On 7/17/23 13:47, joe a wrote:
You could use "ethereal" or "tcdump" to log the connection of one camera to the laptop when you boot that camera.


I've not read each and every post, but I suspect the cameras will turn out to be set to obtain address via DHCP, the LAPTOP is enabled to provide DHCP (as server) and the PC is not.

Daniel said he configured the cameras for static IP. IIRC.  I've got mine
(same brand) for DHCP from my Zyxel router. 

But there's also a setting there for DNS.  It can be "Auto" or "Static".
Mine is auto, how about yours, Daniel?

Also have you tried running nmap against the cameras?  Maybe try
it from each of your computers.

Here's one of mine:

Starting Nmap 7.92 ( https://nmap.org ) at 2023-07-17 15:45 PDT
Nmap scan report for 192.168..x.y
Host is up (0.00093s latency).
Not shown: 996 closed tcp ports (reset)
PORT     STATE    SERVICE
53/tcp   filtered domain
80/tcp   open     http
443/tcp  open     https
9000/tcp open     cslistener

No exact OS matches for host (If you know what OS is running on it, see https://nmap.org/submit/ ).


As your cameras and computer are on an isolated network, they can not get infected by malware, so you could disable the automatic boot.


Not a sure bet. MALWARE can hitch a ride on removable media. "AIR GAP" is not a panacea.

That's true.  You can add a SD card in these cameras for local storage. so they can operate
independent of cloud services.  Malware could conceivably hitch a ride on the SD card I guess.

The camera's run embedded Linux.  If you're interested, here's an analysis of hacking into
a Reolink camera.  Great sport!

https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-fun-and-profit

Regards,
Lew