Moredian localization solution deployment guidance manual

1、Server  deployment(Windows virtual machine)

1. Server  requirements

simple:WIN10+4core+8G+200G  (Support 100 devices)

medium:WIN10+8core+16G+800G   (Support 200 devices)

large:WIN10+16core+32G+1.6T(Support 1000 devices)

2. Turn on CPU virtualization

Check whether the system has been enabled CPU virtualization, right click task bar -- task manager -- performance -- CPU, pop up the following interface to view


If you have not turned it on, follow this tutorial before proceeding.

启动BIOS的虚拟化设置 | 开启CPU虚拟化支持

3. Open the port

This system is a terminal + server structure, and the ports that need to be opened are 19001,8022,8023. Please ensure that these three ports are not occupied by other services on the host and are open in the network.

4. setup VirtualBox

Step1. download virtualBox

virtulbox 6.0.8下载链接

Step2. install virtualBox

Run the installation program and install it according to the default Settings. The Windows security prompt box will pop up during the installation process. Check "always trust the software from OracleCorporation" and click "install".

image

4. Import OVA file

Step1. Download OVA file

魔点本地化部署包1.2.0下载链接

魔点本地化部署包1.1.4下载链接

Step2. Run the Oracle VM VirtualBox manager

Step3. Modify the default virtual computer storage location


Management → global Settings --- > change the normal default virtual computer location to: X:\VirtualBox VMs (please make sure that the target partition is reserved with enough storage space)



Step4. Import the onpremise-base-image-1.1.4.ova mirror file

Management → import virtual computer → select "path to import virtual computer" → import




step5. Start virtual machine

https://moredian.cowtransfer.com/s/6bf821c8cbbf4b


step6. The virtual machine has started


5. View the server address

The server virtual machine is configured with a NAT network, so its service address is the host address. All you need is the host IP.

Press WINDOWS+R in the host system and enter CMD to run the command line:


Type the ipconfig directive to get the host IP address.


Please record and save the address. This address will be used for subsequent visits to the WEB management  and terminal device activation.

2、Server initialization

1. Login management background

Enter the virtual server IP:8023 in the browser to enter the login page of the management background.

Initial login username/password: admin/admin.


2. Change login password

To ensure the security of your account, you must change your initial password to the one you specify after the first login


3. The import license

By default, the system will give away access rights for 3 devices. If the number of simultaneous access is more than 3 devices, you need to apply for authorization.

Find the "agency code" in the "agency management" → "basic information" of the management background, and send the agency ID and the received email account to the after-sales personnel of the magic point. After the authorization code is generated, it will be sent to the designated mailbox.

In the organization management → authorization management, find the generated organization ID, the received authorization file import.

Each authorization code contains the maximum number of terminals that each server can access. In case of capacity expansion, authorization should be increased.

image

3、Device activation/registration

1. Hardware installation

Please first correctly installed face access control machine, to ensure that the power supply, network, access control line has been correctly connected.

2. power on

After the device is power on, it will start up automatically and carry out the activation process.

3. Configuration guide

After boot will show the configuration wizard, according to the actual network environment configuration network.

4. The activation

Fill in the server address, that is, the address shown in 1.5 (do not need to take the upper port number), if the network is correctly configured and the server address is correctly configured, the device will automatically complete the activation into the network.

5. Equipment named

After the device is activated successfully, each device can be given a unique name to facilitate subsequent management and use. You can also rename the device in the corresponding module in the administration background.


4、Management background operation brief description

1. Navigation bar introduction


(1) the name of the organization: the default is the test organization, can be modified in the "organization management".

(2) workbench: the platform development function business module entrance are unified here

(3) address book: for the management of organizational structure and personnel information, face input is also here.

(4) organization management: including the deployment of relevant global information and configuration, and the server upgrade and other functions.

(5)Device management: device list and device information can be viewed, device APK and firmware upgrade entry is also here.

(6)document center: system API interface swagger version.

(7)administrator menu: including change password, binding members, system Settings, language selection, exit login entry.

2. Equipment management

This module can view all access devices and their information, can be renamed, unbind, upgrade and other operations.

3.Organization management

① Basic information

Here you can see the basic information of the organization, including the name of the organization, the number of people in the organization, the number of departments, as well as the operation of the administrator to change the password, as well as the operation of managing the bound members.

② Record storage Settings

Record storage cycles can be selected over a period of one month to two years.

Storage state: the virtual machine hard disk is stored in a dynamic allocation mode. Please make sure that the disk of the virtual machine. VMDK file has enough remaining space. The amount of storage is mainly related to the amount of record storage, which can be roughly calculated by using 50K identification data × the number of data generated daily × the set record storage cycle.


③ Strangers' faces

For those who are not authorized to do so or those who are not authorized to do so, you can customize the prompt language and voice broadcast of the device interface

④ sub-administrator

Sub-administrators can be created and managed. Currently, administrator permissions can be restricted according to departments, devices, operation modules and other dimensions

4. Personnel management

Here, we can manage departments and personnel, and also realize face input through headshot of personnel, and support batch operation. We can import member information and face photos in batches. Please read the operation instructions on the interface carefully before import, so as to avoid misoperation.

5. Face entry

Localization scheme face algorithm is only available on the device, so the server will be asked to select the device that provides the algorithm before entering the face.

At present, there are three ways to input faces in the management background:

① Batch face entry

It is suggested to select more equipment to input at the same time to improve the speed of input

② Upload single photo entry

③ Direct input with device

This method is the fastest and is preferred in the presence of personnel

5. The entrance guard management

After the equipment and personnel information is configured, access control management can be started. Open the workbench → Moredian access control

You can set up different access groups according to different permissions, each of which contains the following information


We can give each permission group custom recognition after the interface text tips and voice broadcast. Dynamic prompt content can be referred to by special wildcard characters, such as [name] refers to the name of the person, [day] refers to the day of the week, [id] refers to the work number, [dp] refers to the morning | afternoon | evening, relevant configuration can click the "? "at the end of the line. The button is always available.

It is possible to flexibly define which access control devices are allowed to enter and leave by the designated personnel within the specified time limit.

Each employee can belong to more than one permission group at the same time, when making the specific judgment of opening the door, to release the principle of priority execution.

Special permission group description:

①Default group. There is only one default group in the system. When a permission group is designated as the default group, the newly entered members will belong to the group by default.

②Full group. This permission group is pre-generated by the system and by default contains all members of the organization and is the default group.

All access information of personnel in the system will be saved as identification records, which can be searched, viewed and exported in the magic point access control → identification records.


6. Members of the binding

Select bind member in the admin drop-down menu in the upper left corner to bind the administrator account to a specific member.



After the completion of the binding can be very convenient to complete the device end administrator interface through the way of face brushing.

7. System Settings

Click "system Settings" in the upper left corner admin drop-down menu to enter.

① The data backup

The data backup function will backup the static data in the system, and the system will do automatic backup every day, or manual backup, and the backup data can also be exported manually for better preservation. In order to ensure the safety of your data, it is recommended to back up the data and keep it properly after a large amount of information entry.

② System upgrade


Subsequent fixes to major issues and releases of new features will be made through "system upgrades."

5、Device operation instructions

1. Login to the device  management interface

step1. Long press the upper left corner of the screen (time display) for 2 seconds to enter the login interface

step2. Administrator login

At present, it supports the administrator to brush the face (recommended, refer to the above, first complete the personnel binding) and use the management account password to log in. After login, the user will enter the following interface

2.Device face entry

step1. Click "enter face"

step2. Enter the job number to check the employee

step1. Click "enter face" on the left.

3.Modify network configuration

Click "configure network" on the main configuration screen to switch between wired or wireless and IP address configurations.

4.View device information

Click "device information" in the main configuration interface to view the main information of the device

4.Device unbinding

If the server needs to be replaced, the device needs to be unbound. At the bottom of the device information interface, click "unbind and reset". This operation is an emergency function, and the activation information will be forced to clear one-way. The recommended unbind operation is to delete the device from the list of devices in the management background when the device is online.

6、Version upgrade instructions

1.Equipment upgrades

Management background → device management → device upgrade → select upgrade package

Version information


Select the device you want to upgrade

Select upgrade time

View upgrade results

During the upgrade process, please ensure that the equipment will not be disconnected from the network. After the upgrade, the equipment will restart.

2.Server upgrade

1.Database upgrade

Upper right corner admin→ system Settings


Click upload upgrade package and select the upgrade package.

Restore the first data loaded to the database

2.Service program upgrade

Switch to "system upgrade" module → import data upgrade package

Click "upgrade to this version" in the first packet record


After the upgrade, the server will restart and require a new login, and the upgrade is completed.

©著作权归作者所有,转载或内容合作请联系作者
  • 序言:七十年代末,一起剥皮案震惊了整个滨河市,随后出现的几起案子,更是在滨河造成了极大的恐慌,老刑警刘岩,带你破解...
    沈念sama阅读 215,634评论 6 497
  • 序言:滨河连续发生了三起死亡事件,死亡现场离奇诡异,居然都是意外死亡,警方通过查阅死者的电脑和手机,发现死者居然都...
    沈念sama阅读 91,951评论 3 391
  • 文/潘晓璐 我一进店门,熙熙楼的掌柜王于贵愁眉苦脸地迎上来,“玉大人,你说我怎么就摊上这事。” “怎么了?”我有些...
    开封第一讲书人阅读 161,427评论 0 351
  • 文/不坏的土叔 我叫张陵,是天一观的道长。 经常有香客问我,道长,这世上最难降的妖魔是什么? 我笑而不...
    开封第一讲书人阅读 57,770评论 1 290
  • 正文 为了忘掉前任,我火速办了婚礼,结果婚礼上,老公的妹妹穿的比我还像新娘。我一直安慰自己,他们只是感情好,可当我...
    茶点故事阅读 66,835评论 6 388
  • 文/花漫 我一把揭开白布。 她就那样静静地躺着,像睡着了一般。 火红的嫁衣衬着肌肤如雪。 梳的纹丝不乱的头发上,一...
    开封第一讲书人阅读 50,799评论 1 294
  • 那天,我揣着相机与录音,去河边找鬼。 笑死,一个胖子当着我的面吹牛,可吹牛的内容都是我干的。 我是一名探鬼主播,决...
    沈念sama阅读 39,768评论 3 416
  • 文/苍兰香墨 我猛地睁开眼,长吁一口气:“原来是场噩梦啊……” “哼!你这毒妇竟也来了?” 一声冷哼从身侧响起,我...
    开封第一讲书人阅读 38,544评论 0 271
  • 序言:老挝万荣一对情侣失踪,失踪者是张志新(化名)和其女友刘颖,没想到半个月后,有当地人在树林里发现了一具尸体,经...
    沈念sama阅读 44,979评论 1 308
  • 正文 独居荒郊野岭守林人离奇死亡,尸身上长有42处带血的脓包…… 初始之章·张勋 以下内容为张勋视角 年9月15日...
    茶点故事阅读 37,271评论 2 331
  • 正文 我和宋清朗相恋三年,在试婚纱的时候发现自己被绿了。 大学时的朋友给我发了我未婚夫和他白月光在一起吃饭的照片。...
    茶点故事阅读 39,427评论 1 345
  • 序言:一个原本活蹦乱跳的男人离奇死亡,死状恐怖,灵堂内的尸体忽然破棺而出,到底是诈尸还是另有隐情,我是刑警宁泽,带...
    沈念sama阅读 35,121评论 5 340
  • 正文 年R本政府宣布,位于F岛的核电站,受9级特大地震影响,放射性物质发生泄漏。R本人自食恶果不足惜,却给世界环境...
    茶点故事阅读 40,756评论 3 324
  • 文/蒙蒙 一、第九天 我趴在偏房一处隐蔽的房顶上张望。 院中可真热闹,春花似锦、人声如沸。这庄子的主人今日做“春日...
    开封第一讲书人阅读 31,375评论 0 21
  • 文/苍兰香墨 我抬头看了看天上的太阳。三九已至,却和暖如春,着一层夹袄步出监牢的瞬间,已是汗流浃背。 一阵脚步声响...
    开封第一讲书人阅读 32,579评论 1 268
  • 我被黑心中介骗来泰国打工, 没想到刚下飞机就差点儿被人妖公主榨干…… 1. 我叫王不留,地道东北人。 一个月前我还...
    沈念sama阅读 47,410评论 2 368
  • 正文 我出身青楼,却偏偏与公主长得像,于是被迫代替她去往敌国和亲。 传闻我的和亲对象是个残疾皇子,可洞房花烛夜当晚...
    茶点故事阅读 44,315评论 2 352

推荐阅读更多精彩内容