Locking Down Network Connections Guide

By: John Scanlan, Published on Apr 23, 2019

Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected against such attacks and can be done with relatively low-cost means.

free image

Inside this guide, IPVM explains how they work and what the tradeoffs are. To do so, IPVM bought and tested these locking devices. 

We include 3 video demonstrations, reviewing the methods, demonstrating how they are used, and give our recommendations.

********* *** ****** ******* are ***** **** ******* connections *** *** ****** down. ******** *** ***** surveillance ******* ****** ** protected ******* **** ******* and *** ** **** with ********** ***-**** *****.

free image

****** **** *****, **** explains *** **** **** and **** *** ********* are. ** ** **, IPVM ****** *** ****** these ******* *******. 

** ******* * ***** demonstrations, ********* *** *******, demonstrating *** **** *** used, *** **** *** recommendations.

[***************]

Why **** ****

***** *** ******* ********** to ******* **** ******* on ************ ***********, *** example:

  • **** *** ******* ********* / ******* ********** *********** from ***** ******
  • ******* ***** / ********** devices **** ********** ** the ************ *******
  • **** *** **** ******** NVRs *** ******* ******** Ethernet *****, ** **** point ** ***** *** anyone **** ****** ** network *****
  • ****** ****** *** ** in ****** ********** *********, such ** ********** ** a "*******" **** ** a ******* ** **** simply ******* **** * bullet ** *** ****** cable ****, ********* ** tools *** *************

Summary / ********

***** *** *********** ***** common ***** ** **** and ***** ***** ********** to ** ***** *** security *******.

******* ***** ***** *** **** ** **** the ***** ***** ** the **** ****. **** slide **** *** ******* plug ** * ***** cable, ******** *** ******* tab, ** ** *** not ** ********* ** remove *** *****. **** locks ********** ******* *** entire *** ** ******* potential ********* ** ********, while ****** ***** ** exposed, *** ********** ** break ** ********* ****** most ** *** *** engaged ** *** ****, so *** ***** *** still *** ** *******.

**** **** ***** *** **** ** ******* access ** ***** *****. They *** **** ****** ports **** ** ******** or ***** ***** *****, extending * *** **** the **** ******* ** a ***** ***** *** locked ** ***** **** a *********** ***. **** are ********* *** *******, to ******* ********* **** gripping *** **** **** tools, **** ** ******, to ******* ** ****** it.

*** ****/***** *****: *** ***** ***** *** used ** **** **** USB ****** **** *** USB **** *.*. ******* a ***** **** ***** disconnected **** ** ***. They *** ********* ***** component ******* **** *** piece ******* **** *** 

*** **** ********* *** cable, **** ******* **** wraps *** ***** ******** both **** *****, *** USB *****, *** *** device. **** *** ****** use *** **** ** cut ** **** *** cable.

Vote / ****

Manufacturer *******

******** ************* ******* ***** cable *** **** *****, of ******* ******, ********* *******,***** ***,** ********, **********.

***** ******* ***** ****** in *****, **** ~$* USD *** *** ****** cost ** ~$** *** serialized ******* ******.

***-********** ****** ******** **** locking ********** *** **** available [**** ** ****** available].

Securing ***** ******

******* ***** ***** ******* a ********* **** *********** being *********** ** ************ disconnected. ***** ***** ***** the ******* *** ** it *** *** ** depressed ** ******* *** cable **** *** ****/****.

***** *** **** ********* in ***** ***** ****** may *** ****:

  • ***** *****:***** ***** ***** ****** will *** **** **** most ****** ***** ***** if *** **** **** be ******* *******, ** the *****/****** ******** ** manufacturers ****** ****** *** the ******* ****** ****** it.
  • ****** ***** ******:****** **** ****** ****** boots *** ***** *** lock **** ***** ********, forcing *** **** ** be ******* ** ******* to **** *** *****.
  • ****** ****** ********:*******, ***** *** ****** not *** ****** ****, bullet, ** ***** ****** housings, *** ** ***** constraints. *** *** **** in **** ***** ***** a ****** ****** *** be ******* **** *** dome *** ********, *** this **** ********** ************ time.

** *** ***** ***** we *********** *** ************ and *** ** * patch ***** **** *** these ******.

Securing ****** *****

***** ***** ***** ***** secure ****** ** ***, unused ***** *** **** be *******. *** ***** below ***** ** ******* of ***** ***** ******* plugs, ***** *** **** to ****** ****** ******** ports, *.*., ****, ********, mispans, **** *****, ***** panels, ** *** ***** female **** **********.

************, ***** *** **** port ***** ***** *** single ***. *** *******, the ******* **** **** (developed ** ************ **** the ** ******** ******** Agency) ***** **** *** port *** **** ** destroyed ** ****** **. Additionally, **** **** *** a ******* ****** ******, which *** ** *******, making ** ******* ** a **** *** **** removed ** ********. ** tested *** ******* *** RJ45 **** ***** ***** below.

 PadJack SVE RJ45 Port Locks

** *** ***** ***** we *********** *** *** RJ45 **** ****, *** it ** *********, *** destroyed **** *******:

Securing *** ******

*******, ************ ****** *** also ** ******** ** connecting ******** ** * device *** *** *****. To ******** **** ****** USB **** ***** *** cable ***** *** ** used, ****** ** **** down ** ****** **** or ** ******* ** in-use ***** **** ***** removed.

** ******* * *** device **** ***** ******* or ***** ******* * USB **** *** ** used ** ****** *******, which *********** ******** ** a **** ***** ** plastic *** *********. ** the ***** ***** ** demonstrate ******** * ***** to ** *** ***** a******* *** ***** ****.

** ******** ** ********* devices **** ** ******** and ****, ****, *******, and ******* ******* **** likely **** * *** port ** ***** **** are *** ** ***. USB **** ***** ** port ******** *** ** used ** ******* ****** to *** **** *****, in * ******* *** that **** ******* ***** work.  ***** ***** ** a **** **** ** inserted **** * ****** USB ****, ****** ************ to ***** ******* *** key.  **** ***** ***** with ******** **** *** be **** ** ***** a **** ** *** ports **** *** ****.

USB Port Lock

Proprietary ******* *****: ****** ********, ***** ***********

***** ***** ******* *********** tools *** ********* ** security ** * *******. Some ***** *** ******** allen ** **** ****, or **** ***** **** blade ************, *** ** which *** **** ** come **, *** **** provide **** * ******* level ** ********. ***** may ***** ** ** use **** ********** ******* is * ****** ******* than ********.

*********** ******* ***** *** potentially * ******** ** using ***** *****. *** technicians *** *** ******* or ******* * ****** must ***** * **** with ****, ** **** will **** ** *** of ******** *** *****.

* **** *** ** left **** ******* ** site, ** ****, ** a **********, *** **** opens ** *** ****** to *********. *********** ***** are *********** ** **** and ******** **** **** the ***** ** ** additional ******.

No ***** *** ********** *********

* ***** ********** ******** will **** * *** to ****** ***** *****, though **** ******* * level ** ********** ******* less ************* ******* ** accidental *******. ** *** lock *****'* *** *********** tools, ** ** ****** enough ** ****** *** what ** ****** ** unlock **.

**** ** ** **** use *********** *****, ********, cutting ****, ** ******** may ***** ****** *** lock ********** *******, ****** will ******* **** ********** motions *** **** *********** tools. ** **** *** be ** **** ** ordering *** ******* ****. If *** **** *****, those ***** ******* ** gain ****** ** * given ***** *** **** a *** ** ****** cut ** *** **-********* it, ***** **** ** undetected ** **** ********.

*** ***** *******, ***** locks *** ***** *** recommended ** **** *** layer ** ******** ** provide * ******* ** deterrence *** *****.

******* Security *********

** ** ********* ** go ****** **** ******** security.  *** **** *********** on ******** ******** ****** check *** ***** ******* reports:

Comments (9)

******* **** *******-**-***** ******** is ** ***** **** monitoring ** **** ******* switches ** ****** *** time * **** ***** up. **** *** **** detect ***** ******* ******* into *** *******, ** well ** ******* **** might ** ********. ** obviously ****** ** ******** for ***** **** *** connected ** ******* **** office ***, ** ***** equipment **** ** ******** to ***** ***** * lot, *** ***** *** generally *** *** ***** you *** ******* ***** for ***** *******, ** they *** ******* *** in *** ****.

***** **** ********** ** your ******* ******** ** report *** **** * port ***** **

** *** ***** ****: *** **** *** ******: Network ********

****, ** ***'** ******* on *** *** *** kind ** ******* ******, you *** ******** *** from *** ***** ** worrying ***** (** ***** aware **) ****** **** advanced **** ******** **********.

***, ***** **** ** the *** ******.

****** **, *** *** those ********** ** **** information ****** *** ***** ************, we **** * ****** here.

*** *** ***** **** would **** **** ***** years *** **** **** software ********* ******** * USB ******. *** ** looks **** * ***** drive ** ** **** be * ***** *****. Doh!

** **** **** ***** for *** ***** **** and **** **** **** for *** ******** ***.

******** ***** ******** ****

********** ******** ****** ****** ports ** * **** start, *** ******* *** ports ************** ** **** likely ** ***** ******. Using * ***** **** VLAN ** ****** ********* ports ** **** ** prefer ** **. **** system ***** ***’* ******* people **** ********** ******** patches, *** ** **** prevent ****** ** ****** ports.  

*** - **** ****** and ******, **** ****** be **** ** * larger **** *** *** we ***** *** '******* Security *********' *******. ** the ********** ****** ** review *** *********** ********* unused *********** ** **** as ***. * *** have ** *** ***** hole *****.

**** *** *** *** issues **** ***** ********** to ******** *** / move / ****** / work ******* ** *** a **** *****?

** ****** *** ** to ****. ***** **** Unifi ******** ***** **** really ****. ** *** check ****** ************** ******* with *** ******. **** changes ** ****** ***. 

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Breaking Into A Facility Using Canned Air Tested on Jan 28, 2020
Access control is supposed to make doors more secure, but a $5 can of compressed air may defeat it. With no special training, intruders can...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Lock Guide on Sep 26, 2018
In this guide, we examine locks; critical elements of any security system and fundamental parts of every access control system. Two fundamental...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...
Keypads For Access Control Tutorial on May 31, 2018
Keypad readers present huge risks to even the best access systems. If deployed improperly, keypads let people through locked doors almost as if...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
Hikvision Upgrade Breaks ONVIF VMS Integration on Oct 31, 2017
Hikvision IP cameras using ONVIF for VMS integration will break when upgrading to Hikvision new 5.5 firmware, IPVM testing has verified. This...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...

Most Recent Industry Reports

Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...