PROPRIETARY -- DO NOT DUPLICATE Security Knowledge Manager (SKM) SKM-Stratus Administrative User Guide Version 2.6.0 videoNEXT Network Solutions Inc., 3852 Dulles South Court, Suite I, Chantilly, Virginia 20151 +1.703.657.1200 www.videoNEXT.com PROPRIETARY -- DO NOT DUPLICATE No part of this document may be copied or reproduced in any form or by any means (print, photographed, sent via electronic mail, sent via postal service or by such means) without the prior written consent of videoNEXT Network Solutions, Inc. dba, videoNEXT. videoNEXT makes no warranties with respect to this document and disclaims any im- plied warranties of merchantability, quality, or fitness for any particular purpose. The in- formation in this document is subject to change without notice. videoNEXT reserves the right to make revisions to this publication without obligation to notify any person or en- tity of any such changes. Trademarks or brand names mentioned herein are trademarks or registered trademarks of their respective owners. THE INFORMATION IN THIS PUBLICATION IS PROVIDED ON AN AS-IS BASIS. VIDEONEXT DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL VIDEONEXT BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUEN- TIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTUOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. 2 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE Table of Contents Chapter 1: Introduction 6 Chapter 2: Getting Started with Planning 7 2.1. Deployment Planning Considerations 8 2.2. Install and Upgrade Procedures Outline 11 2.3. Storage System Planning and Configuration outline 12 2.4. Configure Cameras 13 2.5. Configure Sensors 14 2.6. User Access and Permissions 15 2.7. Multi-Node SKM Installations 17 2.8. Configuring 3D Mapping component 18 2.9. Configuring v-MX (Video Wall) 19 2.10. Configuring v-AC (Access Control integration) 20 Chapter 3: Routine Scenarios In Details 21 3.1. Configure new SKM installation 22 3.1.1. Initial system configuration after install 22 3.1.2. Using “sos” account for system administration/recovery (Linux only) 23 3.1.3. Multi-Node Configuration Management 23 3.1.4. Configuring DNS, NAT and Firewall 24 3.2. Configure Cameras 26 3.3. Manage Storage and Storage Consumers 29 3.3.1. Manage Storage Volumes 29 3.3.2. Manage Storage Policies 31 3.3.3. Manage Storage Consumers 33 3 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE 3.4. Configure Event Handling 34 3.5. Manage Users and Roles 37 3.5.1. Manage Resources and Sets 37 3.5.2. Manage Sets and Roles 38 3.5.3. Manage Users 39 3.6. Configure Sensors 40 3.7. Media Export: how to enable and effectively use 41 3.8. Camera GEO-calibration 42 3.9. Camera Motion Detection 44 3.10. Analytics configuration 47 3.11. Configure v-MX (Video Wall) option 51 3.12. Configure v-AC (Access Control) option 54 Chapter 4: Troubleshooting 56 4.1. How to Identify and Classify the issue 56 4.2. Issues with Client Station 57 4.3. Issues with SKM server 57 4.3.1. Camera does not retrieve video 58 4.3.2. Camera PTZ does not work 59 4.4. Documenting Software Issues and getting Support 60 APPENDIXES 61 A.1. Recommendations on Client Station platforms 61 A.2. SKM software Installation in details 62 A.2.1 Prepare OS (Linux only) 62 A.2.2 Apple MAC OS X 67 A.3. Upgrade from SKM 2.5 in details 70 4 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE A.4. Configure Multi-Node SKM Security Domain 76 A.5. Video Codecs, Transmission Protocols and their Effective Usage 77 A.6. List of supported video cameras 79 A.7. List of supported sensors 81 A.8. Service Pack installation 82 A.9. Analytics 84 A.10. SKM License installation 106 A.11. Customer Support 107 A.12. Configure capability to generate Emails on Event 108 5 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE Chapter 1: Introduction The videoNEXT team is proud to present Security Knowledge Manager (SKM™) v.2.6.0, (also know as SKM-Stratus) the software solution that will improve and simplify the operation and management of your security systems. SKM allows you to build and grow your security system based on your existing IT infrastructure. SKM-Stratus, an open, standards-based software solution that works with almost any IP, digital, or analog camera including HD and mega pixel; runs on any Intel or compatible server (now on the Mac); and uses your existing security and data infrastructure in new and powerful ways. With thousands of systems currently installed and a rock solid repu- tation of no downtime for critical installations, SKM-Stratus is a proven security technol- ogy for today and beyond. SKM-Stratus provides the easiest and most scalable Physical Security Information Man- agement (PSIM) solution available today. Combine this with full policy-level administra- tion, its flexible Storage Volume Manager and the renowned Frame Rate Decimation feature you get the most capable, prevailing and scalable surveillance and security tool ever developed. Most importantly, the SKM-Stratus software platform leverages a classical IT approach to video and sensor content management: •CAPTURE- data from an infinite quantity of cameras, access control, sensors, ground based radar, point of sale, etc. •ORGANIZE- data into a single, intelligent workable database •STORE- data in commercially available storage arrays, in accordance with enterprise archival policies. •DISPLAY- video and sensor data in an intuitive graphical user interface to all creden- tialed users via; web browser, wireless device 6 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE Chapter 2: Getting Started with Planning This chapter will provide you with introduction into the most common situations SKM Administrator faces when installing, maintaining or troubleshooting Security System’ software. After you read this chapter you will get conceptual understanding on how to: - Install and/or upgrade SKM software - Make sure it works optimally - What considerations should be given to planning you SKM installation - Configure and maintain cameras and sensors - Administer Users’ Access and Permissions - Configure and maintain other options and services within SKM We recommend Chapter 3 for further reading and detailed instructions. 7 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE 2.1. Deployment Planning Considerations One of the most important things to keep in mind when planning you Security System deployment is: you have to plan your Security System installation for subsequent growth to make sure you are effectively using initial investment as your Security System ex- pands. Please review the simple SKM deployment schema below: The setup here is very simple and interconnects media producers (cameras) to con- sumers (clients) with a network, where SKM Server provides the middle-point, which manages cameras, provides video-recording and media analysis, and leverages multi- ple camera manufacturers’ specifics into uniform user experience for Clients. As number of video feeds grows, this setup will scale easily by extending on network in- frastructure, linear extension on number of SKM servers, but the user experience will be kept uniform with no regard to how many cameras and SKM servers your setup will have. SKM software is specifically accommodated to span multiple servers with no need to require users to login to individual servers. The total number of Clients registered in the system is not limited, and SKM will be able to support tens and hundreds of simultaneously connected and actively working users as long as your network infrastructure is sized properly to accommodate for such a load. Still, the “simple” setup has one important limiting factor: Clients will be limited to the resources of their particular computer, so the number of simultaneously opened video streams will be limited to the power of CPU and video card of their computers. In more advanced setup depicted in the schema below, you will see how SKM over- comes this limitation and grows beyond it: 8 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE Over here, the “Video Wall” concept comes into view, which allows creating multi- monitor / multi-view viewing solutions with generic inexpensive video monitors and COTS (Common Off The Shelf) computers, which is shared between Clients, who uses an extended User Interface features to control Video Walls, while still retain their ability to work with video on their personal computers. This solution does not only extend simul- taneous video visualizations capabilities, but improves reliability and survivability for critical applications. Another extension depicted on the schema is an integration with Access Control Sys- tems and Sensors, where SKM becomes a focal point of Signal Processing and Control by uniform user experience in receiving Alerts and controlling such devices as Door Readers, Keypads, etc.. After such a short introduction into the key elements of Digital Security System design , you have to consider a careful examination upon next areas: 1. Data Acquisition devices (Cameras/Sensors/Access Control Systems/etc..): •If you are doing a fresh new installation - investing into natively IP-enabled devices may be a little bit pricier, but will benefit you by faster/cheaper rollout using stan- dard network infrastructures and less expensive maintenance on network-enabled devices down the road •If you are doing retrofitting of existent system - you might consider keeping legacy analog data acquisition devices (like cameras and sensors), while adding analog- 9 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide PROPRIETARY -- DO NOT DUPLICATE to-digital convertors, which [again] may give you faster/cheaper rollout and less expensive maintenance in long run 2. Network Infrastructure •Media streams (Video and Sound) are heavy on transmission and storage by defi- nition, so your network should have sufficient capacity for proper bandwidth han- dling •Network design should allow for the growth, as experience shows that Security Sys- tems are tend to grow bigger from their original size •Reasonable consideration should be given to the reliability and network security due to the nature of the data been transmitted and processed 3. Data Processing •SKM processes data on Servers, and Common-Off-The-Shelf (COTS) hardware from leading vendors may be used •Consideration should be given to overall system reliability and maintainability, as this aspect depends on hardware provider and on set of management tools which will be installed on it •If installation consists from multiple processing Nodes (Servers) - you may consider rack-mountable hardware to decrease installation footprint 4. Data Storage •Storage internal to hardware may be used for systems where long retention time is not needed •As demand for longer retention time grows - externally attached storage should be considered for its scalability, reliability and manageability 5. Client Platforms •SKM client software requires standard browser on any Windows or MAC OS X to operate •Dependencies include Java Runtime 1.6 update 12 and Adobe Flash 9 (or later revisions) •GEO-mapping capabilities require optional Google Earth browser plugin to oper- ate in 3D mode •Number of simultaneously visualized video feeds depends mostly on client com- puter CPU power and on reasonably powerful (mid-class) video adapter •In general, if simultaneous displaying of more then 10-15 videos is expected - con- sideration should be given to either deploy v-MX (Video-Wall) SKM option (pre- ferred) or to boost CPU on viewing station above average of “office PC” class 6. Scaling the system •SKM software automatically binds multiple Nodes to form SKM Security Domain, where resources are presented to the Administrators and End Users in one logical cluster •As you grow your system - you can scale close to linear with adding more SKM Nodes to accommodate system expansion •Each SKM node will support from few to tens of cameras (and other sensors) per node •SKM licensing schema is flexible to accept any number of processing nodes you might need •Usually Storage will have to grow as you expand your security system 10 SKM v.2.6.0 Administration Guide (as of 6.23.09) © 2002-2009 videoNEXT Network Solutions, Inc.! Security Synchronized.™! All Rights Reserved Worldwide
Description: