Skip to main content

User Guide - Securing IoT Communications


A security services company provides video monitoring services to mainly small independently owned stores. Their solution consists of installing one to four cameras in the store. The cameras store videos locally but need to communicate certain events such as after-hours motion detection, etc. over the store’s internet connection to the security company’s monitoring server.

Owen is in charge of IT and Networking for this company. He has been tasked to find a solution that:

  • Provides the cameras secure Remote Access to the monitoring server

  • The cameras use the customer’s Network for access to the internet and therefore should not require any changes to the customer’s router or firewall

  • Restrict communication between different customer’s Network

  • Should not require any additional servers to install or maintain for this secure communications solution

Owen is aware that unlike IPsec, CloudConnexa protocol is firewall-friendly and will not require any changes to the customer’s internet equipment. He has decided to use a router supplied by Ubiquiti to create a small private Network for the cameras at the store premises. The router connects to the store’s Network for internet access. The Ubiquiti router also has native support for CloudConnexa protocol. Now that the networking solution compatible with CloudConnexa has been found for the monitoring site it comes down to having the camera Network accessing the monitoring server on Azure securely.

Owen decides to use CloudConnexa to build a WPC that provides secure communications from the camera Networks at different stores to the monitoring server. He completes the signup process as shown here. During the signup process, Owen selects a CloudConnexa-ID for his WPC. This [CloudConnexa-ID] domain uniquely identifies the WPC that has been set up by Owen.


A high-level illustration of the WPC is shown below. The CloudConnexa Client in the Ubiquiti router acts as a CloudConnexa Network Connector for the camera Network in the store and the Monitoring Server on Azure acts as a CloudConnexa Host because the Connector is running on the same server as the monitoring application.

  1. Owen signs in to the CloudConnexa Administration portal at and configures a Host (named Monitoring Server) and a Connector to represent the monitoring server running on Azure. The IP address that is assigned to the Connector is displayed. In this case, the Connector is assigned IP address This IP address remains static and is not dependent on the Region selected for the Connector. This WPC IP address can be used to reach the monitoring server. See, Adding a Host

  2. Owen then downloaded the Connector app for Windows and installed it on the Windows Server instance running the monitoring application and acting as the Monitoring Server. See, Running Connect Client as a system service

  3. Owen checked the Status screen and saw that the Host had come online.

  4. Next, Owen created two Networks to represent the camera Network in Store 1 ( and the camera Network in Store 2 ( He chose the closest CloudConnexa Region for each Network’s Connector to use. See, How to add a Network

  5. Owen chose to download the Connector’s Profile in .ovpn format and used the downloaded Profile to configure the CloudConnexa client in the Ubiquiti router. He looked at the guides available for pfsense, DD-WRT, and OpenWrt to get an idea of the needed information for router configuration.

  6. He then configured the cameras to use as the IP address of the monitoring server.

  7. To prevent communications between the private camera Networks installed in each store via the WPC, Owen set up an Access Group to only allow the Networks to communicate with the Host and not with each other. See, Add Access Group