Training: Enterprise Network Switches for IP Video

Author: Benros Emata, Published on Sep 07, 2010

Many surveillance systems use non-enterprise class switches. These switches are simple to administer as they typically rely on GUI driven interfaces for configuration and management. (As an example, see our test of Cisco-Linksys's basic managed switch). However, they lack more advanced features and functionalities important for large-scale IP surveillance.

This training focuses on command line interface (CLI) driven configuration interfaces commonly found on enterprise-class switches. Familiarity and proficiency with CLI based enterprise switches allows for more sophisticated design options and enhances integration with corporate networks.

This training provides 80 minutes of video tutorials on configuring enterprise class switches for IP video.  We demonstrate network configuration concepts using the popular Cisco IOS command line interface (CLI) as a representative enterprise level switch.

Skills developed in using the Cisco IOS CLI will transfer to almost any other vendor's CLI such as Hewlett Packard, Huawei, Enterasys, Adtran, Foundry, Alcatel-Lucent, Motorola, Riverbed, and others. These and other vendors implement CLIs that are either very close copies of the Cisco CLI or of varying likenesses to it.  Vendors may even market claims of Cisco IOS 'likeness' to attract IT purchasers.

For stand-alone IP video systems, enterprise-class switches offer increased PoE reliability, more extensive and proven support for multicast technologies, more granular QoS controls, layer 3 routing possibilities, an overall depth of support for open standards, and more intensive tech-support for advanced deployments.

Moreover, for projects requiring IP video systems integration into corporate networks, a vendor preferred enterprise class switch is often times mandated.  Corporate IT departments have many well-founded reasons to maintain as homogeneous a network as possible.  These policies reduce risk of interoperability issues between devices, help assure that new devices are supported by network wide monitoring and management systems, and capitalize on existing knowledge and familiarity with products, by avoiding training for new systems or products.

Watch a preview of this training:

**** ************ ******* *** ***-********** ***** ********. ***** ******** *** simple ** ********** ** **** ********* **** ** *** ****** interfaces *** ************* *** **********. (** ** *******, *** *** test *******-*******'* ***** ******* ******). *******, **** **** **** ******** ******** *** *************** ********* for *****-***** ** ************.

**** ******** ******* ** ******* **** ********* (***) ****** ************* interfaces ******** ***** ** **********-***** ********. *********** *** *********** **** CLI ***** ********** ******** ****** *** **** ************* ****** ******* and ******** *********** **** ********* ********.

**** ******** ******** ** ******* ** ***** ********* ** *********** enterprise ***** ******** *** ** *****.  ** *********** ******* ************* concepts ***** *** ******* ***** *** ******* **** ********* (***) as * ************** ********** ***** ******.

****** ********* ** ***** *** ***** *** *** **** ******** to ****** *** ***** ******'* *** **** ** ******* *******, Huawei, *********, ******, *******, *******-******, ********, ********, *** ******. ***** and ***** ******* ********* **** **** *** ****** **** ***** copies ** *** ***** *** ** ** ******* ********** ** it.  ******* *** ********** ****** ** ***** *** '********'** ******* ** **********.

*** *****-***** ** ***** *******, **********-***** ******** ***** ********* *** reliability, **** ********* *** ****** ******* *** ********* ************, **** granular *** ********, ***** * ******* *************, ** ******* ***** of ******* *** **** *********, *** **** ********* ****-******* *** advanced ***********.

********, *** ******** ********* ** ***** ******* *********** **** ********* networks, * ****** ********* ********** ***** ****** ** ***** ***** mandated.  ********* ** *********** **** **** ****-******* ******* ** ******** as *********** * ******* ** ********.  ***** ******** ****** **** of **************** ****** ******* *******, **** ****** **** *** ******* are ********* ** ******* **** ********** *** ********** *******, *** capitalize ** ******** ********* *** *********** **** ********, ** ******** training *** *** ******* ** ********.

***** * ******* ** **** ********:

[***************]

Basic ********** ****** ************* *** ********** **** *

** **** *****, ** ******* *** ** ******* ******** ** a '***** *** ** *** ***' ****** ***** * ******* connection. ** ******** **** **** '****' ******** **** ***** *** to *********** **** ******'* ******** ******.  ***'** **** ***** ***** the ******'* **** ******, ***** ****** ********* ****** *** ************* files ********* ** *** ******'* *********. *******, ** ******* * 'default ** *******' ********, ** **** *** *** ***** **** deployment **** '*******' ******* ******** ************ **** '***' **************.

Basic ********** ****** ************* *** ********** **** **

** **** **** ** *****, ** ******** *** ****** ** showing *** *** ** ***** ****** ** ****** ********** ******** to **** ******.  ******** ****** ********** ****** *** ******* ********** flexibility ****** * *** ** **** *** **********.  ** **** explain *** ** ****** ************* ***** ** * ********** ******. **** ******** ******* ***** ** ********** *** **** ************* files. *******, **'** ******* *** ************* **** **** *** **** server.

Advanced ********** ****** ************* *** ********** **** *

** **** *****, ** ******* * ****** **** *** ******** VLANs, *********** ********** ************** ******* *** '*****' *** '****' *******.  If ***'** ******** ** ********* * ***** ****** **** ** existing ********* *******, **** ********* **** *** ******* ******* *** VMS ******* **** * ********* '*****' ****. ****, ** ******* Layer * ****** ***** * ******** *** *** ******* ******** when ********** * ******. *******, **'** *********** *** ** ****** communications ******* *** '*****' *** '****' *****.

Advanced ********** ****** ************* *** ********** **** **

** **** *****, ** ***** **** *** ******** ********** ************ of *** ******.  ***'** *** *** ** **** ********* ********** such ** ****** *** ********* ***********. **'** **** **** **** class (*, *, ** ***********) ** *** ******* *** ********** to *** ******, *** **** *** ********* ***********. ****, ** configure **** ** ***** **** ******** ********** ** ***  ***** system's *********** ** * ******* *** ***** ********** ****.  ****, we'll ****** *** ***** ** **** **** '********' ******* *** connect **** * ******** *** *******. ******* ** *********** ** optimization ********* **** ****** ******* ** ******* ***** ******* ******* onto *** *******.

 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Monitoring

Remote Video Monitoring Providers Directory on May 22, 2017
Remote video monitoring can help integrators generate RMR plus end users lower their security costs and/or improve response to critical...
Shark Tank Startup Guard Llama Mobile Panic Tested on May 16, 2017
A Shark Tank TV show appearance has attracted big attention for Guard Llama, a security startup touting a 'panic button' paired with mobile app...
Burglar Alarm Partitions Guide on May 10, 2017
Many burglar alarm systems have a single designated level of access for users. A user can arm or disarm the entire alarm by entering a single code....
Arming States For Burglar Alarms on May 04, 2017
Burglar alarms give the user the ability to choose how much of their alarm is active at any time. Activating alarm sensors on windows and...
Duress Codes For Alarms Systems on May 02, 2017
An alarm system can call for help in the event of an attempted break in, but only if it is armed. If an adversary forces an authorized user to...
Burglar Alarm Zoning Guide on Apr 28, 2017
The function of an alarm panel is to gather information from sensors and respond to this information by triggering actions. While it is possible to...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Deep Science - Active Threat Cloud Monitoring Startup on Apr 03, 2017
Deep learning for $2 a day for a system that automatically detects guns and masks, alerting the police to robberies and threats? A US startup is...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Simplisafe Warns Customers About Alarm Fines on Mar 17, 2017
Simplisafe markets themselves as a 'better way' than traditional professional alarm companies. However, in one key way, Simplisafe hides the...

Most Recent Industry Reports

H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...
Hikvision Marketer Caught Spamming, Fails at Coverup, Fired on May 23, 2017
A Hikvision marketing employee was caught by IPCamTalk trying to surreptitiously disparage IPVM and IPCamTalk. This is an outgrowth of Hikvision's...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact