Locking Down Network Connections

Author: Ethan Ace, Published on May 02, 2012

Cameras and access control panels are gateways for hackers. Locating these devices throughout a building gives attackers multiple points of entry, many without any form of physical or network security. However, physical connections to the network may be secured with RJ45 locks. In this note, we look at these products, differing styles, and what sort of protection they may provide to a security network installation.

Overview

**** ***** *** ********* *** **** ***** ****** *** ***** ports, ********* ** *** **** *********, *** **** **** ***********:

  • ***** ***** ***** ***** **** *** ***** *** *********, ********* beneath *** ******* ****'* ******* ***. **** *******, *** *** cannot ** ****** **** ** ****** *** *****, ******* ***** disengaging *** ****. **** ***** ********** ******* *** ****** *** to ******* ********* ********* ** ********. ****** ***** ** *******, but ********** ** ***** ** ********* ****** **** ** *** tab ******* ** *** ****, ** *** ***** *** ***** not ** *******.
  • ******* ***** *** **** ****** **** *****, ******* ** * wall *****, ***** *****, ** ******. **** *******, * ***** tab ******* ** **** *** **** **** *****. ***** *** typically ***-*******, ** ***** ********* ********* **** ******** *** **** with *****, **** ** ****** ** ****-***** ** ****** **.

******** ************* ******* ***** ***** *** **** *****, ** ******* styles, ********* ************ ******, *** ** ********. ***-********** ***** ****** ******** **** ******* ********** *** **** available. **** **** *** **** ***** **** *** * ***** $*-* *** ******, ********* **** ** **** ** ** ** **.

**** ****** ***** *********** ******* ***** ***** *** ******* ***** (Black *** *****), *** ***** ********** *****:

Removal *****

***** ***** ******* *********** ***** *** ********* ** ******** ** a *******. **** ***** *** ******** ***** ** **** ****, or **** ***** **** ***** ************, *** ** ***** *** easy ** **** **, *** **** ******* **** * ******* level ** ********. ***** *** ***** ** ** *** **** security ** *** *** **** *******, *** ********** ******* ** still * *****.

*********** ******* ***** *** *********** * ******** ** ***** ***** locks. *** *********** *** *** ******* ** ******* * ****** must ***** * **** **** ****, ** **** ** *** of ******** *** *****. * **** *** ** **** **** someone ** ****, ** ****, ** * **********, *** **** opens ** *** ****** ** *********. **** ****, *******, ***** see *** **** ** ******* **** ** ***** *******, *** this ******* **** ** ** *****. *********** ***** *** *********** or ****, *** ******** **** **** *** ***** ** ** additional ******.

**** ***** ***** *** **** ** *********** **** ************/******* ****, in **** **** *******:

Should *** *** ****?

***** ***** *** ****, **** ***** *** * ********** ********** in **** ************. **** ** ******** ** *** * *******, they *** ** **** ** ******* ********** ************* ** *******, servers, *** ***** *******. ** ************* ***** ***** * ******* with ***** ********, **** *** ** ********** ******, ** ***** may ****** ****** * ******** *****, ********* ** *** ******* device.

* ***** ********** ******** **** **** * *** ** ****** these *****, ****** **** ******* * ***** ** ********** ******* less ************* ******* ** ********** *******. ** *** **** *****'* use *********** *****, ** ** ****** ****** ** ****** *** what ** ****** ** ****** **. **** ** ** **** use *********** *****, ********, ******* ****, ** ******** *** ***** remove *** **** ********** *******, ****** **** ******* **** ********** motions *** **** *********** *****. ** *** **** *****, ***** truly ******* ** **** ****** ** * ***** ***** *** find * *** ** ****** *** ** *** **-********* **, which **** ** ********** ** **** ********. *** ***** *******, cable ***** *** ***** *** *********** ** **** *** ***** of ******** ** ******* * ******* ** ********** *** *****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Project Plans for Security Integrators on Jan 26, 2018
How do security integrators typically plan projects? A detailed playbook with step by step execution? Just go out and do it? Somewhere in...
PoE Powered Access Control Tutorial on Jan 19, 2018
Powering access control with Power over Ethernet is becoming increasingly common.  However, access requires more power than cameras, and the...
Multicasting Surveillance Tutorial on Jan 04, 2018
Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
2018 IP Networking Book Released on Jan 03, 2018
The new IP Networking Book 2018 is a 228-page in-depth guide that teaches you how IT and telecom technologies impact modern security...
QoS for Video Surveillance on Dec 29, 2017
Along with VLANs, QoS is one of the most misunderstood topics in IP surveillance networks. Many purported "experts" claim it is required in any...
NVRs - Embedded vs Separate PoE Switch (Statistics) on Dec 21, 2017
Many NVRs now offer PoE switches embedded, allowing IP cameras to be connected directly to the recorder. On the plus side, these units can...
STP vs UTP for Video Surveillance Tutorial on Dec 20, 2017
For many video system designers, deciding which ethernet cabling to use is a quick decision: go with the cheapest.  However, this overlooks the...
Lock Status Monitoring Tutorial on Dec 18, 2017
Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...

Most Recent Industry Reports

Why 3VR Failed on Feb 16, 2018
3VR destroyed transformed ~$65 million in VC funding into a $6.9 million exit. The reason they failed is simple. They bet on analytics. They...
"Fear Mongering": Hikvision USA Cybersecurity Director Dismisses Chinese Government Ownership Concerns on Feb 16, 2018
The facts are: The Chinese government created Hikvision and is Hikvision's controlling shareholder. Hikvision's Chairman, a Communist Party...
16:9 vs 4:3 Video Aspect Ratio Statistics on Feb 16, 2018
What aspect ratio do security integrators prefer? The 'standard' 4:3 or the 'wide' 16:9 one? 100+ integrators told us what they preferred, with...
Mercury Releases New Series 3 Redboard Access Panels on Feb 15, 2018
Mercury Security has their first major product release post-HID buyout, and things literally look different. The Series 3 SIO boards now are red...
Last Chance February 2018 Camera Course on Feb 15, 2018
This is the last chance to get into the Winter camera course, starts next Tuesday. Register now. IPVM provides the best education, live online...
Hikvision DeepInMind Tested Terribly on Feb 15, 2018
While Hikvision is heavily marketing deep learning and 'AI' as their next big thing, new IPVM test results of their DeepInMind NVR shows their deep...
Genetec CEO: You Cannot Buy Trust on Feb 14, 2018
Genetec's CEO, Pierre Racz, delivered a direct message at their channel partner conference: Racz has become a focal point in the industry debate...
Assa's Lowest Power Draw Maglock: Securitron M680E Examined on Feb 14, 2018
Securitron produces some of the most extreme maglocks on the market, including massively strong maglocks and even ones with integrated CCTV cams...
Hanwha Wisenet X 5MP Camera Tested (XNV-8080R) on Feb 13, 2018
Wisenet X is Hanwha's high-end camera line. We tested their Wisenet X 1080p camera last year. Now Hanwha is offering 5MP cameras listing super low...
Top Problems For Integrator Project Management on Feb 13, 2018
Security projects routinely encounter issues that jeopardize deadlines, create confusion, and shrink profits. Unfortunately, there are common...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact