Dahua Product Security Hardening Guide V2 - 0 - 01
Dahua Product Security Hardening Guide V2 - 0 - 01
V2.0.0
are trademarks or
registered trademarks owned by Zhejiang Dahua Technology Co., Ltd.
HDMI logo, HDMI and High-Definition Multimedia Interface are trademarks
or registered trademarks of HDMI Licensing LLC. This product has been
authorized by HDMI Licensing LLC to use HDMI technology.
VGA is the trademark of IBM.
Windows logo and Windows are trademarks or registered trademarks of
Other trademarks and company names mentioned are the properties of their
respective owners.
Disclaimer
Within the scope allowed by applicable laws, in any case, this company
won‟t compensate any special, contingent, indirect and secondary damages
resulting from relevant contents and products described in this document,
nor compensate any losses in profits, data, reputation, document loss or
expected savings.
Products described in this document are provided “as is”. Unless required
by applicable laws, this company doesn‟t provide any express or implicit
guarantees for all contents in the document, including but not limited to
guarantees for marketability, quality satisfaction, application to specific
purpose and non-infringement of third-
The security technologies, capability and characteristics described in this
document shall be subject to the specific product model, software version,
software platform and the implementation of specific solution. It does not
provide any expressed or implied guarantee that all the products or
solutions of Dahua provide all the security technologies, capability and
characteristics described in this document.
Export Control Compliance Statement
Dahua abides by applicable export control laws and regulations, and
implements export, re-export and transfer requirements of hardware,
software and technology. Regarding products described in this manual,
please fully understand and strictly conform to applicable export control laws
and regulations at home and abroad.
About This Document
If the PDF document obtained cannot be opened, please upgrade the
reading tool to the latest version or use other mainstream reading tools.
The company reserves the right to modify any information in this document
at any time. The modified contents will be added to the new version of this
document without prior notice. There may be slight difference in part of the
product functions before and after the update.
This document may contain technical inaccuracies, discrepancies with
the product function and operation or typographical errors. All subject to the
final interpretation of the company.
Table of Contents
1.PREFACE ......................................................................................................................... 1
2 Security Level.................................................................................................................. 3
i
3.2 Config SNMP Securely ............................................................................................ 29
ii
1 Preface
This document mainly introduces security levels and various security hardening items,
secure application of some functions and incident response mechanism and contact info.
1.1 Acronym
3G 3rd-generation
1.2 Overview
With rapid development of IoT network scale and application, continuous increase of
audio/video multi-media application, network environment becomes more and more
complicated. All kinds of network threats and attacks are emerging, and network security
issue raises more and more concern. Network security events occur frequently, including
1
Trojan virus, ARP spoofing, application and system attack and so on.
In order to achieve the best network security, Dahua minimizes equipment security risks in
product design, development and test and avoids network attacks on devices. However,
equipment and service security require the response of the entire supply chain and the
participation of end users. Therefore, we develop this security hardening guide to help you
establish a security management system to ensure normal and safe operation of
equipment and systems.
2
2 Security Level
2.1 Security Level Introduction
The guide formulates three protection levels according to different system scales and
security needs. Please refer to Table 2-1 for more details about three protection levels and
corresponding security items.
Table 2-1
3
protection; medium-sized enterprises are recommended to configure level 2
protectionl large-sized enterprises and infrastructure projects are
recommended to configure level 3 protection. Try to configure a higher security
level than recommended if the condition permits.
Figure 2-1
4
system prompt.
◇ The password is not recommended to use user name or inverted order of user
name, Try to reduce continuous letters or numbers (such as 123, abc and so on).
Try to reduce continuous use of the same character (such as 111, aaa and so
on).
Modify password regularly
If the password was used by non-staff, it can avoid password being preserved for
long term and reduce device exposure risk via modifying password.
Operation method
Set password
It is required to initialize the device if it is the first time to use the device or the device
is used for the first time after factory default setting. Please set strong password for
admin user according to the interface prompt.
Modify device admin password
Select “Setting > System > User Management > User Management”, click to
modify device admin password.
Figure 2-2
Figure 2-3
Figure 2-4
6
Set Reserved Email Address
◇ The device is required to initialize if it is the first time to use the device or the
device is used after factory default setting, please set reserved email address
according to the interface prompt.
◇ Select “Setting > System > User Management”, enter “User” interface to modify
reserved email address.
Figure 2-5
Operation Method
The device is required to initialize if it is the first time to use the device or the device is
used after factory default setting, please set security question according to the
interface prompt.
Some storage devices are configured locally, select “Main menu > Setting > System >
User Management > Security question” and it supports modifying security question.
Figure 2-6
Acquiring the latest firmware or client is only used for manual upgrade, please ignore
this if you are using online upgrade function.
8
Log in Dahua website www.dahuatech.com to download the latest firmware version
or client version, or you can download the latest mobile APP in application store.
Uprade Device
It supports file upgrade and online upgrade. File upgrade requires that firmware has
been obtained. Online upgrade requires that your device has been accessed to public
network. Online upgrade function can remind you of latest firmware information in
order to help you find latest version in time.
Select “Setting > System > System Upgrade”, enter “System Upgrade” interface to
upgrade firmware version.
Figure 2-7
Operation method
Select “Setting > System >General > Date”, enter “Date” interface to set.
9
Figure 2-8
Table 2-2
Factory Default
Function Entry Condition
Status
UPnP Select “Setting > Network > UPnP” Disable
Multicast Select „Setting > Network > Multicast” Disable
SSH
(Only
supported by Select “Setting > System > Security > SSH”. Disable
IPC and PTZ
camera)
Onvif Select “Setting > System > Security > System”. Enable
CGI Select “Setting > Security > System”. Enable
Wi-Fi Select “Setting > Network > Wi-Fi”. Disable
3G/4G Select “Setting > Network > 3G”. Disable
AP Hotspot Select “Setting > Network > AP Hot Spot”. Disable
PPPoE Select “Setting > Network > PPPoE”. Disable
DDNS Select “Setting > Network > DDNS”. Disable
SNMP Select “Setting > Network > SNMP”. Disable
10
Factory Default
Function Entry Condition
Status
Bonjour
(Only
supported by Seelct “Setting > Network > Bonjour”. Enable
IPC and PTZ
camera)
Register Select “Setting > Network > Register”. Disable
FTP Select “Setting > Storage > FTP Storage”. Disable
Take IPC for example, select “Setting >
NAS Disable
Storage > NAS”.
Select „Setting > System > Security > System
Password reset Enable
Service”.
P2P Select “Setting > Network > P2P”. Enable
IPC/NVR/DVR:
Main stream is
enabled by default,
Audio Select “Setting > Camera > Encode > Stream” sub stream is
disabled by default.
PTZ camera: It is
disabled by default.
Alarm center Select “Setting > Network > Alarm Center”. Disable
DVR/NVR: Select “Setting > Network > Email
Setting”.
SMTP Disable
IPC/PTZ: Select “Setting > Network > SMTP
(Email).
ISCSI (Only
supported by Select “Setting > Storage > ISCSI” Disable
some NVR)
GB 28181 Select „Setting > Network > GB 28181”. Disable
Anonymity
login (Only
supported by Seelct “Setting > System > User > User”. Disable
IPC and PTZ
camera)
Operation Method
NVR/DVR: select “Setting > Event > Abnormity > User”, enter the “User” interface to
set, the fewer attempts allowed, the longer the lock time becomes and the higher the
11
security level is.
Figure 2-9
IPC/PTZ Camera: Seelct “Setting > Event > Abnormity > Illegal Access”, enter the
“Illegal Access” interface to set, the fewer login error allowed, the higher the security
level becomes.
Operation Method
Seelct “Information > Log”, enter “System Log” interface to inquire if there is log of security
type.
Figure 2-10
12
2.2.9 Check Online User
The device is equipped with the function which can display the info of online users; it is
recommended that you can check online user info occasionally and troubleshoot if the
device is logged in illegally. NVR/DVR also supports the function of removing unexpected
users.
Operation Method
Select “Information > Online User”, enter “Online User” interface to inquire.
Figure 2-11
Figure 2-12
Operation Method
Step 1
Select “Setting > System > User > User > User Group”, enter “User Group” interface to set
user group and give the user group corresponding authority.
Figure 2-13
14
Figure 2-14
Step 2
Select “Setting > System > User > User > User”, enter “User” interface to add user or
modify user group.
Figure 2-15
15
2.3.3 Enable HTTPS Service
HTTPS is the protocol service based on TLS encrypted link transmission. It ensures that
the data is encrypted during transmission when it accesses to device via WEB, which is to
prevent attackers stealing it maliciously, it is recommended that you have to enable and
use HTTPS to access device WEB.
Operation method
Take NVR for example; please refer to the corresponding user manual for operation if it
needs to configure IPC or PTZ camera.
Step 1
Select “Setting > Port > Port”, enter “Port” interface to enable HTTPS function.
Note
Please select “Setting > Network > HTTPS” for config access of IPC and PTZ camera.
Figure 2-16
Step 2
Create server certificate.
It needs to implement “Create Server Certificate” if it is your first time to use the function or
modify device IP.
1. Select “Setting > Port > HTTPS”, enter “HTTPS” interface.
2. Click “Create Server Certificate”, the system will display the dialog box of “Create
Server Certificate”.
Figure 2-17
16
3. Fill in the corresponding “Country”, “Province” and other info, click “Create”.
The system will prompt “Successfully created” after it is created successfully.
Note
The value of “IP or Domain Name” has to be in accordance with the device IP or
domain name.
Figure 2-18
Step 3
Download root certificate.
It needs to implement “Download Root Certificate” if it is your first time to use HTTPS on
your computer.
1. Select “Setting > Port > HTTPS”, the system will display “HTTPS” Interface.
2. Click “Download Root Certificate”, the system will display the interface of “File
Download”.
Figure 2-19
17
3. Click “Open”, the system will display the interface of “Certificate” info.
Figure 2-20
4. Click “Install Certificate”, the system will display the interface of “certificate Import
Wizard”.
Figure 2-21
18
5. Click “Next”, the system will display the interface of selecting certificate storage area.
Figure 2-22
19
6. Click “Next”, the system will display the interface of “Completing certificate import
wizard”.
Figure 2-23
20
7. Click “Finish”, the system will display the interface of “Import successfully”, which
means certificate download has been completed.
Figure 2-24
Operation Method
21
Select “Setting > System > Security > System Service”, enter the interface of “System
Service” to set.
Figure 2-25
Figure 2-26
Figure 2-27
Operation method
Select “Setting > System > Config Backup”, enter the interface of “Configure Import Export”
to operate.
Figure 2-28
Figure 2-29
Figure 2-30
Figure 2-31
Figure 2-32
Select „Setting > Cluster Service > Standby Device”, enter the interface of “Standby
Device” and add standby device.
Note
Add all the standby equipments except itself.
Figure 2-33
Step 2
Select “Setting > Cluster Service > Cluster IP” on the master device, enable cluster
service and set virtual IP.
Note
The IP address in “TCP/IP” is used for cluster internal control (that is, for internal
interaction between master and standby devices), and the virtual IP address set here is
used for cluster external control (that is, for use with an external network connection).
Figure 2-34
26
Select “Setting > Cluster Service > Cluster Control > Cluster Control” and enable cluster
function.
Figure 2-35
Figure 2-36
27
2.4.5 Network Isolation
It is suggested that you partition the network according to the actual network needs. If
there is no communication requirement between two subnets, it is recommended to use
VLAN, gateway or other means to divide the network to reduce the attack surface faced
by the subet. Improve network security by reducing subnet entry surface.
28
3 Safe Use of Function
3.1 Complex Password
The complex password mentioned in this chapter should meet at least the following
requirements.
The password length is no less than 8 characters.
Contains at least two types of character.
The password does not contain the reverse order of the account name or the account
name.
Do not use continuous strings such as 123, ABC etc.
Do not use consecutive identical characters, such as 111, aaa etc.
Operation Method
Select “Setting > Network > SNMP”, enter “SNMP” interface to set.
Figure 3-1
29
3.3 Config AP Hotspot Securely
If you need to use the device‟AP hotspot function for network deployment, it is
recommended that you configure the AP hotspot function safely.
Set complex password for AP hotspot
Adopt secure encryption WPA2 PSK
Operation Method
Select “Setting > Network > WiFi Module > General Config”, enter the interface of
“General Config” to set.
Figure 3-2
Figure 3-3
30
3.5 Safe Config FTP Function
FTP function is to extend data storage capacity through network storage. If you need to
use FTP for data storage expansion, it is recommended that you follow the following safe
application.
Use more secure SFTP
Set a complex password when establishing SFTP service.
The upload file directory is set in the non-system root directory.
It is recommended that the SFTP remote directory be exclusive and not shared with
other applications.
Operation Method
NVR/DVR: Select “Setting > Storage > FTP Storage”, enter the interface of “FTP
Storage” to set.
Figure 3-4
31
IPC/PTZ Camera: Select “Setting > Storage > Storage > FTP”, enter the interface of
“FTP” to set.
32
4 Incident Response
4.1 Security Incident Response Mechanism
Dahua technology has established Dahua Cybersecurity Center (DHCC) to resolve
cybersecurity issues, and provide more reliable and much safer solution to our users. It
includes security vulnerabilities report, process flows, publize security knowledges, etc.
Please log in https://www.dahuatech.com/service/resource.html if you need to check the
latest suggestion for security information.
33