Tying Video And Access Control Together

I need some clarification on VLANs when surveillance and access control need to communicate, such as when a camera needs to call up to a door breach. What is the best practice for connecting the two networks together? Are they normally separate networks routed together? Or, are they normally on the same network?

On that same note, if we have two VLANs on the same network, can we...

"*****" **** ******** ** **** *** *** **** *********** **** they **** ** *** ***** *** **** ******* ******? *** example, ******* ** ****** ************ *** **** ** *** **** network **** **** **********, ***** ** ******** **** ** ***** and **** ***** ***** **** ** *** *** ****** ** the ***** **** **** **** *** ****, ** *** ************ system ** ***** **** *** **** ** ******** *** *** camera *** ** ****** ** (*** ***** ******* ** *** ACAM ****** ****** **** ** ****** ******, *****, ***)?

* **** ** ******** ** ***** ******. * ** * bit ******** *** **** ** *********** **** ** ********.

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

** ** **** *** ***** ** *** **** *******, *** we ***** "*****" **** ******** ** **** *** *** **** information **** **** **** ** *** ***** *** **** ******* hidden?

** **** *****, ***, ** **** ** *** '**** ***' application **** *** *** ** ****** ********** ******** ** ********** to *** **** *****.

*** ******* ***** ** ********** ****: ***** ** * **** as * ***** ****. *** *********** ****** ** * ***** bucket. *** *** **** ******** ***** ******* **** *** ******.

*******, ******** ******** ** ********* ** ********* *** *********. ** this ***, '*** *********** *****' ***** **** ** ********** *** ********* ** **** ******** at *** ******.

** ** **********, ** ** ****** *** ***** ************ *** access ** *** ******* ********* ******** ** *****, *** *** inputs/outputs ***** **** ******** ** ** ********** ** *** *** server.

**** ** *** * **** ********* ***** ** ********* ** the ******* ************* *** **** **** ******** ** *****. ******* with *** ***** ** ***** ** ********* ** ********* **** to **** ** * **** **** ****!

**** **** ****?

********, ************ **** * **** **** ** *** *** **** a ****** *** ****** ** **into ******** '*******' ********, each one acting independently of each other and each one in its own layer 2 broadcast domain. For example, you could take a 24 port switch and divide it into three 8 port VLANs, (*,*,*) **** **** ***** *** ** **********, **** **:

  • ****** *** *** - ******-*- ***.***.*.*
  • ******** *** - ******-**- ***.***.*.*
  • ****** *** - *******-**- ***.***.*.*

** **** ******* *************nothing ***** **** ** ********, just like 3 seperate 8 port switches would not talk to each other. If you want them to see traffic from each other you need to route them at the IP (layer 3) level somehow. You could buy standard routers to do this, though this is inelegant and expensive in this case. A better way is to *** * ***** * ****** which can host the VLANs and route between them all in one.

******* ** * ** ******, ** *** ***** **** *** traffic **A,B *** * ** ****** ******** from each other but allow the VMS to see all networks and route information between them at the application level, then you could use a VLAN capable layer 2 switch and install ***** **** in the VMS server each connected to a different VLAN/IP subnet. Note though that the VMS software is configured with the same IP's regardless of whether using a layer 3 switch or multiple NICs.

**** ** * **** ****** **** *******, ***** *** **** multiple ******** *** ** *********** ******** ** *** ******* ** protocol ****, ***. ********* **** ***** *** ****** **** ** ask **** **** *********...

****, **** **** ****** **** **** ********************, ** **** ** **** ***** ** **** ***** ** the ***** ** ***********. **** ******** ** * *** ***** ****** **** ** Network... ****'* *** ***** '***' ***... ;)