Subnetting for Video Surveillance

By: John Scanlan, Published on Apr 30, 2019

This guide explains when subnetting is used on security networks, and how it works. We explain how to add or remove IP addresses to your range, borrowing bits, and the role of the subnet mask.

free image

****** **** ****** ** provide *********** **:

  • *** ********* **** *****
  • *** **** ** *** subnet ****
  • ********* *** ** ****
  • ********* *** ** ****
  • ****** *** ** ********

Why ****** ** ***** ************

***** *** * *** reasons ************** *** **** to ****** ***** ******** network, ******** *****:

  • ******* *** ** *********
  • ******* ********
  • **** ** **************

Running *** ** *********, *** ******* **********

*** **** ****** ** address ****** ** ***.***.*.* (a ***** * *******) which ******** *** **** addresses. *******, ** **** mid-sized ************ *** ******** systems, **** ** * school, ****, ** ***** facility, ***** ********* *** be ******* ******** ** cameras *** ****. *******, adding ****** ******* *** consume ** ******* *** each **********. ******** ****** to ******* ****** ******* consume ********** *********. ********* viewing ******** **** **** require *********, ***.

** ****** ******** ****** mask ** *** *** (255.255.255.0 ** ***.***.***.*), *** network ***** ** ********** 255 ********* ***** *** be **** *** ********** devices. ***** *** **** this **** ******, ** using * **** ** 255.255.240 ***** ******* ****** 4,000 ******* ** *** subnet.

Network ********

** ***** ********* ******* for ********* ******* ******** (e.g., ************ **. ******* LAN **. *****), * device ** ****** ** prevented **** ********* * device ** *******. ** simply ****** **** *** route ** *** ***** host.

********** ** **** ***** deployed *********, ***** ** **** more *********** ** ****.

Ease ** **************

********* ********** ****** *** to ****** ** ** scheme **** * ********* and ********** ****** ** hosts. **** ******** * network ** ***** ********** ****** * ***** ******* it ** ******* ** scan * ******* *******, closer ** ****** ** actual **-*** *******, ****** than **** ********* ** unused *********; *.*.

******** ***.**.*.* - ***.**.***.*** with ****** ***.***.*.* = 65,534 *********

******** ***.**.*.* - ***.**.*.** with ****** ***.***.***.*** = 30 *********

*** ******* **** *** classfull ****** **** **** take ***** * ***** to **** **** * discovery ****, ************ ** *******, ***** *** ******* subnet **** **** **** just *******.

Subnetting ******

*** ****** **** ** a ********* ************* ** the ** *******, *** determines ***** ***** ** an ** ******* ******* the "*******" **. *** "host." ** ********, *** vast ******** ** ********, surveillance ********, *** ******* subnet *****, **** ****** classfull **********, *** *** IP ******* *****, **** commonly ***.***.***.*.

[****, *** **** ***** we *** **** ********* with ******* ********* ***** are ****** **** * classes *****.]

*********Addresses / ******* ** *********

********** ******* *** ****** mask **** ********* (***** A = ***.*.*.*, * = ***.***.*.*, * = 255.255.255.0) ** ********* ***** borrowed **** ** ****** those ******, *** ** doing ** ******* *** amount ** ***** *** networks. *** *** ****** to ****** ******** ***** and ******** ******** ** decrease ***** *** ******** networks. *** ******* ***** shows *** ****** ***** for **** ***** *** the ****** ** ***** and ******** ********** **** each.

Default Subnet Masks and Classes

*** ***** ***** ***** how **** **** ** the ****** ****. *** network **** *** *'*, and * **** ** 8 *'* (********) = 255. *** **** **** are *'*, ***** ******** = *. *** ******* below ***** *** ******* subnet **** *** **** class, *** ********** ****.

Subnet Masks Represented in Bits

Subnet **** ********** ******** *** *****

********* **** *** ********* subnet ***** ** **********, also ****** ********* **********. The *** **** **** is **** ** ** borrowing **** **** *** other **** ** **** by ******** * ** 0 ** * ** 1. ** **** ***** are ******* **** **** are ******** **** *** network *******, *** **** more ******** *** ******* bits *** ******** **** the **** *******.

Subnets ** ***** ***********

*** ****** ****** ******** which ******* **** *** device *********, ****** ***** are **** ***** **** to ****** *** ******* to ** ********** ****** or *******. **** ** done ** ******** *** last ***** ** *** mask. *** ***** *** that ** *******, ** additional *** **** ****** becomes *********.

** * ********* *******, changing ****** **** **** 255.255.255.0 ** ***.***.***.* ** * ***.***.*.* network ****** ***** ** expand **** *** ***.***.*.* network ******* ***** * router, * ***** ** 510 ***** ******* ** 255, *********** ******** ********* IP *********. ******** *** mask ** ***.***.***.* ******* this ******* ** *,*** IPs (***.***.*.*-***.***.*.***). **** ** illustrated *****.

Subnetting Examples

** *** *** ****** masks ****** ********* *********, users *** ***** ********** ********* ****** ***********.

Comments (26)

*** ***** ** *** skirts ** **, *** everyone ******** ** ******* up ******* ******** ****** be ******** **** *******.  This ******* *** ******* subnets *** ***** *** personal ***, *.*. ******* from *** ****** **** one ** ***** ********* will ** ******* ** the **** ******** ******* of ********* **/*********.  ***** subnets ******* **.*.*.*, ***.**.**.*-***.**.**.* and ***.***.*.*.

********** *** ** * tricky *****, ********** *** bit **** **** ******* unreachable *** ***** *** insane.  ** ***'** ***** this *** * ****** I ***** *** ***** books *** ***** **** networking ** ** ********* insightful (**** ** *** bit *****) **** ** you ***'* **** ** pursuing *** *************.

**** ***********!

 

******* *** * *** blocks *** ***** *** the ******* ***** :

**-*** *****: **.*.*.* ~ 10.255.255.255 : *-*** ****** (255.0.0.0)

**-*** *****: ***.**.*.* ~ 172.31.255.255: **-*** ****** (***.***.*.*)

**-*** *****: ***.***.*.* ~ 192.168.255.255: **-*** ****** (***.***.*.*)

 

 

******* ********** ***** ******** Version *, *** ******* IP **********.

*******

(****** ** ******* * better ****)

 

*** ******** - * meant *** ****

**** ** *** ****** me. * ***** * will **** **** ** interact **** * ******* containing **** **** *** devices. 

*** *** ***** * don't ***** ********** ** how *** ******** * router **** ** ******* of ***.***.*.* ** **** to ******** **** ********* with ** ******* ** of ***.***.*.***. ** **** 3rd ***** *****'* *****, wouldn't ** ** *********** by *** ******? ** does ** ****** ********* when *** ****** ***** is *******?

**** **** ** ****** a ****** ***** *** you *** **** *** one *** ****. **'* not **** *********.

 

*** ****** **** ********** which ***** ********* * device ** * ******** address *** *****. *** any *** ** *** subnet **** ***** ** a "*", *** ********* address **** ** ********* to **** ** *** device's ******** *******.

** *** **** * subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* **          ***.***.*.* to ***.***.*.***. [**'* *** since *** ** ******* reserved.] *** ***** ***** "octets" ***** *** *** all "*"*, ** * reachable ******'* ******* **** be ********* ** *** first ***** ****** ** the ****** ** ***.***.*.*, i.e., ***.***.*  .

** *** ******* *** subnet **** ** ***.***.***.*, a ****** ** ***.***.*.* would ** **** ** reach ******* ** ***.***.*.* to ***.***.*.***.

*** *********** #*'* "****** mask ***** *********" ***** and ******* *******.****.***. (** *** *** really **********).

** **** ** ****** reachable **** *** ****** digit ** *******?

***, **** ** *** concept ** ****** ***** exactly.

**** *** ****** **** an ** ******* ***** to ******* ** ******* device **** ** ** address, *** ** *** first ****** ** ***** to ********* ** ** that ***** ****** ** on *** **** *** (meaning ** *** **** packets ** ** ********), or ** ** ** a ****** ******* (******* the ******* **** ** be **** ** * router, *** *** **** route **** ** *** appropriate ****** *******).

*** ****** **** *** local ** ******* *** used ** ******* ***** IPs *** ***** *** which *** ******.

** *** *** * subnet **** **** ***.***.***.***, then **** ******* ***** the *** ***** (*****) match ***'* *********** ** able ** **** ******* directly ** **** *****. (subnet ***** ***** *** 4th ***** *** ***-**** are **** ****** ** datacenters ***** *** ***** only ** ********* * IP ********* *** **** specific ***).

*** ******* ** *** same ****** *** ** the **** ********* ******  talk ******** *** *** not ** ******** **** EACH *****.  * *** network **** *** ***** issues ** *** ****** broadcast ******.  ****** ******* private ******* **** ** routed ** * ******.  So *** **** **** router **** ** ***** Mikrotik, ***. ******** ******** **** Hippa ******* ******* ********* via ******** ******** **.  subnets

*** *** ***** **** to **** **** ******** containing **** **** *** devices, *** ******* *** that *** **** ********* networks **** **** ***** to **** **** ****.  The **** ****** ********* would ** * ***** business **** *** ********* a ***** ***** ** public ** ********* ** order ** **** ********* on ***** *** ******* and ******* ****** ** the ********.  *** *** will ***** *** ******* amount ** ** ********* that ** *** *** away **** (**** ****** pretty ******* *** ****** IP *********) *** **** will *** ** ********** to ** ****.  ** most ***** * ******* will *** * ***** of * ****** ** addresses ***** ** * 255.255.255.240 ****** (** ***** only * *** ******** accessible, *** ***** ** the ***** ** *** "network" ***** *** *** the **** ** *** block ** *** "*********" address, ******* ** *** 0's ** *** *******, broadcast ** *** *'*)

** **** *** ****** complex, * ***** **** myself ******* *** *** chart -> *** - 64 - ** - 16 - * - - * - 1, *** * ***** it.

**** * ****'* ******* things *** **** ****.

 

**********: ***.***.***.*** ******** * block ** ** ** addresses, * ****** **** said ***.***.***.*** ******** * addresses, ** ***** * are ******.

*** *** *** *****://*******.***/** * **** ******'* tool ** **** *** many ******* *** *** reach ** ***** * static ** *** ********* angry.

*******:***.***.*.* ***:***.***.***.*

*******:***.***.*.* ***:***.***.***.*

****, ********..*** * ** bored, ****** ** ********* quotes.

**** * ****

***** *******! - ** you *** *** ** CCTV, ** ***** * book/course **** ******* *** recommend ** ******** ********** from ***** ***** ** a ****** ********?  

#*, ****** *** **** first *******, ***, *** our **** ** ********** **** *** *** ****** **** ** ********** Course (***** ****** **** *******).

**** * ***** ******** here. **** *** ******** your ******* ****, ** isn’t ****** **********, **’* called ************. *** ****** that *** *** ****** something *******. ***** ***** making ** ******. 

*** **** ** ** it!  * *** ***** to **** ***, **** if ***** ** **** the ******** *********** ** increasing *** ***** ** your *******, ** ** certain ** ***** *** critical/static ********* ** *** bottom ** *** ******* scope.  *** *******, *** x.x.x.1 *** **** ******* Default ******* (******** ********* like .* *** .* will ** *** ******** interfaces *** *********/******** *******) and ******* *** **** of *** ******-***** **** octet ******* *** ***** network-specific *******. **** ***, if *** **** **** to ******, *** ***'* have ********* *** **** devices, *** *** ******* gear *****'* *** ** the ****** ** **** address ****** (*'* ***** that ***).

*** * ******/***** **************, I ****** **** ** addressing ****** ***** ** the ***** ***-* ************, plus * * **** out ********* ********* ********.  Something **** **** -

*.*.*.* - ******* *******
*.*.*.* - ******* */*
*.*.*.* - *.*.*.** - network *******, ***, ****, etc.
*.*.*.** - *.*.*.** - servers, *******, ************ (*****)
*.*.*.** - *.*.*.** - encoders, ********, *****, */*, intercoms
*.*.*.** - *.*.*.** - reserved *** ***-*****-**** *** come
*.*.*.** - *.*.*.*** - cameras (******-**) *** ****** control (***-****)

*** * ****** **************, video *** ****** (*** intrusion?) ***** ** ** separate *****.

**** *** * ****** is ****** * *** of ******* *** ***** a ***** ** ***** a ***** ** * supernet. ***** ** **** add ***/***** **** ** IPv6 ** ******* ************** the ****** ***** ** noobs.

*** *** ** ***** tag ** ***** *** relation ** * ******** subnet **** *** * given ******* *****. *** networks *** ******* **** subnets. *** ********** ** whether **’* * ****** (super) ** ******* (***) subnet **** *** ******** subnet. 

*** **** ****** ********* tools **** *** ******* to **** **** ************? I **** **** ** lacked **** ******* ** their ********* **** * few ***** ****, **** only *** ******* *** A,B ** *.

**** ********** ** **** tools *** ************* ******** NIC's ** ******* ********.

 

** ***** ***** ** amaze **, *** **** of ***** "*********" **** fundamental ********** *********...

****...* *** ******** ** Scanner *** *** **** and ** **** *** all *** ****** **** on * ******* *** allows *** ** **** all ** **** ** a ****.  * **** useful ****.

** *** **** * similar ****** ** ****?  Address ***** ****** ** away **** ** *** a **** ************* ** the ************* ** **** important.

****** * ***** ****** masks ** *** ********* cameras?

*** *** ******* ********* devices **** **** * common ****** ****. 

*** *** ******* ********* devices **** **** * common ****** ****.

** ***, ***** *** for **** ********. **** goes ** *** *#*.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

China DVR/NVR Backdoor Discovered, Huawei Refutes on Feb 07, 2020
A backdoor was found in Chinese-produced DVRs and NVRs that secretly allowed access to the recorders. While it was first attributed to Huawei...
Remote Access (DDNS vs P2P vs VPN) Usage Statistics 2019 on Oct 25, 2019
Remote access can make systems more usable but also more vulnerable. How are integrators delivring remote access in 2019? How many are using...
Dahua New Critical Vulnerability 2019 on Sep 23, 2019
Dahua has quietly admitted 5 new vulnerabilities including 1 critical vulnerability with a 9.8 / 10.0 CVSS score and 2 high vulnerabilities (scored...
ONVIF Exposure To "Devastating DDoS Attacks" Examined on Sep 06, 2019
ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices. And after an...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
Dahua Wiretapping Vulnerability on Aug 02, 2019
IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
HTTPS / SSL Video Surveillance Usage Statistics on Apr 01, 2019
HTTPS / SSL / TLS usage has become commonplace for websites to improve security and, in particular, to help mitigate attackers reading or modifying...

Most Recent Industry Reports

USA's Feevr Thermal Temperature System Examined on Mar 31, 2020
This US company has burst on to the scene, brashly naming itself 'feevr' and branding itself as a "COVID 19 - AI BASED NON CONTACT THERMAL...
JCI Coronavirus Cuts on Mar 31, 2020
JCI has made coronavirus cuts, the company told employees in an email that IPVM has reviewed. Inside this note, we examine the cuts made, the...
Add Door Operators To Fight Coronavirus on Mar 31, 2020
IPVM recommends that integrators advocate and end-users consider adding door operators to fight the spread of coronavirus. This delivers...
Video Surveillance Business 101 on Mar 30, 2020
This report explains the fundamental elements of the video surveillance business for those new to the industry. This is part of our Video...
FDA Gives Guidance on 'Coronavirus' Thermal Fever Detection Systems on Mar 30, 2020
The US FDA has given IPVM guidance on the use of thermal fever detection systems being marketed for coronavirus, as an explosion of such devices...
Worsen: Integrators Hit Even Harder By Coronavirus on Mar 30, 2020
Integrator's problems have worsened over the past 2 weeks, according to new IPVM survey results. Inside this report, we share statistics and...
Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter of a billion dollars in VC funding, and multiple failures to gain...
Athena CEO Criticizes 'Deplorable' 'Nitpicking', IPVM Refutes on Mar 27, 2020
UPDATE: NBC News Report Cites IPVM On Coronavirus 'Fever Detection' Cameras Athena Security's CEO Lisa Falzone has strongly objected to IPVM's...
Hikvision Admits Sanctions Harming Its Financial Performance on Mar 27, 2020
While Hikvision initially downplayed being sanctioned for human rights abuses, the company is now admitting a significant impact in a new PRC...