VPNs for Video Surveillance Guide

By: IPVM Team, Published on Feb 07, 2017

Remote access in surveillance networks is a key cyber security and usability issue. With cyber attacks rising, how can users ensure their systems are secure without losing access from outside the network?

VPNs for Video Surveillance Guide

Virtual private networks (VPNs) have historically been used in complex / large systems to secure data but can also be used in smaller sites with relatively inexpensive. To better demonstrate this we purchased two Dell SonicWall SOHO routers and configured them to simulate a site to site VPN.

Inside, we look at VPN usage in video surveillance, including the following topics:

  • What is a VPN?
  • VPN protocols
  • VPN topologies
  • VPN price considerations
  • Benefits and drawbacks
  • Site to site VPN configuration
  • Remote access VPN configuration
  • Mobile device usage
  • Recommendations for VPN use

Virtual Private Networks

A VPN is a private network that creates a secure tunnel over the internet to connect two or more endpoints. These endpoints can be a VPN appliance, a workstation, or a mobile device.  Encryption creates a secure connection from one endpoint to the other keeping data private, even while transmitted over the internet. For example, looking at a Wireshark trace of a secure tunnel, once the TLS connection is set up, only "Application Data" is shown, as packet contents are encrypted.

Wireshark Trace of Secure Tunnel

There are several VPN protocol options, which mainly vary in level of encryption and device compatibility. These include:

In this tutorial, our VPN setup used IKEv2 over IPSEC on SonicWALL devices.

VPN Topology

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

There are two commonly used VPN topologies, which have different use cases:

  • Site to site: A site to site VPN requires an appliance at both locations, which essentially routes the two remote networks together into a single virtual network. In security, this may be used to connect two facilities' camera LANs together so they may be managed and viewed as one, from either location.
  • Remote access: In a remote access VPN there is one VPN appliance (also known as a concentrator) and a workstation which connects via client software. This type of VPN may be used to connect remote users to a security network for viewing, or for configuration/troubleshooting tasks for integrators. 

We discuss these topologies in more detail below.

VPN Pricing

VPNs are most often run on dedicated hardware, typically included on a router or firewall. Pricing for hardware VPN varies depending on capabilities (typically number of VPN tunnels) and throughput handling. Some may be found for <$100 USD online, while large capacity VPN concentrators sell for more than $10,000.

In addition to hardware VPN appliances, users may install software to turn a server/PC into a VPN concentrator. The most popular option for this is OpenVPN, which is priced at $15/year per client.

VPN Benefits/Drawbacks

There are three key benefits to VPNs:

  • Security: Because all traffic between VPN endpoints is encrypted and surveillance/security devices are not exposed directly to the internet, VPNs provide improved cyber security compared to port forwarding/DDNS. Note that cloud services such as Hik-Connect, Nest, etc., also encrypt this traffic.
  • Reliability: Because they use dedicated hardware, VPNs are typically more reliable than using cloud services or DDNS, which are outside of users' control.
  • Accountability: Unlike other remote access methods, VPNs keep full log information, allowing users to determine who access which device at a given time, etc., for better auditing.

However, there are two drawbacks which have kept VPNs from being more commonly used:

  • Cost: VPN hardware adds cost to a project, where manufacturer cloud services and port forwarding/UPnP are generally free. Dynamic DNS is most often not free, typically a few dollars per month to $100+/year. 
  • Complexity: VPN setup requires IT expertise which many/most surveillance installers do not possess. Even among those in the IT field, many have never set up VPN policies.

Site to Site VPN Example

As an example of a site to site VPN, the diagram below illustrates a headquarters location with a VMS server and viewing station, along with a satellite office with multiple cameras and a viewing station. Using a site to site VPN, the entire security network functions as one. 

Site to Site VPN

To better demonstrate this we purchased two SonicWall SOHO routers and configured them to simulate a site to site VPN.

Configuration Steps

In this section we outline the steps taken to configure our routers for site to site VPN use. The exact steps required by specific manufacturers vary, but basically VPN creation is a three step process:

Create VPN policy → Define networks → Select networks to connect

Create Policy

In this step, we select the type of VPN (site to site), protocol used, and give it a name and shared secret (similar to a password, used by both devices to connect).

Define VPN Policy

Define Local and Remote Networks

Next, we must define networks for both the local and remote site in order to create routing rules. There are two key notes in this step:

  1. This must be performed on both devices. In other words, in our example, we must define the satellite office network (192.168.2.x) on not only the HQ router, but the satellite as well. The same must be done for the HQ network (192.168.1.x) on both devices.
  2. These networks must not use the same subnet in order to route properly. This is why we used 192.168.1.x for the HQ and 192.168.2.x for satellite.

Note that counterintuitively, both these networks are assigned to the "LAN" zone in this example. Despite one logically being the "WAN", SonicWALL reserves that terminology for other uses, so both are LAN.

Select Networks To Connect

With them defined, we can now select the two networks to be connected via the VPN. On the HQ appliance, we select the HQ network defined above as "local", and choose "Satellite Office" as the destination network. On the Satellite Office appliance, we would do the reverse.

Select Networks to Connect

Enable Policy To Connect

Once we configure both VPN appliances with the above, we can enable the policy to connect the two sites. In the video below, we show that the sites are unable to communicate with each other until the VPN tunnel is established. When the VPN is active devices start responding to ping requests and the camera can be remotely viewed / administered. 

Remote Access VPN

In many situations we do not require an entire site to connect to our network, and often our users connect from networks that we do not control. We can provide individual users with VPN access.  The configuration starts the same as a point to point solution, create VPN policy. After that we walk through creating a VPN user, and configuring the client software.

Remote Access VPN

Define Policy

The configuration starts with creating a VPN policy on the appliance located at the site that requires access. This simply requires the connection type, a name, and shared secret. Note that this shared secret is similar to, but separate from, individual user passwords.

VPN Policy For Remote Access

Create Account(s)

After the policy is built on the VPN appliance, we create user accounts. These credentials are used on client devices when connecting to the VPN.

User Settings

Define Access

Finally, users are assigned one or more network which they may access via the VPN. These networks are defined above in the Define Local/Remote Networks section.

Assign LAN Access to Users

Accessing VPN Via Client

With the above user created, we may now use the software client to access the VPN, shown below:

Remote VPN Example: VMS Client to Server

The animation below demonstrates a common use case for remote VPN, connecting a client machine to remote server(s). In the example below, servers are unreachable when the VPN is disconnected, but come online once the connection is established, with live video loading in only a few seconds.

Remote VPN Example: Mobile Device to Server

Many/most VPNs may be used on mobile devices in addition to hardware/software clients. For example, the image below shows Exacq Mobile running on an iPhone, connected to a remote server via the SonicWALL Mobile Connect app. VPN status is indicated in the top bar, next to the mobile carrier status.

Exacq Mobile Client Via VPN over LTE

Conclusions

Given the increase in cyber attacks (both severity and frequency) along with the falling costs of VPN hardware, we expect VPN usage to become more common in 2017 and beyond, as it provides better security and accountability than other remote access methods. These issues are likely to only increase in importance as cyber security issues continue to increase.

5 reports cite this report:

Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Remote Network Access for Video Surveillance Guide on Feb 21, 2018
Remotely accessing surveillance systems is key in 2019, with more and more users relying on mobile apps as their main way of operating the system....
Favorite Software For Remotely Supporting Video Surveillance Systems on Feb 07, 2018
Being able to remotely support video surveillance systems is important both to reduce costs (eliminating truck rolls) and for...
Hacked Hikvision IP Camera Map USA And Europe on Jan 22, 2018
The interactive map below shows a sample of hacked and vulnerable Hikvision IP cameras across the USA and Europe. Hover over a marker to see an...
Comments (22) : PRO Members only. Login. or Join.

Related Reports

Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Biometrics Usage Statistics 2019 on Aug 13, 2019
Biometrics are commonly used in phones, but how frequently are they used for access? 150+ integrators told us how often they use biometrics,...
Milestone "GDPR-ready" Certification Claim Critiqued on Aug 12, 2019
Milestone is touting that its latest XProtect VMS is "GDPR-ready" with a 'European Privacy Seal'. However, our investigation raises significant...
ProdataKey (PDK) Access Company Profile on Aug 09, 2019
 Utah based ProdataKey touts low cost cloud access, wireless controllers, and no dealer required national distribution availability.  But how does...
Axis Door Station A8207-VE Tested on Aug 07, 2019
Axis newest door station, the A8207-VE, claims to deliver "video surveillance, two-way communication, and access control" in a single device. But...
Mobile Access Control Shootout - Farpointe, HID, Openpath, Nortek, Proxy on Jul 29, 2019
One of the biggest rising trends in access control is using phones as credentials but which offering is best? IPVM has tested five of the...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
History of Video Surveillance on Jul 19, 2019
The video surveillance market has changed significantly since 2000, going from VCRs to ab emerging AI cloud era.  The goal of this history is to...
Mobile Access Usage Statistics 2019 on Jul 18, 2019
The ability to use mobile phones as access credentials is one of the biggest trends in a market that historically has been slow in adopting new...

Most Recent Industry Reports

Uniview Beats Intel In Trademark Lawsuit on Aug 19, 2019
Uniview has won a long-running trademark lawsuit brought by Intel, with Beijing's highest court reversing an earlier Intel win, centered on...
Suprema Biometric Mass Leak Examined on Aug 19, 2019
While Suprema is rarely discussed even within the physical security market, the South Korean biometrics manufacturer made global news this past...
Verkada People And Face Analytics Tested on Aug 16, 2019
This week, Verkada released "People Analytics", including face analytics that they describe is a "game-changing feature" that "pushes the...
Dahua OEM Directory 2019 on Aug 16, 2019
US Government banned Dahua OEMs for dozens of companies. The following directory includes 40+ of those companies with a graphic and links to...
Installation Course - Register Now on Aug 15, 2019
Register Now for the September 2019 Video Surveillance Install Course. This is a unique installation course in a market where little practical...
Axis Suffers Outage, Provides Postmortem on Aug 15, 2019
This week, Axis suffered an outage impacting their website and cloud services. Inside this note, we examined what happened, what was impacted...
Hikvision Scrutinized In The Netherlands on Aug 15, 2019
Hikvision is facing unprecedented scrutiny in the Netherlands, at the same time the US government ban has taken effect. This week, a Dutch...
Axis 4K Camera Shootout 2019 on Aug 14, 2019
Axis' 4K Q3518-LVE claims the "best video quality possible", with Lightfinder super low light performance, Axis' high end Forensic WDR, and...
CheckMySystems Company Profile on Aug 14, 2019
CheckMySystems says that too many users respond, "I get an email when something is wrong" when talking about their video system maintenance plan,...
Hikvision OEM Directory on Aug 13, 2019
The Chinese government-owned and US-government banned Hikvision has become the world's largest video surveillance manufacturer and generally hidden...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact