User Manual

Migrating from XProtect® Enterprise to
XProtect® Advanced VMS
System Migration Guide
www.milestonesys.com
Contents
Contents
INTRODUCTION................................................................................ 5
PRODUCT OVERVIEW ..................................................................... 6
A TYPICAL SYSTEM SETUP ................................................................................... 6
MANAGEMENT SERVER ........................................................................................ 7
RECORDING SERVER ........................................................................................... 8
MANAGEMENT CLIENT ........................................................................................ 8
DOWNLOAD MANAGER ........................................................................................ 8
ACCESS CLIENTS ................................................................................................ 8
INTEGRATE XPROTECT ENTERPRISE ........................................ 10
WHAT TO CONSIDER BEFORE MIGRATING ................................ 11
REUSE EXISTING SERVERS? .............................................................................. 11
Computer running management server ........................................................................... 11
Computer running recording server or failover recording server ................................ 12
Computer running XProtect Smart Client ........................................................................ 13
REUSE EXISTING CAMERAS? .............................................................................. 14
REUSE EXISTING SYSTEM CONFIGURATION? ........................................................ 15
DOWNTIME WHILE MIGRATING? .......................................................................... 15
CUSTOMIZED INTEGRATIONS TO OTHER APPLICATIONS ......................................... 15
IMPORTANT DIFFERENCES AND MORE ..................................... 16
RECORDING FRAME RATE .................................................................................. 16
ARCHIVING ....................................................................................................... 16
VIRUS SCANNING .............................................................................................. 17