Well, it's kinduv along the lines of what you mentioned above. Didn't sound "useless", far from it.
I wasn't referring to myself.
Well, it's kinduv along the lines of what you mentioned above. Didn't sound "useless", far from it.
The second is to wire the integrated PoE switch on the NVR to your LAN. If you only have one port into your LAN available where the NVR is located, then do it like in the picture above, which occupies two PoE ports. If you have at least two ports available, then connect the integrated PoE switch and the NVR management port separately to the LAN. That uses up only one of the PoE ports, and lets the NVR communicate at full speed, as the PoE switch is only 10/100, while the NVR management port is gigabit. With the cameras on your LAN with DHCP enabled, they will get their address from your DHCP server (which typically resides on a router device). You will need to manually point the NVR to the cameras by their assigned IP.
Yes, with a couple of caveats.will I be able to access my cameras with a browser by entering the address 192.168.254.x?
Clearly the cameras prioritize DHCP over the NVR's proprietary IP assignment protocol, so your cameras would get their addresses from your DHCP server. Maybe not immediately, but certainly after a reset, and maybe even after some polling period.I realize that this is an old thread(!) but I'm currently at that point where I am trying to access my IP cameras which are connected to my NVR. My NVR's firmware doesn't support Virtual Host.
My cameras and NVR have been set up for some time now and the cameras have the NVR's IP address scheme of 192.168.254.x whereas my home network is 10.0.2.x. If I follow the advice above and connect an ethernet cable from one of the POE ports to my router and the other ethernet cable from the LAN port of the NVR to the router, will I be able to access my cameras with a browser by entering the address 192.168.254.x? Or do I have to start all over with the cameras and have them derive their address from the LAN's DHCP server?
Yes, but only if the NVR has the Linux kernel 'IP_forward' capability enabled, and if the cameras default gateway was to to the NVR PoE interface IP address, usually 192.168.254.1Out of curiosity, would enabling a static route, on my router, allow me to get to the camera config pages?
Anything beyond that would require configuring another device as a router. Simply enough if you use a Linux machine, but possibly obscure or impossible with standalone router devices.
I wouldn't say that at all. The integrated PoE switch is a completely separate network from the management port. That's why you can't reach the cameras through the NVR without enabling the Virtual Host setting, which turns the NVR into a proxy for communicating with the cameras.HI,
I've been using Blue Iris on a PC, but have been considering a change to a dedicated NVR. One NVR up for consideration is the Hikvision DS-7608NI-E2/8P Embedded Plug & Play NVR with 1TB HDD
After reading through some threads it seems a common problem is that the cameras are not easily reachable when behind the NVR, from the local LAN. If I understand correctly the NVR is essentially operating as a Layer 3 router between the single LAN port and the 8 POE ports (which are essentially their own L2 bridge).
The Virtual Host functionality just maps a port on the NVR to the camera's management interface, so you're not fiddling with different subnets. If you have two switch ports into the main network available, you only need take up one of the PoE ports to make the cameras directly accessible without involving the NVR.Some folks have posted "work arounds" , like enabling IP forwarding on the NVR or directly cabling the LAN port to a POE port etc. These seem sacrificial (losing two POE ports) and cumbersome maintaining two individual IP subnets.
Whether or not you can even get into the NVR via telnet or SSH is a question to answer first. I very much doubt anything extraneous is installed, nor would I expect it to be easy to install something not already present.There may be a much simpler way that I'll throw out, but I don't have access to an NVRs to confirm. If linux bridge utils are present or can be installed, it should be possible to create a L2 bridge and add the LAN and POE ports as members. Then disable the NVR DHCP server, where the idea is that the LAN port and cameras all obtain an IP address from your exiting network DHCP server running on your router.
Can anyone confirm or care to comment? If this is possible then I will likely order the NVR.
"
If you're inclined to experiment - you can access PoE-connected cameras directly on a Hikvision NVR.
3 things required :
Enable 'Virtual Host' - the tick box under web GUI Network | Advanced Settings | Other. This implicitly activates the Linux kernel 'IP_forward' (not to be confused with port forwarding) facility to route traffic between the NVR PoE and LAN interfaces.
Ensure that the default gateway setting on the PoE-connected cameras is the NVR PoE interface IP address, usually 192.168.254.1
Create a 'static route' on your LAN gateway/router to inform LAN devices how to reach the NVR PoE network segment.
Something like 'For network 192.168.254.0, subnet mask 255.255.255.0, use <NVR_LAN_interface_IP_address> as the gateway'.
Then the PoE-connected cameras can be accessed from the LAN via their native (192.168.254.x) IP address.
To confirm connectivity, ping the address or use 'tracert 192.168.254.x' to check the route."
Almost, but not quite. So it's possible I missed it, but these are all layer 3 solutions. That is the forwarding of packets from one IP subnet to another hence the "This implicitly activates the Linux kernel 'IP_forward'" statement and why you need to add static routes.Multiple how-to posts on this topic - example:
You would have to re-write the NVR firmware in order to achieve a Layer 2 solution (devices are identified by IP address / port, not MAC address), and probably even recompile the Linux kernel to include trunking.What I am thinking / wondering is if via the command line (this is embedded Linux right?) one might be able to rig up a layer 2 configuration.
What don't you like about a routed environment? It's just one static route to add."This implicitly activates the Linux kernel 'IP_forward'" statement and why you need to add static routes.
alastair@PC-I5 ~ $ telnet 192.168.1.210
Trying 192.168.1.210...
Connected to 192.168.1.210.
Escape character is '^]'.
dvrdvs login: root
Password:
BusyBox v1.16.1 (2016-06-29 13:49:45 CST) built-in shell (ash)
Enter 'help' for a list of built-in commands.
psh: applet not found
[root@dvrdvs /root] # ifconfig
eth0 Link encap:Ethernet HWaddr 8C:E7:48:6F:81:28
inet addr:192.168.254.1 Bcast:192.168.254.255 Mask:255.255.255.0
inet6 addr: fe80::8ee7:48ff:fe6f:8128/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1649896672 errors:0 dropped:0 overruns:0 frame:0
TX packets:1805873826 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:760960311 (725.7 MiB) TX bytes:2283911007 (2.1 GiB)
Interrupt:59
eth1 Link encap:Ethernet HWaddr 8C:E7:48:6F:81:27
inet addr:192.168.1.210 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::8ee7:48ff:fe6f:8127/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:768402899 errors:0 dropped:120 overruns:0 frame:0
TX packets:2028310788 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1235727377 (1.1 GiB) TX bytes:3879754308 (3.6 GiB)
Interrupt:59 Base address:0x4000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:123840 errors:0 dropped:0 overruns:0 frame:0
TX packets:123840 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:8446955 (8.0 MiB) TX bytes:8446955 (8.0 MiB)
[root@dvrdvs /root] # brctl addbr mybridge
brctl: bridge mybridge: Package not installed
[root@dvrdvs /root] # ll /bin/br*
lrwxrwxrwx 1 root root 19 Apr 27 09:27 /bin/brctl -> /bin/busybox-armv7l
[root@dvrdvs /root] #
Which seller on the Amazon listing?
The 'NI' in the model number, and the 76xx doesn't suggest it's Chinese, what makes you think it is?
Was it a reply from the seller?
Code:alastair@PC-I5 ~ $ telnet 192.168.1.210 Trying 192.168.1.210... Connected to 192.168.1.210. Escape character is '^]'.