HikCentral Professional V2.2.1 Hardening Guide (Windows)

Legal Information

© 2020 Hangzhou Hikvision Digital Technology Co., Ltd. All rights reserved.

This Document (hereinafter referred to be “the Document”) is the property of Hangzhou Hikvision Digital Technology Co., Ltd. or its affiliates (hereinafter referred to as “Hikvision”), and it cannot be reproduced, changed, translated, or distributed, partially or wholly, by any means, without the prior written permission of Hikvision. Unless otherwise expressly stated herein, Hikvision does not make any warranties, guarantees or representations, express or implied, regarding to the Document, any information contained herein.

About this Document

Pictures, charts, images and all other information hereinafter are for description and explanation only. The information contained in the Document is subject to change, without notice, due to updates or other reasons.

Please use this Document with the guidance and assistance of professionals trained in supporting the Product.

LEGAL DISCLAIMER

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE DOCUMENT IS PROVIDED "AS IS" AND “WITH ALL FAULTS AND ERRORS”. HIKVISION MAKES NO REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT. IN NO EVENT WILL HIKVISION BE LIABLE FOR ANY SPECIAL, CONSEQUENTIAL, INCIDENTAL, OR INDIRECT DAMAGES INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING NEGLIGENCE), OR OTHERWISE, IN CONNECTION WITH THE USE OF THE DOCUMENT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR LOSS.

Chapter 1 Overview

1.1 Introduction

HikCentral is a Central Management Software (CMS) that requires a Microsoft® Windows-based server.

HikCentral is able to manage and control distributed monitoring points or massive deployments of video cameras and their recordings on a series of NVRs, DVRs, and Hybrid SANs.

This document informs users of the factors affecting the system security and provides security suggestions for users in terms of system overall security. The safe and reliable running environment and the security mechanism of HikCentral can provide better service to users.

The instructions of this document are listed as follows:

  1. HikCentral Program Security - HikCentral Security Configurations
  2. Operating System Security of Server and Client Security Configurations Based on Microsoft® Windows Operating System
  3. Device and Network Security Deployment
  4. Server and Network Security Deployment

Note: This document focuses on HikCentral security. For best security practices about NVRs, DVRs, and network cameras, refer to the corresponding security guides on Hikvision official website.

1.2 Supported Operating Systems

HikCentral is compatible with any of the following Microsoft® Windows Operating systems:

For recommended settings, visit the Microsoft® official website.

Chapter 2 HikCentral Program Security

This section describes the security measures taken by HikCentral from the perspective of program security.

2.1 HikCentral Port Forwarding

Port mapping should only be enabled when your HikCentral needs to access a Wide Area Network.

Follow rules below to protect your data:

  1. Do the ports forwarding based on the HikCentral communication matrix (log in to Hikvision official website to get the latest communication matrix). Do not forward any unnecessary ports.
  2. Try not to use general port for other services. For example, port 80 is utilized for HikCentral System Management Service by default; do not use port 80 for other services like Streaming Gateway Services.
  3. Port forwarding exposes your HikCentral Server directly to the Internet on that port. Be sure to set high security passwords for all accounts and keep the network connection in security.

HikCentral only requires four open ports for basic functionality:

Description of Image: A screenshot of the HikCentral Service Manager window. It lists several services like "HikCentral Video Surveillance Management", "3rd Party Device Access Gateway", "HikCentral Management Service", "HikCentral Streaming Gateway", "Keyboard Proxy Service", and "Smart Wall Management Service". For each service, it shows the Port No, Status (all "Started"), and Operation checkboxes. The "HikCentral Management Service" shows ports 80;443, and "HikCentral Streaming Gateway" shows ports 554;10001;559. A "Run Time" is displayed as "0 Day(s) 00:10:43". There are "Stop All" and "Restart All" buttons, and an "Auto-Launch" checkbox.

It is recommended to change the port number from the default. The example below shows how to change the ports in the HikCentral Service Manager.

Description of Image: A screenshot of the "Edit Port" dialog box within the HikCentral Service Manager. It shows the Service Name as "HikCentral Management Service". It has fields for "HTTP Port" (set to 80) and "HTTPS Port" (set to 443). There are "Confirm" and "Cancel" buttons.

Refer to HikCentral communication matrix for port forwarding information required by advanced applications.

2.2 Brute Force Attack Prevention

HikCentral service supports multiple mechanisms of preventing the brute force attack to protect the account from being cracked.

2.2.1 Verification Code Mechanism

The verification code is required as shown below when the password is wrong:

Description of Image: A "Welcome" login screen for HikCentral. It features fields for a user icon and password input (represented by dots). Below the password field, there is a distorted text verification code "faBZ". There are buttons for "Forgot Password", "Login", and "Download Web Control".

2.2.2 Lock IP Address: After Too Many Attempts

Enable the “Lock IP Address” function in the Security Settings module of the HikCentral Web Client. This helps protect against invalid attempts to log in to the HikCentral Server.

Description of Image: A section of the HikCentral Web Client's Security Settings. It shows a toggle switch labeled "Lock IP Address" set to "ON". Below this, there are two settings: "*Failed Password Attempts" with a dropdown showing "4 times", and "*Lock for" with a dropdown showing "30 min.".

2.3 Identity Authentication

Identity verification means that the HikCentral service will allocate a session ID to all request clients and verify the session validity of each request. For the inactive client within 15 minutes, the server will clear the session information. If the client wants to continue the request, it needs to log in to the HikCentral service again.

The account password information allocated by the platform is required when the client wants to log in to the HikCentral service. After the server verified the password, it will allocate an effective session ID to the client. Therefore, the security of account password is important.

HikCentral suggests that the account password should be composed of digits, letters, and special characters, and the length should be more than 8 characters.

HikCentral also supports setting the password strength of the lowest security level allowed for login. The operations are as follows:

  1. Log in to HikCentral via the Web Client.
  2. Enter the Security page to configure the minimum password strength, as shown in the figure below.
Description of Image: A section titled "Minimum Password Strength" with radio buttons for "Weak", "Medium", and "Strong". The "Medium" option is selected.

Once this option is configured, the account whose password is lower than this password strength will not be allowed to log in.

A session ID and a dynamic token are required when the client connects to the server.

2.4 Replay Attack Prevention

Replay is a common attack on the network. HikCentral server uses a dynamic token with each client. The server will verify the token according to certain rules for each request. If the token in a request expires, the server will take the request as a replay attack, and then it will refuse the service to reduce the risk of platform replay attack. Refer to the following figure for replay attack model and HikCentral anti-replay method.

Description of Image: A diagram illustrating a replay attack. It shows a "Client" and a "Server". An "Attacker" is positioned between them. The steps are numbered: 1. Session + Token (Client to Server), 2. Intercept (Attacker), 3. Session + Token Replay (Attacker to Server), 4. Reject (Server to Attacker).

2.5 Private and Sensitive Data Protection

The protection of privacy data mainly refers to two aspects:

  1. The protection of privacy data in the transmission process between HikCentral client and server, and the transmission security in the communication process of between HikCentral and devices or other servers.
  2. Storage protection of privacy data by HikCentral server.

2.5.1 Transmission Protection

1. Transmission security of HikCentral client and server

In the HTTP mode, after the HikCentral client connects to the server, both sides will negotiate a dynamic AES key with a length of 128 characters. The private and sensitive information transferred on the link is encrypted by the negotiated key. As the key is dynamically negotiated between the server and the client, it can ensure that the AES keys negotiated on each link are mutually independent.

Currently, HikCentral will encrypt and transfer sensitive information such as personnel information, license plate information, and password to reduce the risk of data leakage.

In the cases with high security requirements, it is recommended to switch to HTTPS, which is also supported by HikCentral. The operation steps are as follows:

  1. Log in to HikCentral via the Web Client
  2. Enter the System Configuration page and select the HTTPS as the transfer protocol.

In HikCentral 2.0, the encryption protocol version used in the HTTPS is TLSv1.2 or above, which has higher security.

Note: To reduce the risk, the above operations are only allowed to be performed locally on the server by the admin user, and users are allowed to use the platform certificates or import new certificates when switching to HTTPS.

Description of Image: A screenshot of the HikCentral Professional Web Client interface showing the "Transfer Protocol" settings. The "Clients and SYS Transfer" section has radio buttons for "HTTP" and "HTTPS", with "HTTPS" selected. There is a "Certificate" section showing "System Provided Certificate" and an option to "New Certificate". A "Save" button is present.

2. Transmission Security Between HikCentral and Devices or Other Servers

(1) To reduce the risk of data leakage in the interaction process, the communication between HikCentral and the devices is based on Hikvision private protocol. Digest authentication will be done during the communication process. Sensitive information transmission is encrypted based on the dynamic key negotiated by HikCentral and the devices. The key length is 128 characters, and the encryption algorithm is AES.

(2) The transmission between HikCentral and facial recognition server supports HTTPS to ensure that the communication channel is encrypted.

3. Stream Encryption Transmission

The stream transmitted between HikCentral and the devices supports being encrypted, and the encryption key supports being defined by users. When configuration completed, the stream from device will be encrypted to transmit to HikCentral. HikCentral needs to use the key to decrypt the stream before checking the stream information.

2.5.2 Storage Protection

According to the property and performance requirements of private and sensitive information storage, HikCentral supports data storage in database, disk, and external storage servers. The contents stored in different storage methods and the safety measures adopted are as follows:

  1. Database Storage: Refer to Chapter 2.6 for database security description.
  2. Disk Storage: Disk storage mainly refers to the case where HikCentral is configured as a picture storage server. HikCentral supports configuring picture storage server by channel. When the HikCentral service is configured as the picture storage server, the event pictures reported by the channel will be stored on the HikCentral server disk according to certain rules. This rule ensures the efficiency of pictures reading and the security of storage, that is, pictures cannot be browsed directly.
  3. External Storage Server: External storage server mainly refers to pStor, CVR, and cloud storage used for picture and video storage. Pictures and videos are stored in accordance with certain storage security rules.

2.6 Database Security

HikCentral uses PostgreSQL to record private and sensitive information to ensure data security through three aspects.

2.6.1 Database Password Security

  1. By default, the HikCentral database service only reserves one user for the HikCentral connection database service to reduce the risk of account cracking.
  2. The password of HikCentral database can be updated. If you change the admin password of HikCentral administrator, the database password will be automatically updated in the background. The database password is encrypted by AES128 algorithm and stored in the configuration file. The secret key component is generated randomly and unpredictable.
  3. HikCentral only allows local access to the database on the server by default, and cannot connect to the database service outside. Ensure that the data is physically isolated from the outside.

2.6.2 Database Storage Security

  1. Some private and sensitive information, such as device password, is required by HikCentral client, so AES128 algorithm is used to encrypt and store in the database, and the secret key component is generated randomly and unpredictable.
  2. Some private and sensitive information, such as HikCentral account password, is stored after it is added with salt value and processed by the SHA256 algorithm. The correctness of these information is verified at the HikCentral server, which can reduce the risk of leakage caused by transmission.
  3. HikCentral supports regular backup of configuration database to reduce the risk of data loss.
  4. HikCentral database only opens necessary ports by default to reduce the risk of being attacked.

2.6.3 Database Version Update

  1. HikCentral will use the dominant security scanning tools before release, including PostgreSQL database. For serious flaws, HikCentral will update the version in time according to the official vulnerability repair situation of PostgreSQL. Please follow the HikCentral version update instructions.
  2. When HikCentral is upgraded, PostgreSQL will be upgraded to a version with higher security (depending on the timeliness of vulnerability official release from PostgreSQL).

2.7 Stream Encryption

When adding encoding device, Stream Encryption can be selected to prevent video stream being stolen and play on condition that this function has been enabled on device webpage.

2.8 Device Anti-Hijacking

The devices connected to HikCentral are deployed in different monitoring points. Although managed by the center, there is still a risk that the devices will be hijacked, that is, the devices will be replaced without users' perception. HikCentral will record the feature data of the accessed devices. Once the feature data changes, it will immediately stop the relevant functions of the device in HikCentral.

2.9 Access Control

HikCentral supports permission allocation of different levels for different users. The user permission of each request from the client or server will be verified. Users without permission cannot operate or access resources. HikCentral recommends that users be assigned minimum permissions.

When the administrator creates a new role, he/she must only select the required permissions for the role.

Description of Image: A "Role Settings" dialog box with tabs for "Area Display Rule", "Resource Access", and "User Permission". The "User Permission" tab is active. It shows a search bar and a hierarchical list of permissions to select, including "Resource Permission" (Camera, Encoding Device, Decoding Device, Alarm Output, Server, User), "Web Client Configuration Permission", "Resource Management", "Recording", and "Event & Alarm".

2.10 Device Firmware Upgrade

HikCentral manages the devices, such as network cameras, NVRs, and so on. Once the vulnerabilities appear in device firmware, upgrading firmware one by one will cause large workload, low efficiency and security. HikCentral provides two methods of firmware upgrade, which can upgrade the firmware of device in a batch and strengthen the system security.

(1) HikCentral Firmware Upgrade

After users obtain the new firmware package released by the Hikvision device, they can directly upload it to HikCentral, and the HikCentral service can independently upgrade the firmware of the device.

(2) Firmware Upgrade via Hik-Connect

After users purchase the Hik-Connect service, once Hikvision releases new device firmware, it will be automatically updated to Hik-Connect. When HikCentral detects that there is a new firmware package in Hik-Connect, HikCentral will prompt and guide the users to upgrade.

2.11 Audit Log

HikCentral has corresponding logs for all kinds of resource access and operation, especially for the access of private and sensitive information, which can be followed up afterwards.

Description of Image: A screenshot of the "Server Logs" interface within HikCentral. It has columns for Site, Level, Time, Source, Type, Resource Name, Area, D..., and Export. Below the header, there are filter options for Type (Error, Information, Warning) and Source (User, HikCentral Professional Server). A log entry example shows: Time 2020/10/30 11:21:16, Source admin, Type Information, Action Add Door, Resource Door 01_101, Address 105 (Web Client). Other similar log entries are visible. A search bar and a "Search" button are present.

2.12 Digital Signature and Anti-Tamper Protection of Product Information

The plug-in of HikCentral 2.0 supports digital signature verification. When the program starts, the digital signature of plug-in will be verified. Only plug-ins whose signature are verified are allowed to be loaded. Any tampered or fake plug-ins will be recognized by HikCentral and refused to load.

HikCentral 2.0 supports anti-tamper protection for product description files and other configuration files. Any edit to the configuration can be recognized by HikCentral. Once tampering is detected, the HikCentral service will not start automatically until the edit is restored.

2.13 HikCentral Version Update

The version of HikCentral will be updated continuously, and the security problems or vulnerabilities exposed in the iteration process will be repaired to ensure the continuous improvement of the overall product strength. It is recommended that users of HikCentral pay attention to the vulnerability information disclosed by dominant security companies and update the version of HikCentral.

2.14 Other Security Measures

2.14.1 Maximum Password Age

Switch on Enable Maximum Password Age and Set the Password Will Expire In as you want on the Security page of the HikCentral Web Client.

Description of Image: A section of the HikCentral Web Client's Security page. It shows a toggle switch labeled "Enable Maximum Password Age" set to "ON". Below this, there is a dropdown menu labeled "*Password Will Expire in" with options like "1 month", "3 months", "6 months", and "Custom". "6 months" is currently selected.

2.14.2 Auto Lock Control Client

Switch on Auto Lock Control Client and Set the Lock In on the Security page of the HikCentral Web Client. The Control Client will be locked after a time period of inactivity. The user should enter the user name and password to unlock the Control Client.

Description of Image: A section of the HikCentral Web Client's Security page. It shows a toggle switch labeled "Auto Lock Control Client" set to "ON". Below this, there is a dropdown menu labeled "*Lock in" with options like "10 min.", "30 min.", etc. "10 min." is currently selected.

2.14.3 Change Device Password Periodically

Change device password periodically to make the device more secure.

Description of Image: A screenshot showing a "Change Password" dialog for a device. It has fields for "Alias" (e.g., IPC, 14916299), "User Name" (admin), "* Old Password", "* New Password", and "* Confirm Password". A "Risky" indicator is present next to the "New Password" field. A "Save" button is at the bottom.

2.14.4 Strong Password

The new user needs to change the password when they log in for the first time. Set a STRONG password (case-sensitive letters, special characters combined with digits).

Description of Image: A HikCentral Control Client login page. A pop-up window titled "Welcome" displays an error message: "Error Code: VSM[266](Login for the first time. Please change the password.)". It has "Close" and "Login" buttons.

When the administrator adds a new user, he/she can set a STRONG password and an Expiry Date for the user. The administrator can also set the Restrict Concurrent Logins to limit the maximum IP addresses logged in to the platform using the user account.

Description of Image: An "Add User" dialog box in HikCentral. It has fields for "User Name" (e.g., "test"), "Password" (dots indicating input), "Expiry Date" (e.g., 2019-10-01 23:59:59), and "User Status" (Active/Inactive). It also has a "Restrict Concurrent Logins" toggle and a "Maximum Logins" field set to "100".

2.14.5 Encryption of Exported Video File

When exporting video file, a password can be set for file in MP4 or EXE format. Then the password is needed when playing the video file on VSPlayer.

Description of Image: A screenshot of the "Export All" dialog for video files. It shows a timeline with playback controls. Below, there are checkboxes for "Synchronize Downloading Time", "Camera Name", and "Download Time". The "File Format" options are MP4, AVI, and EXE, with MP4 selected. There are fields for "Set Password" and "Confirm Password".

2.14.6 Encryption of Exported Person Group

When exporting person information, a password is necessary.

Description of Image: A screenshot of the "Export All" dialog for person group data. It shows options to "Synchronize Domain Persons" and "Custom Additional Information". There are fields for "* Password" and "* Confirm Password". A note indicates that the password is required when decompressing. A "Confirm" button is present. Below, it shows "Group: Trainer TEST" and "Attendance Group:".
Description of Image: A Windows file explorer window showing a compressed ZIP file named "Person_Info_2019_07_09_06_35_19.zip". A dialog box titled "Password needed" states that the file is password protected and requests the password for "Person_Info_2019_07_09_06_35_19.xlsx". It has fields for "Password" and buttons for "OK", "Skip File", and "Cancel".

The password is needed when extracting the exported ZIP file.

Chapter 3 Operating System Security of Server and Client

HikCentral service and clients are deployed in Microsoft® Windows which supports many security policies. This section describes the security settings of the HikCentral server and clients based on the operating system.

3.1 Strict Password Policy

  1. Always adhere to the end-user's IT department policy for password management
  2. Assign a complex password.
    1. If using a Microsoft® Windows Server purchased from Hikvision, a new password should be assigned to the administrator for the first login.

For the best practices of password management on Windows, visit the Microsoft® official website.

3.2 Disable Windows Remote Desktop

Disable Windows remote desktop to secure the operating system.

3.3 Enable Windows Firewall

A software firewall is the second layer of defense behind the network layer firewall. It will help you protect the computer from outside attempts of control or access. By default, Windows firewall is enabled and should remain enabled at all times.

Description of Image: A screenshot of the Windows Firewall settings within the Control Panel. The title is "Help protect your PC with Windows Firewall". It shows sections for "Domain networks", "Private networks", and "Guest or public networks". For Domain and Private networks, the "Windows Firewall state" is "On" and "Connected". Incoming connections are set to "Block all connections to apps that are not on the list of allowed apps". The "Active domain networks" shows "hikvision.com". Notification state is "Notify me when Windows Firewall blocks a new app". The "Guest or public networks" state is "Not connected".

3.4 Disable Sensitive Ports

TCP ports (135/139/445) and UDP ports (137/138) in the Microsoft® Windows Security Policy are suggested to be disabled when RPC, NetBIOS, and SMB are NOT used.

3.5 Antivirus

Install full-featured Anti-Virus software to keep HikCentral Server secure. Antivirus must be active and automatically updated.

For example, the settings of Windows antivirus Windows Defender are as below.

Description of Image: A screenshot of Microsoft® Windows 10 Defender interface. The "PC status" is "Protected". Under the "Home" tab, "Real-time protection" is "On" and "Virus and spyware definitions" is "Up to date". Options for "Scan options" include "Quick", "Full", and "Custom". A "Scan now" button is visible.

3.6 Enable Windows Update

It is important that Windows update is set to auto install. Normally, this is the default settings.

Description of Image: A screenshot of Microsoft® Windows Server's Windows Update settings. It indicates "You're set to automatically check for updates". It shows that "4 optional updates are available". The "Most recent check for updates" was "Today at 10:50 AM" and "Updates were installed" on "Today at 10:18 AM".

3.7 Application Program Security

HikCentral Mobile Client should run on a reliable device, which means that the other applications on the device are secure.

Chapter 4 Security Deployment of Device and Network

4.1 Set Strong Password for Device

The devices deployed in the front-end are responsible for the data collection of the whole system. The security of these devices is highly important. Set a strong password for each device to reduce the risk of device password leakage. The recommended password should be composed of digits, letters and special characters, and the length should not be less than 8 characters.

4.2 Stop or Disable Irrelevant Device Services or Protocols

By default, the device may start or enable many services or protocols to meet the needs of different cases. Users need to stop or disable useless services or protocols according to the actual needs. Since if these default started or enabled services or protocols have flaws, they will be vulnerable to network or local attacks, resulting in serious consequences such as device down and data leakage.

For those cases with high security requirements, security services or protocols on the device can be started or enabled, such as HTTPS.

4.3 Set Exclusive Account for HikCentral

It is recommended to create an exclusive account on the device if this device is to be added to HikCentral for management. For example, you can create an account named HikCentral, and then add the device to HikCentral with this user name. Similarly, other users can access the device by the name of HikCentral. This method is mainly for easy review afterwards, that is, you can quickly find out the users who have accessed the device, resources or functions that have been accessed, whether other external users have accessed the device, and so on, via the device logs. All above information is used to analyze whether the device has been hijacked.

4.4 Use Firewall

Try not to expose the devices directly to the Wide Area Network (WAN) because the devices are vulnerable to be attacked in this case. Use a firewall between the device network and the WAN if necessary. The firewall can control the permissions of WAN to access internal resources and reduce the risk of attack on devices.

Chapter 5 Security Deployment of Server and Network

This section mainly introduces how to improve the server and network security to deploy the HikCentral service.

5.1 Server Physical Security

The deployment server of HikCentral is one of the core hardware in the whole system. It is recommended that the server be physically deployed in server room, and the access records of the server should be maintained. Monitoring the server room is also a preventive measure.

5.2 Use Encrypted Channels for Communication

If the HikCentral server is on a Local Area Network (LAN) behind a Network Address Translation (NAT), it is recommended to use Virtual Private Network (VPN) tunneling (configure on the Router or Firewall Settings page) to remotely access the clients on computer via Wide Area Network (WAN).

A VPN is a private distributed network that often extends across public networks or the Internet. Various protocols are available to create a VPN, typically a tunnel that carries the protected traffic. VPNs can be deployed with encrypted communications, or merely rely on secure communication within the VPN itself.

VPN is used to connect remote sites via WAN connections, protect privacy, and increase security within a LAN. A VPN not only adds an additional layer of protection for a video security system, but it also provides the additional benefit of segmenting the production networks into business traffic and video traffic.

Even if the HikCentral service is deployed on a security network, it is recommended to switch to HTTPS to configure the service.

5.3 Strictly Control Using Removable Storage Media on Server

Mobile storage media, such as USB flash drive and SD card may carry viruses. If they are used on the server without control, malicious programs may enter the local server or even the network where the server is located, thus polluting the running environment of HikCentral. Only authorized users are allowed to use mobile storage media when necessary, such as copying HikCentral's video as evidence.

5.4 Allocate Different Accounts for Facilitate Audit

HikCentral supports creating roles with different permissions. Administrators can allocate different accounts to those who need to log in to HikCentral so as to know clearly in the HikCentral audit log module which account uses what type of client and which location (IP address) operates what resources in the system afterward. Audit logs help the administrator locate the one who caused the system exception.

HikCentral also supports Active Domain (AD) users. AD server has high security and can verify the validity of users.

5.5 VLANs

If the HikCentral server is on a Local Area Network (LAN) with Control Clients, it is recommended to use a Virtual LAN (VLAN). A VLAN is created by subdividing a LAN into multiple segments. The network segmentation is done through a network switch or router configuration. A VLAN can access resource without rewiring device network connection.

5.6 Disable Unused Switch Ports

Disabling unused network ports ensures that unauthorized devices do not get access to the network. This mitigates the risk of someone trying to access a security subnet by plugging a device into a switch or unused network socket. Disabling specific ports is a common option in managed switches, both low cost and enterprise.

5.7 Prohibit Risky Protocols and Services

Regularly use security tool to scan HikCentral deployment server. Disable or stop the protocols or services that the tool considers risky on the server. Irrelevant programs or services running on the server should be prohibited without special need.

5.8 Prohibit Remote Database Access

HikCentral uses PostgrelSQL database. By default, remote access is disabled after the installation. It is recommended that remote access should also be disabled to reduce the risk of database password leakage.

5.9 Only Enable the Minimum Required Ports on a Dedicated Router Firewall

If it is not possible to use Virtual Private Network (VPN) among various sites, you need to make sure that the router has a firewall and only the required ports are enabled to connect to the HikCentral server.

5.10 Network Security

Choose proper security technologies to enhance network security, such as the Intrusion Detection System (IDS), ACL (Access Control List), 802.1x, RADIUS Authentication, and Security Auditing.

See Far, Go Further

Models: V1.3, V2.2.1, HikCentral Management Software, Software

File Info : application/pdf, 25 Pages, 1.50MB

PDF preview unavailable. Download the PDF instead.

HikCentral V2.2.1 Hardening Guide 20250804 Microsoft Word 2016 Microsoft Word 2016

Related Documents

Preview HikCentral Professional V2.2 Compatibility List for HIKVISION Products
Explore the official compatibility list for HIKVISION products with HikCentral Professional V2.2. This document details supported cameras, DVRs, NVRs, access control devices, and more, ensuring seamless integration for advanced security solutions.
Preview HikCentral Professional V1.6.0 Compatibility List for HIKVISION Products
This document provides a comprehensive compatibility list for HIKVISION products designed to work with HikCentral Professional software, version 1.6.0. It details model numbers and firmware versions for seamless integration.
Preview Hikvision HikCentral Professional Device Compatibility List
A comprehensive guide detailing the compatibility of Hikvision devices, including cameras, NVRs, and access control systems, with HikCentral Professional software for seamless integration.
Preview HikCentral Professional V2.2.1 Compatibility List for HIKVISION Products
This document provides a comprehensive compatibility list of HIKVISION hardware products, including cameras, NVRs, DVRs, and other devices, with HikCentral Professional software version 2.2.1.
Preview Hikvision Body Camera Quick Start Guide - User Manual
A comprehensive quick start guide for the Hikvision Body Camera, providing essential instructions, safety guidelines, and operational information for users. Learn to use your Hikvision Body Camera effectively.
Preview HikCentral Professional V2.2.1 Product Comparison: Free vs. Full Version
A detailed comparison of features and performance between the free and full versions of Hikvision's HikCentral Professional V2.2.1 software, covering security, management, video analytics, and system configuration.
Preview Hikvision 2019 Half Year Report: Financial Performance and Business Analysis
Official 2019 Half Year Report from Hangzhou Hikvision Digital Technology Co., Ltd., detailing financial results, business operations, risk factors, and strategic insights for the period January-June 2019.
Preview HikCentral Professional V2.2.1 System Requirements and Performance Guide
Detailed system requirements and performance specifications for HikCentral Professional V2.2.1, covering server, client, and network configurations for optimal operation.