0% found this document useful (0 votes)
75 views

SmartPSSAC User's Manual Eng

Uploaded by

david lopez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
75 views

SmartPSSAC User's Manual Eng

Uploaded by

david lopez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

SmartPSS-AC

User’s Manual

V1.0.3
Foreword

General
This manual introduces the general functions and operations of the SmartPSS-AC (hereinafter
referred to as "the SmartPSS-AC").

Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


DANGER death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


WARNING could result in slight or moderate injury.

Indicates a potential risk which, if not avoided, could result in


property damage, data loss, reductions in performance, or
CAUTION
unpredictable results.

TIPS Provides methods to help you solve a problem or save time.

NOTE Provides additional information as a supplement to the text.

Revision History
Version Revision Content Release Time
 Updated initialization function.
V1.0.3 August 2021
 Updated event configuration function.
Added user experience plan, feedback, and five
V1.0.2 time points in System Config > Data August 2020
Management.

V1.0.1 Modified log query function. June 2020

V1.0.0 First release. May 2020

Privacy Protection Notice


As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and car plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible identification to inform
people of the existence of the surveillance area and provide required contact information.

I
About the Manual
 The manual is for reference only. Slight differences might be found between the manual and the
product.
 We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
 The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
 All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
 There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
 Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
 All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
 Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
 If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Table of Contents
Foreword ..................................................................................................................................................... I
1 Overview.................................................................................................................................................. 1
2 Installation and Login.............................................................................................................................. 2
2.1 Installation ...................................................................................................................................... 2
2.2 Login ............................................................................................................................................... 2
2.2.1 Initialization ........................................................................................................................... 2
2.2.2 Daily Login ............................................................................................................................ 5
2.3 Password Reset ................................................................................................................................ 6
2.4 User Experience Plan........................................................................................................................ 6
2.5 Feedback ......................................................................................................................................... 7
3 Homepage ............................................................................................................................................... 9
4 Device Management .............................................................................................................................. 11
4.1 Adding Device ................................................................................................................................11
4.1.1 Adding Device by Auto Search ..............................................................................................11
4.1.2 Adding Device Manually ...................................................................................................... 12
4.1.3 Importing Device in Batches................................................................................................. 14
4.2 Deleting Device ............................................................................................................................. 14
4.3 Exporting Device ........................................................................................................................... 15
4.4 Editing Device ............................................................................................................................... 15
4.4.1 Editing Device Information ................................................................................................... 15
4.4.2 Initialization ......................................................................................................................... 15
4.4.3 Changing IP Address ............................................................................................................ 17
4.4.4 Device Configuration ........................................................................................................... 18
4.4.5 Alarm Configuration ............................................................................................................ 19
5 Log Query .............................................................................................................................................. 21
6 Event Configuration............................................................................................................................... 22
Appendix 1 Cybersecurity Recommendations ........................................................................................ 25

III
1 Overview
SmartPSS-AC is a client software developed for those small and medium-sized solutions. You can
download various solutions as needed. This manual introduces the general functions and operations.

1
2 Installation and Login
2.1 Installation

Contact technical support or download ToolBox to get the SmartPSS-AC. You can get the ToolBox on
the official website of Dahua.
 If you get the software package of the SmartPSS-AC, install and run the software according to
interface instructions.
 If you get the software by the ToolBox, run the SmartPSS-AC according to interface instructions.

2.2 Login

2.2.1 Initialization
Initialize SmartPSS-AC when you log in for the first time, including setting password and security
questions. Password is for login, and security questions are for password resetting.

Step 1 Double-click , or click Open next to the software icon in the ToolBox.

Step 2 Select the language from the drop-down list, select I have read and agree the software
agreement, and then click Next.
Figure 2-1 Select language

Step 3 Click Browse to select installation path, and then click Install.

2
Figure 2-2 Select installation path

Step 4 Click Finish to complete the installation.

Select Run SmartPSSAC to start SmartPSS-AC.


Figure 2-3 Install complete

Step 5 Click Agree to agree software license agreement.

Click Privacy to view the specific content.

3
Figure 2-4 Agree software license agreement

Step 6 Set password on the Initialization interface, and then click Next.
Figure 2-5 Set password

Table 2-1 Initialization parameters


Parameter Description
The password must consist of 8 to 32 non-blank characters and contain at
Password least two types of characters among uppercase, lowercase, number, and
special character (excluding ' " ; : &).

Display the effectiveness of a password against guessing or brute-force


Password
attacks. Green means the password is strong enough, and red means less
Strength
strong. Set a password of high security level according to the password

4
Parameter Description
strength prompt.

Confirm Password Enter the password again to confirm the password.

Auto Login after Enable Auto Login after Registration so that the SmartPSS-AC will log in
Registration automatically after initialization; otherwise the login interface is displayed.

Step 7 Set security questions, and then click Finish.


Figure 2-6 Set security questions

2.2.2 Daily Login

Step 1 Double-click , or click Open next to the software icon in the ToolBox.

Step 2 Enter username and password, and then click Login.

5
Figure 2-7 Login

Table 2-2 Parameters of login


Parameter Description
Enable Remember Password so that you do not need to enter the
Remember Password
password again when logging in next time.

Enable Auto Login so that the SmartPSS-AC will log in automatically the
Auto Login
next time when you use the same user account.

Click Forgot password to rest password through security questions


Forgot password?
when you forget the password.

2.3 Password Reset


You can rest the password by answering the security questions.

Step 1 Double-click , or click Open next to the software icon in the ToolBox.

Step 2 Click Forgot password? on the login interface.


Step 3 Answer the security questions, and then click Next.
Step 4 Reset password according to interface instructions.

2.4 User Experience Plan


You can select Join to join the plan, or select Not Join to go ahead. If you joined the plan, your
operation info will be collected; otherwise your operation info will not be collected.

 If you want to exit the plan, on the upper right corner of the interface, you can select >
System Config > Basic Setting to deselect User Experience Plan.
 Click View Privacy Policy to view the specific content.

6
Figure 2-8 User experience plan

Figure 2-9 Select or deselect user experience plan

2.5 Feedback
If you have any suggestions, on the upper right corner of the interface, select > Feedback, and
then you can enter suggestions (words), upload pictures and attachments, and then click Submit.

7
Figure 2-10 Feedback

8
3 Homepage
The homepage consists of 6 parts.
Figure 3-1 Homepage

Table 3-1 Parameters of homepage


No. Parameter Description
Display the homepage by default.
1 Function tab When you click on a function for the first time, the function tab is added
here.

 Click and select User Manager to manage users, such as add


role/user, delete role/user and set permissions.

 Click and select lock Screen to lock screen. Enter password of


login account when you want to unlock.

User
2  Click and select Switch User to return to the login interface. You
management
can log in with new account.

 Click and select Help Manual to get the user’s manual.

 Click and select About to view the system version and date.
Enable Open Debugging Log so that the debugging logs are saved
automatically to a local path, for locating and problems solving.
 Basic Setting
System  Timing: Enable Auto Check Time Every day and set Check Time
3
configuration so that the devices check time automatically at the set point in
time.

9
No. Parameter Description
 Language: Display the language which is activated after restart.
 Log save time: Set the save time of log and then logs from today
to the set time will be saved. This function is activated after
restart. For example, set the save time as 30, and then the logs of
the last 30 days will be saved.
 Data format: Select data display format.
 Time format: Select time display format.
 Network ability: Select network ability according to your network
condition. For example, when network condition is fluent, you
are recommended to select High.
 Skin: Select the skin which is activated after restart. The default
setting is grayish white.
 Event
 Enable the loop of event sound.
 Select event sound. You can select the needed sound or add the
customized sounds in the path.
 Enable and configure SMTP.
 Local path
The storage paths.

 Data management
 Extract regularly: Set the regularly extracting time so that the
attendance data of devices will be extracted on the defined time.
1. If you select Everyday, you can select five time points.
2. If you select Every Week, you can select a certain timepoint on a
certain day.

For attendance devices, extract the attendance data directly. For


access controllers, set the device as attendance point and then
extract the attendance data.
 Clear regularly: Set saving time for data and pictures.
SmartPSS-AC auto clears data and pictures that exceed the
saving time. It triggers at 00:00 each day or when the software is
started.
 Backup: Support to back up automatically and manually.
 Manual: Select the backup path and click Manual Backup.
 Auto: Select the backup path and enable Auto Backup.
 Restore: Click Restore and select the backup file that you need.
Configurations will restore the file configurations.

Click to view the using status of CPU and RAM. If the CPU usage is
4 System status
high, the icon turns red.

Function
5 Click the function icon to go to the function interface.
module

Solution
6 Select the needed solution. Click to display or hide solutions.
module

10
4 Device Management
The SmartPSS-AC allows for adding devices. You can remotely configure and operate the devices
after adding by the SmartPSS-AC.

4.1 Adding Device


There are various methods to add devices. Select the most suitable method according to the
situations, such as IP address and network segment.
 Auto search
 Manually adding
 Import in batches

4.1.1 Adding Device by Auto Search

Close ConfigTool and DSS when you configure devices; otherwise, you may not be able to search all
devices.
It is recommended to add devices by auto search when you need to add devices in batches within
the same network segment, or when the network segment is clear but the device IP address is
unclear.
Step 1 Click Auto Search on the Device Manager interface.
Step 2 Set the range of network segment and then click Search.
The list of searched devices is displayed.

 Click Refresh to refresh the search results.


 Click one needed device and then click Modify IP to change the IP address, subnet
mask and gateway. For details, see "4.4.3 Changing IP Address."
 Click one uninitialized device and then click Initialization. You can rest IP address, sub
mask, gateway and login password. For details, see "4.4.2 Initialization."

11
Figure 4-1 Search results

Step 3 Click the needed devices and then click Add.


Step 4 Enter the login user name and password, and then click OK to confirm.

 The Auto Search interface is still displayed after adding devices. You can continue to
add or click Cancel to quit.
 Devices will be logged in automatically after adding. If the login is successful, the
status displays as online; otherwise it is offline.

4.1.2 Adding Device Manually


It is recommended to add devices manually when you need to add one single device with certain IP
address or domain name.
Step 1 Select Add on the Device Manager interface.
Step 2 Set device parameters.

12
Figure 4-2 Add device manually

Table 4-1 Parameters of manually adding


Parameter Description
It is recommended to name devices with the monitoring area for easy
Device Name
identification.

Method to add Select the method to add.

Enter the device IP address here when you select IP as the method to
IP
add.

Enter the port number, and the port number is 37777 by default. The
Port
actual port number shall prevail.

User Name Enter the login user name.

Password Enter the login password.

Step 3 Click Add to add the device and close the Add Device interface; or click Add and Continue
to add the device and stay on the Add Device interface that you can add another device
conveniently.

13
4.1.3 Importing Device in Batches
It is recommended to add devices by importing when you need to add devices in batches but they
are not on the same network segment. Organize the device information as a file in .xml format, and
then import the file.

You can export the template of device information. Select a device and click Export.
Step 1 Click Device Manager > Import.
Step 2 Select the information file and click Import.

Devices will be logged in automatically after adding. If the login is successful, the status
displays as online; otherwise it is offline.
Figure 4-3 Import device information in .xml format

4.2 Deleting Device


Step 1 Select Device Manager on the homepage.

Step 2 Select the device that you do not need any more, and then click Delete or which is on
the right side of device.
Step 3 (Optional) select At the same time delete the device snapshot and video if you do not
need those snapshots and videos; otherwise, do not check it.
Figure 4-4 Delete device

Step 4 Click OK.

14
4.3 Exporting Device
You can export device information to local.
Step 1 Select Device Manager on the homepage.
Step 2 Select the device which needs to be exported and then click Export on the Device
Manager interface.
Step 3 Select the local path of export, and then click Export.
Figure 4-5 Export device information

4.4 Editing Device

4.4.1 Editing Device Information


You can modify the information of added device, such as name, login user name and password.
Step 1 Select Device Manager on the homepage.

Step 2 Click on the right side of the selected device or double-click the device, in the device
list.
Step 3 Edit device information.
Step 4 Click Save.

4.4.2 Initialization
Only support initializing devices which are within the same network segment as the PC.
Step 1 Click Device Manager > Auto Search.
Step 2 Set the range of network segment and then click Search.
The list of searched devices is displayed.

15
Figure 4-6 Device list

Step 3 Select the uninitialized device and click Initialization.


Step 4 Set password and click Next.
Figure 4-7 Set password

Step 5 Enter email address for password resetting.


Figure 4-8 Reserve email address

16
Step 6 Enter new IP address, subnet mask and gateway, and then click Finish. If they are not
entered, the three parameters will be the default values.
Figure 4-9 Modify IP address

4.4.3 Changing IP Address


After initializing remote device, you can change device IP address.
Step 1 Click Auto Search on the Device Manager interface.
Step 2 Set the range of network segment and then click Search.
Step 3 Select the needed devices and then click Modify IP.
Step 4 Change the IP address, subnet mask and gateway of the device, and click OK. You can
change IP of a single device or of devices in batches.

 For batch change, the new IP will be assign to the top-most device, and other IP
addresses will increase by 1 from top to bottom. For example, if you select two devices
and set the new IP as 192.168.1.10, then the IP address of top device in the list will be
changed as 192.168.1.10, and the next device will be changed as 192.168.1.11.
 For batch change the subnet mask and gateway will be assigned to all selected
devices.
Figure 4-10 Change IP of a single device

17
Figure 4-11 Change IP of devices in batches

Step 5 Enter the login username and password, and then click OK to confirm.

4.4.4 Device Configuration


For some devices, you can make configuration, including time setting, firmware upgrade, device
restart, personnel extraction and attendance record extraction.
Step 1 Select Device Manager.

Step 2 Click .
Figure 4-12 Configure device

Step 3 Configure device.


 Time setting
Figure 4-13 Modify IP of devices in batches

18
Table 4-2 Parameters of time setting
Parameter Description
Date Format Set the date display format.

Time Format Set the time display format.

Time Zone Set the time zone.

Set the system time. You can also click Sync PC to set the system time as
System Time
the same as PC time.

DST Enable DST as needed. Set the DST type, start time and end time.

Enable NTP server if you need to sync system time as the same as NTP
NTP
time. Enter the server address, port and update period.

 Firmware upgrade
Select the upgrade bin and then operate according to instructions.
 Restart
Click to restart device.
 Extract personnel
Select the needed personnel and extract personnel info from device to the local.
 Extract attendance record.
Set the time period and extract attendance records manually.

Make sure that you have set access controllers as attendance point before extraction.
For details of attendance point setting, see SmartPSS-AC_Attendance Solution_User's
Manual.

4.4.5 Alarm Configuration


Devices whose models are ASC2202B-D can be connected to external alarm devices. Go to the
External Alarm interface, and then configure parameters.
Figure 4-14 External alarm

19
Table 4-3 Parameters of time setting
Parameter Description
Alarm Input Select an alarm input channel number as needed.

Alarm Output Select an alarm output channel number as needed.

Output Delay Alarms will be output after the duration you have set.

Once alarms are triggered, you can select Always Open, Always Close, or
Door Linkage
Normal for different doors.

Copy current
You can copy the current configuration to other devices as needed.
configuration to

20
5 Log Query
You can query for client logs and devices logs. The two methods are similar, and here takes the
system logs query of client as an example.
Step 1 Select Log Query.
Step 2 Select log type and log time, and enter key words if needed.
Step 3 Click Search.
The results are displayed on the right side of interface.
Step 4 (Optional) Click Export to export logs to local device.
Figure 5-1 Query for logs

37
6 Event Configuration
By configuring event, you can make software linkages, such as alarm sound, email sending and alarm
linkages.
 Configure external alarm linkages connected to the access controllers (such as smoke alarm),
cameras and storage devices.
 Configure linkages of access controller events.
 Alarm event
 Abnormal event
 Normal event

 For anti-passback function, set the anti-passback mode in Abnormal of Event Config, and then
configure the parameters in Advanced Config.
 Only access control and attendance devices are displayed in the Default Group.
Step 1 Click Event Config on the homepage.
Step 2 Select the needed door and select Alarm Event > Intrusion Event.
Step 3 Click on the right of Intrusion Alarm to enable the function.
Step 4 Configure linkage actions of the intrusion alarm.
 Enable alarm sound.
Click the Notify tab, and click on the right of Alarm Sound. When intrusion
event occurs, the access controller warns by alarm sound.
 Send alarm email.
1) Enable Send Mail and confirm to set SMTP, you will automatically go to the System
Settings interface.
2) Configure SMTP parameters, such as server address, port number, and encryption
mode.
When intrusion event occurs, the system automatically sends alarm emails to the
specified receiver.
Figure 6-1 Configure intrusion alarm

 Configure linkage video.


1) Click Link Video, select video layout as needed. Once intrusion alarm is triggered,
videos will be automatically displayed on the interface.
 Configure alarm I/O.
1) Click the Alarm Output tab.
2) Select the device which supports alarm input, select the alarm input channel, and then
enable External Alarm.

37
3) Select the device which supports alarm output, then select alarm-out interface.
4) Enable Auto Open for the alarm linkage.
5) Set the duration.
Figure 6-2 Configure alarm linkage

 Set arming periods. There are two methods.


 Method 1: Move the cursor to set time periods. When the cursor turns to a pencil,
click to add periods; when the cursor turns to an eraser, click to minus periods. The
periods in green area are armed.
Figure 6-3 Set arming periods (method 1)

 Method 2: Click to set periods, and then click OK.

37
Figure 6-4 Set arming periods (method 2)

Step 5 (Optional) Click Copy To, select the access controller to be applied to, and then click OK.
Step 6 Click Save.

37
Appendix 1 Cybersecurity Recommendations

Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic device network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
 The length should not be less than 8 characters;
 Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols;
 Do not contain the account name or the account name in reverse order;
 Do not use continuous characters, such as 123, abc, etc.;
 Do not use overlapped characters, such as 111, aaa, etc.;
2. Update Firmware and Client Software in Time
 According to the standard procedure in Tech-industry, we recommend to keep your device
(such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is equipped
with the latest security patches and fixes. When the device is connected to the public
network, it is recommended to enable the “auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
 We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your device network security:
1. Physical Protection
We suggest that you perform physical protection to device, especially storage devices. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable device (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The device supports password reset function. Please set up related information for password
reset in time, including the end user’s mailbox and password protection questions. If the
information changes, please modify it in time. When setting password protection questions, it is
suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are
using.

37
6. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the device, thus reducing
the risk of ARP spoofing.
8. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
9. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
 SNMP: Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
 SMTP: Choose TLS to access mailbox server.
 FTP: Choose SFTP, and set up strong passwords.
 AP hotspot: Choose WPA2-PSK encryption mode, and set up strong passwords.
10. Audio and Video Encrypted Transmission
If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
11. Secure Auditing
 Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
 Check device log: By viewing the logs, you can know the IP addresses that were used to log
in to your devices and their key operations.
12. Network Log
Due to the limited storage capacity of the device, the stored log is limited. If you need to save
the log for a long time, it is recommended that you enable the network log function to ensure
that the critical logs are synchronized to the network log server for tracing.
13. Construct a Safe Network Environment
In order to better ensure the safety of device and reduce potential cyber risks, we recommend:
 Disable the port mapping function of the router to avoid direct access to the intranet
devices from external network.
 The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to
use VLAN, network GAP and other technologies to partition the network, so as to achieve
the network isolation effect.
 Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.
 Enable IP/MAC address filtering function to limit the range of hosts allowed to access the
device.

37

You might also like