Locking Down Network Connections Guide

By: John Scanlan, Published on Apr 23, 2019

Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected against such attacks and can be done with relatively low-cost means.

free image

Inside this guide, IPVM explains how they work and what the tradeoffs are. To do so, IPVM bought and tested these locking devices. 

We include 3 video demonstrations, reviewing the methods, demonstrating how they are used, and give our recommendations.

********* *** ****** ******* are ***** **** ******* connections *** *** ****** down. ******** *** ***** surveillance ******* ****** ** protected ******* **** ******* and *** ** **** with ********** ***-**** *****.

free image

****** **** *****, **** explains *** **** **** and **** *** ********* are. ** ** **, IPVM ****** *** ****** these ******* *******. 

** ******* * ***** demonstrations, ********* *** *******, demonstrating *** **** *** used, *** **** *** recommendations.

[***************]

Why **** ****

***** *** ******* ********** to ******* **** ******* on ************ ***********, *** example:

  • **** *** ******* ********* / ******* ********** *********** from ***** ******
  • ******* ***** / ********** devices **** ********** ** the ************ *******
  • **** *** **** ******** NVRs *** ******* ******** Ethernet *****, ** **** point ** ***** *** anyone **** ****** ** network *****
  • ****** ****** *** ** in ****** ********** *********, such ** ********** ** a "*******" **** ** a ******* ** **** simply ******* **** * bullet ** *** ****** cable ****, ********* ** tools *** *************

Summary / ********

***** *** *********** ***** common ***** ** **** and ***** ***** ********** to ** ***** *** security *******.

******* ***** ***** *** **** ** **** the ***** ***** ** the **** ****. **** slide **** *** ******* plug ** * ***** cable, ******** *** ******* tab, ** ** *** not ** ********* ** remove *** *****. **** locks ********** ******* *** entire *** ** ******* potential ********* ** ********, while ****** ***** ** exposed, *** ********** ** break ** ********* ****** most ** *** *** engaged ** *** ****, so *** ***** *** still *** ** *******.

**** **** ***** *** **** ** ******* access ** ***** *****. They *** **** ****** ports **** ** ******** or ***** ***** *****, extending * *** **** the **** ******* ** a ***** ***** *** locked ** ***** **** a *********** ***. **** are ********* *** *******, to ******* ********* **** gripping *** **** **** tools, **** ** ******, to ******* ** ****** it.

*** ****/***** *****: *** ***** ***** *** used ** **** **** USB ****** **** *** USB **** *.*. ******* a ***** **** ***** disconnected **** ** ***. They *** ********* ***** component ******* **** *** piece ******* **** *** 

*** **** ********* *** cable, **** ******* **** wraps *** ***** ******** both **** *****, *** USB *****, *** *** device. **** *** ****** use *** **** ** cut ** **** *** cable.

Vote / ****

Manufacturer *******

******** ************* ******* ***** cable *** **** *****, of ******* ******, ********* *******,***** ***,** ********, **********.

***** ******* ***** ****** in *****, **** ~$* USD *** *** ****** cost ** ~$** *** serialized ******* ******.

***-********** ****** ******** **** locking ********** *** **** available [**** ** ****** available].

Securing ***** ******

******* ***** ***** ******* a ********* **** *********** being *********** ** ************ disconnected. ***** ***** ***** the ******* *** ** it *** *** ** depressed ** ******* *** cable **** *** ****/****.

***** *** **** ********* in ***** ***** ****** may *** ****:

  • ***** *****:***** ***** ***** ****** will *** **** **** most ****** ***** ***** if *** **** **** be ******* *******, ** the *****/****** ******** ** manufacturers ****** ****** *** the ******* ****** ****** it.
  • ****** ***** ******:****** **** ****** ****** boots *** ***** *** lock **** ***** ********, forcing *** **** ** be ******* ** ******* to **** *** *****.
  • ****** ****** ********:*******, ***** *** ****** not *** ****** ****, bullet, ** ***** ****** housings, *** ** ***** constraints. *** *** **** in **** ***** ***** a ****** ****** *** be ******* **** *** dome *** ********, *** this **** ********** ************ time.

** *** ***** ***** we *********** *** ************ and *** ** * patch ***** **** *** these ******.

Securing ****** *****

***** ***** ***** ***** secure ****** ** ***, unused ***** *** **** be *******. *** ***** below ***** ** ******* of ***** ***** ******* plugs, ***** *** **** to ****** ****** ******** ports, *.*., ****, ********, mispans, **** *****, ***** panels, ** *** ***** female **** **********.

************, ***** *** **** port ***** ***** *** single ***. *** *******, the ******* **** **** (developed ** ************ **** the ** ******** ******** Agency) ***** **** *** port *** **** ** destroyed ** ****** **. Additionally, **** **** *** a ******* ****** ******, which *** ** *******, making ** ******* ** a **** *** **** removed ** ********. ** tested *** ******* *** RJ45 **** ***** ***** below.

 PadJack SVE RJ45 Port Locks

** *** ***** ***** we *********** *** *** RJ45 **** ****, *** it ** *********, *** destroyed **** *******:

Securing *** ******

*******, ************ ****** *** also ** ******** ** connecting ******** ** * device *** *** *****. To ******** **** ****** USB **** ***** *** cable ***** *** ** used, ****** ** **** down ** ****** **** or ** ******* ** in-use ***** **** ***** removed.

** ******* * *** device **** ***** ******* or ***** ******* * USB **** *** ** used ** ****** *******, which *********** ******** ** a **** ***** ** plastic *** *********. ** the ***** ***** ** demonstrate ******** * ***** to ** *** ***** a******* *** ***** ****.

** ******** ** ********* devices **** ** ******** and ****, ****, *******, and ******* ******* **** likely **** * *** port ** ***** **** are *** ** ***. USB **** ***** ** port ******** *** ** used ** ******* ****** to *** **** *****, in * ******* *** that **** ******* ***** work.  ***** ***** ** a **** **** ** inserted **** * ****** USB ****, ****** ************ to ***** ******* *** key.  **** ***** ***** with ******** **** *** be **** ** ***** a **** ** *** ports **** *** ****.

USB Port Lock

Proprietary ******* *****: ****** ********, ***** ***********

***** ***** ******* *********** tools *** ********* ** security ** * *******. Some ***** *** ******** allen ** **** ****, or **** ***** **** blade ************, *** ** which *** **** ** come **, *** **** provide **** * ******* level ** ********. ***** may ***** ** ** use **** ********** ******* is * ****** ******* than ********.

*********** ******* ***** *** potentially * ******** ** using ***** *****. *** technicians *** *** ******* or ******* * ****** must ***** * **** with ****, ** **** will **** ** *** of ******** *** *****.

* **** *** ** left **** ******* ** site, ** ****, ** a **********, *** **** opens ** *** ****** to *********. *********** ***** are *********** ** **** and ******** **** **** the ***** ** ** additional ******.

No ***** *** ********** *********

* ***** ********** ******** will **** * *** to ****** ***** *****, though **** ******* * level ** ********** ******* less ************* ******* ** accidental *******. ** *** lock *****'* *** *********** tools, ** ** ****** enough ** ****** *** what ** ****** ** unlock **.

**** ** ** **** use *********** *****, ********, cutting ****, ** ******** may ***** ****** *** lock ********** *******, ****** will ******* **** ********** motions *** **** *********** tools. ** **** *** be ** **** ** ordering *** ******* ****. If *** **** *****, those ***** ******* ** gain ****** ** * given ***** *** **** a *** ** ****** cut ** *** **-********* it, ***** **** ** undetected ** **** ********.

*** ***** *******, ***** locks *** ***** *** recommended ** **** *** layer ** ******** ** provide * ******* ** deterrence *** *****.

******* Security *********

** ** ********* ** go ****** **** ******** security.  *** **** *********** on ******** ******** ****** check *** ***** ******* reports:

Comments (9)

******* **** *******-**-***** ******** is ** ***** **** monitoring ** **** ******* switches ** ****** *** time * **** ***** up. **** *** **** detect ***** ******* ******* into *** *******, ** well ** ******* **** might ** ********. ** obviously ****** ** ******** for ***** **** *** connected ** ******* **** office ***, ** ***** equipment **** ** ******** to ***** ***** * lot, *** ***** *** generally *** *** ***** you *** ******* ***** for ***** *******, ** they *** ******* *** in *** ****.

***** **** ********** ** your ******* ******** ** report *** **** * port ***** **

** *** ***** ****: *** **** *** ******: Network ********

****, ** ***'** ******* on *** *** *** kind ** ******* ******, you *** ******** *** from *** ***** ** worrying ***** (** ***** aware **) ****** **** advanced **** ******** **********.

***, ***** **** ** the *** ******.

****** **, *** *** those ********** ** **** information ****** *** ***** ************, we **** * ****** here.

*** *** ***** **** would **** **** ***** years *** **** **** software ********* ******** * USB ******. *** ** looks **** * ***** drive ** ** **** be * ***** *****. Doh!

** **** **** ***** for *** ***** **** and **** **** **** for *** ******** ***.

******** ***** ******** ****

********** ******** ****** ****** ports ** * **** start, *** ******* *** ports ************** ** **** likely ** ***** ******. Using * ***** **** VLAN ** ****** ********* ports ** **** ** prefer ** **. **** system ***** ***’* ******* people **** ********** ******** patches, *** ** **** prevent ****** ** ****** ports.  

*** - **** ****** and ******, **** ****** be **** ** * larger **** *** *** we ***** *** '******* Security *********' *******. ** the ********** ****** ** review *** *********** ********* unused *********** ** **** as ***. * *** have ** *** ***** hole *****.

**** *** *** *** issues **** ***** ********** to ******** *** / move / ****** / work ******* ** *** a **** *****?

** ****** *** ** to ****. ***** **** Unifi ******** ***** **** really ****. ** *** check ****** ************** ******* with *** ******. **** changes ** ****** ***. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Security Sales Course 2020 - Last Chance Save $50 on Dec 05, 2019
This sales course is customized for the current needs and challenges specific to professionals selling video surveillance and access control...
Ireland National Children's Hospital Chooses Hikvision End-to-End With Facial Recognition on Dec 05, 2019
The world's most expensive hospital project ever, the New Children's Hospital in Ireland, has chosen an all-Hikvision surveillance system including...
Hikvision Global News Reports Directory on Dec 02, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Directory of Access Reader Manufacturers on Nov 27, 2019
Credential Readers are one of the most visible and noticeable parts of access systems, but installers often stick with only the brand they always...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...
ISC East 2019 Show Report on Nov 21, 2019
IPVM has finished in New York City covering both days of the ISC East 2019 show. Here is a 6+ minute general walkthrough: Inside this report,...
Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless...
Biggest Low Light Problems 2019 on Nov 08, 2019
Over 150 integrators responded to our survey question: "What are the biggest problems you face getting good low-light images?" Inside, we share...
US Issues Criminal Charges For Fraudulently Selling Hikvision And Other China Products on Nov 07, 2019
The US government has made an unprecedented move on the video surveillance supply chain, charging a US company, Aventura for "having conspired with...

Most Recent Industry Reports

Disruptor Wyze Releases Undisruptive Smartlock on Dec 06, 2019
While Wyze has disrupted the consumer IP camera market with ~$20 cameras, its entrance into smart locks is entirely undisruptive. We have...
Bosch Budget 3000i Cameras Tested on Dec 05, 2019
Bosch has long had a hole in its lineup for, as it describes, "competitively-priced cameras". Now, Bosch has released its 3000i series cameras...
Anixter Resisting Takeover From Competitor on Dec 05, 2019
Mega distributor Anixter is going to be acquired but by whom? Initially, Anixter planned to go private, being bought by a private equity firm....
Security Sales Course 2020 - Last Chance Save $50 on Dec 05, 2019
This sales course is customized for the current needs and challenges specific to professionals selling video surveillance and access control...
Ireland National Children's Hospital Chooses Hikvision End-to-End With Facial Recognition on Dec 05, 2019
The world's most expensive hospital project ever, the New Children's Hospital in Ireland, has chosen an all-Hikvision surveillance system including...
AVTech ~$70 IP Cameras Tested Vs Dahua and Hikvision on Dec 04, 2019
Taiwanese manufacturer Avtech is taking direct aim at low cost leaders Dahua and Hikvision with ~$70 starlight and white light illuminator...
Ultinous European Analytics Startup Company Profile on Dec 04, 2019
European analytics-startup Ultinous pitches customers to "Have your own video analysis service!" We spoke to Ultinous to better understand their...
Access Startup Multi-Mount Aims To Streamline Reader Installs on Dec 03, 2019
Startup Multi-Mount claims it makes installing access readers 'Fast', 'Secure,' and fit 'any size frame.' The company states its bracket 'fits most...
Resideo CEO To Step Down on Dec 03, 2019
Resideo's CEO, Mike Nefkins, is stepping down, just 18 months after being brought in to lead the now plagued spin-out. Inside this note, we...
Arcules CEO Retracts False GDPR Claim + Dahua and Milestone Claims Examined on Dec 03, 2019
Arcules CEO has retracted a false claim about his organization being a "fully compliant GDPR company" after IPVM reporting (Arcules CEO Threatens...