Locking Down Network Connections Guide

By: John Scanlan, Published on Apr 23, 2019

Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected against such attacks and can be done with relatively low-cost means.

free image

Inside this guide, IPVM explains how they work and what the tradeoffs are. To do so, IPVM bought and tested these locking devices. 

We include 3 video demonstrations, reviewing the methods, demonstrating how they are used, and give our recommendations.

********* *** ****** ******* are ***** **** ******* connections *** *** ****** down. ******** *** ***** surveillance ******* ****** ** protected ******* **** ******* and *** ** **** with ********** ***-**** *****.

free image

****** **** *****, **** explains *** **** **** and **** *** ********* are. ** ** **, IPVM ****** *** ****** these ******* *******. 

** ******* * ***** demonstrations, ********* *** *******, demonstrating *** **** *** used, *** **** *** recommendations.

[***************]

Why **** ****

***** *** ******* ********** to ******* **** ******* on ************ ***********, *** example:

  • **** *** ******* ********* / ******* ********** *********** from ***** ******
  • ******* ***** / ********** devices **** ********** ** the ************ *******
  • **** *** **** ******** NVRs *** ******* ******** Ethernet *****, ** **** point ** ***** *** anyone **** ****** ** network *****
  • ****** ****** *** ** in ****** ********** *********, such ** ********** ** a "*******" **** ** a ******* ** **** simply ******* **** * bullet ** *** ****** cable ****, ********* ** tools *** *************

Summary / ********

***** *** *********** ***** common ***** ** **** and ***** ***** ********** to ** ***** *** security *******.

******* ***** ***** *** **** ** **** the ***** ***** ** the **** ****. **** slide **** *** ******* plug ** * ***** cable, ******** *** ******* tab, ** ** *** not ** ********* ** remove *** *****. **** locks ********** ******* *** entire *** ** ******* potential ********* ** ********, while ****** ***** ** exposed, *** ********** ** break ** ********* ****** most ** *** *** engaged ** *** ****, so *** ***** *** still *** ** *******.

**** **** ***** *** **** ** ******* access ** ***** *****. They *** **** ****** ports **** ** ******** or ***** ***** *****, extending * *** **** the **** ******* ** a ***** ***** *** locked ** ***** **** a *********** ***. **** are ********* *** *******, to ******* ********* **** gripping *** **** **** tools, **** ** ******, to ******* ** ****** it.

*** ****/***** *****: *** ***** ***** *** used ** **** **** USB ****** **** *** USB **** *.*. ******* a ***** **** ***** disconnected **** ** ***. They *** ********* ***** component ******* **** *** piece ******* **** *** 

*** **** ********* *** cable, **** ******* **** wraps *** ***** ******** both **** *****, *** USB *****, *** *** device. **** *** ****** use *** **** ** cut ** **** *** cable.

Vote / ****

Manufacturer *******

******** ************* ******* ***** cable *** **** *****, of ******* ******, ********* *******,***** ***,** ********, **********.

***** ******* ***** ****** in *****, **** ~$* USD *** *** ****** cost ** ~$** *** serialized ******* ******.

***-********** ****** ******** **** locking ********** *** **** available [**** ** ****** available].

Securing ***** ******

******* ***** ***** ******* a ********* **** *********** being *********** ** ************ disconnected. ***** ***** ***** the ******* *** ** it *** *** ** depressed ** ******* *** cable **** *** ****/****.

***** *** **** ********* in ***** ***** ****** may *** ****:

  • ***** *****:***** ***** ***** ****** will *** **** **** most ****** ***** ***** if *** **** **** be ******* *******, ** the *****/****** ******** ** manufacturers ****** ****** *** the ******* ****** ****** it.
  • ****** ***** ******:****** **** ****** ****** boots *** ***** *** lock **** ***** ********, forcing *** **** ** be ******* ** ******* to **** *** *****.
  • ****** ****** ********:*******, ***** *** ****** not *** ****** ****, bullet, ** ***** ****** housings, *** ** ***** constraints. *** *** **** in **** ***** ***** a ****** ****** *** be ******* **** *** dome *** ********, *** this **** ********** ************ time.

** *** ***** ***** we *********** *** ************ and *** ** * patch ***** **** *** these ******.

Securing ****** *****

***** ***** ***** ***** secure ****** ** ***, unused ***** *** **** be *******. *** ***** below ***** ** ******* of ***** ***** ******* plugs, ***** *** **** to ****** ****** ******** ports, *.*., ****, ********, mispans, **** *****, ***** panels, ** *** ***** female **** **********.

************, ***** *** **** port ***** ***** *** single ***. *** *******, the ******* **** **** (developed ** ************ **** the ** ******** ******** Agency) ***** **** *** port *** **** ** destroyed ** ****** **. Additionally, **** **** *** a ******* ****** ******, which *** ** *******, making ** ******* ** a **** *** **** removed ** ********. ** tested *** ******* *** RJ45 **** ***** ***** below.

 PadJack SVE RJ45 Port Locks

** *** ***** ***** we *********** *** *** RJ45 **** ****, *** it ** *********, *** destroyed **** *******:

Securing *** ******

*******, ************ ****** *** also ** ******** ** connecting ******** ** * device *** *** *****. To ******** **** ****** USB **** ***** *** cable ***** *** ** used, ****** ** **** down ** ****** **** or ** ******* ** in-use ***** **** ***** removed.

** ******* * *** device **** ***** ******* or ***** ******* * USB **** *** ** used ** ****** *******, which *********** ******** ** a **** ***** ** plastic *** *********. ** the ***** ***** ** demonstrate ******** * ***** to ** *** ***** a******* *** ***** ****.

** ******** ** ********* devices **** ** ******** and ****, ****, *******, and ******* ******* **** likely **** * *** port ** ***** **** are *** ** ***. USB **** ***** ** port ******** *** ** used ** ******* ****** to *** **** *****, in * ******* *** that **** ******* ***** work.  ***** ***** ** a **** **** ** inserted **** * ****** USB ****, ****** ************ to ***** ******* *** key.  **** ***** ***** with ******** **** *** be **** ** ***** a **** ** *** ports **** *** ****.

USB Port Lock

Proprietary ******* *****: ****** ********, ***** ***********

***** ***** ******* *********** tools *** ********* ** security ** * *******. Some ***** *** ******** allen ** **** ****, or **** ***** **** blade ************, *** ** which *** **** ** come **, *** **** provide **** * ******* level ** ********. ***** may ***** ** ** use **** ********** ******* is * ****** ******* than ********.

*********** ******* ***** *** potentially * ******** ** using ***** *****. *** technicians *** *** ******* or ******* * ****** must ***** * **** with ****, ** **** will **** ** *** of ******** *** *****.

* **** *** ** left **** ******* ** site, ** ****, ** a **********, *** **** opens ** *** ****** to *********. *********** ***** are *********** ** **** and ******** **** **** the ***** ** ** additional ******.

No ***** *** ********** *********

* ***** ********** ******** will **** * *** to ****** ***** *****, though **** ******* * level ** ********** ******* less ************* ******* ** accidental *******. ** *** lock *****'* *** *********** tools, ** ** ****** enough ** ****** *** what ** ****** ** unlock **.

**** ** ** **** use *********** *****, ********, cutting ****, ** ******** may ***** ****** *** lock ********** *******, ****** will ******* **** ********** motions *** **** *********** tools. ** **** *** be ** **** ** ordering *** ******* ****. If *** **** *****, those ***** ******* ** gain ****** ** * given ***** *** **** a *** ** ****** cut ** *** **-********* it, ***** **** ** undetected ** **** ********.

*** ***** *******, ***** locks *** ***** *** recommended ** **** *** layer ** ******** ** provide * ******* ** deterrence *** *****.

******* Security *********

** ** ********* ** go ****** **** ******** security.  *** **** *********** on ******** ******** ****** check *** ***** ******* reports:

Comments (9)

******* **** *******-**-***** ******** is ** ***** **** monitoring ** **** ******* switches ** ****** *** time * **** ***** up. **** *** **** detect ***** ******* ******* into *** *******, ** well ** ******* **** might ** ********. ** obviously ****** ** ******** for ***** **** *** connected ** ******* **** office ***, ** ***** equipment **** ** ******** to ***** ***** * lot, *** ***** *** generally *** *** ***** you *** ******* ***** for ***** *******, ** they *** ******* *** in *** ****.

***** **** ********** ** your ******* ******** ** report *** **** * port ***** **

** *** ***** ****: *** **** *** ******: Network ********

****, ** ***'** ******* on *** *** *** kind ** ******* ******, you *** ******** *** from *** ***** ** worrying ***** (** ***** aware **) ****** **** advanced **** ******** **********.

***, ***** **** ** the *** ******.

****** **, *** *** those ********** ** **** information ****** *** ***** ************, we **** * ****** here.

*** *** ***** **** would **** **** ***** years *** **** **** software ********* ******** * USB ******. *** ** looks **** * ***** drive ** ** **** be * ***** *****. Doh!

** **** **** ***** for *** ***** **** and **** **** **** for *** ******** ***.

******** ***** ******** ****

********** ******** ****** ****** ports ** * **** start, *** ******* *** ports ************** ** **** likely ** ***** ******. Using * ***** **** VLAN ** ****** ********* ports ** **** ** prefer ** **. **** system ***** ***’* ******* people **** ********** ******** patches, *** ** **** prevent ****** ** ****** ports.  

*** - **** ****** and ******, **** ****** be **** ** * larger **** *** *** we ***** *** '******* Security *********' *******. ** the ********** ****** ** review *** *********** ********* unused *********** ** **** as ***. * *** have ** *** ***** hole *****.

**** *** *** *** issues **** ***** ********** to ******** *** / move / ****** / work ******* ** *** a **** *****?

** ****** *** ** to ****. ***** **** Unifi ******** ***** **** really ****. ** *** check ****** ************** ******* with *** ******. **** changes ** ****** ***. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Access Control Turnstiles Guide on Jan 28, 2019
Turnstiles control pedestrian access to secured areas, essentially becoming moving portions of fences, walls, or barricades for physically stop...
Cable Firestopping Installation Guide on Mar 06, 2019
Installing cables through firewalls is a critical installation issue. Failing to properly seal a penetration can cause smoke and fire to spread,...
Riser vs Plenum Cabling Explained on Apr 18, 2019
You could be spending twice as much for cable as you need. The difference between 'plenum' rated cable and 'riser' rated cable is subtle, but the...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
Horizontal Cabling for Video Surveillance Guide on Jan 03, 2020
There are a few options when it comes to professionally installing horizontal cabling for video surveillance networks. The three options examined...
Network Cabling for Video Surveillance on Jan 15, 2020
In this guide, we explain the fundamentals of network cabling for video surveillance networks, how they should be installed, and the differences in...
Wyze Smart Door Lock Test on Jan 14, 2020
Wyze's inexpensive cameras have grabbed the attention of many in the consumer market, but can the company's new smart lock get similar...

Most Recent Industry Reports

Video Surveillance 101 Course - Last Chance on Feb 20, 2020
This is the last chance to join IPVM's first Video Surveillance 101 course, designed to help those new to the industry to quickly understand the...
Cheap Camera Problems at Night on Feb 19, 2020
Cheap cameras generally have problems at night, despite the common perception that integrated IR makes cameras mostly the same, according to new...
Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...
UK Stands Behind Hikvision But Controversy Continues on Feb 18, 2020
Hikvision is exhibiting at a UK government conference for law enforcement, provoking controversy from the press, politicians, and activists due to...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan startup IronYun has raised tens of millions for its "mission to be the leading Artificial Intelligence, big data video software as a service...
Access Control ADA and Disability Laws Tutorial on Feb 17, 2020
Safe access control is paramount, especially for those with disabilities. Most countries have codes to mandate safe building access for those...
ISC West 2020 Removes China Pavilion, No Plans To Cancel Or Postpone on Feb 17, 2020
ISC West plans to go on next month, amidst concerns over coronavirus. However, the Asia / China Pavilion has been removed, show organizers...
Hanwha Wisenet X Plus PTRZ Tested on Feb 14, 2020
Hanwha has released their PTRZ camera, the Wisenet X Plus XNV-6081Z, claiming the "modular design allows for easy installation". We bought and...
PRC Warns Against China Video Surveillance Hacks, Hikvision Targeted on Feb 14, 2020
Hackers are targeting China video surveillance manufacturers and systems, according to the PRC's main cyber threat monitoring body. The hackers...