User Manual
User Manual
Management Center
User's Manual
Foreword
General
This user’s manual introduces the functions and operations of the general surveillance
management center (hereinafter referred to as "the system" or "the platform").
Safety Instructions
Icon/Parameter Description
or Edit an item.
I
User's Manual
As the device user or data controller, you might collect the personal data of others such as their
face, fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
User's Manual
Operation Requirements
A suitable operating environment is the foundation for the device to work properly. Confirm
whether the following conditions have been met before use.
● Use the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the operating temperature and humidity of the device.
● Use the device on a stable base.
● Do not let any liquid flow into the device to avoid damage to internal components. When liquid
flows into the device, immediately disconnect the power supply, unplug all cables connected to
it, and contact after-sales service.
● Do not plug or unplug RS-232, RS-485 and other ports with the power on, otherwise, the ports
will be easily damaged.
● Back up data in time during deployment and use, in an effort to avoid data loss caused by
abnormal operation. The company is not liable for data security.
● The company is not responsible for damages to the device or other product problems caused by
excessive use or other improper use.
Installation Requirements
● Make sure that the power is off when you connect the cables, install or disassemble the device.
● For devices with earthing systems, make sure they are grounded to avoid being damaged by
static electricity or induced voltage, and prevent electrocution from occurring.
● All installation and operations must conform to local electrical safety regulations.
● Use accessories suggested by the manufacturer, and installed by professionals.
● Do not block the ventilator of the device, and install the device in a well-ventilated place.
● Do not expose the device to heat sources or direct sunlight, such as radiator, heater, stove or
other heating equipment, which is to avoid the risk of fire.
● Do not place the device in explosive, humid, dusty, extremely hot or cold sites with corrosive
gas, strong electromagnetic radiation or unstable illumination.
● Avoid heavy stress, violent vibration, and immersion during installation.
Safe and stable power supply is a prerequisite for proper operation of the device.
● Make sure that the ambient voltage is stable and meet the power supply requirements of the
device.
● Prevent the power cord from being trampled or pressed, especially the plug, power socket and
the junction from the device.
● For devices that can be powered by multiple supplies, do not connect them to two or more
kinds of power supplies; otherwise, the device might be damaged.
III
User's Manual
● Refer to the specific user’s manual for the power requirements of single device.
It is recommended to use the device with a lightning protector for better lightning-proof effect.
Transportation Requirements
● Pack the device with packaging provided by its manufacturer or packaging of the same quality
before transporting it.
● Avoid heavy stress, violent vibration, and immersion during transportation.
● Transport the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the transporting temperature and humidity of the device.
Storage Requirements
● Store the device under allowed humidity and temperature conditions. Refer to the technical
parameters for requirements on the storing temperature and humidity of the device.
● Avoid heavy stress, violent vibration, and immersion during storage.
Maintenance Requirements
● Contact professionals for regular inspection and maintenance of the device. Do not disassemble
or dismantle the device without a professional present.
● Use accessories suggested by the manufacturer, and maintain the device by professionals.
IV
User's Manual
Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Overview...........................................................................................................................................................1
1.1 Introduction..................................................................................................................................................................................1
1.2 Highlights...................................................................................................................................................................................... 1
V
User's Manual
4 Basic Configurations......................................................................................................................................32
4.1 Preparations............................................................................................................................................................................... 32
4.1.1 Installing and Logging into DSS Client................................................................................................................ 32
4.1.2 Installing Mobile Client..............................................................................................................................................34
4.2 Managing Resources...............................................................................................................................................................35
4.2.1 Adding Organization..................................................................................................................................................35
4.2.2 Managing Device.........................................................................................................................................................36
4.2.3 Binding Resources....................................................................................................................................................... 47
4.2.4 Adding Recording Plan..............................................................................................................................................48
4.2.5 Adding Video Retrieval Plan.................................................................................................................................... 53
4.2.6 Adding Time Template.............................................................................................................................................. 56
4.2.7 Configuring Video Retention Period.................................................................................................................... 57
4.2.8 Configuring Events......................................................................................................................................................57
4.2.9 Synchronizing People Counting Rules.................................................................................................................58
4.3 Adding Role and User............................................................................................................................................................. 59
4.3.1 Adding User Role......................................................................................................................................................... 59
4.3.2 Adding User................................................................................................................................................................... 60
4.3.3 Importing Domain User.............................................................................................................................................61
4.3.4 Syncing Domain User.................................................................................................................................................62
4.3.5 Password Maintenance............................................................................................................................................. 62
4.4 Configuring Storage................................................................................................................................................................64
4.4.1 Configuring Network Disk........................................................................................................................................ 64
4.4.2 Configuring Server Disk.............................................................................................................................................66
4.4.3 Configuring RAID Group........................................................................................................................................... 67
4.4.4 Configuring Disk Group.............................................................................................................................................68
4.4.5 Configuring Device Storage.....................................................................................................................................69
5 Businesses Configuration............................................................................................................................. 70
5.1 Configuring Events.................................................................................................................................................................. 70
5.1.1 Configuring Event Linkage.......................................................................................................................................70
5.1.2 Configuring Combined Event................................................................................................................................. 74
5.1.3 Configuring Alarm Parameter.................................................................................................................................74
5.2 Configuring Map.......................................................................................................................................................................77
5.2.1 Preparations.................................................................................................................................................................. 77
5.2.2 Adding Map................................................................................................................................................................... 77
5.2.3 Marking Devices...........................................................................................................................................................80
5.3 Personnel and Vehicle Management................................................................................................................................ 81
VI
User's Manual
6 Businesses Operation..................................................................................................................................141
6.1 Monitoring Center.................................................................................................................................................................141
6.1.1 Main Page.................................................................................................................................................................... 141
6.1.2 Video Monitoring...................................................................................................................................................... 143
6.1.3 Playback........................................................................................................................................................................167
6.1.4 Map Applications...................................................................................................................................................... 179
6.1.5 Video Wall.................................................................................................................................................................... 182
6.2 Event Center............................................................................................................................................................................ 191
VII
User's Manual
8 System Configurations................................................................................................................................238
VIII
User's Manual
9 Management................................................................................................................................................250
9.1 Managing Logs....................................................................................................................................................................... 250
9.1.1 Operation Log............................................................................................................................................................ 250
9.1.2 Device Log................................................................................................................................................................... 250
9.1.3 System Log.................................................................................................................................................................. 250
9.1.4 Service Log.................................................................................................................................................................. 250
9.2 Downloading Videos............................................................................................................................................................ 251
9.3 Configuring Local Settings................................................................................................................................................. 252
9.3.1 Configuring General Settings............................................................................................................................... 253
9.3.2 Configuring Video Settings................................................................................................................................... 254
9.3.3 Configuring Video Wall Settings..........................................................................................................................256
9.3.4 Configuring Alarm Settings...................................................................................................................................257
9.3.5 Configure File Storage Settings........................................................................................................................... 258
9.3.6 Viewing Shortcut Keys.............................................................................................................................................258
9.3.7 Exporting and Importing Configurations.........................................................................................................258
9.4 Playing Local Videos............................................................................................................................................................. 259
9.5 Quick Commands.................................................................................................................................................................. 260
Appendix 1 Service Module Introduction...................................................................................................262
Appendix 2 RAID........................................................................................................................................... 264
Appendix 3 Cybersecurity Recommendations........................................................................................... 266
IX
User's Manual
1 Overview
1.1 Introduction
DSS General Surveillance Management Center is a high-performance security management
platform based on Linux OS and pre-installed DSS software, offering outstanding performance and
excellent reliability. It is ideal for medium and large scenes, such as residential areas and casinos.
1.2 Highlights
● Easy to Use
All-in-one, plug & play and powerful.
Performs unified management of different devices.
● Powerful
Increase system performance through distributed deployment.
● High Storage Performance
15 built-in storage disk interfaces.
Supports IPSAN for storage expansion.
● Stable and Reliable
Hot standby system design.
Dahua’s unique N M redundancy mode.
Redundant power design that makes the system more stable (only applicable to DSS7016DR-
S2).
1
User's Manual
Standalone Deployment
For projects with a small number of devices, only one server is required.
Figure 2-1 Standalone deployment
Distributed Deployment
Suitable for medium to larger projects. Sub servers are used to share system load, so that more
devices can be accessed. The sub servers register to the main server, and the main server centrally
manages the sub servers.
2
User's Manual
Hot Standby
Used with systems that require high stability. The standby server takes over the system when the
active server malfunctions (such as with power-off and network disconnection). You can switch
back to the original active server after it recovers.
Figure 2-3 Hot standby
N+M
Each sub server has a standby server to maintain stability. When a sub server malfunctions, the
system replaces it with an idle standby server. When the malfunctioning server normalizes, you can
3
User's Manual
manually switch back to it. If you do not manually switch them, the system will automatically make
the switch if the standby server malfunctions.
Figure 2-4 N+M
The configuration system does not differentiate service LAN ports and WAN ports. Make sure that
the WAN ports and LAN ports are the same.
4
User's Manual
Step 2 On the Select Port drop-down list, select the port that is connected to the network card
you want to configure, and then on the Default Port drop-down list, select the default
network card of the platform.
Step 3 Configure the IP address, subnet mask, default gateway, and DNS, and then click OK.
The platform will automatically restart.
5
User's Manual
For first-time login, follow the on-screen instructions to set a password, security
questions, and time zone.
Step 5 Configure network parameters.
1. Select Quick Guide > NIC Config, or Network Config > NIC Config.
2. Configure the parameters, and then click Apply and Restart.
Default network card and its parameters have been configured in step 2 and 3.
6
User's Manual
Parameter Description
● Multi-address
Multiple network card (hereinafter referred to as NIC) mode. You can
configure different network parameters for different NIC to access to
multiple network segments and achieve high network reliability. For
example, to configure hot standby, the NIC 2 can be used to set spare
server IP. This can also be used in ISCSI storage expansion solution. When
setting ISCSI storage expansion, NIC 1 can be used for communication,
NIC 2 is reserved and NIC 3 and NIC 4 can be used for ISCSI storage.
● Load Balancing
Multiple NICs share one IP and work at the same time to share the
network load, providing greater network capacity than the single NIC
Select NIC Mode mode. When one of them fails, the network load will be re-distributed
among the rest NICs to ensure network stability.
● Fault-tolerant
Multiple NICs share one IP. Normally, one of them works. When the
working NIC fails, another one will automatically take over the job to
ensure network stability.
● Link Aggregation
Bind NICs so that all the bound NICs work at the same time and share
network load. For example, bind two NICs and set multi-address for the
other two NICs. Then the server has three IPs. The bandwidth of the two
bound NICs is 2K and the other two are 2K respectively. This is applicable
to stream forwarding, not storage.
When the NIC mode is fault tolerance, load balance or link aggregation, you
Add Network Card need to add network card.
Select NIC to bind. You can bind 2 NICs as needed.
Network Card
After NIC is selected or added, its information will be displayed.
Config
MAC Address Displays the MAC address of the server.
After selecting a network card, you can set its IP address, subnet mask,
IPv4
default gateway and DNS server address.
Enable IPv6 and configure the parameters to connect the platform to an IPv6
IPv6
network, you can add devices with IPv6 address to the platform.
Select the default NIC. This NIC will be used as the default NIC to forward
Default Network
data package between non-consecutive network segments such as WAN or
Card
public network.
Step 6 Set server time zone and time.
1. After restart completes, log in to the configuration system again, and then select Basic
Config > Time Config.
2. Configure the parameters, and then click Application.
7
User's Manual
Parameter Description
Time Zone Select time zone of the server.
Date/Time Click the box to select the date and time.
Click Sync PC to synchronize the time of the server with the computer you
Sync PC
are using.
Step 7 Configure the work mode.
1. After restart completes, log in to the configuration system again, and then select
Quick Guide > Service Mode, or select Mode Config > Service Mode.
2. Select Main Server or Sub Server.
● For single-server deployment and hot standby deployment, set the work mode to
Main Server.
● For distributed deployment and N+M deployment, set the work mode of the main
server to Main Server , and that of the spare servers to Sub Server.
If the server is set to Sub Server, you need to enter main server IP address and
HTTPS port number.
3. Click Apply and Restart.
Procedure
Step 1 Go to https://platform IP address/config in the browser.
Step 2 Enter the username and password, and then click Login.
Step 3 Select Network Config > Network Mode, and then select Dual NIC.
Step 4 On the Local IP 2 drop-down box, select the IP address of the other network card, and
then click Apply and Restart.
8
User's Manual
Related Operations
In dual network cards mode, you can configure LAN and WAN mapping for the default network
card. For details, see "2.5 Configuring LAN or WAN".
Procedure
Step 1 Go to https://sub server IP address/config in the browser.
Step 2 Enter the username and password, and then click Login.
Step 3 Select Quick Guide > Service Mode, or Mode Config > Service Mode, and then select
Sub Server.
Step 4 Enter the IP address and HTTPS port of the main server, and then click Apply and Restart.
9
User's Manual
Step 5 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select System Deployment.
10
User's Manual
● Hot standby is the synchronization of the databases of the two servers. If you need to change
any configuration that does not involve the databases, such as a port number, you must make
sure this port number is the same on both servers.
Procedure
Step 1 Log in to the Config system.
Step 2 Select Mode Config > Hot standby.
Figure 2-10 Hot standby
The NIC mode must be Multi-address for hot spare to work normally. For details, see "3.2
Quick Guide".
Parameter Description
After setting virtual IP, it can have access to platform via the virtual
Virtual IP
IP.
Mask It is in accordance with the mask of network port 1.
Spare IP IP address of spare server network port 1.
Spare beat IP IP address of spare server network port 2.
Spare config username The login username and password of spare server Config system.
11
User's Manual
Parameter Description
For this operation, you must access the IP addresses of the servers,
and not the virtual IP address.
Procedure
Step 1 Log in to the DSS client of the main server. On the Home page, click > System
Deployment.
Step 2 Click .
Step 3 Click to enable the sub servers.
Step 4 Configure a standby server.
1. Click of a sub server.
2. Select Standby Server for Server Type, and then click OK.
Step 5 Configure the sub-standby relationship in either of the following ways.
● Go to the Configure Server interface of the sub server to select a standby server.
c. Click OK.
12
User's Manual
● Go to the Configure Server interface of the standby server to select a sub server.
● Make sure that the number of the WAN ports is consistent with that of the LAN ports.
13
User's Manual
● You can configure LAN and WAN mapping and dual network cards mode at the same time. For
how to configure dual network cards, see "2.1.2 Configuring Dual Network Cards".
Figure 2-12 Topology of deploying LAN and WAN mapping and dual networks cards
14
User's Manual
Step 3 Enter a fixed WAN IP address or a domain name in the Mapping IP | Domain box, and
then click OK.
● If you want to use a domain name, you need to make related configurations on the
domain name server.
● The DNS information of the network card must be the same as the domain name
server.
Step 4 Click OK and then the services will restart.
15
User's Manual
Step 2 Enter a password and confirm it, and then click Next.
Step 3 Set security questions, and then click Next.
Step 4 Configure the time and time zone, and then click Finish.
Service is restarted and you need to log in to the system again.
16
User's Manual
Step 3 Select Main Server or Sub Server as needed, and then click Apply and Restart.
If the server is set to Sub Server, enter the IP address and HTTPS port number of the main
server.
Step 4 Log in to the Config system, and then select Quick Guide > Network Card Config.
Figure 3-3 Network card configuration
17
User's Manual
Parameter Description
● Multi-address
Multiple network card (hereinafter referred to as NIC) mode. You can
configure different network parameters for different NIC to access to
multiple network segments and achieve high network reliability. For
example, to configure hot standby, the NIC 2 can be used to set spare
server IP. This can also be used in ISCSI storage expansion solution. When
setting ISCSI storage expansion, NIC 1 can be used for communication,
NIC 2 is reserved and NIC 3 and NIC 4 can be used for ISCSI storage.
● Load Balancing
Multiple NICs share one IP and work at the same time to share the
network load, providing greater network capacity than the single NIC
Select NIC Mode mode. When one of them fails, the network load will be re-distributed
among the rest NICs to ensure network stability.
● Fault-tolerant
Multiple NICs share one IP. Normally, one of them works. When the
working NIC fails, another one will automatically take over the job to
ensure network stability.
● Link Aggregation
Bind NICs so that all the bound NICs work at the same time and share
network load. For example, bind two NICs and set multi-address for the
other two NICs. Then the server has three IPs. The bandwidth of the two
bound NICs is 2K and the other two are 2K respectively. This is applicable
to stream forwarding, not storage.
When the NIC mode is fault tolerance, load balance or link aggregation, you
Add Network Card need to add network card.
Select NIC to bind. You can bind 2 NICs as needed.
Network Card
After NIC is selected or added, its information will be displayed.
Config
MAC Address Displays the MAC address of the server.
After selecting a network card, you can set its IP address, subnet mask,
IPv4
default gateway and DNS server address.
Enable IPv6 and configure the parameters to connect the platform to an IPv6
IPv6
network, you can add devices with IPv6 address to the platform.
Select the default NIC. This NIC will be used as the default NIC to forward
Default Network
data package between non-consecutive network segments such as WAN or
Card
public network.
Step 6 Click Apply and Restart.
Step 7 Log in to the Config system, and then select Quick Guide > Network Mode.
18
User's Manual
Map the LAN IP to a WAN IP, so that you can access the
WAN IP | Domain platform through the WAN IP. If the WAN IP changes
Name frequently, you can map it to a domain name, and use it to
access the platform.
WAN Mapping Displays all services used by the platform and their ports.
Service Port Click to change their port numbers as needed.
Config
For introduction to each service, see "Appendix 1 Service
Module Introduction".
19
User's Manual
The NIC mode must be Multi-address for hot spare to work normally. For details, see
Step 4.
Parameter Description
After setting virtual IP, it can have access to platform via the virtual
Virtual IP
IP.
Mask It is in accordance with the mask of network port 1.
Spare IP IP address of spare server network port 1.
Spare beat IP IP address of spare server network port 2.
Spare config username The login username and password of spare server Config system.
20
User's Manual
Parameter Description
For this operation, you must access the IP addresses of the servers,
and not the virtual IP address.
3.3 Self-check
● Click System Status , and then select Service Status, CPU Status, Network Status, or Local
Disk Status to check the different status of the platform.
● Hover the mouse over or click the icons of at the upper left corner to
check the status of the ports, IP addresses, network, CPU, and disks.
21
User's Manual
Step 2 Configure the parameters, and then click Apply and Restart.
Parameter Description
● Multi-address
Multiple network card (hereinafter referred to as NIC) mode. You can
configure different network parameters for different NIC to access to
multiple network segments and achieve high network reliability. For
example, to configure hot standby, the NIC 2 can be used to set spare
server IP. This can also be used in ISCSI storage expansion solution. When
setting ISCSI storage expansion, NIC 1 can be used for communication,
NIC 2 is reserved and NIC 3 and NIC 4 can be used for ISCSI storage.
● Load Balancing
Multiple NICs share one IP and work at the same time to share the
network load, providing greater network capacity than the single NIC
Select NIC Mode mode. When one of them fails, the network load will be re-distributed
among the rest NICs to ensure network stability.
● Fault-tolerant
Multiple NICs share one IP. Normally, one of them works. When the
working NIC fails, another one will automatically take over the job to
ensure network stability.
● Link Aggregation
Bind NICs so that all the bound NICs work at the same time and share
network load. For example, bind two NICs and set multi-address for the
other two NICs. Then the server has three IPs. The bandwidth of the two
bound NICs is 2K and the other two are 2K respectively. This is applicable
to stream forwarding, not storage.
22
User's Manual
Parameter Description
When the NIC mode is fault tolerance, load balance or link aggregation, you
Add Network Card need to add network card.
Select NIC to bind. You can bind 2 NICs as needed.
Network Card
After NIC is selected or added, its information will be displayed.
Config
MAC Address Displays the MAC address of the server.
After selecting a network card, you can set its IP address, subnet mask,
IPv4
default gateway and DNS server address.
Enable IPv6 and configure the parameters to connect the platform to an IPv6
IPv6
network, you can add devices with IPv6 address to the platform.
Select the default NIC. This NIC will be used as the default NIC to forward
Default Network
data package between non-consecutive network segments such as WAN or
Card
public network.
23
User's Manual
Map the LAN IP to a WAN IP, so that you can access the
WAN IP | Domain platform through the WAN IP. If the WAN IP changes
Name frequently, you can map it to a domain name, and use it to
access the platform.
WAN Mapping Displays all services used by the platform and their ports.
Service Port Click to change their port numbers as needed.
Config
For introduction to each service, see "Appendix 1 Service
Module Introduction".
24
User's Manual
Parameter Description
Router Address The IP address or the network segment of the host you want to access.
Subnet Mask The subnet mask of the network you want to access.
Gateway The IP address of the default gateway or the next hop.
Step 4 Click OK.
25
User's Manual
If the server is set to Sub Server, enter IP address and HTTPS port of the main server.
Step 3 Click Apply and Restart.
26
User's Manual
Step 3 Open Internet Explorer, click on the upper-right corner, and then select Internet
Options > Advanced.
Step 4 In the Security section, select TLS1.0 or TLS1.1, click Apply, and then click OK.
27
User's Manual
3.7.2 Log
You can download the logs of all services to your computer.
Procedure
Step 1 Select System Maintenance > Service Log.
Step 2 Select the date, and then click Download to download the logs.
28
User's Manual
All services will be restarted after changing the password. Check if the services have been restarted
successfully during use.
Procedure
Step 1 Select Basic Config > Manage Account.
29
User's Manual
It will restart all services after modifying password. Check if the services have been
restarted successfully during use.
Parameter Description
Time Zone Select time zone of the server.
Date/Time Click the box to select the date and time.
30
User's Manual
Parameter Description
Click Sync PC to synchronize the time of the server with the computer you
Sync PC
are using.
Step 3 Click Application.
31
User's Manual
4 Basic Configurations
Configure basic settings of the system functions before using them, including system activation,
organization and device management, user creation, storage and recording planning, and event
rules configuration.
4.1 Preparations
4.1.1 Installing and Logging into DSS Client
Install the DSS client before licensing it.
Press the Windows key, and type dxdiag , and then click . On the System page, the
information of your computer is displayed.
To install and use the DSS Client, we recommend you prepare a computer that meets the following
requirements.
● CPU: Intel Core i7, 64 bits 4 Core Processor
● Memory: 16 GB
● Graphics card: NVIDIA® GeForce® GTX 1060 3 GB
● Network card: 1000 Mbps
● Hard drive capacity: 200 GB for the DSS client
Procedure
Step 1 Go to https://IP address of the platform in the browser
Step 2 Click PC , and then Download.
32
User's Manual
Procedure
If you want to log in using a domain user account, you must import the domain user first.
For details, see "4.3.3 Importing Domain User".
Step 3 Enter the IP address and port number of the platform.
On the drop-down list, platforms that are in the same network as your computer will be
shown.
If you want to log in to the platform using its domain name, you must link its IP address to
a domain name first. For details, see "2.5.2 Mapping IP or Domain Name".
33
User's Manual
Step 4 Click anywhere else on the page to start initializing the platform.
For first-time login, you will be automatically directed to the initialization process.
If you are not logging in for the first time, enter the IP address, port number of the
platform, username, and password, and then click Login.
1. The default user is system. Enter and confirm the password, and then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least two
types of characters: Uppercase, lowercase, number, and special character (excluding '
" ; : &).
2. Select your security questions and enter their answers, and then click OK.
The client will automatically log in to the platform by using the password you just set.
Please keep the security questions and answers properly. Otherwise, you password
cannot be recovered if you forget it.
34
User's Manual
35
User's Manual
You can also right-click the root organization, and then click Create Organization to
add an organization.
Related Operations
● Change organization name
Right-click the organization, and then click Rename.
● Delete an organization
Organization with devices cannot be deleted.
Select the organization, click , or right-click an organization and select Delete.
● Change the organization of devices
Select one or more devices, and then click Move To to move them to another organization.
Step 2 Click .
Step 3 Click .
36
User's Manual
● When using the platform for the first time, the platform automatically searches for
devices on the same network segment.
● If not the first time, the platform automatically searches for the devices in the network
segment you configured last time.
Figure 4-5 Search for devices
The devices have been added to the platform will not be displayed in the search results.
● You can select multiple devices to initialize them in batches. Make sure that the
selected devices have the same username, password and email information. The
information of these devices will be the same after initialization, such as password and
email address.
● Click next to Initialization Status to quickly sort out devices in certain status.
Step 3 Enter the password, and then click Password Security.
Step 4 Enter the email address, and then click Change IP.
37
User's Manual
For devices that have the same username and password, you can select and modify their
IP addresses in batches.
Figure 4-7 Change IP address
Step 3 Enter New IP , Subnet Mask and Gateway, and then click Save.
When setting IP addresses in batches, the IP addresses increase in sequence.
Step 4 Enter the username and password used to log in to the devices, and then click OK.
When you add devices by using automatic registration, IP segment, or importing, some devices will
fail to be added if they exceed the number of devices or channels allowed to be added to the
platform. These devices will be displayed in Devices without License.
There are multiple ways you can add devices to the platform, including using domain names, serial
numbers, IP addresses, IP segments, and automatic registration.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click
Step 3 Click Add.
38
User's Manual
Only Encoder devices support IPv6. If you want to add devices to the platform
through IPv6 addresses, you must first configure an IPv6 address for the platform. For
details, see "3.4.1 NIC Config".
● IP segment : Add multiple devices in the same segment. We recommend selecting
this option when the login username and password of the multiple devices in the
same segment are the same.
● Domain Name : We recommend selecting this option when the IP address of the
device changes frequently and a domain name is configured for the device.
● Auto Registration : We recommend this method when the IP address of a device
might change. The ID of auto register has to be in accordance with the registered ID
configured on the device you want to add. The port number must be the same on the
platform and on the device. The auto register port is 9500 on the platform by default.
To change the auto register port number, log in to the config system, select Network
Config > Network Mode, and then change the port number of DSS_ARS service.
After a device is added through auto registration, hover the mouse over its IP
address on the device list, and then you can see its local IP address and the IP
address it uses to connect to the platform.
Sleep function is supported for IPCs that use 4G mobile network to communicate
and are solar-powered only when they are added to the platform through
automatic registration.
● P2P : Add devices under a P2P account to the platform. The platform must be able to
access the P2P server. There is no need to apply for the dynamic domain name of the
device, perform port mapping or deploy a transit server when using it.
39
User's Manual
Devices on the same network with the platform server can be added using the automatic search
function.
Procedure
Step 1 Search for devices. For details, see "4.2.2.1 Searching for Online Devices".
Step 2 Select a device, and then click Add to Device List or .
If devices have the same username and password, you can select and add them in
batches.
Figure 4-9 Add in batches
Step 3 Select the server and organization, enter username and password, and then click OK.
Enter the device information in the template, and then you can add devices in batches.
Prerequisites
You have downloaded the template, and then enter device information in the template.
40
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Click Import.
Figure 4-11 Import devices
Step 4 Click Import File, and then select the completed template.
Step 5 Click OK.
41
User's Manual
For the devices that have been added to the platform, and their IP addresses have been changed,
you can edit their IP addresses directly on the platform so that they can connect to the platform
normally.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click Device Config.
Step 3 Click of a device.
Step 4 Edit the IP address, and then click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Click of a device, and then edit device information.
Click Get Info and the system will synchronize device information.
Figure 4-12 Basic information
42
User's Manual
Step 4 Click Video Channel, and then configure the channel information, such as the channel
name and channel features.
● The features that you can set for channels vary with the types of devices.
● If the device is added through the ONVIF protocol, you can configure the stream type
of it video channels.
Step 5 Click the Alarm Input Channel tab, and then configure number, names, and alarm types
of the alarm input channels.
Skip the step when the device does not support alarm input.
● Alarm type includes external alarm, Infrared detect, zone disarm, PIR, gas sensor,
smoke sensor, glass sensor, emergency button, stolen alarm, perimeter and preventer
move.
● Alarm type supports custom. Select Customize Alarm Type in the Alarm Type drop-
down list. Click Add to add new alarm type. It supports up to 30 custom alarm types.
Step 6 Click the Alarm Output Channel tab and then edit the number and names of alarm
output channels.
Step 7 Click the Audio and Light Channel tab, and then edit the number and names of the
audio and light channels.
This tab will only appear if the device has audio and light channels.
Step 8 Click OK.
Configure the channel features in batches so that devices can work normally. The platform also
displays the number of each type of channels features allowed to be configured to help you plan
the types and number of devices you will use.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 On the top of the page, select More > Capability Set Management.
Step 3 In the Capability Set Type drop-down list, select a type, and then the platform will only
display devices and channels that are configured with that type of capability set.
Step 4 Select the channels you want to configure.
Step 5 Click the area below the Features column, and then select one or more features.
Figure 4-13 Select capability sets
43
User's Manual
● If you want to configure more channels, click Save to save your current settings, and
then continue your configuration. When it is complete, click Complete to save the
settings and exit the page.
You can select multiple devices and change their passwords at the same time.
44
User's Manual
Step 4 Enter the old and new passwords, and then click OK.
After a device is added to the platform, you can click to go to the webpage of the device.
The platform supports accessing the webpage of a device through the HTTPS protocol. If you want
to use this function, you must complete the following steps. For details procedures on the device
webpage, see the user's manual of the device.
1. Log in to the webpage of the device, and then download the trusted CA root certificate.
2. Double-click the certificate, and then click Install Certificate.
3. Select Current User , and then click Next.
4. Store the certificate to Trusted Root Certification Authorities , and then click Next.
45
User's Manual
5. Click Finish.
6. On the webpage of the device, create a device certificate, and then apply it.
For the IP address in the certificate, you must enter the IP address of the computer that visits the
webpage.
You can configure whether to verify the login password. For details, see "8.3.1 Configuring
Security Parameters".
● The encryption password is used to protect the export file. It consists of 6 uppercase or
lower case letters, numbers, or their combination. You need to enter it when using the
export file.
● You can select All to export all the devices, or Selected to export the devices you
selected.
Step 6 Select a path on your PC, and then click Save.
46
User's Manual
If a device is accessed through ONVIF and the ONVIF version is earlier than 18.12, the device DST
cannot be edited on the platform. You can only edit it manually on the device.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Step 3 Select a device, and then click Time Zone Settings.
Figure 4-16 Modify device time zone
47
User's Manual
48
User's Manual
Parameter Description
Enable Turn on or off the recording plan.
Position Videos will be stored on the server by default. It cannot be changed.
● General recording: The device will continuously record videos within
the defined periods.
Recording Type ● Motion detection recording: The device will continuously record videos
within the defined periods on motion detections.
49
User's Manual
The platform can obtain and display the recording plan that has been configured on
EVS of the latest versions. You can check if recording plan are obtained and displayed
on the page to know if your EVS is of the latest version.
1. Click Add Recording Plan next to Device Recording Plan.
Figure 4-20 Add a device recording plan (1)
Parameter Description
Enable Turn on or off the recording plan.
Position Videos will be stored on the device by default. It cannot be changed.
The device will make recordings using the main stream by default. It cannot
Stream Type
be changed.
Remarks Customizable description for the recording plan.
Select a default time template or click Create Time Template to add a
Recording Time
new time template. See "4.2.6 Adding Time Template".
Related Operations
● Enable/disable a recording plan
means that the plan has been enabled. Click the icon and it becomes , and it means
that the plan has been disabled.
● Click : Copy the recording plan to other channels.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● Click to delete recording plans one by one.
50
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Storage Plan > Recording Plan.
Figure 4-21 Center recording plan
Step 2 Select General Recording Plan > Add General Recording Plan.
Step 3 Configure the parameters, and then click OK.
Parameter Description
Enable Turn on or off the recording plan.
Position Videos will be stored on the server by default. It cannot be changed.
51
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Storage Plan > Recording Plan.
Figure 4-22 Center recording plan
Step 2 Select Motion Detection Recording Plan > Add Motion Detection Recording Plan.
Step 3 Configure the parameters, and then click OK.
Parameter Description
Enable Turn on or off the recording plan.
Position Videos will be stored on the server by default. It cannot be changed.
● General recording: The device will continuously record videos within
the defined periods.
Recording Type ● Motion detection recording: The device will continuously record videos
within the defined periods on motion detections.
Related Operations
● Enable/disable a recording plan
52
User's Manual
means that the plan has been enabled. Click the icon and it becomes , and it means
that the plan has been disabled.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● Edit a recording plan
Click of corresponding plan to edit the plan.
● : Select multiple channels, and then delete them at the same time.
● and : Select multiple channels, and then enable or disable them at the same time.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Device.
Step 2 Click .
Figure 4-23 Add a retrieval plan for a channel
53
User's Manual
Parameter Description
Enable Turn on or off the retrieval plan.
Select a period, and then the videos within the defined period will
be uploaded. The platform supports uploading videos from devices
Backup Storage for Retrieval
within the past 7 days at most. Videos from the current day will not
be included.
Select the stream type of the videos that you want up upload.
Stream Type If the videos are recorded on sub stream 1 and Main Stream is
configured in this retrieval plan, uploading will fail.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Storage Plan > Recording Retrieval > Video Retrieval.
54
User's Manual
Step 3 Configure the parameters, and then select channels in the Retrieval Channel section.
Parameter Description
Enable Turn on or off the retrieval plan.
55
User's Manual
Parameter Description
Select a period, and then the videos within the defined period will
be uploaded. The platform supports uploading videos from devices
Backup Storage for Retrieval
within the past 7 days at most. Videos from the current day will not
be included.
Select the stream type of the videos that you want up upload.
Stream Type If the videos are recorded on sub stream 1 and Main Stream is
configured in this retrieval plan, uploading will fail.
Step 5 Configure name and periods. You can set up to 6 periods in one day.
Select the Copy From check box, and then you can select a template to copy from.
56
User's Manual
● On the time bar, click and drag to draw the periods. You can also click , and then
draw the periods for multiple days.
● You can also click to configure periods.
Step 6 Click OK.
Step 3 Enable one or more video types, set the retention period for each one, and then click OK.
Step 4 (Optional) Configure retention period for multiple channels.
1. Click OK and Copy.
2. Select to apply the current configuration to all other, or selected channels.
57
User's Manual
Events that can be configured are different for different types of devices. If you select
Device , you can only configure general events. If you select Channels, various events
supported by different types of channels will be displayed.
Figure 4-29 Go to the event configuration (device)
58
User's Manual
Step 4 Click Sync Rules , and then the system prompts Synchronization Complete.
Figure 4-32 Synchronize people counting rules from the device
59
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select User.
Step 2 Click .
Step 3 Click Add, set role information, and then select device and control permissions and assign
the rule to users.
Figure 4-33 Add a role
● If a device is not selected under Device Permissions or a menu not selected under
Menu Permissions, all users assigned with this role will not be able to see the device
or menu.
● Click of a selected organization. All permissions of subsequently added devices
under this organization will also be assigned to users of this role.
Step 4 Click OK.
Parameter Description
Username Used to log in to the client.
Multi-client Login Allow the user to log in to multiple clients at the same time.
60
User's Manual
Parameter Description
Password
Used to log in to the client.
Confirm Password
Enable Forced
Password Change at The user is required to change the password at first-time login.
First Login
Enable Password
Force the user to change the password regularly.
Change Interval
Enable Password Expiry
The password must be changed after it expires on the defined date.
Time
The PTZ control priority of the user. The larger the value, the higher the
priority. For example, User A has a priority of 2 and User B has a priority
PTZ Control
of 3. When they operate on the same PTZ camera, which is locked, at the
Permissions
same time, the PTZ camera will only respond to the operations from
User B.
Email Address Used to reset password and receive alarm emails.
Limit the user to log in from specific computers. One user can be bound
Bind MAC Address
to 5 MAC addresses at most.
Select one or more roles to assign the user permissions, such as which
Role
devices are allowed to be operated.
Step 3 Click OK.
Related Operations
● Click to lock user. The locked user cannot log in to the DSS Client and App.
● Click to modify information of a user except the username.
● Click to delete a user.
2. Click to enable the function, and then configure the parameters of the domain.
3. Click Get DN to automatically get the basic DN information.
4. Click Test to check whether the domain information is correct.
5. (Optional) Enable the automatic synchronization function and set a time. Then, the
platform will automatically synchronize news users in domain groups that you have
imported previously, and update the information of the users imported by manual
selection at the defined time every day.
For example, you have imported the entire domain group A. The platform will
synchronize new users in domain group A every day at the defined time. Click to
remove a group on the list, and then it will not be synchronized. For users imported by
61
User's Manual
manual selection, the platform will check their information, and update if anything
changes.
6. Click Save.
Step 2 Import domain users.
1. Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select User > User Management.
2. Click Import Domain Users.
3. Select how you want to import users, and then click Next Step.
● Import by Domain Group : Import all users in the selected group.
If you import an entire domain group and after the automatic synchronization
function is enabled, the platform will remember that group and automatically
synchronize its new users at the defined time every day, and update the
information of the users imported by manual selection at the defined time every
day. For details, see the previous steps.
● Import by Domain User : Import selected users in a group.
4. Click to select a role for the users.
All the permissions in the role will be assigned to the users.
5. Click OK.
62
User's Manual
Step 2 Enter the old password, new password, and then confirm the new password. Click OK.
63
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Storage.
Step 2 Select .
Step 3 Click Add.
Step 4 Select server name and mode, enter the IP address of network disk, and click OK.
● Normal mode: All volumes of the network disk will be added. Those used by any user
will be in red.
● User mode: Enter the username and password of a user. Only volumes of the network
disk assigned to this user will be added.
64
User's Manual
Step 5 Select disk, and then click to format the corresponding disk.
65
User's Manual
Related Operations
● To configure disk type, click .
● To format a disk, click .
● To set up local storage, you need a physical disk with only one volume or any volume of one
physical disk. Back up the data of the disk or volume before setting its disk type, which will
format and erase all data from it.
● One physical disk with only one volume or any volume of one physical disk can only store one
type of files. If you need to store more than one type of files, you need more than one physical
disks or volumes, but it cannot be the one where you installed the operating system of the
server or the management tool.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select Storage.
Step 2 Select .
Step 3 Format a disk to set a storage type
This operation will clear all data on the disk. Please be advised.
If you do not set up one or more disk types, you will not be able to properly use
corresponding functions. For example, if you do not set up an Image and File disk,
you will not see images in all alarms.
Step 4 Manage local disks.
● Initialize disk
Click .
● To configure disk type: Click .
● To format a disk: Select a disk or user volume, click
● Configure a hot standby disk
Select a disk, click , configure the parameters, and then click OK. The disk is
configured as backup disk that can replace the damaged disk in the RAID group.
66
User's Manual
Parameter Description
Local
Set disk as backup disk of designated RAID group. Recreate
system immediately when disk error happens in the RAID
group.
Hot Spare Type
Local hot spare is only applicable to RAID5.
Global
Set disk as backup disk of all RAID groups. Recreate system
immediately when disk error happens in any RAID group.
67
User's Manual
Step 2 Click .
Step 3 Click Add Disk Group, enter disk group name, and then select a server and disks.
Figure 4-42 Configure disk group
68
User's Manual
Parameter Description
● Save to Central Storage : All images produced by the channels
connected to this device will be stored on the network disks or
Event Image Storage local disks of the platform.
Location ● Link to Images on Device : All images produced by the channels
connected to this device will be stored on the device itself. The
platform will obtain images from the device.
69
User's Manual
5 Businesses Configuration
This chapter introduces the basic businesses, such as storage plan, video monitoring, access
control, video intercom, target detection, face recognition, parking lot, and intelligent analysis.
Parameter Description
Select the type according to the type of the device or channel.
70
User's Manual
Parameter Description
This is a type of event that is manually triggered. Click Add Soft
Trigger Event Type to customize its name and icon. When
Soft Trigger viewing the live video image of the configured channel in the
Monitoring Center, you can click the icon to trigger an alarm
manually.
When a combined event is triggered, the platform performs the
Combined Event defined linked actions. For how to configure combined events, see
"5.1.2 Configuring Combined Event".
● DHOP event: Access events developed through Dahua
Hardware Open Platform (DHOP).
● Extended standard event: This is used for events that devices
support, but the platform currently does not. Click Add
Extended Standard Event, and then configure the parameters.
Alarm Source : Access events from encoder devices, video
channels, and alarm input channels.
Custom Alarm Event Image : When configuring an event for a video
channel, you can choose whether to subscribe to images
from the event. When subscribing to pictures, the platform
will receive alarm images generated by the alarm source.
However, if the alarm source does not generate alarm
images, subscribing to the event images will cause the
platform to not receive the alarm.
Name and Alarm Code: Enter the name and code of the
event.
Step 4 Configure the priority, when the event can be triggered, and other information.
Parameter Description
The priority level is used to quickly know the urgency of the event
Priority
when it is triggered.
Select a time template for when the event can be triggered. If you
Time Template
want to create a new template, see "4.2.6 Adding Time Template".
Select a holiday template for when the event will not be triggered. To
create a new template, follow the steps below.
a. In the drop-down box, click Create Custom Holiday Template.
b. Enter a name for the holiday.
Holiday Template c. Click Add, and then add a period and adjust the time.
You can add up to 50 periods.
d. (Optional) If there are other holiday templates, you can select
Copy From, and then select a template to copy its periods.
e. Click OK.
Enter some content that is used for filtering among a large amount of
Tag
events.
Step 5 Configure alarm linkage actions.
71
User's Manual
● To link video, enable Linked Action > Link Video, and then configure the
parameters.
Parameter Description
Event source: The camera of the alarm itself is linked when the alarm
occurs.
Bound camera: If the channel is bound to one or more video
channels, you can view the real-time videos of the bound channel
Camera
when an alarm is triggered. To bind a channel, see "4.2.3 Binding
Resources".
Select camera: Select a camera so that you can view the camera
video when the associated alarm is triggered.
Enable this parameter, and then the platform will open the real-time
video of the channel where an alarm is triggered, and play it in the
defined stream type.
When an alarm is
triggered, display
camera live view on After the event is configured, select Local Settings > Alarm, enable
client Open Alarm Linkage Video and set how the video will be opened, As
Pop-up or Open in Live View. For details, see "9.3.4 Configuring Alarm
Settings".
For how to configure the pre-recording mode for devices in batches, see
"5.1.3.3 Configuring Alarm Video Pre-recording".
Prerecording Time
72
User's Manual
● To link a PTZ action, click Link PTZ, and then select the PTZ channels and presets to be
linked.
● Click Alarm Output, select an alarm output channel, and then set the duration. The
channel will send out alarm signal when an alarm is triggered.
● To link audio and light, click Link Audio and Light, select the audio and light
channels, and then select the action duration.
● Click Link Access Control Device, select door channels, and then select a linked
action. When an alarm is triggered, the door channels you selected will be locked,
unlocked, normally open or normally closed.
● Display the live video of specified channels on a video wall when alarms are triggered.
Click Link Video Wall, and then select the channels and video wall.
You must add a video wall and configure its alarm on video wall mode first. For details,
see "6.1.5.1 Configuring Video Wall" and "5.1.3.2 Configuring Alarm on Video Wall".
If you select Camera to Select Camera, you can configure which channels to be
displayed on the specified video wall. When the video wall you select is configure with
the override mode, you can also select Customize Alarm Window, and then you can
select which channels to be displayed on the specified windows of the video wall.
Figure 5-0 Display video of specified windows
● To execute an HTTP URL; command, click Link HTTP URL Command . Click Add, and
then configure its request method, HTTP URL, and remarks. You can click to test if
the command is valid.
● To link emails, enable Email, and click to add the email address, and then an email
will be sent to the selected email address when an alarm is triggered. You can also
manually enter an email address, but you must press Enter to make it valid.
To configure the email template, select Add Email Template from the Email
Template drop-down list.
● Apply an alarm protocol to help users process alarms when they are triggered. Click
Alarm Protocol , and then select a protocol from the Protocol Template drop-down
list.
Or you can click Add protocol template to create a new protocol.
Step 6 Select one or more users who will receive the notification when an alarm is triggered.
The users will only receive notifications when they are logged in. If you need to add more
users, see "4.3 Adding Role and User".
If the page becomes too long because you need to configure many parameters, you can
use the pane on the right to quickly go to different positions.
73
User's Manual
Parameter Description
Name Enter a name for the combined event.
Rule Select a rule.
Source of Combined Event Select the event and event source for event A and B.
Step 6 Click OK.
Related Operations
Configure the linked actions for the combined event. For details, see the previous section.
74
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Event > Alarm Config > Alarm on Video Wall.
Step 2 Click .
Step 3 Select a mode, and configure related parameters.
Parameter Description
● Override mode: When an alarm occurs, a live video is opened on
the specified window of a video wall. For example, if the live video
of channel 1 is opened on window 1, another alarm is triggered.
The platform will display the live video of channel 2 on window 1.
Alarm on Video Wall Mode ● Loop mode: Linked live videos will be displayed on windows of a
video wall according to the order of windows. If there are no
available window, the first window will be used. The number at
the end of the name of a window indicates its order. For example,
window(2) indicates it is the second window.
In either mode, if no other alarms are triggered, the current video will
be closed after the stay duration. If a new alarm is triggered:
● In override mode, the stay duration of the new video start from
the time when the alarm is triggered. It will be displayed on the
window after the stay duration of the current one ends. For
Stay Duration example, the stay duration is set to 30 s. An alarm is triggered
when video 1 is being played for 15s. At 30 s, video 1 will be
closed, and video 2 will be played. After 15 s, video 2 will be
closed.
● In loop mode, a new video will be displayed immediately even if
the stay duration of the current video does not end.
Parameter Description
There is only 1 window by default. Click it, and then you can set the
Set the number of windows
number of windows to 4, 9, 16, 32, or 64.
75
User's Manual
Parameter Description
● Click a window, and then drag its frame near the lower-right
corner to resize it.
Resize a window
Drag the windows to adjust their locations. This operation will not
change the order of the windows. The order is used to determine
Adjust the locations of which window will be used to display videos first in loop mode.
windows The number at the end of the name of a window indicates its order.
For example, a window named Window(2) means that it is the
second window.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Event > Alarm Config > Alarm Storm Config.
Step 2 Click an organization, and then all devices and channels in that organization will be
displayed on the right.
Step 3 Configure the pre-recording mode.
76
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Map.
Step 2 In the map list, select the vector map, and then click .
Figure 5-1 Map
77
User's Manual
● Online map
a. Select Online.
b. Configure the information of the map, and then click OK.
● Offline map
a. Select Offline.
b. Click Import and import offline map.
c. Configure map information, and then click OK.
Step 4 Add a sub map.
If there is a specific area on the map that you want to view its detailed information, you
can add an image of it on the map as a sub map. For example, you can add a plane image
of a parking lot on the map.
1. On the map resource tree on the left, click the name of the map that you have just
added, or open the GIS map and click Add Sub Map.
2. Name the sub map, upload a map picture, and then click OK.
3. Drag the map to adjust its position, and then click OK.
The sub map is added.
Related Operations
● Hide Device Name
Only display the icons of devices.
● Satellite Map
View the satellite map.
● Delete Devices
To delete a device from the map, click it and then click Delete Resource.
● Show Device
Select which type of resources you want to display on the map.
● Move
To move a device, click Move and then drag the device on the map.
● Select
78
User's Manual
To select one or more devices, click Select, and then click on the devices on the map one by
one.
● Pane
To select devices in batches, you can click Pane, and then draw a frame on the devices to select
the device.
● Clear
To clear all markings on the map, click Clear.
● Add Sub-map
To add a sub map on the current map, click Add Sub Map , click on the map to locate it, enter a
name, upload a map picture and then click OK.
● Length
Select Box > Length, connect two points with a line on the map (double-click to finish
drawing), and then the distance between the points is shown.
● Area
Select Box > Area, select a region on the map (double-click to finish drawing), and then the
area is measured.
● Add Mark
Select Box > Add Mark, and then mark information on the map.
● Reset
Select Box > Reset to restore the map to its initial position and zoom level.
79
User's Manual
80
User's Manual
Step 3 Drag the device channel from the left device tree to the corresponding location of the
map.
Parameter Description
This is for permission control. For example, if a user cannot access
Parent Group
Group A, then the user cannot access all the groups under Group A.
Group Name Enter a name for the group.
Only the roles and their users can view this group.
Roles Allowed Access
Click to see the users assigned with the roles.
81
User's Manual
To collect fingerprints or card number, connect a fingerprint collector or card reader to the
computer where the PC client is installed.
If you change the name of the attribute or click to disable it, the information you have
configured will still be on the platform. But if you click to delete the attribute, the
information you have configured will also be deleted and cannot be recovered.
82
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Personal and Vehicle Info.
Step 2 Select Person List > Persons > Add.
Step 3 Click Basic Info, and then configure the basic information of the person.
1. Hover over the profile, select Add Image > Select from Local Folder, and then follow
the on-screen instructions to upload an image from your computer. Or if your
computer is connected to a camera, you can select Add Image > Snapshot to take an
image.
Figure 5-6 Basic information
● Click on the Snapshot page, and then you can select a camera, pixel format,
resolution, and image quality. These parameters are only effective on the current
PC client.
● You can upload or take 2 images for better recognition results. Only certain devices
support this function. The 2 icons under the images indicate the first and second
image. If the icon is in blue, it means the corresponding image is selected.
You can import images for multiple people at the same time. For details, see "5.3.2.6
Importing Images of Persons".
2. Enter the information of the person as necessary.
● The ID is required and must be unique. It can be up to 30 characters, and letter-
number combination is also supported.
● The name of the person can be up to 127 characters.
Step 4 Click Additional Info, and then enter the information as necessary.
83
User's Manual
Parameter Description
The number of the room this person lives in. It is displayed in the
access records and video intercom operation records. Access
Room No.
permission of the corresponding VTO is also included when
authorizing access control permission to this person.
When several people live in the same room, you can set one of them
Homeowner as the homeowner.
Only the homeowner can register an account on DSS Agile VDP.
This function is only available for homeowner. After you select the
option, you must enter an email address in Basic Info. It will be used
as the username for the person to log in to DSS Agile VDP.
After the person is added, the platform will send the username and
VDP APP User password to the email address.
If the person does not receive the email, you can click Send
Invitation by Mail Again to send a new email.
Step 6 If the person has one or more vehicles, click Vehicle Info to add their information to the
platform, so that you can grant access permissions to this person's vehicles later.
● If the vehicles have been added to the platform, click Select from Vehicle List, and
then select the vehicles for this person.
● If the vehicles have not been added to the platform, click , enter the plate number,
and then select a color and brand.
Step 7 Click the Access Rule tab, and then configure the access permissions for this person.
● Configure the identification information for unlocking doors.
84
User's Manual
Parameter Description
a. Click Settings , select a device to issue cards, and then click OK.
b. Click , swipe a card on the device you select, the card number
will be recognized and displayed. Or manually enter the card
number.
One person can have up to 5 cards. There are two ways to issue
cards: by entering card No. or by a card reader. A card number is
8-16 numbers. Only second-generation access control devices
support 16-digit card numbers. When a card number is less than 8
numbers, the system will automatically add zeros prior to the
number to make it 8 digits. For example, if the provided number is
8004, it will become 00008004. If there are 9-16 numbers, the
system will not add zero to it.
Card
c. Click .
d. (Optional) Click to add more cards. You can add up to 5 cards for
each person.
After adding a card, you can:
this icon, it turns into , which indicates that the fingerprint has
been set as the duress fingerprint. Click it again to reset the duress
fingerprint as a normal one.
85
User's Manual
Parameter Description
If you already added access rules, this page will display available access rules for you to
select.
Figure 5-7 Available access rules
Parameter Description
Rule Name Enter a name for the rule.
86
User's Manual
Parameter Description
Access Point Type Only Door is available
Select a time template to define when the rule will be effective. For how
Time Template
to create a new template, see "4.2.6 Adding Time Template".
Select a holiday plan when the rule will not be effective. Follow the steps
below to create a holiday plan:
i. Select Add Holiday Plan in the drop-down list.
ii. Enter a name for the holiday plan.
iii. Click Add to add a holiday.
You can add up to 16 holidays.
iv. Configure the effective periods for each day in the holiday.
You can drag on the timeline below, or click to configure the time
more accurately. You can add up to 4 periods.
Holiday Plan v. Click OK.
Click to enable this function and select one or more zones. This
person will have access permissions to all the access points in these
Select by Zone zones.
Select by Access Point Click to enable this function and select one or more access points.
This person will have access permissions to all these access points.
4. Click OK to finish adding the rule.
5. Select one or more rules for this person, and then click OK.
6. When access controllers are added and passwords are required to unlock the door,
configure the password first.
Step 8 If you want to recognize this person by using images, enable the face comparison
function.
1. Click next to Face Comparison to enable the function.
2. Select a face comparison group.
You need to create a face comparison group first. For details, see "5.4.1.1 Creating Face
Comparison Group".
Step 9 If this person has one or more vehicles, you can grant parking lot access permissions to
them.
87
User's Manual
If there are no available vehicle groups, select Add Group in the drop-down list, and
then to add one. For details, see "5.8.3 Managing Vehicle Group".
Figure 5-8 Parking lot vehicle group
88
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Personal and Vehicle Info.
Step 2 Click .
Step 3 Select Import > Import from File.
Figure 5-10 Import personnel information
If there is no personnel information file, click Template Download and follow the
instructions on the page to create personnel information.
Step 5 Click OK.
The following cases might occur during an import:
● If there are failures, you can download the failures list to view details.
● Read carefully the instructions in the template to make sure all the information is
correct.
● Cannot read the contents with a parsing error reported directly.
Related Operations
● Export personnel information.
Select an organization, click Export, and then follow the instructions on the page to save the
exported information to a local disk.
89
User's Manual
● Download template.
To add personnel information in batches, you can download the template, fill in the information,
and then import it.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Personal and Vehicle Info.
Step 2 Click Sync Person in Domain.
Step 3 Import persons in the domain to the specified person group.
Parameter Description
90
User's Manual
Parameter Description
The list holds the domain groups that have
been imported entirely. After setting the time,
the platform will synchronize the new people
and update the information of the existing
people every day. For people import by
Auto Sync manual selection, the platform will update
their information. Click to remove the
group, the platform will not synchronize the
new people, but will still update the
information of the existing people.
Step 4 Click OK.
Step 4 Click , select a channel from an access control device or door station, and then click
OK.
91
User's Manual
92
User's Manual
● To add all the personnel information to the platform, click Import All.
● To add part of the information, select the people of interest, and then click Import
selected .
● To export information, select the people you want, and then click Export.
93
User's Manual
● Normal light colors should be used (without whitening, yellowing, and backlight). Items should
not block the face (such as hat, face mask, and glasses). The image must be be processed by
Photoshop.
● Use an image with a white background.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Personal and Vehicle Info > Person List > Persons.
Step 2 Click Import , and then select Import Person Images.
Step 3 Click Download Template to save the zip file to your computer. It contains the
instructions on how to prepare images, and 2 images for reference.
Step 4 Prepare images according to the requirements, and then rename them in the format of
Peson ID-Person Name-1.
1 means the first image of the person. Change it to 2 to make the second image of the
person.
Step 5 Compress the images into a .zip file.
Step 6 Click Import File, and then open the .zip file.
The page will display the number of successes and failures. Click Download Failure List
to see the reasons for the failures.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Personal and Vehicle Info.
Step 2 Click .
Step 3 Select the people to issue card to, and then click Batch Issue Card.
Figure 5-14 Issue card in batches
94
User's Manual
1. Double-click the Card No. input boxes to enter card numbers one by one.
2. Click OK.
● By using a card reader
95
User's Manual
1. Click .
2. Select a card reader or device, and then click OK.
Figure 5-16 Reader manager
3. Select people one by one and swipe cards respectively until everyone has a card
number.
4. Click OK.
When configuring an access rule for a person and vehicle group, you can only configure
general verification rules. If you want to configure other types of rules, see "5.5.3
Configuring Access Rule".
96
User's Manual
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Only General Verification is available. For this type of rules,
Rule Type
doors can be unlocked by cards, fingerprints, and passwords.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Select when this rule is not effective. Follow the steps below to
create a new holiday plan:
a. Select Add Holiday Plan in the drop-down list.
b. Enter a name for the holiday plan.
c. Click Add to add and configure a holiday.
You can add up to 16 holidays.
d. Configure the effective periods for each day in the holiday.
Select by Zone People can access all the access points in the selected zones.
Select by Access Point People can access the selected access points.
Step 5 Select the access rules, and then click OK.
Figure 5-17 Select access rules
97
User's Manual
If the owner has more vehicles than the set parking spots, once no parking spots
available, owner cannot access the parking lot.
d. Click to enable Vehicle Arming Group , and then click Add to arm the
vehicles you have just added.
Figure 5-19 Vehicle arming group
98
User's Manual
For arming group details, see "5.4.2.1 Creating Vehicle Arming Group".
● Add vehicles in batches
a. Click Import at the top, and then click Template Download.
b. Fill in the template, and then select Import > Import File. Click to select the file
and import.
The platform supports downloading files that failed to import for you to check and
fix.
Step 4 Click OK.
Step 5 (Optional) You can export vehicle information to local storage as needed.
Figure 5-20 Export vehicle information
● Click Export and then enter required information, such as passwords for login and
encryption, to export all the items.
● Select vehicles, and then click Export to export only the selected information.
Related Operations
● You can search vehicles by entering keywords in search box at the upper-right corner.
● Click or double-click the column to edit the vehicle information.
● Click to delete vehicles one by one. You can also select multiple vehicles and then click
Delete at the top to delete in batches.
99
User's Manual
100
User's Manual
When adding devices like NVR or IVSS which support face recognition, set the device feature
to Face Recognition. For details, see "4.2.2.5 Editing Devices".
Figure 5-22 Feature configuration
Make sure that you have configured at least one disk with the type of Images and Files to
store face images. Otherwise, the snapshots cannot be displayed.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Watch List > Face
Watch List.
Step 2 Click Add, and then configure the parameters.
101
User's Manual
Parameter Description
Face Comparison Group
Enter a name for the group.
Name
You can use colors to quickly differentiate each group. For
Color
example, red indicates key targets.
Only the roles and their users can view this group.
Roles Allowed Access
Click to see the users assigned with the roles.
102
User's Manual
Step 4 After the face watch list is successfully sent, click Next Step.
Step 5 Click Add, select the channels you want to arm, and then configure the similarity for each
channel.
When the similarity between the face captured by the channel and a face in the face
watch list reaches or is greater than the defined value, it is considered a match.
103
User's Manual
Parameter Description
Vehicle Arming Group Name Enter a name for the group.
104
User's Manual
Parameter Description
You can use colors to quickly differentiate each group. For
Color
example, red indicates key targets.
Only the roles and their users can view this group.
Roles Allowed Access
Click to see the users assigned with the roles.
Step 2 Click of a group, or double-click a group, an then click Select from Vehicle List.
● Add vehicles by vehicle groups. This is the most efficient way, provided that you have
created vehicle groups. For details, see "5.3.2 Configuring Personnel Information".
Click Add by Vehicle Group , select one or more groups, and then click OK. You can
also select Include Sub Groups to include the vehicles in the sub groups of the
groups you select.
● Select the vehicles you want to add. This is applicable to vehicles that you want to add
are in different vehicle groups.
Click Add by Vehicle , select the vehicles you want to add, and then click OK.
Log in to the DSS Client. On the Home page, click , and then arm the vehicle on the Event page.
Click Add to add an event to arm a vehicle watch list. For how to configure events, see "5.1
Configuring Events".
105
User's Manual
5.5.1 Preparations
Make sure that the following preparations have been made:
● Access control devices are correctly deployed. For details, see the user manual of the device you
are adding to the platform.
● Basic configurations of the platform have been finished. See "4 Basic Configurations" for details.
When adding access control devices, select Access Control as the device category.
(Optional) You can bind video channels to access control channels, so that you can monitor
the area near access control devices. For details, see "4.2.3 Binding Resources".
Add persons to the platform For details, see "5.3 Personnel and Vehicle Management".
106
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click .
Step 3 Configure the information, and then click OK.
Parameter Description
Select a parent zone for permission management. For example, if a
user has permissions for zone A, the user also has permissions for all
Parent Zone
sub zones under zone A by default. Additional permissions can be set
for the sub zones.
Zone Name Enter a name for the zone.
Select an icon for the zone. Icons are used for users to quickly identify
Icon
different zones.
Only the selected roles and their users can access this zone.
Roles Allowed Access
Click to see the users assigned with the roles.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
107
User's Manual
Parameter Description
The number indicates the level of the zone. The region with a larger
Level number is a sub zone of the region with the smaller number. For
example, the level 2 zone is a sub zone of the level 1 zone.
Zone Name Enter a name for the zone.
Enter a start number and then all the zones of this level will be
automatically numbered. For example, if the start number is 1 and the
Start Zone No.
quantity of zones is 3, then zones will be numbered as zone 1, zone 2, and
zone 3.
Enter a number for each zone. The number of each level of zones = upper
Quantity levels × the current level. For example, the numbers of level 1, 2 and 3 are
1, 2, and 3. Then, the number of level 3 zones = 1×2×3 = 6.
Select an icon for the zone. Icons are used for users to quickly identify
Select Icon
different zones.
Step 5 Click OK.
The roles that are allowed to access the parent zone will be automatically applied to the
sub zones.
Log in to the DSS Client. On the Home page, click , and then in the App Config section, select
Access Control > Zone Management.
● Click a zone and then click to edit the information of the zone, including the name, icon, and
roles allowed access.
108
User's Manual
● Click a zone and then click to delete it. After deleting the zone, all information related to the
zone will also be deleted, including sub zones, access rules, and maps. Access points in this zone
and its sub zones will be moved to the root zone.
Right-click an access point, select Move To, and then select a zone.
● Move multiple access points.
a. Drag to select multiple access points. Or hover the mouse over an access point,
click the checkbox to select it, and then repeat the operations to select multiple
access points.
Figure 5-28 Drag to select multiple access points
b. Drag the access points to a sub zone. Or click Move To and then select a zone. Or
right-click any selected access point, click Move To and then select a zone.
109
User's Manual
View the information of an access point, including the name, type, zone it belongs to, linked
resources, and access rules.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click a zone, and then click Access Point.
Step 3 Double-click an access point to view its details.
● Access Point Name : The name of the access point that can be changed.
● Access Point Type : Displays the type of the access point.
● Zone Name : Displays the name of the zone the access point belongs to.
● Linked Resources : Displays the channel name and type of the access point, the name
and type of the intercom device it belongs to, and video channels that are bound to it.
If you want to bind resources to this access point, you can click Channel Binding to
quickly go to the page. For details on channel binding, see "4.2.3 Binding Resources".
● Access Rule : Displays the access rules applied to this access point itself, and from the
zone it belongs to. Double-click a rule to view its details. You can add or delete the
rules, but the rules from the zone cannot be deleted.
Setting access points as boundaries to count people that entered, exited, or are staying in a zone.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click a zone, and then click Access Point.
Step 3 Right-click an access point and select Set as Boundary.
will be displayed on the lower-right corner of the icon of the access point.
The name of an access point is by default device name_channel name. It can be changed as you
need.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click a zone, and then click Access Point.
Step 3 Right-click an access point, and then select Rename.
Step 4 Enter a name, and then click anywhere on the screen to finish renaming.
110
User's Manual
When configuring an access rule for a zone, you can only configure general verification
rules. If you want to configure other types of rules, see "5.5.3 Configuring Access Rule".
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Only General Verification is available. For this type of rules,
Rule Type
doors can be unlocked by cards, fingerprints, and passwords.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
111
User's Manual
Parameter Description
Select when this rule is not effective. Follow the steps below to
create a new holiday plan:
a. Select Add Holiday Plan in the drop-down list.
b. Enter a name for the holiday plan.
c. Click Add to add and configure a holiday.
You can add up to 16 holidays.
d. Configure the effective periods for each day in the holiday.
Select one or more person groups, and then all the persons in
Select by Person Group the groups will have permissions to access all the door channels
in the zone.
Select one or more persons, and then they will have permissions
to access all the door channels in the zone.
Select by Person
Select Include Sub Groups to display all the persons all the
persons in the selected group and its sub groups.
112
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click a zone, and then click Map Info.
Step 3 Click Configure Map to add a map for the zone.
● Select a map that has been added to the platform.
● Upload an image as the map. After added, the map will be added to the platform as a
main map. To know more about maps, see "5.2.2 Adding Map".
Step 4 Click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Zone Management.
Step 2 Click a zone, and then click Map Info.
Step 3 Drag a sub zone or access point to the map.
Figure 5-30 Drag and mark
113
User's Manual
When marking a sub zone, you need to configure a map for it.
● If a map was added as the sub map of the current map, you can select it directly as the
map for the sub zone.
● If no map was added for the sub zone, you can add a new map for it. The new map will
be added as the sub map of the current one.
● If you added a map for the sub zone, but it is not a sub map of the current one, you
cannot mark the sub zone on the map.
Log in to the DSS Client. On the Home page, click , and then in the App Config section, select
Access Control > Access Rule > All Rules.
● Double-click a rule to view its details.
● Click of a rule to view its authorization progress. If exceptions occur, click to view their
details. Follow the reason and prompt to handle the exception, and then click Send Again to
send the rule again, but it only applies to General Verification rules. For other types of rules,
you can only send them again manually.
114
User's Manual
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Select Door.
Rule Type Select General Verification.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Select when this rule is not effective. Follow the steps below to
create a new holiday plan:
a. Select Add Holiday Plan in the drop-down list.
b. Enter a name for the holiday plan.
c. Click Add to add and configure a holiday.
You can add up to 16 holidays.
d. Configure the effective periods for each day in the holiday.
Select one or more zones, and then this rule will be applied to all
Select by Zone
access points in the zones.
Select by Access Point Select one or more access points.
Select one or more person groups, and then all the persons in
Select by Person Group the groups will have permissions to access the selected access
points.
115
User's Manual
Parameter Description
Select one or more persons, and then they will have permissions
to access the selected access points.
Select by Person
Select Include Sub Groups to display all the persons in the
selected group and its sub groups.
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Normally Open.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Select by Access Point Select one or more doors.
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Normally Closed.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Select by Access Point Select one or more doors.
116
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Access Rule > All Rules.
Step 2 Click Add.
Step 3 Configure the parameters, and then click OK.
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Fir-person Unlock.
● Normal : Other persons must verify their identifications to
Rule Type after Unlocked by pass.
First Person ● Normally Open : All people can pass without verifying their
identifications.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Select by Access Point Select one or more doors.
Select one or more persons, and then they will have permissions
to access the doors.
Select by Person
Select Include Sub Groups to display all the persons all the
persons in the selected group and its sub groups.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Access Rule > All Rules.
117
User's Manual
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Multi-person Unlock.
The all-period time template is used by default and cannot be
Time Template
changed.
Select by Access Point Select one or more access points.
Configure up to 4 unlock groups. Persons must verify their
identifications in the group order to unlock doors.
a. Select Add > Add.
b. Enter a name for the group.
c. Add one or more persons to the group. You can add up to 50
persons to the group. Select Include Sub Groups to display
all the persons in the selected group and its sub groups.
Step 3 configure the unlock method for each group, including card, password, fingerprint, and
face.
118
User's Manual
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Anti-passback.
Only local anti-passback is supported. You can select the door
Anti-passback Type
channels of an access control device.
If people do not pass in the defined order, they will not be
allowed to pass any door within the reset time. After the reset
Reset Time
time, they must follow the order from the beginning. The reset
time can be down to 5 minutes and up to 300 minutes.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
Add doors to different groups, and then people must pass in the
Anti-passback Group
group order to access the doors in the last group.
119
User's Manual
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Multi-door Interlock.
The all-period time template is used by default and cannot be
Time Template
changed.
Select an access control device, and then add its doors to
different groups. When a door in any group is unlocked, people
cannot pass through any other door.
Multi-door Interlock Group If you have configured a remote verification rule at the same
time for any door here, people cannot unlock the door if multi-
door interlock is effective. For example, if a person unlocks a
door in group 1, other people cannot open any door in group 2
through remote verification.
Parameter Description
Rule Name Enter a name for the rule.
Access Point Type Only Door is available.
Rule Type Select Remote Verification.
Select when this rule is effective. If you want to create a new time
Time Template
template, see "4.2.6 Adding Time Template".
120
User's Manual
Parameter Description
Select by Access Point Select one or more doors.
Results
When a person wants to unlock a door, a pop-up will be displayed on the platform. You can open
the door or ignore the request.
Figure 5-32 Remote verification
Log in to the DSS Client. On the Home page, click , and then in the App Config section, select
Access Control > Access Rule > Rule Maintenance > All Abnormalities.
Click the name of a person or access point to quickly go to the corresponding page for
configurations. Handle the exceptions according to the reasons and prompts, and then click Send
Again to send the rules again.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Access Control > Access Rule > Rule Maintenance > Consistency
Verification.
121
User's Manual
Step 5 (Optional) If exceptions occur, click to view details. Handle the exceptions according
to the reasons provided by the platform, and then click Send Again.
122
User's Manual
Step 4 Enter the template name, set time periods, and then click OK.
There are two ways to set time periods:
● Drag your mouse cursor on the time bars to select time sections. To remove a selected
time section, click on the time bar and drag.
● Click , and then set time periods in the Period Setup dialog box.
123
User's Manual
124
User's Manual
The page is only for reference, and might vary with different access control devices.
Parameter Description
Reader Direction Indicates the in/out reader based on the wiring of ACS.
Set access control status to Normal , Normally Open, or Normally
Mode
Closed.
You can only enable forced entry and timeout alarms when the door
Enable Door Sensor
sensor is enabled.
● Duress: Entry with the duress card, duress password, or duress
fingerprint triggers a duress alarm.
● Unsuccessful Attempts Exceeding Limit: If failed to unlock the door
Enable Alarm for certain times, an alarm will be triggered.
● Forced Entry: If the door is unlocked by methods you have not
configured, the door contact is split and triggers an intrusion alarm.
● Timeout: Unlock duration timeout triggers a timeout alarm.
Enable this function, and then you can use a public password to unlock
Public Password the door. For how to configure a public password, see "5.5.4 Configuring
Public Passwords".
Sets up for how long the door will unlock. The door locks automatically
Unlock Duration
after the duration.
Unlock duration exceeding the Unlock timeout triggers a timeout
Unlock Timeout
alarm.
You can use any one of the methods, card, fingerprint, face, and
password, or their combinations to unlock the door.
● Select And, and select unlock methods. You can only open the door
Unlock Method
using all the selected unlock methods.
● Select Or and select unlock methods. You can open the door in one
of the ways that you configured.
For each day of the week, you can set up to 4 periods, and the unlock
method for each period. For example, card is set for Monday
08:00-12:00, then people can only user their cards to open the door
Unlock by Period every Monday from 08:00 to 12:00.
Use the Copy to function to quickly apply the current configurations to
one or more days.
125
User's Manual
● Basic configurations of the platform have been finished. To configure, see "4 Basic
Configurations".
When adding video intercom devices on the Device page, select Video Intercom as the
device category.
When adding access control devices that support intercom, select Device Category to
Access Control in Login Information, and then select Access Control Recognition
Terminal.
Click on the page of call group, management group or relation group, the system will restore
management group and relation group to their original status.
126
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Video Intercom.
Step 2 Click .
Step 3 Click Relation Group Config.
Step 4 Click Add.
127
User's Manual
Step 5 Enter the group name, and then select one or more call groups and manager groups.
Figure 5-37 Add a group relation
Because only up to 2 manager groups will receive a call, we recommend you select no
more than 2 manager groups.
Step 6 Click or to adjust priorities of the manager groups, and then click OK.
The upper manager group has higher priority.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Video Intercom.
Step 2 Click .
Step 3 Enable or disable building and unit as required, and then click OK.
This configuration must be the same as the device configurations. Otherwise, information
of the devices might be incorrect. For example, if only Building is enabled on a VTO, you
must only enable Building on the platform.
Step 4 Click Save.
128
User's Manual
Step 2 Click .
Step 3 Select an organization node (VTO), and then click Send Contacts.
Step 4 Select one or more VTHs as needed, and then click OK.
Now you can view contacts on the VTO or web page. If the contacts are failed to be sent,
reasons will be provided.
Make sure that contacts are sent to the VTO; otherwise you cannot set private password.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Video Intercom.
Step 2 Click .
Step 3 Select a VTO, and then you can see all the VTHs linked to this VTO.
Step 4 Select a VTH and click , or select several VTHs and click Change Password.
Step 5 Enter password, and then click OK.
You can use the new password to unlock on the VTO.
The format should be room number + private password , and the room number consists
of 6 digits. For example, a person who lives in 1001 with the private password of the VTO
in the building being 123456, can enter 001001123456 to unlock the door.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Video Intercom.
129
User's Manual
Step 2 Click .
Operation Description
The App user cannot log in for 600 s after being frozen.
Freeze APP user The account will be frozen when invalid password attempts exceeds 5 by
an App user.
Click and enter a new password on the Reset Password page, and
then click OK.
Delete APP user Click to delete App users one by one, or select multiple App users, click
Delete, and then follow the instructions to delete the users.
5.7.1 Preparations
● Access control devices have been added into the platform.
● Basic configurations of the platform have been finished. To configure, see "4 Basic
Configurations".
130
User's Manual
Sign out regularly: Expired visits will be automatically ended at the defined time
point.
Daily sign-out time: For visitors who do not arrive for their appointment before the
daily sign-out time, their appointment will be canceled.
Sign out now: For visitors who missed their appointment when you click this
button, their appointment will be canceled.
● Default visitor permissions: Set the default access permissions for visitors.
● Email template: You can set up an email template and automatically send emails when
visitors make an appointment, arrive for their appointment, and end their visit. You
can customize the email subject and content with the visitor information, such as
visitor's name and ID number.
● Visitor pass remarks: Customize the content of remarks on a visitor pass.
Figure 5-38 Customize visitor pass remarks
131
User's Manual
5.8.1 Preparations
Make sure that the following preparations have been made:
● Devices, such as ANPR cameras, VTOs, barriers, are added to the platform.
● Basic configurations of the platform have been finished. To configure, see "4 Basic
Configurations".
When adding an ANPR camera, select Access ANPR Device as the device category.
After you have added ANPR cameras, you can bind video channels to their channels. This is
useful when you have installed other cameras at the entrance to view and record videos of
the entire scene, not just the vehicle. You can view video from the bound camera when
checking the alarm details. For how to bind channels, see "4.2.3 Binding Resources".
When adding an NVR, select Encoder as the device category.
Select Entrance ANPR from Features for the corresponding NVR channels.
When adding VTO, select Video Intercom as the device category.
Also, you need to add the information of people and assign them permissions so that they
can use the VTO normally. For details, see "5.3 Personnel and Vehicle Management".
Make sure that the configuration of building and unit on the DSS client is the same as the
device. If building and unit are enabled on the platform, they must also be enabled on the
device, and vice versa. Otherwise, the VTO will be offline after being added. For details, see
"5.6.3 Configuring Building/Unit".
Snapshots taken by ANPR cameras are stored in the Images and Files disks. You must
configure at least one Images and Files disk so that snapshots of vehicles can be normally
displayed. For details, see "4.4 Configuring Storage".
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the App Config
section, select Parking Lot > Parking Lot Configuration > Parking Lot Basic Config.
Step 2 Click the root node named Current Site , and then click Add.
Step 3 Configure the basic information of the parking lot, and then click Next Step.
132
User's Manual
Parameter Description
Parking Lot Name To differentiate from other parking lots.
When you enable multiple rules, the platform will check if each
rule is satisfied. Only when one or more rules are satisfied will
platform consider it to be a match. For example, 1 character added
to the front of the plate number, and missing the first character of
the plate number are both enabled. When the plate number
AB12345 is recognized as AAB12345, it satisfied 1 character added
to the front of the plate number, but not missing the first
character of the plate number. This will be considered as a match.
If the plate number AB12345 is recognized as AB112345, it does
not satisfy both rules. This will not be considered as a match.
Auto overwrite when If a vehicle entered the parking lot but has not exited, a new entry
captured vehicle has not record will be generated when the vehicle is recognized to have
existed entered again.
Step 4 Configure the entrance and exit points, and then click Next Step.
133
User's Manual
5. If there is an exit point, click next to Exit, and then configure the parameters.
The parameters are similar to the ones in Entrance. For details, see the steps above.
Step 5 Configure the passing rules, and then click Save and Exit.
1. Select a vehicle entrance rule, and then configure the parameters.
134
User's Manual
Parameter Description
● Registered Vehicles Access Rule
Click Add , and then select By Parking Lot or By Point.
By parking lot: The vehicle groups will be added to all entrance
and exit points of the parking lot, and the vehicles in these group
can enter and exit through any entrance or exit.
By point: You can add different vehicle groups to different
Registered Vehicles entrance or exit points. For example, vehicle group is added to
East entrance but not South entrance, then the vehicles in the
group can only enter the parking lot through East entrance.
● Allow Passage When Available Space is 0 : After enabled,
vehicles are allowed to enter the parking lot even if there are no
available parking space.
All Vehicles Click Add , and then select By Parking Lot or By Point.
By parking lot: The vehicle groups will be added to all entrance
and exit points of the parking lot, and the vehicles in these group
can enter and exit through any entrance or exit.
By point: You can add different vehicle groups to different
entrance or exit points. For example, vehicle group is added to
East entrance but not South entrance, then the vehicles in the
group can only enter the parking lot through East entrance.
135
User's Manual
Parameter Description
For how to configure vehicle groups, see "5.8.3 Managing Vehicle Group".
2. Select a vehicle exit rule, and then configure the parameters.
The parameters are similar to the ones in the entrance. See the previous step.
3. Enable Send Plate No. to Devices, and then add vehicle groups to the allowlist and
blocklist.
Devices can use this information to determine which vehicles to let in when the
platform is offline.
Related Operations
● : Edit the passing rules of the parking lot.
● : Edit the available parking space of the parking lot.
● : Edit the information of the parking lot.
● : Delete the parking lot.
136
User's Manual
Blocklist alarm will not be displayed because there are no additional parameters to be
configured.
Step 4 Click to configure an event.
Parameter Description
● Overtime Parking Threshold : The unit is minute. Alarm will
be triggered if a vehicle has parked for longer than the
defined value.
● Detection Interval : How long the platform will check which
vehicles have parked overtime. For example, select 5 minutes,
then the platform will check whether there are vehicles that
have parked overtime in the parking lot. If yes, then an alarm
will be triggered.
● Vehicles to Trigger Alarms :
All Vehicles : All vehicles will trigger alarms if they park
overtime, but VIP vehicles are not included. If you enable
Include VIP Vehicles, VIP vehicles will also trigger alarms
Parking Overtime when they park overtime.
Non-registered Vehicle and Vehicle in the Blocklist :
The vehicles whose information is not registered to the
platform will trigger alarms when they park overtime.
Custom : Enable Non-registered Vehicle, and then the
vehicles whose information is not registered to the
platform will trigger alarms when they park overtime;
enable Registered Vehicle and add vehicle groups, and
then the vehicles in these groups will trigger alarms when
they park overtime.
137
User's Manual
Parameter Description
● No Entrance/Exit Record Duration : The unit is day. If a
vehicle has not entered or exited the parking lot for longer
than the defined duration, then an alarm will be triggered.
● Statistical Time Point : The platform will start calculating the
No Entry and Exit Record duration of a vehicle that has not entered or exited the
parking lot on the defined time.
● Entrance and Exit Vehicle Group of Interest : Only calculate
the duration for the vehicles in the vehicle groups that are
added.
Step 4 Click of a group, or double-click a group and click Select from Vehicle List , select the
vehicles that you want to add to the group, and then click OK.
138
User's Manual
Parameter Description
People Counting Group
Name of the people counting group.
Name
Pass No. The calibration time can only be configured on the hour. It is the start of
Calibrate Number of a counting cycle.
People Staying ● The number of people staying everyday will be set to the defined
Everyday value every day on the calibration time.
Calibration Time ● After Pass No. is enabled, the number of people pass by will be
displayed. The value will be set to 0 every day on the calibration time
Calibrated Number of by default.
People
Calibrate Number of
People Staying Now The number of people staying will be set to the defined value after this
Calibrated Number of group is added. The value will not be calibrated every day.
People
Limit Number of People When enabled, you can configure the red and yellow light threshold of
the people in the group.
Red Light Threshold
● When the number of people in the group reaches the defined value,
139
User's Manual
Parameter Description
Select the devices whose people counting rules you want to include in
Rule
the group, and then their data will be combined together.
03:00:00 on Wednesday, the data from Wednesday to Tuesday of each week will be
sent to your email at 03:00:00 every Wednesday.
● Monthly report: Data from last month will be sent to your email at a defined time. If set
to 03:00:00 on 3rd, the data from 3rd of last month to 2nd of the current month will be
sent to your email at 03:00:00 on 3rd of each month.
Step 3 Configure one or more email addresses to send the report to, and the content of the
email.
1. Click to select the users that have been configured email addresses, or enter an
email address, and then press Enter.
Figure 5-42 Invalid email address, you must press Enter
140
User's Manual
6 Businesses Operation
6.1 Monitoring Center
The monitoring center provides integrated real-time monitoring applications for scenarios such as
CCTV center. The platform supports live video, license plate recognition, target detection, access
control, emap, snapshots, events, video playback, video wall, and more.
Log in to the DSS Client. On the Home page, click , and then select Monitoring Center.
Figure 6--1 Monitoring center
2 Real-time videos Drag a channel to the windows and view its real-time video.
141
User's Manual
142
User's Manual
This section only introduces viewing live video. For map live view, see "5.2 Configuring Map".
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring
Center > Monitoring.
Step 2 Click Live View tab.
Step 3 View real-time video.
You can view live video in the following ways:
● Double-click a channel or drag the channel from the device list on the left to one
window on the right.
● Double-click a device to view all channels under the device.
● Right-click a node, select Tour, and then set tour interval. The channels under this
node will play in turn according to the defined interval.
If the number of splits in the window is more than the number of online channels,
video of all channels will be displayed in the window. Otherwise, click on the
top of the page to turn pages.
Close the on-going tour before starting live view.
143
User's Manual
Step 4 You can perform the following operations during live view.
● Display intelligent snapshots.
When viewing live video of face detection cameras, face recognition cameras, ANPR
cameras, or target detection cameras, right-click the monitoring image, and then
select Start Picture Overlay. The snapshot will be displayed on the upper-right corner
of the live window. If no more images are captured, a snapshot will be displayed up to
5 s by default, and it will disappear after 5 s.
Point to the live window, and then select type of images to be displayed.
● Point to the video window, and then you can see the shortcut menu on the upper-
right corner.
Figure 6-1 Live window
144
User's Manual
Audio
Start two-way audio with the device the channel belongs to.
communication
Click it, and then the system begins to record local file and you
can view the record time on the upper left. Click again, and
then system stops recording and saves the file to your PC. The
Local record
recorded video is saved to ..\DSS\DSS Client\Record by default.
To change the storage path, see "9.3.5 Configure File Storage
Settings".
Take a snapshot. The snapshots are saved to ..\DSS\DSS Client
Snapshot \Picture by default. To change the snapshot storage path, see
"9.3.5 Configure File Storage Settings".
The device will regularly request to sleep to save battery. When you are viewing its
live video, the device will request to sleep every 2 minutes. When you are not
viewing its live video, the device will request to sleep every 1 minute. You can
accept or reject so that you can continue to watch live video. When rejecting the
request, you can choose whether to delay the next request from the device.
145
User's Manual
● Right-click the live video, and then the shortcut menu is displayed.
The menu varies depending on the functions supported by the device you are
operating on.
Parameters Description
If the camera has more than one audio input channels, you can select
Audio Input Selection one or select the mixed audio. This configuration is effective with both
live view and playback.
146
User's Manual
Parameters Description
Adjust the brightness, contrast, saturation, and chroma of the video
Video Adjustment
for video enhancement.
Click it, and then click and hold the video image to zoom in on the
Digital Zoom image. Right-click the image, and then select Digital Zoom again to
exit zooming in.
Divide one window into 2 (1+1 mode), 4 (1+3 mode), and 6 (1+5
mode). One window will play the real-time video, and the others play
different defined areas of the real-time video.
Window Mode
If a device supports target tracking, you can enable this function in
any window mode, the windows that play defined areas of the real-
time video will follow the target when detected, until it disappears.
Displays rule lines, bounding box on targets, and detection area for
intelligent rules, except for motion detection. After enabled, the
configuration will be saved, and only works on the current channel in
AI Overlay the live view and playback.
147
User's Manual
Parameters Description
● If a channel supports electronic focus, you can enable electronic focus for it on the
platform to adjust video definition and size.
The page might vary according to the lens types of cameras. Lens types include
embedded zoom lens and external CS electronic lens. The following figure is for
reference only.
148
User's Manual
Parameters Description
Zoom in/out.
Zoom +/- (for
embedded zoom lens) Click or click and hold or , or drag the slider to the left or right
to zoom in/out.
149
User's Manual
To exit the Window Mode, right-click the window and then select .
150
User's Manual
Click on the upper-right corner to select and search for the target in DeepXplore.
151
User's Manual
Click to open the event panel, which displays the real-time alarm events of the
channel.
Click the event type on the top of the event panel to view the corresponding event.
Click event record to view the snapshot. Video playback is also supported.
Operations related to different events might be different.
: Refreshes events in real time. : Stops refreshing.
Click to clear the events in the event panel.
Click to quickly view the latest events.
● Remotely unlock the door.
When viewing the access control channel, you can remotely control the status of the
door on the upper-right corner: Normally open ( ), normally closed ( ), or normal
status ( ). You need to enter the login password of the current user before operation.
Restore the door to normal status first, and then the door can be opened and closed
according to defined period or through face recognition.
In the video window of the access control channel, you can remotely lock or unlock
the door.
152
User's Manual
● Video intercom.
When viewing the video intercom channel, you can answer or hang up the call.
Figure 6-11 Video intercom
6.1.2.2 View
The current layout and resources can be saved as a view for quick play next time.
153
User's Manual
Views can be categorized in public views and private views. Only administrators are allowed to
configure public views, and the users specified by them can access certain public views. Private
views are configured and owned by users themselves. They can share private views to other users.
Views are categorized into different groups, which include three levels: First-level root node,
second-level grouping and third-level view. Tour is supported for first-level root node and second-
level grouping. The tour time can be 10 s, 30 s, 1 min, 2 min, 5 min, 10 min, or customized (5 s–120
min). Up to 1000 views can be created.
Public view groups are used to organize public views. Besides the root group Public View, you can
create only one level of sub groups. Only administrators are allowed to create public view groups.
Background Information
By default, all users are allowed to access Public View and its views. If you want to control access,
create groups that can be access by specified roles and their users, and save views to the groups.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring
Center > Monitoring.
Step 2 Click View.
Step 3 Right-click Public View , and then select Create View Group.
Step 4 Enter a name for the group, and then select the roles that are allowed to access this
group.
Private view groups are used to organize private views. Besides the root group Private View, you
can create only one level of sub groups. Private views are configured and owned by users
themselves. They can share private views to other users.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring
Center > Monitoring.
Step 2 Click View.
Step 3 Right-click Private View , and then select Create View Group.
Step 4 Enter a name for the group, and then click OK.
Views are categorized into public or private view groups. They are used to quickly apply different
resources and settings. For example, a view contains the live videos of multiple channels, split
mode, number of alarm windows, and more. When you open the view, these configurations will be
applied at the same time, and you do not need to configure them from again.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring
Center > Monitoring.
154
User's Manual
Step 2 Configure the split mode, and then drag channels, maps, and the browser to the
windows.
Parameter Description
Select a type for the view. Only administrators can create a public view.
View Type
If the view is saved to Public View, all users can access it.
View Name Enter a name for the view. It can be the same as other groups or views.
View Group Select a group the view belongs to based on its type.
When you need to change the resources or settings in a view, you can update them directly
without creating a view.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring
Center > Monitoring.
Step 2 Click View.
Step 3 Double-click or drag a view to a window to open it.
Step 4 Change the resources or settings, such as the split mode, number of channels and alarm
windows, and the locations of the channels.
● Live view
Double-click or drag a view to a window to view its resources.
● Tour
Right-click a view group, select Tour and set the tour period.
155
User's Manual
The share will fail if the user's view groups or views reach the limit. You can share again
after the user deletes a group or view.
6.1.2.3 Favorites
Add frequently used channels to favorites so that you can quickly locate and operate on them. You
can also share your favorites to other users.
Each user can create up to 999 favorites folders. The number of channels in all favorites folders can
be up to 2,000.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring.
Step 2 Click Favorites.
Step 3 Click a folder and click , or right-click a folder and select Add a Favorites.
Step 4 Select a parent node, enter a name for the folder, select the channels to be added to the
folder, and then click OK.
The favorites folder is added as a sub folder under the parent node you selected. The
maximum level of a favorites folder can be up to 10.
156
User's Manual
Log in to the DSS Client. On the Home page, click , and then select Monitoring > Favorites.
● Edit a folder: Click a folder and click , or right-click a folder and select Edit, and then you can
edit the name and channels of the folder.
● Delete a folder: Click a folder and click , or right-click a folder and select Delete, and then you
can delete the folder, its sub folders and all channels.
You can also right-click a channel and select Delete to remove it from a folder.
You can share a folder and its channels to other users. For permission control, if the users you are
sharing with only has permission to certain channels, or no permission to any channels, they will
receive a folder with only the channels they have permission to, or an empty folder.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring.
Step 2 Click Favorites.
Step 3 Right-click a folder, and then select Share the Favorites.
Step 4 Select one or more users, and then click OK.
The folder, its sub folders, and all the channels will be shared with the users you selected.
But if any of the follow situation occurs with the users you are sharing with, this operation
will fail:
● They have more than 999 folders.
● They have 2,000 channels in all folders.
● The levels of their folders have reached 10.
● Live view
On the Monitoring page, and then click Favorites to open list of favorites folders. Double-click
or drag a folder or channel to the window on the right to view live videos.
● Tour
On the Monitoring page, and then click Favorites to open list of favorites folders. Right-click a
folder and select Tour, and then select a duration. The platform plays live videos of all the
channels in the folder and its sub folders in a loop.
157
User's Manual
6.1.2.4 PTZ
Operate PTZ cameras during live view on the DSS Client.
A preset is a set of parameters involving PTZ direction and focus. By calling a preset, you can quickly
rotate the camera to the pre-defined position.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Figure 6-12 Go to PTZ control panel
Step 3 Click .
Step 4 Add a preset.
1. Rotate the PTZ camera to a specific point.
2. Click , enter the preset name, and then click .
Related Operations
Call a preset: Click of a specific preset, and then camera will rotate to the related position.
158
User's Manual
Set the tour parameters so that a camera can go back and forth among different presets. Set tour to
enable camera to automatically go back and forth between different presets.
Prerequisites
You have added at least 2 presets.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Figure 6-13 Go to PTZ control panel
Step 3 Click .
Step 4 Click .
Step 5 Add tours.
1. Enter tour name, and click .
2. Select a preset from the drop-down list on the left.
3. Repeat the previous 2 steps to add more presets.
4. Click OK.
Related Operations
To start tour, click , then camera goes back and forth among the presets.
159
User's Manual
A pattern is a record of a consecutive series of PTZ operations. You can select a pattern to repeat
the corresponding operations quickly. See pattern configuration instructions as follows.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Figure 6-14 Go to PTZ control panel
Step 3 Click .
Step 4 Click , and then operate the 8 PTZ buttons of PTZ to set pattern.
Step 5 Click .
Related Operations
Call pattern: Click , and then the camera will automatically repeat the pattern that you have
configured.
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click . PTZ
rotates 360° at a specified speed. Click to stop camera rotation.
Enable/disable the PTZ camera wiper. Make sure that the camera supports wiper function.
160
User's Manual
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click to
turn on wiper. Click to turn off wiper.
Turn on/off camera light. Make sure that the camera supports light.
On the Monitoring Center page, open the video of a PTZ camera. Click , and then click to
turn on light. After enabling light, click to turn off light.
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Figure 6-15 Go to PTZ control panel
161
User's Manual
Procedure
Step 1 On the Monitoring Center page, open the video of a PTZ camera.
Step 2 Click .
Figure 6-17 Go to PTZ control panel
Step 3 Click .
Step 4 Click .
Step 5 Use the panel to go to the menu configuration page.
162
User's Manual
Parameters Description
/ Up/down.
Click to enable PTZ menu function. System displays main menu on the
monitor window.
OK
● If the main menu has the sub-menu, click OK to enter the sub-menu.
● Point to Back and then click OK to go to go back to the previous menu.
● Point to Exit and then click OK to exit the menu.
Point to Camera and then click OK to enter camera settings sub-menu page.
Camera Set camera parameters. It includes picture, exposure, backlight, day/night
mode, focus and zoom, defog, and default.
Point to PTZ and then click OK to go to PTZ sub-menu page. Set PTZ functions.
PTZ
It includes preset, tour, scan, pattern, rotation, PTZ restart, and more.
Point to System and then click OK to go to system sub-menu page. Set PTZ
System simulator, restore camera default settings, video camera software version and
PTZ version.
Return Point to the Return and then click OK to go back to the previous menu.
163
User's Manual
Parameters Description
Exit Point to the Exit and then click OK to exit PTZ menu.
6.1.2.5.1 Preparations
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then click Monitoring Center.
Step 2 Click .
Step 3 In the device tree on the left, right-click a fisheye camera, and then select Modify Smart
Track.
Step 4 Click next to Please select a PTZ camera to link, and then select a PTZ camera.
164
User's Manual
Step 5 Click and then move the of the fisheye on the left to select a position. Click of
the PTZ camera to find the position. Adjust the PTZ camera to find the position and move
the PTZ to the center position (The green cross on the image).
165
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Monitoring Center page, select the fisheye camera on
the device tree and then right-click to select Smart Track.
166
User's Manual
Step 2 Click any point on the left of fisheye, PTZ camera on the right will automatically rotate to
corresponding position.
6.1.3 Playback
Play back recorded videos.
Log in to the DSS Client. On the Home page, click , and then click Monitoring. Click the
Playback tab.
Figure 6-23 Playback page
167
User's Manual
Icon Description
Lock the video stored to the server within some period of designated
channel. Locked video will not be overwritten when disk is full.
Make dynamic detection analysis over some area of the record image,
and it only plays back the video with dynamic image in the detection
area.
Play multiple recorded videos from the same time. For example, you are
playing recorded videos from 3 channels at the same time. Select
channels, configure when you want to play the recorded video from,
and then click this icon. All 3 channels will play recorded videos from the
same time.
Tag records.
Lock records.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring
Center.
Step 2 Click the Playback tab.
Step 3 Double-click or drag a channel to a window on the right.
Step 4 Select the storage path of recorded video from , and then click to
select the date.
168
User's Manual
169
User's Manual
If the device has been marked on the map, click the icon to
Map location open the map in a new window to display map location of the
device.
Tag Tag the videos of interest for easy search in the future.
Right-click the video, and then you can perform the following actions.
Figure 6-26 Shortcut menu
Parameters Description
If the camera has more than one audio input channels, you can select
Select Audio Input one or select the mixed audio. This configuration is effective with both
live view and playback.
Take snapshots of the current image (three snapshots each time by
default). The snapshots are saved to ..\DSS\DSS Client\Picture by
Continuous Snapshot
default. To change the snapshot saving path, see "9.3.5 Configure File
Storage Settings".
Adjust the brightness, contrast, saturation, and chroma of the video
Video Adjustment
for video enhancement.
Click it, and then double-click the video image to zoom in the image.
Digital Zoom
Double-click the image again to exit zooming in.
170
User's Manual
Parameters Description
The client does not show rule lines over live video by default. When
needed, you can click AI Overlay and enable Rule Overlay and
Bounding Box Overlay, and then the live video shows rule lines if the
AI Overlay
AI detection rules are enabled on the device. This configuration is
effective with the current selected channel both in live view and
playback.
Enable SMD Overlay to show target bounding box over live video.
When SMD is enabled on the device, you can enable SMD Overlay for
SMD Overlay the device channel, and then the live video will display dynamic target
bounding boxes. This configuration is effective with the current
selected channel both in live view and playback.
For a camera that supports privacy masking of human face, you can
Disable Privacy Masking
disable the masking here to view the face image.
Play the video of the current channel on video wall. Make sure that
Playback on Video Wall
video wall is configured (see "6.1.5 Video Wall").
When selecting open alarm linkage video In Preview (in live window)
from Local Settings > Alarm, then the video will be displayed on the
window which is set to alarm window. If multiple alarms are triggered,
Set as Alarm Window the video linked to the latest alarm will be opened. If the number of
alarm windows is fewer than the number of linkage videos, the video
linked to the earliest-triggered alarm will be opened. After enabling
Set as Alarm Window, the window frame is displayed in red.
Step 4 Select the storage path of recorded video from , and then click to
select the date.
The search results are displayed.
171
User's Manual
Step 5 Select a window that has recorded video, and then click on the bottom of the page,
and then click on the timeline to mark the start point and end point of the video clip you
need.
172
User's Manual
Step 6 Confirm the start and end time, and then click OK.
Related Operations
Click on the lower-right corner, and then all the recordings locked by the user currently logged
in to the client are displayed. Double-click one to quickly play the recording.
Step 4 Select the storage path from where the recorded videos are stored ,
and then click to select the date.
The search results are displayed.
173
User's Manual
Step 4 Click , select one or more types, and then click OK.
The platform only displays videos of the selected types in different colors on the timeline.
Filtering videos by video stream is only supported when you are viewing a video stored
on a device, and the search type of device video stream is set to main and sub streams.
For details, see "9.3.2 Configuring Video Settings".
174
User's Manual
Step 3 Select the storage path of recorded video from , and then click to
select the date.
Step 7 Click and select a type for the target, and then you are directed to DeepXplore to
search for it. For details, see "6.3 DeepXplore".
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then select Monitoring
Center.
Step 2 Click the Playback tab.
Step 3 Select a channel from the device tree, and then double-click it, or drag it to the window.
175
User's Manual
Step 4 Select the storage path of recorded video from , and then click to
select the date.
The search results are displayed.
176
User's Manual
Step 4 Select the storage path of recorded video from , and then click to
select the date.
The search results are displayed.
177
User's Manual
Step 5 Select a window that has videos, click , and then select a type.
The smart search page is displayed, with 22 × 18 squares in the window.
178
User's Manual
● Select a detection area: Point to image, click and drag to select a square.
● For the selected area, click again or select square to cancel it.
Step 7 Click to start smart search analysis.
● If there are search results, the time progress bar will become purple and display
dynamic frame.
● It will prompt that the device does not support smart search if the device you selected
does not support the function.
179
User's Manual
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select > Monitoring.
Step 2 Click .
Step 3 In the list of maps, click a map.
Step 4 View video, cancel alarms, and more.
The functions vary with the types of maps and devices. Slight differences might be found
in the actual page.
Function Description
Hide Device Name Only displays the icons of devices or channels.
Rotate the wheel or click and to zoom in and out on the map.
When zooming out on the map, the same type of devices or channels will
be merged together if they are near each other.
Satellite Map If you are using an online map, you can view its satellite map.
Click Pane, select devices on the map, and then click to view videos in
View live video
batches; or click on the map, and then select to view videos.
Click Pane, select devices on the map, and then click to view videos in
Playback
batches; or click on the map, and then select to view videos.
View alarms Click to view all alarms that are triggered. Click an alarm and the map
will zoom in to the location of the device that triggered the alarm.
Alarms will be automatically canceled after 30 s.
180
User's Manual
Function Description
● The alarm area and detection area are displayed on the map by default.
If a target is detected, its real-time location will be displayed in these
areas.
● Click a radar channel, you can view its information and use the
following functions:
: View the raster map on the radar. You can use this function to
check if the maps on the radar and the platform are consistent.
Monitor a radar : View the real-time videos of the linked PTZ cameras.
: Search for and view recordings of the linked PTZ cameras.
Select the types of devices and channels you want to display on the map.
Show devices
You can click an alarm output channel to control whether it will output
alarm signals.
If a device supports visual area, click Visual Area and double-click a device
on the map to show its monitoring area.
Visual area
Select Box > Length, connect two points with a line on the map (double-
click to finish drawing), and then the distance between the points is
shown.
Measure distance
Select Box > Area, select a region on the map (double-click to finish
drawing), and then the area is measured.
Measure area
181
User's Manual
Function Description
Before using the video wall function, you should get familiar with what you can do on the video
wall page.
Figure 6-35 Video wall
182
User's Manual
1 Device tree Click to view channels that you have saved to favorites.
● Click and view the live video of the channel in Live View on
the lower-left corner. This can be helpful when you need to make
sure whether it is the channel you want.
● Click Stay Duration (sec) or to define the for how long the
live video of the channel will be displayed during each tour.
Turning on or off Turn on or off the screens configured for the currently selected video
9
screens wall.
Decoding to wall
immediately When a task has been configured, the platform will immediately
10
after decode channels to the video wall.
configuration
11 Decoding to wall Manually decode channels to the video wall.
Video wall
12 Click to view the layout of the current video wall.
layout
183
User's Manual
6.1.5.1.2 Preparations
184
User's Manual
● You can set whether to show ID in the screen, means that the screen ID is
disabled; click the icon and it becomes , which means that screen ID is
enabled.
● Each screen in a combined screen must be bound with a decoding channel.
Display videos on the wall manually or in accordance with the pre-defined configuration.
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
Step 2 In the Task drop-down list, select Add.
185
User's Manual
Step 3 From the device tree, select a camera, and then drag it to a screen, or select a window,
drag the camera to the Detail section.
If you do not close video wall display in advance, this action will delete the bound camera
and play the selected camera on the wall.
Step 4 Click .
If you have selected an existing task in the Task drop-down list, after dragging the video
channel to the window, click to save it as a new task, which will be played on the wall
immediately.
Step 5 Name the task, and then click OK.
● During video wall display of a task, if you have rebound the video channel, click to
start video wall display manual.
● During video wall display, click or to stop or start tour display.
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
186
User's Manual
Select the Enable This Timed Plan in Remaining Time check box, and then set the task.
The video wall displays the selected task during the remaining period.
Step 6 Click Save.
You cannot display multiple plans on the wall at the same time. When a plan is enabled,
the previous plan on the wall is automatically terminated.
Figure 6-39 Enable timed plan
● Modify plan: .
187
User's Manual
● Delete plan: .
After setting video wall tasks, you can configure the sequence and interval of tasks so that they can
automatically play in turn on the wall.
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
Step 4 Enter task name, select a video task and then set stay time. Click Add.
Repeat this step to add more tasks.
188
User's Manual
You cannot display multiple plans on the wall at the same time. When a plan is enabled,
the previous plan on the wall is automatically terminated.
Figure 6-42 Enable tour plan
Make sure that decoder video ports are connected to the video wall screens.
Drag a camera to the video wall screen for instant display on the wall.
The video wall display task is configured. For details, see "6.1.5.1.4 Configuring Video Wall Display
Tasks".
Procedure
Step 1 Log in to the DSS Client, and on the Home page, select Monitoring Center > .
Step 2 In the Video Wall drop-down list, select a video wall.
Step 3 Click to start video wall display.
Step 4 Drag a camera from the device tree to a screen, or select a window and drag the camera
to the Detail section.
189
User's Manual
Step 5 Select a screen, and then click Detail to view detailed information about the screen and
channel, including stream type, preset and display sequence.
● Click to view live video of the current channel on the lower left.
● Click to adjust sequence.
● After changing the video channel that is being displayed, click at the lower-right
corner before you can see the effect on video wall.
● Click / to pause or stop.
● Select a screen, and then click Detail to view detailed information about the screen
and channel, including stream type, preset and display sequence.
190
User's Manual
191
User's Manual
Step 2 Click .
The alarm list is refreshed in real time. To stop refreshing, click Pause Refresh . To
continue receiving alarms, click Start Refresh.
Figure 6-45 Real-time alarms
You can use the up and down arrow keys on the keyboard to quickly select other alarms.
b. The middle area displays the time when the alarm was triggered, name and location of
the alarm source, alarm type, and the live video images of linked channels, alarm
videos, and alarm snapshots.
192
User's Manual
c. On the right side, select how to process the alarm, enter some comments, and then
click OK.
Forward allows you to forward the alarm to another user who will process it.
d. (Optional) Click to disarm the alarm. This alarm will not be triggered within the
defined period.
e. (Optional) Click to send the alarm information to other users as a prompt or an
email.
Figure 6-48 Send email
193
User's Manual
f. Click and configure the parameters related to the processing comments, and then
click OK.
● Require Processing Remarks to be Entered : After enabled, users must enter
some content in the processing comments to successfully process alarms.
● Pre-processing Remarks : Configure the predefined comments for each
processing status. The content will be automatically filled in when users select
different status for alarms.
Related Operations
The platform also supports processing alarms in batches. Click Batch Process, select multiple
alarms, and then you can process them in batches.
Step 4 Claim and process alarms. For details, see "6.2.1 Real-time Alarms".
You can use the up and down arrow keys on the keyboard to quickly select other alarms.
194
User's Manual
Procedure
Step 1 Click .
Step 2 In the device tree, click an organization.
All alarm controllers under this organization will be displayed on the right. You can select
one or more alarm controllers, and then click Away Arm or Disarm to arm or disarm the
alarm controllers you selected.
If arming failed, you can click Force Arm on the prompt window to arm again.
Figure 6-50 Alarm controller organization
You can right-click an alarm controller, and then click Update Alarm Controller to
update its information.
195
User's Manual
● See the user manual of the alarm controller for detailed description on each function.
● If arming failed, you can click Force Arm on the prompt window to arm again.
Step 5 In the device tree, click a subsystem of the alarm controller.
All zones under this subsystem will be displayed on the right.
Figure 6-52 Zone
● See the user manual of the alarm controller for detailed description on each function.
● If arming failed, you can click Force Arm on the prompt window to arm again.
196
User's Manual
6.3 DeepXplore
You can set multiple search conditions to view records of people, vehicle snapshots and access that
you are interested in.
Step 3 Set the search object, channel and time, and then click Search.
197
User's Manual
You can also click to add it to a face comparison group. After you send the group
to devices and configure an event, devices can trigger alarms when the face is
recognized.
● Click to delete it one by one.
click at the upper-right corner to view all records added to temporary records. Inside
it, you can click to generate target track, and click to remove the record form the
bank.
198
User's Manual
● Search object
Face Capture : Search for records in face capture database.
Body Capture : Search for records in body capture database.
Person Archive : Search for records in person information database.
● Search type
Attribute Search : Search for records by the defined features such as age, gender,
clothes color, ID and more.
Search by Image : Search for records by the uploaded image, and only records
above the set Similarity will be displayed.
199
User's Manual
You can also click to add it to a face comparison group. After you send the group
to devices and configure an event, devices can trigger alarms when the face is
recognized.
● Click to delete it one by one.
Click at the upper-right corner to view all records added to temporary records. Inside it,
you can click to view the target track, and click to remove the record form the bank.
Step 5 Go back to Searching for People, and then click Person Archive.
Step 6 Enter the ID, name or card number of the person you want to search for.
Step 7 Double-click the record.
You can see the face capture, vehicle capture, access records and other information of the
corresponding person.
200
User's Manual
● Search object
201
User's Manual
Step 4 Select a record, and on the right side, you can see the details. Click on the video image to
view the linked recording.
Click at the upper-right corner to view all records added to temporary records. Inside
it, you can click to generate target track, and click to remove the record form the
bank.
Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Control Panel.
This page displays by default all the access points in the root zone and all its sub zones in card view.
202
User's Manual
Click or on the upper-right corner to display access points in card view or on the map. Click
the icon of an access point to view live videos from bound channels, unlock or lock the door, or
make a call to it.
Figure 6-59 Access points on a map
On the top on the page, select a zone or access point type to display the access points in a zone and
its sub zones.
In card view, double-click an access point to view its information, including basic information, live
videos from bound channels, and events.You can also lock or unlock the door and make a call to it.
Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Control Panel. You can view live videos from bound channels in the following
ways.
Click to display access points in card view. Click to view live videos. Each access point will
only use one window. If more than 1 video channel is bound to the access point, you can click the
drop-down list on the lower-right corner to switch between video channels.
203
User's Manual
In card view, double-click an access point, and then live videos will be displayed in the Related
Info section.
Click on the upper-right corner to display access points on the map. Click the icon of an access
Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Control Panel. You can unlock or lock doors in the following ways.
Click to display access points in card view. Click or to unlock or lock a door channel.
In card view, double-click an access point, and then click Open Door or Close Door.
204
User's Manual
Click on the upper-right corner to display access points on the map. Click or to unlock or
lock a door channel.
Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Control Panel. Select a zone, and then click Normally Open, Restore, or
Normally Closed to control all the door channels at the same time.
● Normally Open : All people can pass without verifying their identifications.
● Restore : Restore door channels to the normal status from normally open or normally closed
mode. People must verify their identifications to pass
● Normally Closed : All people are not allowed to pass.
If you perform this operation to a zone, it will be also applied to all the sub zones. When the status
of the parent zone and sub zone is in conflict, the platform will resolve it in the following ways:
● When a sub zone has been set to the normally open or closed mode, operating the parent zone
will override the status of the sub zone.
● When the parent zone has been set to the normally open or closed mode, and you want to set a
sub zone to a mode opposite to the parent zone, the platform will prevent you from doing so,
and prompt that you must restore the parent zone to the normal status before setting the sub
zone.
Procedure
Step 1 Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Control Panel.
Events are display in the Event section at the bottom of the page.
Step 2 Click , and then you can view the snapshot, recorded video, and live video of the
event.
Step 3 Locate the access point for an event.
205
User's Manual
● Click on the upper-right corner to display access points in card view. Click an
event, and then its access point will be highlighted.
Figure 6-61 Highlighted access point
● Click on the upper-right corner to display access points on the map. Click an event,
and then its information is displayed on the map.
Figure 6-62 Highlighted on the map
Related Operations
● : Stop receiving new events. Click it again to start receiving events.
● : Clear the events on the page, but they will not be deleted.
206
User's Manual
The selected person group is empty by default. In this case, the search results will include
events with no related person information, such as access by a person whose information
is not on the platform, access by strangers, and alarms triggered by devices. If you want to
clear the selection of a person group, click next to the person group, then no person
group is selected.
Step 3 Click Export.
Step 4 Enter the login password, encryption password, and select the export range, and then
click OK.
You can configure whether to verify the password. For details, see "8.3.1 Configuring
Security Parameters".
● The encryption password is used to protect the export file. It consists of 6 uppercase or
lower case letters, numbers, or their combinations. You need to enter it when using
the export file.
● The export range can be all or specified events that are displayed.
207
User's Manual
The selected person group is empty by default. In this case, the search results will include
events with no related person information, such as access by a person whose information
is not on the platform, access by strangers, and alarms triggered by devices.
Step 5 Select the events, and then click to generate the route.
The platform will play the route based on the time of events.
If events happened in multiple zones, and the maps of zones do not relate to each other
as main and sub maps, the platform might not play the route normally.
208
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, select > Access Management > Access
Control > Access Records > Analysis of People Entering and Exiting.
Step 2 Select a zone and the start time, and then click Search.
The platform will display the statistics of people entering and exiting the selected zone,
and related events ranging from the start time to the current time. For example, the
platform will display the statistics and events ranging from the defined start time 5-16
08:00:00 to the current time 5-17 10:00:00.
Step 3 Click Export.
Step 4 Enter the login password, encryption password, and select the export range, and then
click OK.
You can configure whether to verify the password. For details, see "8.3.1 Configuring
Security Parameters".
● The encryption password is used to protect the export file. It consists of 6 uppercase or
lower case letters, numbers, or their combinations. You need to enter it when using
the export file.
● The export range can be all or specified events that are displayed.
209
User's Manual
Select VTO in the device list; click corresponding of VTO or dial a number on the
dial pad to call the VTO. The system pops out call page. The following operations are
supported during call.
210
User's Manual
If the device supports two locks, two lock icons will appear on the page, and you can click either one
to unlock corresponding door.
● Call from the platform to VTH
Select VTH from the device list, click on the VTH or dial corresponding VTH on the
right (such as 1#1#101). The system pops up the dialog box of Calling now, please
wait …. There are two modes for answering the call.
Answer by VTH, bidirectional talk between client and VTH. Press to hang up
when you answer the call.
If VTH fails to answer in 30 s, hangs up or is busy, then it means the call is busy.
Figure 6-66 Calling
● Call from the platform to an access control device that supports video intercom
211
User's Manual
Select a device from the device list, click on it or dial its number on the right (such
as 1#1#101). The system pops up the dialog box of Calling now, please wait …. There
are two modes for answering the call.
Answer by the device, bidirectional talk between client and the device. Press
to hang up when you answer the call.
If the device fails to answer over 30 s, busy or hang up directly, then it means the
call is busy.
Figure 6-67 Calling
212
User's Manual
The client pops out the dialog box of VTH calling. Click to talk with VTH.
The client pops out the dialog box. Click to talk with the device.
213
User's Manual
All the call records are displayed in the Call Record at the lower-right corner of the
page of Video Intercom. Click the record to call back.
Figure 6-70 Call records
214
User's Manual
Step 3 (Optional) Click Export, and then follow the prompts to export all or partial records to
your computer.
6.4.3.1 Preparations
● You have configured the deployment of the video intercom devices, access control devices and
entrance and exit device. For details, see the corresponding user's manual.
● You have configured the basic configuration of the platform. For details, see "4 Basic
Configurations".
● Make sure that you have configured the visitor configuration before application. For details, see
"5.7 Visitor Management". You can also click to go to the video intercom configuration
page.
215
User's Manual
You can click to download the QR code, and click to send it to the visitor by email.
Figure 6-72 Authentication
6.4.3.3 Checking In
When a visitor with an appointment arrives, you need to confirm their information and give them
access permission. On-site registration is supported when there is a walk-in visitor. Visitors can get
access by card swipe or face recognition.
Procedure
Step 1 Log in to the DSS Client. On the Home page, select > Access Management > >
Visitor Management.
Step 2 (Optional) Click the Authentication tab, and then set authorization information.
1. Select the room number.
2. Issue cards.
You can issue cards by entering card number manually or by using a card reader. A
card number is 8-16 numbers. Only second-generation access control devices support
16-digit card numbers. When a card number is less than 8 numbers, the system will
automatically add zeros prior to the number to make it 8 digits. For example, if the
provided number is 8004, it will become 00008004. If there are 9-16 numbers, the
system will not add zero to it.
● Issue cards by entering card numbers manually
216
User's Manual
Click Add next to Card, enter the card number, and then click OK.
Figure 6-73 Issue card
Click , select a card reader or device, and then click OK. Swipe card through the
reader or device, and then a new card will be issued.
Figure 6-74 Reader manager
3. Set face picture. Position your face in the snapshot area, and click Upload Picture to
select a picture or click Snapshot to take a photo.
217
User's Manual
You can click to download the QR code, and click to send it to the visitor by
email.
Figure 6-76 Authentication
Step 3 Click the Authorize tab, and then select access permissions for the visitor.
218
User's Manual
If you want to set video intercom devices and entrance and exit permissions, you must set
host room number and number plate for the visitor.
Figure 6-77 Authorize
Click the Card-swiping Record tab, or click in visitor record to view visitor card swiping
records.
● Cancel appointment.
219
User's Manual
In addition to entering the card number, you can also click , select a card reader and
then get the card number by swiping card.
Step 3 Click to view visitor details and card swiping records.
No. Description
Select the number of windows you want. Each window can display the real-time
1
video of one entrance or exit point.
220
User's Manual
No. Description
● Click to open the real-time video of another entrance or exit point in the
window.
● Click to open the barrier for vehicles.
Open without Recording Plate Info : Open the barrier for vehicles without
2 recording their plate numbers. If you select Count Parking Spaces at the
same time, the number available parking spaces in the parking lot will
decrease or increase depending on whether the vehicles are entering or
leaving. This operation will not generate an enter or leave record.
Open and Record Plate Info : This is applicable to when the ANPR cameras
cannot recognize the number plates. You can manually enter the number
plate, and a snapshot will be taken, and then the platform will generate an
entrance or exit record.
Log in to the DSS Client. On the Home page, click , and then select Vehicle Entrance and Exit.
Click to go to the entrance and exit configuration page.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Parking Lot > Info Search.
Step 2 Click the Entrance Records tab.
Step 3 Configure the search conditions, and then click Search.
Click Show More and you can search by vehicle owner, company, person group, and
more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
221
User's Manual
If No is displayed under Already Exited when the vehicle has exited, click to
change the status to Yes.
● Export records.
Select the records to be exported, click Export , and then export them according to
the on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Parking Lot > Info Search.
Step 2 Click the Exit Records tab.
Step 3 Configure the search conditions, and then click Search.
Click Show More and you can search by vehicle owner, company, person group, and
more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Export records.
Select the records to be exported, click Export , and then export them according to
the on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Parking Lot > Info Search.
Step 2 Click the Forced Exit Records tab.
222
User's Manual
Click Show More and you can search by vehicle owner, company, person group, and
more.
Step 4 Manage the records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Export records.
Select the records to be exported, click Export , and then export them according to
the on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Parking Lot > Info Search.
Step 2 Click the Capture Records tab.
Step 3 Configure the search conditions, and then click Search.
Click Show More and you can search by vehicle owner, company, person group, and
more.
Step 4 Mange records.
● Click the image, and then a bigger one will be displayed.
● Double-click a record or click , and the detailed information is displayed on the
right. Click the play icon to play the recorded video, and then click to download it.
Click to modify the information of the vehicle, such as the plate number, brand
and color.
For the dual camera mode, click each channel to view the information it captured.
● Restore entry
If Yes is displayed under Exited when the vehicle is still in the parking lot, click to
change the status to No.
● Export records.
Select the records to be exported, click Export , and then export them according to
the on-screen instructions. You can also click Export, and the then export all records
according to the on-screen instructions.
223
User's Manual
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Intelligent Analysis > >
Real-time Count.
Step 2 Double-click a group or drag it to a window on the right to display its real-time data.
● Occupancy : The number of people currently inside this group, which will be reset to
the defined value at the defined calibration time.
● Entered : The number of people entered this group, which will be reset to zero at the
defined calibration time.
● Exited : The number of people who left this group, which will be reset to zero at the
defined calibration time.
● Color of the light:
Red light: Occupancy ≥ red light threshold.
Yellow light: Yellow light threshold ≤ occupancy < red light threshold.
Green light: Occupancy < yellow light threshold.
Figure 6-79 Real-time count
Step 3 Hover you mouse on the window displaying real-time data, and then click .
224
User's Manual
Step 4 You can enter a number of people to overwrite the current data, and customize the
content to be displayed for green, yellow and red light.
Figure 6-80 Edit the content and data
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Intelligent Analysis > People
Counting > Historical Count.
Step 2 Select the groups you want in Groups , or select the channels in Resources.
Step 3 Configure the search settings, and then click Search.
● Groups : Groups are people counting groups, which allow you to combine and
calculate the people flow data from multiple rules across different devices and
channels. You can search for historical people flow data from one or more people
counting groups.
● Resources : Search for historical people flow data from one or more channels. The
data from all the rules of a channel will be included.
If a device is offline, it will upload all the data to the platform when it is online again.
225
User's Manual
Related Operations
● : Change the display format of the data.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click > Intelligent Analysis > .
Step 2 Select a channel, and then generate a heat map.
You can generate a heat map with data from up to one week.
● Generate a general heat map.
Configure the time, and then click Search.
226
User's Manual
● When you select Number of People, the area with the closest number of people to
the threshold will be in red.
● When you select Time, the area where people stay for a duration closest to the
If a device is offline, it will upload data within the past 24 hours to the platform when it is
online again.
Figure 6-82 In-area people number statistics
Related Operations
227
User's Manual
Click Generate Report or Export to export the information on the page to your
computer.
● Click Workstation to view the overall running status of the platform, including the
status of devices on main and sub servers, alert statistics, storage and status of servers.
The data is refreshed every minute.
● Select Resource Monitoring > Server Status, and then click a server or service to
view its running status and history information, including alerts occurred in the last 7
days and logs generated on the current day. Click View All to jump to corresponding
pages for more information.
● Select Resource Monitoring > Device Status. Click a device type, and then the status
of all the devices are displayed on the right. Click to view detailed information.
Channel Status Info : Information such as the channel name, online or offline,
recording days, and video integrity status.
Hard Disk Status Info : If it is a storage device, you can view the information of its
hard disks in this section. Click to view the RAID information of the hard disks.
History Info : Displays alerts occurred in the past 7 days and logs of the current
day. Click View All to view all information.
228
User's Manual
2. Enter a name for the person who processed the alert, and the troubleshooting log, and
then click Save.
Related Operations
● Export the details of an alert
On the bottom of the information of the alert, click Download Report. Enter the login password
and encryption password to export the information to your computer.
● Export alert list
Click Export on the upper-left corner of the page, enter the login password, encryption
password, and then select the export range and format to export them to your computer.
● Add an alert to favorites
Log in to the DSS Client. On the Home page, click , and then select Maintenance Center >
Maintenance Management > Analysis Report. The analysis report within the past 7 days is
displayed by default.
● View analysis reports with specified content
Click Search by Tag on the upper-right corner of the page to generate a report by time,
resource type, alert type, and alert priority. An analysis report of up to 30 days can be generated.
● Download an analysis report
Click Download Report, enter the login password and encryption password, and then select the
content to be exported to download it to your computer.
● Send an analysis report to one or more email addresses
Click Send Report to send it to one or more specified email addresses immediately or at the
defined time.
Send Now : Send the information in Body and selected information to the specified email
addresses immediately.
Auto Send : Send the information in Body and selected information to the specified email
addresses daily, weekly, or monthly.
Daily report: Data from yesterday will be sent to your email at a defined time. If set to
03:00:00, the data from the day before (00:00:00–23:59:59) will be sent to your email at
03:00:00 every day.
Weekly report: Data from last week will be sent to your email at a defined time. If set to
03:00:00 on Wednesday, the data from Wednesday to Tuesday of each week will be sent to
your email at 03:00:00 every Wednesday.
229
User's Manual
Monthly report: Data from last month will be sent to your email at a defined time. If set to
03:00:00 on 3rd, the data from 3rd of last month to 2nd of the current month will be sent to
your email at 03:00:00 on 3rd of each month.
230
User's Manual
7 General Application
This chapter introduces the general businesses, including target detection, face recognition, and
ANPR.
Target detection can be done by video metadata cameras + a platform, or IPCs + IVSSs + platform.
7.1.2 Preparations
Make sure the following preparations have been completed:
● Cameras and IVSS are correctly deployed, and video metadata is enabled on them. For details,
see corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure the parameters, see "4
Basic Configurations".
When adding a camera or IVSS, select Encoder for device category.
231
User's Manual
After adding the camera or IVSS to the platform, select Target Detection from Features of
the device.
● When playing back video, click to download the video to a designated path.
● Click to play back the video before and after the snapshot.
● Click to delete event information.
● Click to view the most recent events.
232
User's Manual
Step 2 Click .
Step 3 Set search criteria.
You can search for metadata snapshots in the Record , Person or Vehicle section. For
details, see "6.3 DeepXplore".
7.2 ANPR
View automatic number plate recognition in real time or search for records. You can view the
moving track of a vehicle. This is useful for road monitoring.
● Automatic number plate recognition
The platform displays vehicle snapshots and ANPR results in real time.
● Vehicle records
Search for vehicle records according to the filtering conditions you have set.
● Vehicle track
According to the ANPR camera locations that a vehicle has passed through, the platform
displays the driving track of the vehicle on the map.
7.2.2 Preparations
Make sure that the following preparations have been made:
● ANPR cameras are added to the platform, and the ANPR function is configured. For details, see
corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure, see "4 Basic
Configurations".
233
User's Manual
When adding an ITC camera, select ANPR for device category, and then select ANPR Device
for Device Type.
ANPR snapshots are only stored on ANPR Picture disks. On the Storage page, configure at
least one ANPR Picture disk. Otherwise vehicle pictures cannot be viewed.
● When playing back a video, click to download the video to a designated path.
● Click to play back the video before and after the snapshot.
● Click to delete event information.
● Click to view the most recent events.
234
User's Manual
Step 2 Click .
Step 3 Configure the search conditions.
You can search for vehicle snapshots in the Record or Vehicle section. For details, see
"6.3 DeepXplore".
235
User's Manual
7.3.2 Preparations
Make sure that the following preparations have been made:
● Face recognition devices are correctly configured. For details, see corresponding user’s manuals.
● Basic configurations of the platform have been finished. To configure, see "4 Basic
Configurations".
When adding face recognition devices, select Encoder for device category.
After adding a face recognition NVR or IVSS, select Face Recognition for Features of the
corresponding channels.
After adding face recognition cameras or face detection cameras, select Face Recognition
or Face Detection for Features.
Face snapshots are stored in the Face/Alarm and Other Pictures disk. Configure at least
one local disk for picture storage. Otherwise, the platform cannot display snapshots.
Step 3 Click and then click to view live face recognition information.
Step 4 View live video, and human body, vehicle, and non-motor vehicle information.
236
User's Manual
● Click an event record to view event snapshots. You can play back the video of the
event. Different events support different operations.
● When playing back video, click to download the video to designated path.
● Click to play back the video before and after the snapshot.
● Click to refresh events; click to pause refreshing.
● Click to delete event information.
● Click to view the most recent events.
Step 2 Click .
Step 3 Configure the search conditions.
You can search for vehicle snapshots in the Record or Person section. For details, see "6.3
DeepXplore".
237
User's Manual
8 System Configurations
This chapter introduces system parameters configuration, license information, service
management, and backup and restore.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select System Deployment.
Step 2 Click .
Step 3 Manage servers.
Click Default, the servers are sorted in the order in which they were added.
Click Sort By Device Quantity, the servers will be sorted by the number of devices.
238
User's Manual
● Automatic allocation
Allocate the same type of devices evenly to different servers.
a. Click Auto Distribution.
b. Select Device Type. Multiple types are supported.
c. Select the server to which the devices belong. Multiple servers can be selected.
d. Click OK.
Figure 8-1 Auto allocation
239
User's Manual
Parameter Description
A CA certificate is used to validate the legitimacy of the platform.
When accessing the platform through a browser, the browser
will validate the certificate. If the certificate is installed in the
browser, the browser will consider the platform as secure, and
will grant it access. If the certificate is not installed in the
browser, the browser will not consider the platform as secure,
Certificate Management and will not grant it access. You can create, import, and
download certificates on the platform.
● Create a certificate: After creating a certificate, import it to the
computer that will access the platform.
● Import a certificate: You can import a certificate that has been
created to the platform.
After the firewall of the server is enabled, you need to add the IP
HTTP Allowlist address of the computer where the DSS Client is installed to the
HTTP allowlist so that it can access the server.
240
User's Manual
Parameter Description
After the firewall of the server is enabled, only the IP addresses in
the RSTP allowlist can request video stream through the media
gateway service. The IP addresses of decoders will be added
RTSP Redirecting Allowlist
automatically. If there are other IP addresses that need to request
video stream through media gateway service, you need to
manually add them to the RSTP allowlist.
241
User's Manual
● Scheduled Time Sync: Enable the function, enter the start time in time sync for each
day, and the interval.
● Sync Time When Device Comes Online: Syncs device time when the device goes
online.
● NTP Time Sync: If there is an NTP server in the system, you can enable this function to
The system immediately synchronizes the time after you restart the client to keep the
time of the server and the PC client the same.
242
User's Manual
243
User's Manual
Parameter Description
Select according to the type of SMTP server to be connected. The
SMTP Server Type
types include Yahoo , Gmail, Hotmail, and UserDefined.
Sender Email Address The sender displayed when an email is sent from DSS.
SMTP Server
Password IP address, password, and port number of the SMTP server.
Port
Encryption Method Supports no encryption, TLS encryption, and SSL encryption.
Test Recipient Set the recipient, and then click Email Test to test whether the
Email Test mailbox is available.
244
User's Manual
2. Click to enable the function, and then configure the parameters of the domain.
3. Click Get DN to automatically get the basic DN information.
4. Click Test to check whether the domain information is correct.
5. (Optional) Enable the automatic synchronization function and set a time. Then, the
platform will automatically synchronize news users in domain groups that you have
imported previously, and update the information of the users imported by manual
selection at the defined time every day.
For example, you have imported the entire domain group A. The platform will
synchronize new users in domain group A every day at the defined time. Click to
remove a group on the list, and then it will not be synchronized. For users imported by
manual selection, the platform will check their information, and update if anything
changes.
6. Click Save.
Step 2 Import domain users.
1. Log in to the DSS Client. On the Home page, click , and then in the Basic Config
section, select User > User Management.
2. Click Import Domain Users.
3. Select how you want to import users, and then click Next Step.
245
User's Manual
If you import an entire domain group and after the automatic synchronization
function is enabled, the platform will remember that group and automatically
synchronize its new users at the defined time every day. For details, see the
previous steps.
● Import by Domain User : Import selected users in a group.
4. Click to select a role for the users.
All the permissions in the role will be assigned to the users.
5. Click OK.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select Backup and Restore.
Step 2 Click the Backup tab.
Step 3 Back up data.
● Manual backup: In the Manual Backup section, select the data saving path, click
Backup Now. The Login Password is the same as the system user's. Create an
Encryption Password to protect data.
246
User's Manual
● Auto backup: In the Auto Backup section, configure backup parameters, and then
click OK. The Login Password is the same as the system user's. Create an Encryption
Password to protect the data. The platform automatically backs up data according to
the defined time and period. The backup path is the installation path of the platform
server by default.
Max Number of Backup Files means you can only save defined number of backup
files in the backup path.
Figure 8-7 Auto backup
247
User's Manual
● Users must not use the platform when you are restoring the configurations.
● Restoring the configurations will change the data on the platform. Please be advised.
Procedure
Step 1 Log in to the DSS Client. On the Home page, click , and then in the System Config
section, select Backup and Restore.
Step 2 Click the Restore tab.
Step 3 Restore data.
● Restore from local backup file: In the Restore from Local Backup File section, select
the backup file path, click Restore Now, and then enter the passwords (the Password
is the same as the system user's. The Encryption Password is the one created when
the file was backed up).
Figure 8-8 Local restore
● Restore from backup file on the server: In the Restore from Backup File on the
Server section, click , enter the passwords (the Password is the same as the
system user's. The Encryption Password is the one created when the file was backed
up), and then click OK. After restoration, the platform will automatically restart.
248
User's Manual
249
User's Manual
9 Management
9.1 Managing Logs
View and export operator logs, device logs and system logs, and enable the service log debug
mode for troubleshooting.
Step 2 Click , and then select one or more types of logs you want to search for.
Step 3 Configure the time and enter the keyword, and then click Search.
Step 4 (Optional) Click Export and follow the on-screen instructions.
250
User's Manual
Step 2 Click to download the logs of the service within a specified period to your computer.
Step 3 (Optional) Click to enable the debug mode of a service, and then click to
download the detailed logs within a specified period to your computer.
After the debug mode is enabled, the platform will generate a large amount of logs that
occupy more disk space. We recommend you disable the debug mode after you have
finished troubleshooting.
Procedure
Step 1 Log in to the DSS Client. On the Home page, select Management > Download Center.
Step 2 Configure the search conditions, and then click Search.
Step 3 Download videos.
You need to verify your password by default before download. You can configure
whether to verify the password. For details, see "8.3.1 Configuring Security Parameters".
● Download a video by selecting a duration on the timeline.
Click the Timeline tab, and then select a period on the timeline.
You can also click Select All on the upper-left corner, and then you can select and
download the same period of all videos at the same time.
● Download a video by file.
Click the Tag tab, click of the file you want to download.
You can also select multiple tags, and then click Download Selected Tagged File to
configure and download them at the same time.
Step 4 (Optional) Click , select the format of the video, and then click OK.
● Timeline : You can further adjust the start and end time of the duration.
251
User's Manual
If you set the Search Type of Device Video Stream to Main Stream and Sub Stream
1, you can download videos recorded in main stream or sub stream for videos stored
on devices. For details, see "9.3.2 Configuring Video Settings".
● File : If you download multiple files at the same time, you cannot configure the
formats of the videos you want to save.
● Tag : You can configure how many seconds or minutes before and after the tag you
want to download.
● After download completes, click to go to the path where the video is saved to, or click in
the prompt on the upper-right corner to play the video directly in Local Video. For details, see
"9.4 Playing Local Videos".
252
User's Manual
Parameters Description
Default Client Size Select a proper resolution for the client according to PC display screen.
Display time zone in When selected, the client and the time of alarms will show both the
client and event records time and time zone.
Device Node Info Select that the device tree displays devices and their channels or only
Display channels.
Display live view
When selected, you can hover the mouse over a channel in the device
thumbnails when
tree in Monitoring Center and a snapshot of its live video image will
hovering over channels
be displayed.
on the device tree
If enabled, the client starts to synchronize network time with the server
Time Sync
to complete time synchronization.
● If Remember Password has been selected on the Login page,
select Auto restart after reboot, and the system will skip the login
page and directly open the homepage after you restart the PC next
Auto run at startup time.
● If Remember Password is not selected on the Login page, select
Auto restart after reboot, the client login page will appear after
you restart the PC.
Enable the system to skip the login page and directly open the
homepage when logging in next time.
● If Remember Password and Auto Login have been selected on the
Login page, the function is already enabled.
● If Remember Password has been selected while Auto Login is not
Auto Login selected on the Login page, select Auto Login on the Basic page to
enable this function.
● If neither Remember Password nor Auto Login has been selected
on the Login page, select Auto Login on the Basic page and you
then to enter the password when logging in next time to enable the
function.
The user will be asked to confirm whether to open one more video
CPU Alarm Threshold
when the CPU usage exceeds the defined threshold.
Audio and video
Encrypt all audio and video to ensure information security.
transmission encryption
253
User's Manual
Parameters Description
The client will be locked after the defined period and you cannot
perform any operation. Click Click to Unlock Client and verify the
password of the current account to unlock the client.
Auto Lock Client
Self-adaptive audio talk If enabled, the system automatically adapts to the device sampling
parameters frequency, sampling bit, and audio format for audio talk.
Select a mode for the platform to use and display access cards. For
Access Card Input and example, when you manually issue a card to a person, you can enter A-F
Display Mode and numbers in the card number if Hex is selected, but you can only
enter 0-9 if Decimal is selected.
Joystick Sensitivity The higher the sensitivity, the more frequent joystick commands are
sent, and the greater the possibility that operations will be delayed due
to poor performance of PTZ cameras.
Parameters Description
Default Window Split Set split mode of the video window.
Window Display Scale Select from Original Scale and Full Screen.
When the number of window splits is greater than the defined
Stream Switching Rule value, the live video will switch from the main stream type to sub
stream type.
Select the one according to your situation. If you select Acquire
directly from the device, clients will acquire video streams
directly from the channel. If direct acquisition fails, the platform
will forward the video streams to clients.
254
User's Manual
Parameters Description
If selected, you can double-click a video window to maximize it
Double-click on the video to
and switch from sub stream to main stream. Double-click again to
maximize the window and
restore the window size, and then the system will switch it back to
switch to main stream
sub stream.
● Real-time Priority
The system might lower the image quality to avoid video lag.
● Fluency Priority
The system might lower the image quality and allow for lag to
ensure video fluency. The higher the image quality, the lower
the video fluency will be.
Play Mode ● Balance Priority
The system balances real-time priority and fluency priority
according to the actual server and network performance.
● Custom
The system adjusts video buffering and lowers the impact on
video quality caused by unstable network. The bigger the
value, the more stable the video quality will be.
Decoding Mode ● Software Decoding by CPU : All videos will be decoded by the
CPU. When you are viewing live videos from large amount of
channels, it will take up too much resources of the CPU that
affects other functions.
● Software Decoding by GPU : All videos will be decoded by the
GPU. The GPU is better at concurrent operation than the CPU.
CPU Threshold This configuration will free up resources of the CPU
significantly.
● Performance Mode (CPU First) : All videos will be decoded by
the CPU first. When the resources of the CPU is taken up to the
defined threshold, the platform will use the GPU to decode
videos.
Display previous live view If selected, the system displays the last live view automatically
after restart after you restart the client.
Close videos being played
after long period of inactivity The system closes live view automatically after inactivity for a pre-
defined period of time. Supports up to 30 minutes.
Inactivity Time
After enabled, if the device is recording a video, an icon will be
Display Device Video Status
displayed on the upper-left corner of the window.
Click on the live view page to play the video of the previous
Instant Playback Time period. The period can be user-defined. For example, if you set 30
seconds, the system will play the video of the previous 30 seconds.
Select a default stream type when you play back recordings from a
device.
Search Type of Device Video
Stream
If Only Sub Stream 2 is selected, but the device does not support
sub stream 2, then recordings of sub stream 1 will be played.
255
User's Manual
Parameters Description
Select a default location for recorded videos when you play them,
including Prioritize Device Recording for playing recorded
Play Priority
videos stored on devices, and Prioritize Central Recording for
playing recorded videos stored on the platform.
Frame extraction is useful to guarantee fluency and lower the
pressure on decoding, bandwidth and forwarding when playing
back high-definition videos. When frame extraction is enabled,
certain frames will be skipped.
Frame Extraction Mode ● Do Not Extract : Frame extraction will not be enabled in any
situation.
● Self-adaptive : The platform will enable frame extraction
based on the resolution and the play speed.
● Force : Frame extraction is always enabled.
Continuous Snapshot Interval Set the number and interval between each snapshot.
Parameter Description
Default Stream Select Main Stream , Sub Stream 1, Sub Stream 2 or Local Signal as the
Type default stream type for video wall display.
Stream Switching When the number of window splits is greater than the defined value, the live
Rule video will switch from the main stream type to sub stream type.
Double-click on
the video to
maximize the Double-click the video to maximize the window, and then its stream type will
window and switch to main stream.
switch to main
stream
Set the default time interval between the channels for tour display.
Video Source Play For example, if 5 seconds is configured and you are touring 3 video channels,
Duration the live video image of each channel will be played 5 seconds before
switching to the next channel.
256
User's Manual
Parameter Description
● Tour : Multiple video channels switch to decode in one window by
default.
Mode of Video ● Tile : Video channels are displayed in the windows by tile by default.
Decoding to Wall
● Ask Every Time : When dragging a channel to the window, the system
will ask you to select tour or tile mode.
Parameters Description
Default All types of alarms will use the same default alarm sound when triggered.
Click Modify Alarm Sound, and then you can change the alarm sound and
Custom
its play mode of each type of alarm.
Open alarm linkage If selected, the platform will automatically open linked video(s) when an
video when alarm alarm occurs.
occurs
● As Pop Up : The alarm video will be played in a pop-up window.
Monitoring Center.
Open Alarm
Linkage Video
For this function to work properly, you must enable When an alarm is
triggered, display camera live view on client when configuring an event.
For details, see "5.1 Configuring Events".
Pop-up Display
Duration
When an alarm is When you configure the alarm videos to be displayed as pop-up windows,
triggered, the alarm you can select for how long the pop-up windows will be displayed, and
pop up window and whether to display the pop-up windows and the client on the top of the
the client will be screen.
displayed on the
top of the screen.
Device on the map
Set one or more alarm types for alarm notification on the map. When an
flashes when alarm
alarm occurs, the corresponding device will flash on the map.
occurs
Step 3 Click Save.
257
User's Manual
Parameters Description
Video Naming Rule Select a naming rule for manual recordings.
Set a storage path of manual recordings during live view or playback. The
Video Storage Path
default path is C:\Users\Public\DSS Client\Record.
Configure the maximum size of a video file. If you download a video that is
larger than the defined size, the platform will divide it into multiple files. The
Video File Size
maximum size can be up to 4 GB for 32-bit operating systems, and 1024 GB
for 64-bit operating systems.
Image Format Select a format for snapshots.
Image Naming Rule Select a naming rule for snapshots.
Set a storage path for snapshots. The default path is C:\Users\Public\DSS
Image Storage Path
Client\Picture.
Step 3 Click Save.
The parameters of Alarm Sound and Map Flashes will not be included in the exported
configurations.
1. Click Export Configurations.
258
User's Manual
2. Select Export to File , and then export the configurations to the specified path of your
computer. Or select Send by Email, and send the configurations to the specified email
address.
3. Click OK.
● Import configurations.
1. Click Import Configurations.
2. Click , and then open the exported file of configurations.
3. Click OK.
Step 2 Click to select one or more files, or to open all files in a folder.
Figure 9-1 Play list
Step 3 Drag a file to the window on the right or right click it to play.
259
User's Manual
Related Operations
Table 9-6 Interface operation
Icon/Function Description
● Continuous Snapshot : Take snapshots of the current image (three
snapshots each time by default). The snapshots are saved to ..\DSS\DSS
Client\Picture by default. To change the snapshot saving path, see
"9.3.5 Configure File Storage Settings".
Right-click menu ● Video Adjustment : Adjust the brightness, contrast, saturation, and
chroma of the video for video enhancement.
● Digital Zoom : Click it, and then double-click the video image to zoom
in the image. Double-click the image again to exit zooming in.
Split the window into multiple ones and play a video in full screen.
Take a snapshot of the current image and save it locally. The path is C:\DSS
\DSS Client\Picture\ by default.
Capture the target in the playback window. Click to select the search
method, and then the system goes to the page with search results. More
operations:
260
User's Manual
Step 2 Click .
Step 3 Click Add.
Figure 9-3 Add a quick command
261
User's Manual
262
User's Manual
263
User's Manual
Appendix 2 RAID
RAID is an abbreviation for Redundant Array of Independent Disks. It is to combine several
independent HDDs (physical HDD) to form a HDD group (logic HDD).
Comparing with one HDD, RAID provides more storage capacity and data redundancy. The
different redundant arrays have different RAID level. Each RAID level has its own data protection,
data availability and performance degree.
RAID Level
264
User's Manual
RAID Capacity
265
User's Manual
● If you connect the product to the Internet, you need to bear the risks, including but not limited
to the possibility of network attacks, hacker attacks, virus infections, etc., please strengthen the
protection of the network, platform data and personal information, and take the necessary
measures to ensure the cyber security of platform, including but not limited to use complex
passwords, regularly change passwords, and timely update platform products to the latest
version, etc. Dahua does not assume any responsibility for the product abnormality, information
leakage and other problems caused by this, but will provide product-related security
maintenance.
● Where applicable laws are not expressly prohibited, for any profit, income, sales loss, data loss
caused by the use or inability to use this product or service, or the cost, property damage,
personal injury, service interruption, business information loss of purchasing alternative goods
or services, or any special, direct, indirect, incidental, economic, covering, punitive, special or
ancillary damage, regardless of the theory of liability (contract, tort, negligence, or other) ,
Dahua and its employees, licensors or affiliates are not liable for compensation, even if they
have been notified of the possibility of such damage. Some jurisdictions do not allow limitation
of liability for personal injury, incidental or consequential damages, etc., so this limitation may
not apply to you.
● Dahua's total liability for all your damages (except for the case of personal injury or death due to
the company's negligence, subject to applicable laws and regulations) shall not exceed the price
you paid for the products.
Security Recommendations
The necessary measures to ensure the basic cyber security of the platform:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
●The length should not be less than 8 characters.
●Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.
266
User's Manual
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4. Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5. Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445),
remote desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH
(port 22) under Linux. At the same time, close the database port to the outside or only open to a
specific IP address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6. Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and third-
party components, and apply official patches in time.
7. Security Audit
● Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
● View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8. The Establishment of a secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
● Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.
● Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.
More information
Please visit Dahua official website security emergency response center for security announcements
and the latest security recommendations.
267