The security of the systems depends on, among other things, on the knowledge of their real and not just the supposed state. There are many ways to solve it. PLC IPLOG in the role of monitoring the unit is one of them. They support a wide range of communication protocols, facilitating integration with VMS (Video Management Software) from various manufacturers. See, for example, successfully tested applications with VMS Pelco VideoXpert.
What is the main advantage of our solution?
High Level of Security - we monitor network elements using the standardized SNMPv3 protocol. The AES algorithm protects data against eavesdropping and SHA-1 against unauthorized changes during transmission.
Without additional licenses to VMS - for the transfer of status information, we use a standard ASCII plugin supplied by the VMS manufacturer, Pelco. Plugin settings are well documented and do not require any special skills.
Technical support - the entire system is available at our headquarters for teaching and training purposes. Therefore, our technical support can advise you on your system's configuration at the highest professional level.
Examples of Information Forwarded via SNMP to the IPLOG
- IEEE802.1X user authorizations
- Supply voltage
- Voltages of backup batteries
- Operating temperatures
- Status of network connections
- Data flow
- Tampering (covering) of the IP camera
IPLOG processes the information received by the SNMP protocol according to the set program. If it evaluates any information as critical or important, it forwards it to the VMS. The operator thus only receives information that requires some response and is not distracted by a large amount of irrelevant information.
Example of Information Forwarded to the VMS
- IEEE802.1X user authorizations failed
- Supply voltage out of range
- The voltage of the backup battery is low
- Operating temperature is out of the allowed range
- Tamper is open
- A network connection is interrupted
- Allowed data flow was exceeded
- IP camera is covered
Updated: 18. 11. 2020