PROTECTION OF TECHSON NETWORK ENDPOINTS

2024. 08. 05.
IT tools

To protect their valuables, people typically lock their doors when leaving their home. So why leave a network unprotected? Neglecting security measures can lead to significant risks, as unsecured endpoints pose a considerable threat. The Techson range of secured switches provides an effective solution to this issue.

PROTECTION OF TECHSON NETWORK ENDPOINTS

Why is endpoint protection crucial for a network?

Security devices connected to a system are usually located at the physical boundaries of the network. Surveillance devices, cameras in particular, are often installed at locations which are publicly accessible. As these devices are connected to the network in an active and permanent manner; they increase the risk of unauthorized access to the system.

Attackers often try to break into a network through the cables of the surveillance camera system, or they might as well remove the camera and try to obtain access to the network by attaching a laptop to the endpoints exposed this way. If there is no access control on a network, the information accessible to an unauthorized user will only depend on the "right software" used. Sensitive information can also be exposed, as it is not merely the security devices that become accessible, but all network devices or resources as well, including the router, servers or the access control system. Free endpoints include all wall mounted LAN sockets, a freely accessible switch or simply an internet cable coming from a CCTV camera.

The Professional CCTV and Secure Endpoints

Another option for an attacker is the use of "bridging" device to carry out a so-called man-in-the-middle attack.

Techson

There are a number of ways for preventing such attempted attacks:

  • Blocking physical access, complete exclusion by means of a fence, or tamper protection.
  • Connected devices have to validate themselves on the network before they gain access to any network resources, so only validated devices can communicate with one another.
Techson

The intelligent cameras of the Techson SmartView series support authentication based on a user name and a password. This is the 802.1x protocol.

The Techson Protected Switch

IEEE 802.1x port-based network access control provides secure authentication to the devices connected to the network. Any device trying to connect to the network will be automatically rejected if it fails to comply during the authentication process. The 802.1x network differs from a home network in terms of an important aspect, namely in that it has an authentication server, called the RADIUS server. This verifies user data to make sure that the given user is an active member of the given organization, and it grants access to users on various levels of authorization, depending on the rules of the network. In our case the users are the cameras themselves, or other connected devices.

IEEE 802.1x is a standard issued by the Institute of Electrical and Electronics Engineers Standards Association. This organization within IEEE, establishes standards for a wide range of industries, including the energy sector, medical biology, health care, information technology, telecommunication, transportation, nanotechnology or information security.

The application of standards, which serve for the protection of network endpoints, has also appeared in the range of devices used by small-sized companies or households. These were formerly used only by large organisations, giant enterprises, universities and hospitals, but driven by the reasonable demand for cyber security, they are nowadays used by small companies and private persons as well.

What makes a network secure?

The 802.1x protocol contains three major components:

    • Client is the name of the component that intends to gain access to network resources. In the given case, this is a surveillance camera.
    • Authenticator is the name of the of the component that verifies whether a client is authorized to gain access to the network resources. Most of the time this is a managed switch of at least Layer 2 level. The Techson TCS LGP08 2GS 10-port protected switch is an excellent choice for this purpose.

Techson

  • The device that manages the authentication process in effect is called an authentication server. This contains all the information and databases, on the basis of which it can be decided whether a client is allowed to gain access to the network resources.
    Typically, this is a server that supports the RADIUS protocol, which ensures central authentication, authorization and accounting.
    • - Authentication
    • - Authorization
    • - Accounting
  • EAP (Extensible Authentication Protocol) is the authentication protocol used in encrypted networks, which is a secure method for sending identification information for authentication in the network.