Dahua Converter Tool Users Manual V1.3.0
Dahua Converter Tool Users Manual V1.3.0
User's Manual
Foreword
General
This manual introduces the installation, functions and operations of the converter device
(hereinafter referred to as the "Converter"). Read carefully before using the device, and keep the
manual safe for future reference.
Safety Instructions
Revision History
As the device user or data controller, you might collect the personal data of others such as their
face, fingerprints, audios and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.
● The manual is for reference only. Slight differences might be found between the manual and the
product.
I
User's Manual
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.
II
User's Manual
Operation Requirements
● Make sure that the power supply of the device works properly before use.
● Do not pull out the power cable of the device while it is powered on.
● Only use the device within the rated power range.
● Transport, use and store the device under allowed humidity and temperature conditions.
● Prevent liquids from splashing or dripping on the device. Make sure that there are no objects
filled with liquid on top of the device to avoid liquids flowing into it.
● Do not disassemble the device.
Installation Requirements
● Observe all safety procedures and wear required protective equipment provided for your use
while working at heights.
● Do not expose the device to direct sunlight or heat sources.
● Do not install the device in humid, dusty or smoky places.
● Install the device in a well-ventilated place, and do not block the ventilator of the device.
● Use the power adapter or case power supply provided by the device manufacturer.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Note that the power supply requirements are subject to the device label.
● Connect class I electrical appliances to a power socket with protective earthing.
III
User's Manual
Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Product Overview............................................................................................................................................ 1
3 Basic Operation................................................................................................................................................8
3.1 Converter Settings................................................................................................................................. 8
3.1.1 Configuring CMS Connection..................................................................................................... 8
3.1.2 Configuring Network................................................................................................................ 13
3.1.3 Configuring Message Forwarding........................................................................................... 14
3.1.4 Configuring Storage..................................................................................................................14
3.2 Cloud Access.........................................................................................................................................15
3.2.1 Creating Cloud Account............................................................................................................ 15
3.2.2 Configuring Cloud Access......................................................................................................... 17
3.3 Hub Setting.......................................................................................................................................... 19
3.3.1 Adding Hub ............................................................................................................................... 19
3.3.2 Configuring Hub Status............................................................................................................ 31
3.4 Event..................................................................................................................................................... 34
3.4.1 Configuring Event Code............................................................................................................34
3.4.2 Viewing Event Logs................................................................................................................... 35
4 Maintenance.................................................................................................................................................. 37
4.1 Viewing Operation Logs......................................................................................................................37
4.2 Exporting System Logs........................................................................................................................37
4.3 Importing and Exporting Configuration Data...................................................................................38
5 Account Settings............................................................................................................................................40
5.1 Changing Account Password.............................................................................................................. 40
5.2 Configuring Auto Logout Time........................................................................................................... 40
5.3 Logging Out......................................................................................................................................... 40
Appendix 1 Performance Requirement........................................................................................................ 41
Appendix 2 Data Migration............................................................................................................................42
Appendix 3 Security Commitment and Recommendation..........................................................................44
IV
User's Manual
1 Product Overview
Dahua Converter is a software used for receiving events from Dahua Hub, processing the received
data, transforming it and then presenting it to Central Monitoring Station (CMS) in appropriate
formats.
1
User's Manual
Step 4 Wait for the installation to be completed, and then click Next.
2
User's Manual
Step 5 Keep or cancel selecting Start converter or Enabled auto run at startup based on your
needs (the two are selected by default), and then click Finish.
● Start converter : The webpage of Converter will be automatically opened after you
click Finish.
● Enabled auto run at startup : The program runs automatically at startup.
Figure 2-3 Install(3)
Related Operations
● System Tray Setting
When the Converter is successfully installed and has been in operation, its icon appears in the
system tray. Right-click the icon to open the operation menu.
3
User's Manual
Settings: Configure the hub service port of Converter, or enable/disable auto run startup
service.
The port is used for logging in to the Converter on the webpage.
Figure 2-5 Settings
You need to click Stop and then Quit to exit the current program.
● Uninstall Converter
1. Double-click the installation package or click Uninstall under the shortcut of Converter in
the Windows Start Menu, and the install window pops up.
4
User's Manual
Step 3 Configure the password protection questions, and then click OK.
5
User's Manual
It will be automatically logged into the Converter after you configure the password.
● While you do not have to set password protection questions, if you choose not to set
them, you will be unable to recover your password in the future.
● You do not have to set all 3 questions. You can pick 1 or 2.
● You can click Custom Question in the question drop-down list to create your own
custom questions if the default ones are not suitable.
Figure 2-8 Configure password protection
6
User's Manual
7
User's Manual
3 Basic Operation
3.1 Converter Settings
Configure network setting, CMS connection, message forwarding and storage setting.
8
User's Manual
9
User's Manual
Parameter Description
Enable Enable the forward function.
The account ID is assigned by the third-party platform
CMS Main Account to Converter, to support heartbeat interaction with
the platform.
Data Format Select ContactID or DCS.
Connection Method Network by default.
Connection Mode Client by default.
Messaging Protocol
● Long Connection : The single TCP connection
(SIA) that is used to send and receive multiple TCP
requests or responses.
Connection Type ● Short Connection : During data transmission, a
connection is established only when it is necessary
to send data, and is disconnected after the service
is completed.
10
User's Manual
Parameter Description
Enter the IP address of the server where the event
Address
receivers of the monitoring software is located.
Enter the listening port number of the event receiver
Port
of the monitoring software (CMS).
CMS Encryption Select None or AES.It is None by default.
It can contain 32 characters, where each character is a
CMS Key
hexadecimal digit. It is provided by CMS.
Receiver Number
It can be a hexadecimal from 0–FFFFFF.
Line Number
Connection Method It is Network by default.
Connection Mode It is Client by default.
Enter the IP address of the server where the event
Messaging Protocol Address
receiver of the monitoring software (CMS) is located.
(Manitou)
Enter the listening port number of the monitoring
Port
software (CMS).
Line Number It can be 1-999.
Select MLR2 or MLR2000.
Compatibility
The option you select for compatibility is based on
the third-party platform.
11
User's Manual
Parameter Description
Data Bits: The number of bits used to represent one
character of data. You can select 5 , 6,7 and 8. For
example, if you select 8, then it means the serial
communication can transfer a total of eight bits that
valued 0 or 1.
12
User's Manual
13
User's Manual
14
User's Manual
15
User's Manual
Step 4 Click Send and the verification will be sent to the email address that is filled in the
registration page in few minutes. Enter the received code in the check box.
Step 5 Click the check box next to I have read and agree to User Agreement And Privacy
Policy after you read them, and then click Sign up to finish the registration.
Contact the technical support from the country you select in registration to approve the
account you submitted. Only after successful approval, you can progress with login.
16
User's Manual
Related Operations
Click Forgot Password on the Log-in page to reset the password.
1. Enter the email address.
2. Click Get to obtain the verification code sent to your email inbox, and then enter the received
code in the check box.
3. Enter the new password and confirm it, and then click OK.
Figure 3-10 Forget password
17
User's Manual
Step 5 (Optional) Click Change Password to change the password for the account, and then
click OK.
Figure 3-12 Change password
Step 6 Click Modify Account Info, enter the password to log in to the current cloud account,
and then modify the information.
The modified information requires approval from the company on DoLynk Care. When
the approval process is ongoing, the Modify Account Info button will be disabled and
appear grayed out.
18
User's Manual
Both DoLynk Care and DMSS support cloud connection and auto registration. You can download
any of them or both of them depending on your needs.
19
User's Manual
Background Information
● The hub can establish connection with Converter either through Dahua cloud or auto
registration. The two methods can be used simultaneously. Converter would select one method
as the primary link and the other as the alternate link depending on situation. You can also
choose to use one of the two methods alone.
● If you want to connect through cloud access, make sure that you have configured the cloud
access settings. See "3.2.1 Creating Cloud Account".
Figure 3-15 Hub connection method
The operation on DMSS or DoLynk Care is the same. Here uses DMSS as an example.
1. On the Login screen, enter your email and password, and then tap Log in.
2. On the Hub Setting screen, tap Alarm Receiving Center.
3. Tap Enable to enable the alarm receiving function, select the Protocol as Private,
and enter the IP address and port number of the computer where Converter is
installed on.
4. Tap Scheduled Test , enable Scheduled Test, and select the auto report period, and
then tap OK.
5. Tap Save.
20
User's Manual
● The IP address and port number must be consistent with that you configured in
"3.1.2 Configuring Network".
● You would better enable Enable Video Re-Detection if you have added IPC or
PIR-Camera to the alarm hub and want to receive alarm messages with videos or
pictures attached.
● Different alarm receiving centers of the same alarm hub cannot be set to connect
21
User's Manual
Step 3 Select the device you just configured, and click Add.
Figure 3-19 Add page
If you use batch adding function, which is through clicking the icon at the top left of
the Add page, then you will be asked to enter the username and password of the device
for successful adding when there is at least one device that is connected through auto
registration among all the selected devices.
Wait for a while after adding, or click Refresh , and the Direct Connection Status of the
newly added device is online.
Step 4 On the Device List page, click of a device, enter the device ID, username and
password used to log into the web page of the device, and then click OK.
The device ID is the unique device identification code sent to the third-party alarm
receiving center. It helps the alarm receiving center to determine which device sent the
event. The device ID must be 4 characters. It can be 4 digits or a combination of
uppercase letters and digits (totally 4 characters). We recommend that you use 4 digits.
22
User's Manual
Step 2 On the Site screen, tap on the upper-left corner to switch to Site Mode.
23
User's Manual
Step 3 Tap a site on the Site Mode screen, and tap Apply for Security Service on the home
screen of this site.
Figure 3-23 Apply for security service
Step 4 Select the hub from the list, and tap Select Security Company to select a security
company, and then tap OK to complete the binding process.
24
User's Manual
The screen displays The application for security service was successful sent... prompt
to indicate that your binding is successful.
If you do not find the security company you want in the list, you can use fuzzy search to
filter hubs on the list through entering keywords or account names, or you can search for
accounts in all regions under the server through entering cloud accounts if the
companies are not on the list.
Figure 3-25 Select security company
Step 5 On the Companies Applied for screen, tap , and enable Scheduled Test and select
the auto report period, and then tap OK.
25
User's Manual
Step 9 On the Device List page, click of a device, enter the device ID (4 digits), and then
click OK.
The device ID is the unique device identification code sent to the third-party alarm
receiving center. It helps the alarm receiving center to determine which device sent the
event.
26
User's Manual
If a device is added through two methods (both auto registration and cloud connection)
simultaneously, and the auto registration works normally, then you just need to enter the
device ID, and then click OK.
Figure 3-30 Edit (2)
27
User's Manual
28
User's Manual
Step 4 Select a cloud account under the country or region you select, and then tap OK to bind it.
If you do not know which region the cloud account is registered under, you can enter the
complete cloud account to perform accurate search for cloud accounts under the server.
Figure 3-33 Select account
29
User's Manual
Step 6 On the Companies Applied for screen, tap , and enable Scheduled Test and select
the auto report period, and then tap OK.
Figure 3-35 Companies Applied for
30
User's Manual
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List, select the device, and then click Delete.
Step 3 Enter the password of the Converter admin account, and click OK to delete the chosen
devices.
Figure 3-37 Delete confirmation
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List.
Step 3 Select the device, click next to an individual piece of hub, or click Activate on the
top left corner of the page to activate the chosen device(s).
Figure 3-38 Activation page
31
User's Manual
Background Information
● It only applies to devices that is added to Converter through cloud connection.
● The device cannot be added by Converter after unbinding. You need to re-apply security
services on Dolynk Care or DMSS.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List page, and then click Unbind to go to the Unbind page.
Figure 3-40 Enter unbind page
Step 3 Click Unbind next to the individual piece of hub, enter the password of the Converter
account, and click OK to unbind the chosen devices.
32
User's Manual
Or you can select multiple pieces of hub information, and click at the top left corner
of the page to batch unbind the devices.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List page, and then click Refresh to refresh the selected devices.
When the device status in the device list changes, we recommended that you click
Refresh to update the latest status. Otherwise, the device status might not be
synchronized.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List, select the device, and then click Deactivate.
Step 3 Enter the password of Converter account, and click OK to deactivate the selected devices.
33
User's Manual
3.4 Event
34
User's Manual
You need to finish the excel of the event list. Refer to the exported excel as the template.
● Delete : Delete the selected event.
The remarks remain empty only when messages are successfully sent.
35
User's Manual
36
User's Manual
4 Maintenance
4.1 Viewing Operation Logs
View logs of the operation on Converter.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Maintenance > Operation Logs.
Step 3 Configure the operation time to view the operation logs.
Figure 4-1 Operation logs
37
User's Manual
38
User's Manual
3. Click Browse to select the import file, and then enter the key.
4. Click Import.
Figure 4-6 Import(2)
39
User's Manual
5 Account Settings
5.1 Changing Account Password
Log in to the webpage of Converter, and select Account > Change Password to reset the
password for the account.
40
User's Manual
Function Specifications
Max. Devices Supported 5000
Distribution without Video
100 TPS
Event
Max. Event Search Number 50000
ARC Protocol Conversion SurGard; Manitou; SIA-DC-09
Type Requirements
CPU Intel(R) Core(TM) i5-7500 @ 3.0 GHz, 4-core or higher
Memory At least 4GB (available)
Hard Disk At least 200GB
Network Card At least gigabit
● Windows 7 (64-bit)
● Windows 10 (64-bit)
● Windows 11_pro (64-bit)
Operating System ● Windows_Server_2012 (64-bit)
● Windows_Server_2016 (64-bit)
● Windows_Server_2019 (64-bit)
41
User's Manual
Step 2 Copy and paste the datamigration program to the directory of Converter that you want to
export configuration data.
Step 3 Double-click datamigration to run the program.
Appendix Figure 2-2 Migration
A backup file that contains the system data is generated after running the program. The
default password to import this file to Converter is admin123.
Appendix Figure 2-3 Backup file
42
User's Manual
Step 4 Log in to the webpage of Converter that you are currently using, and select
Maintenance > Import and Export to import the backup file.
The system data is therefore transferred.
43
User's Manual
Account Management
44
User's Manual
It is recommended to enable the account binding IP/MAC mechanism to further improve access
security.
Service Configuration
1. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
2. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, etc., to reduce
risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
Network Configuration
Security Auditing
Physical Protection
We suggest that you perform physical protection to the device that has installed the platform. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from carrying
out physical contacts such as damaging hardware.
45
User's Manual
Perimeter Security
We suggest that you deploy perimeter security products and take necessary measures such as
authorized access, access control, and intrusion prevention to protect the software platform
security.
46