Network Ports for IP Video Surveillance Tutorial

By Brian Rhodes, Published Jan 20, 2016, 12:00am EST

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work. Beyond that it is critical to understand how they relate to security.

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

Why ***** *** ****

* ******** **** ********* have * ****** ** address *** **** ***** communicate *** ********* ************ or ********.

** *********** ****, ** addresses ******* ******** '*****', up ** **,***. ***** (also ****** '*******') ****** particular ******** *** **** to **** ** ****** in * *******, **** from ******* ** * recorder, ** * ******** to * ******. ***** help * ******** **** how ** *** *** data ** ********, ** with *** **** ******** on * ***** **** can ** ******* ********* for *******, ** ****** can ** ******** ** an ***** ****** *** reading, ** *** ******* by * ******* *** so **.

**** *** ***** ***** of ***** *********, *********** portions ** ******* ******* are ******** *** ******** use ** ******** ************, and **** ******* ****** up *** ******* ** a ********'* ******** ************ knowing ***** **** ******* and ***** **** **** not.

Port ******

*** *** ********** ***** are ********* ** * variation ** *** ** address ******. *** *******, an **** ******* **** is ********** ** ****** a ***** *** **** number ** *** ***, like **** (**** ***** in ****):

***.***.*.***:***

**** *** ***** * webpage, *** ***** ****** there ** ** **** needed *** **** ** only ******* *** ******** handle **** *** ***. For *******, *** ** address **** ****.*** ** 23.22.211.9. ***** ** ****://**.***.***.** and *****://**.***.***.**:** **** **** you ** *** **** homepage, ** ** **** that *** ******* ***** / ******* *** **** port ** **** *** type ** "****://"

How *** ***** ********?

**** ******* *** ******** according ** ***** ******, based ** *** ******* or *** ******** **** are ** ******* ******* applications. *** ********* *****, from #* ** #**,*** are ******** ***********:

  • ****** *****, **** ***** - ****: ****** Ports *** ******** ******** ********* **********. ***** *** ******** for *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** Ports *** ******** ****************. ***** *** *** specific ******** ********* ***. Many ************ *** ******** platforms **** **** ************ in **** *****.
  • ******* *****, **** ********* - *****: ******* Ports *** *** ********. This ***** ** *********** not ************* *** **** open *** ******* ***, often *** ******* ** temporary *********** ****** * network. **** ** **** surveillance ************* ***** *** for ***** *** ******** communications ******* ***** *******/********* and *******.

*** ***** *********** *** assigning **** *********, ******** Assigned ******* ********* (****), ** **** ** the **** ********* ***** that ******* ** ******* allocations *** * ****** of ***** '**** *****' administrative *** ** ****** internet *** ******* ***.

Well-Known *****

**** ** ***** ** typical ***** ***** **** by ************, *** **** generally **** *** **** ports *** ***** ** the '******' *****, *********:

  • **** **: **** (********* Transfer ********) *** ******* websites *** *** *******
  • **** **: *** ******* for **** ********, ********* image *****
  • **** **: ***, ** secure ***** ******** *** port ********** *** ****** portal ******
  • **** **: ******, ** unencrypted **** *************, ***** used *** '******* **** control' ** ******* *** even *******.
  • **** ***: ****** ****** Layer, ** '*******' **** traffic.********** **** ** ****** video*******.
  • **** ***: **** (**** **** ********* ********) *** *****, **** widely *** * ***-********* for ***** *******

***** *** **** ****-**** ports, ****** **** *** not ******** ** ************ applications. *** * **** list **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* use **** *********** **** are ************ ******** *** their ***. **** ** these ************ *******:

  • **** ****: ***** ******** Digital ***** ********* *** Enterprise ******* *******
  • **** *****: *********** ***** client
  • **** *****/**: ***** ***** forwarding ****
  • **** *****: ******** *** video ******
  • **** *****: **** ****** discovery ********

Port ******** ****

** **** *****, ************ platforms **** *** '********' user ** ******* ***** that **** ** ******** to **** ******* ******* security ********* *** ***. If ***** **** *********** are *** ***** *** approved, ***** ************ ******* will *** ****.

**** ******** ********* *** networks ***** ******* ******** traffic *** ***** *** those ********** ******* *** recognized ***. ** *******, part ** '******* ****' a ******* ******** ******* off ***** ** ********* regardless ** ***** ** address *** ********* ****. This ********* *** **** of ******* ******* ** other ******** **** ******* through **** * *******.

**** ***** ******** *********** *** ******* ***** that **** ** ******* from *** *************.

Multiple **** *** ******

************ ******* ********* *** multiple ***** ****** *********. Despite * ****** ** a ******** ****** **** one ** *******, **** single ******** *** **** many ********* ***** ********** or ******* ****. ** general, ******* ** *** requisite ***** ****** ** the ************ ****** ** part ** *** ******* configuration *******, **** ***** typically ********** * **** of ****** ***** **** this ******* *******.

NMAP **** ******** *****

******* ************ ******* *** open **** *****, ********** the ***** ** **** those **** *** ****** is * *** ******* security ****.

********** ***** ****** ******* exploits ****** ********* ** ports ****** ** ************ systems, ***** *********** ** **** ** find **** ***** **** be ****** *** ***** ports *** ** ****** by ******* *** ******** or ****** ******** **** UPnP, ******, *** ***. Below ** ******* * screenshot ** ** **** scan.

*** **** ******* ** how **** *** ******** and **** ******** **** port ******** *****, *** our:******* ** ***********.

Comments (4)

Excellent article Brian - Thank you. Comprehensive overview and easy to understand :)

Agree: 4
Disagree
Informative: 1
Unhelpful
Funny

Does changing ports from default help with security? Such as changing 80 to 103.

Agree
Disagree
Informative
Unhelpful
Funny

Yes, if you are being scanned, many bots try only the well known ports to save time. You can use one in the thousands, as long as no other network traffic is using it.

Agree: 1
Disagree
Informative
Unhelpful
Funny

Still don't get it. I need a picture I guess. If your coming in from the outside your ip address isnt going to be a 192.168.000.000 number. It will be a public number. So explain it from coming outside to a computer/ server inside with a vms on it. 

Agree
Disagree
Informative
Unhelpful
Funny
Read this IPVM report for free.

This article is part of IPVM's 7,092 reports and 940 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports