Network Ports for IP Video Surveillance Tutorial

By: Brian Rhodes, Published on Jan 20, 2016

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work. Beyond that it is critical to understand how they relate to security.

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

Why ***** *** ****

* ******** **** ********* have * ****** ** address *** **** ***** communicate *** ********* ************ or ********.

** *********** ****, ** addresses ******* ******** '*****', up ** **,***. ***** (also ****** '*******') ****** particular ******** *** **** to **** ** ****** in * *******, **** from ******* ** * recorder, ** * ******** to * ******. ***** help * ******** **** how ** *** *** data ** ********, ** with *** **** ******** on * ***** **** can ** ******* ********* for *******, ** ****** can ** ******** ** an ***** ****** *** reading, ** *** ******* by * ******* *** so **.

**** *** ***** ***** of ***** *********, *********** portions ** ******* ******* are ******** *** ******** use ** ******** ************, and **** ******* ****** up *** ******* ** a ********'* ******** ************ knowing ***** **** ******* and ***** **** **** not.

Port ******

*** *** ********** ***** are ********* ** * variation ** *** ** address ******. *** *******, an **** ******* **** is ********** ** ****** a ***** *** **** number ** *** ***, like **** (**** ***** in ****):

***.***.*.***:***

**** *** ***** * webpage, *** ***** ****** there ** ** **** needed *** **** ** only ******* *** ******** handle **** *** ***. For *******, *** ** address **** ****.*** ** 23.22.211.9. ***** ** ****://**.***.***.** and *****://**.***.***.**:** **** **** you ** *** **** homepage, ** ** **** that *** ******* ***** / ******* *** **** port ** **** *** type ** "****://"

How *** ***** ********?

**** ******* *** ******** according ** ***** ******, based ** *** ******* or *** ******** **** are ** ******* ******* applications. *** ********* *****, from #* ** #**,*** are ******** ***********:

  • ****** *****, **** ***** - ****: ****** Ports *** ******** ******** ********* **********. ***** *** ******** for *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** Ports *** ******** ****************. ***** *** *** specific ******** ********* ***. Many ************ *** ******** platforms **** **** ************ in **** *****.
  • ******* *****, **** ********* - *****: ******* Ports *** *** ********. This ***** ** *********** not ************* *** **** open *** ******* ***, often *** ******* ** temporary *********** ****** * network. **** ** **** surveillance ************* ***** *** for ***** *** ******** communications ******* ***** *******/********* and *******.

*** ***** *********** *** assigning **** *********, ******** Assigned ******* ********* (****), ** **** ** the **** ********* ***** that ******* ** ******* allocations *** * ****** of ***** '**** *****' administrative *** ** ****** internet *** ******* ***.

Well-Known *****

**** ** ***** ** typical ***** ***** **** by ************, *** **** generally **** *** **** ports *** ***** ** the '******' *****, *********:

  • **** **: **** (********* Transfer ********) *** ******* websites *** *** *******
  • **** **: *** ******* for **** ********, ********* image *****
  • **** **: ***, ** secure ***** ******** *** port ********** *** ****** portal ******
  • **** **: ******, ** unencrypted **** *************, ***** used *** '******* **** control' ** ******* *** even *******.
  • **** ***: ****** ****** Layer, ** '*******' **** traffic.********** **** ** ****** video*******.
  • **** ***: **** (**** **** ********* ********) *** *****, **** widely *** * ***-********* for ***** *******

***** *** **** ****-**** ports, ****** **** *** not ******** ** ************ applications. *** * **** list **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* use **** *********** **** are ************ ******** *** their ***. **** ** these ************ *******:

  • **** ****: ***** ******** Digital ***** ********* *** Enterprise ******* *******
  • **** *****: *********** ***** client
  • **** *****/**: ***** ***** forwarding ****
  • **** *****: ******** *** video ******
  • **** *****: **** ****** discovery ********

Port ******** ****

** **** *****, ************ platforms **** *** '********' user ** ******* ***** that **** ** ******** to **** ******* ******* security ********* *** ***. If ***** **** *********** are *** ***** *** approved, ***** ************ ******* will *** ****.

**** ******** ********* *** networks ***** ******* ******** traffic *** ***** *** those ********** ******* *** recognized ***. ** *******, part ** '******* ****' a ******* ******** ******* off ***** ** ********* regardless ** ***** ** address *** ********* ****. This ********* *** **** of ******* ******* ** other ******** **** ******* through **** * *******.

**** ***** ******** *********** *** ******* ***** that **** ** ******* from *** *************.

Multiple **** *** ******

************ ******* ********* *** multiple ***** ****** *********. Despite * ****** ** a ******** ****** **** one ** *******, **** single ******** *** **** many ********* ***** ********** or ******* ****. ** general, ******* ** *** requisite ***** ****** ** the ************ ****** ** part ** *** ******* configuration *******, **** ***** typically ********** * **** of ****** ***** **** this ******* *******.

NMAP **** ******** *****

******* ************ ******* *** open **** *****, ********** the ***** ** **** those **** *** ****** is * *** ******* security ****.

********** ***** ****** ******* exploits ****** ********* ** ports ****** ** ************ systems, ***** *********** ** **** ** find **** ***** **** be ****** *** ***** ports *** ** ****** by ******* *** ******** or ****** ******** **** UPnP, ******, *** ***. Below ** ******* * screenshot ** ** **** scan.

*** **** ******* ** how **** *** ******** and **** ******** **** port ******** *****, *** our:******* ** ***********.

Comments (4)

Excellent article Brian - Thank you. Comprehensive overview and easy to understand :)

Does changing ports from default help with security? Such as changing 80 to 103.

Yes, if you are being scanned, many bots try only the well known ports to save time. You can use one in the thousands, as long as no other network traffic is using it.

Still don't get it. I need a picture I guess. If your coming in from the outside your ip address isnt going to be a 192.168.000.000 number. It will be a public number. So explain it from coming outside to a computer/ server inside with a vms on it. 

Read this IPVM report for free.

This article is part of IPVM's 6,532 reports, 880 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used...
NetApp Presents Hybrid Cloud Video Archive on May 11, 2020
NetApp presented its hybrid S3 cloud video archive at the April 2020 IPVM New...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Network Cable Usage Statistics 2020 (Cat 5e vs Cat 6 vs Cat 6a) on Sep 02, 2020
Integrators are split between using Cat 5e, 6, and 6a but 2 of them have...
"Fever Camera" Online Show June 2020 - On-Demand Recordings on Jun 03, 2020
IPVM has successfully completed the world's first "Fever Camera" show....
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Genetec Presents Security Center for Airports on Apr 28, 2020
Genetec presented its Security Center for Airports at the April 2020 IPVM New...
Directory of 206 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
Video Surveillance Trends 101 on Apr 01, 2020
This report examines major industry factors and how they could impact video...
Euklis Presents AI Analytics on May 05, 2020
Euklis presented its AI facial recognition, LPR, and object recognition...
Virtual ISC West and GSX+ Exhibiting Contrasted on Sep 17, 2020
Both ISC West and ASIS GSX are going virtual this year, just weeks apart, but...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...

Recent Reports

IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Norway Ethics Councils Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
Today is your last chance to save $50 on registration for the Fall 2020 Video...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...
China Bems Temperature Measurement Terminal Tested on Sep 22, 2020
Guangzhou Bems (brand Benshi) is the manufacturer behind temperature...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Milestone XProtect on AWS Tested on Sep 21, 2020
Milestone finally launched multiple cloud solutions in 2020, taking a...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Axis Compares Fever Camera Sellers to 9/11 on Sep 18, 2020
Axis Communications, the West's largest surveillance camera manufacturer, has...
Avigilon Elevated Temperature Detection Camera Tested on Sep 17, 2020
Avigilon has entered the temperature screening market with the release of...
Chilean Official Investigated for Motorola And Hikvision Contracts on Sep 17, 2020
A corruption investigation is underway in Chile after a crime prevention...
Huawei HiSilicon Production Shut Down on Sep 17, 2020
Huawei HiSilicon chips are no longer being manufactured or supplied to...
Virtual ISC West and GSX+ Exhibiting Contrasted on Sep 17, 2020
Both ISC West and ASIS GSX are going virtual this year, just weeks apart, but...