User Manual for AXIS models including: Network Switches Hardening, Switches Hardening, Hardening, Switches
Axis Network Switches Hardening Guide User manual
File Info : application/pdf, 14 Pages, 756.14KB
DocumentDocumentAxis Network Switches Hardening Guide Axis Network Switches Hardening Guide Introduction Introduction Axis Communications strives to apply cybersecurity best practices in the design, development, and testing of our devices to minimize the risk of flaws that could be exploited in an attack. However, securing a network, its devices, and the services it supports requires active participation by the entire vendor supply chain, as well as the end-user organization. A secure environment depends on its users, processes, and technology. The purpose of this guide is to support you in securing your network, devices, and services. From an IT/network perspective, the Axis switch is a network device like any other. Unlike a laptop computer, however, a network switch does not have users visiting potentially harmful websites, opening malicious email attachments, or installing untrusted applications. Nevertheless, a network switch is a device with an interface that may expose risks to the system it is connected to. This guide focuses on reducing the exposure to these risks. The guide provides technical advice for anyone involved in deploying Axis solutions. It establishes a baseline configuration as well as a hardening guide that deals with the evolving threat landscape. You may need the product's user manual to learn how to configure specific settings. Web interface configuration The guide refers to modifying device settings within the web interface of the Axis device according to the following instructions: Web interface configuration path Advanced > Security Changelog Date and time September 2022 Version 1.0 Changes Initial version Scope The hardening instructions outlined in this guide are written for, and can be applied to, Axis managed switches that are manageable via web interface or SSH console, such as the AXIS T85 PoE+ Network Switch Series. Depending on the device, some functions might not be applicable or available. Security notifications It is recommended to subscribe to Axis Security Notification Service to receive information about newly discovered vulnerabilities in Axis products, solutions and services and other security-related technical information that contribute to operating Axis devices in a secure manner. CIS protection levels As a means of structuring our recommendations in the context of a cybersecurity framework, Axis has chosen to follow the methods outlined in Center for Internet Safety (CIS) Controls - Version 8. The CIS controls, previously known as SANS Top 20 Critical Security Controls, provide 18 categories of Critical Security Controls (CSC) focused on addressing the most common cybersecurity risk categories in an organization. This guide refers to the Critical Security Controls by adding the CSC number (CSC #) for each hardening item. For more information on the CSC categories, see https://www.cisecurity.org/controls/cis-controls-list. 2 Axis Network Switches Hardening Guide Default protection Default protection Axis devices are delivered with predefined default protection settings. There are several security controls that you do not need to configure. These controls allow for basic device protection and serve as the fundament for more extended hardening. Credentialed access An Axis network switch will be able to operate out-of-the box using its default settings. Access to administrative functions can however only be reached using the automatic randomly generated password located on the product label on the bottom of the Axis switch. During first setup, the user will need to change the password during first access. For more information, see Set device root password on page 5 . Network protocols CSC #4: Secure Configuration of Enterprise Assets and Software Only a minimum number of network protocols and services are enabled by default in Axis network switches. In the table below you can see which these are. Protocol HTTP HTTPS NTP SSDP/ UPnP Bonjour Port 80 443 123 1900 5353 Transport TCP TCP UDP UDP UDP Comments General HTTP traffic such as web interface access or VAPIX. General HTTP traffic such as web interface access or VAPIX. Used by the Axis device for time synchronization with a NTP server. Used by 3rd party applications to discover the Axis device via UPnP discovery protocol. Used by 3rd party applications to discover the Axis device via mDNS discovery protocol (Bonjour). It is recommended to disable unused network protocols and services whenever possible. HTTPS enabled CSC #3: Data Protection HTTPS is enabled by default with a self-signed certificate. This enables setting the device password in a secure way. Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method Advanced > Security > Configuration > Switch > HTTPS Decommissioning CSC #3: Data Protection 3 Axis Network Switches Hardening Guide Default protection When decommissioning an Axis device, a factory default should be executed. After the factory default, all settings applied by the customer are erased. Axis devices use both volatile and non-volatile memory, and while the volatile memory is erased when removing the power, information stored in the non-volatile memory remains and is made available again at start-up. To securely delete persistent, sensitive data on the device, a factory default needs to be performed. 4 Axis Network Switches Hardening Guide Basic hardening Basic hardening The basic hardening is the minimum level of protection recommended for Axis devices. The below listed hardening items are "configurable on the edge", meaning they can be directly configured in the Axis device without having further dependencies to any 3rd party network infrastructure, video or evidence management systems (VMS, EMS), or other 3rd party equipment or application. Factory default settings CSC #4: Secure Configuration of Enterprise Assets and Software Before starting, make sure that the device is in a known factory default state. The factory default is important when decommissioning devices as well as clearing user-data. Web interface configuration path Advanced > Maintenance > Factory Defaults Upgrade to latest firmware CSC #2: Inventory and Control of Software Assets Patching software and firmware is an important aspect of cybersecurity. An attacker will often try to exploit commonly known vulnerabilities, and if they gain network access to an unpatched service, they may succeed. Make sure you always use the latest firmware since it may include security patches for known vulnerabilities. The release notes for a specific firmware may explicitly mention a critical security fix, but not all general fixes. Firmware can be downloaded at https://www.axis.com/support/firmware. Web interface configuration path Advanced > Maintenance > Firmware > Firmware Upgrade Set device root password CSC #4: Secure Configuration of Enterprise Assets and Software CSC #5: Account Management The device root account is the main device administration account. During first setup, the user will need to change the password during first access. Make sure to use a strong password and limit the usage of the root account to administration tasks only. It is not recommended to use the root account in daily production. When operating Axis devices, using the same password simplifies management but lowers the security in case of breach or data leak. Using unique passwords for each single Axis device provides high security but comes with an increased complexity to device management. Password rotation is recommended. It is recommended to implement sufficient password complexity and length, such as NIST password recommendations. Axis switches support passwords up to 31 characters. Passwords shorter than 8 characters are considered weak. Web interface configuration path Advanced > Security > Configuration > Switch > Users Create a client account CSC #4: Secure Configuration of Enterprise Assets and Software CSC #5: Account Management 5 Axis Network Switches Hardening Guide Basic hardening The default root account has full privileges and should be reserved for administrative tasks. It is recommended to create a client user account with limited privileges for daily operation (if required). This reduces the risk of compromising the device administrator password. Web interface configuration path Advanced > Security > Configuration > Switch > Users Configure network settings CSC #12: Network Infrastructure Management The device IP configuration depends on the network configuration, such as IPv4/IPv6, static or dynamic (DHCP) network address, subnet mask and default router. It is recommended to review your network topology when adding new types of components. It is recommended to use static IP address configuration on Axis devices to ensure network reachability and disentangle the dependency to e.g., a DHCP server in the network that might be a target for attacks. Web interface configuration path Advanced > System > Configuration > IP > IP Interfaces Correct date and time configuration CSC #8: Audit Log Management From a security perspective, it is important that the date and time are correct so that, for example, the system logs are time-stamped with the right information, and digital certificates can be validated and used during runtime. Without proper time-sync, services that rely on digital certificates such as HTTPS, IEEE 802.1x, and others may not work correctly. It is recommended that the Axis device clock is synchronized with a Network Time Protocol (NTP) server, preferably two. For individuals and small organizations that do not have a local NTP server, a public NTP server may be used. Check with your internet service provider or use a public NTP server such as pool.ntp.org. Web interface configuration path Basic > Date & Time Configure VLANs CSC #1: Inventory and Control of Enterprise Assets CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense By the means of VLANs, it is possible to segment the physical network virtually into several different networks. By breaking up the network into multiple, distinct, and mutually isolated broadcast domains, the received network traffic of hosts in the network can be lowered, the network attack surface can be minimized, and network hosts and resources are bundled organizationally within one VLAN, without the need of being made available to the entire physical network. This increases overall network security. Web interface configuration path Advanced > VLANs Configure IP source guard CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense 6 Axis Network Switches Hardening Guide Basic hardening IP source guard is a feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP snooping table or manually configured IP source bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host. Example of an IP source guard configuration allowing only one dynamic client on switch port 1. On switch port 2 only statically configured clients are allowed. Example of an IP source guard static table. Web interface configuration path Advanced > Security > Configuration > Network > IP Source Guard > Configuration Configure ACLs CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense ACL is an acronym for Access Control List. It is a list containing access control entries (ACE) which specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. ACL implementations can be quite complex. In networking, the ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or servers permitted or denied using the service. ACL can generally be configured to control inbound traffic, and in this context, they are like firewalls. 7 Axis Network Switches Hardening Guide Basic hardening Example of an ACE configuration blocking ICMP traffic on switch port 1. Example of an ACE configuration blocking all IPv4 traffic on switch port 1 to/from the 10.0.1.0/24 subnet. Web interface configuration path Advanced > Security > Configuration > Network > ACL > Access Control List Disable unused services/functions CSC #4: Secure Configuration of Enterprise Assets and Software Even though unused services/functions are not an immediate security threat, it is good practice to disable unused services/functions to reduce unnecessary risks. Below are some services/functions that could be disabled if not used. SSH Access to the network switch via SSH allows for more granular and detailed configuration than the web interface. It is also used for troubleshooting and debugging purposes. While being a secure communication protocol, it is recommended to make sure that the SSH access is disabled when no longer used. 8 Axis Network Switches Hardening Guide Basic hardening Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method Discovery protocols Discovery protocols, such as Bonjour or UPnP, are support services that make it easier to find the Axis device and its services on the network. After deployment, once the Axis device IP address is known, it is recommended to disable the discovery protocol to stop the Axis device from announcing its presence on the network. Web interface configuration path Advanced > System > Configuration > Information > Bonjour Discovery Advanced > UPnP Unused physical network ports Not all physical network ports might be occupied at all times. It is recommended to disable unused network ports administratively on the switch side. Leaving unused network ports unattended and active imposes a severe security risk. Web interface configuration path Advanced > Ports > Configuration Switch reboot schedule CSC #2: Inventory and Control of Software Assets During normal operation, any recurrent scheduled restart of the switch should not be required since this would also involve disconnection or restart of the connected devices (if powered by the switch). It is recommended to keep this option disabled until needed for troubleshooting and debugging purposes only. Web interface configuration path Advanced > Maintenance > Reboot Schedule HTTPS CSC #3: Data Protection It is recommended to configure the Axis device for HTTPS only (no HTTP access possible). While a self-signed certificate is not trusted by design, it is adequate for secure access to the Axis device during initial configuration and when no public key infrastructure (PKI) is available at hand. If available, the self-signed certificate should be removed and replaced with proper signed client certificates of the PKI-authority of choice. Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method Advanced > Security > Configuration > Switch > HTTPS Configure ARP inspection CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense Several different types of well-known attacks known as "ARP Cache Poisoning" can be launched against a host or devices connected to layer 2 networks by "poisoning" the ARP caches of the network switch. The result of a successful attack would be a temporary 9 Axis Network Switches Hardening Guide Basic hardening loss of network hosts and traffic. ARP inspection is used to block such attacks. Only valid ARP requests and responses can go through the switch device. Example of an ARP inspection configuration on switch port 1 and 2. Web interface configuration path Advanced > Security > Configuration > Network > ARP Inspection Configure port security limit control CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense Port security limit control allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID. If limit control is enabled on a port, the limit specifies the maximum number of users on the port. If the number is exceeded, a selected action is taken. While port security limit control can be enabled through the web interface, the limit can only be set via the command line interface. Example of a port security limit control configuration on switch port 1 and 2. 10 Axis Network Switches Hardening Guide Basic hardening Web interface configuration path Advanced > Security > Configuration > Network > Limit Control Command line configuration path Configuration Mode > interface GigabitEthernet x/x > port-security maximum x 11 Axis Network Switches Hardening Guide Extended hardening Extended hardening The hardening instructions outlined in this section are an extension that build on the default and basic hardening described in previous sections. While the default and basic hardening can be configured and enabled directly in the Axis device, the extended hardening of Axis devices require active participation by the entire vendor supply chain, as well as the end-user organization and the underlying IT- and/or network infrastructure. Limit internet exposure CSC #12: Network Infrastructure Management It is not recommended to expose the Axis device as a public web server or public network access of any kind, allowing unknown clients to gain network access to the device. Network vulnerability scanning CSC #1: Inventory and Control of Enterprise Assets CSC #12: Network Infrastructure Management It is recommended to perform regular vulnerability assessments of the infrastructure the Axis device is part of as well as of the Axis device itself. These vulnerability assessments are usually performed by network security scanners. The purpose of a vulnerability assessment is to provide a systematic review of potential security vulnerabilities and misconfigurations. Please make sure that the Axis device being tested is updated to the latest available firmware before starting the scan. It is recommended to review the scanning report and filter out known false-positives for Axis devices stated here. The report and remaining remarks that are left should be submitted in a helpdesk ticket to Axis support. Trusted public key infrastructure (PKI) CSC #3: Data Protection CSC #12: Network Infrastructure Management It is recommended to deploy web server and client certificates in Axis devices that are trusted and signed by a public or private Certificate Authority (CA) of choice. A CA-signed certificate whose trust chain can be validated helps to remove browser certificate warnings when connecting over HTTPS and ensures the authenticity of the Axis device when deploying a Network Access Control (NAC) solution. This mitigates the risk of an attacking computer impersonating an Axis device. Note that AXIS Device Manager has a built-in CA service that can be used to issue signed certificates to Axis devices. IEEE 802.1x network access control CSC #6: Access Control Management CSC #13: Network Monitoring and Defense Axis devices have support for IEEE 802.1x port-based network access control utilizing the EAP-TLS method. For optimal protection, authentication of Axis devices must utilize client certificates signed by a trusted Certificate Authority (CA) of choice. See the following guideline on how to configure an Axis network switch for IEEE 802.1x. Web interface configuration path Advanced > Security > Configuration > AAA > RADIUS Advanced > Security > Configuration > Network > NAS 12 Axis Network Switches Hardening Guide Extended hardening SMTP monitoring CSC #8: Audit Log Management Axis network switches can be configured to send out alarm events through SMTP messages. Web interface configuration path Advanced > SMTP SNMP monitoring CSC #8: Audit Log Management Axis devices support the following SNMP protocols: · SNMP v1: supported for legacy reasons only, should not be used. · SNMP v2c: may be used on a protected network segment. · SNMP v3: recommended for monitoring purposes. Web interface configuration path Advanced > Security > Configuration > Switch > SNMP Remote syslog CSC #8: Audit Log Management Axis devices can be configured to send all log messages encrypted to a central syslog server. This simplifies audits and prevents log messages from being deleted in the Axis device either intentionally/maliciously or unintentionally. It also allows for extended retention time of device logs depending on company policies. Web interface configuration path Advanced > System > Configuration > Log 13 Axis Network Switches Hardening Guide © Axis Communications AB, 2022 Ver. M2.2 Date: October 2022 Part No.