................................................................................... 2
2.1 Standalone Deployment ........................................................................................................................................................ 2
2.1.1 Server Requirements .................................................................................................................................................... 2
2.1.2 Installing DSS .................................................................................................................................................................... 3
2.1.3 Configuring Server IP Address ................................................................................................................................. 6
2.1.4 Managing System Services ........................................................................................................................................ 6
2.1.5 Installing and Logging into DSS Client ................................................................................................................ 8
2.1.5.1 Installing DSS Client ........................................................................................................................................... 8
2.1.5.1.1 DSS Client Requirements ...................................................................................................................... 8
2.1.5.1.2 Downloading and Installing DSS Client......................................................................................... 9
2.1.5.2 Logging in to DSS Client .................................................................................................................................10
2.1.5.3 Homepage of DSS Client ................................................................................................................................11
2.1.6 Licensing ...........................................................................................................................................................................12
2.1.6.1 Applying for a License .....................................................................................................................................12
2.1.6.2 Activating License .............................................................................................................................................12
2.1.6.2.1 Online Activation ....................................................................................................................................12
2.1.6.2.2 Offline Activation ....................................................................................................................................13
2.2 Configuring LAN or WAN .....................................................................................................................................................14
2.2.1 Configuring Router ......................................................................................................................................................14
2.2.2 Mapping IP or Domain Name ..................................................................................................................................14
3 Basic Configurations .........................................................................................................................................................................15
3.1 Preparations...............................................................................................................................................................................15
3.1.1 Installing DSS Client ....................................................................................................................................................15
3.1.2 Installing Mobile Client..............................................................................................................................................15
3.2 Managing Resources ..............................................................................................................................................................15
3.2.1 Adding Organization ..................................................................................................................................................15
3.2.2 Managing Device ..........................................................................................................................................................17
3.2.2.1 Searching for Online Devices .......................................................................................................................17
3.2.2.2 Initializing Devices ............................................................................................................................................18
3.2.2.3 Changing Device IP Address ........................................................................................................................19
V
User's Manual
3.2.2.4 Adding Devices ...................................................................................................................................................19
3.2.2.4.1 Adding Devices One by One ..............................................................................................................19
3.2.2.4.2 Adding Devices through Searching ...............................................................................................21
3.2.2.4.3 Importing Devices ..................................................................................................................................21
3.2.2.5 Editing Devices....................................................................................................................................................22
3.2.2.5.1 Changing IP Address .............................................................................................................................22
3.2.2.5.2 Modifying Device Information .........................................................................................................22
3.2.2.5.3 Modifying Device Organization ......................................................................................................23
3.2.2.5.4 Changing Device Password................................................................................................................24
3.2.2.6 Modifying Device Time Zone .......................................................................................................................24
3.2.2.7 Exporting Devices ..............................................................................................................................................25
3.2.3 Binding Resources ........................................................................................................................................................26
3.2.4 Adding Recording Plan ..............................................................................................................................................28
3.2.4.1 Adding Recording Plan One by One .........................................................................................................28
3.2.4.2 Adding Center Recording Plans in Batches ..........................................................................................30
3.2.4.2.1 General Recording Plan .......................................................................................................................31
3.2.4.2.2 Motion Detection Recording Plan ..................................................................................................32
3.2.5 Adding Time Template ..............................................................................................................................................33
3.2.6 Configuring Video Retention Period ..................................................................................................................33
3.2.7 Configuring Events ......................................................................................................................................................34
3.2.8 Configuring Device Parameters ............................................................................................................................35
3.2.8.1 Configuring Camera Properties..................................................................................................................35
3.2.8.1.1 Configuring Property Files .................................................................................................................35
3.2.8.1.2 Applying Configuration Files ............................................................................................................45
3.2.8.2 Video ........................................................................................................................................................................47
3.2.8.2.1 Video Stream .............................................................................................................................................47
3.2.8.2.2 Snapshot Stream .....................................................................................................................................49
3.2.8.2.3 Overlay .........................................................................................................................................................51
3.2.8.3 Audio ........................................................................................................................................................................53
3.2.9 Synchronizing People Counting Rules ...............................................................................................................54
3.3 Adding Role and User ............................................................................................................................................................55
3.3.1 Adding User Role ..........................................................................................................................................................55
3.3.2 Adding User .....................................................................................................................................................................56
3.3.3 Password Maintenance ..............................................................................................................................................57
3.3.3.1 Changing Password for the Current User ..............................................................................................57
3.3.3.2 Changing Password for Other Users ........................................................................................................58
3.3.3.3 Resetting User Password ...............................................................................................................................58
VI
User's Manual
3.4 Configuring Storage...............................................................................................................................................................59
3.4.1 Configuring Server Disk ............................................................................................................................................59
3.4.2 Configuring Device Storage ....................................................................................................................................60
4 Businesses Configuration ...............................................................................................................................................................62
4.1 Configuring Events .................................................................................................................................................................62
4.2 Configuring Map ......................................................................................................................................................................68
4.2.1 Preparations ....................................................................................................................................................................68
4.2.2 Adding Map .....................................................................................................................................................................68
4.2.3 Marking Devices ............................................................................................................................................................70
4.3 Personnel and Vehicle Information Management ..................................................................................................70
4.3.1 Configuring Personnel Information ....................................................................................................................71
4.3.1.1 Adding Person Group ......................................................................................................................................71
4.3.1.2 Adding Personnel ..............................................................................................................................................72
4.3.1.2.1 Adding a Person ......................................................................................................................................72
4.3.1.2.2 Importing Personnel .............................................................................................................................78
4.3.1.2.3 Extracting Personnel Information ..................................................................................................80
4.3.1.3 Issuing Cards in Batches .................................................................................................................................82
4.3.1.4 Editing Personnel Information ...................................................................................................................84
4.3.2 Vehicle Management ..................................................................................................................................................84
4.4 Watch List Configuration .....................................................................................................................................................87
4.4.1 Face Watch List...............................................................................................................................................................87
4.4.1.1 Creating Face Comparison Group .............................................................................................................87
4.4.1.2 Adding Face ..........................................................................................................................................................89
4.4.1.3 Arming Face ..........................................................................................................................................................90
4.4.2 Vehicle Watch List ........................................................................................................................................................92
4.4.2.1 Creating Vehicle Arming Group .................................................................................................................92
4.4.2.2 Adding Vehicles ..................................................................................................................................................93
4.4.2.3 Arming Vehicles..................................................................................................................................................93
4.5 Access Control ...........................................................................................................................................................................94
4.5.1 Preparations ....................................................................................................................................................................94
4.5.2 Configuring Door Groups .........................................................................................................................................94
4.5.3 Configuring Access Permission Groups.............................................................................................................95
4.5.4 Configuring Public Passwords ...............................................................................................................................98
4.5.5 Anti-passback .................................................................................................................................................................98
4.5.6 Configuring Time Templates ............................................................................................................................... 100
4.5.7 Configuring Holidays ............................................................................................................................................... 100
4.5.8 Configuring Access Control Devices ................................................................................................................ 101
VII
User's Manual
4.5.9 Configuring Door Information ............................................................................................................................ 102
4.6 Video Intercom ...................................................................................................................................................................... 104
4.6.1 Preparations ................................................................................................................................................................. 104
4.6.2 Call Management ....................................................................................................................................................... 104
4.6.2.1 Configuring Call Group ................................................................................................................................ 104
4.6.2.2 Adding Management Group ..................................................................................................................... 105
4.6.2.3 Configuring Group Relation ...................................................................................................................... 106
4.6.3 Configuring Building/Unit and Call Mode ..................................................................................................... 107
4.6.4 Synchronizing Contacts.......................................................................................................................................... 107
4.6.5 Setting Private Password ....................................................................................................................................... 108
4.6.6 App User ......................................................................................................................................................................... 108
4.7 Visitor Management............................................................................................................................................................ 109
4.7.1 Preparations ................................................................................................................................................................. 109
4.7.2 Configuring Visit Settings ..................................................................................................................................... 109
4.8 Parking Lot ............................................................................................................................................................................... 110
4.8.1 Preparations ................................................................................................................................................................. 110
4.8.2 Configuring Parking Lot ......................................................................................................................................... 111
4.8.2.1 Basic Information ............................................................................................................................................ 111
4.8.2.2 Event Parameter .............................................................................................................................................. 115
4.8.3 Managing Vehicle Group ....................................................................................................................................... 116
4.9 Intelligent Analysis .............................................................................................................................................................. 117
4.9.1 People Counting Group .......................................................................................................................................... 117
4.9.2 Scheduled Report ...................................................................................................................................................... 118
5 Businesses Operation .................................................................................................................................................................... 120
5.1 Monitoring Center ................................................................................................................................................................ 120
5.1.1 Main Page ...................................................................................................................................................................... 120
5.1.2 Video Monitoring....................................................................................................................................................... 121
5.1.2.1 Viewing Live Video......................................................................................................................................... 121
5.1.2.2 View ....................................................................................................................................................................... 132
5.1.2.2.1 Creating View ......................................................................................................................................... 132
5.1.2.2.2 Viewing View.......................................................................................................................................... 133
5.1.2.3 Favorites .............................................................................................................................................................. 134
5.1.2.3.1 Creating Favorites ............................................................................................................................... 135
5.1.2.3.2 Viewing Favorites ................................................................................................................................ 135
5.1.2.4 PTZ.......................................................................................................................................................................... 135
5.1.2.4.1 Configuring Preset .............................................................................................................................. 135
5.1.2.4.2 Configuring Tour .................................................................................................................................. 136
VIII
User's Manual
5.1.2.4.3 Configuring Pattern............................................................................................................................ 137
5.1.2.4.4 Configuring Scan.................................................................................................................................. 138
5.1.2.4.5 Enabling/Disabling Pan .................................................................................................................... 139
5.1.2.4.6 Enabling/Disabling Wiper ............................................................................................................... 139
5.1.2.4.7 Enabling/Disabling Light ................................................................................................................. 139
5.1.2.4.8 Configuring Custom Command .................................................................................................... 139
5.1.2.4.9 PTZ Menu ................................................................................................................................................. 140
5.1.2.5 Fisheye-PTZ Smart Track............................................................................................................................. 142
5.1.2.5.1 Preparations ........................................................................................................................................... 142
5.1.2.5.2 Configuring Fisheye-PTZ Smart Track....................................................................................... 143
5.1.2.5.3 Applying Fisheye-PTZ Smart Track ............................................................................................. 144
5.1.3 Playback ......................................................................................................................................................................... 145
5.1.3.1 Page Description ............................................................................................................................................. 145
5.1.3.2 Playing Back Recordings ............................................................................................................................. 146
5.1.3.3 Locking Videos ................................................................................................................................................. 149
5.1.3.4 Tagging Videos ................................................................................................................................................ 151
5.1.3.5 Filtering Recording Type............................................................................................................................. 151
5.1.3.6 Clipping Videos ................................................................................................................................................ 152
5.1.3.7 Smart Search ..................................................................................................................................................... 154
5.1.4 Map Applications ....................................................................................................................................................... 155
5.1.5 Video Wall...................................................................................................................................................................... 157
5.1.5.1 Configuring Video Wall................................................................................................................................ 157
5.1.5.1.1 Page Description .................................................................................................................................. 157
5.1.5.1.2 Preparations ........................................................................................................................................... 159
5.1.5.1.3 Adding Video Wall ............................................................................................................................... 159
5.1.5.1.4 Configuring Video Wall Display Tasks ...................................................................................... 160
5.1.5.1.5 Configuring Video Wall Plans ........................................................................................................ 161
5.1.5.2 Video Wall Applications .............................................................................................................................. 164
5.1.5.2.1 Instant Display ...................................................................................................................................... 164
5.1.5.2.2 Video Wall Task Display.................................................................................................................... 165
5.1.5.2.3 Video Wall Plan Display .................................................................................................................... 166
5.2 Event Center ............................................................................................................................................................................ 166
5.2.1 Real-time Alarms ........................................................................................................................................................ 166
5.2.2 History Alarms ............................................................................................................................................................. 168
5.3 DeepXplore .............................................................................................................................................................................. 169
5.3.1 Searching for Records.............................................................................................................................................. 169
5.3.2 Searching for People ................................................................................................................................................ 171
IX
User's Manual
5.3.3 Searching for Vehicles ............................................................................................................................................. 172
5.4 Access Management ........................................................................................................................................................... 174
5.4.1 Access Control Application ................................................................................................................................... 174
5.4.1.1 Viewing Videos ................................................................................................................................................ 174
5.4.1.2 Unlocking Door ................................................................................................................................................ 175
5.4.1.3 Locking Door ..................................................................................................................................................... 176
5.4.1.4 Viewing Event Details ................................................................................................................................... 177
5.4.1.5 Viewing Access Control Records ............................................................................................................. 178
5.4.1.5.1 Online Records ...................................................................................................................................... 178
5.4.1.5.2 Offline Records ...................................................................................................................................... 179
5.4.2 Video Intercom Application ................................................................................................................................. 180
5.4.2.1 Call Center .......................................................................................................................................................... 181
5.4.2.2 Releasing Messages ....................................................................................................................................... 184
5.4.2.3 Video Intercom Records .............................................................................................................................. 185
5.4.3 Visitor Application .................................................................................................................................................... 185
5.4.3.1 Preparations ...................................................................................................................................................... 185
5.4.3.2 Checking In......................................................................................................................................................... 186
5.4.3.3 Checking Out..................................................................................................................................................... 189
5.4.3.4 Searching for Visit Records ........................................................................................................................ 189
5.5 Parking Lot ............................................................................................................................................................................... 189
5.5.1 Entrance and Exit Monitoring ............................................................................................................................. 189
5.5.2 Searching for Records.............................................................................................................................................. 191
5.5.2.1 Searching for Entrance Records .............................................................................................................. 191
5.5.2.2 Searching for Exit Records ......................................................................................................................... 191
5.5.2.3 Searching for Forced Exit Records.......................................................................................................... 192
5.5.2.4 Searching for Capture Records ................................................................................................................ 192
5.6 Intelligent Analysis .............................................................................................................................................................. 193
5.6.1 People Counting......................................................................................................................................................... 193
5.6.1.1 Real-time Count ............................................................................................................................................... 193
5.6.1.2 Historical Count ............................................................................................................................................... 194
5.6.2 Heat Maps ...................................................................................................................................................................... 195
5.6.3 In-area People Counting ........................................................................................................................................ 196
6 General Application ....................................................................................................................................................................... 197
6.1 Target Detection ................................................................................................................................................................... 197
6.1.1 Typical Topology........................................................................................................................................................ 197
6.1.2 Preparations ................................................................................................................................................................. 197
6.1.3 Live Target Detection .............................................................................................................................................. 198
X
User's Manual
6.1.4 Searching for Metadata Snapshots .................................................................................................................. 198
6.2 ANPR ........................................................................................................................................................................................... 199
6.2.1 Typical Topology........................................................................................................................................................ 199
6.2.2 Preparations ................................................................................................................................................................. 199
6.2.3 Live ANPR....................................................................................................................................................................... 200
6.2.4 Searching for Vehicle Snapshot Records ....................................................................................................... 200
6.3 Face Recognition................................................................................................................................................................... 200
6.3.1 Typical Topology........................................................................................................................................................ 201
6.3.2 Preparations ................................................................................................................................................................. 201
6.3.3 Arming Faces................................................................................................................................................................ 202
6.3.4 Live Face Recognition .............................................................................................................................................. 202
6.3.5 Searching for Face Snapshots ............................................................................................................................. 203
7 System Configurations ................................................................................................................................................................. 204
7.1 License........................................................................................................................................................................................ 204
7.1.1 Activating License ..................................................................................................................................................... 204
7.1.2 Deactivating License ................................................................................................................................................ 205
7.1.2.1 Online Deactivation ....................................................................................................................................... 205
7.1.2.2 Offline Deactivation ...................................................................................................................................... 205
7.2 System Parameters .............................................................................................................................................................. 206
7.2.1 Configuring Security Parameters ...................................................................................................................... 206
7.2.2 Configuring Retention Period of System Data............................................................................................ 207
7.2.3 Time Synchronization.............................................................................................................................................. 207
7.2.4 Configuring Email Server ....................................................................................................................................... 209
7.2.5 Configuring Device Login Mode ........................................................................................................................ 210
7.2.6 Remote Log ................................................................................................................................................................... 211
7.3 Backup and Restore ............................................................................................................................................................. 211
7.3.1 System Backup ............................................................................................................................................................ 212
7.3.2 System Restore ........................................................................................................................................................... 213
8 Management ...................................................................................................................................................................................... 215
8.1 Managing Logs....................................................................................................................................................................... 215
8.1.1 Operator Log ................................................................................................................................................................ 215
8.1.2 Device Log ..................................................................................................................................................................... 215
8.1.3 System Log .................................................................................................................................................................... 215
8.1.4 Service Log Debug .................................................................................................................................................... 215
8.2 Downloading Videos........................................................................................................................................................... 216
8.3 Configuring Local Settings .............................................................................................................................................. 217
8.3.1 Configuring General Settings .............................................................................................................................. 217
XI
User's Manual
8.3.2 Configuring Video Settings .................................................................................................................................. 219
8.3.3 Configuring Video Wall Settings........................................................................................................................ 222
8.3.4 Configuring Alarm Settings .................................................................................................................................. 223
8.3.5 Configure File Storage Settings ......................................................................................................................... 224
8.3.6 Viewing Shortcut Keys ............................................................................................................................................ 225
8.4 Playing Local Videos ........................................................................................................................................................... 226
8.5 Quick Commands .................................................................................................................................................................. 227
Appendix 1 Service Module Introduction ............................................................................................................................... 229
Appendix 2 Cybersecurity Recommendations ..................................................................................................................... 231
XII
User's Manual
1 Overview
1.1 Introduction
DSS Express can be used with 64 cameras for free and supports up to 256 cameras with license. In
addition, it is easy to be integrated with access control, video intercoms and AI features such as facial
recognition, ANPR, and video metadata. It is suitable for retail stores, vehicle entrance management,
and office buildings.
1.2 Highlights
● Lower investment
The free version of DSS Express provides 64 video channels and requires more affordable
hardware. As your needs increase, you only need to pay for a new license and get extra
performance.
● Pay-as-you-go
DSS Express is flexibly scalable. You can purchase different licenses to increase the number of
devices you can connect to the platform. DSS Express supports up to 256 video channels, 64
doors, and 256 video intercoms.
● Easy upgrade
For more functions and capacity, simply upgrade to the professional version with just a license
and a few simple steps.
● Unified platform
All your needs can be addressed directly in DSS Express with the comprehensive applications it
can provide, including video surveillance, access control, video intercom, face recognition, and
ANPR.
1
User's Manual
Standalone Deployment
For projects with a small number of devices, only one DSS server is required.
2
User's Manual
● Face recognition images, videos, and files cannot be stored on the system disk and DSS
installation disk. Make sure that your server has at least 3 HDD partitions to ensure that these files
can be stored.
● For best performance, we recommend adding additional hard drives to store pictures.
Procedure
Step 1 Double-click the DSS installer .
3
User's Manual
The name of the installer includes version number and date, confirm before installation.
Step 2 Click Software License Agreement, and then read the agreement,
Step 3 Select the check box to accept the agreement, and then click Next.
We do not recommend you install the DSS server on Disk C, because features such as face
recognition require higher disk performance.
Step 5 Click Install.
4
User's Manual
The installation process takes about 4 to 8 minutes. Do not cut off the power or close the
program.
Step 7 Select a network mode and the network card, and then click Next Step.
Step 8 Enable or disable TLS1.0 as needed.
TLS 1.0 has known security vulnerabilities. We strongly recommend you disable it to avoid
security risks. If it is disabled, the web page of DSS platform cannot be accessed through
the browser. You need to enable TLS 1.1 and TLS 1.2 in the browser settings to gain access
to the web page.
Step 9 Click Finish.
5
User's Manual
If the available RAM of the server is less than 2 GB, you can only use basic functions related
to video. If it is less than 1.5 GB, you cannot use any function.
Related Operations
● To uninstall the platform, log in to the server, go to "..\DSS\DSS Server\Uninstall", double-click
uninst.exe, and then follow the on-screen instructions to uninstall the program.
● To update the system, directly install the new program. The system supports in-place update.
Follow the steps above to install the program.
After changing the IP address of the server, you need to update it in the system services. See the
following section.
6
User's Manual
Figure 2-6 Service management page
7
User's Manual
To install DSS Client, prepare a computer in accordance with the following requirements.
8
User's Manual
Table 2-3 Hardware requirements
Parameters Description
● CPU: [email protected]
● Memory: 8 GB and above
Recommended system ● Graphics: NVIDIA® GeForce®GT 530
requirements ● Network Card: 1000 Mbps
● HDD: Make sure that at least 100GB is reserved for the
client.
● CPU: [email protected]
● Memory: 4 GB
Minimum system ● Graphics: Intel® HD Sandbridge Desktop Graphcs
requirements ● Network Card: 1000 Mbps
● DSS client installation space: Make sure that at least 50 GB is
reserved for DSS client.
9
User's Manual
If you want to log in to the platform using its domain name, you must link its IP address to
a domain name first. For details, see the user's manualsee "2.2.2 Mapping IP or Domain
Name".
Step 4 Click anywhere else on the page to start initializing the platform.
For first-time login, you will be automatically directed to the initialization process.
If you are not logging in for the first time, enter the IP address, port number of the
platform, username, and password, and then click Login.
1) The default user is system. Enter and confirm the password, and then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least two
types of characters: Uppercase, lowercase, number, and special character (excluding '
" ; : &).
2) Select your security questions and enter their answers, and then click OK.
The client will automatically log in to the platform by using the password you just set.
10
User's Manual
11
User's Manual
2.1.6 Licensing
You can upgrade your license for more features and increased capacity.
This section introduces license capacity, how to apply for a license, how to use the license to activate
the platform, and how to renew your license.
The following images of the page might slightly differ from the actual pages.
Prerequisites
● You have received your license. If not, see "2.1.6.1 Applying for a License".
A license is used to confirm the features and number of channels you purchased. To get a formal
license, contact our sales personnel. To apply for a trial license, visit our website and find DSS
Express, and then follow the application instructions.
● The platform server can access the Internet.
Procedure
Step 1 On the Home page, click , and then in System Config, select License.
Step 2 Click Online Activate License.
Step 3 Enter your new Activation Code.
Step 4 Click Activate Now.
12
User's Manual
Step 5 On the License page, view your license details.
Prerequisites
You have received your license. If not, see "2.1.6.1 Applying for a License".
A license is used to confirm the features and number of channels you purchased. To get a formal
license, contact our sales personnel. To apply for a trial license, visit our website and find DSS
Express, and then follow the application instructions.
Procedure
Step 1 On the Home page, click , and then in System Config, select License.
Step 2 Click Offline Activate License.
Step 3 Enter your new Activation Code.
Step 4 Click Export to export the license request file.
Step 5 Generate license file.
1) Move the request file to a computer with Internet access.
2) On that computer, open the system email that contains your license, and then click the
attached web page address or Click to go to DSS License Management to go to the
license management page.
3) Click Activate License.
4) Click Upload, select the license request file, and then when you are prompted
uploaded successfully, click Activate.
The success page is displayed, where a download prompt is displayed asking you to
save the license activation file.
5) On the success page, click Save to save the file, and then move the file back to the
13
User's Manual
computer where you exported the license request file.
6) On the Offline Activate License page, click Import, and then follow the on-screen
instructions to import the license activation file.
Step 6 On the License page, view your license details.
Make sure that the WAN ports is consistent with LAN ports.
Step 3 Enter a fixed WAN IP address or a domain name in the Mapping IP | Domain box, and then
click OK.
If you want to use a domain name, you need to make corresponding configurations on the
domain name server.
Step 4 Click OK, and then the services will restart.
14
User's Manual
3 Basic Configurations
Configure basic settings of the system functions before using them, including system activation,
organization and device management, user creation, storage and recording planning, and event
rules configuration.
3.1 Preparations
15
User's Manual
Root. If the parent organization is not specified, newly added devices are attached to Root.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click
Step 3 Add an organization.
1) Select a parent organization.
2) Click .
16
User's Manual
Figure 3-3 Add an organization
You can also right-click the root organization, and then click Create Organization to
add an organization.
Related Operations
● Change organization name
Right-click the organization, and then click Rename.
● Delete an organization
Organization with devices cannot be deleted.
Select the organization, click , or right-click an organization and select Delete.
● Change the organization of devices
Select one or more devices, and then click Move To to move them to another organization.
17
User's Manual
● When using the platform for the first time, the platform automatically searches for
devices on the same network segment.
● If not the first time, the platform automatically searches for the devices in the network
segment you configured last time.
● You can select multiple devices to initialize them in batches. Make sure that the
selected devices have the same username, password and email information. The
information of these devices will be the same after initialization, such as password and
email address.
● Click next to Initialization Status to quickly sort out devices in certain status.
Step 3 Enter the password, and then click Password Security.
Step 4 Enter the email address, and then click Change IP.
18
User's Manual
For devices that have the same username and password, you can select and modify their IP
addresses in batches.
Step 3 Enter New IP, Subnet Mask and Gateway, and then click Save.
When setting IP addresses in batches, the IP addresses increase in sequence.
Step 4 Enter the username and password used to log in to the devices, and then click OK.
When you add devices by using automatic registration, IP segment, or importing, some devices will
fail to be added if they exceed the number of devices or channels allowed to be added to the
platform. These devices will be displayed in Devices without License.
There are multiple ways you can add devices to the platform, including using domain names, serial
numbers, IP addresses, IP segments, and automatic registration.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click
Step 3 Click Add.
Step 4 Enter device login information, and then click Add.
In the Add Mode drop-down list,
● IP Address: Add a device. We recommend selecting this option when you know the IP
address of the device.
19
User's Manual
Only Encoder devices support IPv6. If you want to add devices to the platform through
IPv6 addresses, you must first configure an IPv6 address for the platform. Contact
technical support for help.
● IP segment: Add multiple devices in the same segment. We recommend selecting this
option when the login username and password of the multiple devices in the same
segment are the same.
● Domain Name: We recommend selecting this option when the IP address of the device
changes frequently and a domain name is configured for the device.
● Auto Registration: We recommend this method when the IP address of a device might
change. The ID of auto register has to be in accordance with the registered ID
configured on the device you want to add. The port number must be the same on the
platform and on the device. The auto register port is 9500 on the platform by default.
To change the auto register port number, open the configuration tool to change the
port number of DSS_ARS service.
Sleep function is supported for IPCs that use 4G mobile network to communicate and
are solar-powered only when they are added to the platform through automatic
registration.
● P2P: Add devices under the a P2P account to the platform. The platform must be able
to access the P2P server. There is no need to apply for the dynamic domain name of the
device, perform port mapping or deploy a transit server when using it.
20
User's Manual
Devices on the same network with the platform server can be added using the automatic search
function.
Step 1 Search for devices. For details, see "3.2.2.1 Searching for Online Devices".
Step 2 Select a device, and then click Add to Device List or .
If devices have the same username and password, you can select and add them in batches.
Step 3 Select the server and organization, enter username and password, and then click OK.
Enter the device information in the template, and then you can add devices in batches.
Prerequisites
You have downloaded the template, and then enter device information in the template.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Click Import.
21
User's Manual
Figure 3-10 Import devices
Step 4 Click Import File, and then select the completed template.
Step 5 Click OK.
For the devices that have been added to the platform, and their IP addresses have been changed,
you can edit their IP addresses directly on the platform so that they can connect to the platform
normally.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click Device Config.
Step 3 Click of a device.
Step 4 Edit the IP address, and then click OK.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Click of a device, and then edit device information.
Click Get Info and the system will synchronize device information.
22
User's Manual
Figure 3-11 Basic information
Step 4 Click Video Channel, and then configure the channel information, such as the channel
name and channel features.
The types of features vary with different devices. Select features according to the capability
of the camera.
Step 5 Click the Alarm Input Channel tab, and then configure number, names, and alarm types
of the alarm input channels.
Skip the step when the device do not support alarm input.
● Alarm type includes external alarm, Infrared detect, zone disarm, PIR, gas sensor, smoke
sensor, glass sensor, emergency button, stolen alarm, perimeter and preventer move.
● Alarm type supports custom. Select Customize Alarm Type in the Alarm Type drop-
down list. Click Add to add new alarm type. It supports up to 30 custom alarm types.
Step 6 Click the Alarm Output Channel tab and then edit the number and names of alarm
output channels.
Step 7 Click the Audio and Light Channel tab, and then edit the number and names of the audio
and light channels.
This tab will only appear if the device has audio and light channels.
Step 8 Click OK.
23
User's Manual
section, select Device.
Step 2 Click
Step 3 Select a device to be moved, click Move To, select the target organization, and then click
OK.
You can select multiple devices and change their passwords at the same time.
Step 4 Enter the old and new passwords, and then click OK.
24
User's Manual
If a device is accessed through ONVIF and the ONVIF version is earlier than 18.12, the device DST
cannot be edited on the platform. You can only edit manually.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Time Zone Settings.
25
User's Manual
Figure 3-15 Select a device type
You can configure whether to verify the password. For details, see "7.2.1 Configuring
Security Parameters".
● The encryption password is used to protect the export file. It consists of 6 uppercase or
lower case letters, numbers, or their combination. You need to enter it when using the
export file.
● You can select All to export all the devices, or Selected to export the devices you
selected.
Step 6 Select a path on your PC, and then click Save.
26
User's Manual
Figure 3-16 Bind channel
27
User's Manual
Figure 3-17 Select the channels you want to bind to the camera
28
User's Manual
motion detection videos within the defined period.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a channel, and then configure a recording plan.
● Configure a center recording plan.
1) Click Add Recording Plan next to Center Recording Plan.
29
User's Manual
The platform can obtain and display the recording plan that has been configured on
EVS of the latest versions. You can check if recording plan are obtained and displayed
on the page to know if your EVS is of the latest version.
1) Click Add Recording Plan next to Device Recording Plan.
Related Operations
● Enable/disable a recording plan
means that the plan has been enabled. Click the icon and it becomes , and it means
that the plan has been disabled.
● Click : Copy the recording plan to other channels.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● Click to delete recording plans one by one.
30
User's Manual
time.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Storage Plan > Recording Plan.
Step 2 Select General Recording Plan > Add General Recording Plan.
Step 3 Configure the parameters, and then click OK.
Related Operations
● Enable/disable a recording plan
means that the plan has been enabled. Click the icon and it becomes , and it means
that the plan has been disabled.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● : Select multiple channels, and then delete them at the same time.
● and : Select multiple channels, and then enable or disable them at the same time.
31
User's Manual
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Storage Plan > Recording Plan.
Step 2 Select Motion Detection Recording Plan > Add Motion Detection Recording Plan.
Step 3 Configure the parameters, and then click OK.
Related Operations
● Enable/disable a recording plan
means that the plan has been enabled. Click the icon and it becomes , and it means
that the plan has been disabled.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● Edit a recording plan
Click of corresponding plan to edit the plan.
32
User's Manual
● : Select multiple channels, and then delete them at the same time.
● and : Select multiple channels, and then enable or disable them at the same time.
Step 5 Configure name and periods. You can set up to 6 periods in one day.
Select the Copy From check box, and then you can select a template to copy from.
● On the time bar, click and drag to draw the periods. You can also click , and then
draw the periods for multiple days.
● You can also click to configure periods.
Step 6 Click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a camera, and then click Modify.
33
User's Manual
Figure 3-23 Go to recording storage configuration page
Step 4 Click to enable the storing of different type of video, and then configure the
retention period.
For the free version of Express, the retention period cannot be more than 7 days. If you
need more than 7 days, you need to purchase an official version.
Step 5 Click OK.
Related Operations
Enable/disable record plan
In the operation column, means that the recoding storage configuration has been enabled.
Click the icon and it becomes , meaning that the configuration has been disabled.
34
User's Manual
Figure 3-24 Go to the event configuration (device)
Device configuration might vary depending on the capacities of the devices. The pages in the
section are for reference only, and might differ from the actual ones.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Parameter Setting.
35
User's Manual
Figure 3-26 Device configuration
36
User's Manual
Icon/Function Description
Adjust the speed. The higher the value, the faster the camera
rotates.
37
User's Manual
If the device that supports real wide dynamic (WDR) has enabled WDR, long exposure is
not available.
38
User's Manual
Parameter Description
● Shutter Priority: Within the normal exposure range, the device adjusts
itself automatically first in the preset range of shutter values as per the
brightness of the scenes. If the image has not achieved the target
brightness when the shutter value hits the upper limit or lower limit, the
device adjusts the gains automatically to achieve the best brightness.
● Aperture Priority: The aperture is fixed at a preset value before the device
adjusts the shutter value automatically. If the image has not achieved the
target brightness when the shutter value hits the upper limit or lower limit,
the device adjusts the gains automatically to achieve the best brightness.
● Manual: You can set up the gains and shutter values manually to adjust
image brightness.
● If the Anti-flicker is set to Outdoor, you can set the Mode to Gain Priority
or Shutter Priority.
● Different devices have different exposure modes. The actual pages might
be different.
Reduces the noises of multiple-frame (at least two frames) images by using
3D NR
inter-frame information between two adjacent frames in a video.
When 3D NR is On, you can set up this parameter.
Grade
The higher the grade, the better the noise reduction effect.
Step 8 Click Backlight to set up relevant parameters.
The backlight mode offers backlight correction, wide dynamic, and glare inhibition
features.
● Turning on Backlight Correction avoids silhouettes of relatively dark portions in
pictures taken in a backlight environment.
● Turning on Wide Dynamic inhibits too bright portions and makes too dark portions
brighter, presenting a clear picture overall.
● Turning on Glare Inhibition partially weakens strong light. This feature is useful in a
toll gate, and the exit and entrance of a parking lot. Under extreme lighting conditions
such as deep darkness, this feature can help capture the details of the faces and license
plates.
39
User's Manual
Figure 3-29 Backlight
40
User's Manual
Figure 3-30 WB
41
User's Manual
Figure 3-31 Day & night
The Day & Night settings are independent of the Config Files settings.
You can set up this parameter when the Day & Night mode is set to Auto.
Defines the delay of the camera in switching between the Colored mode and
the Black&White mode. The lower the delay, the faster the switch between the
Delayed Colored mode and the Black&White mode.
recording
You can set up this parameter when the Day & Night mode is set to Auto.
Step 11 Click Defog to set up relevant parameters. See Figure 3-32. For details of the parameters,
see Table 3-11.
Image quality drops when the camera is placed in the foggy or hazy environment. You can
turn on Defog to make the images clearer.
42
User's Manual
Figure 3-32 Defog
43
User's Manual
Figure 3-33 IR light
44
User's Manual
● When the mode is set to Full Time, you can set Always Enable to Daytime or Night.
The system monitors the objects as per the Always Enable configurations.
45
User's Manual
Figure 3-36 Set configuration files as full time
● When the mode is set to Shift by time, you can drag the slider to set a period of time as
daytime or night. For example, you can set 8:00–18:00 as daytime, 0:00–8:00 and 18:00–
24:00 as night. The system monitors the objects in different time periods as per
corresponding configurations.
46
User's Manual
Figure 3-37 Set configuration files as shift by time
3.2.8.2 Video
Set video parameters such as video stream, snapshot stream, overlay, ROI and saving path.
Set the video stream parameters such as stream type, encoding mode, resolution, frame rate, stream
control, stream, I frame interval, SVC, and watermark.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Device Config.
47
User's Manual
Figure 3-38 Device configuration
The default values of streams are for reference only, and the actual pages might be
different.
48
User's Manual
Parameter Description
Turning on Smart Codec will compress the images to save storage
space.
Smart Codec
When smart code is on, the device does not support sub stream 2, ROI,
IVS event detection.
The resolution of the videos. Different devices might have different max
Resolution
resolutions.
The number of frames per second in a video. The higher the FPS, the
FPS
more distinct and smooth the images.
The following video stream control modes are available:
● BRC_CBR: The bit stream changes slightly around the preset value.
● BRC_VBR: The bit stream changes according to the monitored
Bit Rate Control scenes.
When the Encode Mode is set to MJPEG, BRC_CBR remains the only
option for stream control.
This parameter can be set only when Stream Ctrl is set to BRC_VBR.
Image Quality Video image quality is divided into six grades: Best, Better, Good, Bad,
Worse and Worst.
This parameter can be set only when Stream Ctrl is set to BRC_CBR.
Stream You can select the proper stream value from the drop-down box based
on actual scenarios.
The system will recommend an optimal range of stream values to users
Reference Stream
based on the resolution and FPS set up by them.
Refers to the number of P frames between two I frames. The range of I
I Frame Interval Interval changes with FPS.
It is recommended to set the I Interval to be two times as the FPS value.
FPS is subject to layered encoding. SVC is a scalable video encoding
SVC
method on time domain.
Turn on Watermark to enable this feature.
You can verify the watermark characters to check whether the video has
Watermark
been tempered or not.
Characters for watermark verification. The default value is DigitalCCTV.
Step 6 Click Apply.
Set snapshot parameters, including snapshot type, picture size, picture quality, and snapshot speed.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Device Config.
49
User's Manual
Figure 3-40 Device configuration
Step 4 On the Device Config page, select Camera > Video > Snapshot Stream.
50
User's Manual
Parameter Description
3.2.8.2.3 Overlay
Set video overlay parameters, including tampering, privacy mask, channel title, period title,
geographic position, OSD, font, and picture overlay.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Device Config.
Step 4 On the Device Config page, select Camera > Video > Overlay.
Step 5 Set privacy mask.
51
User's Manual
2) Click to enable the function.
3) Click to adjust the size and position of the area frame. You can add 4 area frames at
most.
Step 6 (Optional) Set the channel name to display on the video.
1) Click the Channel Name tab.
52
User's Manual
Figure 3-46 OSD overlay
3.2.8.3 Audio
Set audio parameters such as encoding mode, sampling frequency, audio input type, and noise
filtering.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Device Config.
53
User's Manual
Figure 3-48 Configure audio settings
54
User's Manual
them to the platform.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a channel, and then click Sync People Counting Rules.
Step 4 Click Sync Rules, and then the system prompts Synchronization Complete.
55
User's Manual
● Administrator: A default rule that cannot be modified and has no permission of authorization,
backup and restoring. An administrator can create other administrators.
● Common role: A common role that has no permission of authorization, backup and restoring,
user management, and device management.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select User.
Step 2 Click .
Step 3 Click Add, set role information, and then select device and control permissions and assign
the rule to users.
● If a device is not selected under Device Permissions or a menu not selected under
Menu Permissions, all users assigned with this role will not be able to see the device or
menu.
● Click of a selected organization. All permissions of subsequently added devices
under this organization will also be assigned to users of this role.
Step 4 Click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select User.
Step 2 Click Add, and then configure the user information.
56
User's Manual
Parameter Description
Multi-client Login Allow the user to log in to multiple clients at the same time.
Password
Used to log in to the client.
Confirm Password
Enable Forced
Password Change at The user is required to change the password at first-time login.
First Login
Enable Password
Force the user to change the password regularly.
Change Interval
Enable Password
The password must be changed after it expires on the defined date.
Expiry Time
The PTZ control priority of the user. The larger the value, the higher the
priority. For example, User A has a priority of 2 and User B has a priority
PTZ Control
of 3. When they operate on the same PTZ camera, which is locked, at
Permissions
the same time, the PTZ camera will only respond to the operations from
User B.
Email Address Used to reset password and receive alarm emails.
Limit the user to log in from specific computers. One user can be bound
Bind MAC Address
to 5 MAC addresses at most.
Select one or more roles to assign the user permissions, such as which
Role
devices are allowed to be operated.
Step 3 Click OK.
Related Operations
● Click to lock user. The locked user cannot log in to the DSS Client and App.
● Click to modify information of a user except the username.
● Click to delete a user.
57
User's Manual
Figure 3-52 Change password
Step 2 Enter the old password, new password, and then confirm the new password. Click OK.
58
User's Manual
● By email address. This is applicable to all accounts, but an email address must be
configured first. For details, see "3.3.2 Adding User".
1. Click Reset Password through Email Verification.
2. Click Send Verification Code.
3. Enter the verification code that you received from the email address, and then click
Next Step.
Step 4 Set a new password and confirm it, and then click Next Step.
The password has been reset.
● To set up local storage, you need a physical disk with only one volume or any volume of one
physical disk. Back up the data of the disk or volume before setting its disk type, which will
format and erase all data from it.
● One physical disk with only one volume or any volume of one physical disk can only store one
type of files. If you need to store more than one type of files, you need more than one physical
disks or volumes, but it cannot be the one where you installed the operating system of the server
or the DSS server. See "2.1.2 Installing DSS".
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Storage.
Step 2 Select .
Step 3 Format a disk to set a storage type
1) Select user volume, and then click .
2) Select storage type, and then click OK.
● Video: Stores videos.
● Images and Files: Stores all types of images and temporary files.
59
User's Manual
If you do not set up one or more disk types, you will not be able to properly use
corresponding functions. For example, if you do not set up an Image and File disk, you
will not see images in all alarms.
60
User's Manual
Parameter Description
itself. The platform will obtain videos from the device.
61
User's Manual
4 Businesses Configuration
This chapter introduces the basic businesses, such as storage plan, video monitoring, access control,
video intercom, target detection, face recognition, ANPR, and intelligent analysis.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Event.
Step 2 Click Add.
62
User's Manual
● Before configuring the event, check whether the channel features match the event
type; otherwise the event type cannot be selected as the alarm source. To configure
channel features, see "3.2.2.5.2 Modifying Device Information".
● If Alarm Input Channel is selected, check whether the Triggered Event that you select
matches the alarm input channel you select; otherwise, the event will not be triggered.
● Soft Trigger is a type of event that is manually triggered. You can customize its name
and button type. When viewing the live video image of the configured channel in the
Monitoring Center, you can click its button to trigger an alarm manually.
63
User's Manual
Figure 4-4 Link video
64
User's Manual
Parameter Description
When there is recorded video that is stored on the device or platform
before the alarm is triggered, the platform will take the defined
duration of that video, and then add it to the alarm video.
● To link a PTZ action, click Link PTZ, and then select the PTZ channels and presets to be
linked.
● Click Alarm Output, select an alarm output channel, and then set duration.
● To link audio and light, click Link Audio and Light, select the audio and light channels,
and then select the action duration.
65
User's Manual
Figure 4-8 Link audio and light
● Click Link Access Control Device, select access control channels, and then select a
linked action.
● To play alarm video on the video wall, click Link Video Wall, select a camera on the left
of the page, and then select a video wall window on the right of the page.
Make sure that you have added decoders to the platform, configured video wall and set
alarm window.
● To execute an HTTP URL; command, click Link HTTP URL Command. Click Add, and
then configure its request method, HTTP URL, and remarks. You can click to test if
the command is valid.
● To link emails, enable Email, and click to add the email address, and then an email
will be sent to the selected email address when an alarm is triggered.
To configure the email template, select Add Email Template from the Email Template
drop-down list.
66
User's Manual
Figure 4-12 Email template
● Apply an alarm protocol to help users process alarms when they are triggered . Click
Alarm Protocol, and then select a protocol from the Protocol Template drop-down
list.
Click Add protocol template to create a new protocol; click to edit the content of
a protocol.
● To inform a user, click Notify User, and then select the user to be informed.
67
User's Manual
Figure 4-14 Notify user
Related Operations
● To edit an event, click .
● To delete an event, click .
● To disable an event, click .
4.2.1 Preparations
● Devices are deployed. For details, see device user's manuals.
● Basic configurations of the platform have been finished. For details, see "3 Basic Configurations".
● A map picture is prepared.
● To show device alarms on the map, make sure that Map flashes when alarm occurs is enabled
in Home > Management > Local Settings > Alarm.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Map.
Step 2 Select Main Map, and then click Add Map.
Step 3 Enter the map name, select the picture and then click OK.
68
User's Manual
Figure 4-15 Add main map
Related Operations
● Hide Device Name
Only display the icons of devices.
● Delete resources
To delete a device from the map, click it and then click Delete Device.
● Show device
Select which type of resources you want to display on the map.
● Move
To move a device, click Move and then drag the device on the map.
● Select
To select one or more devices, click Select, and then click the devices on the map one by one.
● Pane
To select devices in batches, you can click Pane, and then draw a frame on the devices to select
the device.
● Clear
To clear all markings on the map, click Clear.
● Add Sub-map
To add a sub map on the current map, click Add Sub Map, click on the map to locate it, enter a
name, upload a map picture and then click OK.
● Length
Select Box > Length, connect two points with a line on the map (double-click to finish drawing),
and then the distance between the points is shown.
● Area
Select Box > Area, select a region on the map (double-click to finish drawing), and then the area
is measured.
69
User's Manual
● Add Mark
Select Box > Add Mark, and then mark information on the map.
● Reset
Select Box > Reset to restore the map to its initial position and zoom level.
Step 3 Drag the device channel from the left device tree to the corresponding location of the
map.
70
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Personal and Vehicle Info.
Step 2 Click .
Step 3 Click .
71
User's Manual
Figure 4-19 Added person group (2)
Related Operations
● To delete a person group, select it, and then click . All permissions associated with the people
in the group will also be deleted.
● To rename a person group, select it, and then click .
● To move a person into a different group, select the person, and then click Move To.
To collect fingerprints or card number, connect a fingerprint collector or card reader first.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Personal and Vehicle Info.
Step 2 Click .
Step 3 Click Add.
Step 4 Click the Basic Info tab to configure person information.
1) Hover over the profile, and then click Upload to select a picture or click Snapshot to
take a photo.
72
User's Manual
Figure 4-20 Personnel information
Only certain devices support the second picture or snapshot. The second picture or
snapshot can be the person's face being blocked, such as wearing a mask or a hat.
Step 5 Click , and then set person details as required, including nickname, ID, address,
birthday, region, company, job title, and more.
Step 6 If the person is resident, Click next to Resident Info, and then bind room number.
● Room No.: The number of the apartment in which this person lives. The room number
is displayed in the access records and video intercom operation records. Access
permission of the corresponding VTO is also included when authorizing access control
permission to this person.
● Homeowner: When several people live in one apartment, you can set one of them as
the homeowner.
Step 7 Click the Authentication Info tab, and then set validity period and access control
information.
73
User's Manual
Figure 4-21 Authentication Info
1) Configure effective periods, within which the face, card, password, and fingerprint are
effective.
2) When access controllers are added and passwords are required to unlock the door,
configure the password first.
● A multi-factor authentication password must be used with a card, person ID, or
fingerprint to unlock the door. It is only applicable to second-generation access
control devices.
● Click and you can set up an unlock password that can be used to directly unlock
the door. It is only applicable to first-generation access control devices.
Step 8 Issue cards to personnel.
One person can have up to 5 cards. There are two ways to issue cards: by entering card No.
or by a card reader. A card number is 8-16 numbers. Only second-generation access
control devices support 16-digit card numbers. When a card number is less than 8
numbers, the system will automatically add zeros prior to the number to make it 8 digits.
For example, if the provided number is 8004, it will become 00008004. If there are 9-16
numbers, the system will not add zero to it.
● Issue a card through a card issuer or a device with a card reader.
1. Click next to Card, select a card issuer or a reader of a device, and then click
OK.
74
User's Manual
Figure 4-22 Card reader manager
2. Click , swipe a card on the device you select, the card number will be recognized
and displayed.
3. Click .
● Manually enter the card number.
Click , enter card number, and then click .
75
User's Manual
Step 9 Collect fingerprint.
To open door with fingerprint, you need to collect personnel fingerprints. A person can
have up to 3 fingerprints.
1) Click next to Fingerprint.
2) Click Add.
3) Select a fingerprint collector from the Fingerprint Collector drop-down list, and then
click OK.
4) Click Add
76
User's Manual
Add vehicle information to a person, so as to enable vehicle access permission for this
person.
Step 11 If the person needs access control permission, enable the permission first.
1) Click next to Access Control Permission.
2) Select Access Type, and select Allow Device Login check box as needed.
● Allow Device Login: People have permission to go into web page from the device.
● Select General if it is the first time for the person to use the card to unlock the door.
3) Click Add, and then select access control permission group. For details, see "4.4.1.1
Creating Face Comparison Group".
77
User's Manual
Figure 4-27 Face comparison
To delete a person, you can select the person, and then click ; to delete all people on
this page, select the Select All check box, and then click Delete.
Related Operations
● To edit basic information of a person, select the person, and then click .
● To delete a person:
◇ Click to delete a person and associated permissions.
◇ Select multiple people, and then click Delete to delete them and their permissions.
◇ Click Delete All to delete all the people and their permissions in the group.
● To view authorization exception, click .
● To search for a person, enter key words in the .
To quickly add a number of personnel, you can download a personnel template, fill in it and then
78
User's Manual
import it to the platform. You can also import an existing personnel file.
Prerequisites
Prepare an .xlsx file that includes the information of the people you want to import, their face images
(optional), and then compress them into a zip file. The .xlsx file can include information of up to
5,000 people. The zip file cannot be larger than 1 GB.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Personal and Vehicle Info.
Step 2 Click .
Step 3 Select Import > Import from File.
If there is no personnel information file, click Template Download and follow the
instructions on the page to create personnel information.
Step 5 Click OK.
The following cases might occur during an import:
● If there are failures, you can download the failures list to view details.
● Read carefully the instructions in the template to make sure all the information is
correct.
● Cannot read the contents with a parsing error reported directly.
Related Operations
● Export personnel information.
Select an organization, click Export, and then follow the instructions on the page to save the
exported information to a local disk.
● Download template.
To add personnel information in batches, you can download the template, fill in the information,
and then import it.
79
User's Manual
When personnel information has been configured on access control devices or door stations, you
can directly synchronize the information to the platform.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Personal and Vehicle Info.
Step 2 Click .
Step 3 Click Import, and then select Import from Device.
Step 4 Click , select a channel from an access control device or door station, and then click OK.
80
User's Manual
Figure 4-31 Extract task list
● To add all the personnel information to the platform, click Import All.
● To add part of the information, select the people of interest, and then click Import
81
User's Manual
selected.
● To export information, select the people you want, and then click Export.
82
User's Manual
Figure 4-34 Enter card number
1) Double-click the Card No. input boxes to enter card numbers one by one.
2) Click OK.
● By using a card reader
1) Click .
2) Select a card reader or device, and then click OK.
83
User's Manual
Figure 4-35 Reader manager
3) Select people one by one and swipe cards respectively until everyone has a card
number.
4) Click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Personal and Vehicle Info..
Step 2 Click .
Step 3 Click Add to add vehicle information.
84
User's Manual
Figure 4-36 Add vehicle information
If the owner has more vehicles than the set parking spots, once no parking spots
available, owner cannot access the parking lot.
4. Click to enable Vehicle Arming Group, and then click Add to arm the
vehicles you have just added.
For arming group details, see "4.4.2.1 Creating Vehicle Arming Group".
● Add vehicles in batches
1. Click Import at the top, and then click Template Download.
85
User's Manual
Figure 4-37 Download template
2. Fill in the template, and then select Import > Import File. Click to select the file and
import.
The platform supports downloading files that failed to import for you to check and
fix.
Step 4 Click OK.
Step 5 (Optional) You can export vehicle information to local storage as needed.
● Click Export and then enter required information, such as passwords for login and
encryption, to export all the items.
● Select vehicles, and then click Export to export only the selected information.
86
User's Manual
Related Operations
● You can search vehicles by entering keywords in search box at the upper-right corner.
● Click or double-click the column to edit the vehicle information.
● Click to delete vehicles one by one. You can also select multiple vehicles and then click
Delete at the top to delete in batches.
Prerequisites
● Make sure that the devices for face recognition have been successfully configured onto the
Platform.
● Make sure that the basic configuration of the Platform has completed. For details, see "3 Basic
Configurations". During the configuration, you need to pay attention to following parts.
◇ When adding devices on the Device page, set the Device Category to Encoder.
87
User's Manual
Figure 4-39 Device category
◇ When adding devices like NVR or IVSS which support face recognition, set the device feature
to Face Recognition. For details, see "3.2.2.5 Editing Devices".
◇ Make sure that you have configured at least one disk with the type of Images and Files to
store face images. Otherwise, the snapshots cannot be displayed.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Watch List.
Step 2 Click , and then click Add at the upper-left corner to add face comparison group.
88
User's Manual
Figure 4-41 Add face comparison group
Related Operations
● You can search groups by entering key words in the search box at the upper-right corner.
● Click to edit the group.
● Click to delete the group.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Watch List.
Step 2 Click , and then double-click the created group to add people.
Step 3 Click Add at the upper-left corner, enter required information and then click OK to add
faces into the group or click Add and Continue to add more people.
● Enter basic information of the person such as ID (required and unique), name, gender
and more.
● Move your mouse to the image section, click Upload to select an image from local
storage. You can also click Snapshot to take a face photo on the spot if your PC
supports camera function.
◇ You can configure the capture parameters on the Snapshot page, such as camera,
resolution and more. The configurations are only effective for the current client.
◇ Certain devices support two face images for more accurate recognition. means
no uploaded face image and means uploaded.
89
User's Manual
Figure 4-42 Add a person
Step 4 Click to display and enter the Expanded Info, including nickname (display in VTO
contact), address, ID type and more.
Step 5 Click OK.
● Click at the bottom of the created group to add people one by one.
● Click at the bottom of the created group to add multiple people at the same time.
Related Operations
● You can search faces by entering key words in the search box at the upper-right corner.
● Click to edit the person information.
● Click to delete person from the group and face library one by one.
● Click to remove person from the group but keep it in the face library. You can also select
multiple people and then click Remove at the top to remove in batches.
90
User's Manual
Figure 4-43 Send face comparison group
Step 4 After the face watch list is successfully sent, click Next Step.
Step 5 Click Add, select the channels you want to arm, and then configure the similarity for each
channel.
91
User's Manual
When the similarity between the face captured by the channel and a face in the face watch
list reaches or is greater than the defined value, it is considered a match.
92
User's Manual
Figure 4-45 Add a vehicle arming group
Related Operations
● You can search groups by entering key words in the search box at the upper-right corner.
● Click to edit the group.
● Click to delete groups one by one. You can also select multiple groups and then click Delete
at the top to delete in batches.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Watch List.
Step 2 Click .
Step 3 Click of a group, or double-click a group, an then click Select from Vehicle List.
Step 4 Select the vehicles you want to add, and then click OK.
Related Operations
● You can search vehicles inside a group by setting search conditions on the left.
● Click to edit the information of a vehicle.
● Click to remove vehicles from the group but keep it in the vehicle list. You can also select
multiple vehicles, and then click Remove to remove them in batches.
● Click Operation at the upper-right corner to select what vehicle information to be displayed.
93
User's Manual
time. Once matched vehicles are detected, an alarm is triggered and reported to the Platform.
Log in to the DSS Client. On the Home page, click , and then arm the vehicle on the Event page.
Click Add. For how to configure events, see "4.1 Configuring Events".
4.5.1 Preparations
Make sure that the following preparations have been made:
● Access control devices are correctly deployed. For details, see the corresponding user’s manual of
the device.
● Basic configurations of the platform have been finished. See "3 Basic Configurations" for details.
◇ When adding access control devices, select Access Control for device category.
◇ (Optional) On the Bind Resource page, bind video channels for access control channels.
◇ Personnel information is added correctly. For details, see "4.3 Personnel and Vehicle
Information Management".
94
User's Manual
Step 2 Click .
Step 3 Create a door group.
1) Click Add at the upper-left corner, or the Add Door Group tab.
2) Enter the group name, select a time template and a holiday schedule, select a device
channel, and then click OK.
After the time template and device channel are selected, the permission assigned to
personnel is valid only for period of the selected time template of the selected device
channel.
Step 4 Authorize.
1) On the Access Permission Group page, select a door group, and then click the
corresponding icon.
2) Select personnel, and then click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Access Control.
Step 2 Click .
Step 3 Create an access permission group.
1) Click Add at the upper-left corner.
95
User's Manual
Figure 4-48 Add an access permission group
2) Enter the group name, and then select the door groups as needed.
3) Click Save and Add Person.
96
User's Manual
Figure 4-49 Add a person
4) Enter the information from different sections. See "4.3.1.2.1 Adding a Person" for
details.
5) Click Add and Continue, and then click OK.
Related Operations
● Enter keywords in the search box at the upper-right corner, and then press the Enter key to
search for the groups you want.
● Double-click a group, and then click Add to add people. You can also click or to add
people to a group.
● Click to edit the name, door groups, and remarks of a group.
● Click to delete a group; select the groups as needed, and then click Delete to delete them all.
97
User's Manual
Only second-generation access control devices and video intercom devices support this function.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Access Control.
Step 2 Click .
Step 3 Click Add, enter a name and a password, and then select the access control channels and
video intercom devices as needed.
4.5.5 Anti-passback
The anti-passback feature requires a person to enter and exit from the specific doors. For the same
person, an entry record must pair with an exit record. If someone has entered by tailing someone
else, which means there is no entry record, this person cannot unlock the door to exit.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Access Control.
Step 2 On the Access Control page, click .
Step 3 Click the Anti-passback tab.
Step 4 Click Add.
Step 5 Configure the parameters, and then click OK.
98
User's Manual
Figure 4-51 Anti-passback parameters
99
User's Manual
Step 4 Enter the template name, set time periods, and then click OK.
There are two ways to set time periods:
● Drag your mouse cursor on the time bars to select time sections. To remove a selected
time section, click on the time bar and drag.
● Click , and then set time periods in the Period Setup dialog box.
100
User's Manual
Figure 4-53 Add a holiday schedule
101
User's Manual
Figure 4-54 Select an access control device
102
User's Manual
Figure 4-55 Door configuration
The page is only for reference, and might vary with different access control devices.
103
User's Manual
Parameter Description
Sets up for how long the door will unlock. The door locks automatically
Unlock Duration
after the duration.
Unlock duration exceeding the Unlock timeout triggers a timeout
Unlock Timeout
alarm.
You can use any one of the methods, card, fingerprint, face, and
password, or their combinations to unlock the door.
● Select And, and select unlock methods. You can only open the
door using all the selected unlock methods.
Unlock Method ● Select Or and select unlock methods. You can open the door in
one of the ways that you configured.
● Select Unlock by period and select unlock mode for each time
period. The door can only be opened by the selected method(s)
within the defined period.
4.6.1 Preparations
Make sure that the following preparations have been made:
● Access control devices are correctly deployed. For details, see the corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure, see "3 Basic
Configurations".
◇ When adding video intercom devices on the Device page, select Video Intercom as the
device category.
◇ When adding access control devices that support intercom, select Device Category to
Access Control in Login Information, and then select Door Station access Controller or
Fence Station Access Controller according to the type of your device.
Click on the page of call group, management group or relation group, the system will restore
management group and relation group to their original status.
104
User's Manual
● Add VTOs and access control devices that support intercom, and then a device group will be
automatically generated. Add VTHs from the same unit into the group, and realize mutual call
between VTH and VTO within the group.
● Add second confirmation stations and automatically generate a call group. Add them to the
group together with the VTHs of the same room, and realize mutual call between VTHs and
second confirmation stations within the group.
● Add fence stations and automatically generate a call group. Add all the VTHs into the group to
realize mutual call between fence stations and all the VTHs.
● Add VTHs. If the VTHs are connected to unit VTO, second confirmation station, fence station, they
will be automatically added to the call group, and realize mutual call among unit VTOs, second
confirmation stations and fence stations.
VTHs from different call groups can call each other only when there is a fence station is each
group.
Before configuring management group, you need to create users, select video intercom menu
permission and device permission, and add new users to the management group.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Video Intercom.
Step 2 Click .
Step 3 Click Manager Group Config.
Step 4 Click Add Group.
Step 5 Enter group name, select administrator account or VTS, and click OK.
The added management group is displayed in the list.
105
User's Manual
106
User's Manual
Step 4 Click Add.
Step 5 Enter a name, select call group and management group, and then click OK.
Added relation group is displayed in the list. If there are several relation groups, you can
click or to adjust priority level. When there is a call, the online administrators with
the highest priority will generate ring bell first.
This configuration must be the same as the device configurations. Otherwise, information
of the devices might be incorrect. For example, if only Building is enabled on a VTO, you
must only enable Building on the platform.
Step 4 Click Save.
107
User's Manual
page.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Video Intercom.
Step 2 Click .
Step 3 Select an organization node (VTO), and then click Send Contacts.
Step 4 Select one or more VTHs as needed, and then click OK.
Now you can view contacts on the VTO or web page.
Make sure that contacts are sent to the VTO; otherwise you cannot set private password.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Video Intercom.
Step 2 Click .
Step 3 Select a VTO, and then you can see all the VTHs linked to this VTO.
Step 4 Select a VTH and click , or select several VTHs and click Change Password.
Step 5 Enter password, and then click OK.
You can use the new password to unlock on the VTO.
The format should be room number + private password, and the room number consists
of 6 digits. For example, a person who lives in 1001 with the private password of the VTO in
the building being 123456, can enter 001001123456 to unlock the door.
Prerequisites
App users have registered by scanning the QR code on the platform or the VTH. For details, see the
user manual of the App.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Video Intercom.
Step 2 Click .
108
User's Manual
Operation Description
Click and enter a new password on the Reset Password page, and
then click OK.
Change APP user
login password ● The password must be 8 to 16 characters and must include numbers
and letters.
● Click to display password, or to mask password.
Click to delete App users one by one, or select multiple App users,
Delete APP user
click Delete, and then follow the instructions to delete the users.
4.7.1 Preparations
● Access control devices have been added into the platform.
● Basic configurations of the platform have been finished. To configure, see "3 Basic
Configurations".
109
User's Manual
Figure 4-58 Customize visitor pass remarks
4.8.1 Preparations
Make sure that the following preparations have been made:
● Devices, such as ANPR cameras, VTOs, barriers, are added to the platform.
110
User's Manual
● Basic configurations of the platform have been finished. To configure, see "3 Basic
Configurations".
◇ When adding an ANPR camera, select Access ANPR Device as the device category.
After you have added ANPR cameras, you can bind video channels to their channels. This is
useful when you have installed other cameras at the entrance to view and record videos of
the entire scene, not just the vehicle. You can view video from the bound camera when
checking the alarm details. For how to bind channels, see "3.2.3 Binding Resources".
◇ When adding an NVR, select Encoder as the device category.
◇ Select Entrance ANPR from Features for the corresponding NVR channels.
◇ When adding VTO, select Video Intercom as the device category.
Also, you need to add the information of people and assign them permissions so that they
can use the VTO normally. For details, see "4.3 Personnel and Vehicle Information
Management".
Make sure that the configuration of building and unit on the DSS client is the same as the
device. If building and unit are enabled on the platform, they must also be enabled on the
device, and vice versa. Otherwise, the VTO will be offline after being added. For details, see
"4.6.3 Configuring Building/Unit and Call Mode".
◇ Snapshots taken by ANPR cameras are stored in the Images and Files disks. You must
configure at least one Images and Files disk so that snapshots of vehicles can be normally
displayed. For details, see "3.4 Configuring Storage".
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Parking Lot > Parking Lot Configuration > Parking Lot Basic Config.
Step 2 Click the root node named Current Site, and then click Add.
Step 3 Configure the basic information of the parking lot, and then click Next Step.
111
User's Manual
Parameter Description
● First Character Rule
◇ 1 character added to the front of the plate number: It will
still be considered as a match when an additional
character is added to the plate number. For example,
AB12345 is recognized as AAB12345.
◇ Missing the first character of the plate number: It will still
be considered as a match when the first character is
missing from the plate number. For example, AB12345 is
recognized as B12345.
● Last Character Rule
◇ 1 character added to the end of the plate number: It will
still be considered as a match when an additional
character is added to the end of the plate number. For
example, AB12345 is recognized as AB123455.
◇ Missing the last character of the plate number: It will still
be considered as a match when the last character is
Fuzzy Match of Entrance & missing from the plate number. For example, AB12345 is
Exit Plate No. Snapshot recognized as AB1234.
● Misread Character Rule: It will still be considered as a match if
a character is recognized incorrectly, but the number of
characters are correct. For example, AB12345 is recognized as
AB12B45.
When you enable multiple rules, the platform will check if each
rule is satisfied. Only when one or more rules are satisfied will
platform consider it to be a match. For example, 1 character
added to the front of the plate number, and missing the first
character of the plate number are both enabled. When the plate
number AB12345 is recognized as AAB12345, it satisfied 1
character added to the front of the plate number, but not
missing the first character of the plate number. This will be
considered as a match. If the plate number AB12345 is
recognized as AB112345, it does not satisfy both rules. This will
not be considered as a match.
Auto overwrite when If a vehicle entered the parking lot but has not exited, a new
captured vehicle has not entry record will be generated when the vehicle is recognized to
existed have entered again.
Step 4 Configure the entrance and exit points, and then click Next Step.
112
User's Manual
5) If there is an exit point, click next to Exit, and then configure the parameters.
The parameters are similar to the ones in Entrance. For details, see the steps above.
Step 5 Configure the passing rules, and then click Save and Exit.
1) Select a vehicle entrance rule, and then configure the parameters.
113
User's Manual
Parameter Description
group can enter and exit through any entrance or exit.
By point: You can add different vehicle groups to different
entrance or exit points. For example, vehicle group is added to
East entrance but not South entrance, then the vehicles in the
group can only enter the parking lot through East entrance.
● Allow Passage When Available Space is 0: After enabled,
vehicles are allowed to enter the parking lot even if there are
no available parking space.
Click to enable this function for an entrance point.
All vehicles can enter the parking lot.
● Vehicles on the Blocklist to Enter: After enabled, vehicles on
the blocklist are also allowed to enter the parking lot.
● Registered Vehicles Access Rule
Click Add, and then select By Parking Lot or By Point.
By parking lot: The vehicle groups will be added to all entrance
All Vehicles
and exit points of the parking lot, and the vehicles in these
group can enter and exit through any entrance or exit.
By point: You can add different vehicle groups to different
entrance or exit points. For example, vehicle group is added to
East entrance but not South entrance, then the vehicles in the
group can only enter the parking lot through East entrance.
You can customize the passing rule for the entrance.
● For how to configure Registered Vehicles Access Rule and
Allow Passage When Available Space is 0, see the content
above.
● All Vehicles: Select a default time template or create a new
one, and then any vehicle can enter the parking lot within the
specified duration.
For how to create a new time template, see "3.2.5 Adding Time
Template".
Custom ● Open Barrier by Verification: After enabled, the access
permission of a vehicle must be verified, and then an
administrator can manually open the barrier for it. If Open
Barrier by Card Swiping After Verification is also enabled,
the driver can swipe a card, and then the barrier will
automatically open if the can verify the driver to be the owner
of the vehicle.
● Open Barrier by Card Swiping Without Verification: The
barrier will automatically open if the card has access
permission.
114
User's Manual
Parameter Description
For how to configure vehicle groups, see "4.8.3 Managing Vehicle Group".
2) Select a vehicle exit rule, and then configure the parameters.
The parameters are similar to the ones in the entrance. See the previous step.
3) Enable Send Plate No. to Devices, and then add vehicle groups to the allowlist and
blocklist.
Devices can use this information to determine which vehicles to let in when the
platform is offline.
Related Operations
● : Edit the passing rules of the parking lot.
● : Edit the available parking space of the parking lot.
● : Edit the information of the parking lot.
● : Delete the parking lot.
Blocklist alarm will not be displayed because there are no additional parameters to be
configured.
Step 4 Click to configure an event.
115
User's Manual
Table 4-9 Parameter description
Parameter Description
● Overtime Parking Threshold: The unit is minute. Alarm
will be triggered if a vehicle has parked for longer than the
defined value.
● Detection Interval: How long the platform will check which
vehicles have parked overtime. For example, select 5
minutes, then the platform will check whether there are
vehicles that have parked overtime in the parking lot. If yes,
then an alarm will be triggered.
● Vehicles to Trigger Alarms:
◇ All Vehicles: All vehicles will trigger alarms if they park
overtime, but VIP vehicles are not included. If you enable
Include VIP Vehicles, VIP vehicles will also trigger
Parking Overtime alarms when they park overtime.
◇ Non-registered Vehicle and Vehicle in the Blocklist:
The vehicles whose information is not registered to the
platform will trigger alarms when they park overtime.
◇ Custom: Enable Non-registered Vehicle, and then the
vehicles whose information is not registered to the
platform will trigger alarms when they park overtime;
enable Registered Vehicle and add vehicle groups, and
then the vehicles in these groups will trigger alarms
when they park overtime.
116
User's Manual
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config section,
select Parking Lot > Vehicle Groups.
Step 2 Click Add.
Step 3 Enter a name and select a color for the group, and then click Add.
Step 4 Click of a group, or double-click a group and click Select from Vehicle List, select the
vehicles that you want to add to the group, and then click OK.
117
User's Manual
Table 4-10 Parameter description
Parameter Description
People Counting Group
Name of the people counting group.
Name
Calibration Time The number of the people in this group will be reset to the
defined value at the defined time every day. The defined time
Calibrated Number of People also means the start of a counting cycle.
When enabled, you can configure the red and yellow light
Limit Number of People
threshold of the people in the group.
When the number of people in the group reaches the defined
Red Light Threshold
value, the light will turn red.
When the number of people in the group reaches the defined
Yellow Light Threshold value but smaller than the red light value, the light will turn
yellow.
Select the devices whose people counting rules you want to
Rule include in the group, and then their data will be combined
together.
Step 4 Click Save.
118
User's Manual
Figure 4-62 Invalid email address, you must press Enter
119
User's Manual
5 Businesses Operation
120
User's Manual
This section only introduces viewing live video. For map live view, see "4.2 Configuring Map".
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring Center.
Step 2 Click .
Step 3 View real-time video.
You can view live video in the following ways:
● Double-click a channel or drag the channel from the device list on the left to one
window on the right.
121
User's Manual
● Double-click a device to view all channels under the device.
● Right-click a node, select Tour, and then set tour interval. The channels under this node
will play in turn according to the defined interval.
◇ If the number of splits in the window is more than the number of online channels,
video of all channels will be displayed in the window. Otherwise, click on
the top of the page to turn pages.
◇ Close the on-going tour before starting live view.
Step 4 You can perform the following operations during live view.
● Display intelligent snapshots.
When viewing live video of face detection cameras, face recognition cameras, ANPR
cameras, or target detection cameras, right-click the monitoring image, and then select
Start Picture Overlay. The snapshot will be displayed on the upper-right corner of the
live window. If no more images are captured, a snapshot will be displayed up to 5 s by
default, and it will disappear after 5 s.
Point to the live window, and then select type of images to be displayed.
● Point to the video window, and then you can see the shortcut menu on the upper-right
corner.
122
User's Manual
Figure 5-3 Live window
123
User's Manual
Figure 5-4 Wake up the device
◇ The device will regularly request to sleep to save battery. When you are viewing its
live video, the device will request to sleep every 2 minutes. When you are not
viewing its live video, the device will request to sleep every 1 minute. You can
accept or reject so that you can continue to watch live video. When rejecting the
request, you can choose whether to delay the next request from the device.
● Right-click the live video, and then the shortcut menu is displayed.
124
User's Manual
125
User's Manual
Parameters Description
● Real-Time Priority: The video is in real-time, but video quality
might be reduced.
● Fluency Priority: The video is fluent, but video lagging might
occur.
Play Mode
● Balance Priority: Real-time priority or fluency priority, depending
on actual conditions.
● Custom: Configure the video buffer time from Local Settings >
Video. The larger the value, the more stable the video quality.
Adjust the brightness, contrast, saturation, and chroma of the video
Video Adjustment
for video enhancement.
Click it, and then click and hold the video image to zoom in on the
Digital Zoom image. Right-click the image, and then select Digital Zoom again to
exit zooming in.
Divide one window into 2 (1+1 mode), 4 (1+3 mode), and 6 (1+5
mode). One window will play the real-time video, and the others play
different defined areas of the real-time video.
Window Mode
If a device supports target tracking, you can enable this function in
any window mode, the windows that play defined areas of the real-
time video will follow the target when detected, until it disappears.
The client does not show rule lines on the live video by default. If
needed, you can click AI Overlay and enable Rule Overlay and
Bounding Box Overlay, and then the live video shows rule lines if
AI Overlay
the AI detection rules are enabled on the device. This configuration is
effective with the current selected channel both in live view and
playback.
Enable SMD Overlay to show target bounding box over live video.
When SMD is enabled on the device, you can enable SMD Overlay
SMD Overlay for the device channel, and then the live video will display dynamic
target bounding boxes. This configuration is effective with the
current selected channel both in live view and playback.
For a camera that supports privacy masking of human face, you can
Disable Privacy Masking
disable the masking here to view the face image.
Alarm Output Control Turn on or turn off alarm output channels.
You can turn on or off the audio and light channels one by one or at
Audio and Light Control
the same time.
Add to Favorite You can add the active channel or all channels into Favorite.
When selecting open alarm linkage video In Preview (in live
window) from Local Settings > Alarm, then the video will be
displayed on the window which is set to alarm window. If multiple
alarms are triggered, the video linked to the latest alarm will be
Set as Alarm Window
opened. If the number of alarm windows is fewer than the number of
linkage videos, the video linked to the earliest-triggered alarm will be
opened. After enabling Set as Alarm Window, the window frame is
displayed in red.
126
User's Manual
Parameters Description
● If a channel supports electronic focus, you can enable electronic focus for it on the
platform to adjust video definition and size.
127
User's Manual
The page might vary according to the lens types of cameras. Lens types include
embedded zoom lens and external CS electronic lens. The following figure is for
reference only.
128
User's Manual
Figure 5-9 Start tour
129
User's Manual
To exit the Window Mode, right-click the window and then select .
130
User's Manual
● Remotely unlock the door.
When viewing the access control channel, you can remotely control the status of the
door on the upper-right corner: Normally open ( ), normally closed ( ), or normal
status ( ). You need to enter the login password of the current user before operation.
Restore the door to normal status first, and then the door can be opened and closed
according to defined period or through face recognition.
In the video window of the access control channel, you can remotely lock or unlock the
door.
● Video intercom.
When viewing the video intercom channel, you can answer or hang up the call.
131
User's Manual
Figure 5-13 Video intercom
5.1.2.2 View
The current layout and resources can be saved as a view for quick play next time. Views are
categorized into different groups, which include three levels: First-level root node, second-level
grouping and third-level view. Tour is supported for first-level root node and second-level grouping.
The tour time can be 10 s, 30 s, 1 min, 2 min, 5 min, 10 min, or customized (5 s–120 min). Up to 100
views can be created.
Views are categorized into different groups, convenient for management and quick use. Group
includes three levels, first-level root node, second-level grouping and third-level view.
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring Center.
Step 2 Click .
Step 3 Create a view group.
1) Click the View tab.
2) Right-click View, select New Folder.
132
User's Manual
and then click on the upper-right corner.
2) Enter a name for the view, select a view group it belongs to, and then click OK.
● Live view
On the Monitoring Center page, select a view, double-click or drag it to the window to start
viewing.
● Tour
On the Monitoring Center page, right-click view group or root node, select Tour and tour
period.
133
User's Manual
Figure 5-15 Go to video tour page
5.1.2.3 Favorites
Add frequently used channels to favorites to realize quick search and call.
134
User's Manual
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring Center.
Step 2 Click .
Step 3 Create favorites.
1) Click .
2) Right-click root node or created favorites, and then select New Folder.
3) Enter a folder name, click OK.
Lower-level favorites are generated under the selected root node or favorites.
4) Click .
The system goes back to the device list.
Step 4 Add channels to favorites.
● In the device list, right-click a channel, and then select Add to Favorite.
● Right-click the window with live video, and then select Add to Favorite.
● Live view
On Monitoring Center page, click , open favorites list, select favorites or channels, double-
click or drag to video window and the system starts to play live video.
● Tour
On Monitoring Center page, click , open favorites list, select the root node or favorites, select
Tour and then set duration. The system starts to play the channels in tour.
◇ To view remaining time of a channel during tour, click .
◇ To pause, click .
◇ To exit tour play, click .
5.1.2.4 PTZ
Operate PTZ cameras during live view on the DSS Client.
A preset is a set of parameters involving PTZ direction and focus. By calling a preset, you can quickly
135
User's Manual
rotate the camera to the pre-defined position.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Step 3 Click .
Step 4 Add a preset.
1) Rotate the PTZ camera to a specific point.
2) Click , enter the preset name, and then click .
Related Operations
Call a preset: Click of a specific preset, and then camera will rotate to the related position.
Set Tour to enable an camera to go back and forth among different presets. Set tour to enable
camera to automatically go back and forth between different presets.
Prerequisites
You have added at least 2 presets.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
136
User's Manual
Figure 5-19 Go to PTZ control panel
Step 3 Click .
Step 4 Click .
Step 5 Add tours.
1) Enter tour name, and click .
2) Select a preset from the drop-down list on the left.
3) Repeat the previous 2 steps to add more presets.
4) Click OK.
Related Operations
To start tour, click , then camera goes back and forth among the presets.
A pattern is a record of a consecutive series of PTZ operations. You can select a pattern to repeat the
corresponding operations quickly. See pattern configuration instructions as follows.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
137
User's Manual
Figure 5-20 Go to PTZ control panel
Step 3 Click .
Step 4 Click , and then operate the 8 PTZ buttons of PTZ to set pattern.
Step 5 Click .
Related Operations
Call pattern: Click , and then the camera will automatically repeat the pattern that you have
configured.
138
User's Manual
Figure 5-21 Go to PTZ control panel
Step 3 Click .
Step 4 Click PTZ button, and rotate PTZ to the left to a position, and then click to set the left
boundary.
Step 5 Continue to rotate PTZ to the right to a position, and then click to set the right
boundary.
Step 6 Click to start scanning, then PTZ will rotate back and forth automatically within the
two boundaries.
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click . PTZ
rotates 360° at a specified speed. Click to stop camera rotation.
Enable/disable the PTZ camera wiper. Make sure that the camera supports wiper function.
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click to
turn on wiper. Click to turn off wiper.
Turn on/off camera light . Make sure that the camera supports light.
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click to
turn on light. After enabling light, click to turn off light.
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
139
User's Manual
Step 2 Click .
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
140
User's Manual
Figure 5-24 Go to PTZ control panel
Step 3 Click .
Step 4 Click .
Step 5 Use the panel to go to the menu configuration page.
141
User's Manual
Parameters Description
/ Left/right. Point to set parameters.
Click to enable PTZ menu function. System displays main menu on the
monitor window.
Click to close PTZ menu function.
It is the confirm button. It has the following functions.
● If the main menu has the sub-menu, click OK to enter the sub-menu.
OK
● Point to Back and then click OK to go to go back to the previous menu.
● Point to Exit and then click OK to exit the menu.
Point to Camera and then click OK to enter camera settings sub-menu page.
Camera Set camera parameters. It includes picture, exposure, backlight, day/night
mode, focus and zoom, defog, and default.
Point to PTZ and then click OK to go to PTZ sub-menu page. Set PTZ functions.
PTZ
It includes preset, tour, scan, pattern, rotation, PTZ restart, and more.
Point to System and then click OK to go to system sub-menu page. Set PTZ
System simulator, restore camera default settings, video camera software version and
PTZ version.
Return Point to the Return and then click OK to go back to the previous menu.
Exit Point to the Exit and then click OK to exit PTZ menu.
5.1.2.5.1 Preparations
142
User's Manual
Figure 5-26 Set fisheye camera features
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring Center.
Step 2 Click .
Step 3 In the device tree on the left, right-click a fisheye camera, and then select Modify Smart
Track.
Step 4 Click next to Please select a PTZ camera to link, and then select a PTZ camera.
Step 5 Click and then move the of the fisheye on the left to select a position. Click of
the PTZ camera to find the position. Adjust the PTZ camera to find the position and move
the PTZ to the center position (The green cross on the image).
143
User's Manual
Figure 5-28 Set smart track rules (2)
Step 1 Log in to the DSS Client. On the Monitoring Center page, select the fisheye camera on the
device tree and then right-click to select Smart Track.
144
User's Manual
Figure 5-29 Select a smart track channel
Step 2 Click any point on the left of fisheye, PTZ camera on the right will automatically rotate to
corresponding position.
5.1.3 Playback
Play back recorded videos.
145
User's Manual
Icon Description
Cut video
Download video
Lock records.
146
User's Manual
147
User's Manual
148
User's Manual
Parameters Description
Enable SMD Overlay to show target bounding box over live video.
When SMD is enabled on the device, you can enable SMD Overlay
SMD Overlay for the device channel, and then the live video will display dynamic
target bounding boxes. This configuration is effective with the
current selected channel both in live view and playback.
For a camera that supports privacy masking of human face, you can
Disable Privacy Masking
disable the masking here to view the face image.
Play the video of the current channel on video wall. Make sure that
Playback on Video Wall
video wall is configured (see "5.1.5 Video Wall").
When selecting open alarm linkage video In Preview(in live window)
from Local Settings > Alarm, then the video will be displayed on the
window which is set to alarm window. If multiple alarms are
triggered, the video linked to the latest alarm will be opened. If the
Set as Alarm Window
number of alarm windows is fewer than the number of linkage
videos, the video linked to the earliest-triggered alarm will be
opened. After enabling Set as Alarm Window, the window frame is
displayed in red.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring
Center.
Step 2 Click the Playback tab.
Step 3 Select a channel from the device tree, and then double-click it, or drag it to the window.
Step 4 Select the storage path of recorded video from , and then click to
select the date.
The search results are displayed.
149
User's Manual
Step 5 Select a window that has recorded video, and then click on the bottom of the page,
and then click on the timeline to mark the start point and end point of the video clip you
need.
Step 6 Confirm the start and end time, and then click OK.
150
User's Manual
Related Operations
Click on the lower-right corner, and then all the recordings locked by the user currently logged
in to the client are displayed. Double-click one to quickly play the recording.
Step 5 Point to the window that is playing record, and then click .
Step 6 Name the tag, and then click OK.
151
User's Manual
Figure 5-37 Filter record type
152
User's Manual
153
User's Manual
Step 8 (Optional) Enable Transcode, and then select the file format.
Step 9 Click OK.
Step 5 Select a window that has videos, click , and then select a type.
The smart search page is displayed, with 22 × 18 squares in the window.
154
User's Manual
Figure 5-41 Smart search
● Select a detection area: Point to image, click and drag to select a square.
● For the selected area, click again or select square to cancel it.
Step 7 Click to start smart search analysis.
● If there are search results, the time progress bar will become purple and display
dynamic frame.
● It will prompt that the device does not support smart search if the device you selected
does not support the function.
Prerequisites
Make sure that you have configured a map. For details, see "4.2 Configuring Map".
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select > Monitoring Center.
155
User's Manual
Step 2 Click .
Step 3 In the map list, click a map.
Step 4 Click a device on the map, and then you can view video, cancel alarms, view longitude and
latitude, and more.
Related Operations
There might be differences between the actions supported by different devices and map types.
● Hide Device Name
Only display the icons of devices.
● View live video
Click Pane, select devices on the map, and then click to view videos in batches; or click
on the map, and then select to view videos.
● Playback
Click Pane, select devices on the map, and then click to view videos in batches; or click
on the map, and then select to view videos.
● Cancel alarms
Click a device on the map, and then select .
● Show devices
On a raster map, you can select to display video channels, access control channels, alarm input
channels, and defense zone alarms.
● Clear
To clear all markings on the map, click Clear.
● Add marks
Select Box > Add Mark, and then mark information on the map.
● Reset
Select Box > Reset to restore the map to its initial position and zoom level.
● Click to view the information of the sub map.
● Double-click , and then the platform will go to the sub map, where you can view the
resources on it.
156
User's Manual
Before using the video wall function, you should get familiar with what you can do on the video wall
page.
157
User's Manual
● Click Stay Duration (sec) or to define the for how long the
live video of the channel will be displayed during each tour.
● Click Stream or to change the video stream of the channel.
158
User's Manual
5.1.5.1.2 Preparations
159
User's Manual
● You can set whether to show ID in the screen, means that the screen ID is
disabled; click the icon and it becomes , which means that screen ID is
enabled.
● Each screen in a combined screen must be bound with a decoding channel.
Step 6 Click Finish.
Display videos on the wall manually or in accordance with the pre-defined configuration.
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
Step 2 In the Task drop-down list, select Add.
160
User's Manual
Figure 5-45 Add a video wall task
Step 3 From the device tree, select a camera, and then drag it to a screen, or select a window, drag
the camera to the Detail section.
If you do not close video wall display in advance, this action will delete the bound camera
and play the selected camera on the wall.
Step 4 Click .
If you have selected an existing task in the Task drop-down list, after dragging the video
channel to the window, click to save it as a new task, which will be played on the wall
immediately.
Step 5 Name the task, and then click OK.
● During video wall display of a task, if you have rebound the video channel, click to
start video wall display manual.
● During video wall display, click or to stop or start tour display.
Step 6 Click to start video wall display.
161
User's Manual
Figure 5-46 Set timed plan
Select the Enable This Timed Plan in Remaining Time check box, and then set the task.
The video wall displays the selected task during the remaining period.
Step 6 Click Save.
Step 7 Click to start the plan.
You cannot display multiple plans on the wall at the same time. When a plan is enabled,
the previous plan on the wall is automatically terminated.
● Modify plan: .
● Delete plan: .
162
User's Manual
Step 4 Enter task name, select a video task and then set stay time. Click Add.
Repeat this step to add more tasks.
163
User's Manual
You cannot display multiple plans on the wall at the same time. When a plan is enabled,
the previous plan on the wall is automatically terminated.
Make sure that decoder video ports are connected to the video wall screens.
Drag a camera to the video wall screen for instant display on the wall.
The video wall display task is configured. For details, see "5.1.5.1.4 Configuring Video Wall Display
Tasks".
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
Step 2 In the Video Wall drop-down list, select a video wall.
Step 3 Click to start video wall display.
Step 4 Drag a camera from the device tree to a screen, or select a window and drag the camera to
the Detail section.
164
User's Manual
Step 5 Select a screen, and then click Detail to view detailed information about the screen and
channel, including stream type, preset and display sequence.
● Click to view live video of the current channel on the lower left.
● Click to adjust sequence.
● Click to delete the video channel on the current window.
165
User's Manual
Make sure that there are pre-defined plans. For details, see "5.1.5.1.5 Configuring Video Wall Plans".
The video wall automatically works as the plans have been configured. To stop the current plan, click
on the upper-right corner of the Video Wall page, and then it changes to . Click to start
displaying video on wall again.
166
User's Manual
The alarm list is refreshed in real time. To stop refreshing, click Pause Refresh. To continue
receive alarms, click Start Refresh.
You can use the up and down arrow keys on the keyboard to quickly select other alarms.
1. Click or double-click the alarm.
2. The middle area displays the time when the alarm was triggered, name and location of
the alarm source, alarm type, and the live video images of linked channels, alarm
videos, and alarm snapshots.
Double-click a window to view them in larger size. Click to go back.
167
User's Manual
Figure 5-55 Alarm linkage media
3. On the right side, select how to process the alarm from Resolved, Ignore, or Forward.
Enter comments, and then click OK.
Forward allows you to forward the alarm to another user who will process it.
4. (Optional) Click to disarm the alarm. This alarm will not be triggered within the
defined period.
5. (Optional) Click to send the alarm information to other users as a prompt or an
email.
168
User's Manual
Step 2 Click .
Step 3 Set search conditions, and then click Search.
You can use the up and down arrow keys on the keyboard to quickly select other alarms.
5.3 DeepXplore
You can set multiple search conditions to view records of people, vehicle snapshots and access that
you are interested in.
169
User's Manual
Figure 5-58 Record search
Step 3 Set the search object, channel and time, and then click Search.
170
User's Manual
● Search object
◇ Face Capture: Search for records in face capture database.
◇ Body Capture: Search for records in body capture database.
◇ Person Archive: Search for records in person information database.
● Search type
◇ Search by Feature: Search for records by the defined features such as age, gender,
clothes color, ID and more.
◇ Search by Image: Search for records by the uploaded image, and only records
above the set Similarity will be displayed.
171
User's Manual
Step 3 Set the search object, type and conditions, and then click Search.
172
User's Manual
● Search object
◇ Vehicle Capture: Search for records in vehicle capture database.
◇ Vehicle Archive: Search for records in vehicle information database.
● Search type
◇ Search channel: Select device channels of the records by clicking Selected Channel.
◇ Search time: Select time period of the records from Today, Yesterday and This
Week.
173
User's Manual
● Click on the console page. The video page is displayed. Drag the access control channel on
the left side of the screen to the live view page on the right side. The system displays videos in
174
User's Manual
real time.
This section introduces the unlocking operations on DSS client. For unlocking by fingerprint, card,
and face recognition, you can operate on devices. If advance functions are configured, unlock doors
according to the requirements of advance functions.
There are the following ways to unlock door:
● On the left side of the page, right-click an access control channel in the device list, and select
Remote Unlock in the pop-up menu. After unlocking, the door status in the access control
channel list on the right side of the page changes to open, as .
● Click of a door channel on the right to unlock the door.
● When viewing videos bound to the channel, click on the video page to unlock the door.
175
User's Manual
Figure 5-66 Unlock door
Click to restore the door from the Always Open or Always Closed status before the
scheduled door control or face-recognition access control takes effect.
176
User's Manual
Step 1 Click on the lower left of the console page of the Access Control Console module.
Step 2 Select an access control channel to be set to Always Close via global control, and click OK.
Step 3 Click at lower-left of the page, and then click OK.
Click to restore the door from the Always Open or Always Closed status before the
scheduled door control or face-recognition access control takes effect.
● Live view is only available when a video channel is bound to the access control channel. To bind
video channels, see "3.2.3 Binding Resources".
● To see snapshots and videos of access control, you need to configure video linkage action for the
access control channels. For details, see "4.1 Configuring Events".
● Details except locking door are displayed on the console, such as unlocking door, entry with the
duress card, and no right.
Step 1 In the event list below the console page, click next to the event records.
177
User's Manual
For a face recognition controller, the face snapshots will be displayed in the records; for
other controllers, the records display the captured image and person profile.
178
User's Manual
Step 2 Set search conditions, and then click Search.
The access control records stored in the device when it was disconnected from the platform. After
the device gets reconnected to the platform, you can retrieve the records generated during the
disconnection.
Step 1 Log in to the DSS Client. On the Home page, click > Access Management > >
Access Control Record.
Step 2 Click at the upper-left corner.
179
User's Manual
Figure 5-69 Extract records during disconnection
180
User's Manual
configuration page.
181
User's Manual
Figure 5-71 Call
● Call from the platform to an access control device that supports video intercom
Select a device from the device list, click on it or dial its number on the right (such
as 1#1#101). The system pops up the dialog box of Calling now, please wait…. There
are two modes for answering the call.
◇ Answer by the device, bidirectional talk between client and the device. Press
182
User's Manual
to hang up when you answer the call.
◇ If the device fails to answer over 30 s, busy or hang up directly, then it means the
call is busy.
183
User's Manual
● When an access control device that supports video intercom is calling the platform
The client pops out the dialog box. Click to talk with the device.
Click to hang up.
Figure 5-75 Call from an access control device that supports video intercom
184
User's Manual
Step 3 Click Export and the records will be saved locally according to system prompt.
5.4.3.1 Preparations
● You have configured the deployment of the video intercom devices, access control devices and
entrance and exit device. For details, see the corresponding user's manual.
● You have configured the basic configuration of the platform. For details, see "3 Basic
185
User's Manual
Configurations".
● Make sure that you have configured the visitor configuration before application. For details, see
"4.7 Visitor Management". You can also click to go to the video intercom
configuration page.
5.4.3.2 Checking In
When a visitor with an appointment arrives, you need to confirm their information and give them
access permission. On-site registration is supported when there is a walk-in visitor. Visitors can get
access by card swipe or face recognition.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Access Management > >
Visitor Management.
Step 2 Click Visit Registration, and then enter the information of the visitor.
Step 3 (Optional) Click the Authentication tab, and then set authorization information.
1) Select the room number.
2) Issue cards.
You can issue cards by entering card number manually or by using a card reader. A card
number is 8-16 numbers. Only second-generation access control devices support 16-
digit card numbers. When a card number is less than 8 numbers, the system will
automatically add zeros prior to the number to make it 8 digits. For example, if the
provided number is 8004, it will become 00008004. If there are 9-16 numbers, the
system will not add zero to it.
● Issue cards by entering card numbers manually
Click Add next to Card, enter the card number, and then click OK.
186
User's Manual
Figure 5-79 Issue card
3) Set face picture. Position your face in the snapshot area, and click Upload Picture to
select a picture or click Snapshot to take a photo.
187
User's Manual
You can click to download the QR code, and click to send it to the visitor by
email.
Step 4 Click the Authorize tab, and then select access permissions for the visitor.
If you want to set video intercom devices and entrance and exit permissions, you must set
host room number and number plate for the visitor.
188
User's Manual
Related Operations
● End visit.
Click to end a visit.
● View card swiping records.
Click the Card-swiping Record tab, or click in visitor record to view visitor card swiping
records.
In addition to entering the card number, you can also click , select a card reader and
then get the card number by swiping card.
Step 3 Click to view visitor details and card swiping records.
189
User's Manual
Figure 5-84 Monitor entrances and exits
190
User's Manual
Click Show More and you can search by vehicle owner, company, person group, and more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Forced exit.
If No is displayed under Already Exited when the vehicle has exited, click to
change the status to Yes.
● Export records.
Select the records to be exported, click Export, and then export them according to the
on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
● Click and then select the items to be displayed.
Click Show More and you can search by vehicle owner, company, person group, and more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
191
User's Manual
For the dual camera mode, click each channel to view the information it captured.
● Export records.
Select the records to be exported, click Export, and then export them according to the
on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
● Click and then select the items to be displayed.
Click Show More and you can search by vehicle owner, company, person group, and more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Export records.
Select the records to be exported, click Export, and then export them according to the
on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
● Click and then select the items to be displayed.
Click Show More and you can search by vehicle owner, company, person group, and more.
Step 4 Mange records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Restore entry
192
User's Manual
If Yes is displayed under Exited when the vehicle is still in the parking lot, click to
change the status to No.
● Export records.
Select the records to be exported, click Export, and then export them according to the
on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
● Click and then select the items to be displayed.
193
User's Manual
Figure 5-85 Real-time count
Step 3 Hover you mouse on the window displaying real-time data, and then click .
Step 4 You can enter a number of people to overwrite the current data, and customize the
content to be displayed for green, yellow and red light.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Intelligent Analysis > >
Historical Count.
Step 2 Select the groups you want in Groups, or select the channels in Resources.
194
User's Manual
Step 3 Configure the search settings, and then click Search.
● Groups: Groups are people counting groups, which allow you to combine and
calculate the people flow data from multiple rules across different devices and
channels. You can search for historical people flow data from one or more people
counting groups.
● Resources: Search for historical people flow data from one or more channels. The data
from all the rules of a channel will be included.
Related Operations
● : Change the display format of the data.
195
User's Manual
You can generate a heat map with data from up to one week.
● Generate a general heat map.
Configure the time, and then click Search.
● Generate an advanced heat map.
1) Select how you want to generate the heat map, Number of People or Time.
2) Configure the threshold.
● When you select Number of People, the area with the closest number of people to
the threshold will be in red.
● When you select Time, the area where people stay for a duration closest to the
threshold will be in red.
3) Set the time, and then click Search.
Step 3 Click Export on the upper-right corner to export the heat map to your PC.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Intelligent Analysis > .
Step 2 Select a channel and configure the search settings, and then click Search.
Related Operations
● : Change the display format of the data.
● Export: Export the data to your PC.
196
User's Manual
6 General Application
This chapter introduces the general businesses, including target detection, face recognition, and
ANPR.
Target detection can be done by video metadata cameras + a platform, or IPCs + IVSSs + platform.
6.1.2 Preparations
Make sure the following preparations have been completed:
● Cameras and IVSS are correctly deployed, and video metadata is enabled on them. For details,
see corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure the parameters, see "3 Basic
197
User's Manual
Configurations".
◇ When adding a camera or IVSS, select Encoder for device category.
◇ After adding the camera or IVSS to the platform, select Target Detection from Features of
the device.
198
User's Manual
details, see "5.3 DeepXplore".
6.2 ANPR
View automatic number plate recognition in real time or search for records.
● Automatic number plate recognition
The platform displays vehicle snapshots and ANPR results in real time.
● Vehicle records
Search for vehicle records according to the filtering conditions you have set.
6.2.2 Preparations
Make sure that the following preparations have been made:
● ANPR cameras are added to the platform, and the ANPR function is configured. For details, see
corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure, see "3 Basic
Configurations".
◇ When adding an ITC camera, select ANPR for device category, and then select ANPR Device
for Device Type.
◇ ANPR snapshots are only stored on ANPR Picture disks. On the Storage page, configure at
199
User's Manual
least one ANPR Picture disk. Otherwise vehicle pictures cannot be viewed.
200
User's Manual
recognition results on the platform.
6.3.2 Preparations
Make sure that the following preparations have been made:
● Face recognition devices are correctly configured. For details, see corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure, see "3 Basic
Configurations".
◇ When adding face recognition devices, select Encoder for device category.
◇ After adding a face recognition NVR or IVSS, select Face Recognition for Features of the
201
User's Manual
corresponding channels.
◇ After adding face recognition cameras or face detection cameras, select Face Recognition or
Face Detection for Features.
◇ Face snapshots are stored in the Face/Alarm and Other Pictures disk. Configure at least one
local disk for picture storage. Otherwise, the platform cannot display snapshots.
Step 3 Click and then click to view live face recognition information.
Step 4 View live video, and human body, vehicle, and non-motor vehicle information.
● Click an event record to view event snapshots. You can play back the video of the
event. Different events support different operations.
● When playing back video, click to download the video to designated path.
● Click to play back the video before and after the snapshot.
● Click to refresh events; click to pause refreshing.
● Click to delete event information.
● Click to view the most recent events.
202
User's Manual
203
User's Manual
7 System Configurations
This chapter introduces system parameters configuration, license, service management and backup
and, restore.
7.1 License
The system controls channel and function availability through the license. User can buy a license
according to the channels and functions as needed.
License Types
● Trial
A trial license is limited in capacity and expires in 90 days.
● Paid
To acquire full control of the features and permanent use, you need to buy a formal license. After
activating the first paid license, if you want to increase your license capacity, you can buy more
license codes. For example, if you have 500 channels currently, you can buy another 500
channels. After activating the new 500 channels, you will have 1,000 channels in total.
● Unlicensed
Lack permissions to use the system. This occurs after deactivating.
For expired trial version and unlicensed version, all modules are displayed as unauthorized, except
for the resources, license, tools, and management modules.
Activation Methods
● Normal online activation
When the platform server is connected to the Internet, it can connect to the license server, which
supports online license activation by verifying the activation code.
● Normal offline activation
When the platform server is on a local area network, it cannot connect to the license server. You
need to obtain the license file from a computer with Internet access, and then import the license
file to the platform to activate it.
204
User's Manual
Background Information
Select this method if your platform sever is connected to a network.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select License.
Step 2 In the Deactivate License section, click Online Deactivate License.
The license is reusable. We recommend copying the license code by clicking and then
saving it locally.
Step 3 Click Deactivate Now, and then follow the onscreen instructions to finish deactivation.
Background Information
Select this method if your platform server has no Internet access.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select License.
Step 2 In the Deactivate License section, click Offline Deactivate License.
205
User's Manual
Figure 7-2 Offline deactivation
Step 3 Click Export to export and save the license deactivation file locally.
After the license deactivation file is exported, the platform will become unauthorized, and
you cannot use any function.
Step 4 Move the request file to a computer with Internet access. On that computer, open the
system email that contains your license, and then click the attached URL go to the license
management page.
Step 5 Select DSS > Deactivate License.
Step 6 Upload the license request file obtained from Step3, and then follow on-screen
instructions to finish the process.
206
User's Manual
Step 3 Enable File Export or Download Password Authentication and Encrypt Exported File,
and then click Save.
● File Export or Download Password Authentication:
◇ You need to enter the password of the current account to export or download files.
◇ For all users that log in to the platform, they do not need to enter the password
when exporting or downloading files.
● Encrypt Exported File: When you use the exported file, you need to verify the
password.
Step 4 Add IP addresses to the HTTP and RSTP allowlist.
207
User's Manual
Figure 7-3 Enable time synchronization
● Scheduled Time Sync: Enable the function, enter the start time in time sync for each
day, and the interval.
● Sync Time When Device Comes Online: Syncs device time when the device goes online.
● NTP Time Sync: If there is an NTP server in the system, you can enable this function to
let the system enable time with the NTP server.
Step 3 Click Save.
Step 4 (Optional) Enable time synchronization on DSS Client.
1) Log in to the DSS Client, and then in the Management section, click Local Settings.
2) Click the General tab, select the check box next to Time Sync, and then click Save.
208
User's Manual
The system immediately synchronizes the time after you restart the client to keep the
time of the server and the PC client the same.
209
User's Manual
Figure 7-5 Set email server
210
User's Manual
Figure 7-6 Select a login mode
211
User's Manual
● Auto backup: In the Auto Backup section, configure backup parameters, and then click
OK. The Login Password is the same as the system user's. Create an Encryption
Password to protect the data. The platform automatically backs up data according to
the defined time and period. The backup path is the installation path of the platform
server by default.
212
User's Manual
Max Number of Backup Files means you can only save defined number of backup files
in the backup path.
● Stop users from using the platform before performing system restore.
● Restoring the system will change system data. Please be advised.
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select Backup and Restore.
Step 2 Click the Restore tab.
Step 3 Restore data.
● Restore from local backup file: In the Restore from Local Backup File section, select
the backup file path, click Restore Now, and then enter the passwords (the Password
is the same as the system user's. The Encryption Password is the one created when
the file was backed up).
213
User's Manual
Figure 7-10 Local restore
● Restore from backup file on the server: In the Restore from Backup File on the Server
section, click , enter the passwords (the Password is the same as the system user's.
The Encryption Password is the one created when the file was backed up), and then
click OK. After restoration, the platform will automatically restart.
214
User's Manual
8 Management
215
User's Manual
After the debug mode of a service is enabled, the service will generate a large amount of
logs that occupy more disk space. We recommend you disable the debug mode after you
have finish troubleshooting.
You need to verify your password by default before download. You can configure whether
to verify the password. For details, see "7.2.1 Configuring Security Parameters".
● Download a video by selecting a duration on the timeline.
Click the Timeline tab, and then select a period on the timeline.
You can also click Select All on the upper-left corner, and then you can select and
download the same period of all videos at the same time.
● Download a video by file.
Click the File tab, and then click of a file.
You can also select multiple files, and then click Download Selected File on the upper-
left corner to download them at the same time.
● Download a period of a video before and after a tag.
Click the Tag tab, click of the file you want to download.
You can also select multiple tags, and then click Download Selected Tagged File to
configure and download them at the same time.
Step 4 (Optional) Click , select the format of the video, and then click OK.
● Timeline: You can further adjust the start and end time of the duration.
● File: If you download multiple files at the same time, you cannot configure the formats
of the videos you want to save.
● Tag: You can configure how many seconds or minutes before and after the tag you
want to download.
216
User's Manual
confirm the time span, and then, if necessary, click to select a video format. Click OK.
Related Operations
● You can pause, resume, and delete a download task.
● After download completes, click to go to the path where the video is saved to, or click
in the prompt on the upper-right corner to play the video directly in Local Video. For details, see
"8.4 Playing Local Videos".
217
User's Manual
Figure 8-2 General parameters
218
User's Manual
Parameters Description
If enabled, the client starts to synchronize network time with the server
Time Sync
to complete time synchronization.
● If Remember Password has been selected on the Login page,
select Auto restart after reboot, and the system will skip the login
page and directly open the homepage after you restart the PC next
Auto run at startup time.
● If Remember Password is not selected on the Login page, select
Auto restart after reboot, the client login page will appear after
you restart the PC.
Enable the system to skip the login page and directly open the
homepage when logging in next time.
● If Remember Password and Auto Login have been selected on
the Login page, the function is already enabled.
● If Remember Password has been selected while Auto Login is not
Auto Login selected on the Login page, select Auto Login on the Basic page
to enable this function.
● If neither Remember Password nor Auto Login has been selected
on the Login page, select Auto Login on the Basic page and you
then to enter the password when logging in next time to enable
the function.
The user will be asked to confirm whether to open one more video
CPU Alarm Threshold
when the CPU usage exceeds the defined threshold.
Audio and video
transmission Encrypt all audio and video to ensure information security.
encryption
The client will be locked after the defined period and you cannot
perform any operation. Click Click to Unlock Client and verify the
password of the current account to unlock the client.
Auto Lock Client
Self-adaptive audio If enabled, the system automatically adapts to the device sampling
talk parameters frequency, sampling bit, and audio format for audio talk.
Step 3 Click Save.
219
User's Manual
Figure 8-3 Video parameters
Real-time Stream When the device and clients are properly connected to the
Acquisition Mode network, direct acquisition can reduce the use of the platform's
forwarding bandwidth. If too many clients are acquiring video
streams from a channel, acquisition might fail due to insufficient
performance of the device. Video streams will be forwarded to
clients by the platform.
220
User's Manual
Parameters Description
● Real-time Priority
The system might lower the image quality to avoid video lag.
● Fluency Priority
The system might lower the image quality and allow for lag
to ensure video fluency. The higher the image quality, the
lower the video fluency will be.
Play Mode ● Balance Priority
The system balances real-time priority and fluency priority
according to the actual server and network performance.
● Custom
The system adjusts video buffering and lowers the impact on
video quality caused by unstable network. The bigger the
value, the more stable the video quality will be.
Decoding Mode ● Software Decoding by CPU: All videos will be decoded by
the CPU. When you are viewing live videos from large
amount of channels, it will take up too much resources of the
CPU that affects other functions.
● Software Decoding by GPU: All videos will be decoded by
the GPU. The GPU is better at concurrent operation than the
CPU Threshold CPU. This configuration will free up resources of the CPU
significantly.
● Performance Mode (CPU First): All videos will be decoded
by the CPU first. When the resources of the CPU is taken up to
the defined threshold, the platform will use the GPU to
decode videos.
Display previous live view If selected, the system displays the last live view automatically
after restart after you restart the client.
Close videos being played
after long period of The system closes live view automatically after inactivity for a pre-
inactivity defined period of time. Supports up to 30 minutes.
Inactivity Time
Click on the live view page to play the video of the previous
period. The period can be user-defined. For example, if you set 30
Instant Playback Time
seconds, the system will play the video of the previous 30
seconds.
Select a default stream type when you play back recordings from
a device.
221
User's Manual
Parameters Description
If selected, when the playback stream is big due to high
Extract frames when playing
definition, certain frames will be skipped to guarantee fluency
back HD videos
and lower the pressure on decoding, bandwidth and forwarding.
Continuous Snapshot Set the number and interval between each snapshot.
Interval For example, if the Continuous Snapshot Interval is 10 seconds
and the Number of Continuous Snapshots is 4, when you right-
Number of Continuous click on the live/playback video and select Snapshot, 4 images
Snapshots will be taken every 10 seconds.
Step 3 Click Save.
222
User's Manual
Parameter Description
Set the default time interval between the channels for tour display.
Video Source For example, if 5 seconds is configured and you are touring 3 video
Play Duration channels, the live video image of each channel will be played 5 seconds
before switching to the next channel.
● Tour: Multiple video channels switch to decode in one window by
default.
Mode of Video
Decoding to Wall ● Tile: Video channels are displayed in the windows by tile by default.
● Ask Every Time: When dragging a channel to the window, the system
will ask you to select tour or tile mode.
Step 3 Click Save.
223
User's Manual
Parameters Description
Open alarm If selected, the platform will automatically open linked video(s) when an
linkage video alarm occurs.
when alarm occurs ● As Pop Up: The alarm video will be played in a pop-up window.
● Open in Live View: The alarm video will be played in a window in
Monitoring Center.
Open Alarm
Linkage Video For this function to work properly, you must enable When an alarm is
triggered, display camera live view on client when configuring an
event. For details, see "4.1 Configuring Events".
Device on the map
Set one or more alarm types for alarm notification on the map. When an
flashes when
alarm occurs, the corresponding device will flash on the map.
alarm occurs
Step 3 Click Save.
224
User's Manual
Figure 8-6 Configure file storage settings
225
User's Manual
Step 2 Click Shortcut Key to view shortcut keys of the PC keyboard and USB joystick.
Step 2 Click to select one or more files, or to open all files in a folder.
226
User's Manual
Figure 8-9 Play list
Step 3 Drag a file to the window on the right or right click it to play.
Related Operations
Table 8-6 Interface operation
Icon/Function Description
● Continuous Snapshot: Take snapshots of the current image (three
snapshots each time by default). The snapshots are saved
to ..\DSS\DSS Client\Picture by default. To change the snapshot saving
path, see "8.3.5 Configure File Storage Settings".
Right-click menu
● Video Adjustment: Adjust the brightness, contrast, saturation, and
chroma of the video for video enhancement.
● Digital Zoom: Click it, and then double-click the video image to
zoom in the image. Double-click the image again to exit zooming in.
Close all playing videos.
Split the window into multiple ones and play a video in full screen.
Take a snapshot of the current image and save it locally. The path is
C:\DSS\DSS Client\Picture\ by default.
Close the window.
Stop/pause the video.
Fast/slow playback. Max. supports 64X or 1/64X.
/ Frame by frame playback/frame by frame backward.
Capture the target in the playback window. Click to select the
search method, and then the system goes to the page with search results.
More operations:
● : Move the selection area.
● : Adjust the size of the selection area.
● Right-click to exit search by snapshot.
227
User's Manual
Figure 8-10 Quick commands
Step 2 Click .
Step 3 Click Add.
228
User's Manual
229
User's Manual
230
User's Manual
Security Statement
● If you connect the product to the Internet, you need to bear the risks, including but not limited to
the possibility of network attacks, hacker attacks, virus infections, etc., please strengthen the
protection of the network, platform data and personal information, and take the necessary
measures to ensure the cyber security of platform, including but not limited to use complex
passwords, regularly change passwords, and timely update platform products to the latest
version, etc. Dahua does not assume any responsibility for the product abnormality, information
leakage and other problems caused by this, but will provide product-related security
maintenance.
● Where applicable laws are not expressly prohibited, for any profit, income, sales loss, data loss
caused by the use or inability to use this product or service, or the cost, property damage,
personal injury, service interruption, business information loss of purchasing alternative goods or
services, or any special, direct, indirect, incidental, economic, covering, punitive, special or
ancillary damage, regardless of the theory of liability (contract, tort, negligence, or other) , Dahua
and its employees, licensors or affiliates are not liable for compensation, even if they have been
notified of the possibility of such damage. Some jurisdictions do not allow limitation of liability
for personal injury, incidental or consequential damages, etc., so this limitation may not apply to
you.
● Dahua's total liability for all your damages (except for the case of personal injury or death due to
the company's negligence, subject to applicable laws and regulations) shall not exceed the price
you paid for the products.
Security Recommendations
The necessary measures to ensure the basic cyber security of the platform:
The security question setting should ensure the difference of answers, choose different questions
and customize different answers (all questions are prohibited from being set to the same answer)
to reduce the risk of security question being guessed or cracked.
Recommendation measures to enhance platform cyber security:
1. Enable Account Binding IP/MAC
231
User's Manual
It is recommended to enable the account binding IP/MAC mechanism, and configure the IP/MAC
of the terminal where the commonly used client is located as an allowlist to further improve
access security.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Turn On Account Lock Mechanism
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4. Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5. Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445), remote
desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH (port 22)
under Linux. At the same time, close the database port to the outside or only open to a specific IP
address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6. Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and third-
party components, and apply official patches in time.
7. Security Audit
● Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
● View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8. The Establishment of a secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
● Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.
● Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.
More information
Please visit Dahua official website security emergency response center for security announcements
and the latest security recommendations.
232
User's Manual