Mobile VMS Top Integrator Problems

Author: Ethan Ace, Published on Oct 24, 2016

In an IPVM survey, integrators report 4 problems most consistently with using mobile VMS applications:

  • Network setup / cybersecurity concerns
  • Latency / Delay / Throughput issues in connecting to video
  • Lost settings / updates break connectivity
  • Complexity / unclear UI

In this report, we share dozens of integrator's feedback on using mobile VMS apps, reviewing these issues and more.

** ** **** ******, *********** ****** * ******** **** ************ with ***** ****** *** ************:

  • ******* ***** / ************* ********
  • ******* / ***** / ********** ****** ** ********** ** *****
  • **** ******** / ******* ***** ************
  • ********** / ******* **

** **** ******, ** ***** ****** ** **********'* ******** ** using ****** *** ****, ********* ***** ****** *** ****.

[***************]

Network ***** / *************

*** **** ******** ********* ** *********** *** ******* **** **** forwarding/cybersecurity ** ****** ****** *** ******. ******** ** *********** **** cited ** * ****** ********, ** **** ** *** **** to ***** ****** ** ***** ******* *** *** ********, ** through *** ******* ** ********* * ****** **/*** *****, ****** a ***, ***. ******* ****** ********* ******* ****** *** ***** *************** *********** ** ***** ******* *** ***** **** *** ****.

  • "**** *********' ** *********** *** ********* ** **** ** ********* to ***** ******** ******, ********* *** ****** ***(*) **** **** work ****** ***** **********, ****** ***** ** *** ******."
  • "*** ******* ***** * *** **** ****** *** **** ** the ******** *************** **** **** **** ******* *** *** ****** on *** ********. **** ************* ** * **** *** ** segregating ***** ****** ******* ** ******** *** ******, *** **** like ******* ** ******* **** *** ***** ************* ******** *** in ******* * ***** *** ************* ** * **** *** of ***** ********* *** ***** *** *********** ** ** *** potential *******. * ***** **** ************* **** ** ****** **** in ***** ********* ******, *** **** *********** ***** ** ******* cybersecurity ********* **** ***** ************* ******* (********* *** ************* **** to ** ****; ************* ******* *** ** ** ****** *** to ********* ****** ********* *** *** ** ******** **** ******* calls)."
  • "**** ********** *** ******** **** ********* *** ****** **** *** internet."
  • "** **** *** *** ******* *** ********* **** *** * find **** **** ****. *** ******* ***** ** ********** ** getting *** *** ***** ** **** ** ******* * ****** DNS ***** *** *** ** **** **********."
  • "*** ******* ******* **, *** ** ***** **** ********** ** the ******** ******. ******* ** ***'* **** ****** ** ******."
  • "******* ** *********** ** **** ** ******** ***** *** ****** access. ****, ******* ***."
  • "**** ** *** ********* ***'* *** *** ****** **** ******* of ****** ****** ** ***** *** ******** ** *****. **** don't *** ****** ** * ******* ***** ** ** ***** own ********, *** ********* ** ******** **** *** **** ** something **** ***'* ** **** ***** ****** ******* ******."
  • "** ** ********** ** **** ** ********* ***-**-*** *************. ************ issues ** ** **** ******* *** ******* **** ** ** usually ** *** **** *** ******* **** *** ********** **** owned ** *** ******** ** *** *******."

Latency / ***** / **********

*********** **** ********* ********** *** ******* ** ******* ****** ** mobile ****. ***** ****** *** ********* ** ******* *******, ********* internet ****** ***** ** *** ******** ********, ******** ******* *****, and ****** ********** *****, *** ** ***** **** ****** **** case ** ****, *** *** ******* ** ********** **** *****.

  • "*** ******** *** ****** *** ******* ** ** ***** **** the ******** *******. *** "***-******" ** "*****" *** **** ******* is ********* ** ******* *** ***** ** ****."
  • "**** **** **** ***** ****** ****, ***** ** ******** ** a *** ****** *** ******."
  • "*** *** *** ** ********* **** ** ******* *** ******* recorded ***** ** **** **** *******."
  • "*** ****** ** ****** *** **** ******** ********* *** ** general ** *** **** ****** ** *** ***/*** ***. ** a *** ********** *** *** * ******* *********."
  • "**** *** *** ******** **** ** **** *******, *** *** control ** ***"
  • "* ***'* **** * ******* **** **** *** **. ***** is ***** ****** ********* ** **** ********'* ************. ** **** estate ***** ** ** *** ******; ********, ********, ********. ** our ******** ** ** *********, *********, *********."
  • "**** **** *****, **** **** ***** ** ***** ***."
  • "*** **** *** ** *** ***** *********"

Settings **** ** ******

******** *********** ***** **** ******* *** ***** *** ******** ** be ****, ********* ***** ** ***** ***/** *** ******* *****, which *** ** ******** ** ******* ** **** *** ******* a ******* ** **** ******* **** ** *****.

  • "*****. ***** ********** *** ******** ********* *******. *** ****** ***** working, ****** **** ******* ** ********* ****** ** ******* *** breaks ************* **** *** *** ******. ***** ********. ** ******** nightmare. ********* ***** ************ *** *** ****. ** ****** * real ******** *** **. ** **** ** *** ***** *** higher *** **** *** ** **** ******* ****** ****** **** are ****** *** ***** ***** ********* *********."
  • "* **** **** *********'* *** *****'*. * **** ***** ** be *** ****** ** *** *** *** **** ***** ** occasion **** *** *** *** ****** ******* ****** ** ********* else *** ******** ** *** ***** **** ****** *** ** the ****** ***** ** ** ***** ***."
  • "*** ***** **** ***** **** ****** **** ** **** **** updating *** **** ********* ***** **** ** ******* ***** *********** and **** ****** **** ******** *** ***********. **'** ****** * human ******** ****** *** * ******** ** *** ********* ***** is ***** *********** **** ** *** ******** ********* ** *********** critical *********** *** *******."

Too *******

*******, ******* *********** ********* **** ****** **** **** *** *********** or *********, ********** ****** *****/******* *****.

  • "*****, *****, ***** ****'** ******* ** ********* *** ****** *****. There *****'* **** ** ** * **** *************** *** *****. It ***** **** ***** *****. ******* **** ** ***** ***. Some ** ** ***** ********* **** ******* ****** **** *** little **** ** **** * ******* ** *** **** *** very **********. **** ** ***** **** **** ***** ******** ***** and **** **** *** **** ********* ********? * ***** ** need ** *** **** **** ******* ******** *** *** **** to ****, ** ** ***** **** * ********* ******** *** icons."
  • "** *********** *** **** *****. *** ******* *** *** ***** to **********."
  • "*** ***********. *** *********** ***** ** **** ********** *** ***- tries ** **** ** ** *** ****. ***** *** *** difficult ** *** ** ** *** ***** ************* ******** *** a ****** ***- **** ****, ****** ******, ***** ********."

Upcoming ****** *** ****

** *** **** *** *****, ** **** ** **** ******* mobile **** **** ******* *************, ********* *********, *****, *****, *** more, ** ****** ***** ****** *** ****, ********* ********* ******** on **** **** * ** **********. ** ***** *** ****** not ********* ****, *** ** **** ** *** ********.

Comments (14)

Hm, there is not integrators, but installers problems listed :D

Another big issue is AD integration on the app side. Some have it, some don't, and some just aren't very clean. For example, Avigilon requires both an "operator user" to login to the gateway server, and then another user (which can be your AD user) to login to the site. Milestone is capable of using just your AD user for authentication, and that's what other apps need to aspire to do as most users don't want to remember multiple users. Some apps that support AD on the PC clients don't even support it on the mobile apps which seems ridiculous.

Mobile app's issues was already listed by IPVM - "cheap" products has more better mobile support, than "serious" VMS.

Milestone causes issues by routinely failing pci compliance, also if you try to use an industry standard https certificate you have to extract out the certificate in a convoluted way. What's worse they don't provide the tools built in so you extract with 3rd tools which is time consuming. To be honest they should "do a Google" and only support https and do it in an easy to implement way.

*** I work for Milestone ***

UI2, can you expand on "Milestone causes issues by routinely failing pci compliance"? Are you referring to PCI compliance in regards to protocols (SSL, TLS, etc). and ciphers or something else?

*** I work for Milestone ***

To follow-up on Jared's question, I'm curious if you also know of an example of an application (doesn't have to be VMS related) where it is easy and intuitive to import publicly signed certificates?

In my experience it can be a painful process for a lot of applications and I'm not sure I've encountered an application where this is handled intuitively from beginning to end. This is further complicated thanks to certificate providers using varying processes for generating the private key and delivering the resultant public key in different formats.

IIS comes close but it can still be confusing if your public/private key pair are separated and need to be combined into a single PFX. I always get stuck using openssl command line tools at some point even on private projects relating to Apache, IIS or nginx.

If you have an example of a dead simple process I'm genuinely interested in looking into this.

Hi Both,

Yes we are seeing a lot of sites now requiring PCI compliance. We find Milestone ( and others ;) ) always fail using the self signed, and port 8081 Mobile port. We switch off 8081 by default but setting up https seems so hard, I found a update on milestone support forums but just couldn't get it to work - the result is we now switch off Milestone mobile for PCI sites. Also the mobile port is a the hardest because its the only port you cant lock to a external IP, the very nature of it is you are accessing from a variety of random networks.

Joshua gave the example of IIS and yes this just works, you buy the certificate you drop it in and that is it.

I was working through this below but lost the will to live... :D

http://forum.milestonesys.com/yaf_postst2971_Purchase-Install-real--not-self-signed--SSL-cert.aspx

This is a typical failure we see :)

CVSS Base Score: 4.3 AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSS Temporal Score: 3.7 E:POC/RL:U/RC:UR
Severity: 3
QID: 38603
Category: General remote services
CVE ID: CVE-2014-3566
Vendor Reference: POODLE
Bugtraq ID: 70574
Last Update: 2016-01-06 21:57:28.0
VULNERABILITY DETAILS
PCI Severity Level:
PCI COMPLIANCE STATUS
SSLv3 Padding Oracle Attack Information Disclosure Vulnerability (POODLE) port 8082 / tcp over ssl

RESULT:
N/A
SOLUTION:
Disable SSLv3 support to avoid this vulnerability.
Examples to disable SSLv3.
nginx: list specific allowed protocols in the "ssl_protocols" line. Make sure SSLv2 and SSLv3 is not listed. For example: ssl_protocols TLSv2 TLSv1.1 TLSv1.2;
Apache: Add -SSLv3 to the "SSLProtocol" line.
How to disable SSL 3.0 on Microsoft IIS.
For PCI, please refer to the Qualys community article.
IMPACT:
An attacker who can take a man-in-the-middle (MitM) position can exploit this vulnerability and gain access to encrypted communication between a client and server.
THREAT:

The Mobile Server is .NET based and uses standard Windows libraries which also means it will use whatever protocols and ciphers are enabled in Windows. By default, Windows has them all enabled. You can disable the ones that you do not need. There are different ways of doing this but one of the better ones I have found is by using a program called IIS Crypto (https://www.nartac.com/Products/IISCrypto). It has a template for PCI compliance that will disable anything that isn't PCI compliance.

I'll let Josh answer the certificate questions. :-)

It sounds like the biggest pain point is that the Mobile Server does not assist with generating the CSR which is understandable. Ideally you could generate the CSR, and complete the cert request within Mobile Server much in the way you can within IIS. Hopefully that is something we can put on the roadmap.

In the meantime I believe despite what is written in the forum, you can still use IIS to generate and complete the CSR. If I'm not mistaken it doesn't necessarily even need to be done on the same machine as the Mobile Server. Once finished, you can export the certificate including private key into a PFX file which can be imported in Mobile Server.

Point taken though - I appreciate the feedback and will pass it on.

Hi Both, really useful feedback :)

Joshua are you saying if you have the csr in IIS ( I Do ) can can export it out for Milestone?

Thanks again

Hi UI2 - It has been several months since the last time I went through the process so I could definitely be mistaken, but I'm fairly sure I have used IIS to both generate the CSR and "Complete the request". You should then be able to open the Certificate Manager (certmgr.msc) and export the cert, including the private key, in a password-protected .PFX file which in turn can be imported into the Mobile Server.

And as long as the hostname used for the CSR matches the DNS name you plan to access the Mobile Server with, I think you can technically do the IIS portion on a completely different machine if needed.

I'd say don't quote me on this but too late now ;) Hopefully we can make this workflow easier in a future version.

Josh is correct. You can create the CSR in IIS, upload it to your preferred public CA, download the issued cert, choose to complete request in IIS, and then you can actually choose to export it straight from IIS. No need to go to certmgr to do so. Then it'll upload just fine into Mobile Server. Josh is also correct in that it doesn't have to be done on the VMS server. Can be done on any machine with IIS installed as long as the request CN matches the DNS used with mobile server. Did this a couple of weeks ago with a fresh 2016 R3 install.

Thanks for the assist UI1, and good to know the cert export can be done from directly within IIS - I had not noticed that before. Cheers

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...
Ubiquiti $79 Flex IP Camera Tested on Dec 07, 2018
U.S. Manufacturer Ubiquiti has released a 1080p, integrated IR IP camera, selling it directly for $79, making this one of the least expensive IP...
Infinova's Xinjiang Business Examined on Dec 07, 2018
As pressure mounts for companies to stop doing business in China’s Xinjiang region amid a severe human rights crisis, IPVM has found Infinova sold...
VMS Live Monitoring Shootout - Avigilon, Dahua, Exacq, Genetec, Hikvision, Milestone, Network Optix on Dec 05, 2018
Viewing live video is the first interaction and most common task most users have with a VMS. Who does it best and worst? Who offers the most...
ADT Wins Fire Death Suit But Faces Appeal on Dec 05, 2018
ADT/Protection 1 has won a wrongful death court case in which it was sued by the estate of a deceased customer. However, the attorney for the...
Fullerton Returns, Joins OpenEye on Dec 04, 2018
Eric Fullerton became one of the most famous people in the industry as the Chief Sales and Marketing Officer of Milestone as Milestone became the...
Hanwha L Series Lowest-Cost Camera Tested on Dec 04, 2018
Hanwha has released their lowest-priced IP camera line ever, the L series, that competes on price with low cost competitors Dahua and...
ADT Promotes DIFY - "Do It For You" on Nov 30, 2018
"Do It Yourself" (DIY) is a popular expression and has become such a common word that it has even made the Cambridge English dictionary. But why...
Strong Outlook For 2019 on Nov 29, 2018
Integrators are bullish for 2019, with nearly 80% showing a positive outlook in our integrator results from 160+ respondents: This is almost...

Most Recent Industry Reports

Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...
DVR Examiner - Video Recovery from Recorder Hard Drives on Dec 13, 2018
Bypassing passwords and long download times on-site, DVR Examiner collects and organizes video evidence directly from a hard drive extracted from...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Huawei Hisilicon Quietly Powering Tens of Millions of Western IoT Devices on Dec 12, 2018
Huawei Hisilicon chips are powering, at least, tens of millions of Western IoT devices, such as IP cameras and surveillance recorders, a fact that...
FLIR Launches Body Cameras Unified With VMS (TruWitness) on Dec 11, 2018
While FLIR is best known for their thermal cameras, now they have expanded into body cameras, launching TruWITNESS, a public safety focused body...
Startup Sunflower Labs' Autonomous Drone Security System on Dec 11, 2018
Startup Sunflower Labs is claiming a unique design on a home security system, combining autonomous drones and 'Sunflower' sensors. Imagine an...
The 2019 Video Surveillance Industry Guide on Dec 10, 2018
The 300 page, 2019 Video Surveillance Industry Guide, covers the key events and the future of the video surveillance market, is now available,...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact