0% found this document useful (0 votes)
467 views25 pages

600-35ns01-A - Honeywell 35 Series NVR Network Security Guide-0728

The document provides guidelines on network security features of Honeywell 35 Series network video recorders. It describes compatible models, application scenarios, software updates, removable storage, password management, port management, account management, browser security, lockout function, session timeout, HTTPS secure communication, TLS 1.2, backup/recovery, decommissioning, reset security, external system communication, and accessory security.

Uploaded by

conrradoegm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
467 views25 pages

600-35ns01-A - Honeywell 35 Series NVR Network Security Guide-0728

The document provides guidelines on network security features of Honeywell 35 Series network video recorders. It describes compatible models, application scenarios, software updates, removable storage, password management, port management, account management, browser security, lockout function, session timeout, HTTPS secure communication, TLS 1.2, backup/recovery, decommissioning, reset security, external system communication, and accessory security.

Uploaded by

conrradoegm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Honeywell 35 Series

Network Video Recorder

Network Security Guide


Recommended
Find the latest version of this and other Honeywell documents on our website: https://buildings.honeywell.com/security.

Copy Right
© 2023 Honeywell International Inc. All rights reserved. No part of this publication may be reproduced by any means without
written permission from Honeywell. The information in this publication is believed to be accurate in all respects. However,
Honeywell cannot assume responsibility for any consequences resulting from the use thereof. The information contained
herein is subject to change without notice. Revisions or new editions to this publication may be issued to incorporate such
changes. For patent information, see https://buildings.honeywell.com/us/en/support/legal/patents.

Revision
Issue Date Revisions
A 07/2023 New document.
Table of Contents
Scope ............................................................................................................... 1
Compatible SKUs .......................................................................................... 1
Application Scenarios .................................................................................. 2
Software Updates ......................................................................................... 3
Firmware Encryption .............................................................................................................. 3
Upgrade ....................................................................................................................................... 3
Downgrade ................................................................................................................................. 4
Removable Storage ...................................................................................... 4
Password Management ............................................................................... 4
Port Management ........................................................................................ 4
Account Management ................................................................................. 4
Browser Security........................................................................................... 5
Internet Explorer ...................................................................................................................... 5
Google Chrome......................................................................................................................... 6
Lockout Function ......................................................................................... 7
Session Timeout Mechanism ..................................................................... 7
HTTPS Secure Communication ................................................................. 7
Installing a Security Certificate.......................................................................................... 8
Customized Certificate Info ............................................................................................. 12
TLS 1.2 ..........................................................................................................13
Backup and Recovery ................................................................................13
Decommissioning/Disposal Management............................................14
Reset Security Question............................................................................14
Security Communication with External Systems ................................14
Accessories Security ..................................................................................15
Honeywell 35 Series Network Video Recorder Network Security Guide I
HSV Security ........................................................................................................................... 15
HSV Mobile App Security................................................................................................... 16
Vulnerability Reporting ............................................................................17

II Honeywell 35 Series Network Video Recorder Network Security Guide


Figures
Figure 1 Internet Connection with Firewall (Recommended) ........................................................................................................... 2
Figure 2 Internet Explorer Settings................................................................................................................................................................. 6
Figure 3 Google Chrome Settings ................................................................................................................................................................... 7
Figure 4 Security Problem ................................................................................................................................................................................... 8
Figure 5 Login ............................................................................................................................................................................................................ 9
Figure 6 Certificate Request ............................................................................................................................................................................ 12
Figure 7 Certificate Page ................................................................................................................................................................................... 12
Figure 8 Upload Files Page .............................................................................................................................................................................. 13
Figure 9 Uploaded Files ..................................................................................................................................................................................... 13
Figure 10 Security Question ........................................................................................................................................................................... 14
Figure 11 Software Signature Information Verification .................................................................................................................... 15
Figure 12 Certification Path ............................................................................................................................................................................ 16

III
Honeywell 35 Series Network Video Recorder Network Security Guide
Tables
Table 1 Compatible SKUs .................................................................................................................................................................................... 1

IV Honeywell 35 Series Network Video Recorder Network Security Guide


Scope
This document describes network security features of Honeywell 35 Series 16/32/64CH
Network Video Recorder (NVR) and provides guidelines to improve security of your video
surveillance system.

Compatible SKUs
For compatible SKUs information, refer to the table below.
Table 1 Compatible SKUs

Part Number Description


HN35160400R S35 16 Chs NVR 4K (8 MP) Support, H.265/H.264, 16 Chs PoE, Stream Encryption, 4 SATA, 0 TB, RAID

HN35160408R S35 16 Chs NVR 4K (8 MP) Support, H.265/H.264, 16 Chs PoE, Stream Encryption, 4 SATA, 8 TB

HN35160416R S35 16 Chs NVR 4K (8 MP) Support, H.265/H.264, 16 Chs PoE, Stream Encryption, 4 SATA, 16 TB

HN35160491R S35 16 Chs NVR 4K (8 MP) Support, H.265/H.264, 16 Chs PoE, Stream Encryption, 4 SATA, 8 TB, RAID

HN35160492R S35 16 Chs NVR 4K (8 MP) Support, H.265/H.264, 16 Chs PoE, Stream Encryption, 4 SATA, 16 TB, RAID

HN35320400NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4 SATA, 0 TB, Non-PoE, RAID

HN35320408NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4SATA, 8 TB, Non-PoE

HN35320416NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4SATA, 16 TB, Non-PoE

HN35320491NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4SATA, 8 TB, Non-PoE, RAID

HN35320492NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4SATA, 16 TB, Non-PoE, RAID

HN35640400NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4 SATA, 0 TB, Non-PoE, RAID

HN35640492NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 4 SATA, 16 TB, Non-PoE, RAID

HN35320800NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 0 TB, Non-PoE, RAID

HN35320808NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 8 TB, Non-PoE

HN35320816NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 16 TB, Non-PoE

HN35320832NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 32 TB, Non-PoE

HN35320891NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 8 TB, Non-PoE RAID

HN35320892NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 16 TB, Non-PoE, RAID

HN35320893NR S35 32 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 32 TB, Non-PoE, RAID

HN35640800NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 0 TB, Non-PoE, RAID

HN35640892NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 16 TB, Non-PoE, RAID

HN35640893NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 32 TB, Non-PoE, RAID

HN35640894NR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 48 TB, Non-PoE, RAID

HN35640800DR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 0 TB, Non-PoE, Dual Power supply, RAID

HN35640893DR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 32 TB, Non-PoE, RAID

HN35640894DR S35 64 Chs NVR 4K (8 MP) Support, H.265/H.264, Stream Encryption, 8 SATA, 48TB, Non-PoE, RAID

Honeywell 35 Series Network Video Recorder Network Security Guide 1


Application Scenarios
Surveillance systems are commonly set up on a standalone network consisting of cameras,
NVRs/DVRs, and a headend.
To minimize security risks introduced during deployment, please make sure the NVR is
deployed in a trusted network. If the network is connected to the Internet, regardless of its
directness or indirectness, there should be a firewall, network-based IDS (Intrusion Detection
System) or IPS (Intrusion Prevention System) in place, and you should configure the firewall to
block all ports that are enabled in the NVR except for HTTPS (443 or user-defined) or there are
explicit special access requests that get approval from your CIO or similar position.
In an intranet environment, Honeywell recommends user to use a dedicated router / switch to
connect to the NVR and use whitelists of IP / MAC addresses to restrict access to this router /
switch, which will effectively reduce the possibility of attacks (especially denial-of-service (DoS)
and distributed denial-of-service (DDoS)) from the intranet.
It is recommended that you use 35 Series NVR with Honeywell 35/60 series cameras and
enable SSL for camera setting in NVR. The end to end stream encryption solution provides
more secure stream transmission channel.
Figure 1 Internet Connection with Firewall (Recommended)

This guide only introduces how to secure the data and communication of Honeywell 35
Series NVR. Total Honeywell solution is based on encrypted stream and commands
Note:
(HTTPS). If there are other 3rd party cameras or platform connections, the encryption
will be depended on the 3rd party.

Honeywell recommends that you should follow our recommended scenes to deploy NVR in a
secure environment due to:
• RTSP/RTP is the most popular live stream transmission protocol today, which is widely used
in almost all NVRs. But it also has some security risks that can be exploited to cause the risk
of sensitive data disclosure. RTSP over multicast is the same. RTSP over HTTPS is
supported and recommended on our device. To enable HTTPS only, go to Setting > Camera
>ADD DEVICES>YES.

2 Honeywell 35 Series Network Video Recorder Network Security Guide


• SMTP is an Internet standard network protocol for email transmission, with which the TLS is
used by default for Honeywell 35 Series NVRs. You can set the device as non-TLS mode to
make the device compatible with the existing SMTP server, however, it has some known
security risks that can cause the sensitive data disclosure.
• SNMP is widely used in network management for network monitoring, default we are
disable this function because not everyone need it. And if you want to use it, V3 is the
recommended for 35 Series NVR, you can modify it to V1 / V2 if it needs to be compatible
with existing SNMP agent, which has some known security risks that can cause the
sensitive data disclosure.
• IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It provides
an authentication mechanism to devices wishing to attach to a LAN or WLAN. Honeywell 35
Series NVR also support to connect to IEEE802.1X authentication network. Although the
IEEE802.1X server is out of scope, Honeywell recommends you should deploy IEEE802.1X
Server in secure environment if you enable the IEEE 802.1x client.
Since NTP / NAS / SMTP/FTP servers are out of scope, Honeywell recommends that you
should deploy them in the same secure environment.

Note: • It is recommended that you should do physical protection regularly for NVR and its
accessories.
• It is recommended that you should follow local law to legitimately use the NVR, HSV
and HSV App. When you need to collect some video recordings or snapshot data,
especially some personal data, follow the data minimization principle and post up
proper statement in the collected zone according to the local law.

Contact our technical support on how to configure the firewall, NVR, HSV and HSV App.

Software Updates

Firmware Encryption
Honeywell provides Honeywell signed and encrypted firmware. The Honeywell signing can
prevent tampered firmware being upgrade, and the encrypted firmware can prevent FW
information disclosure.

Upgrade
Ensure that your NVR firmware is up to date.

Honeywell 35 Series Network Video Recorder Network Security Guide 3


Downgrade
Downgrade may cause security risk to NVR because old firmware may not have necessary
security updates or security controls.

Removable Storage
Always scan HDD, USB and other storages for viruses before using them with your
NVR/HSV/HSV App.

Password Management
When you log in your NVR for the first time, you will be required to initialize the admin
password. The new password must be at least 8 characters in length, contain a mix of
uppercase and lowercase characters, and include at least one number and at least one special
character.
Honeywell recommends that you change all your passwords every 90 days for the NVR or its
accessories.

Port Management
Honeywell has implemented strict port management on Honeywell 35 Series NVR, disabling
unused or unsecured network services such as Telnet and FTP.
The following ports are required by the NVR normal functions:
• 80 (HTTP) • 30141/30142 (NVR discovery)
• 443 (HTTPS) • 30143 (Client Control)
• 8090 (FW upgrade) • 61001 (P2P)
• 1900 (UPNP) • 5353 (MDNS discovery)
• 3702 (Onvif discovery) • 161 (SNMP)

Account Management
The admin user can assign different levels of access to different user accounts. For example,
one user may only be allowed to monitor and play back video while another user may be
allowed to use various setup functions.

4 Honeywell 35 Series Network Video Recorder Network Security Guide


It is recommended that you should apply different accounts to different users and entitle
specific right to a designated account.

Browser Security
Honeywell 35 Series NVR supports logins with both Internet Explorer 11.0+ and Google Chrome
71+ web clients.
Most of us have numerous passwords to keep track of on a regular basis for both business and
personal life. It may be tempting to click Remember Password or Save Password when your
web browser prompts you, but it will put your security at risk.
• Internet Explorer saves your passwords in your browser, and it does not show your saved
passwords. However, it can be easy to find tools to expose these passwords.
• Chrome saves your passwords in your Google account. Once someone logs into your
account, all your passwords are visible. It means that if your account is hacked, the hacker
has access to all your other accounts.
Honeywell strongly recommends that do not allow your browser to remember your password, or
turn off the built-in password manager in your browser.

Internet Explorer
To stop Internet Explorer from asking to save your passwords:
1. Click the Settings menu and choose Internet options.
2. Click Content.
3. Click Settings in the AutoComplete section.
4. Uncheck Forms and Searches and User names and passwords on forms.
5. Click OK.

Honeywell 35 Series Network Video Recorder Network Security Guide 5


Figure 2 Internet Explorer Settings

Google Chrome
To stop Chrome from asking to save your passwords:
1. Click in the toolbar and choose Settings.
2. Click Passwords.
3. Switch off Offer to save passwords.

6 Honeywell 35 Series Network Video Recorder Network Security Guide


Figure 3 Google Chrome Settings

Lockout Function
By default, user accounts are locked after 5 consecutively failed login attempts. The default
lockout time is 30 minutes. The lock will also be released if the device is restarted.

Session Timeout Mechanism


System will logout after 15 minutes without operation on web interface, then you need to log in
again.
System will close the session after 15 minutes when web interface is closed abnormally.

HTTPS Secure Communication


Honeywell has enabled HTTPS by default on 35 Series NVR. For example, if you enter the NVR
IP address "http://171.2.1.32" in your web browser, the address will redirect to
"https://171.2.1.32”. And the communication between NVR, HSV and HSV App also uses
HTTPS.

Honeywell 35 Series Network Video Recorder Network Security Guide 7


Installing a Security Certificate
When you log in to your NVR for the first time, you will be prompted to download and install a
signed security certificate.
To download and install a signed security certificate, follow these steps:
1. Open your browser and enter the NVR’s IP address in the address bar.
If you are using Chrome, a message appears warning that the connection is not
private. Click Advanced.
Figure 4 Security Problem

2. Click Proceed to 192.168.1.108 (unsafe).

3. In the login window, enter your User name and Password. Click LOGIN.

8 Honeywell 35 Series Network Video Recorder Network Security Guide


Figure 5 Login

4. After logging in, go to Setting > Networks > Web Mode > CA Certificate. Click
EXPORT under CA Certificate.

5. Go to the directory where you saved the certificate and double-click the certificate.
Click Open. The Certificate window opens.
6. In the Certificate window, on the General tab, click Install Certificate to open the
Certificate Import Wizard.

7. Click Next to continue.

Honeywell 35 Series Network Video Recorder Network Security Guide 9


8. Click Place all certificates in the following store, browse to Trusted Root
Certification Authorities, and then click Next.

9. Click Finish to import the certificate.

10 Honeywell 35 Series Network Video Recorder Network Security Guide


10. A security warning appears. Click Yes to continue.

11. Click OK to close the wizard and return to the Certificate window.

You should now be able to reopen your browser without receiving a warning about website
security.

Honeywell 35 Series Network Video Recorder Network Security Guide 11


Note: • Your Honeywell Camera/NVR requires a secure connection (HTTPS) to
connect to the network to ensure your privacy. If you change the IP address,
you need to reboot the device for the warning messages to disappear.
• Do not configure a security exception as it will leave you vulnerable to
phishing sites.

Customized Certificate Info


The self-signed certificate, which is not secure enough, is used as default for 35 Series NVR. To
increase the security of HTTPS communication, it is recommended that you should customize
the certificate information and import the Well-known certificate.
User can fill in certificate information he wants, and the certificate request file is provided to
the certificate issuing authority for signing, then imported to NVR.
1. Go to Setting > Networks > Web Mode > Certificate Request.
Figure 6 Certificate Request

2. Input the parameters of certificate request.


3. Click CREATE.
4. Click EXPORT to save the CSR request file (certreq.pem).
5. Use CSR request file to obtain the SSL certificate file.
6. At web page, Click CHOOSE FILE to choose the combination file.
7. Click UPLOAD.
Figure 7 Certificate Page

Then the Well-known certificate will be used instead of the original self-signed
certificate.

12 Honeywell 35 Series Network Video Recorder Network Security Guide


The following interface for importing the Well-known certificate and key file directly is
also provided on 35 Series NVR.
1. Go to Setting > Networks > Web Mode > Upload Files. You can import the
Certificate file and Key file from third party here.
Figure 8 Upload Files Page

2. In the Certificate field, click CHOOSE FILE to select a certificate file you have
already applied from 3rd party or CA domain.
3. In the Key field, click CHOOSE FILE to select a certificate key you have already
applied from 3rd party or CA domain.
4. Click UPLOAD.
Figure 9 Uploaded Files

Then the Well-known certificate will be used instead of the original self-signed
certificate.
Note: If the certificate requirement file is exported from a device, only the
certificate file is needed to be imported.
If the certificate requirement file is exported by user self-signed or Well-
known CA, both the certificate file and the key file are needed to be imported.

TLS 1.2
All Honeywell 35 Series NVR, HSV and HSV App use TLS 1.2 only to enhance data security.
Weak algorithms such as RC4, MD5, and SHA1 are not used.

Backup and Recovery


Keep a backup of your NVR and HSV configuration settings, so that you can quickly recover
your device if necessary.

Honeywell 35 Series Network Video Recorder Network Security Guide 13


Decommissioning/Disposal Management
Honeywell recommends that you should do factory default to clear the configuration or private
data and reset it to factory default setting before the NVR is decommissioned or resold (refer to
the sections about upgrade and maintenance in User Guide for more information).
If you need to install an HDD in the NVR, please format it before installation.

Reset Security Question


For password resetting, you can set security questions after password initialization or set on
the Secure Question page.
1. Go to Setting > System > Security Center > Secure Question.
Figure 10 Security Question

2. Input the password.


3. Input proper security questions and answers.
4. Click APPLY.
After setting security questions successfully, you can answer the security
questions to reset admin password.

Security Communication with External Systems


Please ensure that the communication between Cameras, NVRs, VMS, NTP Server and any
Gateway Module (such as Video Guard device) should be within private LAN or over VPN with
high security.

14 Honeywell 35 Series Network Video Recorder Network Security Guide


Accessories Security
Honeywell 35 series NVR includes 4 optional software accessories, 2 Viewers (Windows HSV
and MacOS HSV) and 2 HSV Apps (Android App and iOS App). If you use these accessories,
refer to this chapter to improve the security of them.

HSV Security
The HSV is a 35 Series NVR management and viewer client. It is a professional video
surveillance system designed for 35 Series NVR on managing security surveillance devices
conveniently and efficiently. It supports live view, playback, tour & task, E-Map, Event trigger
management, smart search and other services.
• Honeywell provides Honeywell signed Windows HSV software. Before you install the
software, Honeywell recommends that you verify the signature information to avoid
tampered software installation.
Right click on your software icon and select properties. Refer to the snapshots below to
check the software signing information (Details and Certificate Path information should
be the same with the snapshots).
Figure 11 Software Signature Information Verification

Honeywell 35 Series Network Video Recorder Network Security Guide 15


Figure 12 Certification Path

• Ensure that your HSV software is up to date.


• Honeywell recommends that you select an independent computer just for this software
and do the virus scanning before installing and configuring the software. Honeywell
recommends you regular scan the virus on your computer when using HSV.
• After installing the HSV software, when you log in HSV for the first time, you will be required
to change the default admin password. The new password must be at least 8 characters in
length, contain a mix of uppercase and lowercase characters, and include at least one
number and at least one special character.
• Honeywell recommends that you enable computer’s password protection and change your
HSV and computer password every 90 days.
• User accounts are locked after 5 consecutively failed login attempts. The default lockout
time is 30 minutes.
• Honeywell recommends that you close or lock screen for HSV software when you are away
from your computer.
• Honeywell recommends that you make sure the computer system date/time is correct
before installing the HSV software. The computer system date/time should be the same as
the date/time of NTP service which is in security environment.
• If you decide not using the HSV anymore, Honeywell recommends you backup useful video
recordings and snapshots and uninstall the HSV and remove all recordings and snapshots.

HSV Mobile App Security


The HSV App is a monitoring application for iPad®, iPod®, iPhone® and Android® phones and
tablets.
16 Honeywell 35 Series Network Video Recorder Network Security Guide
• Honeywell recommends you get the App from official link to avoid tampered software
installation.
• Ensure that your HSV App is up to date.
• When you install the HSV mobile App to your phone, the App will remind you to enable the
fingerprint or phone face protection. Honeywell recommends you enable the fingerprint or
phone face protection to protect your App data.
• Honeywell recommends you enable phone face or fingerprint unlock function to protect
your phone and App from multiple factors.
• Honeywell recommends that you close HSV App if you don’t use the App.
• Honeywell recommends that you install HSV Android App in phones and tablets with
Android 8.0 later.
• Honeywell recommends that you safely keep the phone with HSV App. If the phone with
HSV App is lost, change all your NVR passwords that have been used in your lost phone.
• If you decide not using the HSV App anymore, Honeywell recommends you backup useful
video recordings and snapshots and uninstall the HSV App and remove all recordings and
snapshots.

Vulnerability Reporting
Honeywell encourages coordinated disclosure of security vulnerabilities. Security researchers,
industry groups, government organizations and vendors can report potential security
vulnerabilities to Honeywell by choosing one of the two vulnerability types in the form below or
by emailing us with below details mentioned.
If the vulnerability affects a product, service, or solution, email us at [email protected],
with the following instructions/details.
Please encrypt using Honeywell’s public PGP key and include the following:
• Product and version
• Description of the potential vulnerability
• Any special configuration required to reproduce the issue
• Step by step instructions to reproduce the issue
• Proof of concept or exploit code, if available
• Potential Impact
For all other security issues, email us at [email protected] with the following
instructions.
Please encrypt using Honeywell’s public PGP key and include the following:
• Website URL or location
• Type of vulnerability (XSS, Injection, etc.)
• Instructions to reproduce the vulnerability

Honeywell 35 Series Network Video Recorder Network Security Guide 17


• Proof of concept or exploit code, including how an attacker could exploit the vulnerability
• Potential impact
• To encrypt your message to our PGP key, please download it from here:
https://www.honeywell.com/en-us/product-security#items_1555827156/

18 Honeywell 35 Series Network Video Recorder Network Security Guide


Honeywell Building Technologies – Security Americas (Head Honeywell Building Technologies – Security Россия и СНГ
Office) 121059 Moscow,
Honeywell Commercial Security UI, Kiev 7
715 Peachtree St. NE Russia
Atlanta, GA 30308 Tel: +7 (495) 797-93-71
Tel: +1 800 323 4576
Honeywell Building Technologies – Security Asia Pacific
Honeywell Building Technologies – Security Mexico Building #1, 555 Huanke Road,
Mexico: Av. Santa Fe 94, Torre A, Piso 1, Col. Zedec, Zhang Jiang Hi-Tech Park Pudong New Area,
CP 012010, CDMX, México. Shanghai, 201203, China
Colombia: Edificio Punto 99, Carrera 11a. Tel: 400 840 2233
98-50, Piso 7, Bogota, Colombia.
Tel: 01.800.083.59.25 Honeywell Building Technologies – Security and Fire
(ASEAN)
Honeywell Building Technologies – Security Middle East/N. Honeywell International Sdn Bhd
Africa Level 25, UOA Corp Tower, Lobby B
Emaar Business Park, Building No. 2, Sheikh Zayed Road Avenue 10, The Vertical, Bangsar South City
P.O. Box 232362 59200, Kuala Lumpur, Malaysia
Dubai, United Arab Emirates Email: [email protected]
[email protected] Technical support (Small & Medium Business):
Tel: +971 4 450 5800
Vietnam: +84 4 4458 3369
Honeywell Building Technologies – Security Europe/South Thailand: +66 2 0182439 Indonesia: +62 21 2188 9000
Africa Malaysia: +60 3 7624 1530
Building 5 Carlton Park, Singapore: +65 3158 6830
King Edward Avenue Philippines: +63 2 231 3380
Narborough, Leicester, LE19 0LF
United Kingdom
Honeywell Home and Building Technologies (India)
Tel: +44 (0) 1163 500714 HBT India Buildings
Unitech Trade Centre, 5th Floor,
Sector – 43, Block C, Sushant Lok Phase – 1,
Honeywell Building Technologies – Security Northern Europe
Gurgaon – 122002, Haryana, India
Stationsplein Z-W 961, 1117 CE Schiphol-Oost, Netherlands Email: [email protected]
Tel: +31 (0) 299 410 200 Toll Free Number: 000 800 050 2167
Tel: +91 124 4975000
Honeywell Building Technologies – Security
Honeywell Building Technologies – Security and Fire (Korea)
Deutschland Honeywell Co., Ltd. (Korea)
Johannes-Mauthe-Straße 14 5F SangAm IT Tower,
D-72458 Albstadt 434, Worldcup Buk-ro, Mapo-gu,
Germany Seoul 03922, Korea
Tel: +49 (0) 7431 801-0 Email: [email protected]
Customer support: [email protected]; +82 1522-8779
Honeywell Building Technologies – Security Tel: +82-2-799-6114
France
Immeuble Lavoisier Honeywell Building Technologies – Security & Fire (Pacific)
Parc de Haute Technologie Honeywell Ltd
3-7 rue Georges Besse 9 Columbia Way
92160 Antony, France BAULKHAM HILLS NSW 2153
Tel: +33 (0) 1 40 96 20 50 Email: [email protected]
Technical support:
Honeywell Building Technologies – Security Italia SpA Australia: 1300 220 345
Via Achille Grandi 22, New Zealand: +64 9 623 5050
20097 San Donato Milanese (MI), Italy

Honeywell Building Technologies – Security España


Josefa Valcárcel, 24
28027 – Madrid, España
Tel.: +34 902 667 800

https://buildings.honeywell.com/security
+1 800 323 4576 (North America only)
Document 600-35NS01 Rev A –07/2023

You might also like