Improving Security For Axis Products: Technical Note
Improving Security For Axis Products: Technical Note
REFERENCE DOCUMENT
Rev: 1.1
Technical Note Axis Communications Improving Security for Axis Video Products
TABLE OF CONTENTS
1 INTRODUCTION 3
1 Introduction
This technical note provides the following security information to assist you in reducing
the risk of unauthorized access to your Axis products:
• Best-practice security policies
• General security features of Axis products
• Wireless network security
It is also a good idea to routinely check the support page for your Axis product for
information about firmware releases that contain the latest security updates.
Using the security features of network video products should also be seen in a wider
scope. This includes the definition of procedures as to how and by whom the
surveillance system should be used, and what physical protection of the surveillance
system is to be used. And, most importantly, it is vital to constantly monitor the
effectiveness of these procedures.
3.3 HTTPS
Enable HTTPS to protect your Axis product from eavesdroppers and man-in-the-middle
attacks. Hyper Text Transfer Protocol Secure (HTTPS) is the most common data
encryption protocol used in applications like online banking to provide the requisite
security for financial transactions performed over the Internet. HTTPS is identical to
HTTP, but with one key difference: the data transferred is encrypted using Secure
Socket Layer (SSL) or Transport Layer Security (TLS). A higher level of privacy is
achieved through encrypting data rather than the transport. Follow the instructions
under System Options > HTTPS.
We recommend that for protection against man-in-the-middle attacks, that you create a
request for a certificate from a Certificate Authority (CA) System Options > HTTPS >
Create & Install > Create Certificate Request....
A self-signed certificate can be used until a Certificate Authority-issued certificate has
been obtained. Click the Create self-signed Certificate button to install a self-signed
certificate. Although self-signed certificates are free and offer some protection, true
security will only be implemented after the installation of a signed certificate issued by
a certificate authority.
A signed certificate can be obtained from an issuing Certificate Authority by clicking
the Create Certificate Request button. When the signed certificate is returned, click
the Install signed certificate button to import the certificate. The properties of any
certificate request currently resident in the camera or installed can also be viewed by
clicking the Properties... button. The HTTPS Connection Policy must also be set in the
drop-down lists to enable HTTPS in the camera. Additional setup information is also
available from the product’s online help pages.
passphrase, using 25 to 63 ASCII characters. The access point keeps out unauthorized
users by requiring the key for communication.
4.3.2.1 Certificates
The client and server authenticate each other using digital certificates provided by a
Certificate Authority. To gain access to the protected network, your wireless Axis
product t presents its certificate to the network switch. If the certificate is approved, the
switch allows access. You may need to contact your network administrator for
information on certificates, user IDs and passwords. See 3.3 for more information about
certificates.