If you are not currently experiencing this issue, we suggest hardening your local area network cyber security practices, especially via disabling port mapping / UPNP and port forwarding on your router, before it happens to you.
You can do so here in the NVR interface, but you also need to turn off port mapping / UPNP and port forwarding on your router.
.
If you are experiencing this issue:
Gathering information is going to be critical in order to prevent it from occurring again. As far as we can tell, the clients being attacked are being attacked repeatedly.
If possible, prior to rebooting the NVR and while the issue is actively occurring, pulling diagnostic information from the local display using a USB flash drive.
1. Navigate to Maintain - Backup - Diagnostic Info (At the top) and select the latest NVR diagnostic file and hit export at the bottom left.
2. Navigate to Maintain - Network Info - Net Detect and perform a packet capture with the following parameters
Device Name: This will be your USB flash drive Select Port: 554 Select IP: All
Then select the export button near the NIC connected to your LAN - while performing this task please try to access the local IP of the NVR via a computer, refreshing 3-4 times.
Please repeat the packet capture process again after port 80.
Please send these logs to support@getscw.com along with the DDNS or External IP. If you have any issues getting this information please reach out to our support team who can assist in walking you through the process.
SCW offers multiple viewing options of the NVR including Web Browser, Windows Client, MacOS Client as well as iOS and Android apps. Admiral Line of NVR software links below: https://www.getscw.com/security-camera-software/admiral **Login requires ...