Security Best Practices

for an i-Vu® Pro v8.5 system

Published: 5/30/2025

Catalog No.: 11-808-955-01

❗ Verify that you have the most current version of this document from www.hvacpartners.com, the Carrier Partner Community website, or your local Carrier office. Important changes are listed in Document revision history at the end of this document.

Security Best Practices Overview

Carrier takes the security of our systems very seriously, and you play the biggest part in this by installing and configuring systems in a secure manner. We encourage you to establish security policies for your own company networks and all the systems you install and service. Follow the best practices in this document when deploying i-Vu® Pro building automation systems. Use the Security Checklist in Appendix B to track important security steps when designing, installing, and commissioning i-Vu® Pro systems.

Physical Network Security

Physical network security protects network hardware and infrastructure (for example, servers, routers, switches, and cables) from damage, interference, and unauthorized access. Ensure your physical network security plan includes the following:

Network Separation

Standard BACnet is an intentionally open system that makes it easy to discover and control any device on its network. Because of this, you should design your system to segregate users from the controller network by having two separate networks. For example, if the users are on a company's enterprise LAN, you would not want controllers on the LAN so that they are easy targets for misuse by anyone with access. Some of the biggest risks come from insiders such as the curious tinkerer, a student on an education system's network, or a disgruntled employee.

Diagram illustrating network separation: A 'User network' with a User and Server is connected to a 'Controller network' with two Controllers. The separation can be physical or logical via VLAN.

You can physically separate the user network and the BACnet network without any IP routing between them, or you can logically separate them at a switch using a Virtual Local Area Network (VLAN). If you have dual NICs (Network Interface Cards), the server must have a different IP address for each network.

Internet Connectivity Scenarios

The i-Vu® Pro system's connection to the Internet may vary greatly based on the client's needs and IT capabilities. The following possible network scenarios are listed in order of DECREASING security.

Scenario A: Isolated Network - Low risk

Diagram for Scenario A (Isolated Network - Low risk): Shows a User network with a User and Server connected to a Controller network with two Controllers. There is no direct connection to the Internet shown for the controller network.

This scenario represents the lowest risk as the i-Vu® Pro server and BACnet network are not directly exposed to the Internet. Access is typically managed through a secure VPN connection.

Scenario B: Public Users - Medium risk

Diagram for Scenario B (Public Users - Medium risk): Shows a User connected to the Internet. An 'Internet connection' device links to a 'User network' (with another User and Server) and a 'Controller network' (with two Controllers).

Do not permanently expose the i-Vu® Pro server or the BACnet network to the Internet. You can, however, allow users to access the i-Vu® Pro server through a secure VPN connection. If a NAT router or firewall is present on the LAN for other purposes, it should not have any ports forwarded to the i-Vu® Pro server or any controllers.

It is acceptable to permanently expose the i-Vu® Pro server on the Internet as long as:

Scenario C: Public Users with Distributed BACnet - High risk

Diagram for Scenario C (Public Users with Distributed BACnet - High risk): Illustrates users and controllers connecting via the Internet. A User connects to the Internet via DSL/Cable/Wireless. The Internet connects to a 'User network' (with a User and Server) and a 'Controller network' (with two Controllers).

In this configuration, both users and BACnet controllers use a public network/Internet. Carefully plan this configuration to maximize security.

If the i-Vu® Pro server must connect to multiple sites over the Internet, connect them using a VPN to form a Wide Area Network that is secure (changing this to Scenario A).

If this is not possible, use the BACnet Firewall feature in Ethernet-capable controllers, or protect controllers with a whitelist that your IT department can configure in each Internet connection device where the network connects to the Internet. The whitelist allows communication with your i-Vu® Pro system only from devices whose public IP addresses are in the list. Often, the only address controllers need to talk to is the i-Vu® Pro server. The i-Vu® Pro server firewall's whitelist will have to include the public address of all remote IP controllers.

DO NOT connect BACnet controllers to the Internet without at least whitelist protection! If you do, they could easily be discovered and modified by anyone on the Internet. If a BACnet router is connected to the Internet without protection, then the entire network connected to it is accessible.

Scenario D: Public Users with Distributed BACnet/SC - Low risk

Diagram for Scenario D (Public Users with Distributed BACnet/SC - Low risk): Depicts a network using BACnet/SC. A User connects to the Internet. The Internet connects to a BAS server and a BACnet/SC Virtual Hub server. A separate 'Controller network' with two Controllers is shown, connected via DSL/Cable/Wireless to the Internet. A BACnet/SC Router is also shown.

BACnet Secure Connect, or BACnet/SC, is an industry standard way of securing BACnet communications over the internet without the need for VPNs. A BACnet/SC network consists of multiple nodes connecting through a central hub. This hub can be located on premises or hosted on the Internet. The figure above depicts the BACnet/SC Hub installed on premises.

Network Firewall

Limit the ports opened through any firewall or NAT port forwarding to the minimum ports required. The i-Vu® Pro system uses the following ports:

Port Transfer Protocol/User Use
80 (default)TCPHTTP (Web server)Client/Server
443 (default)TCPHTTPS (Web server)Client/Server
443 (default)TCPWSS (secure WebSocket for BACnet/SC)Client
47806 (default)TCPAlarm Notification ClientClient/Server
47808UDPBACnet/IPServer/i-Vu router
47808TCPDiagnostic Telnet *Client/Server
47812UDPCCN/IPi-Vu CCN router/Server
50005, 50007, 50008UDPCCN/IPServer/i-Vu CCN router
50005 - 50008UDPFirmware CCN/IPCCN router to CCN router

* This functionality is off by default. You can start it using the telnetd console command.

Scenarios B or C in the previous section require TCP ports 80 and 443 to be exposed to the Internet for user access.

Scenario C also requires UDP port 47808 to be exposed for both the server and the controller's firewall. If you do this, you MUST use a whitelist to limit connectivity.

Scenario D may require configuration of an outgoing port for BACnet/SC traffic and/or an incoming port protecting a BACnet/SC Hub.

BACnet Firewall

The drv_fwex and drv_gen5 drivers for XT and TruVu controllers, and the v6-02 or later drivers for Carrier controllers with Ethernet capability, have a BACnet firewall feature that allows you to restrict BACnet/IP communication with the controller to all private IP addresses and/or to a whitelist of IP addresses that you define. This feature provides another layer of security for your system.

The following are examples of use cases for the BACnet firewall and instructions for setting it up.

Case 1: Isolated network

While an isolated network is secure from threats on the Internet, other users or devices on the local network can potentially interfere with controllers.

Diagram for BACnet firewall Case 1 (Isolated network): Shows a User on a 'User network' connected to a Server. The Server is connected to a 'Controller network' with three Controllers. The diagram emphasizes private IP addresses within the 192.168.24.x range for these devices.

In this example, each controller's BACnet firewall should allow BACnet communication from the i-Vu® Pro server's IP address and the controller's IP addresses. The user at 192.168.24.46 should not be allowed BACnet communication with the controllers. The server and controllers addresses fall within the private IP address range of 192.168.0.0 to 192.168.255.255, but restricting BACnet communication to all private IP addresses is not sufficient since that would allow communication from the user. So a whitelist must be created in the BACnet firewall.

To set up the BACnet firewall:

  1. In the i-Vu® Pro interface, right-click each controller and select Driver Properties.
  2. Select BACnet Firewall > Properties tab.
  3. Check Enable BACnet firewall.
  4. Uncheck Allow All Private IP Addresses.
  5. Check Enable Whitelist.
  6. On the first row, check Enable, check Use IP Range, and then enter the address range 192.168.24.100 through 192.168.24.103.
  7. Click Accept.
  8. Wait for the page to update, and then check Confirm firewall settings.

NOTE: In this example, the server and controllers IP addresses are sequential so the whitelist could have an address range. If you anticipate future controller expansion, reserve extra sequential addresses so that you can simply expand the range in the BACnet firewall settings. If the IP addresses are not sequential, you must enter each IP address on a separate line and check Enable.

Case 2: Individual controllers exposed to the Internet

Controllers that are accessible on the Internet (for example, behind a DSL, cable, or wireless device) may not be protected by a network firewall or whitelist. This may be due to the network firewall's lack of capability or difficulty in setting it up.

Diagram for BACnet firewall Case 2 (Individual controllers exposed to the Internet): Illustrates a Server with a public IP address connected via Internet connection and DSL/Cable/Wireless to two Controllers, each with its own DSL/Cable/Wireless connection. The diagram highlights the server's public IP and the controllers' private IPs.

In this example, each controller needs to communicate with only the i-Vu® Pro server so their BACnet firewall's whitelist should have only the server's public IP address. The controllers do not need to communicate with each other.

To set up the BACnet firewall:

  1. In the i-Vu® Pro interface, right-click each controller and select Driver Properties.
  2. Select BACnet Firewall > Properties tab.
  3. Check Enable BACnet firewall.
  4. Uncheck Allow All Private IP Addresses.
  5. Check Enable Whitelist.
  6. On the first row, check Enable, and then enter the address 47.23.95.44.
  7. Click Accept.
  8. Wait for the page to update, and then check Confirm firewall settings.

Case 3: Multiple controllers exposed to the Internet at one site

Multiple controllers that are accessible on the Internet (for example, behind a DSL, cable, or wireless device) may not be protected by a network firewall or whitelist. The controllers have private IP addresses, but it is their public IP addresses that are exposed to the Internet.

Diagram for BACnet firewall Case 3 (Multiple controllers exposed to the Internet at one site): Shows a Server with a public IP address connected via Internet connection and DSL/Cable/Wireless to three Controllers. Each controller also has a DSL/Cable/Wireless connection and public IP addresses are listed for each controller.

In this example, the controllers need to communicate with the i-Vu® Pro server and each other. The controllers are the only devices on the site's private network, or other devices present are benign.

Each controller's BACnet firewall should allow BACnet communication with the i-Vu® Pro server's public IP address and with all private IP addresses so that the controllers can communicate with each other. The BACnet firewall prevents BACnet communication to the controller's public addresses.

To set up the BACnet firewall:

  1. In the i-Vu® Pro interface, right-click each controller and select Driver Properties.
  2. Select BACnet Firewall > Properties tab.
  3. Check Enable BACnet firewall.
  4. Check Allow All Private IP Addresses.
  5. Check Enable Whitelist.
  6. On the first row, check Enable, and then enter the address 47.23.95.44.
  7. Click Accept.
  8. Wait for the page to update, and then check Confirm firewall settings.

Users

Follow the guidelines below to limit unauthorized user access.

NOTE: Run the Security > Operator Information report to check the following statuses:

NOTE: You can disable this for an individual user (for example, an account for a monitoring center).

i-Vu Pro Server

Follow the guidelines below to protect the i-Vu Pro server.

Database Server

Follow the database server vendor's best practices for a secure installation. This should include steps such as changing default accounts and passwords.

Configure the database server to accept connections only from the i-Vu® Pro system. Most database servers have a whitelist mechanism to facilitate this.

Device-specific Security

Devices with a drv_gen5 driver support the following device-specific security options.

Appendix A: Glossary

BAS
A Building Automation System is a collection of BACnet and/or CCN devices, the i-Vu Pro server, and the network(s) they reside on.
LAN
A Local Area Network is a computer network that interconnects computers/devices within a limited area such as an office building.
Firewall
A device that restricts network traffic. Firewall functionality is often combined with IP Router functionality in a single device. A firewall is configured with rules to define what kind of traffic is allowed or blocked. Personal computers and servers have firewall functionality built into them.
IP router
An IP (Internet Protocol) device that connects two or more IP networks. Typically an IP router connects a local network to the larger enterprise/Internet network.
NAT router
An IP router that remaps IP addresses from one network to one or more IP addresses on another network. A NAT router is commonly used to connect devices on a private network to the Internet or enterprise network, and it often has firewall and port forwarding capabilities.
Port
A port is a 16 bit (0-65535) number associated with an IP address that defines an endpoint of a computer network connection. There are two types of ports, TCP and UDP. BACnet uses a UDP port. HTTP, HTTPS and Alarm Notification Client use TCP ports. To manage access to a port in a firewall, you must know its number and type.
Private IP address
An IP address in one of the following ranges:
  • 10.0.0.0 – 10.255.255.255
  • 172.16.0.0 – 172.31.255.255
  • 192.168.0.0 – 192.168.255.255
VLAN
A Virtual Local Area Network is partitioned and isolated by the IP network switch (or router). It is typically as effective as physically separating the network.
VPN
A Virtual Private Network is a method for extending a private network across a public network, such as the Internet. A VPN enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and they benefit from the functionality, security and management policies of the private network.
Whitelist
A list of IP addresses that are the only ones allowed through a firewall. Advanced firewall devices can have different whitelists for a given port or protocol.

Appendix B: Security Checklist

Physical network security

Designing and Planning

Installing

If you have dual NICs:

If using Internet connectivity scenario A:

If using Internet connectivity scenario B:

If using Internet connectivity scenario C:

After Commissioning

On the System Options > System Settings > Security tab, verify that:

On SiteBuilder's Configure > Preferences > Web Server tab, verify that the following are not checked:

System Maintenance

To quickly check security measures in place

In the i-Vu® Pro interface, use the Manual Command sreview to view your system's critical security compliance. These settings are described in more detail in the document above.

The sreview report displays the following:

Web Server Possible responses Recommendation for the most secure system
SSL Modeon, off, or bothon
TLS in useon or offtrue (when SSL Mode is on or both)
TLS protocolVersion numberTLS 1.3
Allow unsigned add-onstrue or falsefalse
Allow SOAP over HTTPtrue or falsefalse
Reads X-Forwarded-For Headertrue or falsefalse
Certificate Possible responses Recommendation for the most secure system
Self-signed certificate in usetrue or falsefalse
Certificate issued byDistinguished Name of the certificate signercertificate information, not a setting
Certificate expiredtrue or falsecertificate information, not a setting
Certificate not yet validtrue or falsecertificate information, not a setting
Certificate expiresdate and time the certificate becomes invalidcertificate information, not a setting
Email Possible responses Recommendation for the most secure system
Secure SMTP enabled on email servertrue or falsetrue
Passwords Possible responses Recommendation for the most secure system
Operators never logged in:number0
Operators last login > 180 daysnumber0
Password policy enforcedtrue or falsetrue
Updates Recommendation for the most secure system
Latest cumulative update applied:none or dateKeep the i-Vu® Pro system and the operating system up-to-date with the latest patches.

Document Revision History

Important changes to this document are listed below. Minor changes such as typographical or formatting errors are not listed.

Date Topic Change description Code*
5/30/25Physical network securityAdded new sectionX-AE-DY-E-LO
5/30/25Appendix B: Security checklistAdded "Physical network security" section

* For internal use only

Models: v8.5, i-Vu Pro 8.5 Software Enhancing Security, i-Vu Pro, 8.5 Software Enhancing Security, Software Enhancing Security, Enhancing Security, Security

File Info : application/pdf, 22 Pages, 2.02MB

11-808-955-01

References

Adobe PDF Library 25.1.250

Related Documents

Preview Carrier i-Vu Pro v10.0 Security Best Practices Guide
Comprehensive security best practices for deploying and managing Carrier i-Vu Pro v10.0 building automation systems, covering physical, network, and user security. This guide details network separation, firewall configurations, user access controls, and server security measures.
Preview Carrier TruVu TV-ISO-E2 Isolated Network Router: Secure BACnet Connectivity
Learn about the Carrier TruVu TV-ISO-E2 Isolated Network Router, its features, security benefits, and how it simplifies BACnet network integration for building automation systems.
Preview Carrier i-Vu XT BACnet Link: Building Automation System Integration
Information on the Carrier i-Vu XT BACnet Link, a device for integrating various third-party equipment into the i-Vu building automation system using multiple protocols like BACnet, Modbus, and more. Details specifications, communication ports, integration capabilities, and compliance.
Preview Carrier TV-UC683T Universal Controller: i-Vu Building Automation System Datasheet
Detailed datasheet for the Carrier TV-UC683T Universal Controller, part of the i-Vu Building Automation System. Features HVAC control, air quality management, BACnet IP, and comprehensive specifications for commercial building automation.
Preview i-Vu® XT BACnet Link Installation and Start-up Guide
This guide provides comprehensive instructions for the installation and start-up of the Carrier i-Vu® XT BACnet Link (part no. XT-LB), a versatile BACnet router designed for seamless integration within building automation systems.
Preview Carrier SiteBuilder v10.0 User Guide
Comprehensive user guide for Carrier SiteBuilder v10.0, detailing how to create and manage databases for the i-Vu® Pro Server application, configure system hierarchies, and build network topologies for HVAC systems.
Preview Carrier i-Vu Cloud Release Notes - Version 2025-Q1-SR24
This document contains the release notes for Carrier's i-Vu Cloud software, version 2025-Q1-SR24. It details new features in ACXelerate V3, improvements to BACnet discovery, tool enhancements, and security updates.
Preview Carrier Third-Party BACnet Utility v9.0 User Guide
A user guide for the Carrier Third-Party BACnet Utility v9.0, detailing how to configure and address BACnet objects and generate control programs.