Subnetting for Video Surveillance

By: John Scanlan, Published on Apr 30, 2019

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask.

free image

****** **** ****** ** provide *********** **:

  • *** ********* **** *****
  • *** **** ** *** subnet ****
  • ********* *** ** ****
  • ********* *** ** ****
  • ****** *** ** ********

Why ****** ** ***** ************

***** *** * *** reasons ************** *** **** to ****** ***** ******** network, ******** *****:

  • ******* *** ** *********
  • ******* ********
  • **** ** **************

Running *** ** *********, *** ******* **********

*** **** ****** ** address ****** ** ***.***.*.* (a ***** * *******) which ******** *** **** addresses. *******, ** **** mid-sized ************ *** ******** systems, **** ** * school, ****, ** ***** facility, ***** ********* *** be ******* ******** ** cameras *** ****. *******, adding ****** ******* *** consume ** ******* *** each **********. ******** ****** to ******* ****** ******* consume ********** *********. ********* viewing ******** **** **** require *********, ***.

** ****** ******** ****** mask ** *** *** (255.255.255.0 ** ***.***.***.*), *** network ***** ** ********** 255 ********* ***** *** be **** *** ********** devices. ***** *** **** this **** ******, ** using * **** ** 255.255.240 ***** ******* ****** 4,000 ******* ** *** subnet.

Network ********

** ***** ********* ******* for ********* ******* ******** (e.g., ************ **. ******* LAN **. *****), * device ** ****** ** prevented **** ********* * device ** *******. ** simply ****** **** *** route ** *** ***** host.

********** ** **** ***** deployed *********, ***** ** **** more *********** ** ****.

Ease ** **************

********* ********** ****** *** to ****** ** ** scheme **** * ********* and ********** ****** ** hosts. **** ******** * network ** ***** ********** ****** * ***** ******* it ** ******* ** scan * ******* *******, closer ** ****** ** actual **-*** *******, ****** than **** ********* ** unused *********; *.*.

******** ***.**.*.* - ***.**.***.*** with ****** ***.***.*.* = 65,534 *********

******** ***.**.*.* - ***.**.*.** with ****** ***.***.***.*** = 30 *********

*** ******* **** *** classfull ****** **** **** take ***** * ***** to **** **** * discovery ****, ************ ** *******, ***** *** ******* subnet **** **** **** just *******.

Subnetting ******

*** ****** **** ** a ********* ************* ** the ** *******, *** determines ***** ***** ** an ** ******* ******* the "*******" **. *** "host." ** ********, *** vast ******** ** ********, surveillance ********, *** ******* subnet *****, **** ****** classfull **********, *** *** IP ******* *****, **** commonly ***.***.***.*.

[****, *** **** ***** we *** **** ********* with ******* ********* ***** are ****** **** * classes *****.]

*********Addresses / ******* ** *********

********** ******* *** ****** mask **** ********* (***** A = ***.*.*.*, * = ***.***.*.*, * = 255.255.255.0) ** ********* ***** borrowed **** ** ****** those ******, *** ** doing ** ******* *** amount ** ***** *** networks. *** *** ****** to ****** ******** ***** and ******** ******** ** decrease ***** *** ******** networks. *** ******* ***** shows *** ****** ***** for **** ***** *** the ****** ** ***** and ******** ********** **** each.

Default Subnet Masks and Classes

*** ***** ***** ***** how **** **** ** the ****** ****. *** network **** *** *'*, and * **** ** 8 *'* (********) = 255. *** **** **** are *'*, ***** ******** = *. *** ******* below ***** *** ******* subnet **** *** **** class, *** ********** ****.

Subnet Masks Represented in Bits

Subnet **** ********** ******** *** *****

********* **** *** ********* subnet ***** ** **********, also ****** ********* **********. The *** **** **** is **** ** ** borrowing **** **** *** other **** ** **** by ******** * ** 0 ** * ** 1. ** **** ***** are ******* **** **** are ******** **** *** network *******, *** **** more ******** *** ******* bits *** ******** **** the **** *******.

Subnets ** ***** ***********

*** ****** ****** ******** which ******* **** *** device *********, ****** ***** are **** ***** **** to ****** *** ******* to ** ********** ****** or *******. **** ** done ** ******** *** last ***** ** *** mask. *** ***** *** that ** *******, ** additional *** **** ****** becomes *********.

** * ********* *******, changing ****** **** **** 255.255.255.0 ** ***.***.***.* ** * ***.***.*.* network ****** ***** ** expand **** *** ***.***.*.* network ******* ***** * router, * ***** ** 510 ***** ******* ** 255, *********** ******** ********* IP *********. ******** *** mask ** ***.***.***.* ******* this ******* ** *,*** IPs (***.***.*.*-***.***.*.***). **** ** illustrated *****.

Subnetting Examples

** *** *** ****** masks ****** ********* *********, users *** ***** ********** ********* ****** ***********.

Comments (26)

*** ***** ** *** skirts ** **, *** everyone ******** ** ******* up ******* ******** ****** be ******** **** *******.  This ******* *** ******* subnets *** ***** *** personal ***, *.*. ******* from *** ****** **** one ** ***** ********* will ** ******* ** the **** ******** ******* of ********* **/*********.  ***** subnets ******* **.*.*.*, ***.**.**.*-***.**.**.* and ***.***.*.*.

********** *** ** * tricky *****, ********** *** bit **** **** ******* unreachable *** ***** *** insane.  ** ***'** ***** this *** * ****** I ***** *** ***** books *** ***** **** networking ** ** ********* insightful (**** ** *** bit *****) **** ** you ***'* **** ** pursuing *** *************.

**** ***********!

 

******* *** * *** blocks *** ***** *** the ******* ***** :

**-*** *****: **.*.*.* ~ 10.255.255.255 : *-*** ****** (255.0.0.0)

**-*** *****: ***.**.*.* ~ 172.31.255.255: **-*** ****** (***.***.*.*)

**-*** *****: ***.***.*.* ~ 192.168.255.255: **-*** ****** (***.***.*.*)

 

 

******* ********** ***** ******** Version *, *** ******* IP **********.

*******

(****** ** ******* * better ****)

 

*** ******** - * meant *** ****

**** ** *** ****** me. * ***** * will **** **** ** interact **** * ******* containing **** **** *** devices. 

*** *** ***** * don't ***** ********** ** how *** ******** * router **** ** ******* of ***.***.*.* ** **** to ******** **** ********* with ** ******* ** of ***.***.*.***. ** **** 3rd ***** *****'* *****, wouldn't ** ** *********** by *** ******? ** does ** ****** ********* when *** ****** ***** is *******?

**** **** ** ****** a ****** ***** *** you *** **** *** one *** ****. **'* not **** *********.

 

*** ****** **** ********** which ***** ********* * device ** * ******** address *** *****. *** any *** ** *** subnet **** ***** ** a "*", *** ********* address **** ** ********* to **** ** *** device's ******** *******.

** *** **** * subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* **          ***.***.*.* to ***.***.*.***. [**'* *** since *** ** ******* reserved.] *** ***** ***** "octets" ***** *** *** all "*"*, ** * reachable ******'* ******* **** be ********* ** *** first ***** ****** ** the ****** ** ***.***.*.*, i.e., ***.***.*  .

** *** ******* *** subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* ** ***.***.*.* to ***.***.*.***.

*** *********** #*'* "****** mask ***** *********" ***** and ******* *******.****.***. (** *** *** really **********).

** **** ** ****** reachable **** *** ****** digit ** *******?

***, **** ** *** concept ** ****** ***** exactly.

**** *** ****** **** an ** ******* ***** to ******* ** ******* device **** ** ** address, *** ** *** first ****** ** ***** to ********* ** ** that ***** ****** ** on *** **** *** (meaning ** *** **** packets ** ** ********), or ** ** ** a ****** ******* (******* the ******* **** ** be **** ** * router, *** *** **** route **** ** *** appropriate ****** *******).

*** ****** **** *** local ** ******* *** used ** ******* ***** IPs *** ***** *** which *** ******.

** *** *** * subnet **** **** ***.***.***.***, then **** ******* ***** the *** ***** (*****) match ***'* *********** ** able ** **** ******* directly ** **** *****. (subnet ***** ***** *** 4th ***** *** ***-**** are **** ****** ** datacenters ***** *** ***** only ** ********* * IP ********* *** **** specific ***).

*** ******* ** *** same ****** *** ** the **** ********* ******  talk ******** *** *** not ** ******** **** EACH *****.  * *** network **** *** ***** issues ** *** ****** broadcast ******.  ****** ******* private ******* **** ** routed ** * ******.  So *** **** **** router **** ** ***** Mikrotik, ***. ******** ******** **** Hippa ******* ******* ********* via ******** ******** **.  subnets

*** *** ***** **** to **** **** ******** containing **** **** *** devices, *** ******* *** that *** **** ********* networks **** **** ***** to **** **** ****.  The **** ****** ********* would ** * ***** business **** *** ********* a ***** ***** ** public ** ********* ** order ** **** ********* on ***** *** ******* and ******* ****** ** the ********.  *** *** will ***** *** ******* amount ** ** ********* that ** *** *** away **** (**** ****** pretty ******* *** ****** IP *********) *** **** will *** ** ********** to ** ****.  ** most ***** * ******* will *** * ***** of * ****** ** addresses ***** ** * 255.255.255.240 ****** (** ***** only * *** ******** accessible, *** ***** ** the ***** ** *** "network" ***** *** *** the **** ** *** block ** *** "*********" address, ******* ** *** 0's ** *** *******, broadcast ** *** *'*)

** **** *** ****** complex, * ***** **** myself ******* *** *** chart -> *** - 64 - ** - 16 - * - - * - 1, *** * ***** it.

**** * ****'* ******* things *** **** ****.

 

**********: ***.***.***.*** ******** * block ** ** ** addresses, * ****** **** said ***.***.***.*** ******** * addresses, ** ***** * are ******.

*** *** *** *****://*******.***/** * **** ******'* tool ** **** *** many ******* *** *** reach ** ***** * static ** *** ********* angry.

*******:***.***.*.* ***:***.***.***.*

*******:***.***.*.* ***:***.***.***.*

****, ********..*** * ** bored, ****** ** ********* quotes.

**** * ****

***** *******! - ** you *** *** ** CCTV, ** ***** * book/course **** ******* *** recommend ** ******** ********** from ***** ***** ** a ****** ********?  

#*, ****** *** **** first *******, ***, *** our **** ** ********** **** *** *** ****** **** ** ********** Course (***** ****** **** *******).

**** * ***** ******** here. **** *** ******** your ******* ****, ** isn’t ****** **********, **’* called ************. *** ****** that *** *** ****** something *******. ***** ***** making ** ******. 

*** **** ** ** it!  * *** ***** to **** ***, **** if ***** ** **** the ******** *********** ** increasing *** ***** ** your *******, ** ** certain ** ***** *** critical/static ********* ** *** bottom ** *** ******* scope.  *** *******, *** x.x.x.1 *** **** ******* Default ******* (******** ********* like .* *** .* will ** *** ******** interfaces *** *********/******** *******) and ******* *** **** of *** ******-***** **** octet ******* *** ***** network-specific *******. **** ***, if *** **** **** to ******, *** ***'* have ********* *** **** devices, *** *** ******* gear *****'* *** ** the ****** ** **** address ****** (*'* ***** that ***).

*** * ******/***** **************, I ****** **** ** addressing ****** ***** ** the ***** ***-* ************, plus * * **** out ********* ********* ********.  Something **** **** -

*.*.*.* - ******* *******
*.*.*.* - ******* */*
*.*.*.* - *.*.*.** - network *******, ***, ****, etc.
*.*.*.** - *.*.*.** - servers, *******, ************ (*****)
*.*.*.** - *.*.*.** - encoders, ********, *****, */*, intercoms
*.*.*.** - *.*.*.** - reserved *** ***-*****-**** *** come
*.*.*.** - *.*.*.*** - cameras (******-**) *** ****** control (***-****)

*** * ****** **************, video *** ****** (*** intrusion?) ***** ** ** separate *****.

**** *** * ****** is ****** * *** of ******* *** ***** a ***** ** ***** a ***** ** * supernet. ***** ** **** add ***/***** **** ** IPv6 ** ******* ************** the ****** ***** ** noobs.

*** *** ** ***** tag ** ***** *** relation ** * ******** subnet **** *** * given ******* *****. *** networks *** ******* **** subnets. *** ********** ** whether **’* * ****** (super) ** ******* (***) subnet **** *** ******** subnet. 

*** **** ****** ********* tools **** *** ******* to **** **** ************? I **** **** ** lacked **** ******* ** their ********* **** * few ***** ****, **** only *** ******* *** A,B ** *.

**** ********** ** **** tools *** ************* ******** NIC's ** ******* ********.

 

** ***** ***** ** amaze **, *** **** of ***** "*********" **** fundamental ********** *********...

****...* *** ******** ** Scanner *** *** **** and ** **** *** all *** ****** **** on * ******* *** allows *** ** **** all ** **** ** a ****.  * **** useful ****.

** *** **** * similar ****** ** ****?  Address ***** ****** ** away **** ** *** a **** ************* ** the ************* ** **** important.

****** * ***** ****** masks ** *** ********* cameras?

*** *** ******* ********* devices **** **** * common ****** ****. 

*** *** ******* ********* devices **** **** * common ****** ****.

** ***, ***** *** for **** ********. **** goes ** *** *#*.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Last Chance - Register Now - October 2019 IP Networking Course on Oct 10, 2019
Last Chance - Register Now - Fall 2019 IP Networking Course. The course starts next week. This is the only networking course designed...
HTTPS / SSL Video Surveillance Usage Statistics on Apr 01, 2019
HTTPS / SSL / TLS usage has become commonplace for websites to improve security and, in particular, to help mitigate attackers reading or modifying...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Dahua Wiretapping Vulnerability on Aug 02, 2019
IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
ONVIF Exposure To "Devastating DDoS Attacks" Examined on Sep 06, 2019
ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices. And after an...
Dahua New Critical Vulnerability 2019 on Sep 23, 2019
Dahua has quietly admitted 5 new vulnerabilities including 1 critical vulnerability with a 9.8 / 10.0 CVSS score and 2 high vulnerabilities (scored...
Remote Access (DDNS vs P2P vs VPN) Usage Statistics on Oct 25, 2019
Remote access can make systems more usable but also more vulnerable. How are integrators delivring remote access in 2019? How many are using...

Most Recent Industry Reports

Milestone Launches Multiple Cloud Solutions on Feb 18, 2020
Milestone is going to the cloud, becoming one of the last prominent VMSes to do so. Milestone is clearly late but how competitive do these new...
Video Surveillance 101 Course - Last Chance Thursday on Feb 18, 2020
IPVM's first Video Surveillance 101 course starts this month, designed to help those new to the industry to quickly understand the most important...
Video Surveillance Architecture 101 on Feb 18, 2020
Video surveillance can be designed and deployed in a number of ways. This 101 examines the most common options and architectures used in...
UK Stands Behind Hikvision But Controversy Continues on Feb 18, 2020
Hikvision is exhibiting at a UK government conference for law enforcement, provoking controversy from the press, politicians, and activists due to...
IronYun AI Analytics Tested on Feb 17, 2020
Taiwan startup IronYun has raised tens of millions for its "mission to be the leading Artificial Intelligence, big data video software as a service...
Access Control ADA and Disability Laws Tutorial on Feb 17, 2020
Safe access control is paramount, especially for those with disabilities. Most countries have codes to mandate safe building access for those...
ISC West 2020 Removes China Pavilion, No Plans To Cancel Or Postpone on Feb 17, 2020
ISC West plans to go on next month, amidst concerns over coronavirus. However, the Asia / China Pavilion has been removed, show organizers...
Hanwha Wisenet X Plus PTRZ Tested on Feb 14, 2020
Hanwha has released their PTRZ camera, the Wisenet X Plus XNV-6081Z, claiming the "modular design allows for easy installation". We bought and...
PRC Warns Against China Video Surveillance Hacks, Hikvision Targeted on Feb 14, 2020
Hackers are targeting China video surveillance manufacturers and systems, according to the PRC's main cyber threat monitoring body. The hackers...
IPVM Conference 2020 on Feb 13, 2020
IPVM is excited to announce our 2020 conference. This is the first and only industry event that will be 100% sponsor-free. Like IPVM online, the...