New Question
 
 
PRTG Network Monitor

Intuitive to Use.
Easy to manage.

200.000 administrators have chosen PRTG to monitor their network. Find out how you can reduce cost, increase QoS and ease planning, as well.

Free PRTG
Download >>

 

What is this?

This knowledgebase contains questions and answers about PRTG Network Monitor and network monitoring in general. You are invited to get involved by asking and answering questions!

Learn more

 

Top Tags


View all Tags


Best way to setup PTRG?

Votes:

0

Your Vote:

Up

Down

Hey all :-)

Im looking for the best and most secure way to set up PRTG on my network. So that we can access the PTRG via Mobile, besides all the other options (web interface etc)

There are several ideas :

1) Full install of PRTG in DMZ, and a Remote probe into LAN for scanning.

2) Full install of PRTG in LAN and then a remote proxy in DMZ to the PRTG server.

3) ?

Do you guys and gals have any ideas?

dmz lan secure

Created on May 21, 2019 7:54:26 AM by  steendk_hydro (0) 1



3 Replies

Votes:

0

Your Vote:

Up

Down

Hi there,

Setting up the core server in the DMZ and to perform the internal monitoring via remote probes sounds like a save way to publish PRTG to the WAN. Option two is also viable, depends on you for which solution you go at the end.

For some additional information, kindly take a look at this page.


Kind regards,
Felix Saure, Tech Support Team

Created on May 21, 2019 9:20:36 AM by  Felix Saure [Paessler Support]



Votes:

0

Your Vote:

Up

Down

Thank you :-)

But can you tell me some pros and cons for the diffrent scenarios from my original post?

Created on May 21, 2019 10:02:23 AM by  steendk_hydro (0) 1



Votes:

1

Your Vote:

Up

Down

Hello,

Number one would just require a NAT / PAT rule in your firewall, or a VPN connection to access the web server. The DMZ firewall separating the DMZ from the internal network would just require on TCP port for the connection, 23560 by default.

If you use a reverse Proxy, the firewall needs a rule to forward the webserver requests. Both are secured via TLS 1.2, so the only difference is that you can further restrict the access via the rule set of the reverse proxy.

In general, it depends on how your network is currently designed and to what security rules you need to obey.


Kind regards,
Felix Saure, Tech Support Team

Created on May 21, 2019 10:59:16 AM by  Felix Saure [Paessler Support]



Please log in or register to enter your reply.


Disclaimer: The information in the Paessler Knowledge Base comes without warranty of any kind. Use at your own risk. Before applying any instructions please exercise proper system administrator housekeeping. You must make sure that a proper backup of all your data is available.