VLAN For Video Surveillance Usage Statistics

By: IPVM Team, Published on Aug 21, 2017

VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used?

125+ integrators told us how and when they use VLANs for surveillance products.

Integrators who use VLANs as a matter of course were quite vocal about the importance of doing so. As one integrator said:

I continue to be amazed at how "security" integrators simply install plug and play network switches and ignore the security of the network. They install alarm & access control systems with supervisory circuits in order to detect efforts to defeat it, yet at the same time feel that IP based security endpoints shouldn't? makes no sense to refuse to become qualified on a critical component of the systems they sell.

Integrators who do not regularly use VLANs either do not see the value in it, or worry that their end users may not have the ability or manpower to set up and maintain a VLAN. As one integrator told us:

We do not get into managing networks as a matter of support, unless it is our own.

Segregating ************ ********* ********** ********** *** ***************

*********** **** ********* *** VLANs ** ** ******* it ***** ** ****** to ************ ********. 

  • "*** *** ****. ***** traffic ******** *** *** VLAN, ***! ** **** to ********* **** **** or ***** *******. **'* preferred ** **** * segregated ******** *******. ****** to ******. **** ******. No **** *** ****. Can **** **** **** security ** ****. *** can **** *** *** depending ** ******** ********."
  • "***** **** *** ******** clean *** ********* ******* concerns *** ***** ************ that *** ******."
  • "****** *** ** *** systems *** ** *****. We *** **** ****** to ********* *** ******* out **** ***** ********."
  • "** **** ***** ** makes *************** ****** *** we **** **** ****** pointing ** ** ********."
  • "******. ******* * ****** the ******** *** *** enforce *** ****** *******. Cameras *** *** **** their ******** ******* ******** rules. ** ** *** permit ****** ****** ** cameras **** *************** *****."
  • "** ****** ***** *** cameras ** *** ******* networks. **'** ****** ********** our *** ******* ** requiring **** ** ***** a **** *** ** to ***. **** **** one **** ***** ** security *** ***** *** IT **** **** ******** fingers ** *** ******* if ****'** *** * bandwidth *******. * ********** like ** **** ** far **** **** *** IT **** ******** ** I ***. ********* **'* unavoidable."
  • "** *** ***** ** anything ****** **** ***** commercial. * **** ***** limit ************ ****** ** the ******* *** ***** create * "*********** *****" for *** ******* **** they ******** **** * customer's *******. ** ********** our ********** ** *** system *** ******** ******* for ** ****** ** the ********'* **** ** that **** ***'* ************* mess ** *** ****** by ****** ******* ** the *******."
  • "***** *** ** ******* and ********** ** ** Departments ******* ************* ** the ******** ********* ***** it ** *** **** way ** **** ***** change ******** **** ****** IT ***** *** ****."
  • "** ** **** ****** to ** ******* ***** later ** ** **** are *** ** *** same ****, **** ** know ** ** *** something ** ** *** of *** *******."

Some ***** *** ******** ******

**** *********** **** *** a **** **** * customer ******** **. 

  • "** *** ********* ******* with ** *********** ** camera *************. ** ***** this ** ** **** to ******. * ***** say **** ***** **** not, **** ** ******* the ***** ** ** a ****."
  • "******** **** ** * decision **** ** **** up ** *** *********. don't **** ****** * preference ** ***** ** either ***."
  • "********* ** *** ********* IT **********'* *********, ** use ***** **** *********."
  • "****.** ******** *** ** IT *** *** ** a **** *** ******** it."
  • "*** *****. ********* *** some ********* ** ********** and *** ********."
  • "** ***'* *** ***** except **** *** ******** insist."
  • "*** ******* **** ** be ******. **** ** the ******** *** ***-******** we *** *** ******** by *** ****** ** their *******, *** ** don't *** *** ****** in ****. ** **** to ********* ** ***** specification, *** **** ***** don't **** *** ******* into *** *** ********* were ****."
  • "******. ** ** ***** we ****** ***, *** ultimately **'* *** ********'* call ** *** **** use ***** *******. ** always **** ** ******* the ******** ** ** why **'* ********* ** segment *** ******* *** other ******** ******* ** a ******** **** **** the ******** ********** *******. Most ********* ********** *** this ***'* ** *****."
  • "***** *****, *** **** is ******* ******** ** the ******** **** ******* reside ** ***** *******."

Some ********* ****** ******* *****

**** *********** *** ******** to *** * ****, because **** ** *** offer ******* ********** ******** and *** *** ********* that ***** ********* *** handle * **** ** their ***. **** ** especially **** *** ******* systems, ***** ********* ** *** benefit **** ***** ** any ****. 

  • "******* ******* (they ***'* *** ** even ***** ** ***** network - *** ***** pay ***** ** ****** network **** ***."
  • "** ********** ********* *** use ** ****'* ******* - ** ** *** generally ****** ******* ********* without *** ********* ** at ***** *** ****'*."
  • "**** ** *** **** especially *** ******* ************* I ***'* *** *****."
  • "** ********** ******* ** an ******** ********** ***** network **** ******* *** always ** * ****** unique ****** *** ****. Not *********** *********** ******* but ******** *** **'* and ***** **** *******. If ** ** **** adding **** * "***********" customer **** ** ***'* use ****."
  • "** ****** ********* ***** and **** ****** ****** good ** *********** *** has *** ************ (**********) to ****** **. ** we ** *** ***** the ******** *** ********* that ** **** **** for * ******** ******* with *** ********."
  • "******. ** ***'* **** that **** ******* *** willing ** ****** ***."
  • "** ***** ******* ** the ***** ***** ** the ******** *** ***/** they ****** ***** ** departments."
  • "** ****** ******* *** customers ** ** * VLAN ** ******** ** separate *** *******. ********* though *** ******** *****'* have *** ********* ** how ** ***** * VLAN.
  • "****** *****, ***** ** don't **** *** ******* game ***** ** ***. There's *** ******** ***** VLAN *** *** ** person ** **** ***** of *** ************ *** he's ******* *** ********* priority *** ** *** own."

Many *********** *** ********* ******** ***** ********

**** *********** ********* ********** ********** networks for ************ *********, *** use ***** **** **** a ******** ************ ******* is *** ********. 

  • "** *** ** *** our *** ******** *** dedicated ******* ******** ********."
  • "****** *****. ** ******* build ** ******** *** for ****."
  • "*** **** ** *** installations (~**%) ** ********* still *** * ********** separate *******, ******** **** percentages **** **** ** the **** ****** ** years. ** *** ******** are ********* ** *** surveillance ******* *** ** VLAN's *** ********."
  • "** *** ******** ******* is ********, **** ***** is ******* ** **** for *****."
  • "******** ********, ** ********* the *** ** * physically ************* ******* (******** bridged *** ***) **** their ******* ****/********/******** *******."
  • "** ****** ** ******** a ********* ******** *******."
  • "** **** ** *** physically ********** ******** *** IP *******. ********** ******."
  • "***** *** ******* *** on ***** *** ******* network, ** **** **** an *****."
  • "******, ** ****** ********** our *** ******** ******* with ********* ******** ***... and ****** *** ******** access *** ******* ******* a ********* ******* **** on *** ****** ** PC."
  • "** ********* ** ********** security *** *** **** of ********** *** ********* security."

**** ***** ** ******** survey ** *** **** percentage ** ***** ************ networks *** ** ********* or ********* ****.

Comments (0)

Read this IPVM report for free.

This article is part of IPVM's 6,540 reports, 881 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Beware Rigged China Fever Cameras on Sep 08, 2020
Many China fever camera manufacturers have rigged algorithms dynamically...
Uniview Deep Learning Camera Tested on Jul 14, 2020
Uniview's intrusion analytics have performed poorly in our shootouts. Now,...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
Fever Camera Sales From Integrators Surveyed on Jun 01, 2020
Fever cameras are the hottest trend in video surveillance currently but how...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Network Cable Usage Statistics 2020 (Cat 5e vs Cat 6 vs Cat 6a) on Sep 02, 2020
Integrators are split between using Cat 5e, 6, and 6a but 2 of them have...
"Fever Camera" Online Show June 2020 - On-Demand Recordings on Jun 03, 2020
IPVM has successfully completed the world's first "Fever Camera" show....
Sunell Panda Cam Body Temperature Measurement Camera Tested on May 14, 2020
Sunell is far less well known than its gargantuan domestic competitors Dahua...
Anixter Runs Fake Coronavirus Marketing Using Shutterstock Watermarked Images on Jul 24, 2020
Coronavirus faked marketing is regrettably commonplace right now but Anixter...
Hikvision Impossible 30 People Simultaneously Fever Claim Dupes Baldwin Alabama on Sep 01, 2020
The Alabama school district which spent $1 million on Hikvision fever cameras...
Directory of 207 "Fever" Camera Suppliers on Aug 04, 2020
This directory provides a list of "Fever" scanning thermal camera providers...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...

Recent Reports

New Products Show Fall 2020 continues tomorrow with Genetec, Milestone, Avigilon, Microsoft and more! on Sep 29, 2020
IPVM's sixth online show continues tomorrow and will feature New Products...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...