0% found this document useful (0 votes)
24 views24 pages

DSS Express

This document provides instructions for deploying the DSS Express platform in standalone or networked configurations. It covers installing the management tools, configuring server settings, adding licenses, and setting up clients. Requirements and functions of each component are also described.

Uploaded by

arzankahanan200
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views24 pages

DSS Express

This document provides instructions for deploying the DSS Express platform in standalone or networked configurations. It covers installing the management tools, configuring server settings, adding licenses, and setting up clients. Requirements and functions of each component are also described.

Uploaded by

arzankahanan200
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

DSS Express

Quick Deployment Manual

ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V8.3.0


Quick Deployment Manual

Foreword

General
This user’s manual introduces the functions and operations of DSS Express (hereinafter referred to as
"the system" or "the platform").

Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, reductions in performance, or
unpredictable results.

Provides methods to help you solve a problem or save time.

Provides additional information as a supplement to the text.

Frequently Used Functions


Icon/Parameter Description
View the details of an item.

Clear all selected options.

Search for items by keywords or specified content.

or Delete Delete items one by one or in batches.

or Edit an item.
、 , Enable, or
Enable or disable items one by one or in batches.
Disable
or Export Exported the selected content to your local computer.
or Refresh Refresh the content.
* A parameter that must be configured.

Privacy Protection Notice


As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and license plate number. You need to be in compliance with your local privacy
protection laws and regulations to protect the legitimate rights and interests of other people by
implementing measures which include but are not limited: Providing clear and visible identification
to inform people of the existence of the surveillance area and provide required contact information.

I
Quick Deployment Manual

About the Manual


● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Quick Deployment Manual

Table of Contents
Foreword ................................................................................................................................................................................................ I
1 Overview ............................................................................................................................................................................................1
2 Standalone Deployment .............................................................................................................................................................2
2.1 Server Requirements..........................................................................................................................................................2
2.2 Installing Management Tool ...........................................................................................................................................2
2.3 Configuring Server IP Address .......................................................................................................................................4
2.4 Management Tool ...............................................................................................................................................................5
2.5 Installing and Logging into DSS Client.......................................................................................................................7
2.5.1 Installing DSS Client.................................................................................................................................................7
2.5.1.1 DSS Client Requirements.............................................................................................................................7
2.5.1.2 Downloading and Installing DSS Client ................................................................................................7
2.5.2 Logging in to DSS Client.........................................................................................................................................8
2.5.3 Homepage of DSS Client ..................................................................................................................................... 10
2.6 Licensing............................................................................................................................................................................... 11
2.6.1 Applying for a License .......................................................................................................................................... 11
2.6.2 Activating License .................................................................................................................................................. 11
2.6.2.1 Online Activation ......................................................................................................................................... 11
2.6.2.2 Offline Activation......................................................................................................................................... 12
2.7 Installing Mobile Client .................................................................................................................................................. 13
3 Configuring LAN or WAN ......................................................................................................................................................... 15
3.1 Configuring Router .......................................................................................................................................................... 15
3.2 Mapping IP or Domain Name....................................................................................................................................... 15
Appendix 1 Service Module Introduction ............................................................................................................................ 16
Appendix 2 Cybersecurity Recommendations ................................................................................................................... 18

III
Quick Deployment Manual

1 Overview

DSS platform supports standalone deployment, and LAN to WAN mapping.

Standalone Deployment
For projects with a small number of devices, only one DSS server is required.

Figure 1-1 Standalone deployment

LAN to WAN Mapping


Perform port mapping when:
● The server of the platform and devices are on a local area network, and the DSS client in on the
internet. To make sure that the DSS client can access the platform server, you need to map the
platform IP to the Internet.
● The platform is on a local area network, and the devices are on the Internet. If you want to add
devices to the platform through automatic registration, you need to map the IP address and
ports of the platform to the Internet. For devices on the Internet, the platform can add them by
their IP addresses and ports.

The management tool does not differentiate service LAN ports and WAN ports. Make sure that the
WAN ports and LAN ports are the same.

1
Quick Deployment Manual

2 Standalone Deployment

2.1 Server Requirements


Table 2-1 DSS Express hardware requirement
Parameter Hardware Requirement Operating System
● CPU: Intel® Core(TM) I7-
9700K [email protected] GHZ
● RAM: 8 GB
● Network card: 1 ×
Ethernet port @ 1000
Recommended configuration Mbps
● Hard drive type: 7200
RPM Enterprise Class HDD
1 TB
● DSS installation directory
space: 500 GB
Windows 7 and above
● CPU: Intel® Core(TM) I5-
9400 [email protected] GHZ
● RAM: 8 GB
● Network card: 1 ×
Ethernet port @ 1000
Minimum configuration Mbps
● Hard drive type: 7200
RPM Enterprise Class HDD
1 TB
● DSS installation directory
space: 200 GB

● Face recognition images, videos, and files cannot be stored on the system disk and DSS
installation disk. We recommend you store these files on a separate local disk.
● For best performance, we recommend adding additional hard drives to store pictures.

2.2 Installing Management Tool


Prerequisites
● You have downloaded the installation package from the official website or received it from our
sales or technical support.
● You have prepared a server that meets the hardware requirements described in "2.1 Server
Requirements".

2
Quick Deployment Manual

Procedure
Step 1 Double-click the DSS installer .

The name of the installer includes version number and date, confirm before installation.
Step 2 Click the software license agreement, and then read the agreement,
Step 3 Select the check box to accept the agreement, and then click Next.
Step 4 Click Browse, and then select a installation path.
If the Install button is gray, check whether the installation path and space required meet
the requirements. The total space required is displayed on the page.

We do not recommend installing the management tool on disk C, because features such as
face recognition require higher disk performance.
Step 5 Click Install.

The installation process takes about 4 to 8 minutes. Do not cut off the power or close the
program.
Step 6 Click Run after the installation completes.
Step 7 Configure the network parameters.
1) Configure the IP address of the network card.

Dual NIC will be available if the server has two network cards. This is useful when you
need to access devices on two different network segments.
2) (Optional) Enable WAN Mode, enter a WAN IP address or a domain name, and then
click Next.

3
Quick Deployment Manual

If the platform is in a local network, use this function to connect it to the Internet so
that you can access it from outside the local network.

Figure 2-1 Configure the network parameters

3) Configure the TLS version, and then click Finish.


TLS1.2 is selected by default and cannot be changed. We do not recommend using
TLS1.0 and TLS1.1 because they have serious security vulnerabilities.

If the available RAM of the server is less than 2 GB, you can only use basic functions
related to video. If it is less than 1.5 GB, you cannot use any function.

Related Operations
● To uninstall the platform, log in to the server, go to "..\DSS\DSS Server\Uninstall", double-click
uninst.exe, and then follow the on-screen instructions to uninstall the program.
● To update the system, directly install the new program. The system supports in-place update.
Follow the steps above to install the program.

2.3 Configuring Server IP Address


Change the server IP address as you planned. Make sure that the server IP can access the devices in
your system. For details, see the manual of the server.

4
Quick Deployment Manual

After changing the IP address of the server, you need to update it in the management tool. See the
following section.

2.4 Management Tool


The management tool allows you to view status of services, start or stop services, change service
ports, and more.

On the server, double-click .

Figure 2-2 Management tool

Table 2-2 Interface description

No. Function Description


1 Server information Displays the IP address and type of the platform.
Displays the ports that you need to map for various functions.
Information for port Select one or more functions, the ports you must map will be
2
mapping displayed on the right. Click to export them to your
computer so that you can check on them easily.
● Client: Displays how to download the PC client and App.
Download clients
3 ● Logs: Download the operation logs of the management
and logs
tool.

5
Quick Deployment Manual

No. Function Description


● Network: Configure the network card mode, IP address, and
the WAN mode. If the server has two network cards, you can
select Dual NIC mode, configure two IP addresses, and then
the platform will be able to connect to two networks and
access the devices on each one. If the platform is in a local
network and the devices are on the internet, or you need to
access the platform that is in a local network from the
Internet, you can enable WAN Mode and map the IP
address of the platform to a WAN IP address or a domain
name.
● Security: Select a TLS protocol version when you access the
webpage of the platform through a browser. TLS1.2 is
Configurations and
selected by default and cannot be disabled. There are
4 view information of
the platform security vulnerabilities to TLS1.0 and 1.1. We strongly
recommend you disable it to avoid security risks. After
configuration, follow the on-screen instructions to configure
the TLS protocol version in the IE browser so that you can
access the webpage of the platform normally.
● Language: Select the language of the management tool.
Multiple languages are supported.
● Port Self-adaption: If a port is occupied, the platform will
change the it automatically. After turning on or off this
function, you must restart the server for it to be effective.
● User manual: View the user manual of the platform.
● About: View the software version information, software
license agreement, and more.
● Click Restart All to restart all services.

When starting the platform, if the available memory of the


5 Service management server does not reach 2 GB, only the basic video services can
be enabled. If the server has less than 1.5 GB of available
memory, no services are available.
● Click Stop All to stop all services.
● Click Refresh to refresh services.
There are 5 status of services, including starting, unavailable,
stopping, running, and stopped.
● The unavailable status only depends on the status of the
6 Status of services
SMC service. If the SMC service is not properly running, the
overall status will be unavailable.
● Running means that all services are running normally.
Displays all services, and their status and port numbers. Click
7 Services to change the port number of a service, and then the
services will restart automatically after modification.

6
Quick Deployment Manual

2.5 Installing and Logging into DSS Client


Install the DSS client before licensing it.

2.5.1 Installing DSS Client


You can visit the system through the DSS Client for remote monitoring.

2.5.1.1 DSS Client Requirements

Press the Windows key, and type dxdiag, and then click . On the System page, the information

of your computer is displayed.


To install DSS Client, prepare a computer in accordance with the following requirements.

Table 2-3 Hardware requirements


Parameters Description
● CPU: Intel® Core i7-11700 @ 2.50 GHz
● Memory: 16 GB and above
Recommended system ● Graphics: NVIDIA ® GeForce® RTX 3060
requirements ● Network Card: 1000 Mbps
● HDD: Make sure that at least 100 GB is reserved for the
client.
● CPU: Intel® Core i5-9500 @ 3.00 GHz
● Memory: 16 GB
Minimum system ● Graphics: Intel® UHD Graphics 630
requirements ● Network Card: 1000 Mbps
● DSS client installation space: Make sure that at least 50 GB is
reserved for DSS client.

2.5.1.2 Downloading and Installing DSS Client

Procedure
Step 1 Go to https://IP address of the platform in the browser
Step 2 Click PC, and then Download.

The platform also supports installation by MSI package. Visit


https://software.dahuasecurity.com/en/download/ and download the MSI package of the
platform version you need. Please be advised that you cannot overwrite the PC client
installed with an exe package, and vice versa. Also, the PC client installed with an MSI
package does not support automatic update. You must download the package of the new
version an install it manually.
If you save the program, go to Step 3.
If you run the program, go to Step 4.

7
Quick Deployment Manual
Figure 2-3 Download DSS Client

Step 3 Double-click the DSS Client program.


Step 4 Select the checkbox of I have read and agree to the DSS agreement and then click Next.
Step 5 Select a path for installation, and then click Install.
The installation progress is displayed. It takes about 5 minutes to complete.

2.5.2 Logging in to DSS Client


Procedure
Step 1 Double-click on the desktop.
Step 2 Select a language.
Step 3 Enter the IP address and port number of the platform.
On the drop-down list, platforms that are in the same network as your computer will be
shown.

8
Quick Deployment Manual

If you want to log in to the platform using its domain name, you must link its IP address to
a domain name first. For details, see the user's manual.

Figure 2-4 Automatically discovered platform

Step 4 Click anywhere else on the page to start initializing the platform.
For first-time login, you will be automatically directed to the initialization process.
If you are not logging in for the first time, enter the IP address, port number of the
platform, username, and password, and then click Login.
1) The default user is system. Enter and confirm the password, and then click Next.
The password must consist of 8 to 32 non-blank characters and contain at least two
types of characters: Uppercase, lowercase, number, and special character (excluding '
" ; : &).
2) Select your security questions and enter their answers, and then click OK.
The client will automatically log in to the platform by using the password you just set.

9
Quick Deployment Manual

Please keep the security questions and answers properly. Otherwise, you password
cannot be recovered if you forget it.

2.5.3 Homepage of DSS Client


Figure 2-5 Homepage

Table 2-4 Parameter description


No. Name Function
1 Tab Displays the names of all tabs that are opened.
● : Enable or disable alarm audio.
● : Displays number of alarms. Click the icon to go to Event
Center.
● Click to view system messages, such as the information
of a device was edited or deleted. The permissions of a user
will determine what messages can be seen. For example, if
user A does not have the permission of device A, then user A
will not get the message when device A is deleted.
2 System settings
● : User information: Click the icon, and then you can log in
to the web page by clicking system IP address, change
password, lock client and log out.
◇ Click platform IP address to go to the Web page.
◇ Click Change Password to change user password.
◇ Click About to view version information.
◇ Click Sign Out to exit client.
● Click to lock client.

10
Quick Deployment Manual

No. Name Function


● The number of devices in total, offline and online.
3 Overview ● The number of total, processed and pending events.
● The client network, CPU and RAM usage.
● Download videos.
● Check local pictures and videos.
● Settings for video, snapshot, video wall, alarm, security and
shortcut keys.
4 Management
● View and manage logs.
● View user manual.
● Customize quick HTTP commands. For details, see the user's
manual.
● : Application options including monitoring center, access
management, intelligent analysis and vehicle entrance
5 Applications
control.
● : Configuration options.

2.6 Licensing
You can upgrade your license for more features and increased capacity.
This section introduces license capacity, how to apply for a license, how to use the license to activate
the platform, and how to renew your license.

2.6.1 Applying for a License


A license is used to confirm the features and number of channels you purchased. To get a formal
license, contact our sales personnel. To apply for a trial license, visit our website and find DSS
Express, scroll to the bottom, click Apply, and then follow the instructions. You can only use a trial
license on a server once.

2.6.2 Activating License

The following images of the page might slightly differ from the actual pages.

2.6.2.1 Online Activation

Prerequisites
● You have received your license. If not, see "2.6.1 Applying for a License".
A license is used to confirm the features and number of channels you purchased. To get a formal
license, contact our sales personnel. To apply for a trial license, visit our website and find DSS
Express, and then follow the application instructions.

11
Quick Deployment Manual
● The platform server can access the Internet.

Procedure
Step 1 On the Home page, click , and then in System Config, select License.
Step 2 Click Online Activate License.
Step 3 Enter your new Activation Code.
Step 4 Click Activate Now.
Step 5 On the License page, view your license details.

2.6.2.2 Offline Activation

Prerequisites
You have received your license. If not, see "2.6.1 Applying for a License".
A license is used to confirm the features and number of channels you purchased. To get a formal
license, contact our sales personnel. To apply for a trial license, visit our website and find DSS
Express, and then follow the application instructions.

Procedure
Step 1 On the Home page, click , and then in System Config, select License.
Step 2 Click Offline Activate License.
Step 3 Enter your new Activation Code.
Step 4 Click Export to export the license request file.
Step 5 Generate license file.
1) Move the request file to a computer with Internet access.
2) On that computer, open the system email that contains your license, and then click the
attached web page address or Click to go to DSS License Management to go to the
license management page.
3) Click Activate License.
4) Click Upload, select the license request file, and then when you are prompted
uploaded successfully, click Activate.
The success page is displayed, where a download prompt is displayed asking you to
save the license activation file.

12
Quick Deployment Manual
Figure 2-6 Upload license request file

5) On the success page, click Save to save the file, and then move the file back to the
computer where you exported the license request file.
6) On the Offline Activate License page, click Import, and then follow the on-screen
instructions to import the license activation file.
Step 6 On the License page, view your license details.

2.7 Installing Mobile Client


Procedure
Step 1 Enter IP address of the DSS in the browser and then press Enter.
Step 2 Click Mobile > Download, and then scan the QR code to download the App.

13
Quick Deployment Manual
Figure 2-7 Download App by scanning QR code

14
Quick Deployment Manual

3 Configuring LAN or WAN

3.1 Configuring Router


For the list of the ports that need to be mapped, see "Appendix 1 Service Module Introduction".

Make sure that the WAN ports is consistent with LAN ports.

3.2 Mapping IP or Domain Name


If the platform is deployed in a local network, you can map the IP address of the server to a fixed
WAN IP or a domain name, and then log in to the server using the WAN IP or domain name.
The page might vary between the main server and the sub server. This section uses the main server
page as an example.

Procedure
Step 1 Log in to DSS server, and then double-click .
Step 2 Click the on the upper-right corner, and then select Network.
Step 3 Enable WAN mode, enter a WAN IP address or a domain name, and then click OK.

If you want to use a domain name, you need to make corresponding configurations on the
domain name server.
Step 4 Click OK, and then the services will restart.

15
Quick Deployment Manual

Appendix 1 Service Module Introduction

Appendix Table 1-1 Service module introduction


Service Name Function Description
NGINX Proxy
NGINX Provides access to the platform.
Service
System
Manages services and provides access to various
Management SMC
functions.
Service
Redis Data Cache
REDIS Stores data that is frequently accessed.
Service
MySQL Database
MySQL Stores data for a long time.
Service
Monitors system resources and synchronizes
System Config
CFGS configurations across the distributed
Service
environment.
MQ Push
Notifications MQ Pushes messages among clients and platforms.
Service
Media Gateway
MGW Acquires video streams for video walls.
Service
Protocol
Conversion Proxy PCPS Accesses third-party video devices.
Service
Device
Management DMS Accesses video devices.
Service
Alarm Distribution
ADS Filters and distributes alarms from devices.
Service
Device Auto Accesses devices added through automatic
ARS
Registration Service registration.
Image Transmission Accesses ANPR devices and transfers images
PTS
Service between the devices and the platform.
Alarm Controller
MCD Accesses alarm controllers.
Access Service
Device Search Searches for and obtains configurations from
SOSO
Service devices in local networks.
Video Intercom Manages audio talks among PC clients and app,
SC
Service and video intercom devices.
DA Management
DAMS Manages DA_BSID.
Service

16
Quick Deployment Manual

Service Name Function Description


Downloads files from devices, manages the sleep
and wake status of low-power consumption
Link Management
DA_BSID cameras that uses 4G network, and redirects to
Service
the webpage of devices added through
automatic registration.
Access Control
Management ACDG Manages MCDDOOR.
Service
Access Control
MCDDOOR Accesses access control devices.
Connection Service
Video Storage Stores and forwards recorded videos on the
SS
Service platform.
Video Decoding to
VMS Accesses decoders outputs videos to video walls.
Wall Service
Object Storage
OSS Stores files of the platform.
Service
Media Forwarding
MTS Forwards real-time video streams.
Service

17
Quick Deployment Manual

Appendix 2 Cybersecurity Recommendations

Security Statement
● If you connect the product to the Internet, you need to bear the risks, including but not limited to
the possibility of network attacks, hacker attacks, virus infections, etc., please strengthen the
protection of the network, platform data and personal information, and take the necessary
measures to ensure the cyber security of platform, including but not limited to use complex
passwords, regularly change passwords, and timely update platform products to the latest
version, etc. Dahua does not assume any responsibility for the product abnormality, information
leakage and other problems caused by this, but will provide product-related security
maintenance.
● Where applicable laws are not expressly prohibited, for any profit, income, sales loss, data loss
caused by the use or inability to use this product or service, or the cost, property damage,
personal injury, service interruption, business information loss of purchasing alternative goods or
services, or any special, direct, indirect, incidental, economic, covering, punitive, special or
ancillary damage, regardless of the theory of liability (contract, tort, negligence, or other) , Dahua
and its employees, licensors or affiliates are not liable for compensation, even if they have been
notified of the possibility of such damage. Some jurisdictions do not allow limitation of liability
for personal injury, incidental or consequential damages, etc., so this limitation may not apply to
you.
● Dahua's total liability for all your damages (except for the case of personal injury or death due to
the company's negligence, subject to applicable laws and regulations) shall not exceed the price
you paid for the products.

Security Recommendations
The necessary measures to ensure the basic cyber security of the platform:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols.
● Do not contain the account name or the account name in reverse order.
● Do not use continuous characters, such as 123, abc, etc.
● Do not use overlapped characters, such as 111, aaa, etc.
2. Customize the Answer to the Security Question
The security question setting should ensure the difference of answers, choose different questions
and customize different answers (all questions are prohibited from being set to the same answer)
to reduce the risk of security question being guessed or cracked.
Recommendation measures to enhance platform cyber security:
1. Enable Account Binding IP/MAC
It is recommended to enable the account binding IP/MAC mechanism, and configure the IP/MAC
of the terminal where the commonly used client is located as an allowlist to further improve
access security.

18
Quick Deployment Manual
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Turn On Account Lock Mechanism
The account lock function is enabled by default at the factory, and it is recommended to keep it
on to protect the security of your account. After the attacker has failed multiple password
attempts, the corresponding account and source IP will be locked.
4. Reasonable Allocation of Accounts and Permissions
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
5. Close Non-essential Services and Restrict the Open Form of Essential Services
If not needed, it is recommended to turn off NetBIOS (port 137, 138, 139), SMB (port 445), remote
desktop (port 3389) and other services under Windows, and Telnet (port 23) and SSH (port 22)
under Linux. At the same time, close the database port to the outside or only open to a specific IP
address, such as MySQL (port 3306), to reduce the risks faced by the platform.
6. Patch the Operating System/Third Party Components
It is recommended to regularly detect security vulnerabilities in the operating system and third-
party components, and apply official patches in time.
7. Security Audit
● Check online users: It is recommended to check online users irregularly to identify whether
there are illegal users logging in.
● View the platform log: By viewing the log, you can get the IP information of the attempt to
log in to the platform and the key operation information of the logged-in user.
8. The Establishment of a secure Network Environment
In order to better protect the security of the platform and reduce cyber security risks, it is
recommended that:
● Follow the principle of minimization, restrict the ports that the platform maps externally by
firewalls or routers, and only map ports that are necessary for services.
● Based on actual network requirements, separate networks: if there is no communication
requirement between the two subnets, it is recommended to use VLAN, gatekeeper, etc. to
divide the network to achieve the effect of network isolation.

More information
Please visit Dahua official website security emergency response center for security announcements
and the latest security recommendations.

19
Quick Deployment Manual

You might also like