On 7/17/23 13:47, joe a wrote:
You could use "ethereal" or "tcdump" to log the connection of one camera to the laptop when you boot that camera.
I've not read each and every post, but I suspect the cameras will turn out to be set to obtain address via DHCP, the LAPTOP is enabled to provide DHCP (as server) and the PC is not.
Daniel said he configured the cameras for static IP. IIRC. I've got mine (same brand) for DHCP from my Zyxel router. But there's also a setting there for DNS. It can be "Auto" or "Static". Mine is auto, how about yours, Daniel? Also have you tried running nmap against the cameras? Maybe try it from each of your computers. Here's one of mine: Starting Nmap 7.92 ( https://nmap.org ) at 2023-07-17 15:45 PDT Nmap scan report for 192.168..x.y Host is up (0.00093s latency). Not shown: 996 closed tcp ports (reset) PORT STATE SERVICE 53/tcp filtered domain 80/tcp open http 443/tcp open https 9000/tcp open cslistener No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).
As your cameras and computer are on an isolated network, they can not get infected by malware, so you could disable the automatic boot.
Not a sure bet. MALWARE can hitch a ride on removable media. "AIR GAP" is not a panacea.
That's true. You can add a SD card in these cameras for local storage. so they can operate independent of cloud services. Malware could conceivably hitch a ride on the SD card I guess. The camera's run embedded Linux. If you're interested, here's an analysis of hacking into a Reolink camera. Great sport! https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-f... Regards, Lew