Hanwha Vision IP Camera Network Hardening Guide User Guide
- June 12, 2024
- Hanwha Vision
Table of Contents
- Hanwha Vision IP Camera Network Hardening Guide
- Product Information: IP Camera Network Hardening Guide
- Product Usage Instructions
- Introduction
- Definition of Security Levels
- Default Level
- Protective Level
- Secure Level **
- References
- Read User Manual Online (PDF format)
- Download This Manual (PDF format)
Hanwha Vision IP Camera Network Hardening Guide
Product Information: IP Camera Network Hardening Guide
Version: 04.2023 V4.0
Contents:
- Introduction
- Definition of Security Levels
- Default Level
- Protective Level
- Secure Level
- Very Secure Level
Revision History:
Version | Revision Date | Revision Details |
---|---|---|
v1.0 | Jun. 13th, 2017 | – v1.0 released |
v2.0 | Jan. 16th, 2018 | – Non Plug-in HTML5 web viewer added in default level |
V3.0 | May. 8th, 2020 | – ‘Using SNMP securely’ changed to Protective level from |
secure
level (Default setting changed to off)
– ‘Disabling unused SNMP’ removed
V4.0| April. 4rd, 2023| – No revision details provided
Product Usage Instructions
1. Introduction
This guide provides information on network hardening for the IP Camera to
ensure cyber security.
2. Definition of Security Levels
The guide defines different security levels based on the hardening features
and activities for cyber security. Each level assumes the previous level has
been achieved.
Security Level | Hardening Features & Activities for Cyber Security |
---|---|
Default Level |
-
Force complex password settings
-
Remove initial password
-
Restriction of input in case of consecutive password
failure -
Remote service (Telnet, SSH) not used
-
Encrypt preference information
-
Firmware encryption and secure update
-
Watermarking and encryption of extracted video formats
-
Keep log on initialization
-
HTML5 streaming based NonPlug-in web viewer
-
Individual device authentication (device / user
authentication) -
Disable SUNAPI / ONVIF at factory reset
-
Secure Boot
Protective Level|
- Disable unused SNMP
Secure Level| No specific instructions provided
Very Secure Level|
- Use the latest version of TLS (TLS 1.2 / 1.3)
- Using Safe Cipher Suites (Secure Cipher Suites)
- Disable unused audio input
- Disable unused MQTT
- Set Activation SNMP v3
- TLS enabled
- Change/Set 802.1 X Certificate-based access control
3. Default Level
The default level ensures safety from cyber security threats with basic functions and initial settings.
Security Policy | Brief Description |
---|---|
Password policy | Force complex password settings – Character input request |
with
password complexity of at least 8 characters (2 or 3 types)
Access control| No specific instructions provided
Remote access control security| No specific instructions provided
Security of setting information backup| No specific instructions provided
Firmware security| No specific instructions provided
Protect extracted video| No specific instructions provided
Log protection| No specific instructions provided
HTML5 streaming standard| No specific instructions provided
Individual device authentication| No specific instructions provided
Physical protection| No specific instructions provided
Note: Please refer to the complete user manual for detailed instructions and additional security levels.
Revision History
Version | Revision Date | Revision Details | Note |
---|---|---|---|
v1.0 | Jun. 13th 2017 |
- v1.0 released
|
v2.0| Jan. 16th 2018|
-
Non Plug-in HTML5 web viewer added in default level
-
‘Using SNMP securely’ changed to Protective level from secure level (Default setting changed to off)
-
‘Disabling unused SNMP’ removed
-
STW format backup removed from camera web viewer backup (Table 4)
-
SVNP protocol removed from ‘Disabling unused multicast’
|
V3.0| May. 8th 2020|
- Add individual device authentication (device / user authentication)
- Added SUNAPI / ONVIF deactivation in factory reset state
- Secure Boot added
- Using a secure communication protocol (HTTP) Change from protection level to secure level
- Safe use of SNMP Change from protection level to secure level
- Unused SNMP disable protection level added
- Changed from secure level to protection level
- Disable unused Link-Local IPv4 address
- Disable unused UPnP search
- Disable unused Bonjour
- Changed the HTTP authentication (only Digest authentication) item to Use secure
- communication protocol (HTTP) and added it to the protection level.
- Added use of the latest version of TLS
- Added use of safe Cipher Suites
- Add secure communication protocol (RTSP)
- Add storage encryption / backup encryption
|
V4.0| April. 4rd2023|
- Add MQTT
- Added ‘Using MQTT securely’
- Changed the content of ‘Changing the administrator account/creating additional user accounts’
|
Introduction
In the video surveillance market, a paradox is emerging that network
surveillance devices developed to protect customers’ property and personal
information in recent years are used as a means of seizing personal
information. Network surveillance device processes and manages video data that
can be used as sensitive personal information. Since it is based on the
network, remote access is possible from anywhere in the world where the
network is connected. Because of this nature, network surveillance device is
subject to ongoing cyber-attacks.
Hanwha Vision has been continuously making efforts to strengthen cyber
security with a careful consideration of customers’ property and personal
information. We hope that this guide will help you understand and safely use
the security features implemented in Hanwha Vision product.
Definition of Security Levels
This guide defines cyber security levels according to the following criteria, each level assuming the previous level is achieved.
- The default level is the level of security that users can achieve with the functionality provided by the device, without any extra settings.
- The protective level means the level of security that can be achieved with the default settings that initial purchased products have or in the state immediately after the factory initialization.
- The secure level is a level of security that user can achieve by disabling unnecessary features or services that product provided.
- The very secure level means the level of security that can be achieved by combining the security features provided by products with additional external security solutions.
< Table 1 >
Security Level| Hardening features & activity for
cyber security| Initial Setting| Recommended Setting
---|---|---|---
| Force complex password settings| Default| –
| Remove initial password| Default| –
| Restriction of input in case of consecutive password failure| Default| –
| Remote service (Telnet, SSH) not used| Default| –
Default Level| Encrypt preference information Firmware encryption and secure
update
Watermarking and encryption of extracted video formats
| Default Default
Default
| –
–
–
| Keep log on initialization| Default| –
| HTML5 streaming based NonPlug-in web viewer| Default| –
| Individual device authentication (device / user authentication)| Default| –
| Disable SUNAPI / ONVIF at factory reset| Default| –
| Secure Boot| Default| –
Security Level| Hardening features & activity for
cyber security| Initial Setting| Recommended Setting
---|---|---|---
| Performing factory reset| –
Not set Not set Disabled Off
Not set Not set Disabled Disabled Disabled Disabled TLS 1.2 / 1.3
Secure Cipher Suites
Unused
Disabled
| –
| Disable guest login| –
| Disable allow unauthenticated RTSP connections| –
| Disable unused multicast| –
| Disable unused DDNS| –
| Disable unused QoS| –
Protective Level| Disable unused FTP Disable unused SNMP
Disable unused Link-Local IPv4 address
| –
–
–
| Disable unused UPnP search| –
| Disable unused Bonjour| –
| Use the latest version of TLS| –
| Using Safe Cipher Suites| –
| Disable unused audio input| –
| Disable unused MQTT| –
| Check if the latest version of firmware is used| –| –
| Updating to the latest version of firmware| –| –
| Setting the correct date / time| Initial value| change
| Using a secure communication protocol (HTTP)| HTTP + HTTPS| HTTPS
| Using a secure communication protocol (RTSP)| HTTPS + Wisenet / ONVIF| HTTPS
- RTSP
| HTTPS (Device certificate)| HTTP+HTTPS| HTTPS (Device certificate)
| HTTPS (User certificate)| HTTP+HTTPS| HTTPS (User certificate)
Secure| Changing the default port| Initial value| change
Level| IP filtering| Not set| Set
| Sending E-mail using TLS| Disabled| Activation
| Using SNMP securely| Not set| SNMP v3
| Using MQTT securely| Disabled| TLS enabled
| Changing the administrator account/creating additional user accounts| –| Change/Set
| Check the log| –| –
| Encryption of stored data (LUKS encryption)| Not set| Set
| Backup data encryption (ZIP file encryption)| Not set| Set
Very Secure
Level| 802.1 X Certificate-based access control| Not use| Use
Default Level
Hanwha Vision develops products to ensure safety from cyber security threats
even with basic functions and initial settings.
< Table 2>
Security
Policy
| Features for Cyber Security| Brief Description
---|---|---
Password policy| Force complex password settings| Character input request with
password
complexity of at least 8 characters (2 or 3 types)
No initial password| Password setting when logging in to the initial
access UI (Including Install Wizard)
Access control| Restriction of input when consecutive password input fails| Block password input attacks from unauthorized persons when logging in to the
web UI
Disable SUNAPI / ONVIF at factory reset| Prevention of video leakage
Remote access
control security| Remote service (Telnet, SSH) not used| Remove all services
that can access the system
remotely
Security of setting
information backup| Encrypt preference information| Protect backed up
configuration information
Firmware security| Firmware encryption and secure update| Prevent exposure and
analysis of important
information of firmware
Prevent forgery of firmware and injection of
malicious code
Protect extracted video| Watermarking and encryption of extracted video formats| Guaranteed confidentiality and integrity of extracted video format and source
authentication
Log protection| Keep log on initialization| Protection against malicious log deletion from
intruders
HTML5 streaming
standard| HTML5 streaming based NonPlug-in
web viewer| Provide optimal video service without Plug-in
(ActiveX, Silverlight, NPAPI)
Individual device
authentication| Device and mutual authentication (server
authentication / client authentication)
| Reliable device identification during encrypted
communication using device certificates
Physical protection| Secure Boot| Firmware forgery prevention
Forced complex password setting
Hanwha Vision products require min. 8 character password. Depending on the
length of the password, three (8 to 9 characters) or two (10 or more)
combination of letters (upper/lower case, numbers and special characters). Up
to 15 characters for NVR/DVR/IP camera and up to 31 characters for VMS. This
enforcement helps to reduce the possibility of unauthorized password hijacking
by preventing the weak password setting due to user’s carelessness.
No initial password
If a user uses the initial password or can not change the manufacture’s
default password, it could cause a serious security vulnerability that would
allow unauthorized access. To prevent any security vulnerability that may
occur due to user’s mistake, all Hanwha Vision products have no initial
password and designed to set user’s own password when accessing the UI of the
product for the first time.
Input limit for consecutive password failures
Hackers systematically check all possible passwords and passphrases until the
correct one is found. If this attack is allowed, the password will out some
time. Hanwha Vision devices block brute-force attack by not allowing 5 times
or more login attempt within 30 seconds to improve its security. Also,
existing connection of authorized user’s is maintained to prevent denial-of-
service while password input is blocked.
Remote service (Telnet, SSH) not used
Daemons that support remote services such as Telnet on a network device can
give manufacturers the advantage of conveniently providing A / S to their
customers, but if there are manufacturers with hackers or malicious
intentions, It can be a factor that can cause dangerous security incidents.
Accordingly, Hanwha Vision ‘s products gave up the convenience of A / S and
adopted a policy to boldly eliminate these risks to improve the security
level.
Preference information encryption
If you use the Backup function, you can download the binary file containing
the current device’s environment setting information to your PC, and restore
the backed up environment setting information through the Restore function.
Excludes the following items from environment setting information
- Excluding configuration information such as IP & Port, DDNS, IP filtering, HTTPS, 802.1x, QoS, SNMP, Auto IP configure in the network menu
If you use these functions, you can set the same environment for all devices with the same model name with only one device setting. Since the binary file containing the backed up configuration information contains important information of the user’s device environment, Hanwha Vision stores the configuration information using a secure encryption algorithm when back up.
Settings (IP camera)
- System → Upgrade / Reboot → Settings Backup & Restore
Firmware encryption and secure update
Hanwha Vision’s products provide encrypted firmware through the homepage of
Hanwha Vision when providing firmware for adding functions / improving bugs
and updating security. In addition, when the firmware is updated, the forged
firmware is identified and the integrity can be verified and the update can be
completed after verifying the integrity. This prevents hackers from analyzing
important information contained in the firmware, and after injecting malicious
code through forgery of the firmware, it can take control of the device and
prevent it from being used as another attacking bot. The firmware contains a
lot of important information that can be exploited by hackers. Hanwha Vision’s
products distribute firmware with confidentiality and integrity for the
security and secure update of these firmware.
Watermarking and encryption of extracted video formats
Video files extracted in SEC file format using Hanwha Vision’s NVR / VMS are
prevented from being tampered with because they cannot be opened with general
editing software. Basically, the player required for playback is automatically
extracted from the SEC file, so there is no need to install the player
separately, and the user can simply play the video file by double-clicking the
SEC file.
If you want to extract video files for legal evidence or privacy purposes, you
can select the SEC file format and set a password to extract it. Watermarking
and encryption are applied to the extracted SEC file to ensure that the video
is tampered with and ensure confidentiality. If extracted as a SEC file from
VMS (SSM), the digital signature function is additionally supported to support
the video. It is possible to confirm that it was extracted from SSM.
< Table 3 >
Device| Extraction
location
| Backup file
format
| Watermarking
/Encryption
| Digital
Signature
| Player
---|---|---|---|---|---
Camera| Webviewer| AVI| X| X| general video player
NVR
| Set| NVR| X| X| Only playable on set
SEC| O| X| Backup viewer
Webviewer| SEC1| O| X| Backup viewer
AVI| X| X| general video player
VMS(SSM)| –| SEC| O| O| Backup viewer
AVI| X| X| general video player
SSM console setup
- Setup → Video → Record → Format
Maintained logs after factory reset
It is very important for network or security administrators to check the log
to analyze the intrusion path or to understand the incident when someone
intrudes or attempts to break into a network device.
However, because intruders are aware of the logs of these network devices,
they want to delete logs so that they do not leave their marks or traces.
Hanwha Vision’s product is developed to retain log files from being erased by
device initialization (factory reset) to prevent such malicious intent.
- Settings (IP camera) : System → Upgrade / Reboot → Factory Reset
HTML5 non plug-in web viewer
Most video surveillance devices provide web viewer video streaming service
using the plug-in (ActiveX, Silverlight, NPAPI) installed into a web browser.
However, such plug-in have high possibility of security vulnerabilities and
exposures. Recently, malicious code infections are frequently caused by the
security vulnerabilities in effect. As a result, the most of browsers have
blocked plug-in installation and execution, and standardization is underway to
provide services through HTML5 (HTML latest standards), which can provide
media service without plug-in.
In response to this trend and security requirements, Hanwha Vision has
strengthened security and user convenience by providing HTML5 web viewer
service that can provide optimal video service without plug-in.
Individual device authentication
(Device/mutual authentication (server authentication/client authentication))
Network devices provided by Hanwha Vision are equipped with device
identification and mutual authentication functions using device certificates
for encrypted communication. Through this, it is possible to check whether it
is a reliable device manufactured by Hanwha Vision, and security can be
strengthened by preventing hackers from eavesdropping on or manipulating
secure communication through man-in-the-middle attacks.
The device certificate injection uses THALES HSM equipment to generate a
certificate / private key for each device and injects it into each device
during manufacturing. The generated certificate is digitally signed by the
Private Root CA, so you can prove that it was issued by Hanwha Vision.
Using this certificate, you can perform secure communication without a
security warning in a web browser, and you can confirm this in products that
implement device / mutual authentication as shown below.
Device authentication (SSM): registration → device selection → camera
information → general → device authentication ‘verified’ information
confirmation
- Mutual authentication (camera)
- Live screen → Select mutual authentication icon → Check authentication status
- Not applicable: without icon – mark
- Mutual authentication success: Success icon
- Mutual authentication failure: failure icon
You can check the installation guide of Hanwha Vision’s Private Root CA
certificate on our website.
Hanwha Vision Private Root CA pre-installation guide
(https://www.hanwhavision.com/en/support/cybersecurity/)
Disable SUNAPI / ONVIF at factory reset
To prevent the leakage of video image information through SUNAPI / ONVIF,
Hanwha Vision restricts access to SUNAPI / ONVIF until a password is set.
Secure Boot
Hanwha Vision strives to strengthen security by providing devices equipped
with its own WN7 chip. WN7 has a built-in Secure Boot function.
Secure Boot is a security technology that prevents the forged / modulated boot
image from being executed by verifying the digital signature of each boot
image loaded at boot time.
Previously, if only the firmware image was encrypted once, the WN7 verifies
the boot image step by step and the first stage passes the verification before
the next stage boot image is loaded.
The verification method loads the authentication signature when the boot image
is created, and verifies the corresponding signature when the product is
booted, and proceeds to boot if there is no abnormality in the verification
result.
Protective Level
Hanwha Vision devices are safe for basic security even with the initial
settings immediately after purchase or factory reset.
< Table 4>
Security
Policy
| Features for Cyber Security| Brief Description
---|---|---
Service protection| Factory reset| Initialize existing information stored in
the device
Disable guest login| Video protection from unauthorized users
Disable allow unauthenticated RTSP connections| RTSP video protection from
unauthorized users
Disable unused multicast| Prevent malicious attacks by minimizing services
that are initially activated
Disable unused DDNS
Disable unused QoS
Disable unused FTP
Disable unused SNMP
Disable unused Link-Local IPv4 address
Disable unused UPnP search
Disable unused Bonjour
Disable unused audio input
Disable unused MQTT
cryptography| Using a secure communication protocol (HTTPS)| Protection of
personal information and video
transmitted and received on the web viewer
Use the latest version of TLS| Use the latest version that is safe for
security
Safe use of Cipher Suites| Use secure cryptographic algorithms
Perform Factory Reset
If the device you want to set up is not in the initial state, it is need to
perform a factory reset of the device to initialize the device’s settings.
Hanwha Vision product can achieve the protective level of security with the
initial state alone.
- System → Upgrade/Reboot → Factory default
- Uncheck ‘Except network parameter & Open SDK’.
- Click ‘Reset’.
Disabling guest login
Hanwha Vision camera provides guest login function. This guest account is
limited because it allows only minimal privileges, but if guest login is
enabled, video streams may be exposed to unauthorized users, so if guest
access is not needed, guest login must be disabled.
IP camera web viewer → Basic → User → Guest setup
Disabling unauthenticated RTSP connections
Hanwha Vision camera provides a function that allows RTSP connection without
authentication. This feature is useful for providing an RTSP video stream for
public purposes, but if you want to protect the RTSP video stream from
unauthorized users, you must disable the RTSP connection without
authentication feature.
- IP camera setup → Basic → User → Authentication setup
- Uncheck ‘Enable RTSP connection without authentication’
Disabling unused multicast
It is able to set multicast for SVNP and RTSP protocols. If these services are
unnecessary, make sure to deselect the service features for added security.
- IP camera setup → Network → Video profile
- Uncheck ‘Use’ box of Multicast RTSP.
- Click ‘Apply’.
Disabling unused DDNS
If your camera is connected directly to a DHCP-based cable modem, DSL modem,
or PPPoE modem, the IP address will change each time you try to connect to
your ISP. In this case, the user can not know the changed IP address. If the
ID of the product is pre-registered through the DDNS function, the changed IP
address can be easily accessed. If you think the service is unnecessary, make
sure to deselect the service feature for added security.
- IP camera setup → Network → DDNS
- Check ‘Off’ for DDNS.
- Click ‘Apply’.
Disabling unused QoS
QoS(Quality of Service) is a function to set the priority to guarantee the
quality of video transmission for specific IP. If you think the service is
unnecessary, make sure to deselect the service feature for added security.
- IP camera setup → Network → QoS
- Chose listed IP for QoS then delete.
- Click ‘Apply’.
Disabling unused FTP
The FTP function is for transferring the images shot by the camera through the
FTP server set up when an alarm or event occurs. If you think the service is
unnecessary, make sure to deselect the service feature for added security.
- IP camera setup → Event → FTP/E-mail → FTP Configuration
- Remove server address, ID and password.
- Click ‘Apply’.
Disable unused SNMP
Hanwha Vision’s devices support SNMP v1, v2c and v3 functions simultaneously.
If you think the SNMP service is unnecessary, uncheck the setting of the
service function to enhance security.
- Network → SNMP
- Deselect SNMP v1, v2c and v3
Disable unused Link-Local IPv4 address
The link-local IPv4 address auto-configuration function is set to
169.254.xxx.xxx for the camera in a link-local network (meaning a network
connected to one link, such as a camera and a host connected to the same
switch) that do not receive the same IP as a DHCP server. This function
assigns IP. If you think the service is unnecessary, uncheck the setting of
the service function to enhance security.
- Network → Auto IP Settings → Link-Local IPv4 Address
- Deselect automatic setting
- Click the Apply button
Disable unused UPnP search
The UPnP search function is a function that automatically searches for cameras
from clients and operating systems that support the UPnP protocol. If you
think the service is unnecessary, uncheck the setting of the service function
to enhance security.
- Network → Auto IP setting → UPnP discovery
- Uncheck UPnP discovery
- Click the Apply button
Disable unused Bonjour
Bonjour is a feature that automatically searches for cameras from clients and
operating systems that support the Bonjour protocol. If you think the service
is unnecessary, uncheck the setting of the service function to enhance
security.
- Network → Auto IP Settings → Bonjour
- Deselect Bonjour Settings
- Click the Apply button
Use the latest version of TLS
TLS is used to establish a secure and encrypted communication channel between
client-server developed based on the SSL protocol. TLS currently has four
versions, 1.0, 1.1, 1.2, and 1.3, but the initial version of TLS, TLS 1.0 /
1.1, is vulnerable to various attacks such as POODLE2 and BEAST3. Hanwha
Vision provides TLS 1.2 / 1.3 as the initial setting, and if necessary, adds a
specific TLS version. However, it is necessary for users to deselect TLS 1.0 /
1.2 in order to use the product safely.
Safe use of Cipher Suites
Through the Cipher Suites of the TLS handshake, the final verification between
the client and the server will be conducted on the method of certificate
verification and asymmetric key exchange, symmetric key encryption and
operation, and message authentication used in TLS. The structure is as
follows.
Hanwha Vision provides Cipher Suites based on TLS 1.2 / 1.3 as follows.
TLS 1.2 Cipher Suites
- POODLE Vulnerability: An abbreviation of Padding Oracle On Downgraded Legacy Encryption, a protocol downgrade vulnerability that allows the use of outdated encryption techniques.
- BEAST Vulnerability: Short for Browser Exploit Against SSL / TLS, a vulnerability that can decrypt HTTPS cookies in an end-user browser and hijack an effective target session.4. Protective Level
TLS 1.3 Cipher Suites
TLS_AES_128_GCM_SHA256 | 0x13,0x01 | TLS_AES_128_GCM_SHA256 |
---|---|---|
TLS_AES_256_GCM_SHA384 | 0x13,0x02 | TLS_AES_256_GCM_SHA384 |
TLS_CHACHA20_POLY1305_SHA256 | 0x13,0x03 | TLS_CHACHA20_POLY1305_SHA256 |
TLS_AES_128_CCM_SHA256 | 0x13,0x04 | TLS_AES_128_CCM_SHA256 |
TLS_AES_128_CCM_8_SHA256 | 0x13,0x05 | TLS_AES_128_CCM_8_SHA256 |
Disabling unused audio input
Audio-In is a function that allows you to input sound into the video. If you
think the service is unnecessary, make sure to deselect the service feature
for added security. Audio Input (Audio-In) function can be set individually
for each video profile, so it is necessary to select each profile than set up.
- IP camera setup → Video Profile
- Chose video profiles and uncheck ‘Audio-In’.
- Click ‘Apply’.
Disabling unused MQTT
MQTT (Message Queueing Telemetry Transport) is a publish-subscribe based
message transmitting and receiving protocol that allows cameras to easily send
and receive data to and from multiple devices instead of just one. If you
think the service is unnecessary, uncheck the setting of the service function
to enhance security.
- IP camera setup → Event
- Chose MQTT and uncheck ‘Enable MQTT’.
- Click ‘Apply’.
Secure Level **
**
Hanwha Vision can be attacked from outside if unnecessary services or ports
that are not actually used are open, so users can improve security by
disabling functions or services that they do not need.
< Table 5 >
Security
Policy
| Features for Cyber Security| Brief Description
---|---|---
–
| Check and update the latest version firmware| Make sure you are using the
latest version of firmware and update if it is a
Vulnerable firmware
–| Setting the correct date / time| Set accurate date and time for log
analysis
–| Using a secure communication
protocol (RTSP)
| Protection of video transmitted through
RTSP
–| HTTPS (Device certificate)| Secure connection between device and
client through certificate
–| HTTPS (User certificate)
–| Change default port| Preventing web service access attacks
through port changes
Access control| IP filtering| Prevent access attacks through specific
IP access permission / deny
–| E-mail transmission using TLS| Secure email transmission using TLS
Service protection| Using SNMP securely| Clear all SNMP initial values for
enhanced security
Using MQTT securely| Disabling MQTT for enhanced security
–| Changing the administrator account/ Creating additional user accounts|
Change the admin account and use it, For frequently used functions, security
is enhanced by creating a user account
with minimal privileges when necessary.
Log| Check log| Analysis of unauthorized access records
Protect stored
data
| Encryption of stored data (LUKS
encryption)| Protection of stored data
Protect backup
data
| Backup data encryption (ZIP file
encryption)
| Protection of backup data
Checking the version of firmware and updating
Through the Hanwha Vision website
(www.hanwhavision.com), you can check the
latest firmware version of products used by customers.
In the figure below, if the customer uses the XND-9082RV model, the latest
firmware version currently deployed is 2.22.00, and if you click the Info
button, you can see that it is the version released on February 16th, 2023.
In addition, you can check the version information related to SUNAPI, ONVIF,
UWA, ISP, Open platform. To upgrade the software, download the firmware for
the product from the Hanwha Vision website, and click the Upgrade button to
upgrade. Software downgrade may not reflect the latest security patch, so
please check to ensure that the firmware version of the product you are
currently using is always up to date.
- www.hanwhavision.com→ Product → Detail page of product → Firmware
- System → Upgrade/Reboot → Upgrade
- Check the current S/W and ISP version.
- Click ‘Browse’ and open the latest firmware
- Click ‘Upgrade’
You can check the firmware information of the camera in the recorder and SSM as well, and you can upgrade to the latest firmware.
< Recorder>
< SSM >
Setting the correct date & time
Date & Time setup is a precondition for checking the accurate time information
of log when analyzing information such as system log from device. It is very
important to set correct time of current system. If the current system time is
not set properly, the user can set the system time by one of three methods
below.
- IP camera setup → Basic → Date & Time
- Chose your time zone and check ‘Use daylight saving time’ if needed.
- Click ‘Apply’ of Time zone setup.
- Set the system time by on of below methods.
- Manual: Set the current time manually
- Synchronize with PC viewer: Set the current time by the time of your PC
- Synchronize with NTP server: Synchronized with the time of the NTP server
- Click ‘Apply’ of System time setup.
Using a secure communication protocol (HTTP)
Hanwha Vision’s IP cameras and NVR devices provide HTTP + HTTPS mode between
the server and client as the initial setting. However, since the HTTPS setting
mode is a mode set on the web viewer, video data, user passwords and IDs
transmitted and received on the web viewer can be protected. In addition, if
the user changes to HTTP mode, the Digest authentication method is applied, so
the user password can be protected.
< Table 6>
Connection mode| User password
protection
| Video data
protection
| Use
---|---|---|---
HTTP
(Digest authentication)
| ○| Ⅹ| HTTPS simultaneous
support
HTTPS| ○| ○*| Use (initial setting)
Using a secure communication protocol (RTSP)
In addition to HTTPS mode, video streaming via RTSP must also be secured. In
order to protect the video through RTSP, additional setup is required to
tunnel RTSP to HTTPS at the client end. For example, if you want to protect
the video transmitted from the IP camera to the NVR with HTTPS, first set the
HTTPS mode in the IP camera’s web viewer. After connecting the camera to the
NVR, set it to RTSP mode through Set UI or the NVR’s web viewer.
Settings (NVR Web Viewer):
Device → Camera → Camera Registration → Channel Selection → Camera
Modification
HTTPS (Device certificate)
The initial secure connection method supports HTTP and HTTPS simultaneously.
The device certificate is a certificate provided by Hanwha Vision, and the
device certificate enables secure connection between the device and the
client. If you select HTTPS (Enable secure connection) and select the device
certificate “HTW_default”, you can use it as a secure connection mode.
- IP camera setup → Network → HTTPS → Secure connection system
- Chose ‘HTTPS (Use a secure connection)’
- Click ‘Apply’.
HTTPS (User certificate)
Instead of using the device certificate provided by Hanwha Vision, customers
can register their own certificate to enable secure connection between the
device and the client. User certificates can be used as a secure connection
mode by selecting HTTPS (Enable secure connection) and selecting a registered
user certificate.
- Network → Certificate management → Add a user certificate (Certificate Info. : Type/Name for the certificate/Certificate file/Key file)
- Click ‘OK’.
- Network → HTTPS → Secure connection system
- Chose ‘HTTPS (Use a secure connection)’ → Chose ‘User certificate’
- Click ‘Apply’.
Changing the default port
In order to avoid scan or attack through the default port of a network device,
it is safe that user’s own port rather than well-known default port. Normally,
change the default port number to a higher port number. For example, if you
change the HTTP web service port to 8000 rather than 80, you can protect your
web service access from attacks that attempt to enter addresses directly into
a simple scanning program or web browser.
- IP camera setup → Basic → IP & Port → Port
- Change the HTTP and HTTPS port number to high number from 80 and 443
- Change the RTSP port number to high number from 554.
- Change the device port number to high number from 4520.
- Click ‘Apply’.
When port number is reassigned, it may cause communication problem if there is a connected recording device or VMS. If not resolved, return to the default port, please.
IP Filtering
Hanwha Vision products support the creation of IP lists to allow or deny
access from specific IP address.
-
IP camera setup → Network → IP filtering → Filtering type
-
Select a filtering type
-
Click ‘Add’ then input an IP address to allow or deny access.
When IP address or prefix is input filtering IP address range will be displayed. -
Click ‘Apply’.
The IP address of pc currently in use to setup cannot be added for deny filtering and only allow filtering is available. If you use IPv6, you must register both the IPv4 and IPv6 addresses.
Sending E-mail using TLS
Hanwha Vision camera supports e-mail transmission of images taken when an
alarm or event occurs. When using this function, TLS mode enables secure email
transmission from camera to mail server.
- IP camera setup → Event → FTP/E-mail → E-mail configuration
- Enter the IP address of the email server to which you want to send alarm and event images.
- Choose ‘on’ for ‘Use authentication’ and ‘Use TLS’.
- Enter the user account ID and password to connect to the email server.
- The default value for an email server port that does not use TLS is 25, but if you use TLS, the port is set to 465.
- Enter the email recipient address in the Recipient field and the email sender address in the Sender field.
- If the sender’s address is not correct, the email server may classify the sender’s email as spam.
- Enter the e-mail subject and contents (Body) and click the ‘Apply’. When sending an email, the alarm and event images are delivered as attachments.
Using SNMP securely
SNMP provides the ability to conveniently manage network devices. By default,
Hanwha Vision is deselected to enhance security. In order to use SNMP safely,
it is recommended to set it only with SNMP v3. If you want to use SNMP v3,
HTTPS setting is a prerequisite, and if HTTPS
(Enable secure connection) in the previous section is already set, 1) to 3) of
the following steps can be omitted.
SNMP v1 and v2c are vulnerable to security and avoid use because SNMP
functions are provided through community strings in plain text.
- Network → HTTPS → Secure connection method
- Select HTTPS (Enable secure connection)
- Click the Apply button
- Network → SNMP
- Uncheck use of SNMP v1 and SNMP v2c
- Select SNMP v3 use and set password (Select v3 after changing HTTPS mode)
Using MQTT securely
MQTT is a feature that allows the camera to transmitting and receiving data to
and from multiple devices. In order to use MQTT securely, it is recommended
that you set up the client to use the TLS transport method.
- Event → MQTT → Client setup
- Set the address, port, username, transport protocol (TLS), custom client ID (check Enabled), client ID, keep alive interval, connection timeout, auto reconnect, clean session, and default topic prefix.
- Click ‘Apply’.
Changing the administrator account & Creating additional user accounts
Accessing and using the device with only the initial administrator account of
“admin” can result in a security vulnerability where the administrator
password is continuously transmitted over the network, exposing sensitive
credentials to someone who is continuously monitoring the network for
malicious purposes. For this reason, it is best to change the administrator
account. Additionally, administrators can grant users administrator
privileges, including frequently used settings functions, which can be
vulnerable and should be minimized to only those users who really need them.
-
Basic → User → Change administrator info → Change ID/Password
-
Click ‘Apply’.
-
Basic → User → Current users
-
Select the account you want to add, and the settings are enabled
-
Check Enable and set a name and password
-
Select whether to enable administrator rights, profile, video, focus, camera, audio input/output, and alarm output.
-
Select a profile then click ‘Apply’ (when set to All, videos from all profiles are available)
Checking the log
Administrators can analyze the logs stored in the system to find traces of
unauthorized access to the device for malicious purposes. It is able to check
various information such as device access, system setting change, event and
etc. Also the log can be used as important data to enhance security of network
system including device itself. The reason why log data should be checked and
analyzed is as follows.
- Any problems that occur in the system (including errors and security flaws) are recorded and become a useful clue.
- It is able to search for errors in the system.
- It can be used to predict potential system problems.
- It can be used as information for recovery in case of trouble.
- It can be used as evidence for infringement.
- Log management is mandated by various laws and guidelines.
For example, if your password entry fails consecutively, your account may be
locked. Access log searches can identify these types of attacks, such as a
large number of login failures or account lockouts.
IP camera setup → System → User → Log
Encryption of stored data (LUKS encryption)
The data encryption function is a function that encrypts data stored in the SD
card so that it cannot be checked even if it is leaked. Since the initial
value is inactive, it is used by activating the corresponding setting when
saving data to the SD card. Password is required for use. Even when changing
the SD card encryption function settings, the set password is required, and if
the password is lost, the SD card must be formatted and used again, so it is
necessary to securely manage the password.
Backup data encryption (ZIP file encryption)
When extracting data stored on the SD card to the outside or recording live
video, the backup file can be set as an AVI or ZIP file. When it is set to
AVI, important information may be exposed because it is not encrypted, but if
it is set as a ZIP file, it can be encrypted to prevent exposure. When
encrypting the ZIP file, a password is required. If the password is not
entered, the ZIP file encryption is not applied.
When recording video on the live screen
When backing up video on the Playback screen
Very Secure Level
Hanwha Vision devices can improve security by linking the security
functions provided by the devices with external security solutions.
< Table 7 >
Security
Policy
| Features for Cyber Security| Brief Description
---|---|---
–| 802.1 X Certificate-based
access control
| Enhanced security environment with port-
based access control settings
802.1 X Certificate-based access control
Setting up port-based access control for network devices connected to network
switches, bridges, wireless access points (APs), etc. enables you to configure
a stronger network security environment. 802.1x supported by Hanwha Vision
cameras uses the standard method EAP-TLS, which requires a certificate. If you
want to use this feature, you need a network switch (or bridge, wireless AP,
etc.) that supports 802.1x, an 802.1x authentication server, and a device-
specific certificate and private key. You can install the certificate from the
‘Certificate management’ page.
-
Network → 802.1x → IEEE 802.1x setting
-
Check ‘Use’ and select ‘EAP-TLS’ for EAP type.
-
Select 1 or 2 for EAPOL version.
-
Input the ID and password of client certificate.
※ If you are using an unencrypted private key file, you do not need to enter it. -
Select the CA certificate published by the authentication server and the installed client certificate.
※ Client certificate and private key is used for TLS communication between RADIUS server and client device. -
Click ‘Apply’.
References
- Hanwha Vision - Global Vision Solution Provider
- Hanwha Vision - Global Vision Solution Provider
- Hanwha Vision - Global Vision Solution Provider
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>