Connecting the Bridge to the LAN for Camera Access

Connecting the Bridge to the LAN for Camera Access

The Bridge connects to the local area network with a single ethernet interface card.  The local area network that the Bridge connects to must have access to the internet on ports 80 and 443.  These are the two ports the Bridge uses to communicate to the CHeKT cloud infrastructure.  By default the Bridge obtains an IP address using DHCP, however setting a static IP address is an option.   
Important Information:
  1. Understanding the Bridge Network Requirements: Click Here
  2. How to Mount a Camera Stream: Click Here
  3. How to set up the Bridge Sub-IP Interface: Click Here (Section 2)
In order for the Bridge to connect to cameras for Video Alarm Monitoring, these cameras or recorders must reside on a network that the Bridge can communicate with.  This could be done with the following methods
  1. Same Physical Layer and Subnet as the Bridge's primary interface.
  2. Same Physical Layer and Subnet as the Bridge's secondary interface.

In either method, the Bridge will authenticate to the video device and pull the RTSP stream from the video device into the internal video buffer of the Bridge.  This internal video buffer allows the Bridge to generate a pre and post-alarm video event clip when an alarm trigger occurs. 

Connecting Directly to IP Cameras:

With the Bridge connected to the same physical network as the cameras, the Bridge will authenticate directly with the IP Cameras.


Connecting Directly to an NVR/DVR

With the Bridge connected to the same physical network as the recorder, the Bridge will authenticate to the video recorder and then request a specific channel of video from the recorder.  With this method, the cameras could be either IP Cameras on the Internal Camera LAN of the recorder or coaxal CVI/TVI cameras.


With each of the methods above, the installer will need to know the correct username and password combinates to connect to the video stream.


    • Related Articles

    • How Do I Delete a Camera?

      Removing a Camera When completely removing an IP camera, the user will lose access to the video and snapshot events and the configurations from that device!  Click on the "Customers" tab in your Dealer Dashboard Menu. Click on the desired "Site" ...
    • Analytic Triggers: Using Camera Analytics

      Analytic Events Supported analytic event triggers from a camera mounted to the bridge can generate alarm signals and video events.  These events are based on a supported API connection with the camera. The network event message has topic information ...
    • Bridge Relay and the End-User App

      Bridge Relay Configuration and End-User App Navigation With the release of our Version 2 Hardware Model, the CHeKT Solution incorporated the ability to interface with a myriad of external devices by way of a simple relay output. Once configured, the ...
    • CHeKT 4MP 12vDC AI Turret Camera

      Crafted with durability in mind, the 4MP AI Turret camera boasts a robust construction, ensuring its ability to withstand various environmental conditions. When used the CHeKT Video Bridge, this camera takes advantage of modern IP technology to ...
    • Remote Access for Connecting to Site Cameras and Recorders

      With the Remote Access feature available on your CHeKT Bridge, security companies can remotely connect to the web interface of any camera or recorder paired to a Bridge channel.  This remote access feature can save your company significant time and ...