![]() When decommissioning an Axis device, a factory default should be performed. In Axis intercoms and network speakers on the other hand, where audio in/out and microphone functionality are main features, audio capabilities are enabled by default. įor instance, audio in/out and microphone functionality are disabled by default and must be enabled before use in Axis video surveillance-oriented products, such as the network cameras. For a complete list of services that are used by default or can be enabled based on configuration, see. It is recommended to disable unused network protocols and services whenever possible. * Allocated automatically within a predefined range of port numbers according to RFC 6056. Used by 3rd party applications to discover the Axis device via WS-Discovery protocol (ONVIF) Used by 3rd party applications to discover the Axis device via SSDP (UPnP) Used by 3rd party applications to discover the Axis device via mDNS discovery protocol (Bonjour) ![]() Used by 3rd party applications to discover the Axis device via UPnP discovery protocol Used by the Axis device for video/audio streaming General HTTPS traffic such as web interface access, VAPIX and ONVIF API interface or Edge-to-edge communication. General HTTP traffic such as web interface access, VAPIX and ONVIF API interface or Edge-to-edge communication. In the table below you can see which these are. Only a minimum number of network protocols and services are enabled by default in Axis devices. The guide refers to modifying device settings within the web interface of the Axis device according to the following instructions: AXIS OS versionĬSC #4: Secure Configuration of Enterprise Assets and Software ![]() Note that Axis devices updated the user interface in firmware versions 7.10 and 10.9. You may need the product’s user manual to learn how to configure specific settings. It establishes a baseline configuration as well as a hardening guide that deals with the evolving threat landscape. The guide provides technical advice for anyone involved in deploying Axis solutions. This guide focuses on reducing the exposure to these risks. Nevertheless, a network camera is a device with an interface that may expose risks to the system it is connected to. Unlike a laptop computer, however, a network device does not have users visiting potentially harmful websites, opening malicious email attachments, or installing untrusted applications. ![]() To protect a product from these threats, it is important to select a vandal-resistant model or casing, to mount it in the recommended manner, and to protect the cables.įrom an IT/network perspective, the Axis device is a network endpoint like any other, such as laptops and desktop computers or mobile devices. The most obvious threats to an Axis device are physical sabotage, vandalism, and tampering. The purpose of this guide is to support you in securing your network, devices, and services. A secure environment depends on its users, processes, and technology. However, securing a network, its devices, and the services it supports requires active participation by the entire vendor supply chain, as well as the end-user organization. Axis Communications strives to apply cybersecurity best practices in the design, development, and testing of our devices to minimize the risk of flaws that could be exploited in an attack.
0 Comments
Leave a Reply. |