0% found this document useful (0 votes)
55 views43 pages

SmartPSSLite User's Manual Eng

The SmartPSS Lite User's Manual provides comprehensive guidance on the platform's functions, installation, and configuration processes. It includes safety instructions, revision history, privacy protection notices, and detailed steps for installation, login, and system settings. Users are advised to comply with local privacy laws when handling personal data and to refer to the manual for troubleshooting and operational guidance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views43 pages

SmartPSSLite User's Manual Eng

The SmartPSS Lite User's Manual provides comprehensive guidance on the platform's functions, installation, and configuration processes. It includes safety instructions, revision history, privacy protection notices, and detailed steps for installation, login, and system settings. Users are advised to comply with local privacy laws when handling personal data and to refer to the manual for troubleshooting and operational guidance.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 43

SmartPSS Lite

User's Manual

V1.0.6
Foreword
General

This manual introduces the functions and operations of the SmartPSS Lite (hereinafter referred to as
"the Platform"). Read carefully before using the platform, and keep the manual safe for future
reference.

Safety Instructions

The following signal words might appear in the manual.

Signal Words Meaning

Indicates a high potential hazard which, if not avoided, will result in


death or serious injury.

Indicates a medium or low potential hazard which, if not avoided,


could result in slight or moderate injury.

Indicates a potential risk which, if not avoided, could result in


property damage, data loss, reductions in performance, or
unpredictable results.

Provides methods to help you solve a problem or save time.

Provides additional information as a supplement to the text.

Revision History

Software
Version Revision Content Release Time
Version
● Added specification details.
● Added entrance of Dolynk cloud and
Dolynk Pro.
● Added email configuration.
V1.0.6 V1.3.7 August 2024
● Added attendance sending
configuration.
● Updated solution switching and
third-party database configuration.

● Updated the name of the function


modules.
V1.0.5 V1.3.6 May 2024
● Added solution switching and third-
party database configuration.

Updated the event linkage and database


V1.0.4 — January 2024
settings.

I
Software
Version Revision Content Release Time
Version

V1.0.3 — Updated the system settings function. April 2023

● Updated basic setting function.


● Updated adding device function.
V1.0.2 — December 2022
● Updated device configuration
function.

● Updated home page.


● Updated data management function.
V1.0.1 — August 2022
● Updated backup and restore
function.

V1.0.0 — First release. April 2022

Privacy Protection Notice

As the device user or data controller, you might collect the personal data of others such as their
face, fingerprints, audio and license plate number. You need to be in compliance with your local
privacy protection laws and regulations to protect the legitimate rights and interests of other
people by implementing measures which include but are not limited: Providing clear and visible
identification to inform people of the existence of the surveillance area and provide required
contact information.

About the Manual

● The manual is for reference only. Slight differences might be found between the manual and the
product.
● We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
● The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or
visit our official website. The manual is for reference only. Slight differences might be found
between the electronic version and the paper version.
● All designs and software are subject to change without prior written notice. Product updates
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
● There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
● Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
● If there is any uncertainty or controversy, we reserve the right of final explanation.

II
Table of Contents
Foreword.............................................................................................................................................................. I
1 Overview...........................................................................................................................................................1
2 Installation and Login..................................................................................................................................... 2
2.1 Installation............................................................................................................................................. 2
2.2 Initialization........................................................................................................................................... 2
2.3 Login....................................................................................................................................................... 5
2.4 Password Reset...................................................................................................................................... 6
3 Home Page....................................................................................................................................................... 7
4 System Configuration......................................................................................................................................9
4.1 Basic Setting........................................................................................................................................... 9
4.2 Monitor Setting....................................................................................................................................10
4.3 Device Settings.................................................................................................................................... 11
4.4 Event Setting........................................................................................................................................11
4.5 Local Path............................................................................................................................................. 12
4.6 Data Management............................................................................................................................... 12
4.7 Attendance Setting..............................................................................................................................14
4.8 Video Intercom Setting....................................................................................................................... 15
4.9 Backing up and Restoring................................................................................................................... 15
4.10 Email Configuration...........................................................................................................................16
4.11 Specification Details.......................................................................................................................... 17
4.12 Configuring Third-party Database...................................................................................................18
4.13 Solution Switching............................................................................................................................ 19
5 Device Management......................................................................................................................................20
5.1 Adding Devices.................................................................................................................................... 20
5.1.1 Adding Device by Searching.................................................................................................... 20
5.1.2 Adding Device One by One.......................................................................................................22
5.1.3 Importing Device in Batches.................................................................................................... 23
5.2 Exporting Devices................................................................................................................................23
5.3 Managing Devices................................................................................................................................23
5.3.1 Editing Devices.......................................................................................................................... 23
5.3.2 Initializing Devices.................................................................................................................... 23
5.3.3 Changing IP................................................................................................................................24
5.3.4 Configuring Devices.................................................................................................................. 25
5.3.5 Alarm Configuration................................................................................................................. 28
6 Log Search...................................................................................................................................................... 29
7 Event Configuration...................................................................................................................................... 30
8 Event Center...................................................................................................................................................34

III
8.1 Overview...............................................................................................................................................34
8.2 Configuring Live View Video.............................................................................................................. 35
Appendix 1 Security Recommendation........................................................................................................ 37

IV
1 Overview
SmartPSS Lite is a client software developed for small and medium-sized solutions. You can
download various solutions as needed. This manual introduces the general functions and
operations.

1
2 Installation and Login
2.1 Installation
Contact technical support or go to the official website to get the SmartPSS Lite. If you get the
software package of the SmartPSS Lite, install and run the software according to page instructions.

2.2 Initialization
Initialize SmartPSS Lite when you log in for the first time, including setting a password for login and
security questions for resetting password.
Procedure
Step 1 Double-click SmartPSSLite.exe.
Step 2 Select the language from the drop-down list, select I have read and agree the software
agreement , and then click Next.
Figure 2-1 Select language

Step 3 Click Browse to select installation path, and then click Install.

2
Figure 2-2 Select installation path

Step 4 Click Finish to complete the installation.

Select Run SmartPSSLite to start SmartPSS Lite.


Figure 2-3 Install complete

Step 5 Select the application scenes you want to add, and then click OK.

3
Figure 2-4 Select application scenes

Step 6 Click I have read and agree to the terms of software license agreement to agree
SOFTWARE LICENSE AGREEMENT.
Step 7 Click I have read and agree to the terms of software privacy policy to agree Product
Privacy Policy.
Step 8 Set password on the Initialize page, and then click Next.
Figure 2-5 Set password

4
Table 2-1 Parameters of setting password

Parameter Description
The password must consist of 8 to 32 non-blank characters and
Password contain at least two types of characters among uppercase,
lowercase, number, and special character (excluding ' " ; : &).
Displays the effectiveness of a password against guessing or
brute-force attacks. Green means the password is strong enough,
Password Strength
and red means less strong. Set a password of high security level
according to the password strength prompt.
Confirm Password Enter the password again to confirm the password.
Enable Auto login after registration so that the SmartPSS Lite
Auto login after registration will log in automatically after initialization; otherwise the login
page is displayed.
Step 9 Set security questions, and then click Complete.
Figure 2-6 Set security questions

2.3 Login
Procedure
Step 1 Double-click SmartPSSLite.exe.
Step 2 Enter username and password, and then click Login.
If multiple networks are available on your computer, you can select one from them.

5
Figure 2-7 Login

Table 2-2 Parameters of login

Parameter Description
Remember Enable Remember Password so that you do not need to enter the password
Password again when logging in next time.
Enable Auto login so that the SmartPSS Lite will log in automatically the
Auto login
next time when you use the same user account.
Click Forgot password? to reset password through security questions when
Forgot password?
you forget the password.

2.4 Password Reset


You can reset the password by answering the security questions.
Procedure
Step 1 Double-click SmartPSSLite.exe.
Step 2 Click Forgot password? on the login page.
Step 3 Answer the security questions, and then click Next.
Step 4 Reset password according to page instructions, and then click OK.

6
3 Home Page
Figure 3-1 Home page

Table 3-1 Parameters of home page

No. Parameter Description

Display the home page by default.


1 Function tab When you click on a function for the first time, the function tab is
added here.

The entrance to log in to the DoLynk pro.

2 DoLynk pro ● Logging in to the DoLynk pro can add the number of device
channels to 256.
● Please create an account before you log in to the DoLynk pro.

Click or to turn on or turn off the alarm sound.


The number on the icon means the number of alarm events that
3 Alarm sound are reported but unprocessed. Click the number to open the
Event Center to view the details of alarm events. For details, see
"8 Event Center".

7
No. Parameter Description

● Select > User Management to manage users, such as


adding role and user, delete role and user and set
permissions.
● Select > Lock Screen to lock screen. Enter password of
login account when you want to unlock.
● Select > Switch User to return to the login page. You can
log in with new account.
4 User management ● Select > User’s Manual to get the user’s manual.
● Select > Feedback to send feedback to us.
● Select > Upgrade to upgrade the system.
● Select > About to view the system version, date, Open
Source Software Statement , Software License Agreement
and Privacy Policy and more.
When Open Debug Logs is enabled, debugging logs are
saved automatically to a local path for troubleshooting.

● Switch Solution : Switch among video intercom, attendance,


access control and video monitor solutions.
● System : Configure basic setting, monitoring setting and
System
5 other parameters.
configuration
● Third-party Database Config : Configure the database
parameters for different solutions to connect to third-party
database.

View the using status of CPU and memory. If the CPU usage is
6 System status
high, the icon turns red.
7 Function menu Goes to function menus.
The entrance of video intercom.

8 Video intercom
If you close the entrance by clicking , you can reopen it
through Video Intercom > Intercom Management.

Click the icon to go to the DoLynk Pro website. You can freely
9 DoLynk Pro
access DoLynk cloud there.
10 User's Manual See the user's manual and guide of the corresponding solution.
● Devices : You can add devices, remotely configure the
device, change IP address and more.
11 Management ● Log Search : You search for or export logs.
● Event Config : Configure alarm linkage actions.

12 Solutions Goes to the solution configuration page.

8
4 System Configuration
4.1 Basic Setting
Configure the time, language, theme and other functions of the platform.
Procedure
Step 1 Click , and then select System > Basic Config.
Step 2 Configure basic settings.
Figure 4-1 Basic settings

Table 4-1 Description of basic setting parameters

Parameter Description
Enable Auto check time , set Check Time, the device will automatically
Timing
check the time automatically at the scheduled time.
Auto run at startup Automatically opens the platform at startup.
Language Display the language of the platform after it restarts.

Import language packages.


Language Package
Restart the platform after the language package is imported.

9
Parameter Description

Set the save time for logs. This function takes effect after the system
Log Save Time restarts. For example, set the save time as 30, then the logs of the last 30
days will be saved.

Network Select the network performance according to your network conditions. For
Performance example, when the network is very stable, you can select High.

Skin Select the skin which is activated after restart.

The user experience plan is displayed when you log in to the platform for
User Experience Plan
the first time.
Select Show Event Floating Window, and after the platform is minimized,
Minimum Behavior
will be displayed to show the number of alarm events.
Select Full Screen to hide the taskbar; select Maximum Window to show
Maximum Behavior
the taskbar.
Open When Software
Select the page to be displayed when the platform starts.
Starts
A prompt window will be automatically displayed when the platform is
Close Prompt
closed. Select Don't show again if you do not need the prompt.
Step 3 Click Apply.

4.2 Monitor Setting


Configure default system type, instantly replay time, local record time and other functions.
Procedure
Step 1 Click , and then select System > Monitor Setting.
Step 2 Configure monitor setting parameters.
Figure 4-2 Monitor setting

10
Table 4-2 Description of monitor setting parameters

Parameter Description
Default Live Video Stream Select a video streaming type.
Select the instantly playback time. For example, if the value is set to
Instant Playback Time 5 minutes, the last 5 minutes of video will automatically begin to
play back.

Select the video recording time. For example, if the value is set to 30
minutes, the system records the video for 30 minutes and then
Local Recording Time automatically saves the video in the default file path on the
computer.
The default path is \Data\User\Record.

● Organization Tree (By device) : Displays devices in the


organization tree.
Default Device Tree ● Area Tree (By Channel) : Displays channels in the organization
tree.

Hard decision decoding and soft decision decoding are two


different methods of decoding error-correcting codes.
Decoding Type
● Soft Decode : Decode through CPU.
● Hardware Decoding : Decode videos through graphics cards.

Resume Last Preview The last preview automatically opens after the platform starts.
The analytic bounding boxes will be displayed over the video being
Show IVS Rule
viewed if this function is enabled.
Save the device tree Keep devices remain selected in the device tree, even after you
selection status perform another device search.
Step 3 Click Apply.

4.3 Device Settings


1. Click , and then select System > Device Settings.
2. Click Auto Log in to device (Take Effect after Restart) to automatically log in to the platform
when you start it.

4.4 Event Setting


Configure the alarm sound and link the sender and receiver of the email.
Procedure
Step 1 Click , and then select System > Event Snapshots.
Step 2 Configure event setting parameters.

11
Figure 4-3 Event setting

● Loop: The alarm sound will be played in a loop.


● Global Sound:
Select Global Sound , and then select the sound file in the Wav File Path. The
sound will be played after the corresponding event is triggered.
Do not select Global Sound , and then select the event type and sound type in the
drop-down list or select the sound file in the Wav File Path. The sound will be
played after the corresponding event is triggered.
Step 3 Click Apply.

4.5 Local Path


Set the save path for the pictures, videos and other data collected by the platform.
Procedure
Step 1 Click , and then select System > File Path.
Step 2 Set the local path.
Figure 4-4 Set local path

Step 3 Click Apply.

4.6 Data Management


Periodically extract the attendance data from devices, and periodically clear the data, pictures and
videos saved on the computer.
Procedure
Step 1 Click , and then select System > Storage.
Step 2 Configure data management parameters.

12
Figure 4-5 Storage management

Table 4-3 Description of storage management parameters

Parameter Description
Extract attendance record The platform automatically extracts attendance and access control
regularly records and pictures according to the scheduled time.

● For attendance devices, extract the attendance data directly. For


access controllers, set the device as attendance point in advance
Scheduled Extraction of and then extract the attendance data. For details, see SmartPSS
Access Control Records Lite Attendance Solution User's Manual.
● If you set Regularly Extraction Time as Everyday, and you can
add up to 5 schedules.
● If you set Regularly Extracting Time as Every Week, you can set
a time on a day.

Automatically extract After the device is offline, the attendance records will be
attendance records automatically extracted.

When the disk is full, the system will automatically overwrite the
Overwrite Ratio
oldest images and videos according to the ratio.

Configure the save time of database, pictures and videos according


to actual requirements. The platform automatically clears data and
pictures that exceed the saving time. It triggers at 00:00 each day or
Clear Data when the software is started.

The data does not include temperature monitoring data.

Step 3 Click Apply.

13
4.7 Attendance Setting
Procedure
Step 1 Click , and then select System > Attendance Setting.
Step 2 Configure the attendance settings.
Figure 4-6 Attendance settings

Table 4-4 Attendance setting parameters

Parameter Description
Define the time format of attendance reports. For example,
Report Time Format if it is set as min, the time of attendance in a report will be
displayed in the format of minutes.

This feature is available after the email is enabled.


● Period: Send the attendance summary at the defined
frequency.
Month Passed: Send attendance summary monthly.
Current Month: Send attendance summary this
month.
● Time: Send attendance summary at the define time. Up
Send attendance summary regularly
to 2 periods can be set to send the summary.
Everyday: Sends attendance summary in the format
of daily summary table.
Every Week: Sends attendance summary in the
format of weekly summary table.
Every Month: Sends attendance summary in the
format of monthly summary table.
● The types of attendance to be summarized can be
selected from the drop-list.

Step 3 Click Apply.

14
4.8 Video Intercom Setting
Procedure
Step 1 Click , and then select System > Video Intercom.
Step 2 Configure the attendance settings.
Figure 4-7 Video intercom

Table 4-5 Video intercom parameters

Parameter Description
When the platform functions as the SIP server, enter the port
SIP Server Port
of the SIP server.

Set the organization level.


● Building: The organization only includes buildings.
● Unit: The organization includes buildings and units.

The configuration will take effect after the platform is


Compound Organization restarted.
If you want to change the level of the organization,
but the organization was already created before, go
to Video Intercom > Intercom Config > Dial
Management and clear the existing data from there,
and then go to Building Management to clear the
remaining data.

Step 3 Click Apply.

4.9 Backing up and Restoring


Backup and restore platform configuration.
Procedure
Step 1 Click , and then select System > Backup and Restore.
Step 2 Configure the backup parameters.

15
Figure 4-8 Backup and restore

Table 4-6 Parameters description

Parameters Description
● Select a backup file path and click Apply to save the
change. All data will be stored at the defined file path.
● Click Manual Backup to manually back up all data to the
Backup Path set file path.
● Select Auto Backup, and then set the auto backup time.
The platform will automatically back up all data to the set
file path.

● Select a backup file path and click Apply to save the


change. The configuration files will be stored at the defined
file path.
● Click Manual Backup to manually back up configuration
Backup Path of Platform Config
files to the set file path.
● Select Auto Backup, and then set the auto backup time.
The platform will automatically back up configuration files
to the set file path.

Upload the configuration files to the platform, and the


Reset
configurations will be applied to the platform after it restarts.
Step 3 Click Apply.

4.10 Email Configuration


You can configure the email feature to send attendance summary and alarm events.
Procedure
Step 1 Click , and then select System > Email Config.
Step 2 Select SMTP to enable email.
Step 3 Configure the SMTP parameters.

16
Figure 4-9 Configure SMTP

Table 4-7 Description of SMTP parameters

Parameter Description
The service address of email.
SMTP Server
Please search for it in your email settings.

Port The service port of email.


User Name
The user name and password of your account.
Password
Sender The email addresses of sender and receivers.

Receiver
Up to 10 receivers are supported.

Encrypt Type The encrypt types, including TLS and SSL.


Interval Time The minimum sending interval.
Email Test Click Email Test to test whether the email functions or not.
Step 4 Click Apply.

4.11 Specification Details


View the number of existing device routes on the local device.
Procedure
Step 1 Click , and then select System > Specification details.

17
Step 2 View the number of existing device routes and that of the new device routes increased by
Dolynk Pro.
Figure 4-10 Specification details

4.12 Configuring Third-party Database


Configure the database parameters for different solutions to connect to third-party database.
Procedure
Step 1 Select > Third-party Database Config.
Step 2 Configure the database parameters, and click next to Enable Database to enable
the database.
Figure 4-11 Configure database

Table 4-8 Parameters description

Parameter Description
4 types are supported here, and you can go to the tabs on the
Database Type
left, including MySQL , SQL Server, Oracle and SQLite.

18
Parameter Description
Server IP
The IP address and port of the server.
Server Port
Database Name The name of the database.
Username
The username and password of the database.
User password
Connection Test Test the whether the connection is successful.
Help manual Click Help manual to view the help manual.
Step 3 Click Save.

4.13 Solution Switching


Procedure
Step 1 Select > Switch Solutions.
Step 2 Select the solutions to be switched.
You can select multiple solutions at a time.
Figure 4-12 Switch solutions

Step 3 Click OK.


Step 4 (Optional) Upgrade solutions: Select > Upgrade to upgrade the system, and the
solutions will be upgraded at the same time.

19
5 Device Management
The SmartPSS Lite is allowed to add devices. You can remotely configure and operate the devices
after adding on the SmartPSS Lite.

5.1 Adding Devices


There are 3 available methods of adding devices.
● Automatically search
● Manually adding
● Import in batches

5.1.1 Adding Device by Searching


You can add multiple devices by searching for them on the current network segment or other
network segments.

We recommend you to add devices through searching if the devices are on the same network
segment, or when you want to add devices with a known network segment but do not know the
exact IP address of the devices.

Procedure
Step 1 On the home page, click Devices.
Step 2 Select a search method.
● Click Auto Search to automatically search for devices that are on the same network
segment to your computer.
● Enter the start IP and the end IP near the Device Network Segment , click Search, and
then the system will automatically search for devices in this IP range.

20
Figure 5-1 Search for devices

Step 3 Select devices, and then click Add.


Step 4 Enter the login user name and password, and then click OK.
The devices will be added to the platform.
Figure 5-2 Added devices

● : Change the information of the device.

● : Goes to the Device Config module in the platform.

● : Goes to the webpage of the device.


● : Log out of the device, and the status of the device will become Offline.
● : Log in to the device, and the status of the device will become Online.

● : Delete the device.


Related Operations
● Change IP one by one: Select a device, and then click Change IP to change the IP of the device.
● Change IP in batches: Select multiple devices, and then click Change to change their IP
addresses.

Enter the start IP, and the system will automatically assign IP to devices through increasing by 1
in the IP address based on the start IP. For example, if the start IP is 10.XX.XXX.52, and the
following IP of devices will be 10.XX.XXX.53, 10.XX.XXX.54, and more.
● Initialize devices: Click Initialize to initialize devices.

21
Only supports activating devices which are on the same network segment to your computer.

5.1.2 Adding Device One by One


If you already know the IP address of a device, you can manually add it to the platform.
Procedure
Step 1 On the home page, click Devices.
Step 2 Click Add, and then enter the device information.
Figure 5-3 Add devices

Table 5-1 Parameters of IP adding

Parameter Description
Device Name The name of the device.
● IP/Domain Name: Add devices through IP Address.
Add Mode ● SN (Available on devices that support P2P): Add devices through their
serial number.

IP/Domain Name Enter the IP address or domain name of the device.


Port No. Enter the port number (37777 by default).
Username
Enter the username and the password of the device.
Password
Step 3 Click Add.
You can also click Add and Continue to add more devices.

22
5.1.3 Importing Device in Batches
You can export the device information, and then import it to another platform to add devices in
batches. We recommend you add devices by importing them when the devices are not on the
same network segment.
Prerequisites
A .xml file of device information has been exported. For details, see "5.2 Exporting Devices".

Procedure
Step 1 On the home page, click Devices.
Step 2 Click Import to import the file to the platform.

Devices will be logged in automatically after adding.

5.2 Exporting Devices


You can export device information to local.
Procedure
Step 1 Select Devices on the home page.
Step 2 Select the device which needs to be exported, and then click Export.
Step 3 Select the local path to export, and then click Export.

5.3 Managing Devices


5.3.1 Editing Devices
You can modify the information of added device.
Procedure
Step 1 On the home page, click Device.
Step 2 Click near the added devices.
Step 3 Edit device information.
Step 4 Click Save.

5.3.2 Initializing Devices


You can only initialize devices which are on the same network segment as the computer.
Procedure
Step 1 On the home page, click Devices.
Step 2 Click Auto Search.
Step 3 Set the range of network segment, and then click Search.
Step 4 Select the uninitialized device, and then click Initialize.
Step 5 Set a password, and then click Password Security.
Step 6 Set security questions, and then click Modify IP address.

23
Step 7 Enter email address.
Step 8 Enter new IP address, subnet mask and gateway, and then click Finish.
Figure 5-4 Modify IP address

5.3.3 Changing IP
Procedure
Step 1 On the home page, click Devices.
Step 2 Click Auto Search
Step 3 Set the range of network segment, and then click Search.
Step 4 Select devices, and then click Change IP.
Step 5 Change the IP, subnet mask and gateway of the devices.
If you change IP in batches, enter a start IP and the system will automatically assign IP to
devices through increasing the IP by one based on the start IP. For example, if the start IP
is 10.XX.XXX.52, and the following IP of devices will be 10.XX.XXX.53, 10.XX.XXX.54, and
more.

24
Figure 5-5 Change IP in batches

Step 6 Click OK.

5.3.4 Configuring Devices


For some devices, you can perform basic configurations of the device through the platform. This
section uses configuring an attendance device as an example.

For some models of devices, you can click to perform basic configurations of the device through
the platform. For others models, you can click to go to the webpage of the device.

Procedure
Step 1 On the home page, click Devices.
Step 2 Click of the attendance device.
Step 3 You can view the device information and perform some basic configurations on the
device.

25
Figure 5-6 Configure the device

● Time

26
Figure 5-7 Time settings

Table 5-2 Parameters of time setting

Parameter Descriptions

Date Format: Date display format.


Time Format: Time display format.
Time Time Zone: Time zone of the device.
System Time: Set the time of the device. You can also click Sync
PC to synchronize the time of the device to the computer.

Enable DST Enable DST time of the device.


The time of the device will be automatically synchronized to the NTP
NTP Settings
server at the defined interval.
● Update: Upload the update file, and then click Update, the device will automatically
restart after the update.
● Restarted: Restart the device.
● Extract Personnel: Extract the personnel information from device to the computer.
Click Extract to extract the personnel and send them to person management.
Click Export to export the information to the local computer.
● Extract Attendance Records: Set the time period and extract attendance records.
● Change Password: Change the password of the device.

27
5.3.5 Alarm Configuration
Devices whose models are ASC2202B-D can be connected to external alarm devices.

1. Click Devices, and then click near the devices whose models are ASC2202B-D.
2. Click Local Alarm Linkage, and then configure the parameters.
Figure 5-8 External alarm

Table 5-3 Parameters of time setting

Parameter Description
Alarm-in Port Select an alarm input channel number as needed.
Alarm out Select an alarm output channel number as needed.
Output Delay Alarms will be delayed after the defined duration.
Door Linkage Select the door and its status as needed.
You can copy the current configurations to other devices as
Copy Current Config to
needed.
3. Click Save to save the alarm configuration.
4. Click Apply to apply the alarm configuration.

28
6 Log Search
You can search for alarm events, client logs and device logs.
Procedure
Step 1 Select Log Search.
Step 2 Choose Client or Device to view the logs as needed.
● Search for Client logs.

Client logs record all operations saved on SmartPSS Lite.


1. Select log type in the drop-down list.
2. Select log time, or you can enter some keywords if needed.
Figure 6-1 Query for client logs

● Query for Device logs.

Device logs record all device operations saved on the devices, which can be searched
for via SmartPSS Lite.
1. Select the device in the list.
2. Select log type and time.
Figure 6-2 Query for device logs

Step 3 Click Search.


Step 4 (Optional) Click Export to export logs to local device.

29
7 Event Configuration
When an event or alarm occurs, the system will trigger the defined linkage actions. For example,
alarm sound can be triggered when intrusion is detected. This section uses configuring intrusion
alarm linkage for a door as an example.

Different devices support different alarm linkages, and might differ from the actual device.

Procedure
Step 1 On the home page, click Event Config.
Step 2 Select a door, select Intrusion Alarm from alarm event, and then enable this function.
Step 3 Configure the notification linkages, and then click Save.
Figure 7-1 Configure notification alarms

Table 7-1 Parameters description

Parameter Description
Alarm Tone The alarm sound will be played when an event occur.
After this function is enabled, the system will automatically
Send Email jump to System page. Click Email Config, and then enable
SMTP and configure SMTP parameters.
Step 4 Configure video linkage.
1. Click Link Video.
2. Drag video channels to preview windows.
3. Configure the video linkage parameters.

30
Figure 7-2 Configure the video linkage

Table 7-2 Parameters description

Parameter Description
If the device supports PTZ function, you can select a preset
Preset points
point.
If the camera supports PTZ function, you can select a preset
Preset
point, and then the PTZ camera will go to the defined preset.
Stream Type Select main stream or sub stream.
Auto Open Video A live video window is automatically opened and lasts for a
Duration defined time when an alarm is triggered.

Enable this function and enter the duration. The system will
Record automatically record videos for the define time when an alarm
is triggered.
Video Record video.
4. Click Save.
The linked videos will be displayed when an alarm is triggered.
Step 5 Configure alarm output.
1. Select an alarm output.
2. Enable Auto Play, and then enter the duration of the alarm.
3. Click Save.
The alarm will last for a defined time.

31
Figure 7-3 Configure alarm output

Step 6 Configure the arming time.


1. When the mouse pointer becomes a pen, hold your mouse button, and then drag to
select a time range for each day.
2. If you want to cancel selecting a time range, when your mouse pointer becomes an
eraser, hold your mouse button and then drag to delete a time range.
Figure 7-4 Configure the arming time

3. You can click to adjust the time range, or select other days to apply the time range
to other days.

32
Figure 7-5 Apply the time range to other days

Step 7 (Optional) Click Copy To , select the access controller to be applied to, and then click OK.
Step 8 Click Save.

33
8 Event Center
You can view and process the real-time alarm events. Click on the upper-right corner of the
page to enter the event center.

8.1 Overview
Figure 8-1 Event center

Table 8-1 Description of event center parameters

No. Parameter Description


● Total Events/Processing Rate : Display the pie chart of the
total events and processing rate. Click the chart to view the
information of unprocessed events.
● Event Processing Rate : Display the processing rate of
different event types in real time.
1 Event statistics ● Event Trend Over the Last 7 Days : Display the graph of the
top 5 event types in 7 days (excluding that day). Point to the
graph to display the specific number of the alarm events.

Click to display the details of each alarm event.

2 Live View Video Preview the configured channel video. Click to the preview
page.

34
No. Parameter Description
View real-time alarm events. You can search event information
3 Real-time Events
according to alarm types and devices.

8.2 Configuring Live View Video


Configure live view video channels, and capture channel images, videos and video talks.
Procedure
Step 1 Click to select the screen number on the Event Center page.

It only supports 1, 4, and 9 screen splits.


Step 2 Right-click the screen, click Stream Type, and then select the video channel that you
want to live view.
Step 3 Click Install, and then select the configuration according to actual needs.
Figure 8-2 Install

Table 8-2 Setup

Parameter Description
Pause Refresh Stop refreshing real-time alarm events.
Do Not Show Linked Video
Stop popping up event linkage video.
Popup

Related Operations
Live view video operations.

35
Point to the screen, and then the shortcut icons will be displayed on the upper-right corner of the
window.

Table 8-3 Description of live view operation parameters

Icon Parameter Description


Click the icon to record videos in the current screen window. Click the
icon again to stop recording and save the video to the computer. The
Local Record default save path is ".../Data/User/Record". You can change the save
path through > System Config > Local Path > Record Path.
Save the snapshot in the current video screen as an image on the
computer (once at a time). The default save path is ".../Data/User/
Visitor Picture
Picture/Capture". You can change the save path through > System
Config > Local Path > Pic Path.
Audio Click the icon to turn on or turn off the camera audio.
Click the icon to turn on or turn off the audio talk of the corresponding
Audio Talk
camera.
Click the icon to turn on or turn off instant replay function. You can
configure the replay time through > System Config > Basic
Setting on the upper-right corner of the page.
Instant Replay

There should be some videos on the device before you enable instant
replay function.

Click the icon, and then scroll the mouse wheel to zoom in or out the
Zoom In
screen.
Close Video Click the icon to turn off the video.

36
Appendix 1 Security Recommendation
1. Account Management
a. Use Strong Passwords
● The length should not be less than 8 characters.
● Include at least two types of characters; character types include upper and lower case
letters, numbers and symbols.
● Do not contain the account name or the account name in reverse order.

● Do not use continuous characters, such as 123, abc, etc.

● Do not use overlapped characters, such as 111, aaa, etc.

b. Change Password Regularly


It is suggested to change passwords regularly to reduce the risk of being guessed or cracked.
c. Assign Accounts and Permissions Reasonably
According to business and management needs, reasonably add new users, and reasonably
allocate a minimum set of permissions for them.
d. Enable Account Lock
The account lock feature is enabled by default, and it is recommended to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
e. Set and Update Passwords Reset Information Timely
The platform supports password reset function. To reduce the risk of being attacked, please
set up related information for password reset in time. If the information changes, please
modify it in time. When setting password protection questions, it is suggested not to use
those that can be easily guessed.
f. Enable Account Binding IP/MAC
It is recommended to enable the account binding IP/MAC mechanism to further improve
access security.
2. Service Configuration
a. Enable HTTPS
It is suggested to enable HTTPS, so that you visit web service through a secure
communication channel.
b. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to
the following services:
● SMTP: Choose TLS to access mailbox server.
● FTP: Choose SFTP, and set up strong passwords.
3. Network Configuration
a. Enable Firewall Allowlist
It is suggested to enable allowlist function to prevent everyone, except those with specified
IP addresses, from accessing the system. Therefore, please be sure to add your computer’s IP
address and the accompanying equipment’s IP address to the allowlist.
b. Network Isolation

37
The network should be isolated by partitioning the video monitoring network and the office
network on the switch and router to different VLANs. This prevents attackers from using the
office network to launch Pivoting attacks on the video monitoring network.
4. Security Auditing
a. Check Online Users
It is recommended to check online users irregularly to identify whether there are illegal users
logging in.
b. View the Platform Log
By viewing the log, you can get the IP information of the attempt to log in to the platform
and the key operation information of the logged-in user.
5. Physical Protection
It is suggested to perform physical protection to the device that has installed the platform. For
example, place the device in a special computer room and cabinet, and implement well-done
access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware.
6. Perimeter Security
It is suggested to deploy perimeter security products and take necessary measures such as
authorized access, access control, and intrusion prevention to protect the software platform
security.

38

You might also like