(714) 671-9000
  • Products
    • Industrial Ethernet
      Unmanaged Switches
      10/100Mbps
      10/100Mbps PoE
      Gigabit
      Gigabit PoE
      10 Gigabit
      10 Gigabit PoE
      Managed Switches
      10/100Mbps
      10/100Mbps PoE
      Gigabit
      Gigabit PoE
      10 Gigabit
      10 Gigabit PoE
      Industrial Rackmount Switches
      Unmanaged
      Managed
      Industrial Routers
      Dynamic Product Filter
      BABA Compliant
    • Media Converters
      Unmanaged
      10/100TX to 100FX
      10/100/1000TX to 1000FX
      10G
      Ethernet Extenders
      Industrial
      PoE
      Rackmount Chassis
    • Serial Communication
      Serial to Ethernet
      RS232
      RS422/485
      RS232/422/485
      Serial to Wireless
      Serial Media Converters
      RS232 To RS422/485
      Serial Repeaters
      RS232 to CAT5
      Serial to Fiber
      Fieldbus Gateway
      Modbus Gateway
      Multiport Serial Cards
      PCIe RS232
      PCIe RS422/485
      uPCI RS232
      uPCI RS422/485
      uPCI RS232/422/485
      Industrial USB
      USB to Serial
      USB to Ethernet
      USB Hub
      USB Expansion Cards
    • Sena
      Bluetooth
      Accessories
    • Wireless
      AP/Bridges/Repeaters
      Din Rail Mounted
      IP67 Rated
      Wireless Routers
      Industrial IoT Gateways
      Wireless Bridge
    • SFP Modules
      100Mbps
      Gigabit
      10G SFP
      10G XFP
    • Accessories
      Industrial Ethernet
      Cables
      Adapters
      Mounting
      Wireless
      Mounting
      Antennas
      Cables
      PoE Injectors
      SFPs
      Cables
      Media Converters
      Cables
      Adapters
      Mounting
      Chassis Power Supplies
      Serial Communication
      Cables
      Adapters
      Antenna
      Power Supplies
      DIN-Rail Mounted
    • Power Supplies
      Industrial Din-Rail
      Power Adapters
    • PoE
      Unmanaged Switches
      10/100Mbps
      Gigabit
      10 Gigabit
      Managed Switches
      10/100Mbps
      Gigabit
      10 Gigabit
      Media Converters
      10/100Mbps
      Gigabit
      Injectors
    • Specialty Solutions
      60 Watt PoE++
      90 Watt PoE++
      90 Watt Injectors & Media Converters
      90 Watt PoE++ Industrial Switches
      M12 Switches
      Compact Devices
      Industrial Ethernet Switches
      Industrial Media Converters
      Conformal Coating
      Class 1 Div 2
      IEC 61850-3
      EN 50155
    • Low Voltage PoE
      Managed
      10/100 Mbps
      Gigabit
      10 Gigabit
      Unmanaged
      10/100 Mbps
      Gigabit
      10 Gigabit
    • Software Solutions
      Connect VPN
      Antaira NMS
  • Support
    • Request Customer Service
    • Request Technical Support
    • Request RMA
    • Request Product Info
    • Request Volume Pricing
    • 30 Day Evaluation Program
    • NMS Request Form
    • Product Notices
    • Warranty Policy
  • Resources
    • Product Selector
    • Product Filter
    • Literature
    • Industries
    • Media
    • Technical Writing
    • Press Releases
    • E-Newsletter
  • Where To Buy
  • About
    • About Antaira
    • Patented Tech
    • Events
    • Contact Us
  • Login
  • 0
    • Europe

    • Asia

    • Poland

    • Russia

 

Industrial Ethernet Switches Play a Critical Role in Protecting Prime Targets Such as IP Surveillance Systems from a Cyber Attack



As industrial industries continue to grow and evolve, so has the frequency and sophistication of cyber-attacks aimed at these critical systems. Once adversaries breach a network, they can use many cyber-attack methods to access remote systems, such as cloud-based IP surveillance, or local assets, such as intelligent industrial Ethernet switches.



Imagine an attacker taking control of your industrial ethernet switch; the consequences could be severe. Through embedded features designed to assist administrators in managing and maintaining network integrity, tools such as "port mirroring" can capture and offload data traffic to a remote source for analysis. Data mining of the stolen packet captures could reveal sensitive information about the network, such as management capabilities, protocols, and interconnected devices. This information can be used as part of the attacker's reconnaissance mission, painting a picture of the attack surface of the victim's network.



Continuing our scenario, the attacker can use collected data from the compromised switch to probe other parts of the network in search of prime targets such as the IP surveillance system. IP surveillance systems are considered prime targets for attackers because of the opportunity they present.



Legacy IP surveillance systems were typically connected locally with no access to the internet. Users would use a web browser or management component to connect to a centralized application on the network. The only way to access the IP surveillance system was through a connection on the company network and a web browser from selected machines with permissions. However, modern systems now reside on cloud servers with mobile applications used for administration. Sophisticated attackers who gain access to these systems can grant themselves external permissions while deleting logging files that detail user access activity. Attackers can exploit this detailed information about the site, users, equipment, and working hours to cover up physical theft or attempted break-ins. Because of this type of access, surveillance systems make ideal targets for attackers.



In this blog, we will explore the complex realities of cyber security for industrial network infrastructure, best practice methods for securing industrial Ethernet switches and creating a defense posture against vulnerable assets such as industrial unmanaged switches.



The Reality of Cyber Security


Organizations primarily focusing on industrial operations face unprecedented cyber threats from would-be attackers, hackers, and disgruntled workers. Combatting these security threats is a challenging endeavor that takes continuous effort by skilled engineers dedicated to the task. While maintaining system integrity, these engineers are responsible for network redundancy and data transmission optimization for day-to-day communications.



While most industrial organizations adhere to securing their industrial networks through a wide range of protections, including novel technologies such as Artificial Intelligence (AI) and 3rd party software applications, some do not. Instead, these organizations look to next-generation technologies, such as high-speed gigabit ports and high-powered Power over Ethernet (PoE), to enhance their network capabilities with minimal emphasis on cyber security.



The Industrial Edge


The Industrial Edge is where Information Technology networks converge with Operational Technology networks to provide end-to-end IP solutions for organizations specializing in industrial applications. Firewall appliances, routing devices, and enterprise-class distribution ethernet switches are strategically deployed to ensure varying isolation levels between these two networks. Further isolation takes place in subnetworks known as VLANs (Virtual Local Area Networks).



From this edge, enterprise Ethernet switches are interconnected to industrialized Ethernet switches to provide connectivity to various locations, such as factory floors and traffic control centers.



Inherent Vulnerability of an Industrial Network


One of the most significant weaknesses of any network is the unmanaged Ethernet switch. These industrial switches are extremely popular because of the cost and ease of installation.


Typically, when an existing Ethernet switch has run out of Ethernet ports, unmanaged switches are used to provide additional ports for IP-enabled equipment. A simple cable connection between both switches can quickly give you an extended port count.


Another common scenario for unmanaged Ethernet switches is extending the existing network into a new location. By connecting an unmanaged ethernet switch via a LAN cable back to an existing distribution switch, the administrator can quickly create a new location for IP connectivity.


Both of these scenarios are commonplace inside industrial networks. However, both scenarios create opportunities for individuals with physical access to the unmanaged switches to wreak havoc on your network's operations. The recommended course of action for these scenarios is creating a security policy that explicitly addresses how unmanaged ethernet switches should be secured when connected to a managed switch on the network.



Securing the Unmanaged Switch Vulnerability


The following is a recommendation for a security policy on a managed switch connecting to an unmanaged switch via a switch port.
• Adding a description to the port interface on the managed switch that identifies the adjacent switch
• Statically set the number of MAC addresses that will be allowed to transmit data on the managed port
• Statically configure the MAC addresses transmitting data over the unmanaged switch
• Create a system alert that will send a notification message if a MAC address has changed
• Set port security to "disable" if a new MAC address has been detected
• Enable loop protection
• Disable Spanning Tree


Antaira's Versatile Industrial Ethernet Switches


At Antaira, we offer a diverse range of industrial Ethernet switches, both managed and unmanaged, available in various configurations. Our product line includes low port count 10/100 Fast Ethernet switches to 10Gigabit wide-temperature switches capable of supporting up to 95W of PoE power. Additionally, we provide industrial switches in traditional rack-mount styles and DIN rail mounting configurations. Our industrial switches cover a wide range, from low to high port counts, catering to the simultaneous connection of multiple devices.



All our industrial switches are designed with industrial-grade materials and support up to 10 Gigabit switch ports, ensuring a seamless and high-speed connection. Industrial PoE switches have become essential for modern IP camera systems, and many of our unmanaged switches incorporate this crucial feature. Several models are specifically designed to be powered with low-voltage input (12~55VDC) while still delivering the higher voltages required by PTZ cameras. Antaira's industrial PoE switches boast ample power budgets, enabling the installation of IP cameras at extended distances from a power source. This flexibility proves particularly valuable for outdoor and large-scale surveillance systems.



Managed vs Unmanaged Switches

The primary difference between industrial-managed switches and unmanaged switches lies in how they process data traffic. In an unmanaged switch, a small MAC address table links switch ports to connected edge devices. Any data processed on a switch port is automatically forwarded to all other ports. Due to the lack of management, any device interconnected to the unmanaged switch will receive all forwarded data streams.



In contrast, managed Ethernet switches offer additional layers of security through features like validation, participation, and configurable notification settings that are unavailable on unmanaged switches. Traffic filters, for example, serve as powerful tools to validate communication transmitting through the switch. Validation can range from checking specific MAC addresses to monitoring allowed VLAN access. Managed switches also allow fine-tuned participation, limiting the switch processes to specific tasks, such as forwarding traffic, network redundancy membership, multicast management, or supplying PoE to the edge.



Another significant distinction between managed and unmanaged switches is found in the configurable notification settings. One example of this feature on a managed ethernet switch is the ability to generate alerts when an ethernet cable is disconnected from a switch port.



Industrial Ethernet Switch Security Tips


While most companies have security software or a physical appliance that monitors threat activity through detection services, these cybersecurity technologies might not be enough in today's IoT landscape to protect critical operational equipment from well-excited cyber attacks.



At Antaira, we suggest a comprehensive IoT security plan that creates an additional layer of security at the port's edge. The following are best practices and recommendations to minimize your threat landscape and create that additional security layer.



1. Disable Unused Ports to Reduce the Attack Surface: To prevent industrial Ethernet switches from being hijacked, all unused ports not connected to devices should be disabled. In addition, allocate these ports to a VLAN that is not being utilized for data transmission.



2. Authentication of Switch Ports: Port authentication on managed switches is the best defense against malicious use of a data connection to enter the network. Cameras or any connected device should never be able to exchange data with a switch port until the linked device has provided authentication credentials. MAC address filtering links a statically configured MAC address to a particular switch port, in effect, white-listing authorized MAC addresses to the switch. The industrial switch will prevent a device from connecting to the network if it detects a MAC address not on the list of permitted addresses.

3. Switch Alarm Notifications: The industrial switch you buy should issue an alarm whenever the condition of a port -- whether plugged in or out -- changes according to standard network management and detection protocols. Alarms are received and displayed by the companies' network management systems, promptly responding and informing staff of any effort to interfere with connections.

4. No Dynamic Trunking: An interface can automatically configure itself to function as a trunk with its connected neighbor through dynamic trunk negotiation. Cybercriminals take advantage of this feature by building a trunk containing their own unauthorized device. You should specify the roles that are allocated to your ports to avoid becoming victims of this exploitation and keep them only as access ports, if possible.



5. Software Updates and Patches: To address a specific vulnerability, firmware upgrades, and software, for your industrial switches may be made available frequently or infrequently. Register your industrial switches on the manufacturer's website to receive notifications of all these updates, which need to be downloaded and installed immediately.



6. Passwords and VLANs: Today, almost all cameras sold come with a default username and password. Upon installation, these need to be changed to a much more rigorous password to avoid easy entry by hackers. For additional security on administrator accounts, multi-factor authentication is an excellent move. As with camera password defaults, VLAN 1 is preconfigured on Ethernet switches as the default VLAN. Every hacker is aware of this. While you can’t delete VLAN 1, you can choose not to use it and instead create a new VLAN out of the box. In short, don’t use VLAN 1 for anything. It is also smart to change the management VLAN to prevent unauthorized parties from obtaining a management connection.



7. Control Physical Access to Switches: Sometimes, the most basic advice is the most useful. Lock up your power and industrial switches in a room or closet designated for security, away from employees, customers, or vendors who may be tempted to meddle with them.



8. Be careful with network drops: It is possible for a hacker to take advantage of a network drop in a public lobby or empty conference room. You can prevent unauthorized devices or cloud services from accessing a switch by statically assigning the MAC address of authorized devices to specific switch ports.




Additional Steps


Even the most advanced industrial switch will not stop malicious security attacks. Security is a layered process that is essentially never finished and is always evolving. Besides the above switch-centric security steps, here is a list of other key best practices for securing and protecting your video surveillance network.



1. If connected, isolate the surveillance network from the corporate IP network as both a cybersecurity tactic and to prevent it from consuming valuable bandwidth that may prevent employees from accessing resources. Isolation doesn’t mean creating a new parallel infrastructure, only a subnet that is still consolidated on the main data network. By using strategic isolation, a hacker is prevented from moving from the subnet to the main network. It also makes certain that data transmission through the security subnet is routinely subject to the same cybersecurity inspection, monitoring, and updating as data transmission through the rest of the company's information systems.



2. Establish procedures for changing passwords frequently on secure and require that the root admin password be changed whenever an employee with password access leaves the company or changes roles.



3. Encrypt and password-protect all sensitive video data.



4. Have an administrator test critical infrastructure in your surveillance network for weaknesses by assuming the role of an attacker to launch various types of attacks. Results can then be audited and, if necessary, policies adjusted for improved threat detection and risk mitigation efforts. Many of these tests can be conducted manually, while others are best conducted by an outside cybersecurity firm.



Any Ethernet switch attached to an industrial network is a target for cybercriminals. Ensuring the cybersecurity of a network switch will potentially protect your entire IP surveillance system from access by unauthorized persons with malicious intent. For that reason, only purchase industrial Ethernet switches from reliable, trustworthy manufacturers, and make sure they are installed by a qualified, experienced professional. Low-priced, industrial network switches can only provide a limited amount of security and are highly vulnerable to ransomware attacks anyway. Quality Ethernet switches for your surveillance system are worth the additional upfront costs.



Contact Antaira Today


Your IT team are network technology experts yet may not be familiar with the latest IP video surveillance solutions. Likewise, your security staff knows how to safeguard your people and property but may lack expertise in networking technology. Antaira is the answer. Our tech team can speak both languages, and is focused on bridging the gap between IT and security to help you build a highly reliable, industrial-strength and truly cybersecure IP video surveillance system. Call us at (714) 671-9000 or send us an email at info@antaira.com.



      • Europe

      • Asia

      • Poland

      • Russia

ANTAIRA TECHNOLOGIES, LLC.    |    7660 Dean Martin Dr., Suite 201, Las Vegas, NV 89139    |    TELEPHONE: +1-714-671-9000 (USA)    |    E-MAIL: INFO@ANTAIRA.COM
SITEMAP
© 2022 PRIVACY POLICY
ANTAIRA TECHNOLOGIES, LLC.
7660 Dean Martin Dr., Suite 201, Las Vegas, NV 89139
TELEPHONE: +1-714-671-9000 (USA)
E-MAIL: INFO@ANTAIRA.COM
SITEMAP
© 2022 PRIVACY POLICY