Jump to content

cctv_007

Members
  • Content Count

    47
  • Joined

  • Last visited

  • Days Won

    2

Posts posted by cctv_007


  1. Here is the simplest way I know to-date to load the newest firmware on IPC-HFW4300S-V2 and other Chinese Dahua cameras ordered on AliExpress.... I'm still working on a permanent fix, but I've had many emails about this so I thought I'd post a quick update.

     

    1. Use the config tool or web UI to load the newest firmware (General_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0005.0.R.20141205.bin)

    2. Your camera will appear bricked (no web ui) but the only issue preventing it from working is the language settings (which prevents sonia from loading)

    3. Login into the camera with Telnet (user: admin / password: 7ujMko0{web ui password}

    4. You will need to perform a few edits, so you need to make mounts read/write

    \> mount -o remount rw /usr

    \> mount -o remount rw /mnt/custom

     

    5. Rename files

    \> mv /usr/data/Strings/English.txt /usr/data/Strings/SimpChinese.txt

    \> mv /mnt/custom/English.txt /mnt/custom/SimpChinese.txt

     

    6. Edit files with vi ---> /usr/data/Strings/i18n & /mnt/custom/i18n. Change the following:

     

    "DefaultLanguage" : "English", ------> SimpChinese

    "DefaultVideoStandard" : "NTSC",

    "DevStringFiles" : [ "StringsEn.txt" ],

    "HTMLStringFiles" : [ "webEN.json" ],

    "Languages" : [ "English" ], ------> SimpChinese

    "VideoStandards" : [ "NTSC" ],

    "WebStringFiles" : [ "webEN.lang" ]

     

    (Tips for using vi: press "i" for insert then ESC when done editing, then type :w to write then type :q! to exit)

     

    type reboot to restart the camera and you will have a working New English firmware. These changes will need to be repeated if you upgrade to another firmware since these partitions are erased an re-flashed during an upgrade.

     

    I'm really trying to get to the root cause of why the camera seems hard-coded to Chinese and I will update as I uncover more information.

     

    Thanks,

    Rob


  2. Can anyone with an IPC-HFW4300S, please do me a favor and telnet into the camera and share past the output of 'cat /proc/dahua/bootpara' for me?

     

    the HWID has the firmware version number in the string and I'm wondering what other people have for that environment variable. I'm doing some research on this since it appears to have some bearing on the camera not taking some of the newer firmware files.

     

    1. Telnet into the camera username:admin password 7ujMko0{web UI password}

    2. Run 'cat /proc/dahua/bootpara'

    3. Copy the output in a post along with your current firmware version and date.

     

     

     

    Please share!

     

    Thanks,

    Rob

    Putty-007.jpg.ff408840c7c722ad5b6847174a4da68e.jpg


  3. Hi everyone, I could use some help. I want to know a few things and I saw that most of you here know what you are talking about, So I wanted to join so I could ask some pro's about this.

     

    #1: I would like to outfit my home in some IP cameras.. I would need about 8-12 of them, Which ones would be best to use? I want them to be HD, Atleast 30Fps, Have good sound to be able to hear what is going on in the room(I don't need one that is 2 way, Just one that has a good mic). Price wise, Probably around $4k for the complete set-up would be at my limit.

     

    Thanks for any and all help you can give.

     

     

     

    It's already been done... It's called Big Brother.

     

     

     

    That's not a very helpful answer... This is serious, Not some stupid "Reality" TV show... Not trying to be an a-hole or anything, I just want some serious answers as to if this could be done by a person, Not some multi-billion dollar company.

     

    No ill will intended. I was just making a joke! Sure it's possible, but there are some serious considerations that would kill your budget not the least of which is internet bandwidth.


  4. Hi everyone, I could use some help. I want to know a few things and I saw that most of you here know what you are talking about, So I wanted to join so I could ask some pro's about this.

     

    #1: I would like to outfit my home in some IP cameras.. I would need about 8-12 of them, Which ones would be best to use? I want them to be HD, Atleast 30Fps, Have good sound to be able to hear what is going on in the room(I don't need one that is 2 way, Just one that has a good mic). Price wise, Probably around $4k for the complete set-up would be at my limit.

     

    #2: I would like them to be set-up through a router without the need for a computer to be hooked up to them if possible. Any suggestions on that?

     

    #3: I would like to have them set-up on a website so that anyone can view them, Not just me, But anyone who goes to the site. These will be on for a minimum of 1 year at all times, Possibly being watched by thousands of people at once. Can this be done?

     

    #4: I have no knowledge of HTML or any kind of coding what-so-ever, Could I have someone build a site for me that could handle all of this?

     

    Thanks for any and all help you can give.

     

     

     

    It's already been done... It's called Big Brother....or The Sureal Life


  5. You can telnet into the camera and there are number of useful binaries in the user shell that can help correct and diagnose some of the problems people are experiencing.

     

    There is a command to reset all the parameters back to factory defaults (username, password, ip address back to 192.168.1.108 etc.) This can be accomplished with /sbin/clearparam.

     

    This is the same as the defaults button.


  6. Here is the serial output from the U-Boot process. As you can see the TFTP process looks for a file called upgrade_info_7db780a713a4.txt When it reads the contents it's looking for a "Magic String". With this string, I suspect another TFTP process would then load the firmware files thus allowing a bare metal install of the firmware. When I get some time I'll work on trying to extract this info from the u-boot partition.

     

     

     

    At first boot, you have a second to interrupt the boot process and jump to the command line. You need to press and hold the * key (the one on the number pad) to interrupt the boot process.

     

     

     

    From there you can run >printenv to get a look at the env variables

     

     

     

    What's interesting on this particular camera is that the server IPs are all set including variables for autolip and autosip (which are likely tied to the TFTP recovery process and magic string)

     

     

    The HWID string is used during process to validate that the firmware is compatible.

     

    Also interesting are all the variables used to load various parts of the firmware.

     

    da=tftp 0xc2000000 dhboot.bin.img; flwrite; tftp dhboot-min.bin.img;nand protect off;flwrite;nand pro t on

    dr=tftp 0xc2000000 romfs-x.ubifs.img; flwrite

    dk=tftp 0xc2000000 kernel.img; flwrite

    du=tftp 0xc2000000 user-x.ubifs.img; flwrite

    dw=tftp 0xc2000000 web-x.ubifs.img; flwrite

    ds=tftp 0xc2000000 dsp-x.ubifs.img; flwrite

    dc=tftp 0xc2000000 custom-x.ubifs.img; flwrite

    dt=tftp 0xc2000000 data-x.ubifs.img; flwrite

    df=tftp 0xc2000000 fpga.img; flwrite

    up=tftp 0xc2000000 update.img; flwrite

    tk=tftp 0xc2000000 uImage; bootm

     

    You can execute the command run up which will tftp update.img from your serverip address specified in the env variables. You can also load individual files. I've successfully loaded firmware with this method and will post screen prints of the process later.

     

    Here, you can also modify the kernel boot arguments, as well as see which address space the boot command loads from.

    Putty-001.jpg.3fa267cb5efebef14047f4101e9fe013.jpg

    Putty-002.jpg.5acc7f1cc1ba1086ba5cc72ee7eb113d.jpg

    Putty-003.jpg.87741dfc35eabc1c62eddc8d3374c2b4.jpg


  7. Starting to document the U-Boot environment and the Serial interfaces on the various cameras. Using a USB to TLL interface,, you can connect to the cameras and use the TFTP process to load partition images files or upgrade.img to load firmware to the camera. You need only connect the TX, RX and GND connections to communicate with the serial interface. The serial config is 115200, 8, N, 1, N.

     

    Here is the serial interface on the IPC-HFW4300S. It seems they opted to leave out a built in connector. I suspect this is because of the new TFTP recovery process with the Magic string.

     

     

     

     

    I'll post the photos of the other cameras with the pin-outs once I get around to snapping some pictures.

    2131749262_SerialIPC-HFW4300S.thumb.jpg.be1ccdddd8f1d28ada53fd7232e40035.jpg


  8. I am starting this thread to capture a bunch of information in one spot to assist those with "bricked" cameras due failed firmware upgrades. I bought my first Dahua IP camera just a couple weeks ago. I was impressed & pretty happy with it, but upon reading about new capabilities in newer firmware, I decided to upgrade it. Then like many others on here, I lost access to the Web GUI and the camera was no longer functioning. I spent the last two weeks getting to know everything about these cameras and this thread will capture all this information. It will take me several weeks to document all the information so please be patient.

     

    There are a variety of problems that I will try my best to explain and share the possible solutions. I have gotten pretty comfortable with these cameras and have purposely bricked them to various degrees of severity just to validate the recovery process. Most people "brick" their cameras trying to upgrade the firmware. This is not a serious issue and it can be corrected very easily. The camera runs an upgrade service on port 3800. The configTool always shows a default port of 37777 but this is not an issue as it can do the upgrade on port 3800 anyway. Change your port to 3800 and use a firmware file lsted below and you are back in business.

     

    I will keep updating this post as I get more time to write all the details around recovery. I will also post links to over 40+ firmware files that and which cameras they will work with. It will take me a bit of time to capture all this information, so please be patient.

     

     

     

    BRICKED CAMERA? How can you tell?

     

    There are several types of "BRICKED" camera conditions and they have varying levels of severity and also varying levels of complexity for recovery. Most are simple and caused by bad firmware uploads. The worst will require a full rebuild of the partitions which load the kernel, software and all other data.

     

    1. The first step in identifying the severity of your issue is to determine what still working on your camera. In order to do that, lets remove as many variables as possible to the troubleshooting process. If possible, connect the camera ethernet and PC ethernet on it's own switch and make sure that no vlan tagging is enabled on the switch.

     

    Next, you need to figure out if the IP address is still reacheable. Ping the last known ip address. The default address for most cameras is 192.168.1.108.

     

    If you don't know it you can use the arp/ping method to configure which adds as startic arp entry to a new ip address. (This feature is enabled on the camera by default)

     

     

    2. Once you have a pingable IP, you need to know what services are still active on the camera. This can be done with a simple port scanner. I have added a link to below in tools.

     

    3. Run the port scanner and record which ports are still open. In many cases port 23 and port 3800 will still be open. If this is your situation, it is a very simple fix. If no ports are open, you will need to do a full image load which is more complex.

     

    The typical ports that you would see are:

     

    23 - Telnet access

    80 - Web User interface

    443 - SSL

    554 - Real time streaming port

    3800 - Upgrade Deamon

    5000 - UPnP

    37777 - TCP Video streaming

    37778 - UDP Video Streaming

    42323 - Real time remote runner

     

    Plus a whole bunch more of UDP ports and more TCP ports

     

     

    REPAIR WITH PORT 3800

     

    Download a step by step guide (DAHUA IP Camera Recovery v1.0.pdf) with screen prints @ http://tinyurl.com/lbl3up7

     

    1A. If port 3800 is open you can connect with the Dahua Config tool (link below in tools). I tdefault to port 37777 but change it to 3800 as this port where the upgrade daemon is listening. Port 37777 is a redirect but it won't work if your firmware has failed.

    Launch the config tool and click on login button. Type the IP address , username and password then port 3800.

     

    Open a know working firmware file and upload to the camera.

     

     

    1B. If port 3800 is not open, go to the next step to enable port 3800.

     

    2. If you have telnet access, you can login with putty. Link to putty below in tools. The default Web UI password is admin / admin.

     

    In older firmware the telnet account is root / vizxv

    In newer firmware the telnet account is admin / 7ujMko0+"web UI password" ---> 7ujmko0admin

     

     

    Once connected you can execute a ps command to see running processes. /usr/sbin/upgraded process is what listens on port 3800 for the firmware binary file.

    There is also another copy in /var/tmp/

     

    A useful tip for watching the upgrade process is to kill the "upgraded" process that is running and re-launch it in the foreground to watch the upgrade.

     

    ~#>ps

     

    625 root 0:00 [mtdblock3]

    630 root 0:00 [mtdblock4]

    635 root 0:00 [mtdblock5]

    772 root 0:00 [ubi_bgt7d]

    776 root 0:00 [ubifs_bgt7_0]

    790 root 0:00 /sbin/telnetd

    798 root 0:00 [OSA_796_1]

    860 root 0:00 syshelper elper 60

    861 root 0:00 /usr/sbin/upgraded

    869 root 0:00 [dsplogd]

    870 root 0:00 [encode_guard]

    889 root 0:00 [flush-ubifs_6_0]

    923 root 3:29 ./VideoDaemon AEWB AF TVOUT

     

    ~#> kill -9 861

    ~#> /usr/sbin/upgraded

     

    [OSA-APP] OSA Build on Apr 19 2014 at 09:55:50.

    [OSA-APP] SVN NUM: 1609.

     

    [libpdi] libpdi.so Build on Apr 19 2014 at 10:06:34.

    [libpdi] SVN NUM: 13790.

    [libpdi] Flashtype = 4,patSize = 100000,rwSize = 800,ersSize = 20000

    22:52:46|[crypt] crypt_open ok!

    Name: upgraded, bulid date: Apr 19 2014 09:17:58, svn: 255

    [libpdi] >-------getSystemInfo------->

    Fail to get env authcode!

    [libpdi] Get authcode error

    @@@@ buf = PZC4MU056W00XXX

    22:52:52|[pdc] WARN (MISC_ioctl|493): Get SdCard cfg failed !

    [libpdi] deviceType: IPC-HFW4300S-V2

    [libpdi] processor: A5S88

    [libpdi] hardwareVersion: 1.00

    [libpdi] appAutoStart: 1

    [libpdi] serialNumber: PZC4MU056W00XXX

    [libpdi] processorCount: 1

    [libpdi] deviceClass: IPC

    [libpdi] noPtz: 1

    [libpdi] noSdCard: 1

    [libpdi] bandWidth: 48

    [libpdi] <-------getSystemInfo-------<

    UPGRADED_MSG: Can't Open /mnt/mtd/Config/passwd

    UPGRADED_MSG: Login success!

    UPGRADED_MSG: Kill 976 successful

    [libpdi] Read: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: 0

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A4(alarm)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A1(alive package)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Received : 29868252, FileSize : 29868252

    UPGRADED_MSG: Download Complete

    UPGRADED_MSG: DoDownLoad success!

    UPGRADED_MSG: Flash init success

    UPGRADED_MSG: hwid file success!

    Fail to get env native!

    UPGRADED_ERR: LINE: 1074: invalid file: Install.lua

    UPGRADED_MSG: zip file total size: 40900220

    [libpdi] >-------getSystemInfo------->

    Fail to get env authcode!

    [libpdi] Get authcode error

    @@@@ buf = PZC4MU056W00XXX

    22:53:10|[pdc] WARN (MISC_ioctl|493): Get SdCard cfg failed !

    [libpdi] deviceType: IPC-HFW4300S-V2

    [libpdi] processor: A5S88

    [libpdi] hardwareVersion: 1.00

    [libpdi] appAutoStart: 1

    [libpdi] serialNumber: PZC4MU056W00XXX

    [libpdi] processorCount: 1

    [libpdi] deviceClass: IPC

    [libpdi] noPtz: 1

    [libpdi] noSdCard: 1

    [libpdi] bandWidth: 48

    [libpdi] <-------getSystemInfo-------<

    UPGRADED_MSG: packet.name: SD6XXX, board.name: IPC-HFW4300S-V2

    UPGRADED_MSG: packet.hardver: , board.hardver:

    UPGRADED_MSG: packet.name: IPC-HX3XXX, board.name: IPC-HFW4300S-V2

    UPGRADED_MSG: packet.hardver: , board.hardver:

    UPGRADED_MSG: Verify version success

     

    Header CRC Checking ... OK

    Image Name: kernel.img

    Image Type: kernel.img (gzip compressed)

    Data Size: 2546876 B, Bytes = 2.43 MB

    Load Address: 0XC80000

    Data CRC Checking ... OK

    Programing start at: 0XC80000

     

    [libpdi] write update Flag

    [libpdi] Read: blkIndex: 0,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 0,pageIndex: 0,byteIndex: 0 ,fLag: 55

    [libpdi] Flash_createPartionTab:6

    [libpdi] Erase Partion: 6

    [libpdi] FlashErase: addr= 0x0xc80000,blkNum:44, blkSize:0x20000,len:0x580000

    <5>UBIFS: un-mount UBI device 2, volume 0

    <5>UBIFS: un-mount UBI device 4, volume 0

    Upgrade : Complete Total 6%...

    Header CRC Checking ... OK

    Image Name: partition-x.cramfs.img

    Image Type: partition-x.cramfs.img (gzip compressed)

    Data Size: 4160 B, Bytes = 0.00 MB

    Load Address: 0X500000

    Data CRC Checking ... OK

    Programing start at: 0X500000

     

    [libpdi] Flash_createPartionTab:3

    [libpdi] Erase Partion: 3

    [libpdi] FlashErase: addr= 0x0x500000,blkNum:8, blkSize:0x20000,len:0x100000

    Upgrade : Complete Total 6%...

    Header CRC Checking ... OK

    Image Name: romfs-x.ubifs.img

    Image Type: romfs-x.ubifs.img (gzip compressed)

    Data Size: 7340096 B, Bytes = 7.00 MB

    Load Address: 0X1200000

    Data CRC Checking ... OK

    Programing start at: 0X1200000

     

    [libpdi] Flash_createPartionTab:7

    [libpdi] Erase Partion: 7

    [libpdi] FlashErase: addr= 0x0x1200000,blkNum:64, blkSize:0x20000,len:0x800000

    Upgrade : Complete Total 24%...

    Header CRC Checking ... OK

    Image Name: pd-x.ubifs.img

    Image Type: pd-x.ubifs.img (gzip compressed)

    Data Size: 1966144 B, Bytes = 1.88 MB

    Load Address: 0X940000

    Data CRC Checking ... OK

    Programing start at: 0X940000

     

    [libpdi] Flash_createPartionTab:5

    [libpdi] Erase Partion: 5

    [libpdi] FlashErase: addr= 0x0x940000,blkNum:26, blkSize:0x20000,len:0x340000

    Upgrade : Complete Total 28%...

    Header CRC Checking ... OK

    Image Name: user-x.ubifs.img

    Image Type: user-x.ubifs.img (gzip compressed)

    Data Size: 21233728 B, Bytes = 20.25 MB

    Load Address: 0X2200000

    Data CRC Checking ... OK

    Programing start at: 0X2200000

     

    [libpdi] Flash_createPartionTab:9

    [libpdi] Erase Partion: 9

    [libpdi] FlashErase: addr= 0x0x2200000,blkNum:204, blkSize:0x20000,len:0x1980000

    Upgrade : Complete Total 80%...

    Header CRC Checking ... OK

    Image Name: custom-x.ubifs.img

    Image Type: custom-x.ubifs.img (gzip compressed)

    Data Size: 1966144 B, Bytes = 1.88 MB

    Load Address: 0X600000

    Data CRC Checking ... OK

    Programing start at: 0X600000

     

    [libpdi] Flash_createPartionTab:4

    [libpdi] Erase Partion: 4

    [libpdi] FlashErase: addr= 0x0x600000,blkNum:26, blkSize:0x20000,len:0x340000

    Upgrade : Complete Total 85%...

    Header CRC Checking ... OK

    Image Name: web-x.ubifs.img

    Image Type: web-x.ubifs.img (gzip compressed)

    Data Size: 5505088 B, Bytes = 5.25 MB

    Load Address: 0X1A00000

    Data CRC Checking ... OK

    Programing start at: 0X1A00000

     

    [libpdi] Flash_createPartionTab:8

    [libpdi] Erase Partion: 8

    [libpdi] FlashErase: addr= 0x0x1a00000,blkNum:64, blkSize:0x20000,len:0x800000

    Upgrade : Complete Total 99%... [libpdi] Read: blkIndex: 0,pageIndex: 1,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 0,pageIndex: 1,byteIndex: 0 ,fLag: aa

    Upgrade : Complete Total 100%... UPGRADED_MSG: will reboot system

    [libpdi] rebootSystem: i will reboot

    [libpdi] Read: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: 0

    [libpdi] pdi:system will reboot!!

     

    Here you can see each partition being loaded wit the individual img files. I will write a quick how to on loading each one individually at a later time.

     

    If you chose a valid firmware file, you will be back in working order. If you still have problems, repeat with another firmware file till you have a valid file. The IPC-HFW4300S-V2 is not natively compatible with all other 4300S firmware. I am in the process of writing a how to that explains how to over come this issue.

     

    UNBRICK WITH UBOOT via SERIAL

     

    NOTE: This section is coming soon... I'm gathering all the images I need for various camera types

     

     

     

    OTHER USEFUL INFORMATION (to be sorted later)

     

    The firmware consists of several images that are loaded into various partitions in flash in a UBI file system. You can load each partition separately if needed. More on this later.... (I'll put a guide together on flashing and recovering partitions)

     

    Once you telnet into the camera, there are number of useful binaries in the user shell that can help correct and diagnose some of the problems people are experiencing. One of the helpful steps is to kill the /var/tmp/upgraded process and run it in the foreground so you can see what is going on and easily capture error messaged. The /var/tmp/upgraded process is what opens the port 3800 and allows you to connect to the camera with the config tool if your web services have failed. There is also another copy in usr/sbin/.

     

    Also, in there is a command to reset all the parameters back to factory defaults (username, password, ip address back to 192.168.1.108 etc.) This can be accomplished with /sbin/clearparam.

     

    Another issue that people run into is the constant reboot issue. This can be caused by a failed process. The main application which provides all the camera capabilities (web interface, streaming, etc.) is /usr/bin/sonia. This process is what makes most firmware different from version to version (sort of). There are also changes to the web partition which contains the web server pages that /usr/bin sonia hosts on port 80. The sonia process is invoked by a shell script in init.d and if the process is killed, the camera reboots after a few minutes. This has cause many people issues when trying to "unbrick" the camera since you only have a few minutes between reboots.

     

    To stop the reboots you can update the flash. There is a parameter called appauto that tells the camera to auto start /us/bin/sonia. If you want the camera to start and not invoke the shell script that launches sonia, you need to set appauto to 0. This will stop the camera from rebooting when sonia is not running. This cam be accomplished by running '/sbin/appauto 0'. To turn it back on, just run /sbin/appauto 1. This writes the boot parameter in flash that the kernel reads before starting the process. You can check the current status of the appauto bootparameter with 'cat /proc/dahua/bootpara' It will only show what the parameter was when you booted up, so if you changes it you need to reboot to see the change in /proc/dahua/bootpara.

     

    Realtime streaming URL - rtsp://192.168.1.108/cam/realmonitor?channel=1&subtype=0&proto=Onvif

    You can change the subtype to 1 for the secondary stream also you can add user:password@ in front of the IP address if you have the permissions set requiring it.

     

    You can use the HTTP API to configure some parameters that are not yet in the web UI. For instance, another member discovered he could enable NFS through the web UI in addition to the local SD card. This config is not possible through the web interface as you need to pick one or the other.

    These documents details the API of Dahua video products (links provided to some of the versions below). Programmers or users can access and configure Dahua video products through the API. Every setting of the camera is available through the API whereas only a small number are available through the WEB interface. The document with version 1.10 is available with firmware version 2.0 and above. This document with version 1.20, 1.21, 1.22, 1.23,1.24,1,25,1,26,1,27,1,28 is available with firmware 2.210 and above.This document with version 1. 29 ,1.30, 1.31, 1.32, 1.33, 1.34, 1.35,

    1.36 is available with firmware 2.210 and above.This document with version 1.37 is available with firmware 2.212, 2.4 and above.

     

    I have also done a bit of testing around the tftp process that is invoked in u-boot that looks for upgrade_info_7db780a713a4.txt and failed.txt. I think with a little more work, I'll figure out if there is a recovery method using tftp without serial access. This would be necessary if you lose telnet access and need to rebuild the kernel partition that hosts telnetd.

     

     

     

    Tools

     

    DAHUA IP Camera Recovery v1.0.pdf....................... http://tinyurl.com/lbl3up7

    Port Scanner .................................................. http://tinyurl.com/q53pojg

    Putty .............................................................. http://tinyurl.com/lvbbmsq

    Tftp Server ..................................................... http://tinyurl.com/m46wnhe

     

     

    Dahua Docs & Tools

     

    DAHUA_HTTP_API 1.0 .pdf ................................................ http://tinyurl.com/lb43lga

    DAHUA_HTTP_API_1.23.pdf ................................................ http://tinyurl.com/lrwye3k

    DAHUA_HTTP_API_FOR_IPC 1.28.pdf ........................................ http://tinyurl.com/kskrcay

    DAHUA_HTTP_API_FOR_IPC&SD-V1.36.pdf .................................... http://tinyurl.com/mooccf9

    DAHUA_HTTP_API_FOR_IPC&SD-V1.37.pdf .................................... http://tinyurl.com/kvyddfp

    DAHUA_HTTP_API_FOR_DVR_V1.29.pdf ....................................... http://tinyurl.com/klc72tr

     

    General_ConfigTool_Eng_V1.0.5.R.120428.zip ........................ http://tinyurl.com/mwlzbb3

    General_ConfigTool_Eng_V1.06.1.T.120807.zip ........................ http://tinyurl.com/leudphu

    General_ConfigTool_Eng_V1.07.2.R.130304.zip ....................... http://tinyurl.com/obs5ud7

    General_ConfigTool_Eng_V1.07.3.R.130701.zip ....................... http://tinyurl.com/o6p628f <---- Use this one

    General_ConfigTool_Eng_V2.00.0.R.140410.zip ........................ http://tinyurl.com/nbqtgev

     

     

    Firmware Files

     

    Firmware files are grouped by camera type and video signal (NTSC --> Eng_N / PAL --> Eng_P / or BOTH --> Eng_NP)

    Files are ordered by version number with the latest Firmware in blue.

    Files with DH_ prefix are DAHUA direct firmware files and those with General_ prefix are general release for OEM cameras but I've had good luck with both.

     

     

    DH_IPC-HX1100_Eng_NP_V2.210.0000.3.R.20140416.bin .................................................. http://tinyurl.com/m2jf3qv

     

     

    General_IPC-HX3(2)XXX_Eng_N_V2.210.0001.0.R.20130517.bin ............................................... http://tinyurl.com/q98zg9x

    General_IPC-HX3(2)XXX_Eng_P_V2.210.0001.0.R.20130517.bin ................................................ http://tinyurl.com/nekapn3

    General_IPC-HX3(2)XXX_Eng_NP_V2.210.0001.0.R.20130517.bin ............................................. http://tinyurl.com/p59ym6z

    General_IPC-HX3(2)XXX_Eng_P_V2.211.0000.0.R.20130726.bin ................................................ http://tinyurl.com/my54r9z

    General_IPC-HX3(2)XXX_Eng_N_V2.212.0000.0.R.20131206.bin ............................................... http://tinyurl.com/lrvtm2z

    General_IPC-HX3(2)XXX_Eng_P_V2.212.0000.0.R.20131206.bin ................................................ http://tinyurl.com/n9rv23n

    General_IPC-HX3(2)XXX_Eng_N_V2.212.0001.0.R.20131224.bin ............................................... http://tinyurl.com/l5kg2d9

    General_IPC-HX3(2)XXX_Eng_P_V2.212.0001.0.R.20131224.bin ................................................ http://tinyurl.com/q6c2gox

    DH_IPC-HX3(2)XXX_Eng_NP_8M_V2.212.0000.4.R.20140307.bin ............................................... http://tinyurl.com/mnzx33h

    DH_IPC-HX3(2)XXX_Eng_NP_8M_V2.212.0000.5.R.20140326.bin ............................................... http://tinyurl.com/ke285w5

    DH_IPC-HX3(2)XXX_Eng_NP_8M_V2.212.0000.6.R.20140419.bin ............................................... http://tinyurl.com/mllzcox

    General_IPC-HX3(2)XXX_Eng_P_V2.420.0000.0.R.20140414.bin ................................................ http://tinyurl.com/nftaogy

    DH_IPC-HX3(2)XXX_Eng_N_V2.420.0000.0.R.20140414.bin .................................................... http://tinyurl.com/ma5q64d

     

     

    General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.2.R.20130821.bin ................................................. http://tinyurl.com/pdcdmdk

    General_IPC-HX5(4)XXX_Eng_N_V2.210.0000.4.R.20130911.bin ........................................................ http://tinyurl.com/pdoxjzj

    General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.9.R.20131217.bin ........................................................ http://tinyurl.com/p3g4t54

    General_IPC-HX5(4)XXX_Eng_N_V2.210.0000.10.R.20140111.bin ...................................................... http://tinyurl.com/mnjpd79

    General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.12.R.20140225.bin ...................................................... http://tinyurl.com/nssnph6

    DH_IPC-HX5(4)XXX_Eng_NP_V2.210.0000.12.R.20140225.bin ..................................................... http://tinyurl.com/lcjr8xv

    DH_IPC-HX5(4)XXX_Eng_NP_V2.210.0000.16.R.20140421.bin ..................................................... http://tinyurl.com/k67gu9u

    DH_IPC-HX5(4)XXX_Eng_NP_V2.210.0000.18.R.20140429.bin .................................................... http://tinyurl.com/n779scx

    General_IPC-HX5(4)XXX_Eng_N_V2.210.0000.21.R.20140613.bin ...................................................... http://tinyurl.com/qd2thhe

    General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.21.R.20140613.bin ...................................................... http://tinyurl.com/p8q75b4

    General_IPC-HX5(4)XXX_Eng_N_V2.400.0000.0.R.20131231.bin ........................................................ http://tinyurl.com/kmd7hu9

    DH_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0000.0.R.20140419.bin .................................................. http://tinyurl.com/mb75g2n

    DH_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0002.0.R.20140621.bin ............................................ http://tinyurl.com/laj29k5

    General_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0000.0.R.20140419.bin ......................................... http://tinyurl.com/mzw85fz

    General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0000.0.R.20140419.bin ......................................... http://tinyurl.com/ov6krph

    General_IPC-HX5(4)XXX_Eng_P_Stream3_P2P_V2.420.0000.0.R.20140419.bin ................................. http://tinyurl.com/oxgblkq

    General_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0002.0.R.20140621.bin ......................................... http://tinyurl.com/kejg3fv

    General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0002.0.R.20140621.bin ......................................... http://tinyurl.com/pfmevdu

    General_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0003.0.R.20140930.bin ............................................... http://tinyurl.com/kchslos

    General_IPC-HX5(4)XXX_Eng_N_V2.420.0003.0.R.20140930.bin ........................................................ http://tinyurl.com/ok4f8fx

    General_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0005.0.R.20141205.bin .............................................. http://tinyurl.com/qbrfg3k

    General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0005.0.R.20141205.bin ......................................... http://tinyurl.com/ot99vgw

     

     

    DH_IPC-HX8XXX_Eng_NP_V2.400.0000.2.R.20140506.bin .......................................................... http://tinyurl.com/lbar98x

     

     

     

    I will also post the bare metal img files when I get some time which contain the firmware and all the img files including the update.img that can be used for serial recovery.

     

    I have just started the process of uploading firmware... There are much more to come as well as many more camera models.

    Also if you have any you want to share please PM me what you have and where I can link them to this thread.

     

    Thanks to Euly for sharing firmware files!

     

    ___________________________________

     

    IMPORTANT NOTE FOR IPC-HFW4300S-V2 CAMERAS

     

    The new camera appears to have differences (a few that I already found) that makes some of the general firmware incompatible with them. I have found a workaround, but it is complex. I will try to summarize it in a separate thread in the following weeks. I will also repackage the newest firmware files in versions that will work for the V2 cameras. Stay tuned! In the meantime, you can use General_IPC-HX5(4)XXX_Eng_N_V2.210.0000.21.R.20140613.bin or the PAL equivalent to recover your camera.

     

     

    Well, that's all I have time to share for now, but I'll do my best to put together a comprehensive guide to the inner workings of these cameras and a guide to unbrick in any failed software situation.

     

    Thanks and take care.

     

    Rob

    • Like 1
    • Thanks 2
    • Confused 1

  9. My camera ipc-hfw4300s-v2 was brick of wrong firmware.

    Could you please speak more specific?

    Because i don't have rs232 cable.

     

    To begin with, in any case you have to disassemble the IPC

    Adapter and the cable connected to the PC, you need to control.

    You should have two buttons, one reset, the other magic !!!

    In 4100 series it's present in 4300 it's should be!

     

     

     

     

    There is no reset switch in the IPC-HFW4300S and V2.


  10. There appears to be a TFTP process built in to the u-boot that looks for a specific file upgrade_info_7db780a713a4.txt that may be another way of restoring without serial.

     

    That looks like a MAC address in the txt file.

     

     

    Yes, but it's arbitrary. This is just a filename that Tftp looks for during uboot. I am doing some testing as I believe this can bu used to load upgrade.img through tftp. THis would allow unbricking a camera even if telnet is lost.

     

    I'll update in a couple weeks once I have it all sorted out.


  11. FYI. Here is some information that can hopefully assist someone else in recovering their failed camera.

     

     

    This information is all related to my IPC-HFW4300S-V2. I will write a longer post that describes the differences with other Dahua cameras in a couple weeks when I have had time to compile a detailed list. I also have IPC-HDBW2200E, IPC-HFW2200S and IPC-HFW3300C cameras that I will test with.

     

    The firmware consists of several images that are loaded into various partitions in flash in a UBI file system. You can load each partition separately if needed. More on this later.... (I'll put a guide together on flashing and recovering partitions)

     

    Once you telnet into the camera, there are number of useful binaries in the user shell that can help correct and diagnose some of the problems people are experiencing. One of the helpful steps is to kill the /var/tmp/upgraded process and run it in the foreground so you can see what is going on and easily capture error messaged. The /var/tmp/upgraded process is what opens the port 3800 and allows you to connect to the camera with the config tool if your web services have failed. There is also another copy in usr/sbin/.

     

    Also, in there is a command to reset all the parameters back to factory defaults (username, password, ip address back to 192.168.1.108 etc.) This can be accomplished with /sbin/clearparam.

     

    Another issue that people run into is the constant reboot issue. This can be caused by a failed process. The main application which provides all the camera capabilities (web interface, streaming, etc.) is /usr/bin/sonia. This process is what makes most firmware different from version to version (sort of). There are also changes to the web partition which contains the web server pages that /usr/bin sonia hosts on port 80. The sonia process is invoked by a shell script in init.d and if the process is killed, the camera reboots after a few minutes. Ths has cause many people issues when trying to unbrick the camera since you only have a few minutes between reboots.

     

    To stop the reboots you can update the flash. There is a parameter called appauto that tells the camera to auto start /us/bin/sonia. If you want the camera to start and not invoke the shell script that launches sonia, you need to set appauto to 0. This will stop the camera from rebooting when sonia is not running. This cam be accomplished by running '/sbin/appauto 0'. To turn it back on, just run /sbin/appauto 1. This writes the boot parameter in flash that the kernel reads before starting the process. You can check the current status of the appauto bootparameter with 'cat /proc/dahua/bootpara' It will only show what the parameter was when you booted up, so if you changes it you need to reboot to see the change in /proc/dahua/bootpara.

     

    I have also done a bit of testing around the tftp process that is invoked in u-boot that looks for upgrade_info_7db780a713a4.txt and failed.txt. I think with a little more work, I'll figure out if there is a recovery method using tftp without serial access. This would be necessary if you lose telnet access and need to rebuild the kernel partition that hosts telnetd.

     

    Well, that's all I have time to share for now, but I'll do my best to put together a comprehensive guide to the inner workings of these cameras and a guide to unbrick in any failed software situation.

     

    I will also post links to the 15-20 firmware files that I have collected.

     

    Thanks and take care.

     

    Rob


  12. That is supposed to be true, but I know for a fact, that the firmware check does not always work. The firmware for IPC-HX3XXX will pass checks for some versions. I have made this mistake before, but have corrected it by using the config tool on port 3800 and reloading the correct firmware. for whatever reason, this time, it won't work.

     

    On to the task at hand....What options do I have for recovery?


  13. I haven't tried to restore to factory with the serial yet. I don't have a cable yet, but will track one down soon. Is there another way to restore?

     

     

    I was attempting to update to the newest firmware to add NAS support. I should have used General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0005.0.R.20141205.bin, but somehow I chose the wrong file. I think I may have used a firmware meant for my 3300 series camera. Now the camera only has port 23 - (telnetd) and port 3800 - (upgraded) open. Normally connecting with the config tool to port 3800 and sending a new firmware should work, but in this case, it does not correct the issue. The camera reboots after update back with only port 23 and port 3800 open.

     

    I'm familiar enough with U-Boot, busybox, and linux to see some of what is going on here but I have just begun to try to resolve it. There appears to be a TFTP process built in to the u-boot that looks for a specific file upgrade_info_7db780a713a4.txt that may be another way of restoring without serial.

     

    Like I mentioned, I just started trying to fix this issue and I am just starting to see how this camera works on the inside.

     

    Any help to get it working would be appreciated.

     

    Thanks,

    Rob


  14. I have done more digging into the issue. Here is the output of /var/tmp/upgraded while using the config tool to perform the upgrade.

     

    This output is when using firmware DH_IPC-HX5(4)XXX_Eng_N_Stream3_V2.420.0000.0.R.20140419.bin

     

    Everything looks like it worked but there are a couple issues. I've highlighted the errors. Still looking into it, but any thoughts would be appreciated.

     

    Thanks,

    Rob

     

     

    _____________

     

    [OSA-APP] OSA Build on Apr 19 2014 at 09:55:50.

    [OSA-APP] SVN NUM: 1609.

     

    [libpdi] libpdi.so Build on Apr 19 2014 at 10:06:34.

    [libpdi] SVN NUM: 13790.

    [libpdi] Flashtype = 4,patSize = 100000,rwSize = 800,ersSize = 20000

    22:52:46|[crypt] crypt_open ok!

    Name: upgraded, bulid date: Apr 19 2014 09:17:58, svn: 255

    [libpdi] >-------getSystemInfo------->

    Fail to get env authcode!

    [libpdi] Get authcode error

    @@@@ buf = PZC4MU056W00XXX

    22:52:52|[pdc] WARN (MISC_ioctl|493): Get SdCard cfg failed !

    [libpdi] deviceType: IPC-HFW4300S-V2

    [libpdi] processor: A5S88

    [libpdi] hardwareVersion: 1.00

    [libpdi] appAutoStart: 1

    [libpdi] serialNumber: PZC4MU056W00XXX

    [libpdi] processorCount: 1

    [libpdi] deviceClass: IPC

    [libpdi] noPtz: 1

    [libpdi] noSdCard: 1

    [libpdi] bandWidth: 48

    [libpdi] <-------getSystemInfo-------<

    UPGRADED_MSG: Can't Open /mnt/mtd/Config/passwd

    UPGRADED_MSG: Login success!

    UPGRADED_MSG: Kill 976 successful

    [libpdi] Read: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: 0

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A4(alarm)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A1(alive package)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A4(alarm)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A4(alarm)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A4(alarm)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Receive A1(alive package)

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: reset_watchdog

    UPGRADED_MSG: Received : 29868252, FileSize : 29868252

    UPGRADED_MSG: Download Complete

    UPGRADED_MSG: DoDownLoad success!

    UPGRADED_MSG: Flash init success

    UPGRADED_MSG: hwid file success!

    Fail to get env native!

    UPGRADED_ERR: LINE: 1074: invalid file: Install.lua

    UPGRADED_MSG: zip file total size: 40900220

    [libpdi] >-------getSystemInfo------->

    Fail to get env authcode!

    [libpdi] Get authcode error

    @@@@ buf = PZC4MU056W00XXX

    22:53:10|[pdc] WARN (MISC_ioctl|493): Get SdCard cfg failed !

    [libpdi] deviceType: IPC-HFW4300S-V2

    [libpdi] processor: A5S88

    [libpdi] hardwareVersion: 1.00

    [libpdi] appAutoStart: 1

    [libpdi] serialNumber: PZC4MU056W00XXX

    [libpdi] processorCount: 1

    [libpdi] deviceClass: IPC

    [libpdi] noPtz: 1

    [libpdi] noSdCard: 1

    [libpdi] bandWidth: 48

    [libpdi] <-------getSystemInfo-------<

    UPGRADED_MSG: packet.name: SD6XXX, board.name: IPC-HFW4300S-V2

    UPGRADED_MSG: packet.hardver: , board.hardver:

    UPGRADED_MSG: packet.name: IPC-HX3XXX, board.name: IPC-HFW4300S-V2

    UPGRADED_MSG: packet.hardver: , board.hardver:

    UPGRADED_MSG: Verify version success

     

    Header CRC Checking ... OK

    Image Name: kernel.img

    Image Type: kernel.img (gzip compressed)

    Data Size: 2546876 B, Bytes = 2.43 MB

    Load Address: 0XC80000

    Data CRC Checking ... OK

    Programing start at: 0XC80000

     

    [libpdi] write update Flag

    [libpdi] Read: blkIndex: 0,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 0,pageIndex: 0,byteIndex: 0 ,fLag: 55

    [libpdi] Flash_createPartionTab:6

    [libpdi] Erase Partion: 6

    [libpdi] FlashErase: addr= 0x0xc80000,blkNum:44, blkSize:0x20000,len:0x580000

    <5>UBIFS: un-mount UBI device 2, volume 0

    <5>UBIFS: un-mount UBI device 4, volume 0

    Upgrade : Complete Total 6%...

    Header CRC Checking ... OK

    Image Name: partition-x.cramfs.img

    Image Type: partition-x.cramfs.img (gzip compressed)

    Data Size: 4160 B, Bytes = 0.00 MB

    Load Address: 0X500000

    Data CRC Checking ... OK

    Programing start at: 0X500000

     

    [libpdi] Flash_createPartionTab:3

    [libpdi] Erase Partion: 3

    [libpdi] FlashErase: addr= 0x0x500000,blkNum:8, blkSize:0x20000,len:0x100000

    Upgrade : Complete Total 6%...

    Header CRC Checking ... OK

    Image Name: romfs-x.ubifs.img

    Image Type: romfs-x.ubifs.img (gzip compressed)

    Data Size: 7340096 B, Bytes = 7.00 MB

    Load Address: 0X1200000

    Data CRC Checking ... OK

    Programing start at: 0X1200000

     

    [libpdi] Flash_createPartionTab:7

    [libpdi] Erase Partion: 7

    [libpdi] FlashErase: addr= 0x0x1200000,blkNum:64, blkSize:0x20000,len:0x800000

    Upgrade : Complete Total 24%...

    Header CRC Checking ... OK

    Image Name: pd-x.ubifs.img

    Image Type: pd-x.ubifs.img (gzip compressed)

    Data Size: 1966144 B, Bytes = 1.88 MB

    Load Address: 0X940000

    Data CRC Checking ... OK

    Programing start at: 0X940000

     

    [libpdi] Flash_createPartionTab:5

    [libpdi] Erase Partion: 5

    [libpdi] FlashErase: addr= 0x0x940000,blkNum:26, blkSize:0x20000,len:0x340000

    Upgrade : Complete Total 28%...

    Header CRC Checking ... OK

    Image Name: user-x.ubifs.img

    Image Type: user-x.ubifs.img (gzip compressed)

    Data Size: 21233728 B, Bytes = 20.25 MB

    Load Address: 0X2200000

    Data CRC Checking ... OK

    Programing start at: 0X2200000

     

    [libpdi] Flash_createPartionTab:9

    [libpdi] Erase Partion: 9

    [libpdi] FlashErase: addr= 0x0x2200000,blkNum:204, blkSize:0x20000,len:0x1980000

    Upgrade : Complete Total 80%...

    Header CRC Checking ... OK

    Image Name: custom-x.ubifs.img

    Image Type: custom-x.ubifs.img (gzip compressed)

    Data Size: 1966144 B, Bytes = 1.88 MB

    Load Address: 0X600000

    Data CRC Checking ... OK

    Programing start at: 0X600000

     

    [libpdi] Flash_createPartionTab:4

    [libpdi] Erase Partion: 4

    [libpdi] FlashErase: addr= 0x0x600000,blkNum:26, blkSize:0x20000,len:0x340000

    Upgrade : Complete Total 85%...

    Header CRC Checking ... OK

    Image Name: web-x.ubifs.img

    Image Type: web-x.ubifs.img (gzip compressed)

    Data Size: 5505088 B, Bytes = 5.25 MB

    Load Address: 0X1A00000

    Data CRC Checking ... OK

    Programing start at: 0X1A00000

     

    [libpdi] Flash_createPartionTab:8

    [libpdi] Erase Partion: 8

    [libpdi] FlashErase: addr= 0x0x1a00000,blkNum:64, blkSize:0x20000,len:0x800000

    Upgrade : Complete Total 99%... [libpdi] Read: blkIndex: 0,pageIndex: 1,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 0,pageIndex: 1,byteIndex: 0 ,fLag: aa

    Upgrade : Complete Total 100%... UPGRADED_MSG: will reboot system

    [libpdi] rebootSystem: i will reboot

    [libpdi] Read: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: ff

    [libpdi] Write: blkIndex: 1,pageIndex: 0,byteIndex: 0 ,fLag: 0

    [libpdi] pdi:system will reboot!!


  15. I have the same issue.

     

    Where can I get the file.... IPC-HFW4300-V2 General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.11.R.20140115.bin

     

    I have a HFW4300-V2 camera and the only ports open are 23 and 3800. I have tried all the files listed below with no luck.

     

    DH_IPC-HX5(4)XXX_Eng_NP_V2.210.0000.12.R.20140225

    General_IPC-HX5(4)XXX_Eng_P_V2.210.0000.11.R.20140115

    General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0000.0.R.20140419

    General_IPC-HX5(4)XXX_Eng_P_Stream3_V2.420.0005.0.R.20141205

    IPC4(5)XXX-9-30-14

    General_IPC-HX5(4)XXX(SD-Adreia)_Eng_N_Stream3_V2.400.0000.0.R.20131231

     

     

    When I telnet into the camera /usr/bin/sonia & /var/tmp/upgraded are running. upgraded provides the listener on port 3800.

     

    With the config tool, I can login to 3800 and load the firmware file... it says transmitting file, then updating camera the says success and reboots, but the camera still only comes up with port 23 and 3800 and the firmware is not applied.

     

    Any thoughts?

     

    Thanks,

    Rob

×