Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Managing Wired + Wireless IP Cameras (blocking access explicitly?)

    Scheduled Pinned Locked Moved Firewalling
    13 Posts 3 Posters 5.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • I
      iced98lx
      last edited by

      Thanks Derelict for the comprehensive response. I can support multiple SSID's but I recently retired my old DDWRT powered AP's in favor of some D-Link DAP-1650 which have "Guest SSIDs" but not just raw control over SSID creation/managment or VLAN tagging for them. I may opt to simply add an OPT1 and have that be the "CAM" network.

      I currently do not allow any outside access to any of the cams, nor do I allow VPNing to the network as one of the cam's is a baby monitor. I may relent and allow a VPN of some sort into the network so I can check in while traveling. I am very rusty on OPEN VPN options but I think that appears to still be the best option and it has viable options for Android and Windows clients.

      Thank you again, the overview is much appreciated and allows me to say I'm OK going forward with the cameras in my  main network and using VPN For remote access as needed. I will look to eventually put cam's on their own segment via an OPT interface or VLAN's and add some additional controls that way.

      1 Reply Last reply Reply Quote 0
      • I
        iced98lx
        last edited by

        Wow didn't take much to get OpenVPN going with Cert + Login authentication. The client export package makes getting it going on Android and Windows a breeze. I remember distinctly paying Chris to walk me through step by step connecting a site to site open VPN a few years ago and thinking it seemed more complex than it needed to be. Sure is slick now with the wizard.

        1 Reply Last reply Reply Quote 0
        • DerelictD
          Derelict LAYER 8 Netgate
          last edited by

          Yup. EZPZ. And pretty secure with SSL/TLS + User Auth with TLS authentication enabled. You pretty much only have to worry about the key getting compromised. Lots of luck to anyone without it.

          Chattanooga, Tennessee, USA
          A comprehensive network diagram is worth 10,000 words and 15 conference calls.
          DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
          Do Not Chat For Help! NO_WAN_EGRESS(TM)

          1 Reply Last reply Reply Quote 0
          • I
            iced98lx
            last edited by

            @Derelict:

            Yup. EZPZ. And pretty secure with SSL/TLS + User Auth with TLS authentication enabled. You pretty much only have to worry about the key getting compromised. Lots of luck to anyone without it.

            Yea, I went with SSL/TLS + USER and it was a breeze. Sure makes me feel better vs poking holes. Now to get some sort of Dynamic DNS setup since my cable company decided to start moving IP's on me after 10 years of the same IP.

            1 Reply Last reply Reply Quote 0
            • I
              iced98lx
              last edited by

              Sorry for the noob here, but I see traffic going from Cams to WAN. This is apparently a known "Feature" of some of the cameras I have. Will this firewall rule (assuming IP_CAMS is an alias of cameras) block any access from the cameras to the outside world:

              ?

              I am always on the LAN network when connecting to the cameras thanks to the VPN set up above.

              1 Reply Last reply Reply Quote 0
              • KOMK
                KOM
                last edited by

                Change the Destination from WAN Net to Any.  WAN Net is not "The Internet", it's just the actual network your WAN IP is part of.

                1 Reply Last reply Reply Quote 0
                • I
                  iced98lx
                  last edited by

                  @KOM:

                  Change the Destination from WAN Net to Any.  WAN Net is not "The Internet", it's just the actual network your WAN IP is part of.

                  That won't block traffic to LAN? This is why I ask I guess.

                  1 Reply Last reply Reply Quote 0
                  • I
                    iced98lx
                    last edited by

                    Of course it won't, this iscontrolling traffic coming FROM the LAN going anywhere else (thus the any) thanks for the patience ;)

                    1 Reply Last reply Reply Quote 0
                    • KOMK
                      KOM
                      last edited by

                      this iscontrolling traffic coming FROM the LAN going anywhere else

                      Now you're getting it.  Rules apply to traffic entering an interface and control where that traffic is allowed to go to.

                      1 Reply Last reply Reply Quote 0
                      • I
                        iced98lx
                        last edited by

                        @KOM:

                        this iscontrolling traffic coming FROM the LAN going anywhere else

                        Now you're getting it.  Rules apply to traffic entering an interface and control where that traffic is allowed to go to.

                        I was CISCO CCNA Certified 14 years ago, you'd think this wouldn't be this foreign to me but that's what you get when you become a middle-manager stooge. Thank you again for your patience and answers this community has always been so helpful.

                        1 Reply Last reply Reply Quote 0
                        • First post
                          Last post
                        Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.