0% found this document useful (0 votes)
92 views52 pages

Dahua Converter Tool Users Manual V1.3.0

Uploaded by

pp2jntg625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
92 views52 pages

Dahua Converter Tool Users Manual V1.3.0

Uploaded by

pp2jntg625
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

Converter Tool

User's Manual

ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.3.0


User's Manual

Foreword
General

This manual introduces the installation, functions and operations of the converter device
(hereinafter referred to as the "Converter"). Read carefully before using the device, and keep the
manual safe for future reference.

Safety Instructions

The following signal words might appear in the manual.

Signal Words Meaning


Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided, could
result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in property
damage, data loss, reductions in performance, or unpredictable results.
Provides methods to help you solve a problem or save time.

Provides additional information as a supplement to the text.

Revision History

Version Revision Content Release Time


V1.3.0 Added new functions. June 2024
V1.2.0 Updated content. March 2024
V1.1.0 Updated content. August 2023
V1.0.0 First release. May 2023

Privacy Protection Notice

As the device user or data controller, you might collect the personal data of others such as their
face, fingerprints, audios and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.

About the Manual

● The manual is for reference only. Slight differences might be found between the manual and the
product.

I
User's Manual

● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.

II
User's Manual

Important Safeguards and Warnings


This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.

Operation Requirements

● Make sure that the power supply of the device works properly before use.
● Do not pull out the power cable of the device while it is powered on.
● Only use the device within the rated power range.
● Transport, use and store the device under allowed humidity and temperature conditions.
● Prevent liquids from splashing or dripping on the device. Make sure that there are no objects
filled with liquid on top of the device to avoid liquids flowing into it.
● Do not disassemble the device.

Installation Requirements

● Connect the device to the adapter before power on.


● Strictly abide by local electrical safety standards, and make sure that the voltage in the area is
steady and conforms to the power requirements of the device.
● Do not connect the device to more than one power supply. Otherwise, the device might
become damaged.

● Observe all safety procedures and wear required protective equipment provided for your use
while working at heights.
● Do not expose the device to direct sunlight or heat sources.
● Do not install the device in humid, dusty or smoky places.
● Install the device in a well-ventilated place, and do not block the ventilator of the device.
● Use the power adapter or case power supply provided by the device manufacturer.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Note that the power supply requirements are subject to the device label.
● Connect class I electrical appliances to a power socket with protective earthing.

III
User's Manual

Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III
1 Product Overview............................................................................................................................................ 1

2 Installing and Initializing Converter.............................................................................................................. 2


2.1 Installing Converter............................................................................................................................... 2
2.2 Initializing Converter.............................................................................................................................5
2.3 Logging in to Converter........................................................................................................................ 6

3 Basic Operation................................................................................................................................................8
3.1 Converter Settings................................................................................................................................. 8
3.1.1 Configuring CMS Connection..................................................................................................... 8
3.1.2 Configuring Network................................................................................................................ 13
3.1.3 Configuring Message Forwarding........................................................................................... 14
3.1.4 Configuring Storage..................................................................................................................14
3.2 Cloud Access.........................................................................................................................................15
3.2.1 Creating Cloud Account............................................................................................................ 15
3.2.2 Configuring Cloud Access......................................................................................................... 17
3.3 Hub Setting.......................................................................................................................................... 19
3.3.1 Adding Hub ............................................................................................................................... 19
3.3.2 Configuring Hub Status............................................................................................................ 31
3.4 Event..................................................................................................................................................... 34
3.4.1 Configuring Event Code............................................................................................................34
3.4.2 Viewing Event Logs................................................................................................................... 35

4 Maintenance.................................................................................................................................................. 37
4.1 Viewing Operation Logs......................................................................................................................37
4.2 Exporting System Logs........................................................................................................................37
4.3 Importing and Exporting Configuration Data...................................................................................38

5 Account Settings............................................................................................................................................40
5.1 Changing Account Password.............................................................................................................. 40
5.2 Configuring Auto Logout Time........................................................................................................... 40
5.3 Logging Out......................................................................................................................................... 40
Appendix 1 Performance Requirement........................................................................................................ 41
Appendix 2 Data Migration............................................................................................................................42
Appendix 3 Security Commitment and Recommendation..........................................................................44

IV
User's Manual

1 Product Overview
Dahua Converter is a software used for receiving events from Dahua Hub, processing the received
data, transforming it and then presenting it to Central Monitoring Station (CMS) in appropriate
formats.

1
User's Manual

2 Installing and Initializing Converter


2.1 Installing Converter
Prerequisites
Make sure that you have received the installation package from the https://
depp.dahuasecurity.com/integration/guide/download/Converter.
Procedure
Step 1 Log in to the computer as an administrator.
Step 2 Double-click the installation package.
Step 3 Select the destination folder and then click Install.
Figure 2-1 Install(1)

Step 4 Wait for the installation to be completed, and then click Next.

2
User's Manual

Figure 2-2 Install(2)

Step 5 Keep or cancel selecting Start converter or Enabled auto run at startup based on your
needs (the two are selected by default), and then click Finish.
● Start converter : The webpage of Converter will be automatically opened after you
click Finish.
● Enabled auto run at startup : The program runs automatically at startup.
Figure 2-3 Install(3)

Related Operations
● System Tray Setting
When the Converter is successfully installed and has been in operation, its icon appears in the
system tray. Right-click the icon to open the operation menu.

3
User's Manual

Figure 2-4 Menu

Settings: Configure the hub service port of Converter, or enable/disable auto run startup
service.
The port is used for logging in to the Converter on the webpage.
Figure 2-5 Settings

Start/Stop: Start or stop service.


Quit: Exit the program.

You need to click Stop and then Quit to exit the current program.
● Uninstall Converter
1. Double-click the installation package or click Uninstall under the shortcut of Converter in
the Windows Start Menu, and the install window pops up.

4
User's Manual

Figure 2-6 Windows task bar

2. Click Next to install the program from the specified path.


3. (Optional) Select Save Parameters so that parameter files will be automatically replaced in
next installation.
4. Click Finish to complete uninstalling.

2.2 Initializing Converter


For first-time use, you need to initialize the account.
Procedure

Step 1 Double-click to go to the webpage of Converter.


Step 2 Configure the password for admin account, confirm it, and then click Next.
The username is admin by default.
Figure 2-7 Create password

Step 3 Configure the password protection questions, and then click OK.

5
User's Manual

It will be automatically logged into the Converter after you configure the password.
● While you do not have to set password protection questions, if you choose not to set
them, you will be unable to recover your password in the future.
● You do not have to set all 3 questions. You can pick 1 or 2.
● You can click Custom Question in the question drop-down list to create your own
custom questions if the default ones are not suitable.
Figure 2-8 Configure password protection

2.3 Logging in to Converter


Procedure

Step 1 Double-click to go to the webpage of Converter.


Step 2 Enter the username and password, and select I have read and agree to User Agreement
And Privacy Policy , and then click Login.

6
User's Manual

Figure 2-9 Login

7
User's Manual

3 Basic Operation
3.1 Converter Settings
Configure network setting, CMS connection, message forwarding and storage setting.

3.1.1 Configuring CMS Connection


Establish a connection to the receiver of monitoring software of CMS (Central Monitoring Station).
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Setting > CMS Connection.
Step 3 Configure the CMS settings.
Figure 3-1 CMS connection (Manitou)

8
User's Manual

Figure 3-2 CMS connection (Surgard)

9
User's Manual

Figure 3-3 CMS(SIA)

Table 3-1 Description of CMS connection parameter

Parameter Description
Enable Enable the forward function.
The account ID is assigned by the third-party platform
CMS Main Account to Converter, to support heartbeat interaction with
the platform.
Data Format Select ContactID or DCS.
Connection Method Network by default.
Connection Mode Client by default.

Messaging Protocol
● Long Connection : The single TCP connection
(SIA) that is used to send and receive multiple TCP
requests or responses.
Connection Type ● Short Connection : During data transmission, a
connection is established only when it is necessary
to send data, and is disconnected after the service
is completed.

10
User's Manual

Parameter Description
Enter the IP address of the server where the event
Address
receivers of the monitoring software is located.
Enter the listening port number of the event receiver
Port
of the monitoring software (CMS).
CMS Encryption Select None or AES.It is None by default.
It can contain 32 characters, where each character is a
CMS Key
hexadecimal digit. It is provided by CMS.
Receiver Number
It can be a hexadecimal from 0–FFFFFF.
Line Number
Connection Method It is Network by default.
Connection Mode It is Client by default.
Enter the IP address of the server where the event
Messaging Protocol Address
receiver of the monitoring software (CMS) is located.
(Manitou)
Enter the listening port number of the monitoring
Port
software (CMS).
Line Number It can be 1-999.
Select MLR2 or MLR2000.

Compatibility
The option you select for compatibility is based on
the third-party platform.

Connection Mode: Select Client or Server.


Connection Type:
● Long Connection : The single TCP connection
that is used to send and receive multiple TCP
requests/responses.
● Short Connection : During data transmission, a
Connection Method connection is established only when it is necessary
Messaging Protocol (Network) to send data, and is disconnected after the service
(Surgard) is completed.

Address: Enter the IP address of the server where the


event receiver of the monitoring software (CMS) is
located.
Port: Enter the listening port number of the event
receiver of the monitoring software (CMS).
COM Number: Select the serial port number for the
local computer, with the Converter installed on, to
establish a connection with third-party platform.
Connection Method
(Serial Port) Baud Rate: The unit of measurement for symbol rate
that determines the speed of communication. The
higher the rate is, the faster the communication will
be.

11
User's Manual

Parameter Description
Data Bits: The number of bits used to represent one
character of data. You can select 5 , 6,7 and 8. For
example, if you select 8, then it means the serial
communication can transfer a total of eight bits that
valued 0 or 1.

Most forms of data requires 8 bits.

Stop Bits: A bit(s) that marks the end of a unit of


transmission. You can select 1 , 1.5 and 2.

The greater the number of stop bits, the more


tolerance there is for synchronization. But the data
transmission rate is slower.

Parity: A method to check for parity error that is used


to verify the accuracy of serial communication.
● None : No parity bit.
● Odd : The parity bit is set to 1 if there is an odd
number of one bits in a one-byte data item. If the
number of one bits adds up to an even number,
the parity bit is set to 0.
● Even : The parity bit is set to 0 if there is an even
number of one bits in a one-byte data item. If the
number of one bits adds up to an odd number,
the parity bit is set to 1.
● Mark : The parity bit is 1.
● Space : The parity bit is 0.

Receiver Number It must have 2 digits.


It must have 3 digits when MLR2000 is selected as
Line Number
compatibility, and 1 digit when MLR2 is selected.
Once the number of retransmissions reaches the
Max Retransmission Times defined value, all remaining alarm messages that are
sent will be filtered out.
The duration of time that the system waits for a
Response Timeout
response before considering it as a failure or timeout.
Select Yes if you need this function, or No to disable
Send Heartbeat
it.
Heartbeat A regular interval sent between machines.
If you select Connection Method as the Serial Port,
Listen for COM port heartbeat answers you can enable the Listen for COM port heartbeat
answers. It is enabled by default.
Step 4 Click Save.
The status of the connection is displayed in the top-center of the window, showing if
Converter and the third-party platform successfully connected.

12
User's Manual

3.1.2 Configuring Network


Configure the network status of the Converter.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Setting > Network Setting.
Step 3 Configure the UUID, select the local listening IP and configure the port, or enable the
backup listening IP and port if you have a second network card.
When the IP and port number in Preferred IP Address under the Alarm Receive Central
of DMSS and DoLynk is that of the primary Converter and the IP and port number in
Alternate IP Address is that of the secondary Converter, then their UUID should be the
same to avoid event loss during network switch. In other cases, the UUID does not need
to be the same.
Figure 3-4 Preferred IP and Alternate IP

Figure 3-5 Network setting

Step 4 Click Save.

13
User's Manual

The listening status will be updated.

3.1.3 Configuring Message Forwarding


After configuring the forwarding events, the device can forward the selected events when it is
activated.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Setting > Message Forwarding Config.
Step 3 Select the forwarding configuration that you need.
● Event Type: Select the event type for forwarding.
● Video Verification: Enable the function to send alarm images and videos to the alarm
receiving center.
Figure 3-6 Message forward configuration

Step 4 Click Save.

3.1.4 Configuring Storage


Configure storage for images and videos.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Setting > Storage Settings.
Step 3 Enable the Image and Video Storage function.
Step 4 Configure the storage period and select the storage path.

14
User's Manual

Figure 3-7 Storage

Step 5 Click Save.

3.2 Cloud Access

3.2.1 Creating Cloud Account


You need to create a cloud account to have Converter access to cloud if you want to add devices
through cloud access.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Cloud Access , and then click Create Cloud Account.
Step 3 Enter the registration information.

15
User's Manual

Figure 3-8 Registration

Step 4 Click Send and the verification will be sent to the email address that is filled in the
registration page in few minutes. Enter the received code in the check box.
Step 5 Click the check box next to I have read and agree to User Agreement And Privacy
Policy after you read them, and then click Sign up to finish the registration.

Contact the technical support from the country you select in registration to approve the
account you submitted. Only after successful approval, you can progress with login.

16
User's Manual

Figure 3-9 Registration succeed

Related Operations
Click Forgot Password on the Log-in page to reset the password.
1. Enter the email address.
2. Click Get to obtain the verification code sent to your email inbox, and then enter the received
code in the check box.
3. Enter the new password and confirm it, and then click OK.
Figure 3-10 Forget password

3.2.2 Configuring Cloud Access


You need to configure cloud access if you want to add devices through cloud access.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Click Enable to enable the cloud access function.

17
User's Manual

● The function is turned off by default.


● You need to enable the function if you want to add devices through cloud access.
Otherwise, keep it by default.
Step 3 Enter the username and password of the cloud account, and then click Save and Access.
Step 4 Click Refresh to update the webpage, and then the Cloud Account Info displays the
account information.
Figure 3-11 Cloud access

Step 5 (Optional) Click Change Password to change the password for the account, and then
click OK.
Figure 3-12 Change password

Step 6 Click Modify Account Info, enter the password to log in to the current cloud account,
and then modify the information.
The modified information requires approval from the company on DoLynk Care. When
the approval process is ongoing, the Modify Account Info button will be disabled and
appear grayed out.

18
User's Manual

Figure 3-13 Enter password

Figure 3-14 Modify information

3.3 Hub Setting


Add the hub and modify hub status.

3.3.1 Adding Hub


Add the alarm hub to Converter.
Prerequisites
Make sure that you have installed DoLynk Care app or DMSS app if you want to use auto
registration and cloud connection.

Both DoLynk Care and DMSS support cloud connection and auto registration. You can download
any of them or both of them depending on your needs.

19
User's Manual

Background Information
● The hub can establish connection with Converter either through Dahua cloud or auto
registration. The two methods can be used simultaneously. Converter would select one method
as the primary link and the other as the alternate link depending on situation. You can also
choose to use one of the two methods alone.
● If you want to connect through cloud access, make sure that you have configured the cloud
access settings. See "3.2.1 Creating Cloud Account".
Figure 3-15 Hub connection method

3.3.1.1 Auto Registration


You can add the hub to the Converter through auto registration.
Prerequisites
Make sure that you have configured network settings. See"3.1.2 Configuring Network".
Procedure
Step 1 On your phone, tap to open the DMSS app or to open DoLynk Care.

The operation on DMSS or DoLynk Care is the same. Here uses DMSS as an example.
1. On the Login screen, enter your email and password, and then tap Log in.
2. On the Hub Setting screen, tap Alarm Receiving Center.
3. Tap Enable to enable the alarm receiving function, select the Protocol as Private,
and enter the IP address and port number of the computer where Converter is
installed on.
4. Tap Scheduled Test , enable Scheduled Test, and select the auto report period, and
then tap OK.
5. Tap Save.

20
User's Manual

Figure 3-16 Configure IP address and port

Figure 3-17 Auto report period

● The IP address and port number must be consistent with that you configured in
"3.1.2 Configuring Network".
● You would better enable Enable Video Re-Detection if you have added IPC or

PIR-Camera to the alarm hub and want to receive alarm messages with videos or
pictures attached.
● Different alarm receiving centers of the same alarm hub cannot be set to connect

to the same Converter.


Step 2 On the Device List page of Converter, click Add.

21
User's Manual

Figure 3-18 Device list

Step 3 Select the device you just configured, and click Add.
Figure 3-19 Add page

Figure 3-20 Add device

If you use batch adding function, which is through clicking the icon at the top left of
the Add page, then you will be asked to enter the username and password of the device
for successful adding when there is at least one device that is connected through auto
registration among all the selected devices.
Wait for a while after adding, or click Refresh , and the Direct Connection Status of the
newly added device is online.

Step 4 On the Device List page, click of a device, enter the device ID, username and
password used to log into the web page of the device, and then click OK.

The device ID is the unique device identification code sent to the third-party alarm
receiving center. It helps the alarm receiving center to determine which device sent the
event. The device ID must be 4 characters. It can be 4 digits or a combination of
uppercase letters and digits (totally 4 characters). We recommend that you use 4 digits.

22
User's Manual

Figure 3-21 Edit

3.3.1.2 Cloud Connection


You can add the hub to Converter through cloud connection.
Prerequisites
● Make sure that you have added hub to Dolynk Care app or DMSS. For detailed operation of
device adding, see their user's manual for reference.
● Make sure that you have created a cloud account and configured cloud settings. See "3.2.1
Creating Cloud Account".

3.3.1.2.1 Adding through DoLynk Care

Add the hub through DoLynk Care.


Procedure
Step 1 On your phone, tap to open the DoLynk Care app.

Step 2 On the Site screen, tap on the upper-left corner to switch to Site Mode.

23
User's Manual

Figure 3-22 Site mode

Step 3 Tap a site on the Site Mode screen, and tap Apply for Security Service on the home
screen of this site.
Figure 3-23 Apply for security service

Step 4 Select the hub from the list, and tap Select Security Company to select a security
company, and then tap OK to complete the binding process.

24
User's Manual

Figure 3-24 Select hub

The screen displays The application for security service was successful sent... prompt
to indicate that your binding is successful.

If you do not find the security company you want in the list, you can use fuzzy search to
filter hubs on the list through entering keywords or account names, or you can search for
accounts in all regions under the server through entering cloud accounts if the
companies are not on the list.
Figure 3-25 Select security company

Step 5 On the Companies Applied for screen, tap , and enable Scheduled Test and select
the auto report period, and then tap OK.

25
User's Manual

Figure 3-26 Companies Applied for

Figure 3-27 Auto report period

Step 6 Log into the webpage of Converter.


Step 7 On the Device List page of Converter, click Add.
Step 8 Select the device you just configured, and then click Add.
The page displays Successfully added prompt.
Figure 3-28 Cloud connection device

Step 9 On the Device List page, click of a device, enter the device ID (4 digits), and then
click OK.

The device ID is the unique device identification code sent to the third-party alarm
receiving center. It helps the alarm receiving center to determine which device sent the
event.

26
User's Manual

Figure 3-29 Edit

If a device is added through two methods (both auto registration and cloud connection)
simultaneously, and the auto registration works normally, then you just need to enter the
device ID, and then click OK.
Figure 3-30 Edit (2)

3.3.1.2.2 Adding through DMSS

Add the hub through DMSS.


Procedure
Step 1 On your phone, tap to open the DMSS app.
Step 2 On the Device screen, tap next to a device, and then tap Apply for Security
Services.

27
User's Manual

Figure 3-31 Apply for security services

Step 3 Select the country or region, and then tap OK.

28
User's Manual

Figure 3-32 Select country or region

Step 4 Select a cloud account under the country or region you select, and then tap OK to bind it.
If you do not know which region the cloud account is registered under, you can enter the
complete cloud account to perform accurate search for cloud accounts under the server.
Figure 3-33 Select account

29
User's Manual

Figure 3-34 Bind by searching

Step 5 Repeat Step 6 to Step 9 to finish the settings.

Step 6 On the Companies Applied for screen, tap , and enable Scheduled Test and select
the auto report period, and then tap OK.
Figure 3-35 Companies Applied for

Figure 3-36 Auto report period

30
User's Manual

3.3.2 Configuring Hub Status

3.3.2.1 Deleting the Hub

Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List, select the device, and then click Delete.
Step 3 Enter the password of the Converter admin account, and click OK to delete the chosen
devices.
Figure 3-37 Delete confirmation

3.3.2.2 Activating the Hub

Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List.

Step 3 Select the device, click next to an individual piece of hub, or click Activate on the
top left corner of the page to activate the chosen device(s).
Figure 3-38 Activation page

Step 4 On the Activate window, click OK to confirm the activation.

31
User's Manual

Figure 3-39 Activate the device

3.3.2.3 Unbinding the Hub

Background Information
● It only applies to devices that is added to Converter through cloud connection.
● The device cannot be added by Converter after unbinding. You need to re-apply security
services on Dolynk Care or DMSS.

Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List page, and then click Unbind to go to the Unbind page.
Figure 3-40 Enter unbind page

Step 3 Click Unbind next to the individual piece of hub, enter the password of the Converter
account, and click OK to unbind the chosen devices.

32
User's Manual

Figure 3-41 Unbind

Or you can select multiple pieces of hub information, and click at the top left corner
of the page to batch unbind the devices.

3.3.2.4 Refreshing the Hub

Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List page, and then click Refresh to refresh the selected devices.

When the device status in the device list changes, we recommended that you click
Refresh to update the latest status. Otherwise, the device status might not be
synchronized.

3.3.2.5 Deactivating the Hub

Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Device > Device List, select the device, and then click Deactivate.
Step 3 Enter the password of Converter account, and click OK to deactivate the selected devices.

33
User's Manual

Figure 3-42 Deactivate confirmation

3.4 Event

3.4.1 Configuring Event Code


Configure the new event code or edit the existing code.
Procedure
Step 1 Log in to the webpage of the Converter.
Step 2 Select Event > Event Code.
Step 3 Click Add to add new event.
Step 4 Configure the parameters.

34
User's Manual

Figure 3-43 Event code

Step 5 Click OK.


Related Operations
● Default : Restore the event list to default settings.
● Export : Export all of the events in the current list.
● Import : Import the event list (.xlsx/.xls format) from your local computer.

You need to finish the excel of the event list. Refer to the exported excel as the template.
● Delete : Delete the selected event.

3.4.2 Viewing Event Logs


View logs of the event, including device name, device ID, event name, event code, event time and
time when messages are sent.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Event > Event Monitoring to view the event logs.
● Event Time : The local time zone of the computer where Converter is installation on.
● Remarks : Record the reason why the alarm information is discarded.

The remarks remain empty only when messages are successfully sent.

35
User's Manual

Figure 3-44 Log list

Step 3 Click Details to view the details of the event.


Related Operations
● Enter the device ID to search for the event logs.
● Enter the original code to search for event logs.
● Enter the start date and end date to search for event logs.

36
User's Manual

4 Maintenance
4.1 Viewing Operation Logs
View logs of the operation on Converter.
Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Maintenance > Operation Logs.
Step 3 Configure the operation time to view the operation logs.
Figure 4-1 Operation logs

Step 4 Click Details to view the details of the specific operation.

4.2 Exporting System Logs


Export the device list logs, event code list logs, CMS connection logs, operation logs, network
setting logs and message forwarding logs in a zip format.
Procedure
Step 1 Log in to the webpage of the Converter.
Step 2 Select Maintenance > Import/Export.
Figure 4-2 Import or export

Step 3 Click Export next to System Logs.

37
User's Manual

4.3 Importing and Exporting Configuration Data


Import or export the system data into the Converter.
Procedure
Step 1 Log in to the webpage of the Converter.
Step 2 Select Maintenance > Import/Export.
Figure 4-3 Import or export

Step 3 Export system configuration.


1. Click Export, and then enter the password of the Converter account that you currently
log in to.
2. Click OK.
Figure 4-4 Export

Step 4 Import system configuration.


1. Click Import, and then enter the password of the Converter account that you currently
log in to.
2. Click OK.

38
User's Manual

Figure 4-5 Import(2)

3. Click Browse to select the import file, and then enter the key.
4. Click Import.
Figure 4-6 Import(2)

39
User's Manual

5 Account Settings
5.1 Changing Account Password
Log in to the webpage of Converter, and select Account > Change Password to reset the
password for the account.

5.2 Configuring Auto Logout Time


Procedure
Step 1 Log in to the webpage of Converter.
Step 2 Select Account > Auto Logout Config.
Step 3 Select Open to enable the auto log out function, and then select the logout time.
Figure 5-1 Auto logout

Step 4 Click OK.

5.3 Logging Out


Log in to the webpage of Converter, and select Account > Log Out.

40
User's Manual

Appendix 1 Performance Requirement


Appendix Table 1-1Function specifications

Function Specifications
Max. Devices Supported 5000
Distribution without Video
100 TPS
Event
Max. Event Search Number 50000
ARC Protocol Conversion SurGard; Manitou; SIA-DC-09

Appendix Table 1-2Performance Requirements

Type Requirements
CPU Intel(R) Core(TM) i5-7500 @ 3.0 GHz, 4-core or higher
Memory At least 4GB (available)
Hard Disk At least 200GB
Network Card At least gigabit
● Windows 7 (64-bit)
● Windows 10 (64-bit)
● Windows 11_pro (64-bit)
Operating System ● Windows_Server_2012 (64-bit)
● Windows_Server_2016 (64-bit)
● Windows_Server_2019 (64-bit)

● Google Chrome 80 and later


Browser ● Microsoft Edge 107 and later
● Mozilla Firefox 65 and later

41
User's Manual

Appendix 2 Data Migration


The datamigration.exe is used to transfer parameters configured in earlier versions of Converter to
higher versions.
Procedure
Step 1 Open the installation folder of the Converter that you are currently using, and select
tool > datamigration to obtain the datamigration.exe program.
Appendix Figure 2-1 Tool folder

Step 2 Copy and paste the datamigration program to the directory of Converter that you want to
export configuration data.
Step 3 Double-click datamigration to run the program.
Appendix Figure 2-2 Migration

A backup file that contains the system data is generated after running the program. The
default password to import this file to Converter is admin123.
Appendix Figure 2-3 Backup file

42
User's Manual

Step 4 Log in to the webpage of Converter that you are currently using, and select
Maintenance > Import and Export to import the backup file.
The system data is therefore transferred.

43
User's Manual

Appendix 3 Security Commitment and


Recommendation
Dahua Vision Technology Co., Ltd. (hereinafter referred to as "Dahua") places great emphasis on
cybersecurity and privacy protection. We continuously allocate special funds to enhance
employees’ awareness and capabilities in security, and ensure sufficient security protection for our
products. Dahua has established a professional security team to provide comprehensive security
empowerment and control throughout the entire product lifecycle, including design, development,
testing, production, delivery, and maintenance. Dahua products adhere to the principle of
minimum necessary data collection, service minimization, strict prohibition of backdoors, and the
disabling of unnecessary and insecure services (such as Telnet). We continuously introduce
innovative security technologies to bolster the security capabilities of our products. Additionally,
we go above and beyond by providing global users with security alarm and 24/7 security
emergency response services. This approach ensures that we are better safeguarding their security
rights and interests. At the same time, Dahua encourages users, partners, suppliers, government
agencies, industry organizations and independent researchers to report potential risks or
vulnerabilities to the Dahua PSIRT. They can do so by visiting the cybersecurity section on the
Dahua website.
The security of software platforms not only relies on the continuous attention and efforts from
manufacturers throughout R & D, production, and delivery, but also requires active participation
from users. Users should remain attentive to the environment and methods to ensure its secure
operation. To this end, we suggest users to safely use the software platform, including but not
limited to:

Account Management

1. Use Strong Passwords


● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.

2. Change Password Regularly


We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Assign Accounts and Permissions Reasonably
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Set and Update Passwords Reset Information Timely
The platform supports password reset function. To reduce the risk of being attacked, please set
up related information for password reset in time. If the information changes, please modify it in
time. When setting password protection questions, it is suggested not to use those that can be
easily guessed.
6. Enable Account Binding IP/MAC

44
User's Manual

It is recommended to enable the account binding IP/MAC mechanism to further improve access
security.

Service Configuration

1. Enable HTTPS
We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
2. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, etc., to reduce
risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.

Network Configuration

1. Enable Firewall Allowlist


We suggest you to enable allowlist function to prevent everyone, except those with specified IP
addresses, from accessing the system. Therefore, please be sure to add your computer’s IP
address and the accompanying equipment’s IP address to the allowlist.
2. Network Isolation
The network should be isolated by partitioning the video monitoring network and the office
network on the switch and router to different VLANs. This prevents attackers from using the
office network to launch Pivoting attacks on the video monitoring network.

Security Auditing

1. Check Online Users


It is recommended to check online users irregularly to identify whether there are illegal users
logging in.
2. View the Platform Log
By viewing the log, you can get the IP information of the attempt to log in to the platform and
the key operation information of the logged-in user.

Physical Protection

We suggest that you perform physical protection to the device that has installed the platform. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from carrying
out physical contacts such as damaging hardware.

45
User's Manual

Perimeter Security

We suggest that you deploy perimeter security products and take necessary measures such as
authorized access, access control, and intrusion prevention to protect the software platform
security.

46

You might also like