Hanwha Vision NVR Network Hardening Guide User Guide
- June 12, 2024
- Hanwha Vision
Table of Contents
Hanwha Vision NVR Network Hardening Guide User Guide
@ 2023 HanuJha Vision Co., Ltd. All rights reserved.
Revision History
1. Introduction
In the video surveillance market, a paradox is emerging that network surveillance devices developed to protect customers’ property and personal information in recent years are used as a means of seizing personal information. Network surveillance device processes and manages video data that can be used as sensitive personal information. Since it is based on the network, remote access is possible from anywhere in the world where the network is connected. Because of this nature, network surveillance device is subject to ongoing cyber-attacks.
Hanwha Vision has been continuously making efforts to strengthen cyber security with a careful consideration of customers’ property and personal information. We hope that this guide will help you understand and safely use the security features implemented in Hanwha Vision product.
2. Definition of Security Levels
This guide defines cyber security levels according to the following criteria, each level assuming the previous level is achieved.
- The default level is the level of security that users can achieve with the functionality provided by the device, without any extra settings.
- The protective level means the level of security that can be achieved with the default settings that initial purchased products have or in the state immediately after the factory initialization.
- The secure level is a level of security that user can achieve by disabling unnecessary features or services that product provided.
- The very secure level means the level of security that can be achieved by combining the security features provided by products with additional external security solutions.
< Table 1 >
• If the initial setting value is set to ‘Default’, it means that it is provided as default, not as a users electable option. If it is a dash, it means that there is no user-selectable option and it is the activity to check / execute.
3. Default Level
Hanwha Vision develops products to ensure safety from cyber security threats
even with basic functions and initial settings.
< Table 2>
3.1. Forced complex password setting
Hanwha Vision products require min. 8 character password. Depending on the
length of the password, three (8 to 9 characters) or two (10 or more)
combination of letters (upper/lower case, numbers and special characters). Up
to 15 characters for NVR/DVR/IP camera and up to 31 characters for VMS. This
enforcement helps to reduce the possibility of unauthorized password hijacking
by preventing the weak password setting due to user’s carelessness.
3.2. No initial password
If a user uses the initial password or can not change the manufacture’s
default password, it could cause a serious security vulnerability that would
allow unauthorized access. To prevent any security vulnerability that may
occur due to user’s mistake, all Hanwha Vision products have no initial
password and designed to set user’s own password when accessing the UI of the
product for the first time.
3.3. Input limit for consecutive password failures
Hackers systematically check all possible passwords and passphrases until the
correct one is found. If this attack is allowed, the password will out some
time. Hanwha Vision devices block brute-force attack by not allowing 5 times
or more login attempt within 30 seconds to improve its security. Also,
existing connection of authorized user’s is maintained to prevent denial-of-
service while password input is blocked.
3.4. Remote service (Telnet, SSH) not used
Daemons that support remote services such as Telnet on a network device can
give manufacturers the advantage of conveniently providing A / S to their
customers, but if there are manufacturers with hackers or malicious
intentions, It can be a factor that can cause dangerous security incidents.
Accordingly, Hanwha Vision ‘s products gave up the convenience of A / S and
adopted a policy to boldly eliminate these risks to improve the security
level.
3.5. Preference information encryption
If you use the Back up(Export) function, you can download the file containing
the current device’s environment setting information to your PC, and restore
the backed up environment setting information through the Import function.
If you use these functions, you can set the same environment for all devices with the same model name with only one device setting. Since the file containing the backed up configuration information contains important information of the user’s device environment, Hanwha Vision stores the configuration information using a secure encryption algorithm when back up.
3.6. Firmware encryption and secure update
Hanwha Vision’s products provide encrypted firmware through the homepage of
Hanwha Vision when providing firmware for adding functions / improving bugs
and updating security. In addition, when the firmware is updated, the forged
firmware is identified and the integrity can be verified and the update can be
completed after verifying the integrity. This prevents hackers from analyzing
important information contained in the firmware, and after injecting malicious
code through forgery of the firmware, it can take control of the device and
prevent it from being used as another attacking bot. The firmware contains a
lot of important information that can be exploited by hackers. Hanwha Vision’s
products distribute firmware with confidentiality and integrity for the
security and secure update of these firmware.
3.7. Watermarking and encryption of extracted video formats
Video files extracted in SEC file format using Hanwha Vision’s NVR cannot be
opened with general playback/editing software. This prevents indiscriminate
exposure of the video, and also enables detection of video tampering by
applying watermarking. By default, the player required for playback is
automatically extracted from the SEC file, so there is no need to install a
separate player, and the user can simply play the video file by double-
clicking the SEC file. In addition, the SEC file format can check whether the
video file has been tampered with for legal evidence or privacy purposes and
ensure confidentiality.
3.8. Maintained logs after factory reset
It is very important for network or security administrators to check the log
to analyze the intrusion path or to understand the incident when someone
intrudes or attempts to break into a network device. However, because
intruders are aware of the logs of these network devices, they want to delete
logs so that they do not leave their marks or traces. Hanwha Vision’s product
is developed to retain log files from being erased by device initialization
(factory reset) to prevent such malicious intent.
3.9. HTML5 non plug-in web viewer
Most video surveillance devices provide web viewer video streaming service
using the plug-in (ActiveX, Silverlight, NPAPI) installed into a web browser.
However, such plug-in have high possibility of security vulnerabilities and
exposures. Recently, malicious code infections are frequently caused by the
security vulnerabilities in effect. As a result, the most of browsers have
blocked plug-in installation and execution, and standardization is underway to
provide services through HTML5 (HTML latest standards), which can provide
media service without plug-in.
In response to this trend and security requirements, Hanwha Vision has strengthened security and user convenience by providing HTML5 web viewer service that can provide optimal video service without plug-in.
3.10. Individual device authentication
(Device/mutual authentication (server authentication/client authentication))
The network devices provided by Hanwha Vision are equipped with device identification and mutual authentication functions using device certificates during encrypted communication. This allows you to verify whether the device is a trusted device manufactured by Hanwha Vision and enhances security by preventing hackers from arbitrarily overhearing or manipulating security communications through man-in-the-middle attacks. In other words, when connected to a camera manufactured by Hanwha Vision, the storage device performs encrypted communication with the camera and verifies the device as a trusted device as follows.
device authentication(NVR) – Available in sets
: After connecting the set, check the device certificate icon on the Live
screen
In addition, we have distributed/guided the “Hanwha Vision’s Private Root CA certificate preinstallation guide” to apply device authentication to web viewer (web browser) connections instead of connections between our devices.
The installation guide can be found on our homepage.
– Hanwha Vision Private Root CA Certificate Pre-installation Guide
(https://www.hanwhavision.com/ko/support/cybersecurity/)
4. Protective Level
Hanwha Vision devices are safe for basic security even with the initial settings immediately after purchase or factory reset.
4.1. Perform Factory Reset
If the device you want to set up is not in the initial state, it is need to
perform a factory reset of the device to initialize the device’s settings.
Hanwha Vision product can achieve the protective level of security with the
initial state alone.
• Setup(NVR)
-
System → System Management → Settings
-
Uncheck User/Camera/Network
(If you check the corresponding function, the setting value of the item is maintained and the system setting is initialized) -
Initialization button click
4.2 Disabling unused multicast
As a function to specify the use of multicast, you can set the RTSP protocol.
The default setting for this service is disabled. If you don’t need that
service, we recommend keeping it disabled for added security.
• Setup(NVR)
- Setup → Network → Port → Multicast IP Address
- Maintained Multicast IP Address disable
4.3. Disabling unused DDNS
If your storage device is directly connected to a DHCP-enabled cable modem,
xDSL modem, or PPPoE modem, the IP address will change every time you try to
connect to your ISP. In this case, the user is not aware of the changed IP
address, but by pre-registering the ID of the product through the DDNS
function, the user can easily access the changed IP address. In addition, the
Quick Connect (UPnP) function is a service that automatically discovers and
connects to the device. If you think the DDNS and Quick Connect (UPnP)
services are unnecessary, you can uncheck the settings for the service
features for added security.
4.4. Disable unused SNMP
Hanwha Vision’s devices support SNMP v1, v2c and v3 functions simultaneously.
If you think the SNMP service is unnecessary, uncheck the setting of the
service function to enhance security.
• Setup(NVR Webviewer)
- Network → SNMP
- Disable SNMP v1, v2c and v3
4.5. Disable audio function
The audio use function is a function that allows you to input sound into the
video. If you feel that the service is unnecessary, you should turn off the
service function to enhance security. Since the audio use function can be set
individually for each channel recording file, it is necessary to select and
disable each recording file that has already been set.
• Setup(NVR Webviewer)
- Setup → Record → Record Settings
- After selecting each set recording file, select Disable Audio
- Click OK button
5. Secure Level
Hanwha Vision can be attacked from outside if unnecessary services or ports that are not actually used are open, so users can improve security by disabling functions or services that they do not need.
< Table 5 >
5.1. Checking the version of firmware and updating
Through the Hanwha Vision homepage (www.hanwhavision.com), Users can check the
latest firmware version of the product. The current firmware version, MAC
address, UWA version, and open source notice of the product can be found in
the product information as shown in the figure below. To ensure that the
firmware version of your product is always up to date and to upgrade the
software, download the firmware of your product from Hanwha Vision’s website
and click the Upgrade button to proceed with the upgrade.
• www.hanwhavision.com→ Product → Detail page of product → Firmware
• Setup(NVR Web viewer)
- Setup → System → System management → Product Information
- Check the current S/W version.
- Offline upgrade → Click ‘Browse’ and open the latest firmware
- Click ‘Upgrade’
5.2. Setting the correct date & time
Date & Time setup is a precondition for checking the accurate time information
of log when analyzing information such as system log from device. It is very
important to set correct time of current system. If the current system time is
not set properly, the user can set the system time by one of three methods
below.
• Setup(NVR Web viewer)
-
Setup → System → Date/Time/Language
-
Set the time zone for your location, which is based on Universal Time (GMT).
(The Use Daylight Saving Time (DST) option appears only when you select a region that uses DST in its time zone, and you select it if it applies. If selected and applied, it will be set to one hour ahead of your region’s standard time) -
Select Edit to set the time to be applied to the system
-
Set the time synchronization
-
Click the OK button for the system time settings
5.3. Using a secure communication protocol (HTTPS)
Hanwha Vision’s NVR provides HTTP+HTTPS mode between server and client as the
initial setting. Both HTTP/HTTPS apply digest authentication method, so user
passwords can be protected during communication, and important information
transmitted and received through HTTPS mode is protected by encrypted
communication.
5.4. Using a secure communication protocol (RTSP)
In addition to HTTPS mode, video streams transmitted over RTSP must also be
secured. Securing video over RTSP requires additional configuration on the
client side to tunnel RTSP to HTTPS.
For example, if you want to secure video streaming from an IP camera to an NVR with HTTPS, first set the IP camera to HTTPS mode on the IP camera’s web viewer, then connect the camera to the NVR and set the RTSP protocol and HTTPS streaming method through the Set UI or NVR’s web viewer.
• Settings (NVR Web Viewer)
- Setup → Camera → Camera setup → Select camera → Manual registration
- Protocol: RTSP
- Details → Streaming mode: HTTPS
5.5. HTTPS (using private certificate)
The initial secure connection method supports both HTTP and HTTPS. HTTPS (Use
own certificate) is a feature that enables secure connection between the
device and the client using the own certificate provided by Hanwha Vision.
When HTTPS (Use own certificate) is selected, the device’s own certificate is
used in the secure connection mode, and the user does not need to register a
separate certificate.
• Settings (NVR Web Viewer)
- Setup → Network → HTTPS → Secure connection system
- Chose ‘HTTPS (Secure connection mode using a unique certificate)’
- Click ‘Apply’.
5.6. HTTPS (using public certificate)
This feature allows users to register their own public certificate to enable
secure connection between the device and the client without using their own
certificate provided by Hanwha Vision.
If you register a public certificate and private key through public certificate installation, you can select HTTPS (using a public certificate), and the registered public certificate and private key will be used in secure connection mode.
• Settings (NVR Web Viewer)
- Setup → Network → HTTPS → Install a public certificate
- Enter a certificate name and specify the public certificate to use for the certificate file
- Specify the private key to be used in the key file and click the Install button
- Select HTTPS (Use public certificate) and click Apply button
※ HTTPS (Use public certificate) can be selected only if there is a registered
public certificate.
※ If you want to delete the registered public certificate and private key,
click the Delete button. You can delete a public certificate only when you
connect to HTTP (Disable secure connection) or HTTPS (Use own certificate).
5.7. Changing the default port
To prevent scanning or attacks through the default ports of network devices,
it is generally safer to have users redirect ports rather than use well-known
ports. Consider changing the commonly provided default port number to a higher
port number. For example, changing the HTTP web service port accessible
through a web browser to 8000 instead of 80 can protect web service access
from simple scanning programs or attacks that involve typing the address
directly into the web browser.
• Settings (NVR Web Viewer)
- Setup → Network → IP & Port
- Change the HTTP and HTTPS port number to high number from 80 and 443
- Change the RTSP port number to high number from 558.
- Click ‘Apply’.
• When port number is reassigned, it may cause communication problem if there is a connected recording device or VMS. If not resolved, return to the default port, please.
5.8. IP Filtering
Hanwha Vision products support the creation of IP lists to allow or deny
access from specific IP address.
• Settings (NVR Web Viewer)
- Setup → Network → IP filtering
- Select a filtering type
– Deny registered IP: Block access from IPs registered with the filtering
– Allow registered IP: Allow access only to IPs registered for filtering - Input the IP Address
- Enter the IP addresses and prefixes you want to restrict or allow, and the Filtering range item on the right displays the range of IP addresses blocked or allowed.
- Click Apply button after completing the settings
• If you select Allow in IP Filtering and Enable IPv6, you need to register both IPv4 and IPv6 addresses of the PC you are setting up. The IP of the PC you are setting up cannot be registered as restricted, but must be registered as allowed, and only the IPs you set up can be accessed after that.
5.9. Using SNMP securely
SNMP provides a convenient way to manage network devices. By default, Hanwha
Vision has all options unchecked for enhanced security. To use SNMP securely,
it is recommended to set it to SNMP v3 only.
SNMP v1 and v2c are insecure because SNMP functions are provided through the
default community string by default, but users can change the community string
to use them. If you use SNMP v1 and v2c, we recommend that you change the
community string to use it.
• Settings (NVR Web Viewer)
- Setup → Network → SNMP
- Uncheck use of SNMP v1 and SNMP v2c
- Select SNMP v3 use and set password
5.10. Changing the administrator account & Creating additional user
accounts
Accessing and using the device with only the initial administrator account of
“admin” can result in a security vulnerability where the administrator
password is continuously transmitted over the network, exposing sensitive
credentials to someone who is continuously monitoring the network for
malicious purposes. For this reason, it is best to change the administrator
account.
Additionally, administrators can grant users administrator privileges, including frequently used settings functions, which can be vulnerable and should be minimized to only those users who really need them.
• Settings (NVR Web Viewer)
-
Setup → System → User → Administrator → Change ID/Password
-
Click ‘Apply’.
-
Setup → System → User → Add to Group/User
-
Set permissions for the user group
5.11. Restriction settings
Set Restrictions is a service that allows you to set user access to features
or network access.
Feature restrictions can set which features to restrict a user’s access to,
and viewer usage restrictions can restrict a user’s remote access.
When you set a check to a feature restriction item, permissions are limited to the checked items set on the Users tab screen. However, you can grant additional feature permissions for specific users. Unchecking a Feature Restrictions item allows access to the checkboxes set on the Users tab screen.
If you set a check to All viewers in Restrict viewer usage, all users will not be able to access the network and the web viewer, and if you set a check to Web viewer, all users will not be able to access the web viewer. The Auto logout setting can increase security by allowing users to be automatically logged out after a period of inactivity on the storage device.
5.12. Checking the log
Administrators can analyze the logs stored in the system to find traces of
unauthorized access to the device for malicious purposes. It is able to check
various information such as device access, system setting change, event and
etc. Also the log can be used as important data to enhance security of network
system including device itself. The reason why log data should be checked and
analyzed is as follows.
‧ Any problems that occur in the system (including errors and security flaws) are recorded and become a useful clue.
‧It is able to search for errors in the system.
‧It can be used to predict potential system problems.
‧It can be used as information for recovery in case of trouble.
‧It can be used as evidence for infringement.
‧Log management is mandated by various laws and guidelines.
• Settings (NVR Web Viewer)
Setup → System → Log → System log/Event log/Export log
6. Very Secure Level
Hanwha Vision devices can improve security by linking the security functions provided by the devices with external security solutions.
< Table 6 >
6.1. 802.1 X Certificate-based access control
Setting up port-based access control for network devices connected to network
switches, bridges, wireless access points (APs), etc. enables you to configure
a stronger network security environment. 802.1x supported by Hanwha Vision
cameras uses the standard method EAPTLS, which requires a certificate. If you
want to use this feature, you need a network switch (or bridge, wireless AP,
etc.) that supports 802.1x, an 802.1x authentication server, and a
devicespecific certificate and private key. You can install the certificate
from the ‘Certificate management’ page.
• Settings (NVR Web Viewer)
-
Setup → Network → 802.1x
-
Check Network 1 (Camera) or Network 2 (All)
※ Network 1 (Camera): Set up by connecting directly to the camera/Network 2 (All): Connect to a network using a router -
Select 1 or 2 for EAPOL version.
-
Input the ID and password of client certificate.
※ If you are using an unencrypted private key file, you do not need to enter it. -
Select the CA certificate published by the authentication server and the installed client certificate.
※ Client certificate and private key is used for TLS communication between RADIUS server and client device. -
Click ‘Apply’.
HEAD OFFICE
6, Pangyo-ro 319beon-gil, Bundang-gu, Seongnam-si, Gyeonggi-do, 13488, South
KOREA
TEL +82.1588.5772 www.Hanwha-Security.com
@2023 Hanwha Vision Co., Ltd. All rights reserved.
Read More About This Manual & Download PDF:
References
- Hanwha Vision - Global Vision Solution Provider
- Hanwha Vision - Global Vision Solution Provider
- 한화비전 - 글로벌 비전 솔루션 프로바이더
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>