DeviceDiagnosticTool - User Manual DAHUA

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Device Diagnostic Tool (General)

User’s Manual

ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V1.0.0


User’s Manual

Foreword
General

This manual introduces the functions and operations of the Device Diagnostic Tool (hereinafter
referred to as "the Tool").

Safety Instructions

The following categorized signal words with defined meaning might appear in the manual.

Signal Words Meaning


Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, lower performance, or unpredictable
result.
Provides methods to help you solve a problem or save you time.
Provides additional information as the emphasis and supplement to
the text.

Revision History

Version Revision Content Release Time


V1.0.0 First release. July 2023

About the Manual

● The manual is for reference only. If there is inconsistency between the manual and the actual
product, the actual product shall prevail.
● We are not liable for any loss caused by the operations that do not comply with the manual.
● The manual would be updated according to the latest laws and regulations of related regions.
For detailed information, see the paper manual, CD-ROM, QR code or our official website. If
there is inconsistency between paper manual and the electronic version, the electronic version
shall prevail.
● All the designs and software are subject to change without prior written notice. The product
updates might cause some differences between the actual product and the manual. Please
contact the customer service for the latest program and supplementary documentation.
● There still might be deviation in technical data, functions and operations description, or errors in
print. If there is any doubt or dispute, please refer to our final explanation.
● Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
● All trademarks, registered trademarks and the company names in the manual are the properties
of their respective owners.

I
User’s Manual

● Please visit our website, contact the supplier or customer service if there is any problem
occurred when using the device.
● If there is any uncertainty or controversy, please refer to our final explanation.

II
User’s Manual

Important Safeguards and Warnings


This section introduces content covering the proper handling of the Tool, hazard prevention, and
prevention of property damage. Read carefully before using the Tool, and comply with the
guidelines when using it.

Transportation Requirement

Transport, use and store the Tool under allowed humidity and temperature conditions.

Storage Requirement

Store the Tool under allowed humidity and temperature conditions.

Installation Requirements

● Do not connect the power adapter to the Tool while the adapter is powered on.
● Strictly comply with the local electric safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the Tool.
● Do not connect the Tool to two or more kinds of power supplies, to avoid damage to the Tool.
● Improper use of the battery might result in a fire or explosion.

● Personnel working at heights must take all necessary measures to ensure personal safety
including wearing a helmet and safety belts.
● Do not place the Tool in a place exposed to sunlight or near heat sources.
● Keep the Tool away from dampness, dust, and soot.
● Install the Tool on a stable surface to prevent it from falling.
● Install the Tool in a well-ventilated place, and do not block its ventilation.
● Use an adapter or cabinet power supply provided by the manufacturer.
● Use the power cords that are recommended for the region and conform to the rated power
specifications.
● The power supply must conform to the requirements of ES1 in IEC 62368-1 standard and be no
higher than PS2. Please note that the power supply requirements are subject to the Tool label.
● The Tool is a class I electrical appliance. Make sure that the power supply of the Tool is
connected to a power socket with protective earthing.

Operation Requirements

III
User’s Manual

● Check whether the power supply is correct before use.


● Do not unplug the power cord on the side of the Tool while the adapter is powered on.
● Operate the Tool within the rated range of power input and output.
● Use the Tool under allowed humidity and temperature conditions.
● Do not drop or splash liquid onto the Tool, and make sure that there is no object filled with
liquid on the Tool to prevent liquid from flowing into it.
● Do not disassemble the Tool without professional instruction.
● This product is professional equipment.
● The Tool is not suitable for use in locations where children are likely to be present.

IV
User’s Manual

Table of Contents
Foreword.............................................................................................................................................................. I
Important Safeguards and Warnings.............................................................................................................. III

1 Overview...........................................................................................................................................................1

2 Basic Operations.............................................................................................................................................. 3
2.1 Home Page....................................................................................................................................................................................3
2.2 Searching for Devices................................................................................................................................................................4
2.2.1 Searching Through Current Network..................................................................................................................... 4
2.2.2 Searching Through IP Segment................................................................................................................................ 4
2.2.3 Searching for Specified Device..................................................................................................................................5
2.3 Troubleshooting......................................................................................................................................................................... 6
2.4 Device Initialization....................................................................................................................................................................8
2.5 Going to the Webpage of the Device............................................................................................................................... 10
2.6 Upgrading Devices.................................................................................................................................................................. 10
2.7 Searching for Error Code....................................................................................................................................................... 11
2.8 Uploading Serial Port Log..................................................................................................................................................... 12
2.9 Viewing Device Version..........................................................................................................................................................13
2.10 Viewing the User Manual.................................................................................................................................................... 13
2.11 Device Operation and Maintenance...............................................................................................................................13
Appendix 1 Cybersecurity Recommendations............................................................................................. 16

V
User’s Manual

1 Overview
When the device fails and needs to be repaired, on-site repair is performed through the device fault
diagnosis and repair tool (hereinafter referred to as tool), without bothering to returning the device
to the factory for maintenance. The tool can be used in the following devices: Dahua front-end
devices such as network cameras, and back-end devices such as NVR.
The tool mainly features the following functions:
● Collect the device data such as operation logs, fault codes, maintenance logs and fault logs, and
send them to the company's cloud server, and then they will be analyzed. Major faults or faults
that frequently occurs will be solved to ensure the device can run smoothly in the future.
● Fix the following problems on the device:
Damage on programs (such as program error caused by power failure when upgrading the
program.
Abnormal configurations on the device.
Cannot log in to the device when you forget the password.

If the device and the computer where the tool is installed are connected through Internet, but the
device cannot searched for by the tool. It means the tool does not support the device.

1
User’s Manual

Figure 1-1 Flowchart of diagnosis and repair

2
User’s Manual

2 Basic Operations

2.1 Home Page


Acquire the installation package of the tool from our technical support, and install it on your
computer.
Figure 2-1 Home page

Table 2-1 Home page

Parameter Description
Search for error code.

Go to the serial port log upload page.


The tool is connected to the Internet. If the tool is disconnected
from the Internet, is displayed. In this situation, The tool is not
able to send data to the cloud server or provide troubleshooting.
The tool has its own error code table, which ensures that the tool
can interpret the error code of the device and provides repair
suggestions. If the tool does not have an error code table, is
displayed. After the tool is opened, the error code table is
downloaded from the cloud for device fault diagnosis.

3
User’s Manual

Parameter Description
● Switch Language: Switch the system language between
Chinese (simplified) and English.
● Advanced Settings: Set the device upgrade type and upgrade
speed.
● Software Version: The version of the tool.
● User's Manual: The user's manual of the tool.

Minimize the window.

2.2 Searching for Devices


Search for devices through the tool.

Make sure the network of devices you are searching for and the network of the computer where the
tool is installed are interconnected.

2.2.1 Searching Through Current Network


Search for devices that are one the current network.
Procedure
Step 1 Select Current Network from Add Mode.
Step 2 Enter the username and password of the device, and then click Check.
The tool automatically searches for devices on the current network.
You can click Redetect to re-search for devices.
Figure 2-2 Search through current network

2.2.2 Searching Through IP Segment


Procedure
Step 1 Select IP Segment from Add Mode.
Step 2 Enter the range of the IP segment.
Step 3 Enter the username and password, and then click Check.

4
User’s Manual

The tool automatically searches for devices on the defined IP segment.


● Reset: Clear current settings.
● Redetect: Re-search for devices.
Figure 2-3 Search through IP segment

Table 2-2 Parameters description

Parameter Description
IP segment supports up to 16×256 IPs. For example, XXX.XX
Net segment
segment supports XXX.XX.0.0-XXX.XX.15.255.
Username Enter the username and password of the device. Supports
administrator account and general account. The default
administrator account is admin.

Password
The permissions associated with the account are different. We
recommend you use admin account to log in.

2.2.3 Searching for Specified Device


Procedure
Step 1 Select Specified Device from Add Mode.
Step 2 Enter the information the device.
Step 3 Click Check.
● Reset: Clear current settings.
● Redetect: Re-search for specified device.

5
User’s Manual

Figure 2-4 Specified device

Table 2-3 Parameters description

Parameter Description
IP Address
MAC At least one of them must be entered.
SN
Username Enter the username and password of the device. Supports
administrator account and general account. The default
administrator account is admin.

Password
The permissions associated with the account are different. We
recommend you use admin account to log in.

2.3 Troubleshooting
All devices that are searched for will be displayed on the device list. You can view the device
information and diagnosis results.

IP Conflict

Change IP addresses through ConfigTool. For details, see the user's manual of CofigTool.

6
User’s Manual

Figure 2-5 IP conflict

Abnormal Initialization

Initialize the device. For details, see "2.4 Device Initialization".


Figure 2-6 Abnormal Initialization

Login Abnormal

Click Login, and then check whether the login password is correct. If the password is wrong, reset
the password.
Figure 2-7 Login Abnormal

Video Exception

Go to the webpage of the device to preview the video of the device. For details, see "2.5 Going to
the Webpage of the Device".
Figure 2-8 Video Exception

Sonia program exception

Upgrade the device. For details, see "2.6 Upgrading Devices".

7
User’s Manual

Figure 2-9 Sonia program exception

2.4 Device Initialization


For the first-time use, initialize the device before you can perform operations to the device, such as
diagnose the device and change the IP of the device.
Background Information

Make sure the devices to be initialized are the same network segment of your computer.

Procedure
Step 1 Select the devices are not successfully initialized.
Figure 2-10 Abnormal initialization

Step 2 Click Initialize.


Step 3 Enter and confirm password, and then link the phone number.

8
User’s Manual

Figure 2-11 Enter and confirm password

Step 4 Click OK.


Step 5 Select P2P or Auto Check for Updates.
Step 6 Click OK.
The device starts initializing.

9
User’s Manual

Figure 2-12 Device initialization

2.5 Going to the Webpage of the Device


On the device list, click Web, and then you can go to the webpage of the device.

2.6 Upgrading Devices


Updating devices through local update or online update.
Procedure
Step 1 Click , and then select Advanced Settings.
Step 2 Select the update speed and the update type.

1 KB is recommended when the network is not stable and the upgrade package is small.
16 KB is recommended when network is stable and the upgrade package is large.

10
User’s Manual

Figure 2-13 Advanced settings

Step 3 On the device list, click More > Device Update.


● Local Update: Select the update file from your computer, and then click Update.
● Online Update: The system automatically checks for updates, and then click Update.

If you select Update Production Test Program from the Update Type list, online
update is not available.
Figure 2-14 Device Update

If the device to be updated is a storage device, and Update Production Test Program is
selected from the Update Type list, the MES login window is displayed after the update is
completed.

2.7 Searching for Error Code


Procedure
Step 1 Click .

11
User’s Manual

Step 2 Enter the error code.


Supports fuzzy search.
Figure 2-15 Search for error code

2.8 Uploading Serial Port Log


Upload serial port log to the server for analyzing problems of the device.
Procedure
Step 1 Click
Step 2 Select the serial number of the device, and then select the type of device.
Step 3 Click Select , select the log file, and then click Upload.

changes to when uploading log files.


● If the log file is successfully uploaded, is displayed.
● If the log file is failed to be uploaded, is displayed.

12
User’s Manual

Figure 2-16 Upload serial port log

2.9 Viewing Device Version


Click , select Software Version, and then you can view the software version, open source
software notice and user license agreement of the tool.

2.10 Viewing the User Manual


Click , and then click User's Manual to view the user's manual of the tool.

2.11 Device Operation and Maintenance


Acquire the device log and then send it to the server.
Procedure
Step 1 On the device list, click Operation and Maintenance , and then click Export to export
the log of the device.
You can click Open File Location to open the file-path of the device log.

13
User’s Manual

Figure 2-17 Export device log

Step 2 Click Advanced O&M to get device log.


Step 3 Configure the parameters.

14
User’s Manual

Figure 2-18 Configure logs

Table 2-4

Parameter Description

a. Select the storage mode.


● PC: The device log is stored at your computer.
Get Real Time Device Log ● SD Card: The device log is stored at the SD card of the
device.
b. Click Export to export real-time device logs.

a. Select a Network card from NIC list.


b. Enter the device IP, and the designated address.
Get Packet Capture Logs
c. Click Export to export the packages from the device IP to the
designated address.

Click Select to upload local files. Only supports files in the format
Get from Local
of *.log.
Step 4 Click Upload to upload the device log to server.

15
User’s Manual

Appendix 1 Cybersecurity Recommendations


Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic steps
toward protecting and strengthening networks and networked appliances will make them less
susceptible to attacks. Below are some tips and recommendations on how to create a more secured
security system.
Mandatory actions to be taken for basic equipment network security:
1. Use Strong Passwords
Please refer to the following suggestions to set passwords:
● The length should not be less than 8 characters;
● Include at least two types of characters; character types include upper and lower case letters,
numbers and symbols;
● Do not contain the account name or the account name in reverse order;

● Do not use continuous characters, such as 123, abc, etc.;

● Do not use overlapped characters, such as 111, aaa, etc.;

2. Update Firmware and Client Software in Time


● According to the standard procedure in Tech-industry, we recommend to keep your
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the system is
equipped with the latest security patches and fixes. When the equipment is connected to the
public network, it is recommended to enable the “auto-check for updates” function to obtain
timely information of firmware updates released by the manufacturer.
● We suggest that you download and use the latest version of client software.
"Nice to have" recommendations to improve your equipment network security:
1. Physical Protection
We suggest that you perform physical protection to equipment, especially storage devices. For
example, place the equipment in a special computer room and cabinet, and implement well-
done access control permission and key management to prevent unauthorized personnel from
carrying out physical contacts such as damaging hardware, unauthorized connection of
removable equipment (such as USB flash disk, serial port), etc.
2. Change Passwords Regularly
We suggest that you change passwords regularly to reduce the risk of being guessed or cracked.
3. Set and Update Passwords Reset Information Timely
The equipment supports password reset function. Please set up related information for
password reset in time, including the end user’s mailbox and password protection questions. If
the information changes, please modify it in time. When setting password protection questions,
it is suggested not to use those that can be easily guessed.
4. Enable Account Lock
The account lock feature is enabled by default, and we recommend you to keep it on to
guarantee the account security. If an attacker attempts to log in with the wrong password
several times, the corresponding account and the source IP address will be locked.
5. Change Default HTTP and Other Service Ports
We suggest you to change default HTTP and other service ports into any set of numbers
between 1024~65535, reducing the risk of outsiders being able to guess which ports you are
using.
6. Enable HTTPS

16
User’s Manual

We suggest you to enable HTTPS, so that you visit Web service through a secure communication
channel.
7. Enable Allowlist
We suggest you to enable allowlist function to prevent everyone, except those with specified IP
addresses, from accessing the system. Therefore, please be sure to add your computer’s IP
address and the accompanying equipment’s IP address to the allowlist.
8. MAC Address Binding
We recommend you to bind the IP and MAC address of the gateway to the equipment, thus
reducing the risk of ARP spoofing.
9. Assign Accounts and Privileges Reasonably
According to business and management requirements, reasonably add users and assign a
minimum set of permissions to them.
10. Disable Unnecessary Services and Choose Secure Modes
If not needed, it is recommended to turn off some services such as SNMP, SMTP, UPnP, etc., to
reduce risks.
If necessary, it is highly recommended that you use safe modes, including but not limited to the
following services:
● SNMP:Choose SNMP v3, and set up strong encryption passwords and authentication
passwords.
● SMTP:Choose TLS to access mailbox server.

● FTP:Choose SFTP, and set up strong passwords.

● AP hotspot:Choose WPA2-PSK encryption mode, and set up strong passwords.

11. Audio and Video Encrypted Transmission


If your audio and video data contents are very important or sensitive, we recommend that you
use encrypted transmission function, to reduce the risk of audio and video data being stolen
during transmission.
Reminder: encrypted transmission will cause some loss in transmission efficiency.
12. Secure Auditing
● Check online users: we suggest that you check online users regularly to see if the device is
logged in without authorization.
● Check equipment log: By viewing the logs, you can know the IP addresses that were used to

log in to your devices and their key operations.


13. Network Log
Due to the limited storage capacity of the equipment, the stored log is limited. If you need to
save the log for a long time, it is recommended that you enable the network log function to
ensure that the critical logs are synchronized to the network log server for tracing.
14. Construct a Safe Network Environment
In order to better ensure the safety of equipment and reduce potential cyber risks, we
recommend:
● Disable the port mapping function of the router to avoid direct access to the intranet devices
from external network.
● The network should be partitioned and isolated according to the actual network needs. If
there are no communication requirements between two sub networks, it is suggested to use
VLAN, network GAP and other technologies to partition the network, so as to achieve the
network isolation effect.
● Establish the 802.1x access authentication system to reduce the risk of unauthorized access
to private networks.

17
User’s Manual

● It is recommended that you enable your device's firewall or blocklist and allowlist feature to
reduce the risk that your device might be attacked

18

You might also like