Network Ports for IP Video Surveillance Tutorial

Author: Brian Rhodes, Published on Jan 20, 2016

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work.

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

******* ***** *** ******** *** ****** ***** ******* *** ********* and ******* ****** *************, ** ***** **** *** ****.

** **** ********, ** *******:

  • *** ***** *** ****
  • *** ****** *** *****
  • *** ***** *** ********
  • ****-***** ***** *** ***** ************
  • ******** / ************ ******** *****
  • ***** ** **** *****
  • ******** **** *** *** *****
  • ***** **** ** **** *****

[***************]

Why ***** *** ****

* ******** **** ********* **** * ****** ** ******* *** will ***** *********** *** ********* ************ ** ********.

** *********** ****, ** ********* ******* ******** '*****', ** ** 65,535. ***** (**** ****** '*******') ****** ********** ******** *** **** to **** ** ****** ** * *******, **** **** ******* to * ********, ** * ******** ** * ******. ***** help * ******** **** *** ** *** *** **** ** receives, ** **** *** **** ******** ** * ***** **** can ** ******* ********* *** *******, ** ****** *** ** received ** ** ***** ****** *** *******, ** *** ******* by * ******* *** ** **.

**** *** ***** ***** ** ***** *********, *********** ******** ** network ******* *** ******** *** ******** *** ** ******** ************, and **** ******* ****** ** *** ******* ** * ********'* specific ************ ******* ***** **** ******* *** ***** **** **** not.

Port ******

*** *** ********** ***** *** ********* ** * ********* ** the ** ******* ******. *** *******, ** **** ******* **** is ********** ** ****** * ***** *** **** ****** ** the ***, **** **** (**** ***** ** ****):

***.***.*.***:***

**** *** ***** * *******, *** ***** ****** ***** ** no **** ****** *** **** ** **** ******* *** ******** handle **** *** ***. *** *******, *** ** ******* **** IPVM.com ** ***.**.**.**. ***** ******://***.**.**.*********://***.**.**.**:****** **** *** ** *** **** ********, ** ** **** that *** ******* ***** / ******* *** **** **** ** when *** **** ** "****://"

How *** ***** ********?

**** ******* *** ******** ********* ** ***** ******, ***** ** how ******* ** *** ******** **** *** ** ******* ******* applications. *** ********* *****, **** #* ** #**,*** *** ******** accordingly:

  • ****** *****, **** ***** - ****: ****** ***** *** ******** ******** ********* **********. ***** *** ******** *** *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** ***** *** ******** ****************. ***** *** *** ******** ******** ********* ***. **** ************ and ******** ********* **** **** ************ ** **** *****.
  • ******* *****, **** ********* - *****: ******* ***** *** *** ********. **** ***** is *********** *** ************* *** **** **** *** ******* ***, often *** ******* ** ********* *********** ****** * *******. **** is **** ************ ************* ***** *** *** ***** *** ******** communications ******* ***** *******/********* *** *******.

*** ***** *********** *** ********* **** *********, ******** ******** ******* Authority (****), ** **** ** *** **** ********* ***** **** ******* IP ******* *********** *** * ****** ** ***** '**** *****' administrative *** ** ****** ******** *** ******* ***.

Well-Known *****

**** ** ***** ** ******* ***** ***** **** ** ************, the **** ********* **** *** **** ***** *** ***** ** the '******' *****, *********:

  • **** **: **** (********* ******** ********) *** ******* ******** *** web *******
  • **** **: *** ******* *** **** ********, ********* ***** *****
  • **** **: ***, ** ****** ***** ******** *** **** ********** and ****** ****** ******
  • **** **: ******, ** *********** **** *************, ***** **** *** 'command **** *******' ** ******* *** **** *******.
  • **** ***: ****** ****** *****, ** '*******' **** *******.********** **** ** ****** ************.
  • **** ***: **** (**** **** ********* ********) *** *****, **** ****** *** * ***-********* *** ***** streams

***** *** **** ****-**** *****, ****** **** *** *** ******** to ************ ************. *** * **** **** **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* *** **** *********** **** *** ************ reserved *** ***** ***. **** ** ***** ************ *******:

  • **** ****: ***** ******** ******* ***** ********* *** ********** ******* Manager
  • **** *****: *********** ***** ******
  • **** *****/**: ***** ***** ********** ****
  • **** *****: ******** *** ***** ******
  • **** *****: **** ****** ********* ********

Port ******** ****

** **** *****, ************ ********* **** *** '********' **** ** dynamic ***** **** **** ** ******** ** **** ******* ******* security ********* *** ***. ** ***** **** *********** *** *** known *** ********, ***** ************ ******* **** *** ****.

**** ******** ********* *** ******** ***** ******* ******** ******* *** ports *** ***** ********** ******* *** ********** ***. ** *******, part ** '******* ****' * ******* ******** ******* *** ***** in ********* ********** ** ***** ** ******* *** ********* ****. This ********* *** **** ** ******* ******* ** ***** ******** from ******* ******* **** * *******.

Multiple **** *** ******

************ ******* ********* *** ******** ***** ****** *********. ******* * camera ** * ******** ****** **** *** ** *******, **** single ******** *** **** **** ********* ***** ********** ** ******* data. ** *******, ******* ** *** ********* ***** ****** ** the ************ ****** ** **** ** *** ******* ************* *******, with ***** ********* ********** * **** ** ****** ***** **** this ******* *******.

NMAP **** ******** *****

******* ************ ******* *** **** **** *****, ********** *** ***** to **** ***** **** *** ****** ** * *** ******* security ****.

********** ***** ****** ******* ******** ****** ********* ** ***** ****** by ************ *******, ***** *********** ** **** ** **** **** ***** **** ** ****** and ***** ***** *** ** ****** ** ******* *** ******** or ****** ******** **** ****, ******, *** ***.

*** **** ******* ** *** **** *** ******** *** **** minimize **** **** ******** *****, *** ***:******* ** ***********.

Comments (3)

********* ******* ***** - ***** ***. ************* ******** *** **** to ********** :)

**** ******** ***** **** ******* **** **** ********? **** ** changing ** ** ***.

***, ** *** *** ***** *******, **** **** *** **** the **** ***** ***** ** **** ****. *** *** *** one ** *** *********, ** **** ** ** ***** ******* traffic ** ***** **.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Networking

IP Networking Course on Jul 14, 2016
The reason for its popularity is that it is the only networking course designed specifically for video surveillance professionals plus it includes...
Ex-Avigilon Exec Backs Network Outage Prediction Startup (Optigo) on Apr 01, 2016
Ex Avigilon VP of Engineering Danny Kam is putting his support behind networking startup Optigo. Networking monitoring and analytics tools that...
Favorite Wireless Manufacturers 2016 on Mar 07, 2016
Following up on our 2014 survey for Integrator's Favorite Wireless Products, here are the new results. The top spot may not surprise you, but the...
ADI More Bad Advice: Network Switches on Mar 04, 2016
Run with scissors?  Play in traffic?  Trust ADI for networking advice? The last we checked with ADI, they were promoting bogus numbers from a...
IP Networking 2016 Book Released on Feb 24, 2016
The new IP Networking Book 2016 is a 208 page in-depth guide that teaches you how IT and telecom technologies impact modern security systems....
IP Scanners for Video Surveillance on Feb 15, 2016
IP scanners, tools like Advanced IP Scanner, Angry IP Scanner and Fing, can be useful for setting up and managing video surveillance systems. In...
Network Connectors for IP Cameras Guide on Nov 05, 2015
Fewer installation tasks are as nuanced as terminating cables and attaching connectors. Fortunately, this task is easy to manage and get right if...
Network Cabling for Video Surveillance Guide on Oct 30, 2015
In this 14 page guide, we teach the fundamentals of network cabling for video surveillance networks, how they should be installed, and the...
IP Networking Course Fall 2015 (CLOSED) on Oct 08, 2015
This is the only networking course designed specifically for video surveillance professionals. The next IP Networking for Video Surveillance...

Most Recent Industry Reports

Axis Secretly Paid Anixter Sales People To Push Axis NVRs on Sep 26, 2016
Internal Axis communication shows how Axis paid Anixter and Tri-Ed sales people with secret bonuses to push Axis NVRs. In this report, we examine...
VLANs for Video Surveillance on Sep 26, 2016
Many people confidently say to 'use VLANs' as an answer to IP video networking problems and as a way to signal expertise. But how should VLANs be...
Ambarella CEO Admits H.265 and 4K Not Popular on Sep 26, 2016
Ambarella is the main chip provider for high-end surveillance cameras driving higher resolution and new CODECs. While Ambarella has been pushing...
Nest Cam Outdoor Tested on Sep 23, 2016
After years of claiming an outdoor model was "coming", addressing their biggest user demand, Nest has finally released their Outdoor Camera, an...
ACTi Refuses Race To The Bottom, Shifts To Solutions on Sep 23, 2016
The original low cost IP camera disruptor was ACTi. Back in the 2008 - 2010 time frame, Taiwanese manufacturer ACTi challenged the Western and...
You Get Robbed, Canary Will Pay You Up To $1,000 on Sep 22, 2016
Canary is trying to break the status quo in DIY security, first by raising over $40 million, and now a revamp of their monthly services package...
Milestone Ends Development of "Enterprise" VMS on Sep 22, 2016
Milestone 'Enterprise' was one of the first enterprise video management software offerings, selected by many early adopters of IP video. However,...
History of Video Surveillance on Sep 22, 2016
This is a concise history of video surveillance covering the past decade.  The goal is to help professionals newer to the industry understand...
Access Control Course Fall 2016 on Sep 22, 2016
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Totally Wireless IP Camera (IPVideo Corp NomadHD) on Sep 21, 2016
Wireless battery powered cameras have been a surveillance pipe dream for years, limited by camera power consumption, battery technology, and...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact