background image

Update Guide 

1

 

Updating from V1.001 to V8.0.2 

This chapter introduces the applicable version and update procedures  from V1.001 to V8.0.2 for 
DSS4004-S2 and DSS7016D/DR-S2. 

 

Applicable Version 

1.1

Product 

Applicable version 

Applicable Program Name 

Target 
Version 

DSS4004-S2 

V1.001.0000000.2 

General_OverseasDSS4004S2_Eng
_Basic_V1.001.0000000.2.R.202012
17.tar.gz 

V8.0.2 

DSS7016D/DR-S2 

V1.001.0000001.2 

General_OverseasDSS7016S2_Eng
_Basic_V1.001.0000001.2.R.202012
11.tar.gz 

V8.0.2 

 

There might be risk if you update the program. Make sure that you back up the data before update to 
avoid failure and data corruption. 

 

Update Instructions 

1.2

Refer to the following .xlsx file for the situations before and after update. 

Update Note.xlsx

 

 

Update Methods 

1.3

 

Non-applicable versions cannot be directly upgraded to V8.000.0000002.0. You need to upgrade 
to the applicable versions first (see "1.1 Applicable Version"), and then to V8.000.0000002.0. If 
you upgrade to V8.000.0000002.0 directly, the system prompts an update failure. The data will 
not be replaced, and the original version remains after the service restarts. 

 

You cannot update when hot standby is configured. Remove the hot standby before updating 
to V8.000.0000002.0. 

 

After update, you need to reconfigure distributed deployment. 

 

After update, the program cannot be downgraded to earlier versions. 

 

Downgrade or update among  different programs is not supported. For example, you cannot 
update DSS7016D/DR-S2 to DSS4004-S2, or update DSS4004-S2 to DSS7016D/DR-S2. 

Summary of Contents for DSS4004-S2

Page 1: ...I DSS4004 S2 DSS7016D DR S2 Update Guide V1 0 0 ZHEJIANG DAHUA VISION TECHNOLOGY CO LTD ...

Page 2: ...ious injury WARNING Indicates a medium or low potential hazard which if not avoided could result in slight or moderate injury CAUTION Indicates a potential risk which if not avoided could result in property damage data loss lower performance or unpredictable result TIPS Provides methods to help you solve a problem or save you time NOTE Provides additional information as the emphasis and supplement...

Page 3: ...ide II Table of Contents Foreword I 1 Updating from V1 001 to V8 0 2 3 Compatible Version 3 1 1 Upgrade Instructions 3 1 2 Upgrade Methods 3 1 3 Update Operations 4 1 4 Cybersecurity Recommendations 7 Appendix 1 ...

Page 4: ... the following xlsx file for the situations before and after update Update Note xlsx Update Methods 1 3 Non applicable versions cannot be directly upgraded to V8 000 0000002 0 You need to upgrade to the applicable versions first see 1 1 Applicable Version and then to V8 000 0000002 0 If you upgrade to V8 000 0000002 0 directly the system prompts an update failure The data will not be replaced and ...

Page 5: ...re and data corruption Step 1 Open browser enter IP config on the address bar and then press Enter key Step 2 Enter the username and password and then click Login to log in to the web configuration Step 3 interface Select System Maintenance System Update Step 4 You can update on the web interface or by the configuration tool Update on the web interface Click select the update package in BIN format...

Page 6: ... 1 Click Download Config Tool 2 Enter IP address username and password of the web interface and then click Login to log in to the configuration tool 3 Click System Upgrade click Open select the update package in BIN format and then click Upgrade ...

Page 7: ...ptional Select System Maintenance Basic Maintenance Restore Default Step 6 After update if the environment is abnormal and there is no need to archive old data on site you can perform the step which will restore the device to factory settings and delete the old version files After the update is complete download the V8 version of the client Step 7 ...

Page 8: ...mation of firmware updates released by the manufacturer We suggest that you download and use the latest version of client software Nice to have recommendations to improve your device network security 1 Physical Protection We suggest that you perform physical protection to device especially storage devices For example place the device in a special computer room and cabinet and implement well done a...

Page 9: ...ed transmission function to reduce the risk of audio and video data being stolen during transmission Reminder encrypted transmission will cause some loss in transmission efficiency 11 Secure Auditing Check online users we suggest that you check online users regularly to see if the device is logged in without authorization Check device log By viewing the logs you can know the IP addresses that were...

Page 10: ...Update Guide 9 Enable IP MAC address filtering function to limit the range of hosts allowed to access the device ...

Page 11: ...Update Guide 10 ...

Reviews: