Solved

Setting up a video Survellance System

Posted on 2008-10-20
3
474 Views
Last Modified: 2013-11-16
Setting up a video surveillance camera system and we have a Sonicwall Pro 2040 firewall, we do want to view camera system outside office environment. There will be three Static IP addresses that will have this viewing capability. Loking for some direction on setup with the Sonicwall and port forwarding along with any security issue recommendations. Cameras are DLink DSC-1110 and DSC-3220 which can be directly accessed via web browser.

0
Comment
Question by:gsco
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
VCBooth earned 125 total points
ID: 22760636
The cameras have a web server built in so you need to map a static IP on port 80 to the static IP of the camera and then you simply access via the webpage.
0
 

Author Comment

by:gsco
ID: 22760799
Due to the camera's being behind the firewall on the same network as our intranet, I need to do port forwarding on the firewall, I am looking for some direction on this along with security concerns.
0
 
LVL 7

Assisted Solution

by:VCBooth
VCBooth earned 125 total points
ID: 22764765
Sorry mate I am unsure what you are getting at?  You ARE port forwarding - forwarding port 80 from a public IP to a private IP.  Or do you mean making your own port and then forwarding that to port 80?  Thats just firewall and NAT policies - i.e. forward PUBLIC:8080 to PRIVATE:80 and then PRIVATE:80 to PUBLIC:8080 ?
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
suspending the anti virus 6 129
Officejet 6230 not printing 11 111
Security risks of IM, RM & messaging systems 2 115
Botnet detection help me please 21 117
This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question