Security Systems - Looking For Resources

Discussion in 'Technical' started by 3M-TA3, Jan 8, 2020.


  1. 3M-TA3

    3M-TA3 Cold Wet Monkey

    Nice feature set, many available and inexpensive! Cheap enough to buy spares. Nice GUI and decent manuals.

    The features check all my boxes for security.
     
    Gator 45/70 likes this.
  2. Navyair

    Navyair Monkey++

    Yeah, but will it automatically yell "Get off my lawn" like a genuine grumpy old man? :)
     
    Gator 45/70 and sec_monkey like this.
  3. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    Yea, These were hundreds of dollars when they were new, now they are pennies on the dollar..... I have a bunch of these in my network, with various number of Ports, and UpLink Ports.... (5, 8, 16, 24, 26, 28, & 48). and various Speeds. (10bT, 100bT, 1000bT) on various Ports...
     
    Gator 45/70 likes this.
  4. Tempstar

    Tempstar Monkey+++

    As Sec added, they phone home. I run MikroTik Routerboard routers for this reason, but some others will show this traffic as well. I started watching network traffic due to traffic on my network when there should not have been, and looking up IP addresses and discovering that the cameras (I had 4 brands running at the time) were calling home, or somewhere. They use the same method as Teamviewer to do this, meaning that a VLAN will not stop this activity if the router is connected to the internet. Using Cisco or other managed switches just adds another hoop to jump through but will not stop he issue. The only way is to shut down the ports the cameras use.
    Ubiquiti is good gear, but way overpriced considering it does nothing special as far as cameras go.
     
    Gator 45/70 and sec_monkey like this.
  5. techsar

    techsar Monkey+++

    I went simple and local...wired Samsung 16 camera dvr...lan to wifi so I can watch locally on phone, svga to monitor by the bed, hdmi to big screen...but no internet access. I could, but don't want to.
    Another multicam system to be installed when the weather decides what it's going to do...
     
    Gator 45/70 and sec_monkey like this.
  6. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    Actually, putting the WebCam System on it’s own Subnet/Vlan, that has No Route to to your Internet Access Device, and using a second Ethernet Board in your Most used Computer, that sits on the WebCam Subnet/Vlan, effectively isolates that Subnet/Vlan from any Internet Access in either Direction.. To gain any access to or from such an isolated Subnet/Vlan would REQUIRE an outside interest to Hack into the OS on that Computer, and build a Route thru that Computer, that bridged the two different Subnets/Vlans and would need to go unnoticed by you... Not very likely, and dang near impossible, from the outside, especially because they have NoWay to know how your network is configured, and structured in the first place from the outside... The beauty of Layer3 Switching & Routing....
     
    3M-TA3, Gator 45/70 and techsar like this.
  7. Brokor

    Brokor Live Free or Cry Moderator Site Supporter+++ Founding Member

    I actually take the time to read where the camera is manufactured, then decide where I want the wireless and hardwired cameras to go.
    It's not too difficult if you think about it. Interior for hardwired only, wireless cameras for the exterior.
    China can watch the grass grow if they like.
     
  8. Yard Dart

    Yard Dart Vigilant Monkey Moderator

    I have 5 fur-babies that will raise hell at any noise/disturbance. My bloodhound/great dane sleeps next to the dog door from the back yard. If something happens of note, my house explodes with barks and teeth ready to rock.

    I also run a Nest CCTV/ACS system. We have the doorbell cam, a Shlagg door lock that auto locks after a few minutes of sensing us leave the properties, mag contacts on doors and windows and several cam's around the AO that will ping us on our cell phones, with motion detected.

    Another layer, I have 4 trail cams set up around the AO for recon of people... and animals poking around the area.

    On top of that, I have an aware and responsive neighborhood that is proactive in protecting our area.
     
    Dont, Mountainman, Brokor and 2 others like this.
  9. 3M-TA3

    3M-TA3 Cold Wet Monkey

    Do you have any issues between the Netgear switch VLANs and the Ubiquiti EdgeRouter (assume you are using it as opposed to Unifi)? Is the VLAN on the switch recognized by the router? The reason is that I want to set up VLANS for different cases such as Internet only access, internal network only access, and other types of routing rules.

    I'm planning on one switch in the house and a second switch in a nearby workshop. There will be the same VLANs on both switches and each switch will connect to the router separately as they are in two separate buildings.

    I do like how you are isolating the cameras behind a workstation, so I might consider setting up a second isolated network using a small EdgeRouter and separate cam/security PoE switches in both locations,
     
    Gator 45/70 and sec_monkey like this.
  10. sec_monkey

    sec_monkey SM Security Administrator

    I would not recommend those vendors .. ..

    some of the concepts discussed are a gud idea (y) (y)
     
    Gator 45/70 likes this.
  11. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    My VLans do not talk to each other, unless I build a Route between them so that should work... I use separate Ports on the Router for each VLan, that are isolated from each other by use of separate Sub, for each Nets... Then the Router has separate Ports for each Wan/Internet Connection and the Routing Table sends each of the Lan Ports to it's assigned Wan Port, or No Wan Port at all...
    Isolating the WebCams is done as described and works well as long as you never want to look at them, live from an external computer... However if your Lan/Wan connected Computer that has the isolated Network on it stores the Picts from the WebCams, you can still VPN into that computer and download those and view them direct from the Files, or if you have a Remote Access Like Tiimbuktoo, or the like you can view the Cams, Real Time remotely thru the VPN Connection by accessing that computer using the Remote Control Software...
     
    Gator 45/70 likes this.
  12. 3M-TA3

    3M-TA3 Cold Wet Monkey

    I have too many VLAN's planned for that type of setup tp be practical, but then for your application it's perfect. I might have to buy a small switch in the series I'm considering (they are cheap) and expirament to see if they play nice. I did get an open box Ubiquiti EdgeRouter pro for a stupid low price since the bandwagon is to Unifi. I really don't want Unifi's plug-n-play type system since I want granular control over everything.

    I've been looking into a dedicated computer running Blue Iris (haven't locked that in yet) with dual LAN ports as you described. The software requires Windows 10, which supports dual homing, so I could monitor using Blue Iris's web viewer. That would also allow me to record the streams to my NAS
     
    BTPost likes this.
  13. 3M-TA3

    3M-TA3 Cold Wet Monkey

    As an update, I've been pondering how best to implement PoE on managed switches. There are two main strategies:
    1. PoE injectors
      1. Pros:
        1. inexpensive used managed switches all over eBay
        2. Failed injectors can be replaced
        3. More powerful injectors can be added if needed later
    2. Cons:
    1. Takes up more space
    2. Additional patch cords
    3. Power supplies tend to be bricks, complicating cable management
    3, Resources:
    1. poetexas.com
    2, PoE enabled switches
    1. Pros:
      1. Easier cabling
      2. Less rack space (I'm planning on small wall mounted racks)
    2. Cons:
    1. All eggs in one basket
    2. Assigning PoE to a non PoE port can permanently damage that port or connected device.
    3. Increased rack depth compared to non-PoE switches
    4. Many PoE switches have limitations, for example older Netgear switches can provid PoE+ to a limited number of ports, with others limited to PoE
    5. Generally speaking higher costs
    I was strongly leaning to a rack mount PoE injector solution when I stumbled on a stupid low eBay price on a 24 port 500 Watt Ubiquiti EdgeSwitch (ES-24-500W). A few small scratches on the cover (and I mean small) put it near similar non-PoE switches. Only driven on Sundays by a little old lady, yada, yada, yada, but comes with original box and all original parts, paperwork. Sold sez I; delivery by this Thursday so I can integrate it next weekend.

    I'm going to buy a cheap IP Cam to test every single port for functionality and power. A review on YT has got me interest in the ~$50 ReoLink RLC-410 so that looks like a good test subject



    Per the spec sheet the Ubiquiti ES-24-500W will provide PoW+ to all 24 ports which is enough to power 24 PTZ's so I'm pretty covered with a maximum of nearly 40W per port (assuming not all ports are PoE enabled). Initially, this will be my main switch as I experiment with VLAN's, port management, etc., but in my next house will be on an isolated network per @BTPost 's configuration.

    Why am I set on rack mounting my network gear? First I hate cables and power cords running amuck like a bunch of snakes high in extasy having an orgy. It makes it hard as hell to troubleshoot and you are always untangling things. Second, rack mounted gear is easier to ground for electrical protection. Third, there is less strain on patch cables improving reliability. Fourth, rack mounted equipment is more secure in the event of earthquake. Fourth, it's easier to provide physical security with locking doors and side panels. Fifth, and not least,

    I'm attempting to minimize wireless connectivity in my next house to there will be multiple Cat-6 or better runs to each room (2 per bedroom, 4 to my office, etc.) so these will terminate in patch panels in the wall mounted rack. Yeah, I'm even playing with Visio layouts - this is a prototype of the House rack (a MUCH smaller one will be in the workshop). In order from top to bottom (and may change as I progress):
    1. PoE switch for cameras (ES-24-500W - arriving Thursday)
    2. NeatPatch cable management
    3. Camera/security patch panel (modular RJ45's) Note: am planning different colored cable and jacks for security vs general network. Hell, yes, everything will be labeled on both ends.
    4. House Network patch panel (modular RJ 45's)
    5. NeatPatch cable management
    6. House network switch (ES-24-LITE)
    7. 1 U cable management
    8. Router (EdgeRouter Pro)
    9. 2U Blue Iris Security server
    10. NAS
    11. PSU
    upload_2020-3-8_22-43-49.

    Yes, I have engineering OCD. Yes, I calculate electrical needs, thermal, etc. Yes, it will get it's own dedicated circuit. So sue me.

    Lastly, I came across a great forum dedicated to this stuff: ipcamtalk.com . I've learned a great deal there along with hours and hours of YT vids. I highly recommend perusing the site, especially the FAQ area, if you are new to this or want to expand your knowledge.​
     
    BTPost, Gator 45/70 and Ganado like this.
  14. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    Looks like a good plan to these eyes.....
     
  15. Tempstar

    Tempstar Monkey+++

    My only add here is that any modern POE switch uses sensing to determine if a port needs POE or not. I have a rack full of Cisco 3850s that have POE on every RJ-45 port, but the switch senses if there is a power requirement on the brown/brown-white pair and turns it on or off automatically.
     
    3M-TA3 likes this.
  16. 3M-TA3

    3M-TA3 Cold Wet Monkey

    The new to me PoE switch arrived and after letting it sit a day to acclimatize I powered it on and did did some research and will experiment more tomorrow and this weekend while all the Ubiquiti gear is still in "lab" mode. I have a PoE Tester on the way and will check all ports for performance.

    Yet one more stupid low price on new in box Ubiquiti 48 port non PoE switches (lower than used 24 port non PoE) so another switch is arriving next week so I can lab up the whole shebang.

    I did figure out how to get the router to interact with VLANS on the switch. Searching for data is all about the right keywords. It turns out the terms are "port trunking", "sub-interface" (Ciscoese), and "router in a stick". It appears that you can mix and match switch and router makes so long as the VLAN ID's are the same.

    upload_2020-3-12_19-34-22.

    There is a how to guide here for Ubiquiti routers if it ever becomes a useful option
    EdgeRouter - Router on a Stick
     
    Ganado likes this.
  17. sec_monkey

    sec_monkey SM Security Administrator

    the ubiquiti cloud makes me :cry: :cry:
     
    3M-TA3 likes this.
  18. 3M-TA3

    3M-TA3 Cold Wet Monkey

    Only if you let it happen. I'm OK with the Edge series because it acts like conventional networking. I had to turn on the Legacy UI on the switch, because the new UniFi-ish one is IMO pretty but worthless. The actual UniFi stuff, well no way, Jose. I don't trust things that join others automatically because IMO too prone to attack once someone has access.

    Ubiquiti Cloud Keys ain't gunna happen. I'm considering OpenVPN (still researching) for access when I'm away but would only be on when I wanted it on and not all the time.

    I'm still concerned about Vendor back door access. I've worked with enough support techs to have seen it in action when they ran into roadblocks. I've also had experience with some grey market Cisco gear that was sold as US and turned out it had some mods made by the manufacturers in China. I figure I'm small enough potatoes that hackers will be going after low hanging fruit (I see so many freaking default SSID's in the wireless in my area it ain't funny. I wonder how many have default admin accounts with the default password?

    Even with my VLAN requirements, the Camera/Security LAN will be isolated and only accessed by a multi homed Blue Iris computer.
     
    Ganado likes this.
  19. 3M-TA3

    3M-TA3 Cold Wet Monkey

    Kinda wrapping things up on this thread, but wanted to follow up on the PoE switch that arrived Thursday.

    After a day of letting it sit to acclimatize I turned it on and did a factory reset followed by a firmware update. I ran through the menus for familiarization and to check functionality. I was planning on getting an inexpensive PoE camera to check the ports, this being a used switch, but decided to spend the money on a PoE tester.

    I wound up getting the PoE Texas PoE Tester II. If I used the mode where the tester simulates an end device to check each port for voltage and all passed. If the tester is not set to simulate a PoE device it is connected between the two and will display volts, Watts, and Amps used. That's going to come in very handy when devices start getting attached.

    upload_2020-3-14_14-31-42.

    Manual in case you are interested: Technical Center

    My non PoE switch arrives next Wednesday or Thursday. I'm going to put them into a lab configuration behind my existing router for configuration before migrating to the new equipment.
     
  20. BTPost

    BTPost Stumpy Old Fart,Deadman Walking, Snow Monkey Moderator

    You have a sound plan going there... I always Burn-In, new to me, hardware for a few days before I start to mess with it... Found a really nice PTZ Exterior WebCam with WiFi on Facebook for $85US and. thought I would try it out, for the new place... I can make it POE, by putting a little 10 Watt 48/12Vdc Switching PS in the Brown/White Pair in the ethernet connection on the Cam end.... It is a 1024 Pixel w/Inferred CCD...Similar to what is on the Tower overlooking the Inlet...
     
    3M-TA3 likes this.
survivalmonkey SSL seal        survivalmonkey.com warrant canary
17282WuJHksJ9798f34razfKbPATqTq9E7