Network Ports for IP Video Surveillance Tutorial

By: Brian Rhodes, Published on Jan 20, 2016

Network ports are critical for remote video viewing and recording and without proper configuration, IP video will not work. Beyond that it is critical to understand how they relate to security.

free image

In this tutorial, we examine:

  • Why ports are used
  • The format for ports
  • How ports are assigned
  • Well-Known ports for video surveillance
  • Uncommon / manufacturer specific ports
  • Risks of open ports
  • Multiple port use for VMSes
  • Using NMAP to scan ports

******* ***** *** ******** for ****** ***** ******* and ********* *** ******* proper *************, ** ***** will *** ****. ****** that ** ** ******** to ********** *** **** relate ** ********.

free image

** **** ********, ** examine:

  • *** ***** *** ****
  • *** ****** *** *****
  • *** ***** *** ********
  • ****-***** ***** *** ***** surveillance
  • ******** / ************ ******** ports
  • ***** ** **** *****
  • ******** **** *** *** VMSes
  • ***** **** ** **** ports

[***************]

Why ***** *** ****

* ******** **** ********* have * ****** ** address *** **** ***** communicate *** ********* ************ or ********.

** *********** ****, ** ********* support ******** '*****', ** to **,***.  ***** (**** called '*******') ****** ********** channels *** **** ** flow ** ****** ** a *******, **** **** cameras ** * ********, or * ******** ** a ******.  ***** **** a ******** **** *** to *** *** **** it ********, ** **** any **** ******** ** a ***** **** *** be ******* ********* *** viewing, ** ****** *** be ******** ** ** email ****** *** *******, or *** ******* ** a ******* *** ** on.

**** *** ***** ***** of ***** *********, *********** portions ** ******* ******* are ******** *** ******** use ** ******** ************, and **** ******* ****** up *** ******* ** a ********'* ******** ************ knowing ***** **** ******* and ***** **** **** not.

Port ******

*** *** ********** ***** are ********* ** * variation ** *** ** address ******. *** *******, an **** ******* **** is ********** ** ****** a ***** *** **** number ** *** ***, like **** (**** ***** in ****):

***.***.*.***:***

**** *** ***** * webpage, *** ***** ****** there ** ** **** needed *** **** ** only ******* *** ******** handle **** *** ***. For *******, *** ** address **** ****.*** ** **.**.***.*. Going *******://**.**.***.**** *****://**.**.***.*:****** **** *** ** the **** ********, ** is **** **** *** browser ***** / ******* you **** **** ** when *** **** ** "http://"

How *** ***** ********?

**** ******* *** ******** according ** ***** ******, based ** *** ******* or *** ******** **** are ** ******* ******* applications.  *** ********* *****, from #* ** #**,*** are ******** ***********:

  • ****** *****, **** **** * - ****: ****** Ports *** ******** ******** ********* **********. ***** *** ******** for *******, ****-***** ****.
  • **** *****, **** ******** - *****: **** Ports *** ******** ****************. ***** *** *** specific ******** ********* ***.  Many ************ *** ******** platforms **** **** ************ in **** *****.
  • ******* *****, **** **** ***** - *****: ******* Ports *** *** ********. This ***** ** *********** not ************* *** **** open *** ******* ***, often *** ******* ** temporary *********** ****** * network. **** ** **** surveillance ************* ***** *** for ***** *** ******** communications ******* ***** *******/********* and *******.

*** ***** *********** *** assigning **** *********, ******** Assigned ******* ********* (****), ** **** ** the **** ********* ***** that ******* ** ******* allocations *** * ****** of ***** '**** *****' administrative *** ** ****** internet *** ******* ***.

****-***** *****

**** ** ***** ** typical ***** ***** **** by ************, *** **** generally **** *** **** ports *** ***** ** the '******' *****, *********:

  • **** **: **** (********* Transfer ********) *** ******* websites *** *** *******
  • **** **: *** ******* for **** ********, ********* image ***** 
  • **** **: ***, ** secure ***** ******** *** port ********** *** ****** portal ******
  • **** **: ******, ** unencrypted **** *************, ***** used *** '******* **** control' ** ******* *** even *******.
  • **** ***: ****** ****** Layer, ** '*******' **** traffic.********** **** ** ****** video *******.
  • **** ***: **** (**** **** ********* ********) *** *****, **** widely *** * ***-********* for ***** *******

***** *** **** ****-**** ports, ****** **** *** not ******** ** ************ applications. *** * **** list **'****-*****' ***** ****.

Uncommon / ************ ******** ***** *** ***** ************

*******, **** ************ ******* use **** *********** **** are ************ ******** *** their ***. **** ** these ************ *******:

  • **** ****: ***** ******** Digital ***** ********* *** Enterprise ******* *******
  • **** *****: *********** ***** client
  • **** *****/**: ***** ***** forwarding ****
  • **** *****: ******** *** video ******
  • **** *****: **** ****** ********* protocol

Port ******** ****

** **** *****, ************ platforms **** *** '********' user ** ******* ***** that **** ** ******** to **** ******* ******* security ********* *** ***.  If ***** **** *********** are *** ***** *** ********, video ************ ******* **** not ****.

**** ******** ********* *** networks ***** ******* ******** traffic *** ***** *** those ********** ******* *** recognized ***. ** *******, part ** '******* ****' a ******* ******** ******* off ***** ** ********* regardless ** ***** ** address *** ********* ****. This ********* *** **** of ******* ******* ** other ******** **** ******* through **** * *******.

**** ***** ******** *********** *** ******* ***** that **** ** ******* from *** *************.

 

Multiple **** *** ******

************ ******* ********* *** multiple ***** ****** *********. Despite * ****** ** a ******** ****** **** one ** *******, **** single ******** *** **** many ********* ***** ********** or ******* ****.  ** general, ******* ** *** requisite ***** ****** ** the ************ ****** ** part ** *** ******* configuration *******, **** ***** typically ********** * **** of ****** ***** **** this *** **** *******.

ports used by security center

NMAP **** ******** *****

******* ************ ******* *** open **** *****, ********** the ***** ** **** those **** *** ****** is * *** ******* security ****.

********** ***** ****** ******* exploits ****** ********* ** ports ****** ** ************ systems, ***** ******** *** ** **** ** find **** ***** **** be ****** *** ***** ports *** ** ****** by ******* *** ******** or ****** ******** **** UPnP, ******, *** ***. Below ** ******* * screenshot ** ** **** scan.

*** **** ******* ** how **** *** ******** and **** ******** **** port ******** *****, *** our: ******* ** ******* ****.

Comments (4)

Excellent article Brian - Thank you. Comprehensive overview and easy to understand :)

Does changing ports from default help with security? Such as changing 80 to 103.

Yes, if you are being scanned, many bots try only the well known ports to save time. You can use one in the thousands, as long as no other network traffic is using it.

Still don't get it. I need a picture I guess. If your coming in from the outside your ip address isnt going to be a 192.168.000.000 number. It will be a public number. So explain it from coming outside to a computer/ server inside with a vms on it. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Networking

Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
Directory of 70 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Installation Course - Last Chance - Register Now on Sep 12, 2019
Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the...
Top Ways Security Integrators Improve Their Careers on Sep 03, 2019
With DIY products expanding and the future of integration debated, how do integrators stay sharp so they are not left behind? 180+ integrators...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
Subnetting for Video Surveillance on Apr 30, 2019
This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range,...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Casino Security Consultant Carl Lindgren Interview on Mar 26, 2019
For more than 20 years, Carl Lindgren [link no longer available] worked as a casino surveillance pro, while being active (and sometimes outspoken)...
Ubiquiti Favorability Results 2019 on Feb 18, 2019
Ubiquiti has quietly grown into a $1+ billion annual revenue company, with offerings across wireless, wireline network and video surveillance (see...

Most Recent Industry Reports

Alarm Veteran "Demands A Criminal Investigation" Of UL on Oct 18, 2019
The Interceptor's Project pressure against UL continues to rise. Following Keith Jentoft's allegation that "UL Has Blood On Their Hands", Jentoft...
Camect "Worlds Smartest Camera Hub" Tested on Oct 18, 2019
Camect is a Silicon Valley startup that claims the "Smartest AI Object Detection On The Market", detecting not only people and vehicles, but...
Hikvision Global News Reports Directory on Oct 17, 2019
Hikvision has received the most global news reporting of any video surveillance company, ever, ranging from the WSJ, the Financial Times, Reuters,...
Camera Calculator V3.1 Release Improves User Experience on Oct 17, 2019
IPVM has released a new version of our Camera Calculator, V3.1, with significant user experience improvements, a new development plan, and an...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Course Fall 2019 - Last Chance on Oct 17, 2019
Register Now - Fall 2019 Access Control Course. Thursday, October 17th is the last day to register. IPVM offers the most comprehensive access...
US DoD Comments on Huawei, Hikvision, Dahua Cyber Security Concerns on Oct 16, 2019
A senior DoD official said the US is "concerned" with the cybersecurity of Hikvision, Dahua, and Huawei due to "CCP" (China Communist Party)...
Pelco Sarix Pro3 Camera Tested on Oct 16, 2019
Pelco has released their Sarix Professional Series 3 cameras, claiming "more security detail in challenging scenes with excellent low light and...
IPVM Camera Calculator User Manual / Guide on Oct 16, 2019
Learn how to use the IPVM Camera Calculator. The guide below includes instructions, images, gifs, and videos demonstrating and explaining the...
Altronix Claims Tango 'Eliminates Electricians' on Oct 15, 2019
Power supply provider Altronix claims its new Tango power supply 'eliminates the need for an electrician, dedicated conduit and wire runs'. In...