Security settings recommendations for NHDR and NVR 4000 series Novus recorders
All rights reserved © AAT Holding S.A.
9
INITIAL CONFIGURATION
2. 2. 4. Remote access to device – VPN
According to the above recommendations, the preferred option of remote access to devices from /
through untrusted networks (e.g. Internet) is to set up a VPN tunnel that will protect communication
between devices.
VPN architecture:
1.
P2S VPN (Point to Site)
– in case of connecting to the device directly from a user station located
in an untrusted network. This station should have an application installed to set up session. The
tunnel is usually set up for the purposes of logging in to the system once.
2.
S2S VPN (Site to Site)
– in case of connecting to a device from a trusted network (e.g., a second
company location). A tunnel set up permanently between locations on edge devices.