Network Ports for IP Video Surveillance Tutorial

By: Brian Rhodes, Published on Jan 20, 2016

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work. Beyond that it is critical to understand how they relate to security.

free image

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

******* ***** *** ******** for ****** ***** ******* and ********* *** ******* proper *************, ** ***** will *** ****. ****** that ** ** ******** to ********** *** **** relate ** ********.

free image

** **** ********, ** examine:

  • *** ***** *** ****
  • *** ****** *** *****
  • *** ***** *** ********
  • ****-***** ***** *** ***** surveillance
  • ******** / ************ ******** ports
  • ***** ** **** *****
  • ******** **** *** *** VMSes
  • ***** **** ** **** ports

[***************]

Why ***** *** ****

* ******** **** ********* have * ****** ** address *** **** ***** communicate *** ********* ************ or ********.

** *********** ****, ** addresses ******* ******** '*****', up ** **,***. ***** (also ****** '*******') ****** particular ******** *** **** to **** ** ****** in * *******, **** from ******* ** * recorder, ** * ******** to * ******. ***** help * ******** **** how ** *** *** data ** ********, ** with *** **** ******** on * ***** **** can ** ******* ********* for *******, ** ****** can ** ******** ** an ***** ****** *** reading, ** *** ******* by * ******* *** so **.

**** *** ***** ***** of ***** *********, *********** portions ** ******* ******* are ******** *** ******** use ** ******** ************, and **** ******* ****** up *** ******* ** a ********'* ******** ************ knowing ***** **** ******* and ***** **** **** not.

Port ******

*** *** ********** ***** are ********* ** * variation ** *** ** address ******. *** *******, an **** ******* **** is ********** ** ****** a ***** *** **** number ** *** ***, like **** (**** ***** in ****):

***.***.*.***:***

**** *** ***** * webpage, *** ***** ****** there ** ** **** needed *** **** ** only ******* *** ******** handle **** *** ***. For *******, *** ** address **** ****.*** ** 23.22.211.9. ***** *******://**.**.***.*********://**.**.***.*:****** **** *** ** the **** ********, ** is **** **** *** browser ***** / ******* you **** **** ** when *** **** ** "http://"

How *** ***** ********?

**** ******* *** ******** according ** ***** ******, based ** *** ******* or *** ******** **** are ** ******* ******* applications. *** ********* *****, from #* ** #**,*** are ******** ***********:

  • ****** *****, **** ***** - ****: ****** Ports *** ******** ******** ********* **********. ***** *** ******** for *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** Ports *** ******** ****************. ***** *** *** specific ******** ********* ***. Many ************ *** ******** platforms **** **** ************ in **** *****.
  • ******* *****, **** ********* - *****: ******* Ports *** *** ********. This ***** ** *********** not ************* *** **** open *** ******* ***, often *** ******* ** temporary *********** ****** * network. **** ** **** surveillance ************* ***** *** for ***** *** ******** communications ******* ***** *******/********* and *******.

*** ***** *********** *** assigning **** *********, ******** Assigned ******* ********* (****), ** **** ** the **** ********* ***** that ******* ** ******* allocations *** * ****** of ***** '**** *****' administrative *** ** ****** internet *** ******* ***.

Well-Known *****

**** ** ***** ** typical ***** ***** **** by ************, *** **** generally **** *** **** ports *** ***** ** the '******' *****, *********:

  • **** **: **** (********* Transfer ********) *** ******* websites *** *** *******
  • **** **: *** ******* for **** ********, ********* image *****
  • **** **: ***, ** secure ***** ******** *** port ********** *** ****** portal ******
  • **** **: ******, ** unencrypted **** *************, ***** used *** '******* **** control' ** ******* *** even *******.
  • **** ***: ****** ****** Layer, ** '*******' **** traffic.********** **** ** ****** video*******.
  • **** ***: **** (**** **** ********* ********) *** *****, **** widely *** * ***-********* for ***** *******

***** *** **** ****-**** ports, ****** **** *** not ******** ** ************ applications. *** * **** list **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* use **** *********** **** are ************ ******** *** their ***. **** ** these ************ *******:

  • **** ****: ***** ******** Digital ***** ********* *** Enterprise ******* *******
  • **** *****: *********** ***** client
  • **** *****/**: ***** ***** forwarding ****
  • **** *****: ******** *** video ******
  • **** *****: **** ****** discovery ********

Port ******** ****

** **** *****, ************ platforms **** *** '********' user ** ******* ***** that **** ** ******** to **** ******* ******* security ********* *** ***. If ***** **** *********** are *** ***** *** approved, ***** ************ ******* will *** ****.

**** ******** ********* *** networks ***** ******* ******** traffic *** ***** *** those ********** ******* *** recognized ***. ** *******, part ** '******* ****' a ******* ******** ******* off ***** ** ********* regardless ** ***** ** address *** ********* ****. This ********* *** **** of ******* ******* ** other ******** **** ******* through **** * *******.

**** ***** ******** *********** *** ******* ***** that **** ** ******* from *** *************.

Multiple **** *** ******

************ ******* ********* *** multiple ***** ****** *********. Despite * ****** ** a ******** ****** **** one ** *******, **** single ******** *** **** many ********* ***** ********** or ******* ****. ** general, ******* ** *** requisite ***** ****** ** the ************ ****** ** part ** *** ******* configuration *******, **** ***** typically ********** * **** of ****** ***** **** this ******* *******.

ports used by security center

NMAP **** ******** *****

******* ************ ******* *** open **** *****, ********** the ***** ** **** those **** *** ****** is * *** ******* security ****.

********** ***** ****** ******* exploits ****** ********* ** ports ****** ** ************ systems, ***** *********** ** **** ** find **** ***** **** be ****** *** ***** ports *** ** ****** by ******* *** ******** or ****** ******** **** UPnP, ******, *** ***. Below ** ******* * screenshot ** ** **** scan.

*** **** ******* ** how **** *** ******** and **** ******** **** port ******** *****, *** our:******* ** ***********.

Comments (4)

Excellent article Brian - Thank you. Comprehensive overview and easy to understand :)

Does changing ports from default help with security? Such as changing 80 to 103.

Yes, if you are being scanned, many bots try only the well known ports to save time. You can use one in the thousands, as long as no other network traffic is using it.

Still don't get it. I need a picture I guess. If your coming in from the outside your ip address isnt going to be a 192.168.000.000 number. It will be a public number. So explain it from coming outside to a computer/ server inside with a vms on it.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Networking

Directory of 60 Video Surveillance Startups on Jun 25, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Register Now - Fall 2019 IP Networking Course on May 02, 2019
Register for the Fall 2019 IP Networking Course. For early registration save $50 off the course's normal $299 price. This is the only networking...
Subnetting for Video Surveillance on Apr 30, 2019
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Access Control Course Fall 2019 - Register Now on Apr 02, 2019
Register for the Fall 2019 Access Control Course. For early registration save $50 off the course's normal $299 price. IPVM offers the most...
Casino Security Consultant Carl Lindgren Interview on Mar 26, 2019
For more than 20 years, Carl Lindgren worked as a casino surveillance pro, while being active (and sometimes outspoken) on various online video...
Installation Course Fall 2019- Register Now on Mar 14, 2019
Register for the Fall 2019 Video Surveillance Install Course. For early registration save $50 off the course's normal $299 price. This is a...
Ubiquiti Favorability Results 2019 on Feb 18, 2019
Ubiquiti has quietly grown into a $1+ billion annual revenue company, with offerings across wireless, wireline network and video surveillance (see...
2019 IP Networking Book Released on Jan 14, 2019
The new IP Networking Book 2019 is a 285 page in-depth guide that teaches you how IT and telecom technologies impact modern security...
Security Sales Course 2019 on Jan 03, 2019
This sales course is customized for the needs and challenges specific to professionals selling video surveillance and access control...

Most Recent Industry Reports

History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to emerging into an AI cloud era.  The goal of this history...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...
New GDPR Guidelines for Video Surveillance Examined on Jul 18, 2019
The highest-level EU data protection authority has issued a new series of provisional video surveillance guidelines. While GDPR has been in...
Wyze AI Analytics Tested - Beats Axis and Hikvision on Jul 17, 2019
$20 camera disruptor Wyze has released free person detection deep learning analytics to all of their users, claiming users will "Only get notified...
Anyvision Aims For 2022 Revenue of $1 Billion on Jul 17, 2019
Only 3 video surveillance manufacturers do a billion dollars or more in annual revenue - Hikvision, Dahua, and Axis. Now, Anyvision plans to join...
HD Analog vs IP Guide on Jul 16, 2019
For years, HD resolution and single cable signal/power were IP camera advantages, with analog cameras limited to much lower resolution and...
How To Troubleshoot Wiegand Reader Problems - Inverted Wiring on Jul 16, 2019
Wiegand is the dominant method of connecting access readers, but problems can arise for installers. In fact, one of the most difficult reader...
ZeroEyes Gun Detection Startup on Jul 16, 2019
A gun detection video analytics startup, ZeroEyes, is being led by a group of 6 former Navy SEALs, aiming to "save lives" by using AI to assist...
Motorola Acquires Watchguard, Adds to Vigilant And Avigilon on Jul 15, 2019
2 years ago, Motorola had no position nor relevancy to video surveillance. Now, they own major video surveillance, LPR and body camera providers...
Hikvision Global News Reports Directory on Jul 15, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact