Previous Next  Print this Topic

This topic provides information, tips, and how to's on installing SoleraTec's Phoenix RSM.

Before installation, make sure your computer meets minimum system requirements.

There are a few differences to understand between the Server Bundle and the Client Bundle. The main difference between the Phoenix RSM Server Bundle and Client Bundle is that the Server Bundle includes Phoenix RSM Vaults and administrative tools. You should install the Server Bundle on computers you want Vaults to reside. Install the Client Bundle on computers you want only clients to run.

Here is a brief breakdown of each bundle:

Server Bundle

Does not have to run on a server.
Must be installed first on your network, otherwise the Client Bundle will not function.
Includes all of the components contained in the Client Bundle. Because of this, do not install the Server and Client Bundle on a single computer.
Install on computers that are to have Vaults.

For optimal performance, install the Server Bundle local to the Vaults they are to manage.

Client Bundle

Install just the Client Bundle on other computers on the network after you have installed the Server Bundle somewhere on your network.
Install on computers that do not contain Vaults.


See the appropriate section for the platform to install your Phoenix RSM. Uninstall instructions are included as well.


After installation is complete, the next step is to add Vaults. See Add or Remove Vault Wizard. For more information about what's next, see Getting Started.

Important Installation tips

To install, you need to have administrative permissions.
Phoenix RSM must be installed on a NTFS partition, not a FAT32 partition. This is especially true for Mac Boot Camp Windows installations as the default partition is FAT32.
Phoenix RSM Vaults and surveillance video ingest servers require running on a computer configured to use static IP address assignment. Using DHCP to obtain a dynamic IP address may result in unpredictable system behavior.

Network Connectivity Requirement

Phoenix RSM is designed to run on a network. Running it on a computer that is not networked causes unexpected performance. If you need to run it on a standalone Windows computer, you must use the Microsoft Loopback adapter bundled in Windows to create a virtual network environment. Go to for details.

Firewall Rights Requirement

Most firewalls are pre-configured to block most programs from communicating to maintain a high level of security. Your local firewall software on the computer where Phoenix RSM is installed may interfere with Phoenix RSM operations.

If you are running a local firewall, make sure all Phoenix RSM components have pass through rights to at least the locally connected network or networks. Refer to your operating system documentation regarding how to unblock Phoenix RSM from communicating.

Date and Time Properties on Computers with Vaults

All computers in the Information Repository that contain Vaults and any VMS system that video is captured from must be synchronized to the same time source for the Information Repository to function correctly.


Phoenix RSM uses multicast and beacon technology to communicate between clients, Vaults, and available Phoenix RSM services. The default Phoenix RSM multicast address is

Server Bundle and Client Bundle Contents

When you install the DVD or launch the installation executable, you are given the option of installing a Server Bundle or a Client Bundle. If you select to install the Client Bundle, only a subset of the applications in the Server Bundle are installed.

Applications listed below that end with "Cl" and "Svc" are run from a command line.

The Server Bundle and Client Bundle include the following:






Browser based (HTML) help




PDF based documentation




Applications for administration and Information Repository monitoring, including:

Vault Admin
Network Activity
Locator Admin Command Line Interface (LocAdminCl)
Vault Admin Command Line Interface(VaultAdminCl)



Surveillance Video Manager


A visual interface that enables users to search for surveillance video files in the Information Repository. Also export selected clips or entire files to any computer on the network.



Camera Policies

Add cameras, capture video feeds, on a scheduled basis from RTSP enabled IP cameras.



Live Viewer

View Live feeds from any RTSP-enabled IP camera that is on the network. Cameras must first be configured using Camera Policies.



Data Services

Applications for migrating, replicating, and purging data in the Information Repository, including:

Data Service Policies
Data Services Command Line Interface (DataSvcsCl)
Data Services Service (DataSvcsSvc).




The Vault services applications:

Vault Service (VaultSvc)
Add or Remove Vault Wizard