Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Setup a DMZ Zone for a Q-SEE CCTV in a SONICWALL to give access to a remote laptop that could be in any domain

Posted on 2014-12-16
7
Medium Priority
?
442 Views
Last Modified: 2014-12-19
Currently I have a Q-SEE CCTV system that I have given a static ip address 192.168.1.x and I have a laptop that needs access to this CCTV system from anywhere as it moves from State to State within different networks.

I have a fairly new SONICWALL NSA 250M and believe the best thing to do is to set up a DMZ. I could be wrong...but please I am open for suggestions.

How do I go about achieving this?

Thanks.
0
Comment
Question by:CarloVasquez
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
7 Comments
 
LVL 11

Expert Comment

by:rharland2009
ID: 40503412
You could certainly put the CCTV system in the DMZ if you wanted to - this would also officially segregate it from your LAN and would require some rules to allow connection from inside your network.
If the CCTV system has authentication, then perhaps the easiest way to accomplish this would be use NAT/PAT to map a public IP address to the private IP of the CCTV system, and have the traveling laptop access the CCTV system via the public IP.
Even if you put the CCTV in the DMZ, you'd still need to do some amount of port forwarding/NAT translation to make it accessible from the external Internet.
If your laptop user connects to your network via VPN, then you could leave the CCTV system where it is.
0
 

Author Comment

by:CarloVasquez
ID: 40503567
I was thinking about the VPN too...never done a NAT/PAT configuration.
0
 
LVL 11

Expert Comment

by:rharland2009
ID: 40503570
Re: NAT/PAT - not too bad on a Sonicwall. The wizard's actually really good and will do most of the heavy lifting for you.
However, if you go the VPN route, you won't have to do anything - as long as the laptop user is okay with getting on the VPN before they can view the cameras.
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 

Author Comment

by:CarloVasquez
ID: 40504804
I have a Sonicwall Firewall, so if I wanted to set this up correctly using a VPN, I would have to do it using a VPN Tunnel and not  a Site to Site configuration correct?
0
 
LVL 11

Accepted Solution

by:
rharland2009 earned 2000 total points
ID: 40504942
That's correct - or you could simply have the user leverage the Sonicwall VPN client on their laptop. Very easy.
0
 

Author Comment

by:CarloVasquez
ID: 40508021
I am trying to setup the Sonicwall as a VPN and having issues doing it thru a POLICY TYPE Tunnel.
Can you help with this as well? Thanks.
0
 

Author Closing Comment

by:CarloVasquez
ID: 40509833
Thanks that be all. I called Dell for my SonicWall, they were able to help me setting up the VPN. :)
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When posting a question about a Cisco ASA, Cisco Router or Cisco Switch, it can aid diagnosis if a suitably sanitised copy of the config is provided. It is much better to leave as much of the configuration as original as possible, as it could be tha…
Before I go to far, let's explain HA (High Availability) and why you should consider it.  High availability is the mechanism used to provide redundancy to any service at the same site and appears as a single service to the users of that service.  As…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question