Network Ports for IP Video Surveillance Tutorial

By Brian Rhodes, Published Jan 20, 2016, 12:00am EST

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work. Beyond that it is critical to understand how they relate to security.

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

Why ***** *** ****

* ******** **** ********* have * ****** ** address *** **** ***** communicate *** ********* ************ or ********.

** *********** ****, ** addresses ******* ******** '*****', up ** **,***. ***** (also ****** '*******') ****** particular ******** *** **** to **** ** ****** in * *******, **** from ******* ** * recorder, ** * ******** to * ******. ***** help * ******** **** how ** *** *** data ** ********, ** with *** **** ******** on * ***** **** can ** ******* ********* for *******, ** ****** can ** ******** ** an ***** ****** *** reading, ** *** ******* by * ******* *** so **.

**** *** ***** ***** of ***** *********, *********** portions ** ******* ******* are ******** *** ******** use ** ******** ************, and **** ******* ****** up *** ******* ** a ********'* ******** ************ knowing ***** **** ******* and ***** **** **** not.

Port ******

*** *** ********** ***** are ********* ** * variation ** *** ** address ******. *** *******, an **** ******* **** is ********** ** ****** a ***** *** **** number ** *** ***, like **** (**** ***** in ****):

***.***.*.***:***

**** *** ***** * webpage, *** ***** ****** there ** ** **** needed *** **** ** only ******* *** ******** handle **** *** ***. For *******, *** ** address **** ****.*** ** 23.22.211.9. ***** ** ****://**.***.***.** and *****://**.***.***.**:** **** **** you ** *** **** homepage, ** ** **** that *** ******* ***** / ******* *** **** port ** **** *** type ** "****://"

How *** ***** ********?

**** ******* *** ******** according ** ***** ******, based ** *** ******* or *** ******** **** are ** ******* ******* applications. *** ********* *****, from #* ** #**,*** are ******** ***********:

  • ****** *****, **** ***** - ****: ****** Ports *** ******** ******** ********* **********. ***** *** ******** for *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** Ports *** ******** ****************. ***** *** *** specific ******** ********* ***. Many ************ *** ******** platforms **** **** ************ in **** *****.
  • ******* *****, **** ********* - *****: ******* Ports *** *** ********. This ***** ** *********** not ************* *** **** open *** ******* ***, often *** ******* ** temporary *********** ****** * network. **** ** **** surveillance ************* ***** *** for ***** *** ******** communications ******* ***** *******/********* and *******.

*** ***** *********** *** assigning **** *********, ******** Assigned ******* ********* (****), ** **** ** the **** ********* ***** that ******* ** ******* allocations *** * ****** of ***** '**** *****' administrative *** ** ****** internet *** ******* ***.

Well-Known *****

**** ** ***** ** typical ***** ***** **** by ************, *** **** generally **** *** **** ports *** ***** ** the '******' *****, *********:

  • **** **: **** (********* Transfer ********) *** ******* websites *** *** *******
  • **** **: *** ******* for **** ********, ********* image *****
  • **** **: ***, ** secure ***** ******** *** port ********** *** ****** portal ******
  • **** **: ******, ** unencrypted **** *************, ***** used *** '******* **** control' ** ******* *** even *******.
  • **** ***: ****** ****** Layer, ** '*******' **** traffic.********** **** ** ****** video*******.
  • **** ***: **** (**** **** ********* ********) *** *****, **** widely *** * ***-********* for ***** *******

***** *** **** ****-**** ports, ****** **** *** not ******** ** ************ applications. *** * **** list **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* use **** *********** **** are ************ ******** *** their ***. **** ** these ************ *******:

  • **** ****: ***** ******** Digital ***** ********* *** Enterprise ******* *******
  • **** *****: *********** ***** client
  • **** *****/**: ***** ***** forwarding ****
  • **** *****: ******** *** video ******
  • **** *****: **** ****** discovery ********

Port ******** ****

** **** *****, ************ platforms **** *** '********' user ** ******* ***** that **** ** ******** to **** ******* ******* security ********* *** ***. If ***** **** *********** are *** ***** *** approved, ***** ************ ******* will *** ****.

**** ******** ********* *** networks ***** ******* ******** traffic *** ***** *** those ********** ******* *** recognized ***. ** *******, part ** '******* ****' a ******* ******** ******* off ***** ** ********* regardless ** ***** ** address *** ********* ****. This ********* *** **** of ******* ******* ** other ******** **** ******* through **** * *******.

**** ***** ******** *********** *** ******* ***** that **** ** ******* from *** *************.

Multiple **** *** ******

************ ******* ********* *** multiple ***** ****** *********. Despite * ****** ** a ******** ****** **** one ** *******, **** single ******** *** **** many ********* ***** ********** or ******* ****. ** general, ******* ** *** requisite ***** ****** ** the ************ ****** ** part ** *** ******* configuration *******, **** ***** typically ********** * **** of ****** ***** **** this ******* *******.

NMAP **** ******** *****

******* ************ ******* *** open **** *****, ********** the ***** ** **** those **** *** ****** is * *** ******* security ****.

********** ***** ****** ******* exploits ****** ********* ** ports ****** ** ************ systems, ***** *********** ** **** ** find **** ***** **** be ****** *** ***** ports *** ** ****** by ******* *** ******** or ****** ******** **** UPnP, ******, *** ***. Below ** ******* * screenshot ** ** **** scan.

*** **** ******* ** how **** *** ******** and **** ******** **** port ******** *****, *** our:******* ** ***********.

Comments (4)

Excellent article Brian - Thank you. Comprehensive overview and easy to understand :)

Does changing ports from default help with security? Such as changing 80 to 103.

Yes, if you are being scanned, many bots try only the well known ports to save time. You can use one in the thousands, as long as no other network traffic is using it.

Still don't get it. I need a picture I guess. If your coming in from the outside your ip address isnt going to be a 192.168.000.000 number. It will be a public number. So explain it from coming outside to a computer/ server inside with a vms on it. 

Read this IPVM report for free.

This article is part of IPVM's 6,653 reports, 896 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now
Loading Related Reports