Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Setting up a video Survellance System

Posted on 2008-10-20
3
478 Views
Last Modified: 2013-11-16
Setting up a video surveillance camera system and we have a Sonicwall Pro 2040 firewall, we do want to view camera system outside office environment. There will be three Static IP addresses that will have this viewing capability. Loking for some direction on setup with the Sonicwall and port forwarding along with any security issue recommendations. Cameras are DLink DSC-1110 and DSC-3220 which can be directly accessed via web browser.

0
Comment
Question by:gsco
  • 2
3 Comments
 
LVL 7

Accepted Solution

by:
VCBooth earned 125 total points
ID: 22760636
The cameras have a web server built in so you need to map a static IP on port 80 to the static IP of the camera and then you simply access via the webpage.
0
 

Author Comment

by:gsco
ID: 22760799
Due to the camera's being behind the firewall on the same network as our intranet, I need to do port forwarding on the firewall, I am looking for some direction on this along with security concerns.
0
 
LVL 7

Assisted Solution

by:VCBooth
VCBooth earned 125 total points
ID: 22764765
Sorry mate I am unsure what you are getting at?  You ARE port forwarding - forwarding port 80 from a public IP to a private IP.  Or do you mean making your own port and then forwarding that to port 80?  Thats just firewall and NAT policies - i.e. forward PUBLIC:8080 to PRIVATE:80 and then PRIVATE:80 to PUBLIC:8080 ?
0

Featured Post

Portable, direct connect server access

The ATEN CV211 connects a laptop directly to any server allowing you instant access to perform data maintenance and local operations, for quick troubleshooting, updating, service and repair.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
I've been an avid user and supporter of Malwarebytes Premium Version 2.x for years. It's an excellent product that runs alongside just about any Anti-Virus application without issues. It seems to have an uncanny ability to pick up many things that A…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

791 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question