User Manual for AXIS models including: Network Switches Hardening, Switches Hardening, Hardening, Switches

Axis Network Switches Hardening Guide

AXIS Communications AB

Download PDF

Axis Network Switches Hardening Guide User manual


File Info : application/pdf, 14 Pages, 756.14KB

PDF preview unavailable. Download the PDF instead.

release notes networkes hardening guide t10185568 en 2210
Axis Network Switches Hardening Guide

Axis Network Switches Hardening Guide
Introduction

Introduction

Axis Communications strives to apply cybersecurity best practices in the design, development, and testing of our devices to minimize the risk of flaws that could be exploited in an attack. However, securing a network, its devices, and the services it supports requires active participation by the entire vendor supply chain, as well as the end-user organization. A secure environment depends on its users, processes, and technology. The purpose of this guide is to support you in securing your network, devices, and services.
From an IT/network perspective, the Axis switch is a network device like any other. Unlike a laptop computer, however, a network switch does not have users visiting potentially harmful websites, opening malicious email attachments, or installing untrusted applications. Nevertheless, a network switch is a device with an interface that may expose risks to the system it is connected to. This guide focuses on reducing the exposure to these risks.
The guide provides technical advice for anyone involved in deploying Axis solutions. It establishes a baseline configuration as well as a hardening guide that deals with the evolving threat landscape. You may need the product's user manual to learn how to configure specific settings.
Web interface configuration The guide refers to modifying device settings within the web interface of the Axis device according to the following instructions:
Web interface configuration path
Advanced > Security

Changelog
Date and time September 2022

Version 1.0

Changes Initial version

Scope
The hardening instructions outlined in this guide are written for, and can be applied to, Axis managed switches that are manageable via web interface or SSH console, such as the AXIS T85 PoE+ Network Switch Series. Depending on the device, some functions might not be applicable or available.
Security notifications
It is recommended to subscribe to Axis Security Notification Service to receive information about newly discovered vulnerabilities in Axis products, solutions and services and other security-related technical information that contribute to operating Axis devices in a secure manner.
CIS protection levels
As a means of structuring our recommendations in the context of a cybersecurity framework, Axis has chosen to follow the methods outlined in Center for Internet Safety (CIS) Controls - Version 8. The CIS controls, previously known as SANS Top 20 Critical Security Controls, provide 18 categories of Critical Security Controls (CSC) focused on addressing the most common cybersecurity risk categories in an organization.
This guide refers to the Critical Security Controls by adding the CSC number (CSC #) for each hardening item. For more information on the CSC categories, see https://www.cisecurity.org/controls/cis-controls-list.

2

Axis Network Switches Hardening Guide
Default protection

Default protection

Axis devices are delivered with predefined default protection settings. There are several security controls that you do not need to configure. These controls allow for basic device protection and serve as the fundament for more extended hardening.

Credentialed access
An Axis network switch will be able to operate out-of-the box using its default settings. Access to administrative functions can however only be reached using the automatic randomly generated password located on the product label on the bottom of the Axis switch. During first setup, the user will need to change the password during first access. For more information, see Set device root password on page 5 .

Network protocols
CSC #4: Secure Configuration of Enterprise Assets and Software
Only a minimum number of network protocols and services are enabled by default in Axis network switches. In the table below you can see which these are.

Protocol HTTP HTTPS NTP
SSDP/ UPnP
Bonjour

Port 80 443 123
1900
5353

Transport TCP TCP UDP
UDP
UDP

Comments
General HTTP traffic such as web interface access or VAPIX.
General HTTP traffic such as web interface access or VAPIX.
Used by the Axis device for time synchronization with a NTP server.
Used by 3rd party applications to discover the Axis device via UPnP discovery protocol.
Used by 3rd party applications to discover the Axis device via mDNS discovery protocol (Bonjour).

It is recommended to disable unused network protocols and services whenever possible.

HTTPS enabled
CSC #3: Data Protection HTTPS is enabled by default with a self-signed certificate. This enables setting the device password in a secure way.
Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method Advanced > Security > Configuration > Switch > HTTPS

Decommissioning
CSC #3: Data Protection

3

Axis Network Switches Hardening Guide
Default protection
When decommissioning an Axis device, a factory default should be executed. After the factory default, all settings applied by the customer are erased. Axis devices use both volatile and non-volatile memory, and while the volatile memory is erased when removing the power, information stored in the non-volatile memory remains and is made available again at start-up. To securely delete persistent, sensitive data on the device, a factory default needs to be performed.
4

Axis Network Switches Hardening Guide
Basic hardening
Basic hardening
The basic hardening is the minimum level of protection recommended for Axis devices. The below listed hardening items are "configurable on the edge", meaning they can be directly configured in the Axis device without having further dependencies to any 3rd party network infrastructure, video or evidence management systems (VMS, EMS), or other 3rd party equipment or application.
Factory default settings
CSC #4: Secure Configuration of Enterprise Assets and Software Before starting, make sure that the device is in a known factory default state. The factory default is important when decommissioning devices as well as clearing user-data.
Web interface configuration path Advanced > Maintenance > Factory Defaults
Upgrade to latest firmware
CSC #2: Inventory and Control of Software Assets Patching software and firmware is an important aspect of cybersecurity. An attacker will often try to exploit commonly known vulnerabilities, and if they gain network access to an unpatched service, they may succeed. Make sure you always use the latest firmware since it may include security patches for known vulnerabilities. The release notes for a specific firmware may explicitly mention a critical security fix, but not all general fixes. Firmware can be downloaded at https://www.axis.com/support/firmware.
Web interface configuration path Advanced > Maintenance > Firmware > Firmware Upgrade
Set device root password
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #5: Account Management The device root account is the main device administration account. During first setup, the user will need to change the password during first access. Make sure to use a strong password and limit the usage of the root account to administration tasks only. It is not recommended to use the root account in daily production. When operating Axis devices, using the same password simplifies management but lowers the security in case of breach or data leak. Using unique passwords for each single Axis device provides high security but comes with an increased complexity to device management. Password rotation is recommended. It is recommended to implement sufficient password complexity and length, such as NIST password recommendations. Axis switches support passwords up to 31 characters. Passwords shorter than 8 characters are considered weak.
Web interface configuration path Advanced > Security > Configuration > Switch > Users
Create a client account
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #5: Account Management
5

Axis Network Switches Hardening Guide
Basic hardening
The default root account has full privileges and should be reserved for administrative tasks. It is recommended to create a client user account with limited privileges for daily operation (if required). This reduces the risk of compromising the device administrator password.
Web interface configuration path Advanced > Security > Configuration > Switch > Users
Configure network settings
CSC #12: Network Infrastructure Management The device IP configuration depends on the network configuration, such as IPv4/IPv6, static or dynamic (DHCP) network address, subnet mask and default router. It is recommended to review your network topology when adding new types of components. It is recommended to use static IP address configuration on Axis devices to ensure network reachability and disentangle the dependency to e.g., a DHCP server in the network that might be a target for attacks.
Web interface configuration path Advanced > System > Configuration > IP > IP Interfaces
Correct date and time configuration
CSC #8: Audit Log Management From a security perspective, it is important that the date and time are correct so that, for example, the system logs are time-stamped with the right information, and digital certificates can be validated and used during runtime. Without proper time-sync, services that rely on digital certificates such as HTTPS, IEEE 802.1x, and others may not work correctly. It is recommended that the Axis device clock is synchronized with a Network Time Protocol (NTP) server, preferably two. For individuals and small organizations that do not have a local NTP server, a public NTP server may be used. Check with your internet service provider or use a public NTP server such as pool.ntp.org.
Web interface configuration path Basic > Date & Time
Configure VLANs
CSC #1: Inventory and Control of Enterprise Assets CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense By the means of VLANs, it is possible to segment the physical network virtually into several different networks. By breaking up the network into multiple, distinct, and mutually isolated broadcast domains, the received network traffic of hosts in the network can be lowered, the network attack surface can be minimized, and network hosts and resources are bundled organizationally within one VLAN, without the need of being made available to the entire physical network. This increases overall network security.
Web interface configuration path Advanced > VLANs
Configure IP source guard
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense
6

Axis Network Switches Hardening Guide
Basic hardening
IP source guard is a feature used to restrict IP traffic on DHCP snooping untrusted ports by filtering traffic based on the DHCP snooping table or manually configured IP source bindings. It helps prevent IP spoofing attacks when a host tries to spoof and use the IP address of another host. Example of an IP source guard configuration allowing only one dynamic client on switch port 1. On switch port 2 only statically configured clients are allowed.
Example of an IP source guard static table.
Web interface configuration path Advanced > Security > Configuration > Network > IP Source Guard > Configuration
Configure ACLs
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense ACL is an acronym for Access Control List. It is a list containing access control entries (ACE) which specify individual users or groups permitted or denied to specific traffic objects, such as a process or a program. ACL implementations can be quite complex. In networking, the ACL refers to a list of service ports or network services that are available on a host or server, each with a list of hosts or servers permitted or denied using the service. ACL can generally be configured to control inbound traffic, and in this context, they are like firewalls.
7

Axis Network Switches Hardening Guide
Basic hardening
Example of an ACE configuration blocking ICMP traffic on switch port 1.
Example of an ACE configuration blocking all IPv4 traffic on switch port 1 to/from the 10.0.1.0/24 subnet.
Web interface configuration path Advanced > Security > Configuration > Network > ACL > Access Control List
Disable unused services/functions
CSC #4: Secure Configuration of Enterprise Assets and Software Even though unused services/functions are not an immediate security threat, it is good practice to disable unused services/functions to reduce unnecessary risks. Below are some services/functions that could be disabled if not used.
SSH
Access to the network switch via SSH allows for more granular and detailed configuration than the web interface. It is also used for troubleshooting and debugging purposes. While being a secure communication protocol, it is recommended to make sure that the SSH access is disabled when no longer used.
8

Axis Network Switches Hardening Guide
Basic hardening
Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method
Discovery protocols
Discovery protocols, such as Bonjour or UPnP, are support services that make it easier to find the Axis device and its services on the network. After deployment, once the Axis device IP address is known, it is recommended to disable the discovery protocol to stop the Axis device from announcing its presence on the network.
Web interface configuration path Advanced > System > Configuration > Information > Bonjour Discovery Advanced > UPnP
Unused physical network ports
Not all physical network ports might be occupied at all times. It is recommended to disable unused network ports administratively on the switch side. Leaving unused network ports unattended and active imposes a severe security risk.
Web interface configuration path Advanced > Ports > Configuration
Switch reboot schedule
CSC #2: Inventory and Control of Software Assets During normal operation, any recurrent scheduled restart of the switch should not be required since this would also involve disconnection or restart of the connected devices (if powered by the switch). It is recommended to keep this option disabled until needed for troubleshooting and debugging purposes only.
Web interface configuration path Advanced > Maintenance > Reboot Schedule
HTTPS
CSC #3: Data Protection It is recommended to configure the Axis device for HTTPS only (no HTTP access possible). While a self-signed certificate is not trusted by design, it is adequate for secure access to the Axis device during initial configuration and when no public key infrastructure (PKI) is available at hand. If available, the self-signed certificate should be removed and replaced with proper signed client certificates of the PKI-authority of choice.
Web interface configuration path Advanced > Security > Configuration > Switch > Auth Method Advanced > Security > Configuration > Switch > HTTPS
Configure ARP inspection
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense Several different types of well-known attacks known as "ARP Cache Poisoning" can be launched against a host or devices connected to layer 2 networks by "poisoning" the ARP caches of the network switch. The result of a successful attack would be a temporary
9

Axis Network Switches Hardening Guide
Basic hardening
loss of network hosts and traffic. ARP inspection is used to block such attacks. Only valid ARP requests and responses can go through the switch device. Example of an ARP inspection configuration on switch port 1 and 2.
Web interface configuration path Advanced > Security > Configuration > Network > ARP Inspection
Configure port security limit control
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13: Network Monitoring and Defense Port security limit control allows for limiting the number of users on a given port. A user is identified by a MAC address and VLAN ID. If limit control is enabled on a port, the limit specifies the maximum number of users on the port. If the number is exceeded, a selected action is taken. While port security limit control can be enabled through the web interface, the limit can only be set via the command line interface. Example of a port security limit control configuration on switch port 1 and 2.
10

Axis Network Switches Hardening Guide
Basic hardening
Web interface configuration path Advanced > Security > Configuration > Network > Limit Control Command line configuration path Configuration Mode > interface GigabitEthernet x/x > port-security maximum x
11

Axis Network Switches Hardening Guide
Extended hardening
Extended hardening
The hardening instructions outlined in this section are an extension that build on the default and basic hardening described in previous sections. While the default and basic hardening can be configured and enabled directly in the Axis device, the extended hardening of Axis devices require active participation by the entire vendor supply chain, as well as the end-user organization and the underlying IT- and/or network infrastructure.
Limit internet exposure
CSC #12: Network Infrastructure Management It is not recommended to expose the Axis device as a public web server or public network access of any kind, allowing unknown clients to gain network access to the device.
Network vulnerability scanning
CSC #1: Inventory and Control of Enterprise Assets CSC #12: Network Infrastructure Management It is recommended to perform regular vulnerability assessments of the infrastructure the Axis device is part of as well as of the Axis device itself. These vulnerability assessments are usually performed by network security scanners. The purpose of a vulnerability assessment is to provide a systematic review of potential security vulnerabilities and misconfigurations. Please make sure that the Axis device being tested is updated to the latest available firmware before starting the scan. It is recommended to review the scanning report and filter out known false-positives for Axis devices stated here. The report and remaining remarks that are left should be submitted in a helpdesk ticket to Axis support.
Trusted public key infrastructure (PKI)
CSC #3: Data Protection CSC #12: Network Infrastructure Management It is recommended to deploy web server and client certificates in Axis devices that are trusted and signed by a public or private Certificate Authority (CA) of choice. A CA-signed certificate whose trust chain can be validated helps to remove browser certificate warnings when connecting over HTTPS and ensures the authenticity of the Axis device when deploying a Network Access Control (NAC) solution. This mitigates the risk of an attacking computer impersonating an Axis device. Note that AXIS Device Manager has a built-in CA service that can be used to issue signed certificates to Axis devices.
IEEE 802.1x network access control
CSC #6: Access Control Management CSC #13: Network Monitoring and Defense Axis devices have support for IEEE 802.1x port-based network access control utilizing the EAP-TLS method. For optimal protection, authentication of Axis devices must utilize client certificates signed by a trusted Certificate Authority (CA) of choice. See the following guideline on how to configure an Axis network switch for IEEE 802.1x.
Web interface configuration path Advanced > Security > Configuration > AAA > RADIUS Advanced > Security > Configuration > Network > NAS
12

Axis Network Switches Hardening Guide
Extended hardening SMTP monitoring
CSC #8: Audit Log Management Axis network switches can be configured to send out alarm events through SMTP messages.
Web interface configuration path Advanced > SMTP
SNMP monitoring
CSC #8: Audit Log Management Axis devices support the following SNMP protocols:
· SNMP v1: supported for legacy reasons only, should not be used. · SNMP v2c: may be used on a protected network segment. · SNMP v3: recommended for monitoring purposes. Web interface configuration path Advanced > Security > Configuration > Switch > SNMP
Remote syslog
CSC #8: Audit Log Management Axis devices can be configured to send all log messages encrypted to a central syslog server. This simplifies audits and prevents log messages from being deleted in the Axis device either intentionally/maliciously or unintentionally. It also allows for extended retention time of device logs depending on company policies.
Web interface configuration path Advanced > System > Configuration > Log
13

Axis Network Switches Hardening Guide © Axis Communications AB, 2022

Ver. M2.2 Date: October 2022
Part No.



References

PTC Arbortext Publishing Engine PDFlib PDI 9.3.0p1 (Win32)