0% found this document useful (0 votes)
19 views

SmartPSSLite - User's Manual - Eng

Uploaded by

Andry
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views

SmartPSSLite - User's Manual - Eng

Uploaded by

Andry
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

SmartPSS Lite

User's Manual

V1.0.4
Foreword
General

This manual introduces the functions and operations of the SmartPSS Lite (hereinafter referred to as
"the Platform"). Read carefully before using the platform, and keep the manual safe for future
reference.

Safety Instructions

The following signal words might appear in the manual.

Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


could result in slight or moderate injury.

Indicates a potential risk which, if not avoided, could result in


property damage, data loss, reductions in performance, or
unpredictable results.

Provides methods to help you solve a problem or save time.

Provides additional information as a supplement to the text.

Revision History

Version Revision Content Release Time

Updated the event linkage and database


V1.0.4 January 2024
settings.

V1.0.3 ● Updated the system settings function. April 2023

● Updated basic setting function.


V1.0.2 ● Updated adding device function. December 2022
● Updated device configuration function.

● Updated home page.


V1.0.1 ● Updated data management function. August 2022
● Updated backup and restore function.

V1.0.0 First release. April 2022

I
Privacy Protection Notice

As the device user or data controller, you might collect the personal data of others such as their
face, audio, fingerprints, and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.

About the Manual

● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Table of Contents
Foreword.............................................................................................................................................................. I
1 Overview...........................................................................................................................................................1
2 Installation and Login..................................................................................................................................... 2
2.1 Installation............................................................................................................................................. 2
2.2 Initialization........................................................................................................................................... 2
2.3 Login....................................................................................................................................................... 4
2.4 Password Reset...................................................................................................................................... 5
2.5 Feedback................................................................................................................................................ 5
3 Home Page....................................................................................................................................................... 7
4 System Configurations.................................................................................................................................... 9
4.1 Basic Setting........................................................................................................................................... 9
4.2 Monitor Setting....................................................................................................................................10
4.3 Device Setting...................................................................................................................................... 12
4.4 Event Setting........................................................................................................................................12
4.5 Local Path............................................................................................................................................. 13
4.6 Data Management............................................................................................................................... 14
4.7 Attendance Setting..............................................................................................................................15
4.8 Video Intercom Settings......................................................................................................................16
4.9 Backing up and Restoring................................................................................................................... 17
4.10 Database Settings..............................................................................................................................18
5 Device Management......................................................................................................................................19
5.1 Adding Devices.................................................................................................................................... 19
5.1.1 Adding Device by Searching.................................................................................................... 19
5.1.2 Adding Device One by One.......................................................................................................21
5.1.3 Importing Device in Batches.................................................................................................... 22
5.2 Exporting Devices................................................................................................................................22
5.3 Managing Devices................................................................................................................................22
5.3.1 Editing Devices.......................................................................................................................... 22
5.3.2 Initializing Devices.................................................................................................................... 22
5.3.3 Changing IP................................................................................................................................24
5.3.4 Configuring Devices.................................................................................................................. 24
5.3.5 Alarm Configuration................................................................................................................. 28
6 Log Query....................................................................................................................................................... 29
7 Event Configuration...................................................................................................................................... 30
8 Event Center...................................................................................................................................................34
8.1 Overview...............................................................................................................................................34
8.2 Configuring Live View Video.............................................................................................................. 35

III
Appendix 1 Cybersecurity Recommendations............................................................................................. 37

IV
1 Overview
SmartPSS Lite is a client software developed for small and medium-sized solutions. You can
download various solutions as needed. This manual introduces the general functions and
operations.

1
2 Installation and Login
2.1 Installation
Contact technical support or download ToolBox to get the SmartPSS Lite.
● If you get the software package of the SmartPSS Lite, install and run the software according to
page instructions.
● If you get the software by the ToolBox, run the SmartPSS Lite according to page instructions.

2.2 Initialization
Initialize SmartPSS Lite when you log in for the first time, including setting a password for login and
security questions for resetting password.
Procedure
Step 1 Double-click SmartPSSLite.exe, or click Open next to the software icon in the ToolBox.
Step 2 Select the language from the drop-down list, select I have read and agree the software
agreement , and then click Next.
Step 3 Click Browse to select installation path, and then click Install.
Figure 2-1 Select installation path

Step 4 Click Finish to complete the installation.

Select Run SmartPSSLite to start SmartPSS Lite.


Step 5 Select the application scenes you want to add, and then click OK.

2
Figure 2-2 Select application scenes

Step 6 Click Agree and Continue to agree Software License Agreement and Product Privacy
Policy.
Step 7 Set password on the Initialization page, and then click Next.
Figure 2-3 Set password

3
Table 2-1 Initialization parameters

Parameter Description
The password must consist of 8 to 32 non-blank characters and
Password contain at least two types of characters among uppercase,
lowercase, number, and special character (excluding ' " ; : &).
Display the effectiveness of a password against guessing or brute-
force attacks. Green means the password is strong enough, and
Password Strength
red means less strong. Set a password of high security level
according to the password strength prompt.
Confirm Password Enter the password again to confirm the password.
Enable Auto Login after Registration so that the SmartPSS Lite
Auto Login after Registration will log in automatically after initialization; otherwise the login
page is displayed.
Step 8 Set security questions, and then click Finish.
Figure 2-4 Set security questions

2.3 Login
Procedure
Step 1 Double-click SmartPSSLite.exe, or click Open next to the software icon in the ToolBox.
Step 2 Enter username and password, and then click Login.
If multiple networks are available on your computer, you can select one from them.

4
Figure 2-5 Login

Table 2-2 Parameters of login

Parameter Description
Remember Enable Remember Password so that you do not need to enter the password
Password again when logging in next time.
Enable Auto Login so that the SmartPSS Lite will log in automatically the
Auto Login
next time when you use the same user account.
Click Forgot password? to reset password through security questions when
Forgot password?
you forget the password.

2.4 Password Reset


You can reset the password by answering the security questions.
Procedure
Step 1 Double-click SmartPSSLite.exe, or click Open next to the software icon in the ToolBox.
Step 2 Click Forgot password? on the login page.
Step 3 Answer the security questions, and then click Next.
Step 4 Reset password according to page instructions.

2.5 Feedback
If you have any suggestion, on the upper right corner of the page, select > Feedback, and then
you can enter suggestions (words), upload pictures and attachments, and then click Submit.

5
Figure 2-6 Feedback

6
3 Home Page
Figure 3-1 Home page

Table 3-1 Parameters of home page

No. Parameter Description

Display the home page by default.


1 Function tab When you click on a function for the first time, the function tab is
added here.

Click or to turn on or turn off the alarm sound.


The number on the icon means the number of alarm events that
2 Alarm sound are reported but unprocessed. Click the number to open the
Event Center to view the details of alarm events. For details, see
"8 Event Center".

7
No. Parameter Description

● Click , and then select User Management to manage users,


such as add role/user, delete role/user and set permissions.
● Click , and then select Lock Screen to lock screen. Enter
password of login account when you want to unlock.
● Click , and then select Switch User to return to the login
page. You can log in with new account.
● Click , and then select Help Manual to get the user’s
3 User management
manual.
● Click , and then click Feedback to send feedback to us.
● Click , and then select About to view the system version,
date, Open Source Software Statement and Software
License Agreement and more.
When Open Debug Logs is enabled, debugging logs are
saved automatically to a local path for troubleshooting.

System Configure basic settings, monitoring setting and other


4
configuration parameters. For details, see "4.10 Database Settings".
View the using status of CPU and RAM. If the CPU usage is high,
5 System status
the icon turns red.
6 Function menu Goes to function menus.
7 User's Manual See the user's manual of the corresponding solution.
● Devices : You can add devices, remotely configure the
device, change IP address and more.
8 Management ● Log Search : You search for or export logs.
● Event Config : Configure alarm linkage actions.

9 Solutions Goes to the solution configuration page.

8
4 System Configurations
4.1 Basic Setting
Configure the time, language, theme and other functions of the platform.
Procedure
Step 1 Click , and then select System Settings > Basic Config.
Step 2 Configure basic settings.
Figure 4-1 Basic settings

Table 4-1 Description of basic setting parameters

Parameters Description
Enable Auto check time , set Check Time, the device will automatically
Timing
check the time automatically at the scheduled time.
Auto run at startup Automatically opens the platform at startup.
Language Display the language of the platform after it restarts.

Import language packages.


Language Package
Restart the platform after the language package is imported.

9
Parameters Description

Set the save time for logs. This function take effect after the system is
Log Save Time restarted. For example, set the save time as 30, then the logs of the last 30
days will be saved.

Data Format Select the format data is displayed in.


Time Format Select the format time is displayed in.
Network Select the network performance according to your network conditions. For
Performance example, when the network is very stable, you can select High.

Skin Select the skin which is activated after restart.

The user experience plan is displayed when you log in to the platform for
User Experience Plan
the first time.

Minimum Behavior Select Show Floating Window, and after the platform is minimized, will
be displayed to show the number of alarm events.
Select Full Screen to hide the taskbar; select Maximum Window to show
Maximum Behavior
the taskbar.
Open When Software
Select the page to be displayed when the platform starts.
Starts
A prompt window will be automatically displayed when the platform is
Close Prompt
closed. Select Don't show again if you do not need the prompt.
Step 3 Click Apply.

4.2 Monitor Setting


Configure default system type, instantly replay time, local record time and other functions.
Procedure
Step 1 Click , and then select System Settings > Monitor Setting.
Step 2 Configure monitor setting parameters.

10
Figure 4-2 Monitor setting

Table 4-2 Description of monitor setting parameters

Parameter Description
Default Live Video Stream Select a video streaming type.
Select the instantly playback time. For example, if the value is set to
Instant Playback Time 5 minutes, the last 5 minutes of video will automatically begin to
play back

Select the video recording time. For example, if the value is set to 30
minutes, the system records the video for 30 minutes and then
Local Recording Time automatically saves the video in the default file path on the
computer.
The default path is \Data\User\Record.

● Organization Tree (By device) : Displays devices in the


organization tree.
Default Device Tree ● Area Tree (By Channel) : Displays channels in the organization
tree.

Hard decision decoding and soft decision decoding are two


different methods used for decoding error-correcting codes.
Decoding Type
● Soft Decode : Decode through CPU.
● Hardware Decode : Decode videos through graphics cards.

Resume Last Preview The last preview automatically opens after the platform starts.
The analytic bounding boxes will be displayed over the video being
Show IVS Rule
viewed if this function is enabled.
Save the device tree Keep devices remain selected in the device tree, even after you
selection status perform another device search.

11
Step 3 Click Apply.

4.3 Device Setting


Select System Settings > Device Settings, and then click Auto Log in to device (Take Effect
after Restart) to automatically log in to the platform when you start it.

4.4 Event Setting


Configure the alarm sound and link the sender and receiver of the email.
Procedure
Step 1 Click , and then select System Settings > Event Snapshots.
Step 2 Configure event setting parameters.
Figure 4-3 Event setting

Table 4-3 Description of event setting parameters

Parameter Description
Loop The alarm sound will be played in a loop.

12
Parameter Description
● Select Global Sound , and then select the sound file in the Wav File
Path. The sound will be played after the corresponding event is
triggered.
Global Sound ● Do not select Global Sound , and then select the event type and
sound type in the drop-down list or select the sound file in the Wav
File Path. The sound will be played after the corresponding event is
triggered.

Enable SMTP function.


1. Enable SMTP function.
2. Enter the IP of the port number of the SMTP server.
3. Enter the username and password of the sender email.
4. Enter the email of the sender and the receiver.

Supports up to 5 emails.
SMTP 5. Select an encrypt mode and enter the interval time.
The system automatically sends notifications through email at the
set interval.

The encryption protocol is used to keep data secure during


transmission over a network.
6. You can click Email Test to send a test email to check whether it
functions well.

Step 3 Click Apply.

4.5 Local Path


Set the save path for the pictures, videos and other data collected by the platform.
Procedure
Step 1 Click , and then select System Settings > File Path.
Step 2 Set the local path.
Figure 4-4 Set local path

Step 3 Click Apply.

13
4.6 Data Management
Periodically extract the attendance data from devices, and periodically clear the data, pictures and
videos saved on the computer.
Procedure
Step 1 Click ,and then select System Settings > Storage.
Step 2 Configure data management parameters.
Figure 4-5 Data management

Table 4-4 Description of data management parameters

Parameter Description
Extract attendance record The platform automatically extracts attendance and access control
regularly records and pictures according to the scheduled time.

● For attendance devices, extract the attendance data directly. For


access controllers, set the device as attendance point in advance
Scheduled Extraction of and then extract the attendance data. For details, see SmartPSS
Access Control Records Lite Attendance Solution User's Manual.
● If you set Regularly Extracting Time as Everyday, and you can
add up to 5 schedules.
● If you set Regularly Extracting Time as Every Week, you can set
a time on a day.

Automatically extract After the device is offline, the attendance records will be
attendance records automatically extracted.

When the disk is full, the system will automatically overwrite the
Overwrite Ratio
oldest images and videos according to the ratio.

14
Parameter Description
Configure the save time of database, pictures and videos according
to actual requirements. The platform automatically clears data and
pictures that exceed the saving time. It triggers at 00:00 each day or
Data Clear when the software is started.

This data does not include temperature monitoring data.

Step 3 Click Apply.

4.7 Attendance Setting


Procedure
Step 1 Click , and then select System Settings > Attendance Setting.
Step 2 Configure the attendance settings.
Figure 4-6 Attendance settings

Table 4-5 Attendance setting parameters

Parameters Description
Define the time format of attendance reports. For example,
Report Time Format if it is set as min, the time of attendance in a report will be
displayed in the format of hour and minutes.

15
Parameters Description
Sync Third-party Database Synchronize the attendance data to the defined file path.

Send attendance summary to a designated email.


1. Enable the SMTP function.
2. Enter the IP of the port number of the SMTP server.
3. Enter the username and password of the sender email.
4. Enter the email of the sender and the receiver.

Supports up to 5 emails.
Attendance Summary SMTP
Settings 5. Select an encrypt mode.
The system automatically sends attendance reports to
the email at the set interval.

The encryption protocol is used to keep data secure


during transmission over a network.
6. You can click Email Test to send a test email to check
whether it functions well.

● Period: Send the attendance summary at the defined


frequency.
Month Passed: Send attendance summary monthly.
Current Month: Send attendance summary this
month.
Send attendance summary regularly ● Time: Send attendance summary at the define time.
Daily Summary Table: Sends attendance summary in
the format of daily summary table.
Monthly Overview: Sends attendance summary in the
format of monthly summary table.

Step 3 Click Apply.

4.8 Video Intercom Settings


Procedure
Step 1 Click , and then select System Settings > Video Intercom.
Step 2 Configure the attendance settings.
Figure 4-7 Video intercom

16
Table 4-6 Video intercom parameters

Parameters Description
When the platform functions as the SIP server, enter the port
SIP Server Port
of the SIP server.

Set the organization level.


● Building: The organization only includes buildings.
● Unit: The organization includes buildings and units.

Compound Organization The configuration will take effect after the platform is
restarted. If you want to change the level of the
organization, but the organization was already created
before, go to Video Intercom > Intercom Config > Dial
Management and clear the existing data from there, and
then go to Building Manager to clear the remaining
data.

Step 3 Click Apply.

4.9 Backing up and Restoring


Backup and restore platform configuration.
Procedure
Step 1 Click , and then select System Settings > Backup and Restore.
Step 2 Configure the backup parameters.
Figure 4-8 Backup and restore

Table 4-7 Parameters description

Parameters Description
Select a backup file path and click Apply to save changes. The
Backup Path
configuration files will be stored at the defined file path.
Manual Backup Manually back up configuration files to the set file path.
Enable auto backup function, set the auto backup time, and
Auto Backup then click Apply. The platform will automatically backs up
configuration files to the set file path.

17
Parameters Description
Upload the configuration files to the platform, the
Restore configurations will be applied to the platform after the it
restarts.
Step 3 Click Apply.

4.10 Database Settings


Configure the third-party database. The database of the third-party server will be automatically
synchronized with the attendance records of the platform.
Procedure
Step 1 Select > ThirdParties Database Config.
Step 2 Configure database settings.
Figure 4-9 Configure database settings

Table 4-8 Parameters description

Parameters Description
Database Type MYSQL.
Server IP The IP address and port of the server.
Database Name The name of the database.
User Name
The username and password of the database.
User Password
Connection Test Test the whether the connection is successful.
Step 3 Enable database function.

18
5 Device Management
The SmartPSS Lite allows for adding devices. You can remotely configure and operate the devices
after adding by the SmartPSS Lite.

5.1 Adding Devices


There are several methods available to add devices.
● Automatically search
● Manually adding
● Import in batches

5.1.1 Adding Device by Searching


You can add multiple devices by searching for them on the current network segment or other
network segments.
Background Information

We recommend you add devices through searching when want to add multiple devices that are on
the same network segment, or when you want to add devices with a known network segment but
you do not know the exact IP address of the devices.

Procedure
Step 1 On the home page, click Devices.
Step 2 Select a search method.
● Auto Search: Enter the username and the password of the device. The system will
automatically search for devices that are on the same network to your computer.
● Device Network Segment: Enter the username and the password of the device, and

then define the start IP and the end IP. The system will automatically search for devices
in this IP range.
Step 3 Click Auto Search.
Step 4 Enter a IP range, and then click Search.
The system automatically searches for devices in this IP range. You can also click Auto
Search to automatically search for devices on the same network your computer is
connected to.

19
Figure 5-1 Search for devices

Step 5 Select devices, and then click Add.


Step 6 Enter the login username and password of the selected devices, and then click OK.
Step 7 Enter the login user name and password, and then click OK.
The devices will be added to the platform.
Figure 5-2 Added devices

● : Change the information of the device.


● : Goes to the webpage of the device.
● : Log out of the device, and the status of the device will become offline.
● : Log in to the device, and the status of the device will become Online.
● : Delete the device.
Related Operations
● Change IP one by one: Select a device, and then click Change IP to change the IP of the device.
● Change IP in batches: Select multiple devices, and then click Change to change their IP.

Enter the start IP, and the system will automatically assign IP to devices through increasing the
IP by one based on the start IP. For example, if the start IP is 10.XX.XXX.52, and the following IP
of devices will be 10.XX.XXX.53, 10.XX.XXX.54, and more.
● Initialize devices: Click Initialize to initialize devices.

20
Only support activating devices which are on the same network segment to your computer.

5.1.2 Adding Device One by One


If you already know the IP address of a device, you can manually add it to the platform.
Procedure
Step 1 On the home page, click Devices.
Step 2 Click Add, and then enter the device information.
Figure 5-3 Add devices

Table 5-1 Parameters of IP adding

Parameter Description
Device Name The name of the device.
● IP/Domain Name: Add devices through IP Address.
Add Mode ● SN (Available on devices that support P2P): Add devices through their
serial number.

IP/Domain Name Enter the IP address or domain name of the device.


Port No. Enter the port number (80 by default).
Username
Enter the username and the password of the device.
Password
Step 3 Click Add.

21
You can also click Add and Continue to add more devices.

5.1.3 Importing Device in Batches


You can export the device information, and then import it to another platform to add them in
batches. We recommend you add devices by importing them when the devices are not on the
same network segment.
Prerequisites
A .xml file of device information was exported. For details, see "5.2 Exporting Devices".

Procedure
Step 1 On the home page, click Devices.
Step 2 Click Import to import the file the platform.

Devices will be logged in automatically after adding.

5.2 Exporting Devices


You can export device information to local.
Procedure
Step 1 Select Devices on the home page.
Step 2 Select the device which needs to be exported, and then click Export .
Step 3 Select the local path of export, and then click Export.

5.3 Managing Devices


5.3.1 Editing Devices
You can modify the information of added device.
Procedure
Step 1 On the home page, click Devices.
Step 2 Click for added devices.
Step 3 Edit device information.
Step 4 Click Save.

5.3.2 Initializing Devices


You can only initialize devices which are on the same network segment as the computer.
Procedure
Step 1 On the home page, click Devices.
Step 2 Set the range of network segment, and then click Search.

22
Figure 5-4 Device list

Step 3 Select the uninitialized device, and then click Initialization.


Step 4 Set password, and then click Password Security.
Step 5 Set security questions, and then click Modify IP.
Step 6 Enter email address.
Step 7 Enter new IP address, subnet mask and gateway, and then click Finish.
Figure 5-5 Modify IP address

23
5.3.3 Changing IP
Procedure
Step 1 On the home page, click Devices.
Step 2 Set the range of network segment, and then click Search.
Step 3 Select devices, and then clickChange IP.
Step 4 Change the IP of the devices.
If you change IP in batches, enter a start IP and the system will automatically assign IP to
devices through increasing the IP by one based on the start IP. For example, if the start IP
is 10.XX.XXX.52, and the following IP of devices will be 10.XX.XXX.53, 10.XX.XXX.54, and
more.
Figure 5-6 Change IP in batches

Step 5 Click OK.

5.3.4 Configuring Devices


For some devices, you can perform basic configurations of the device through the platform. This
section uses configuring access control devices as an example.
Background Information

For some models of devices, you can click to perform basic configurations of the device through
the platform. For others models, you can click to go to the webpage of the device.

Procedure
Step 1 On the home page, click Devices.
Step 2 Click of access control devices.
Step 3 You can view the device information and perform some basic configurations on the
device.

24
Figure 5-7 Configure the device

● Time

25
Figure 5-8 Time settings

Table 5-2 Parameters of time setting

Parameter Descriptions

Date Format: Date display format.


Time Format: Time display format.
Time Time Zone: Time zone of the device.
System Time: Set the time of the device. You can also click Sync
PC to synchronize the time of the device to the computer.

Enable DST Enable DST time of the device.


The time of the device will be automatically synchronized to the NTP
NTP Settings
server at the defined interval.
● Update: Upload the update file, and then click Update, the device will automatically
restart after the update.

26
● Restarted: Restart the device.
● Local alarm linkage: Trigger alarms when .
Figure 5-9 Local alarm linkage

Table 5-3 Parameters description

Parameter Description
Alarm input Port Select an alarm input channel number.
Alarm out
Alarms will last for a defined time when they are triggered.
Output delay
Door Linkage
When the alarm is triggered, the door automatically opens or closes.
Door
Copy current configuration
You can copy the current configurations to other devices.
to
● Extract Personnel: Extract the personnel information from device to the computer.
● Extract Attendance Records: Set the time period and extract attendance records.

Make sure that you have set access controllers as attendance points before extraction. For
details of attendance point setting, see the user's manual of SmartPSS Lite Attendance
Solution.

27
5.3.5 Alarm Configuration
Devices whose models are ASC2202B-D can be connected to external alarm devices. Go to the
External Alarm page, and then configure the parameters.
Figure 5-10 External alarm

Table 5-4 Parameters of time setting

Parameter Description
Alarm Input Select an alarm input channel number as needed.
Alarm Output Select an alarm output channel number as needed.
Output Delay Alarms will be delayed after the defined duration.
You can copy the current configurations to other devices as
Copy current configuration to
needed.

28
6 Log Query
You can query for alarm events, client logs and device logs.
Procedure
Step 1 Select Log Query.
Step 2 Select log type and log time, and then enter key words if needed.
Step 3 Click Search.
Step 4 (Optional) Click Export to export logs to local device.
Figure 6-1 Query for logs

29
7 Event Configuration
When an event or alarm occur, the system will trigger the defined linkage actions. For example,
alarm sound can be triggered when intrusion is detected. This section uses configuring intrusion
alarm linkage for a door as an example.
Background Information

Different devices support different alarm linkages, and might differ from the actual device.

Procedure
Step 1 On the home page, click Event Config .
Step 2 Select a door, select Intrusion alarm from alarm event, and then enable this function.
Step 3 Configure the notification linkages, and then click Save.
Figure 7-1 Configure notification alarms

Table 7-1 Parameters description

Parameters Description
Alarm Tone The alarm sound will be played when an event occur.
After this function is enabled, the system will automatically
Send Email jump to System page. Enable SMTP, and then configure SMTP
parameters.
Step 4 Configure video linkage.
1. Drag video channels to preview windows.
2. Configure the video linkage parameters.

30
Figure 7-2 Configure the video linkage

Table 7-2 Parameters description

Parameters Description
If the device supports PTZ function, you can select a preset
Preset points
point.
If the camera supports PTZ function, you can select a preset
Preset
point, and then the PTZ camera will go to the defined preset.
Stream Type Select main stream or sub stream.
Auto Open Video A live video window is automatically opened and lasts for a
Duration defined time when an alarm is triggered.

Enable this function and enter the duration. The system will
Record automatically record videos for the define time when an alarm
is triggered.
Video Record video.
3. Click Save.
The linked videos will be displayed when an alarm is triggered.
Step 5 Configure alarm output.
1. Select an alarm output.
2. Enable Auto Play, and then enter the duration of the alarm.
3. Click Save.
The alarm will last for a defined time.

31
Figure 7-3 Configure alarm output

Step 6 Configure the arming time.


1. When the mouse pointer becomes a pen, hold your mouse button, and then drag to
select a time range for each day.
2. If you want to cancel selecting a time range, when your mouse pointer becomes an
eraser, hold your mouse button and then drag to delete a time range.
Figure 7-4 Configure the arming time

3. You can click to adjust the time range, or select other days to apply the time range
to other days.

32
Figure 7-5 Apply the time range to other days

Step 7 (Optional) Click Copy To , select the access controller to be applied to, and then click OK.
Step 8 Click Save.

33
8 Event Center
You can view and process the real-time alarm events. Click the number on the upper-right
corner of the page to enter the event center.

8.1 Overview
Figure 8-1 Event center

Table 8-1 Description of event center parameters

No. Parameter Description


● Total Events/Processing Rate : Display the pie chart of the
total events and processing rate. Click the chart to view the
information of unprocessed events.
● Event Processing Rate : Display the processing rate of
different event types in real time.
1 Event statistics ● Event Trend Over the Last 7 Days : Display the graph of the
top five event types in seven days (excluding today). Point to
the graph to display the specific number of the alarm events.

Click to display the details of each alarm event.

2 Live View Video Preview the configured channel video. Click to the preview
page.

34
No. Parameter Description
View real-time alarm events. You can search event information
3 Real-time Events
according to alarm types and devices.

8.2 Configuring Live View Video


Configure live view video channels, and capture channel images, videos and video talks.
Procedure
Step 1 Click to select the screen number on the Event Center page.

It only supports 1, 4, 9 screen splits.


Step 2 Right-click the screen, click Stream Type, and then select the video channel that you
want to live view.
Step 3 Click Setup, and then select the configuration according to actual needs.
Figure 8-2 Setup

Table 8-2 Setup

Parameter Description
Stop Refresh Stop refreshing real-time alarm events
Stop Link Video Popup Stop popping up event linkage video.

Related Operations
Live view video operations.
Point to the screen, and then the shortcut icons will be displayed on the upper-right corner of the
window.

35
Table 8-3 Description of live view operation parameters

Icon Parameter Description


Click the icon to record videos in the current screen window.
Click the icon again to stop recording and save the video to the
Local Record computer. The default save path is "…/Data/User/Record". You
can change the storage path through > System Config >
Local Path > Record Path.
Save the snapshot in the current video screen as an image on
the computer (once at a time). The default save path is "…/Data/
Visitor Picture User/Picture/Capture". You can change the save path through
> System Config > Local Path > Pic Path.
Audio Click the icon to open or close the audio of the camera.
Click the icon to open or close the audio talk of the
Audio Talk
corresponding camera.
Click the icon to open or close instant replay function. You can
configure the replay time through > System Config > Basic
Setting on the upper-right corner of the page.
Instant Replay

You need to have videos on the device before you enable


instant replay function.

Click the icon, and then scroll the mouse wheel to zoom in or
Zoom In
out the screen.
Close Video Click the icon to close the video.

36
Appendix 1 Cybersecurity Recommendations
The necessary measures to ensure the basic cyber security of the platform:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.

2. Customize the Answer to the Security Question


The security question setting should ensure the difference of answers, choose different
questions and customize different answers (all questions are prohibited from being set to the
same answer) to reduce the risk of security question being guessed or cracked.
Recommendation measures to enhance platform cyber security:
1. Enable Account Binding IP/MAC
It is recommended to enable the account binding IP/MAC mechanism, and configure the
IP/MAC of the terminal where the commonly used client is located as an allowlist to further
improve access security.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Turn On Account Lock Mechanism
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4. Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5. Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445),
remote desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH
(port 22) under Linux. At the same time, close the database port to the outside or only open to a
specific IP address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6. Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and third-
party components, and apply official patches in time.
7. Security Audit
● Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
● View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8. The Establishment of a Secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
● Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.

37
● Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.

38

You might also like