Securityspy server9/1/2023 I'm sure you're already aware, but the Mac should have a static IP address for this purpose, set in the Network system preference. You can test your time server from Terminal with the sntp tool: You can get the current status of the ntpd server like this: Also you would have to jump through a few more hoops to get it to start automatically upon reboot (you should be able to find instructions if you Google this, it's quite a common thing to do). I notice that now my client (trial mode) cannot get any camera images from the server now that Ive upgraded with a 'SSL connection error' being displayed. I am running MacOS Ventura (Apple) on my SecuritySpy Client. Note that it may take a few minutes to initially synchronise and be able to give out the time to network devices. I am running MacOS Ventura (Intel) for my SecuritySpy server. You should now have an NTP server running on your Mac - confirm this in Activity Monitor by searching for the "ntpd" process(es). You will need to edit the configuration file to give it some valid ntp servers, and also allow access to your NTP server from other devices on the local network. This installs the "ntpd" tool at /usr/local/sbin and a "nf" configuration file at /usr/local/etc (you get get to these folders using the "Go to Folder." option in the Go menu in the Finder. Run the following Terminal commands, each ending with a return: "cd /Users/ben/Downloads/openntpd-6.2p3") Open Terminal and cd into that folder (e.g. Once downloaded, double-click on the zip file and it will expand to a folder. You can choose which time zone in which to display times of captured files - either the zone of the server or the zone of the iOS device can be used for this. Download the OpenNTPD source code (click Releases on the left and click on any download link). In the Settings app on your iOS device, scroll down and tap SecuritySpy to access the settings: Settings: Time Zone. If you haven't done so already, install Apple's Command Line Tools. Still, it is possible to download and compile your own NTP server tool: Also, this feature would not be useful for most users, and we would prefer to spend our development time elsewhere. So even if you got this to work, you will find that sometimes it. This is for security purposes, and running any standard application as root is not advisable. It should be possible to set up the IPv6 port filtering option in the router to make your SecuritySpy server available to the Internet via IPv6 (probably best to ask your ISP how to do this), but then you will only be able to access it from a connection that is also IPv6 enabled. It's not really something that we can implement in SecuritySpy - NTP servers require access to port 123, and to listen on that port, macOS applications have to be run as root (which is the case for any port below 1024). This configuration has to be just right for this work correctly and reliably, so I would strongly recommend you switch your network to single-NAT by setting one of the routers to bridge mode, if possible.It's unfortunate that Apple have stripped this from Mojave. Default is port 8000, but you are free to select another port if you want to. Make sure that HTTP enabled on Port is selected and note the Port number as you need this later. Select Preferences from the SecuritySpy Menu and click the Web icon on the Top Left. Set up manual port forwarding in router 2 to forward ports 8000/8001 to the Mac. Enable the Web Server Open SecuritySpy on your Mac. It’s like running nmap and doing active reconnaissance for the entire Internet. Set up manual port forwarding in router 1 to forward ports 8000/8001 to router 2 Not only web servers, but also printers and network devices, webcams, voip phones, washing machines, refrigerators, gas station pumps, whole IoT and other strange things connected to the Internet. Assign router 2 a static WAN IP address on It’s network (192.168.1.x) Assign the Mac running SecuritySpy a static IP address on its network (10.0.1.x). Drag SecuritySpy from your Applications folder to your Trash (this wont affect your settings) - Download and install SecuritySpy 5.2. If, for any reason, you don’t want to do this, then the procedure to set this up manually is as follows: This turns off NAT in that router, and in that case SecuritySpy should be able to set up access from the internet automatically without any manual configuration. The best solution here would be to set one of the routers to “bridge mode”. This dual-NAT setup is not ideal, and requires manual configuration of both routers to allow incoming connections from the Internet to any device behind the second router.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |