ONVIF vs RTSP?

Surprisingly, many still mix up ONVIF and RTSP, assuming ONVIF somehow “carries” the video stream. It doesn’t — and it never has. ONVIF is a control and discovery standard, a way for your VMS to ask the camera what streams are available, which codecs it supports, and how to manage PTZ or motion detection. The actual video is delivered separately, through RTSP or HTTP links. If you expect ONVIF to transmit video, you’re setting yourself up for frustration — it simply isn’t built for that.
What You Need to Know When Setting Up Cameras
When connecting IP cameras to a recorder or VMS, two terms come up most often — ONVIF and RTSP. They are sometimes confused, but they are very different things. ONVIF is Not “Video Stream” - It’s a standard for exchanging data and controlling IP devices. It does not transmit video or audio by itself.

Through ONVIF, the system “asks” the camera:
• what streams it supports,
• their resolution, bitrate, codec,
• which features are available (PTZ, motion detection, audio, etc.),
• and how to change settings.

ONVIF is needed for automatic camera discovery, getting a list of available streams and their parameters, and controlling the camera — for example, panning/tilting or switching profiles.

RTSP Is Where the Video Lives
After the VMS retrieves parameters via ONVIF, it gets an RTSP or HTTP link for connection.
RTSP (Real Time Streaming Protocol) is the protocol that actually transmits video and audio in real time.
Using this link, the recorder or software receives the stream and either saves it to disk or displays it live.

Why Multiple Streams Exist
Most modern cameras can output several streams (stream 1, stream 2, sometimes stream 3):
• Main stream — maximum resolution and quality, used for archive recording.
• Substream — lower resolution (e.g., 640×360), used for quick viewing in mobile apps or in multi-camera layouts without overloading the network.
• Sometimes a third stream exists, optimized for detectors or analytics, with separate parameters.
This reduces network and CPU load: there’s no need to pull 4K video if the camera preview is a tiny thumbnail.

Why Substreams Can Be Unstable
In practice, substreams sometimes fail or return errors because:
• they may not be configured properly on the camera,
• cheaper cameras may not handle simultaneous loads (main stream + two substream clients),
• different manufacturers use slightly different ONVIF profiles, and the VMS may choose the wrong stream.
Often, manually specifying the RTSP link for the substream or lowering parameters (bitrate, FPS) helps.

Most Common RTSP URLs for IP Cameras

Hikvision
rtsp://admin:password@IP_ADDRESS:554/Streaming/Channels/101
(101 = main stream, 102 = substream, sometimes /h264 is added at the end)
Dahua / Uniview
rtsp://admin:password@IP_ADDRESS:554/cam/realmonitor?channel=1&subtype=0
(subtype=0 = main, subtype=1 = substream)
Axis
rtsp://root:password@IP_ADDRESS:554/axis-media/media.amp
Vivotek
rtsp://admin:password@IP_ADDRESS:554/live.sdp
Sony
rtsp://admin:password@IP_ADDRESS:554/media/video1
Panasonic
rtsp://admin:password@IP_ADDRESS:554/MediaInput/stream_1
GeoVision
rtsp://admin:password@IP_ADDRESS:554/CH001.sdp
Foscam
rtsp://admin:password@IP_ADDRESS:554/videoMain
(or videoSub for the substream)
Amcrest / Reolink
rtsp://admin:password@IP_ADDRESS:554/cam/realmonitor?channel=1&subtype=0
Ubiquiti (UniFi Protect)
rtsp://unifi:password@IP_ADDRESS:554/s0
TP-Link Tapo
rtsp://admin:password@IP_ADDRESS:554/stream1
Xiaomi / Imou
rtsp://admin:password@IP_ADDRESS:554/av_stream/ch0
Notes:
• Replace IP_ADDRESS with the real address (e.g., 192.168.1.64).
• Always use the correct login/password, otherwise the camera will not give a stream.
• Some cameras have RTSP disabled by default — enable it in the web interface.
• If the camera supports ONVIF, its RTSP URL can be discovered automatically via SmartVision or ONVIF Device Manager.
Default IP Addresses and Passwords for IP Cameras
When you connect an IP camera for the first time, it almost always has a factory IP address and default login credentials. Convenient for quick setup — but a serious security risk if left unchanged.
Major Manufacturers:
Hikvision — usually 192.168.1.64 or 192.0.0.68, login/password: admin / 12345.
Dahua — 192.168.1.108, passwords: admin/admin, admin/888888, or admin/666666.
Sony — 192.168.0.100 (admin/admin), Axis — 192.168.0.90 (root/pass), Panasonic — 192.168.0.10 or 192.168.0.253 (admin/12345).
Samsung — 192.168.1.200, password: admin/4321 or root/root.
GeoVision — 192.168.0.10 (admin/admin), Pelco — 192.168.0.123 (admin/123456).
Cisco and some others ask you to set a password during initial setup — a more secure approach.
Other Brands:
Many use the very common admin/admin or admin/1234.
Avigilon, Basler, Brickcom, Digital Watchdog, Grandstream, Pixord, Sanyo, Stardot, Trendnet — all typically use admin/admin.
FLIR — admin/fliradmin, Honeywell — admin/1234, Toshiba — root/ikwd, VideoIQ — supervisor/supervisor, Vivotek — root with no password.
Foscam and Starvedia ship with no password — you must set one manually.

VMS Software

Because of its unique combination of cutting-edge capabilities and intuitive operation at a competitive price point, SmartVision stands out as the best option for VMS software. By leveraging current IP cameras and using GPU capabilities for processing, SmartVision reduces hardware dependency and operating expenses in contrast to larger and more costly systems.

VMS Setup and Connection

To integrate a camera into a VMS:
• find its IP address (factory or assigned),
• change it if necessary to match your network,
• locate the RTSP URL in the documentation — most systems require it.
A typical RTSP link looks like:
rtsp://login:password@ip_address:554/Streaming/Channels/101

Compatibility and Limitations
Some cameras only work with their brand’s NVRs. To connect to third-party systems, you may need to enable ONVIF or update firmware.

Security and Passwords
Changing default passwords is critical if the camera has a public IP or Internet access. Leaving admin/admin is like leaving your front door wide open — that’s how many cameras end up in botnets and participate in DDoS attacks.
If the cameras are inside a protected corporate network and access is restricted by a firewall, constant password changes are less critical. Many professional installers set the same password for all cameras to simplify management.
The key is to isolate the internal network and prevent outsiders from having physical access to the cameras.
Factory IPs and passwords are a good starting point, but should only be used during initial setup. If cameras are exposed to the Internet, password changes are mandatory. In a closed network, convenient shared credentials are acceptable. The main principle: balance security with ease of maintenance.

Common Mistakes When Setting Up IP Cameras and CCTV Systems

Even experienced integrators sometimes make errors that compromise security. Here are the most common ones:

Exposing Ports to the Internet
  • Forwarding the camera or NVR port to a public IP without VPN or at least a strong password is the classic mistake.
  • Result: your camera is visible to the whole Internet and indexed by Shodan or ZoomEye in 24 hours.
  • Use a VPN or secure proxy access.
  • If remote access is rare, enable it only temporarily.

Leaving UPnP Enabled on the Router
  • UPnP automatically opens ports for cameras/NVRs. Convenient? Yes. Secure? No.
  • Hackers love UPnP because it does half their job for them.
  • Disable UPnP on the router.
  • Manually forward only the ports you really need.

Placing an Entire Subnet in DMZ
  • Some admins put the whole 192.168.x.x range in the DMZ. Result: cameras, printers, and even smart kettles are exposed.
  • Use a VPN, dedicated gateway, or cloud service for remote access.
  • Never expose the entire subnet.

Same Password Everywhere but No Isolation
  • One login for all cameras is convenient, but if the network isn’t isolated, a compromise of one camera = access to all.
  • If using the same password, put cameras in a separate VLAN with no Internet access or lock them down with a firewall.

No Firmware Updates
  • Old firmware = old vulnerabilities. Some cameras remain exploitable for years and get hijacked into botnets like Mirai. If firmware support is discontinued — consider replacing the device.

Ignoring ONVIF Settings
  • Sometimes ONVIF is disabled or different protocol versions are used, causing chaos during integration. Enable ONVIF, set consistent credentials, test with SmartVision or ONVIF Device Manager.

Security and stability are not just about having high-resolution cameras. Often the real enemy is haste and the “it will do” approach.
Network isolation, disabling unnecessary router features, correct port forwarding, and regular firmware updates will make your system reliable and long-lasting.
How to Use a Smartphone as an IP Camera
Mobile app
Install a mobile app on your phone and use it as an IP camera.
Wi-Fi Router
Port forwarding
Desktop Software
Video Surveillance Software for Windows