Dahua IVS-TB8000-E-GU1, IVS-TB8000-xE-GU2 User manual

  • Hello! I am an AI chatbot trained to assist you with the Dahua IVS-TB8000-E-GU1 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Intelligent Video Analysis Server for Traffic
Event Detection
Deployment Manual
ZHEJIANG DAHUA VISION TECHNOLOGY CO., LTD. V2.0.0
Deployment Manual
I
Foreword
This manual introduces the deployment of the server (hereinafter referred to as "the Device"). Read
carefully before using the device, and keep the manual safe for future reference.
Safety Instructions
The following signal words might appear in the manual.
Signal Words Meaning
Indicates a high potential hazard which, if not avoided, will result in
death or serious injury.
Indicates a medium or low potential hazard which, if not avoided,
could result in slight or moderate injury.
Indicates a potential risk which, if not avoided, could result in
property damage, data loss, reductions in performance, or
unpredictable results.
Provides methods to help you solve a problem or save time.
Provides additional information as a supplement to the text.
Revision History
Version Revision Content Release Time
V2.0.0 Updated deployment
procedures. June 2022
V1.0.0 First release. August 2021
Privacy Protection Notice
As the device user or data controller, you might collect the personal data of others such as their face,
fingerprints, and car plate number. You need to be in compliance with your local privacy protection
laws and regulations to protect the legitimate rights and interests of other people by implementing
measures which include but are not limited: Providing clear and visible identification to inform
people of the existence of the surveillance area and provide required contact information.
About the Manual
The manual is for reference only. Slight differences might be found between the manual and the
product.
We are not liable for losses incurred due to operating the product in ways that are not in
compliance with the manual.
The manual will be updated according to the latest laws and regulations of related jurisdictions.
For detailed information, see the paper user’s manual, use our CD-ROM, scan the QR code or visit
our official website. The manual is for reference only. Slight differences might be found between
the electronic version and the paper version.
All designs and software are subject to change without prior written notice. Product updates
Deployment Manual
II
might result in some differences appearing between the actual product and the manual. Please
contact customer service for the latest program and supplementary documentation.
There might be errors in the print or deviations in the description of the functions, operations
and technical data. If there is any doubt or dispute, we reserve the right of final explanation.
Upgrade the reader software or try other mainstream reader software if the manual (in PDF
format) cannot be opened.
All trademarks, registered trademarks and company names in the manual are properties of their
respective owners.
Please visit our website, contact the supplier or customer service if any problems occur while
using the device.
If there is any uncertainty or controversy, we reserve the right of final explanation.
Deployment Manual
III
Important Safeguards and Warnings
This section introduces content covering the proper handling of the device, hazard prevention, and
prevention of property damage. Read carefully before using the device, and comply with the
guidelines when using it.
Transportation Requirements
Transport the server under allowed humidity and temperature conditions.
Storage Requirements
Store the server under allowed humidity and temperature conditions.
Installation Requirements
Strictly comply with the local electrical safety code and standards. Make sure the ambient voltage
is stable and meets the power supply requirements of the server.
Do not expose the battery to environments with extremely low air pressure, or extremely high or
low temperatures. Also, it is strictly prohibited for the battery to be exposed to extremely hot
environments (such as direct sunlight or fire), and to cut or put mechanical pressure on the
battery. This is to avoid the risk of fire and explosion.
Use the standard power adapter. We will assume no responsibility for any problems caused by
the use of a nonstandard power adapter.
Do not place the device in a place exposed to sunlight or near heat sources.
Keep the device away from dampness, dust, and soot.
Put the device in a well-ventilated place, and do not block its ventilation.
Install the switch horizontally on a stable surface to prevent it from falling.
The device is a class I electrical appliance. Make sure that the power supply of the device is
connected to a power socket with protective earthing.
Use power cords that conform to your local requirements, and are rated specifications.
Before connecting the power supply, make sure the input voltage matches the server power
requirement.
When installing the device, make sure that the power plug and appliance coupler can be easily
reached to cut off power.
Install the server in an area that only professionals can access.
Extra protection is necessary for the device casing to reduce the transient voltage to the defined
range.
Install the device near a power socket for emergency disconnect.
It is prohibited for non-professionals and unauthorized personnel to open the device casing.
Deployment Manual
IV
Operation Requirements
This is a class A product. In a domestic environment this may cause radio interference in which
case you may be required to take adequate measures.
The device is heavy and needs to be carried by several persons together to avoid personal
injuries.
Make sure that the power supply is correct before use.
Operate the device within the rated range of power input and output.
Use the device under allowed humidity and temperature conditions.
Do not drip or splash liquid onto the device, make sure that there is no object filled with liquid on
the device to prevent liquid from flowing into it.
Do not disassemble the device without professional instruction.
Your configurations will be lost after performing a factory reset. Please be advised.
Do not restart, shut down or disconnect the power to the device during an update.
Make sure the update file is correct because an incorrect file can result in a device error occurring.
The system cannot upgrade different types of AI modules at the same time.
Do not frequently turn on/off the device. Otherwise, the product life might be shortened.
Back up important data on a regular basis when using the device.
Operating temperature: 10 °C to 35 °C (50 °F to 95 °F).
Maintenance Requirements
Make sure you use the same model when replacing the battery to avoid fire or explosion. Dispose
the battery strictly following the instructions.
Power off the device before maintenance.
AI module does not support hot plug. If you need to install or replace the AI module, unplug the
device power cord first. Otherwise, it will lead to file damage on the AI module.
The device casing provides protection for internal components. Use a screwdriver to loosen the
screws before detaching the casing. Make sure to put the casing back on and secure it in its
original place before powering on and using the device.
Clean the ventilation pipe regularly to avoid obstructions.
It is prohibited for non-professionals and unauthorized personnel to open the device casing.
The appliance coupler is a disconnection device. Keep it at a convenient angle when using it.
Before repairing or performing maintenance on the device, first disconnect the appliance
coupler.
Deployment Manual
V
Table of Contents
Foreword ........................................................................................................................................................................................................I
Important Safeguards and Warnings ............................................................................................................................................ III
1 Web Operation ....................................................................................................................................................................................... 1
1.1 Initialization ................................................................................................................................................................................. 1
1.2 Setting Time ................................................................................................................................................................................. 2
1.3 Configuring Server IP .............................................................................................................................................................. 2
2 (Optional) Configuring Server ....................................................................................................................................................... 4
3 Applying for Encryption .................................................................................................................................................................... 6
3.1 Checking Dongle ........................................................................................................................................................................ 6
3.2 Software-based Encryption .................................................................................................................................................. 6
3.3 Hardware-based Encryption .............................................................................................................................................. 11
4 (Optional) Deploying Server ......................................................................................................................................................... 13
4.1 Before Deployment ................................................................................................................................................................ 13
4.2 Installing CentOS System and Program ....................................................................................................................... 14
4.2.1 Preparing USB Flash Drive ....................................................................................................................................... 14
4.2.2 Selecting Bootup Menu ............................................................................................................................................. 17
4.2.2.1 TB8000-E-GU1 ..................................................................................................................................................... 17
4.2.2.2 TB8000-xE-GU2 (x=26) .................................................................................................................................. 19
4.2.2.3 TB8000-MIE ........................................................................................................................................................... 24
4.2.3 Selecting USB Flash Drive ......................................................................................................................................... 24
4.2.4 Selecting Operating System .................................................................................................................................... 26
5 (Optional) Reinstalling Program ................................................................................................................................................. 27
Appendix 1 Cybersecurity Recommendations ........................................................................................................................ 30
Deployment Manual
1
1 Web Operation
For baseline server, you need to connect your computer or laptop to the same network segment
as the server before logging in to the web client.
IP address: 192.168.1.107
Subnet mask: 255.255.0.0
Default gateway: 192.168.0.1
If you do not have a laptop, log in to the server background to configure its settings. For details,
see "2 (Optional) Configuring Server".
1.1 Initialization
For first-time login, you need to initialize the password to log in to the admin account.
Step 1 Open the Chrome browser, enter the default IP address of the web client
(http://192.168.1.108) in the address bar, and then press the Enter key.
Step 2 Enter a new password and confirm the password. Enter your phone number to reset the
password if you forget it.
Step 3 Click Save.
Figure 1-1 Initialize admin password
Deployment Manual
2
1.2 Setting Time
Set the time of the server.
Click Sync PC to synchronize the time of the server with your computer. You can also set the time
format and time zone.
Figure 1-2 Set time
1.3 Configuring Server IP
Step 1 Open the Chrome browser, enter the default IP address of the server (http://192.168.1.108),
and then press the Enter key.
Step 2 Enter the username and password, and then click Login.
Step 3 Select System Settings > Network Config > TCP/IP > .
Step 4 Change the IP address, subnet mask, and default gateway, and then click OK.
Deployment Manual
3
Figure 1-3 Change IP
Step 5 On the lower-right corner of the TCP/IP page, click OK. Enter the password, and then click
OK.
Figure 1-4 Confirm
Deployment Manual
4
2 (Optional) Configuring Server
If you do not have a laptop, log in to the server through Xshell for configuration.
Step 1 Log in to the admin or root account.
The password for admin is dh-qQ3j!soft.
The password for root is dahuacloud.
Step 2 Check whether the driver has been successfully installed.
[root@rabbitmq1 ~]# npu-smi info
+------------------------------------------------------------------------------+
| npu-smi 21.0.3.2 Version: 21.0.3.2 |
+-------------------+-----------------+----------------------------------------+
| NPU Name | Health | Power(W) Temp(C) |
| Chip Device | Bus-Id | AICore(%) Memory-Usage(MB) |
+===================+=================+========================
================+
| 2880 310 | OK | 12.8 50 |
| 0 0 | 0000:B6:00.0 | 0 3440 / 8192 |
+-------------------+-----------------+----------------------------------------+
| 2880 310 | OK | 12.8 53 |
| 1 1 | 0000:B7:00.0 | 0 3440 / 8192 |
+-------------------+-----------------+----------------------------------------+
| 2880 310 | OK | 12.8 54 |
| 2 2 | 0000:B8:00.0 | 0 3440 / 8192 |
+-------------------+-----------------+----------------------------------------+
| 2880 310 | OK | 12.8 52 |
| 3 3 | 0000:B9:00.0 | 0 3440 / 8192 |
+===================+=================+========================
================+
Step 3 Check whether the patch has been successfully installed.
[root@rabbitmq1 ~]# cat /patch.txt
2022040117 patch install successful
Step 4 Check the date and time. Run the date command to edit the date.
[root@rabbitmq1 ~]# date
Fri Apr 1 20:38:58 CST 2022
(Optional) [root@rabbitmq1 ~]# date -s "20:39:00"
Fri Apr 1 20:39:00 CST 2022
(Optional) [root@rabbitmq1 ~]# hwclock -w
Step 5 Edit the network configuration in the server SaaS configuration file, and then restart the
service.
[root@rabbitmq1 ~]# cd /cloud/dahua/BehaviorSaaS/Service/Conf/
[root@rabbitmq1 Conf]# vi Config.ini
DefaultMask=xxx.xxx.x.x
DefaultGateWay=xxx.xx.x.x
Deployment Manual
5
ListenIP=xxx.xx.xxx.xxx
[root@rabbitmq1 Conf]# /cloud/service/services/BehaviorSaaS-Manager restart
Deployment Manual
6
3 Applying for Encryption
TB8000 supports two encryption methods: hardware-based encryption and software-based
encryption.
3.1 Checking Dongle
Use Xshell to remotely log in to the server, and then you can check whether a dongle is installed. The
tool first recognizes the dongle information by default. If no dongle is recognized, then it tries to
recognize software-based encryption.
Step 1 Log in to the server remotely through Xshell.
Step 2 Run the lsusb command to check whether a dongle is installed on the server.
[root@rabbitmq1 ~]# lsusb
Bus 002 Device 002: ID 8087:8000 Intel Corp.
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 006 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 005 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 002: ID 8087:8008 Intel Corp.
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 002: ID 096e:0202 Feitian Technologies, Inc.
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
If Feitian Technologies, Inc. appears, it means that the dongle was inserted into the
server; otherwise, there is no dongle, and you need to apply for the software-based
encryption.
Step 3 Check encryption information.
Run the ./LicenseUpdateTool.exe -dog display command to check encryption
information. If it is correct, there is no need to apply for software-based encryption again.
3.2 Software-based Encryption
Step 1 Log in to the server remotely through Xshell.
Step 2 Run the cd /Tools command to go to the Tools directory.
Step 3 Run the ./LicenseUpdateTool.exe -server export command to get the
connection_server.dat file.
[root@rabbitmq1 Tools]# ./LicenseUpdateTool.exe -server export
===========================
SUCCESS:
Export base information successfully.
Path(µ¼³¶): /connection_server.dat
Deployment Manual
7
File name varies with version and release date.
Step 4 In the Tools directory, run the sz connection_server.dat command to save the file to the
local computer.
Step 5 Apply for software-based encryption on Dahua portal. The portal only supports the
Chinese version. Contact our technical support to help you with the application process.
1. In the portal menu navigation bar, enter 加密 (encryption), select 据导出设备信息
包申请软License或加密狗License(中心智能设备)(apply for a software license or
dongle license (central intelligence device) based on the exported device information
package).
Figure 3-1 Search for encryption
2. Click新增 (add) to add a software-based encryption application.
Figure 3-2 Add application
3. Enter the application information.
If you apply for permanent encryption, enter the project name, business opportunity
No., and corresponding technical support in the reason field, and then attach the
Deployment Manual
8
contract.
Figure 3-3 Enter application information
Table 3-1 Parameter description
Parameter Description
Type
Select the application type.
For hardware-based encryption, select
密狗
(dongle).
For software-based encryption, select
License (software License).
Deployment Manual
9
Parameter Description
Dongle
Information
Package
Click
密狗信息包
(dongle information package), and then select the
exported connection_server.dat file.
The file name varies according to the version and release date.
If you select
加密
(software-based encryption), you do not need to
upload files.
Server Information
Package
Click
务器信息包
(server information package), and then select the
exported connection_server.dat file.
The file name varies according to the version and release date.
Material No.
Click the text box, and then enter the material No. of the server.
For server material No., see Table 3-2.
Algorithm
Database Usage
Days
Set the usage days.
Clear the
久有效
(permanently effective) checkbox, and then
select
法库使用天数
(algorithm database usage days). means
selected, and means not selected.
No approval is needed if usage days are under 30 days.
Algorithm
Database Config
Select
法库配置选择
(Algorithm Database Config), and then select
界防范
(2077) (perimeter protection (2077)),
智慧消防(
3114
(intelligent firefighting (3114)), and
通全智能
(3106) (intelligent traffic
(3106)).
Reason Enter the reason for your application.
Table 3-2 Server material No.
Server Name and Model Part No.
Domestic Dahua 1U Traffic Event Detection Intelligent Server (E3
1275V5-8G*2-4T*1-E-dongle included) DH-IVS-TB8000 - E-A 1.0.01.18.10612
Domestic Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*2-dongle included) DH-IVS-
TB8000-2A-GU2
1.0.01.18.10613
Domestic Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DH-IVS-
TB8000-6A-GU2
1.0.01.18.10614
Domestic Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*4-dongle included) DH-IVS-
TB8000-4A-GU2
1.0.01.18.10615
Domestic Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DH-IVS-
TB8000-6A-GU2
1.0.01.18.10616
Deployment Manual
10
Server Name and Model Part No.
Domestic Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DH-IVS-
TB8000-6A-GU2
1.0.01.18.10617
Overseas Dahua 1U Traffic Event Detection Intelligent Server (E3
1275V5-8G*2-4T*1-E-dongle included) DHI-IVS-TB8000 - E-A 1.0.01.18.10618
Overseas Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*2-dongle included) DHI-IVS-
TB8000-2A-GU2
1.0.01.18.10619
Overseas Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DHI-IVS-
TB8000-6A-GU2
1.0.01.18.10620
Overseas Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*4-dongle included) DHI-IVS-
TB8000-4A-GU2
1.0.01.18.10621
Overseas Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DHI-IVS-
TB8000-6A-GU2
1.0.01.18.10622
Overseas Dahua 2U Traffic Event Detection Intelligent Server
(Silver4114T*2-16G*4-4T*4-E Card*6-dongle included) DHI-IVS-
TB8000-6A-GU2
1.0.01.18.10623
Domestic Dahua 8-channel Traffic Event Detector DH-IVS-TB8000-
MIE 1.0.01.18.10708
4. At the upper-left side of the application page, click 保存 (save), and then click 提交
(submit).
After the process is approved, you will receive an email from the portal. Click the link in
the email to download the software-based encryption certificate, which is a zip file
named after the application date.
Step 6 Start encryption.
1. Log in to Xshell, and then in the Tools directory, run the rz command to upload the
downloaded certificate.
2. Run the ./LicenseUpdateTool.exe -server import command to import the encryption
certificate.
[root@rabbitmq1 Tools]# ./LicenseUpdateTool.exe -server import xxxx.zip
===========================
SUCCESS:
Import successfully.
Change the name of xxxx.zip to the actual file name.
3. In the Tools directory, run the ./LicenseUpdateTool.exe -server display command to
view encryption information.
[root@rabbitmq1 ~]# /Tools./LicenseUpdateTool.exe -server display
===========================
SUCCESS:
SN: ad33d8b0-1f7b-cab9-9447-ba07f855b143
Deployment Manual
11
Begin Date: 2021-05-19 16:05:55
End Date: 2021-06-18 16:05:55
Days: 30
Count: 3
ID: 2077,3114,3106
4. Run the /cloud/service/services/BehaviorSaaS-Manager restart command to restart
the service.
3.3 Hardware-based Encryption
Step 1 Insert the dongle into the server.
Step 2 Log in to the server remotely through Xshell.
Step 3 Run the cd /Tools command to go to the Tools directory.
Step 4 Run the ./LicenseUpdateTool.exe -server export command to get the
connection_server.dat file.
[root@rabbitmq1 Tools]# ./LicenseUpdateTool.exe -server export
connection
connection
file_len:11. length:10file_len:11. length:10
===========================
SUCCESS:
Export base information successfully.
Path(µ¼³¶): /Tools/connection_server.dat
The file name varies according to the version and release date.
Step 5 Run the ./LicenseUpdateTool.exe -dog export command to get the connection_dog.dat
file.
[root@rabbitmq1 Tools]# ./LicenseUpdateTool.exe -dog export
===========================
SUCCESS:
Export base information successfully.
Path(µ¼³¶): /connection_dog.dat
The file name varies according to the version and release date.
Step 6 Apply for the dongle on Dahua portal. For details, see step 5 in "3.2 Software-based
Encryption".
Step 7 Start encryption.
1. Log in to Xshell, and then in the Tools directory, run the rz command to upload the
downloaded encryption certificate.
2. Run the ./LicenseUpdateTool.exe -dog import command to import the encryption
certificate.
[root@rabbitmq1 Tools]# ./LicenseUpdateTool.exe -dog import xxxx.zip
===========================
Deployment Manual
12
SUCCESS:
Import successfully.
Change the name of xxxx.zip to the actual file name.
3. In the Tools directory, run the ./LicenseUpdateTool.exe -dog display command to
view encryption information.
[root@rabbitmq1 ~]# /Tools./LicenseUpdateTool.exe -dog display
===========================
SUCCESS:
SN: ad33d8b0-1f7b-cab9-9447-ba07f855b143
Begin Date: 2021-05-19 16:05:55
End Date: 2021-06-18 16:05:55
Days: 30
Count: 3
ID: 2077, 3106, 6145
4. Run the /cloud/service/services/BehaviorSaaS-Manager restart command to restart
the service.
Deployment Manual
13
4 (Optional) Deploying Server
This chapter is for reinstalling the server from scratch. If it is a baseline server with the basic package,
driver package, patch package, and installation package deployed, you can skip this chapter.
4.1 Before Deployment
Before deployment, prepare the devices needed and download packages from GDP.
Device Information
Table 4-1 Device information
Server Name Model Hard Disk Mirror System
Domestic Dahua 1U
Traffic Event
Detection Intelligent
Server
DH-IVS-TB8000-E-
GU1
System disk: SSD, 128
G 1
Data disk: HDD, 4 T 1
Video disk: HDD, 4 T 1
CentOS7.4
Domestic Dahua 2U
Traffic Event
Detection Intelligent
Server
DH-IVS-TB8000-xE-
GU2x=2–6
System disk: SSD, 128
G 1
Data disk: HDD, 4 T 2
(for RAID0)
Video disk: HDD, 4 T 1
CentOS7.4
Overseas Dahua 1U
Traffic Event
Detection Intelligent
Server
DHI-IVS-TB8000-E-
GU1
System disk: SSD, 128
G 1
Data disk: HDD, 4 T 1
Video disk: HDD, 4 T 1
CentOS7.4
Overseas Dahua 2U
Traffic Event
Detection Intelligent
Server
DHI-IVS-TB8000-xE-
GU2x=2–6
System disk: SSD, 128
G 1
Data disk: HDD, 4 T 2
(for RAID0)
Video disk: HDD, 4 T 1
CentOS7.4
Domestic Dahua 8-
channel Traffic Event
Detector
DH-IVS-TB8000-MIE Data disk: HDD, 4 T 1 CentOS7.7
Packages and USB Flash Drive for CentOS7.4
Mirror (material No.: )
CentOS-7-x86_64-Minimal-1708-mod-AD8000-LEGACY-20220608.iso
Basic package (material No.: 2.7.07.01.01317)
General_IVS-CentOS7.4-Base_CPU-X86-MD5-xxxx_version number.tar.gz.
Driver package (material No.: 2.7.07.01.01611)
General_IVS-CentOS7.4-Base_Driver_Atlas-X86-MD5-xxxx_version number.tar.gz
Patch package (material No.:)
General_IVS-CentOS7.4-Base_Patch-Security-MD5-xxxx_version number.tar.gz.
Deployment Manual
14
Installation package (material No.: 2.4.01.01.12619)
General_IVS-AD8000-E_ChnEng_MD5-xxxx_version number.tar.gz.
System disk
USB flash drive (8 GB or larger size, 16 GB recommended).
The package name might differ depending on the version and release date.
Packages and USB Flash Drive for CentOS7.7
Mirror (material No.: )
CentOS-7-x86_64-Minimal-1908-mod-AD8000-UEFI-20220510.iso
Basic package (material No.:)
General_IVS-CentOS7.7_Base_CPU-X86-MD5-xxxx_version number.tar.gz.
Driver package (material No.:)
General_IVS-CentOS7.7_Base_Driver_Atlas-X86-MD5-xxxx_version number.tar.gz
Patch package (material No.:)
General_IVS-CentOS7.4-Base_Patch-Security-MD5-xxxx_version number.tar.gz.
Installation package (material No.:)
General_IVS-AD8000-E_ChnEng_MD5-xxxx_version number.tar.gz.
System disk
USB flash drive (8 GB or larger size, 16 GB recommended).
The package name might differ depending on the version and release date.
4.2 Installing CentOS System and Program
Install the CentOS system through a USB flash drive.
4.2.1 Preparing USB Flash Drive
Prepare a USB flash drive to install the CentOS system to the server.
Prerequisites
A USB flash drive with a size≥ 8 GB.
A computer or laptop installed with UltraISO.
CentOS 7.7 system package was obtained, and was saved to your computer or laptop.
Procedure
Step 1 Double-click to open UltralSO.
Step 2 Select File > Open, select the CentOS 7.7 installation package, and then click Open.
/