Paxton AN1166-ZA Net2 Network Security Recommendations User Guide

June 3, 2024
Paxton

Paxton-AN1166-ZA-Net2-Network-Security-Recommendations-
logo

Paxton AN1166-ZA Net2 Network Security Recommendations

Net2 – Network Security Recommendations

Overview

In order for your Paxton Net2 system to be as secure as it can be on your site, Paxton recommends that the installer (or IT department) implement IT security mechanisms best practice at each of the 7 layers of Network Open Systems Interconnection (OSI) model.Paxton-AN1166-ZA-Net2-Network-Security-
Recommendations-01

Implement strong physical security

Implement strong physical security to company premises such as by using Biometrics, token-based authentication, etc. so that an outsider can be stopped before he/she can enter a building with a corporate network.

Implement Network Access Control standards such as IEEE 802.1X authentication for securing LAN and WLAN
This standard enforces security policy by granting only security policy–compliant devices access to network assets when those devices are plugged into a physical LAN port or are connected to a WLAN SSID. This standard not only handles access authentication and authorization functions but even control the data accessed by those specific users by recognizing users, their devices and their network roles. IEE 802.1X is natively supported by all Windows, Mac and Linux machines.

Implement next generation Firewalls to prevent external and internal attacks
Implement a next generation firewall which, in addition to traditional packet based tasteful inspection, also performs application layer inspection, intrusion prevention and detection, securing web traffic, etc.
Furthermore, stretch any potentially insecure internal layer 2 VLANs to the firewall and protect access from those VLANs to other trusted/secure VLANs using configurable security policies.
Implement VLANs (Virtual Local Area Networks) for network security and segregation
VLANs allow us to keep data packets from multiple networks (such as departmental networks, critical server networks, etc.) separated. Network segmentation with VLANs creates a collection of isolated networks within a corporate network and reduces the attack surfaces because even if an outsider gets access to a small logical network, he/she won’t be able to view or directly attack devices on other VLANs.
Implement strong passwords for Net2 Server application authentication and associated databases.
Please see application note AN1162 for details on how to achieve this.

Have a dedicated machine for Net2 Server

Have a machine dedicated to running Net2 server and not install other software other than network monitoring tools if required.
The physical Net2 server machine should be restricted to authorized personnel only.

Machine safety

Keep server and client machines updated with latest OS critical updates and ensure virus scanning protection on client machines.
Net2 clients should be installed on machines without email/chat clients to avoid non-intentional malicious code execution via attachments.

Net2 secure mode
For maximum security consider running both the server and client software from the same machine and blocking the TCP SQL server port 1433 for inbound connections. This can be achieved by activating ‘secure mode’ using the Net2 security tab.

If you require client access, away from the server machine, this can be achieved by using our Net2Online service. This will allow management of users, access and event administration. Site commissioning can only be performed from the server machine.
Alternatively for full use of all client features, use virtualized application software such as VMware horizon to distribute restricted Net2 client applications connected to a Net2 server on a separate LAN or VLAN.
To allow tokens to be enrolled simply use an existing reader or a reader connected to a wireless Net2 Nano if network cabling not viable. This solution will also allow SDK (Software Development Kit) and Video applications to be isolated in the virtualized desktop and deployed easily, fully administered within the data center.

What is VMware Horizon? | VDI Software | VMware | UK
Note: VMware horizon does have USB passthrough, but performance is dictated by network speeds and requires testing. This could allow standard desktop reader and webcam use.

Additional Security Steps

  1. Implement MAC address filtering on the switch Implement MAC address filtering on the Entry port. When an unrecognized device connects to a port, the port will be disabled and an alert sent.
  2. Isolate the VLAN
    Place all the Paxton devices with IP capability on a dedicated VLAN. Isolate this VLAN from the company network to restrict access into areas other than the access control devices.

Read User Manual Online (PDF format)

Read User Manual Online (PDF format)  >>

Download This Manual (PDF format)

Download this manual  >>

Related Manuals