AXIS Network Switches Hardening User Manual
- June 3, 2024
- AXIS
Table of Contents
AXIS Network Switches Hardening
Introduction
-
Axis Communications strives to apply cybersecurity best practices in the design, development, and testing of our devices to minimize the risk of flaws that could be exploited in an attack. However, securing a network, its devices, and the services it supports requires active participation by the entire vendor supply chain, as well as the end-user organization. A secure environment depends on its users, processes, and technology. The purpose of this guide is to support you in securing your network, devices, and services.
-
From an IT/network perspective, the Axis switch is a network device like any other. Unlike a laptop computer, however, a network switch does not have users visiting potentially harmful websites, opening malicious email attachments, or installing untrusted applications. Nevertheless, a network switch is a device with an interface that may expose risks to the system it is connected to. This guide focuses on reducing the exposure to these risks.
-
The guide provides technical advice for anyone involved in deploying Axis solutions. It establishes a baseline configuration as well as a hardening guide that deals with the evolving threat landscape. You may need the product’s user manual to learn how to configure specific settings.
Web interface configuration -
The guide refers to modifying device settings within the web interface of the Axis device according to the following instructions:
- Web interface configuration path
- Advanced > Security
-
Changelog
Date and time | Version | Changes |
---|---|---|
September 2022 | 1.0 | Initial version |
-
Scope
The hardening instructions outlined in this guide are written for, and can be applied to, Axis managed switches that are manageable via web interface or SSH console, such as the AXIS T85 PoE+ Network Switch Series. Depending on the device, some functions might not be applicable or available. -
Security notifications
It is recommended to subscribe to Axis Security Notification Service to receive information about newly discovered vulnerabilities in Axis products, solutions and services and other security-related technical information that contribute to operating Axis devices
in a secure manner. -
CIS protection levels
As a means of structuring our recommendations in the context of a cybersecurity framework, Axis has chosen to follow the methods outlined in Center for Internet Safety (CIS) Controls – Version 8. The CIS controls, previously known as SANS Top 20 Critical Security Controls, provide 18 categories of Critical Security Controls (CSC) focused on addressing the most common cybersecurity risk categories in an organization.
This guide refers to the Critical Security Controls by adding the CSC number (CSC #) for each hardening item. For more information on the CSC categories, see https://www.cisecurity.org/controls/cis-controls-list.
Default protection
Axis devices are delivered with predefined default protection settings. There are several security controls that you do not need to configure. These controls allow for basic device protection and serve as the fundament for more extended hardening.
Credentialed access
An Axis network switch will be able to operate out-of-the box using its
default settings. Access to administrative functions can however only be
reached using the automatic randomly generated password located on the product
label on the bottom of the Axis switch. During first setup, the user will need
to change the password during first access. For more information, see Set
device root password on page 5 .
Network protocols
CSC #4: Secure Configuration of Enterprise Assets and Software Only a minimum
number of network protocols and services are enabled by default in Axis
network switches. In the table below you can see which these are.
Protocol | Port | Transport | Comments |
---|---|---|---|
HTTP | 80 | TCP | General HTTP traffic such as web interface access or VAPIX. |
HTTPS | 443 | TCP | General HTTP traffic such as web interface access or VAPIX. |
NTP | 123 | UDP | Used by the Axis device for time synchronization with a NTP |
server.
SSDP/ UPnP| 1900| UDP| Used by 3rd party applications to discover the Axis
device via UPnP discovery protocol.
Bonjour| 5353| UDP| Used by 3rd party applications to discover the Axis device
via mDNS discovery protocol (Bonjour).
It is recommended to disable unused network protocols and services whenever possible.
HTTPS enabled
CSC #3: Data Protection
HTTPS is enabled by default with a self-signed certificate. This enables
setting the device password in a secure way.
Decommissioning
CSC #3: Data Protection
Default protection
When decommissioning an Axis device, a factory default should be executed.
After the factory default, all settings applied by the customer are erased.
Axis devices use both volatile and non-volatile memory, and while the volatile
memory is erased when removing the power, information stored in the non-
volatile memory remains and is made available again at start-up. To securely
delete persistent, sensitive data on the device, a factory default needs to be
performed.
Basic hardening
The basic hardening is the minimum level of protection recommended for Axis
devices. The below listed hardening items are
“configurable on the edge”, meaning they can be directly configured in the
Axis device without having further dependencies to any 3rd party network
infrastructure, video or evidence management systems (VMS, EMS), or other 3rd
party equipment or application.
Factory default settings
CSC #4: Secure Configuration of Enterprise Assets and Software Before
starting, make sure that the device is in a known factory default state. The
factory default is important when decommissioning devices as well as clearing
user-data.
- Web interface configuration path
- Advanced > Maintenance > Factory Defaults
Upgrade to latest firmware
CSC #2: Inventory and Control of Software Assets
Patching software and firmware is an important aspect of cybersecurity. An
attacker will often try to exploit commonly known vulnerabilities, and if they
gain network access to an unpatched service, they may succeed. Make sure you
always use the latest firmware since it may include security patches for known
vulnerabilities. The release notes for a specific firmware may explicitly
mention a critical security fix, but not all general fixes.
Firmware can be downloaded at https://www.axis.com/support/firmware.
- Web interface configuration path
- Advanced > Maintenance > Firmware > Firmware Upgrade
Set device root password
- CSC #4: Secure Configuration of Enterprise Assets and Software
- CSC #5: Account Management
- The device root account is the main device administration account. During first setup, the user will need to change the password during first access. Make sure to use a strong password and limit the usage of the root account to administration tasks only. It is not recommended to use the root account in daily production.
- When operating Axis devices, using the same password simplifies management but lowers the security in case of breach or data leak. Using unique passwords for each single Axis device provides high security but comes with an increased complexity to device management. Password rotation is recommended.
- It is recommended to implement sufficient password complexity and length, such as NIST password recommendations. Axis switches support passwords up to 31 characters. Passwords shorter than 8 characters are considered weak.
- Web interface configuration path
- Advanced > Security > Configuration > Switch > Users
Create a client account
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #5: Account
Management
The default root account has full privileges and should be reserved for administrative tasks. It is recommended to create a client user account with limited privileges for daily operation (if required). This reduces the risk of compromising the device administrator password.
- Web interface configuration path
- Advanced > Security > Configuration > Switch > Users
Configure network settings
CSC #12: Network Infrastructure Management
The device IP configuration depends on the network configuration, such as
IPv4/IPv6, static or dynamic (DHCP) network address, subnet mask and default
router. It is recommended to review your network topology when adding new
types of components.
It is recommended to use static IP address configuration on Axis devices to
ensure network reachability and disentangle the dependency to e.g., a DHCP
server in the network that might be a target for attacks.
- Web interface configuration path
- Advanced > System > Configuration > IP > IP Interfaces
Correct date and time configuration
CSC #8: Audit Log Management
From a security perspective, it is important that the date and time are
correct so that, for example, the system logs are time-stamped with the right
information, and digital certificates can be validated and used during
runtime. Without proper time-sync, services that rely on digital certificates
such as HTTPS, IEEE 802.1x, and others may not work correctly.
It is recommended that the Axis device clock is synchronized with a Network
Time Protocol (NTP) server, preferably two. For individuals and small
organizations that do not have a local NTP server, a public NTP server may be
used. Check with your internet service provider or use a public NTP server
such as pool.ntp.org.
- Web interface configuration path
- Basic > Date & Time
Configure VLANs
CSC #1: Inventory and Control of Enterprise Assets
CSC #4: Secure Configuration of Enterprise Assets and Software
CSC #13: Network Monitoring and Defense
By the means of VLANs, it is possible to segment the physical network
virtually into several different networks. By breaking up the network into
multiple, distinct, and mutually isolated broadcast domains, the received
network traffic of hosts in the network can be lowered, the network attack
surface can be minimized, and network hosts and resources are bundled
organizationally within one VLAN, without the need of being made available to
the entire physical network. This increases overall network security.
- Web interface configuration path
- Advanced > VLANs
Configure IP source guard
CSC #4: Secure Configuration of Enterprise Assets and Software CSC #13:
Network Monitoring and Defense IP source guard is a feature used to restrict
IP traffic on DHCP snooping untrusted ports by filtering traffic based on the
DHCP snooping table or manually configured IP source bindings. It helps
prevent IP spoofing attacks when a host tries to spoof and use the IP address
of another host.
Example of an IP source guard configuration allowing only one dynamic client
on switch port 1. On switch port 2 only statically configured clients are
allowed.
Example of an IP source guard static table.
- Web interface configuration path
- Advanced > Security > Configuration > Network > IP Source Guard > Configuration
Configure ACLs
CSC #4: Secure Configuration of Enterprise Assets and Software
CSC #13: Network Monitoring and Defense
ACL is an acronym for Access Control List. It is a list containing access
control entries (ACE) which specify individual users or groups permitted or
denied to specific traffic objects, such as a process or a program.
ACL implementations can be quite complex. In networking, the ACL refers to a
list of service ports or network services that are available on a host or
server, each with a list of hosts or servers permitted or denied using the
service. ACL can generally be configured to control inbound traffic, and in
this context, they are like firewalls.
Example of an ACE configuration blocking ICMP traffic on switch port 1.
Example of an ACE configuration blocking all IPv4 traffic on switch port 1 to/from the 10.0.1.0/24 subnet.
- Web interface configuration path
- Advanced > Security > Configuration > Network > ACL > Access Control List
Disable unused services/functions
CSC #4: Secure Configuration of Enterprise Assets and Software
Even though unused services/functions are not an immediate security threat, it
is good practice to disable unused services/functions to reduce unnecessary
risks. Below are some services/functions that could be disabled if not used.
SSH
Access to the network switch via SSH allows for more granular and detailed
configuration than the web interface. It is also used for troubleshooting and
debugging purposes. While being a secure communication protocol, it is
recommended to make sure that the SSH access is disabled when no longer used.
Web interface configuration path
Advanced > Security > Configuration > Switch > Auth Method
Discovery protocols
Discovery protocols, such as Bonjour or UPnP, are support services that make
it easier to find the Axis device and its services on the network. After
deployment, once the Axis device IP address is known, it is recommended to
disable the discovery protocol to stop the Axis device from announcing its
presence on the network.
Web interface configuration path
Advanced > System > Configuration > Information > Bonjour Discovery
Advanced > UPnP
Unused physical network ports
Not all physical network ports might be occupied at all times. It is
recommended to disable unused network ports administratively on the switch
side. Leaving unused network ports unattended and active imposes a severe
security risk.
Web interface configuration path
Advanced > Ports > Configuration
Switch reboot schedule
CSC #2: Inventory and Control of Software Assets
During normal operation, any recurrent scheduled restart of the switch should
not be required since this would also involve disconnection or restart of the
connected devices (if powered by the switch). It is recommended to keep this
option disabled until needed for troubleshooting and debugging purposes only.
Web interface configuration path
Advanced > Maintenance > Reboot Schedule
HTTPS
CSC #3: Data Protection
It is recommended to configure the Axis device for HTTPS only (no HTTP access
possible). While a self-signed certificate is not trusted by design, it is
adequate for secure access to the Axis device during initial configuration and
when no public key infrastructure (PKI) is available at hand. If available,
the self-signed certificate should be removed and replaced with proper signed
client certificates of the PKI-authority of choice.
Web interface configuration path
Advanced > Security > Configuration > Switch > Auth Method
Advanced > Security > Configuration > Switch > HTTPS
Configure ARP inspection
CSC #4: Secure Configuration of Enterprise Assets and Software
CSC #13: Network Monitoring and Defense
Several different types of well-known attacks known as “ARP Cache Poisoning”
can be launched against a host or devices connected to layer 2 networks by
“poisoning” the ARP caches of the network switch. The result of a successful
attack would be a temporary
loss of network hosts and traffic. ARP inspection is used to block such
attacks. Only valid ARP requests and responses can go through the switch
device.
Example of an ARP inspection configuration on switch port 1 and 2.
Web interface configuration path
Advanced > Security > Configuration > Network > ARP Inspection
Configure port security limit control
CSC #4: Secure Configuration of Enterprise Assets and Software
CSC #13: Network Monitoring and Defense
Port security limit control allows for limiting the number of users on a given
port. A user is identified by a MAC address and VLAN ID. If limit control is
enabled on a port, the limit specifies the maximum number of users on the
port. If the number is exceeded, a selected action is taken.
While port security limit control can be enabled through the web interface,
the limit can only be set via the command line interface.
Example of a port security limit control configuration on switch port 1 and 2.
- Web interface configuration path
- Advanced > Security > Configuration > Network > Limit Control
- Command line configuration path
- Configuration Mode > interface GigabitEthernet x/x > port-security maximum x
Extended hardening
The hardening instructions outlined in this section are an extension that build on the default and basic hardening described in previous sections. While the default and basic hardening can be configured and enabled directly in the Axis device, the extended hardening of Axis devices require active participation by the entire vendor supply chain, as well as the end-user organization and the underlying IT- and/or network infrastructure.
-
Limit internet exposure
CSC #12: Network Infrastructure Management
It is not recommended to expose the Axis device as a public web server or public network access of any kind, allowing unknown clients to gain network access to the device. -
Network vulnerability scanning
CSC #1: Inventory and Control of Enterprise Assets
CSC #12: Network Infrastructure Management
It is recommended to perform regular vulnerability assessments of the infrastructure the Axis device is part of as well as of the Axis device itself. These vulnerability assessments are usually performed by network security scanners.
The purpose of a vulnerability assessment is to provide a systematic review of potential security vulnerabilities and misconfigurations. Please make sure that the Axis device being tested is updated to the latest available firmware before starting the scan.
It is recommended to review the scanning report and filter out known false- positives for Axis devices stated here.
The report and remaining remarks that are left should be submitted in a helpdesk ticket to Axis support. -
Trusted public key infrastructure (PKI)
CSC #3: Data Protection
CSC #12: Network Infrastructure Management
It is recommended to deploy web server and client certificates in Axis devices that are trusted and signed by a public or private Certificate Authority (CA) of choice. A CA-signed certificate whose trust chain can be validated helps to remove browser certificate warnings when connecting over HTTPS and ensures the authenticity of the Axis device when deploying a Network Access Control
(NAC) solution. This mitigates the risk of an attacking computer impersonating an Axis device. Note that AXIS Device Manager has a built-in CA service that can be used to issue signed certificates to Axis devices. -
IEEE 802.1x network access control
CSC #6: Access Control Management
CSC #13: Network Monitoring and Defense
Axis devices have support for IEEE 802.1x port-based network access control utilizing the EAP-TLS method. For optimal protection, authentication of Axis devices must utilize client certificates signed by a trusted Certificate Authority (CA) of choice. See the following guideline on how to configure an Axis network switch for IEEE 802.1x. -
Web interface configuration path
- Advanced > Security > Configuration > AAA > RADIUS
- Advanced > Security > Configuration > Network > NAS
-
SMTP monitoring
CSC #8: Audit Log Management
Axis network switches can be configured to send out alarm events through SMTP messages.- Web interface configuration path
- Advanced > SMTP
-
SNMP monitoring
CSC #8: Audit Log Management
Axis devices support the following SNMP protocols:- SNMP v1: supported for legacy reasons only, should not be used.
- SNMP v2c: may be used on a protected network segment.
- SNMP v3: recommended for monitoring purposes.
- Web interface configuration path
- Advanced > Security > Configuration > Switch > SNMP
-
Remote syslog
CSC #8: Audit Log Management
Axis devices can be configured to send all log messages encrypted to a central syslog server. This simplifies audits and prevents log messages from being deleted in the Axis device either intentionally/maliciously or unintentionally. It also allows for extended retention time of device logs depending on company policies.- Web interface configuration path
- Advanced > System > Configuration > Log
Axis Network Switches Hardening Guide © Axis Communications AB, 2022
References
- pool.ntp.org: the internet cluster of ntp servers
- Download device software | Axis Communications
- The 18 CIS Critical Security Controls
Read User Manual Online (PDF format)
Read User Manual Online (PDF format) >>