VLAN For Video Surveillance Usage Statistics

Author: IPVM Team, Published on Aug 21, 2017

VLANs (see our tutorial) are an option for networks using video surveillance, but how often are they actually used?

125+ integrators told us how and when they use VLANs for surveillance products.

Integrators who use VLANs as a matter of course were quite vocal about the importance of doing so. As one integrator said:

I continue to be amazed at how "security" integrators simply install plug and play network switches and ignore the security of the network. They install alarm & access control systems with supervisory circuits in order to detect efforts to defeat it, yet at the same time feel that IP based security endpoints shouldn't? makes no sense to refuse to become qualified on a critical component of the systems they sell.

Integrators who do not regularly use VLANs either do not see the value in it, or worry that their end users may not have the ability or manpower to set up and maintain a VLAN. As one integrator told us:

We do not get into managing networks as a matter of support, unless it is our own.

***** (*** *** ********)*** ** ****** *** ******** ***** ***** ************, *** *** often *** **** ******** ****?

***+ *********** **** ** *** *** **** **** *** ***** for ************ ********.

*********** *** *** ***** ** * ****** ** ****** **** quite ***** ***** *** ********** ** ***** **. ** *** integrator ****:

* ******** ** ** ****** ** *** "********" *********** ****** install **** *** **** ******* ******** *** ****** *** ******** of *** *******. **** ******* ***** & ****** ******* ******* with *********** ******** ** ***** ** ****** ******* ** ****** it, *** ** *** **** **** **** **** ** ***** security ********* *******'*? ***** ** ***** ** ****** ** ****** qualified ** * ******** ********* ** *** ******* **** ****.

*********** *** ** *** ********* *** ***** ****** ** *** see *** ***** ** **, ** ***** **** ***** *** users *** *** **** *** ******* ** ******** ** *** up *** ******** * ****. ** *** ********** **** **:

** ** *** *** **** ******** ******** ** * ****** of *******, ****** ** ** *** ***.

[***************]

Segregating ************ ********* ********** ********** *** ***************

*********** **** ********* *** ***** ** ** ******* ** ***** it ****** ** ************ ********.

  • "*** *** ****. ***** ******* ******** *** *** ****, ***! No **** ** ********* **** **** ** ***** *******. **'* preferred ** **** * ********** ******** *******. ****** ** ******. Less ******. ** **** *** ****. *** **** **** **** security ** ****. *** *** **** *** *** ********* ** customer ********."
  • "***** **** *** ******** ***** *** ********* ******* ******** *** other ************ **** *** ******."
  • "****** *** ** *** ******* *** ** *****. ** *** them ****** ** ********* *** ******* *** **** ***** ********."
  • "** **** ***** ** ***** *************** ****** *** ** **** less ****** ******** ** ** ********."
  • "******. ******* * ****** *** ******** *** *** ******* *** design *******. ******* *** *** **** ***** ******** ******* ******** rules. ** ** *** ****** ****** ****** ** ******* **** unauthenticated *****."
  • "** ****** ***** *** ******* ** *** ******* ********. **'** either ********** *** *** ******* ** ********* **** ** ***** a **** *** ** ** ***. **** **** *** **** layer ** ******** *** ***** *** ** **** **** ******** fingers ** *** ******* ** ****'** *** * ********* *******. I ********** **** ** **** ** *** **** **** *** IT **** ******** ** * ***. ********* **'* ***********."
  • "** *** ***** ** ******** ****** **** ***** **********. * VLAN ***** ***** ************ ****** ** *** ******* *** ***** create * "*********** *****" *** *** ******* **** **** ******** with * ********'* *******. ** ********** *** ********** ** *** system *** ******** ******* *** ** ****** ** *** ********'* side ** **** **** ***'* ************* **** ** *** ****** by ****** ******* ** *** *******."
  • "***** *** ** ******* *** ********** ** ** *********** ******* consideration ** *** ******** ********* ***** ** ** *** **** way ** **** ***** ****** ******** **** ****** ** ***** are ****."
  • "** ** **** ****** ** ** ******* ***** ***** ** if **** *** *** ** *** **** ****, **** ** know ** ** *** ********* ** ** *** ** *** devices."

Some ***** *** ******** ******

**** *********** **** *** * **** **** * ******** ******** it.

  • "** *** ********* ******* **** ** *********** ** ****** *************. We ***** **** ** ** **** ** ******. * ***** say **** ***** **** ***, **** ** ******* *** ***** on ** * ****."
  • "******** **** ** * ******** **** ** **** ** ** our *********. ***'* **** ****** * ********** ** ***** ** either ***."
  • "********* ** *** ********* ** **********'* *********, ** *** ***** when *********."
  • "****.** ******** *** ** ** *** *** ** * **** and ******** **."
  • "*** *****. ********* *** **** ********* ** ********** *** *** properly."
  • "** ***'* *** ***** ****** **** *** ******** ******."
  • "*** ******* **** ** ** ******. **** ** *** ******** and ***-******** ** *** *** ******** ** *** ****** ** their *******, *** ** ***'* *** *** ****** ** ****. We **** ** ********* ** ***** *************, *** **** ***** don't **** *** ******* **** *** *** ********* **** ****."
  • "******. ** ** ***** ** ****** ***, *** ********** **'* the ********'* **** ** *** **** *** ***** *******. ** always **** ** ******* *** ******** ** ** *** **'* important ** ******* *** ******* *** ***** ******** ******* ** a ******** **** **** *** ******** ********** *******. **** ********* understand *** **** ***'* ** *****."
  • "***** *****, *** **** ** ******* ******** ** *** ******** when ******* ****** ** ***** *******."

Some ********* ****** ******* *****

**** *********** *** ******** ** *** * ****, ******* **** do *** ***** ******* ********** ******** *** *** *** ********* that ***** ********* *** ****** * **** ** ***** ***. This ** ********** **** *** ******* *******, ***** ********* ** not ******* **** ***** ** *** ****.

  • "******* ******* (up ***** ******* - *** ***** *** ***** ** ****** network **** ***."
  • "** ********** ********* *** *** ** ****'* ******* - ** do *** ********* ****** ******* ********* ******* *** ********* ** at ***** *** ****'*."
  • "**** ** *** **** ********** *** ******* ************* * ***'* use *****."
  • "** ********** ******* ** ** ******** ********** ***** ******* **** cameras *** ****** ** * ****** ****** ****** *** ****. Not *********** *********** ******* *** ******** *** **'* *** ***** user *******. ** ** ** **** ****** **** * "***********" customer **** ** ***'* *** ****."
  • "** ****** ********* ***** *** **** ****** ****** **** ** determining *** *** *** ************ (**********) ** ****** **. ** we ** *** ***** *** ******** *** ********* **** ** push **** *** * ******** ******* **** *** ********."
  • "******. ** ***'* **** **** **** ******* *** ******* ** deploy ***."
  • "** ***** ******* ** *** ***** ***** ** *** ******** and ***/** **** ****** ***** ** ***********."
  • "** ****** ******* *** ********* ** ** * **** ** possible ** ******** *** *******. ********* ****** *** ******** *****'* have *** ********* ** *** ** ***** * ****.
  • "****** *****, ***** ** ***'* **** *** ******* **** ***** at ***. *****'* *** ******** ***** **** *** *** ** person ** **** ***** ** *** ************ *** **'* ******* the ********* ******** *** ** *** ***."

Many *********** *** ********* ******** ***** ********

**** *********** ********* ********** ********** ******** *** ************ *********, *** use ***** **** **** * ******** ************ ******* ** *** possible.

  • "** *** ** *** *** *** ******** *** ********* ******* whenever ********."
  • "****** *****. ** ******* ***** ** ******** *** *** ****."
  • "*** **** ** *** ************* (~**%) ** ********* ***** *** a ********** ******** *******, ******** **** *********** **** **** ** the **** ****** ** *****. ** *** ******** *** ********* to *** ************ ******* *** ** ****'* *** ********."
  • "** *** ******** ******* ** ********, **** ***** ** ******* no **** *** *****."
  • "******** ********, ** ********* *** *** ** * ********** ************* network (******** ******* *** ***) **** ***** ******* ****/********/******** *******."
  • "** ****** ** ******** * ********* ******** *******."
  • "** **** ** *** ********** ********** ******** *** ** *******. Simplicity ******."
  • "***** *** ******* *** ** ***** *** ******* *******, ** this **** ** *****."
  • "******, ** ****** ********** *** *** ******** ******* **** ********* switches ***... *** ****** *** ******** ****** *** ******* ******* a ********* ******* **** ** *** ****** ** **."
  • "** ********* ** ********** ******** *** *** **** ** ********** and ********* ********."

**** ***** ** ******** ****** ** *** **** ********** ** video ************ ******** *** ** ********* ** ********* ****.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Security Integrator Project Management Certifications on Jan 10, 2018
Certifications are a common option for technology professionals looking to improve skills and gain validation. But how about for project...
Multicasting Surveillance Tutorial on Jan 04, 2018
Network bandwidth can be a concern for some surveillance systems. While improvements in video codecs, such as smart codecs for H.264 and H.265,...
2018 IP Networking Book Released on Jan 03, 2018
The new IP Networking Book 2018 is a 228-page in-depth guide that teaches you how IT and telecom technologies impact modern security...
QoS for Video Surveillance on Dec 29, 2017
Along with VLANs, QoS is one of the most misunderstood topics in IP surveillance networks. Many purported "experts" claim it is required in any...
NVRs - Embedded vs Separate PoE Switch (Statistics) on Dec 21, 2017
Many NVRs now offer PoE switches embedded, allowing IP cameras to be connected directly to the recorder. On the plus side, these units can...
STP vs UTP for Video Surveillance Tutorial on Dec 20, 2017
For many video system designers, deciding which ethernet cabling to use is a quick decision: go with the cheapest.  However, this overlooks the...
Integrator Managing Projects Statistics (Project Manager) on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...
Security Integrator IT Expertise Statistics on Dec 07, 2017
20 years ago, putting physical security systems on IP networks was just emerging. Today, almost every system is networked in some way, IP cameras...
Risks Of Managing End User Passwords (Statistics) on Dec 05, 2017
Integrators know admin passwords for nearly all end-user systems, according to IPVM statistics. But how do they manage them? How do they ensure...

Most Recent Industry Reports

This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...
"First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....
Winter 2018 Camera Course Registration on Jan 14, 2018
Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the 18th, plus get access to 2 class times - 'day' and...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
CES 2018 Show Final Report on Jan 12, 2018
This is IPVM's final edition of our 2018 CES show report. Below are already numerous images and commentary, with more coming tomorrow.   CES is...
Hanwha ExtraLux Camera Tested on Jan 11, 2018
Hanwha has released the latest in their Wisenet X line, the "extraLUX" series, claiming to "capture crystal clear, true-color images in low-light...
Security Integrator Project Management Certifications on Jan 10, 2018
Certifications are a common option for technology professionals looking to improve skills and gain validation. But how about for project...
Canon Launches World's Most Expensive IP Camera (ME20F-SHN) on Jan 09, 2018
Canon has launched the ME20F-SHN , likely the world's most expensive single imager, non-thermal, IP camera at ~$20,000. And Canon subsidiary...
Hikvision Declares 'Never Click On Links In Emails' on Jan 09, 2018
Hikvision is stepping up its cybersecurity efforts with a clear recommendation - to never click on links in emails: It is a surprising change...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact