Dahua DH-IVS-IP8000-E-GU1 Manual
Dahua DH-IVS-IP8000-E-GU1 Manual

Dahua DH-IVS-IP8000-E-GU1 Manual

Event detection intelligent server

Advertisement

Quick Links

Event Detection Intelligent Server
Deployment Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD.
V1.0.0

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DH-IVS-IP8000-E-GU1 and is the answer not in the manual?

Questions and answers

Summary of Contents for Dahua DH-IVS-IP8000-E-GU1

  • Page 1 Event Detection Intelligent Server Deployment Manual ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.0...
  • Page 2: Foreword

    This manual introduces the functions and operations of the Event Detection Intelligent Server (hereinafter referred to as "the Server"). Models Device Model DH-IVS-IP8000-E-GU1 DH-IVS-IP8000-2E-GU2, DH-IVS-IP8000-3E-GU2, DH-IVS-IP8000-4E-GU2, DH-IVS-IP8000-5E-GU2, and DH-IVS-IP8000-6E-GU2 Safety Instructions The following signal words might appear in the manual.
  • Page 3 Deployment Manual ● We are not liable for losses incurred due to operating the product in ways that are not in compliance with the manual. ● The manual will be updated according to the latest laws and regulations of related jurisdictions. For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit our official website.
  • Page 4: Important Safeguards And Warnings

    Deployment Manual Important Safeguards and Warnings This section introduces content covering the proper handling of the device, hazard prevention, and prevention of property damage. Read carefully before using the device, comply with the guidelines when using it, and keep the manual safe for future reference. Operation Requirements ●...
  • Page 5: Table Of Contents

    Deployment Manual Table of Contents Foreword ........................................I Important Safeguards and Warnings ............................III 1 (Optional) Deploying Server ................................1 1.1 Before Deployment .................................. 1 1.1.1 Preparing USB Drive and Installation Package ....................1 1.1.2 System Requirements ..............................1 1.2 Installing CentOS System and Program ......................... 2 1.2.1 Preparing USB Flash Drive ............................
  • Page 6 Deployment Manual 5.1 Checking Dongle ..................................49 5.2 Software-based Encryption ..............................49 5.3 Hardware-based Encryption .............................. 54 Appendix 1 Cybersecurity Recommendations ........................56...
  • Page 7: Optional) Deploying Server

    Deployment Manual 1 (Optional) Deploying Server If it is a baseline server, you can skip this chapter and install the service software directly. For details, see "2 Service Software Installation". 1.1 Before Deployment Before deployment, you need to prepare all installation packages and required devices. 1.1.1 Preparing USB Drive and Installation Package Before deployment, you need to prepare USB drive and download the following packages from GDP.
  • Page 8: Installing Centos System And Program

    Deployment Manual 1.2 Installing CentOS System and Program Prepare the USB flash drive, and install the CentOS system. You must execute the root commands to configure the settings. 1.2.1 Preparing USB Flash Drive Prepare the USB flash drive for installing CentOS system of the server. Prerequisites ●...
  • Page 9 Deployment Manual Figure 1-2 Write disk image (1) Step 4 Configure Disk Drive and Write Method, and then click Write.
  • Page 10: Selecting Bootup Menu

    Deployment Manual Generally, you only need to leave them as default. Figure 1-3 Write disk image (2) Step 5 Click Yes in the pop-up window. The system starts writing data, and the progress bar is displayed. After successfully burning the USB drive, click Close. Step 6 1.2.2 Selecting Bootup Menu Background Information...
  • Page 11: Selecting Operating System

    Deployment Manual Figure 1-4 Select USB flash drive 1.2.4 Selecting Operating System Background Information Select Install CentOS 7. Figure 1-5 Select operating system 1.2.5 Selecting Language Procedure Step 1 Select English > English (United States). Step 2 Click Continue at the lower-right side.
  • Page 12: Setting System Time

    Deployment Manual Figure 1-6 Installation 1.2.6 Setting System Time Procedure Step 1 On the INSTALLATION SUMMARY interface, click DATE & TIME. Figure 1-7 Modify time (1) Step 2 Set Region as Asia, set City as Shanghai, and leave the other parameters as default.
  • Page 13: Selecting Software Installation Mode

    Deployment Manual Figure 1-8 Modify time (2) Step 3 Click Done at the upper-left side. 1.2.7 Selecting Software Installation Mode Procedure On the INSTALLATION SUMMARY interface, click SOFTWARE SELECTION. Step 1...
  • Page 14 Deployment Manual Figure 1-9 Installation (1) Step 2 Select Minimal Install. Figure 1-10 Installation (2) Step 3 Click Done at the upper-left side.
  • Page 15: Configuring Partition

    Deployment Manual 1.2.8 Configuring Partition Procedure On the INSTALLATION SUMMARY interface, click INSTALLATION DESTINATION. Step 1 Figure 1-11 Configure partition (1) Select USB drives from Local Standard Disks, select Automatically configure Step 2 partitioning and I would like to make additional space available from Other Storage Options, and then click Done at the upper-left side.
  • Page 16 Deployment Manual Figure 1-12 Configure partition (2) Step 3 On the RECLAIM DISK SPACE interface, click Delete all, and then click Reclaim space. Figure 1-13 Configure partition (3)
  • Page 17 Deployment Manual Figure 1-14 Configure partition (4) Step 4 Go back to the INSTALLATION SUMMARY interface, and then click INSTALLATION DESTINATION. Figure 1-15 Configure partition (5) Step 5 Select USB drives from Local Standard Disks, select I will configure partitioning and I would like to make additional space available from Other Storage Options, and then click Done at the upper-left side.
  • Page 18 Deployment Manual Figure 1-16 Configure partition (6) Step 6 Select Click here to create them automatically. The system automatically creates partitions. Figure 1-17 Configure partition (7) Step 7 Allocate disk space. ● The total disk space < 1 TB Do not allocate space separately to /home. Select /home, and then click - at the lower side to...
  • Page 19 Deployment Manual delete the directory. ● The total disk space > 1 TB Allocate 200 GB or more to the / directory, and allocate the remaining space to /home. Figure 1-18 Configure partition (8) Table 1-2 Configure partition Sequence Partition Capacity boot 1 GB...
  • Page 20: Starting Installation

    Deployment Manual Figure 1-19 Configure partition (9) 1.2.9 Starting Installation Background Information On the INSTALLATION SUMMARY interface, click Begin Installation.
  • Page 21: Setting Password

    Deployment Manual Figure 1-20 Installation 1.2.10 Setting Password Procedure Step 1 On the CONFIGURATION interface, click ROOT PASSWORD.
  • Page 22: Restarting

    Deployment Manual Figure 1-21 Set password (1) Step 2 Enter the password, and then click Done at the upper-left side. Figure 1-22 Set password (2) 1.2.11 Restarting Background Information The installation takes 10 minutes to 20 minutes. After installation, click Reboot. Wait for the server to restart, and then you can remove the USB drive from the server.
  • Page 23: Installing Basic Package And Driver

    Deployment Manual Figure 1-23 Restart 1.2.12 Installing Basic Package and Driver Procedure Step 1 Log in to the CentOS system. For first-time login, we recommend logging in with root. Step 2 Enter the date command to check whether the date and time of the server are correct. If not, enter the following command with actual time.
  • Page 24 Deployment Manual 1. Execute the cd /etc/sysconfig/network-scripts/ command to go to the network configuration path, and then execute the ls command to view the number of network cards.[root@localhost network-scripts]# ls ifcfg-eno1 ifdown-post ifup-bnep ifup-routes ifcfg-eno2 ifdown-ppp ifup-eth ifup-sit ifcfg-lo ifdown-routes ifup-ippp ifup-Team ifdown...
  • Page 25 Deployment Manual 3. Execute the vi ifcfg-eno1 command and press i to edit the network card configuration file. After editing, press the Esc key, and then input :wq to save the configuration.[root@localhost network-scripts]# vi ifcfg-eno1 TYPE=Ethernet PROXY_METHOD=none BROWSER_ONLY=no BOOTPROTO=static #Obtain static IP DEFROUTE=yes IPV4_FAILURE_FATAL=no IPV6INIT=yes...
  • Page 26 Deployment Manual 01217.tar.gz Step 7 Execute the sh shell/install.sh command to unzip the basic package. [root@localhost base]# tar xzvf General_IVS-CentOS7.4-Base_CPU-X86-MD5-c8ef_V1.003.0000001.0.R.201117.tar.gz [root@localhost base]# sh shell/install.sh --------------------------------Continue installation-------------------------------- --------------------------------[Begin:Deployment]--------------------------------- After unzipping the basic package, the script will automatically install the basic package and the driver.
  • Page 27: Service Software Installation

    2.1 Modifying Script Before modifying the script, check whether the basic package and the driver are normal. Prerequisites You have obtained the IP8000-E installation package (General_IVS-TB8000-E_ChnEng_MD5-544e_V1.000.1028000.0.T.201118.tar.gz.) from Dahua GDP system. Background Information The package name varies with version and release date.
  • Page 28 Deployment Manual Figure 2-1 Check the driver Step 2 Install the patch. 1) Execute the mkdir /home/patch command to create a /home/patch folder on the server. Execute the cd /home/patch/ command to go to the /home/patch directory. 2) Click in the Xshell navigation bar , and then move the patch from your local computer to the /home/patch directory.
  • Page 29 Deployment Manual 4. Execute the cd tools/ command to go to the tools directory in the program. 5. Execute the vi set_bond_config.sh command. Press i on the keyboard to switch to the editing mode, and then modify the IP address of the server (HOST_IP, HOST_GATEWAY, HOST_MASK).
  • Page 30: Installing Service Software

    Deployment Manual RX packets 11094721 bytes 14968530083 (13.9 GiB) RX errors 0 dropped 0 overruns 0 frame 0 TX packets 4630554 bytes 576851719 (550.1 MiB) TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0 endvnic: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet6 fe80::aa82:52ae:893:d73d prefixlen 64 scopeid 0x20<link>...
  • Page 31 Deployment Manual Execute the cd /home/IP8000/shell/ command to go to the home/IP8000/shell directory. Step 2 If the service software has been installed, we recommend uninstalling it first by executing the sh uninstallAll.sh command. Step 3 Execute the sh install.sh command to install the service software. Installation takes about 18 minutes.
  • Page 32: Deploying Platform

    Deployment Manual 3 Deploying Platform Background Information Log in to the Unified Operation platform, initialize the platform, and configure servers. 3.1 Logging in to Unified Operation Platform Background Information You can log in to the Unified Operation platform by entering IP address and port number (8068 by default).
  • Page 33 Deployment Manual Figure 3-2 Advanced Step 4 Enter username and password, and then click Login. Figure 3-3 Login ● The username and the password are admin/Admin123 by default. ● For first-time login, you need to initialize the Unified Operation platform. For details, see "3.2 Initializing Unified Operation Platform".
  • Page 34: Initializing Unified Operation Platform

    Deployment Manual Figure 3-4 Environment checked Step 6 In the pop-up window, enter login password, and then click OK. 3.2 Initializing Unified Operation Platform Background Information When logging in for the first time, you need to complete the initialization according to onscreen instructions.
  • Page 35: Deploying Mysql

    Deployment Manual Figure 3-6 Search for servers Step 4 Click Next. 3.2.2 Deploying MySQL Procedure Step 1 On the MySQL Config interface, click MySQL Undeployed, and then select Standalone Mode. Step 2 Enter server IP in MySQL Database IP. Step 3 Click Business IP of MySQL M a s t e r Server, and then in the displayed m a s t e r server list, select IP address of the event detection server.
  • Page 36: Selecting Configuration Mode

    Deployment Manual Figure 3-7 Deploy MySQL ● Different ports of the same server are collapsed. You can click to expand the information. ● Enter keywords in the text box at the upper-right corner, and then click to search for IP address. Step 4 Click OK on the pop-up box.
  • Page 37: Managing Server

    Deployment Manual Figure 3-8 Select configuration mode In the pop-up window, click OK. Step 2 The system starts initialization. After that, the system goes to the login page. Step 3 Log in to the Unified Operation system again, and then change the default password and set up the security questions within 2 minutes.
  • Page 38 Deployment Manual Figure 3-9 Resource Step 4 Click Manage, and then you can start managing servers. You can manage servers by search or one by one. ● Manage servers by search You can manage servers by auto search or manual search. ◇...
  • Page 39 Deployment Manual Different ports of the same server are collapsed. You can click to expand the information. 3. Click Manage, and then in the pop-up window, click OK. ◇ Manage servers by manual search 1. Enter IP address of the server to be managed in the search box at the upper-right corner of the Resource Management interface, and then click Search.
  • Page 40 Deployment Manual Related Operations ● Manage new servers On the Resource Management interface, click Add, and then you can repeat step 3–step 5 to manage new servers. ● Cancel managing servers On the Resource Management interface, select servers from the server list, click Cancel or click the corresponding , enter login password in the pop-up window, and then click OK.
  • Page 41: Installing Event Detection Server

    Deployment Manual 4 Installing Event Detection Server 4.1 Managing Product Procedure Step 1 Log in to the Unified Operation platform. Step 2 Select Product > Product Management. Step 3 Click Install. Figure 4-1 Install server Step 4 Select Common > InspectorEventDetect, and select the corresponding version of InspectorEventDetect.
  • Page 42 Deployment Manual server), Business data node pool (IP address of the server), Heartbeat node pool (IP address of the server), and leave the other values as default. Figure 4-3 Custom install Step 8 Click Next. The Install New PaaS Cluster page is displayed.
  • Page 43: Installing New Paas Cluster

    Deployment Manual 4.2 Installing New PaaS Cluster Prerequisites Event detection server is installed. For details, see "4.1 Managing Product". Procedure Step 1 On the Custom Install page, click Install New PaaS Cluster. Figure 4-4 Install new PaaS cluster Step 2 Select service type.
  • Page 44 Deployment Manual Figure 4-5 Select service type 2. Click Next. Step 3 Configure the parameters. 1. Select Standalone > General Domain Mode, leave the other parameters as default, and then click Next.
  • Page 45 Deployment Manual Currently IP8000-E only supports standalone. Figure 4-6 Configure PaaS cluster parameters 2. On the Mysql service page, install MySQL. Select Installed. Database Service Virtual IP (server IP address) is displayed.
  • Page 46 Deployment Manual If it is not displayed, manually enter the server IP address. Figure 4-7 MySQL service 3. Select the Intelligence Service tab, click Show More Advanced, and then click Intelligence DataNode edit box. Select server IP address, and leave the other parameters as default.
  • Page 47 Deployment Manual Figure 4-8 Intelligence service 4. Select the DeepLearning Service tab, click Show More Advanced, enter DeepLearning vip, and leave the other parameters as default. For DeepLearning vip, enter the server IP address.
  • Page 48 Deployment Manual Figure 4-9 Deep learning service 5. Click Completed and submit, and then in the pop-up window, click OK. If error occurs during installation, you can just click the close button.
  • Page 49: Configuring Behavior Saas

    Deployment Manual 4.3 Configuring Behavior SaaS Prerequisites Make sure that new PaaS cluster is installed. For details, see "4.2 Installing New PaaS Cluster". Procedure Step 1 On the Custom Install page, select the installed SaaS service and PaaS cluster, and then click Next.
  • Page 50 Deployment Manual Figure 4-11 Common configuration Step 3 Click Bahavior SaaS, and then click Show More Advanced. Enter Video_Max_Channels (the maximum number of video analysis channels), select Server_Type as IP, and leave the other parameters as default. Click Completed. The system goes to the Custom Install page. The maximum number of analysis video channels is related to the number of intelligent cards in the server.
  • Page 51 Deployment Manual Figure 4-12 Configure behavior SaaS On the Custom Install interface, click Add to add authorization user. Step 4 Enter UserName, NickName, Password, and E-Mail. Select Camera Service, enter Step 5 Number of Devices and Number of Channels. ● Number of Devices: The maximum number of devices that can be connected. ●...
  • Page 52 Deployment Manual Figure 4-13 Enter user information Click OK. Step 6 After user authorization, the system automatically goes to the Custom Install interface. Click Completed and submit, and then in the pop-up window, click OK. Step 7 After installation, select Product > Product Management, and then you can view Installed successfully from Product Status.
  • Page 53: Configuring Operator

    Deployment Manual Figure 4-14 Completed and submit Figure 4-15 Installed successfully 4.4 Configuring Operator Background Information Log in to the View Intelligent O&M Tool to configure the operator.
  • Page 54 Deployment Manual Procedure Step 1 Log in to the View Intelligent O&M Tool. 1. Enter https://server IP:6400 in the browser address bar, and then press Enter. 2. Enter username and password, and then click Log in. The default username and password are both admin. 3.
  • Page 55: Applying For Encryption

    Deployment Manual 5 Applying for Encryption Background Information TB8000 supports two encryption methods: hardware-based encryption and software-based encryption. 5.1 Checking Dongle Background Information Use Xshell to remotely log in to the server, and then you can check whether a dongle is installed. The tool recognizes the dongle information first by default.
  • Page 56 PC. Step 5 Apply for software-based encryption on Dahua portal. The portal only supports the Chinese version. Contact our technical support to help you with the application process. 1. In the portal menu navigation bar, search 加密 (encryption), select 根据导出设备信...
  • Page 57 Deployment Manual Figure 5-3 Enter application information Table 5-1 Parameter description Parameter Description...
  • Page 58 Enter the reason for your application. Table 5-2 Server material No. Server Name and Model Part No. Domestic Dahua 1U Traffic Event Detection Intelligent Server (E3 1.0.01.18.10612 1275V5-8G*2-4T*1-E-dongle included) DH-IVS-TB8000 - E-A Domestic Dahua 2U Traffic Event Detection Intelligent Server (Silver4114T*2-16G*4-4T*4-E Card*2-dongle included) 1.0.01.18.10613...
  • Page 59 DH-IVS-TB8000-6A-GU2 Domestic Dahua 2U Traffic Event Detection Intelligent Server (Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) 1.0.01.18.10617 DH-IVS-TB8000-6A-GU2 Overseas Dahua 1U Traffic Event Detection Intelligent Server (E3 1.0.01.18.10618 1275V5-8G*2-4T*1-E-dongle included) DHI-IVS-TB8000 - E-A Overseas Dahua 2U Traffic Event Detection Intelligent Server (Silver4114T*2-16G*4-4T*4-E Card*2-dongle included) 1.0.01.18.10619...
  • Page 60: Hardware-Based Encryption

    Deployment Manual Begin Date: 2021-05-19 16:05:55 End Date: 2021-06-18 16:05:55 Days: Count: ID: 2077,3114,3106 4. Execute the /etc/init.d/Intelligence-DataNode restart command to restart the operator service. Step 7 Log in to the View Intelligent O&M Tool to view the operator status. If the Resource Status shows Running, it means that the encryption was successful.
  • Page 61 Deployment Manual The file name varies according to the version and release date. Step 6 Apply for the dongle on Dahua portal. For details, see step 5 in "5.2 Software-based Encryption". Step 7 Start encryption. 1. Log in to Xshell, and then in the Tools directory, execute the rz command to upload the downloaded encryption certificate.
  • Page 62: Appendix 1 Cybersecurity Recommendations

    Deployment Manual Appendix 1 Cybersecurity Recommendations Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps toward protecting and strengthening networks and networked appliances will make them less susceptible to attacks.
  • Page 63 Deployment Manual 1024~65535, reducing the risk of outsiders being able to guess which ports you are using. 6. Enable HTTPS We suggest you to enable HTTPS, so that you visit Web service through a secure communication channel. 7. MAC Address Binding We recommend you to bind the IP and MAC address of the gateway to the equipment, thus reducing the risk of ARP spoofing.
  • Page 64 Deployment Manual ● Enable IP/MAC address filtering function to limit the range of hosts allowed to access the device.
  • Page 65 Deployment Manual...

Table of Contents