Back to Documentation
CCTV 15 min read Updated December 8, 2024

CCTV Network Configuration

Connect your cameras to the network and configure NVR/DVR systems. Includes IP addressing, port forwarding, and remote access setup.

networkNVRremote access

Network Architecture Planning

A well-designed network architecture ensures reliable camera connectivity, adequate bandwidth, and proper security isolation.

Dedicated CCTV Network

Best practice is to separate surveillance traffic from general business network. Use VLANs to logically isolate camera traffic on shared physical infrastructure. This prevents surveillance data from impacting business operations and enhances security by limiting camera accessibility.

Bandwidth Requirements

Calculate total bandwidth requirements based on camera count and streaming quality. A 2MP camera at 15fps typically uses 2-4 Mbps. 4K cameras can use 8-16 Mbps per stream. Account for multiple simultaneous streams (recording plus live viewing). Size network infrastructure with 30-50% headroom for growth.

Network Topology

Star topology with cameras connecting to access switches is most common. Aggregate switches connect access switches to the core network. Consider redundant paths for critical infrastructure. Position switches to minimize cable runs while maintaining path diversity.

IP Address Management

Proper IP addressing simplifies management and troubleshooting while supporting future expansion.

Address Scheme Design

Allocate a dedicated subnet for surveillance equipment. Use a logical numbering scheme - for example, cameras 192.168.10.1-100, NVRs 192.168.10.200-210, workstations 192.168.10.220-230. Document all assignments in a spreadsheet or IP address management system.

Static vs DHCP

Static IP addresses are recommended for cameras to ensure consistent connectivity. If using DHCP, configure reservations tied to MAC addresses. Ensure DHCP lease times are long enough to prevent address changes during extended offline periods.

DNS Configuration

Configure local DNS entries for cameras and recording systems. Meaningful hostnames simplify identification during troubleshooting. Format example: CAM-BLDG1-LOBBY-01 or NVR-PRIMARY. Keep DNS records updated as equipment changes.

Camera Network Settings

Configure individual cameras for optimal network performance and integration.

Basic IP Configuration

Access camera web interface using default IP address (consult documentation). Configure IP address, subnet mask, gateway, and DNS servers. Change default credentials immediately - use strong, unique passwords. Enable HTTPS for web interface access where available.

Streaming Configuration

Configure primary stream for recording at full resolution (H.265 preferred for storage efficiency). Set up secondary stream at lower resolution for live viewing and mobile access. Adjust bitrate settings based on scene complexity and network capacity. Variable bitrate (VBR) optimizes bandwidth but complicates capacity planning.

Time Synchronization

Configure NTP to ensure accurate timestamps across all cameras. Use local NTP server or reliable external source. Verify timezone settings match local requirements. Accurate time is critical for incident investigation and legal evidence.

NVR/VMS Configuration

The Network Video Recorder or Video Management System serves as the central hub for your surveillance network.

Camera Discovery and Addition

Most NVR systems support automatic camera discovery via ONVIF protocol. Verify discovered cameras match expected equipment list. Add cameras manually if auto-discovery fails, using IP address and credentials. Configure camera names to match physical labeling scheme.

Recording Settings

Configure recording mode for each camera - continuous, motion-triggered, or scheduled. Set retention periods based on compliance requirements and storage capacity. Configure pre-event and post-event recording buffers for motion-triggered recording. Establish recording quality settings per camera importance.

User Management

Create user accounts with role-based permissions. Operators may need live viewing only, while administrators require configuration access. Implement password policies including complexity requirements and expiration. Enable audit logging for all user actions.

Remote Access Configuration

Enabling secure remote access allows monitoring from anywhere while protecting system integrity.

VPN Access

VPN is the recommended method for remote access providing encrypted connectivity. Configure site-to-site VPN for permanent remote locations. Use client VPN for mobile administrators. Ensure VPN concentrator capacity supports expected concurrent connections.

Port Forwarding

If VPN is not available, port forwarding allows direct remote access. Forward only essential ports (typically 80/443 for web, RTSP 554 for video). Use non-standard external ports to reduce automated scanning exposure. Always enable HTTPS and change default ports where possible.

Cloud Services

Many modern systems offer cloud relay services eliminating port forwarding requirements. Evaluate cloud service security certifications and data handling policies. Consider bandwidth costs for cloud-connected systems. Ensure adequate upload bandwidth at site for cloud streaming.

Network Security

Protecting your surveillance network from cyber threats is essential.

Firewall Configuration

Implement firewall rules restricting camera communication to only necessary endpoints. Block internet access for cameras unless required for cloud services. Log and monitor all traffic crossing network boundaries.

Firmware Management

Maintain current firmware on all network devices including cameras, switches, and NVRs. Subscribe to vendor security bulletins for vulnerability notifications. Test firmware updates in non-production environment before deployment. Document all firmware versions for compliance and troubleshooting.

Access Control

Implement 802.1X port-based authentication where supported. Disable unused switch ports to prevent unauthorized device connection. Use MAC address filtering as secondary protection layer. Regularly audit connected devices against authorized equipment list.

Need Additional Help?

Our support team is ready to assist you with implementation questions and technical guidance.

export const prerender = true;