Notifier Cybersecurity Manual
Notifier Cybersecurity Manual
Product Security
This system meets NFPA requirements for operation at 0-49º C/ This system contains static-sensitive components. Always
32-120º F and at a relative humidity 93% ± 2% RH (non-condens- ground yourself with a proper wrist strap before handling any cir-
ing) at 32°C ± 2°C (90°F ± 3°F). However, the useful life of the sys- cuits so that static charges are removed from the body. Use static
tem's standby batteries and the electronic components may be suppressive packaging to protect electronic assemblies removed
adversely affected by extreme temperature ranges and humidity. from the unit.
Therefore, it is recommended that this system and its peripherals Units with a touchscreen display should be cleaned with a dry,
be installed in an environment with a normal room temperature of clean, lint free/microfiber cloth. If additional cleaning is required,
15-27º C/60-80º F. apply a small amount of Isopropyl alcohol to the cloth and wipe
Verify that wire sizes are adequate for all initiating and indicating clean. Do not use detergents, solvents, or water for cleaning. Do
device loops. Most devices cannot tolerate more than a 10% I.R. not spray liquid directly onto the display.
drop from the specified device voltage. Follow the instructions in the installation, operating, and pro-
gramming manuals. These instructions must be followed to avoid
damage to the control panel and associated equipment. FACP
operation and reliability depend upon proper installation.
Precau-D2-11-2017
FCC Warning
WARNING: This equipment generates, uses, and can radi- Canadian Requirements
ate radio frequency energy and if not installed and used in This digital apparatus does not exceed the Class A limits for
accordance with the instruction manual may cause interfer- radiation noise emissions from digital apparatus set out in
ence to radio communications. It has been tested and found the Radio Interference Regulations of the Canadian Depart-
to comply with the limits for class A computing devices pur- ment of Communications.
suant to Subpart B of Part 15 of FCC Rules, which is
designed to provide reasonable protection against such Le present appareil numerique n'emet pas de bruits radio-
interference when devices are operated in a commercial electriques depassant les limites applicables aux appareils
environment. Operation of this equipment in a residential numeriques de la classe A prescrites dans le Reglement sur
area is likely to cause interference, in which case the user le brouillage radioelectrique edicte par le ministere des
will be required to correct the interference at his or her own Communications du Canada.
expense.
HARSH™, NIS™, and NOTI•FIRE•NET™ are all trademarks; and Acclimate® Plus™, eVance®, FlashScan®, FAAST Fire Alarm Aspiration Sensing Technology®,
Honeywell®, Intelligent FAAST®, NOTIFIER®, ONYX®, ONYXWorks®, SWIFT®, VeriFire®, and VIEW® are all registered trademarks of Honeywell International Inc.
Microsoft® and Windows® are registered trademarks of the Microsoft Corporation. Chrome™ and Google™ are trademarks of Google Inc. Firefox® is a registered
trademark of The Mozilla Foundation.
©2019 by Honeywell International Inc. All rights reserved. Unauthorized use of this document is strictly prohibited.
Documentation Feedback
Your feedback helps us keep our documentation up-to-date and accurate. If you have any comments or suggestions about our online
Help or printed manuals, you can email us.
Please include the following information:
• Product name and version number (if applicable)
• Printed manual or online Help
• Topic Title (for online Help)
• Page number (for printed manual)
• Brief description of content you think should be improved or corrected
• Your suggestion for how to correct/improve documentation
Send email messages to:
[email protected]
Please note this email address is for documentation feedback only. If you have any technical issues, please contact Technical
Services.
Disclaimer
In no event shall Honeywell be liable for any damages or injury of any nature or kind, no matter how caused, that arise from the use of
the equipment referred to in this manual.
Strict compliance with the safety procedures set out and referred to in this manual, and extreme care in the use of the equipment, are
essential to avoid or minimize the chance of personal injury or damage to the equipment.
The information, figures, illustrations, tables, and specifications contained in this manual are believed to be correct and accurate as of the
date of publication or revision. However, no representation or warranty with respect to such correctness or accuracy is given or implied
and Honeywell will not, under any circumstances, be liable to any person or corporation for any loss or damages incurred in connection
with the use of this manual.
The information, figures, illustrations, tables, and specifications contained in this manual are subject to change without notice.
In no event shall Honeywell be liable for any equipment malfunction or damages whatsoever, including (without limitation) incidental,
direct, indirect, special, and consequential damages, damages for loss of business profits, business interruption, loss of business informa-
tion, or other pecuniary loss, resulting from any violation of the above prohibitions.
Copyright Notice
Embedded
Gateway
VPN Router
VPN Connection
Internet
Tunnel
Embedded Gateway
VPN connection VPN Router
NFN Network
Tunnel
Internet
VPN Router PRU
Workstation
Secure Network 2
Secure Network 1
PRU NFN Network
Workstation/PC
Gateway
3. You will see information regarding the Code Signing certificate that was used to sign the executable. On the next tab under
Countersignatures, it will list an entry for a timestamping. If this field is blank, no timestamp exists on this code.
4. You may click on View Certificate to display the signature or click on the Advanced tab to display signature details as well.
Windows installer verifies the Digital Signatures of the installer packages before installing. To verify the signature manually, use the
SignTool that comes with Windows SDK or the utility provided by DigiCert available for download at
https://www.digicert.com/util/DigiCertUtil.exe
3.1 NCD
The following Cybersecurity practices are highly recommended for the NCD:
• When connecting VeriFire Tools to the NCD, or connecting the NCD to the NCM, visually inspect the USB and/or RS-232 port
and cables to ensure it has not been tampered with as sensitive information is transmitted over these wires.
3.3 ONYXWORKS-WS
The following Cybersecurity practices are highly recommended for ONYXWORKS-WS
• The operating system should be set to download Windows updates, but not install them. This ensures that the update installation
does not interfere with fire protection. A site-specific plan should be created that allows for the installation of the updates while
minimizing impact to fire protection.
• Workstation software updates should be installed as they become available. A site-specific plan should be created that allows for
the installation of the updated software while minimizing impact to fire protection.
• An anti-virus program should be utilized with this system.
• Installation of any additional software is not recommended by Honeywell and requires the approval of the AHJ. If additional
software is installed, a site-specific risk assessment should be performed to ensure the additional software does not compromise
fire protection. If the additional software can restart the system, a plan must be developed to ensure fire protection is maintained.
• The IT infrastructure utilized for life safety communication should be physically or logically isolated from non-life safety
infrastructure. Examples of such isolation could include a VLAN, VPN, or dedicated network. See Figure 2.1, “VPN Type 1” on
page 9 and Figure 2.2, “VPN Type 3” on page 10.
• Each user of the workstation software should have their own user account so that actions taken by a user can be audited.
• The user accounts should be periodically reviewed to verify that users have the minimum access level required to perform their
duties.
• The workstation database should be backed-up at regular intervals.
3.5 N-WEBPORTAL
The following Cybersecurity practices are highly recommended for the N-WEBPORTAL
• Web portal application software updates should be installed as they become available. A site-specific plan should be created that
allows for the installation of the updated software while minimizing impact to fire protection.
• The IT infrastructure utilized for life safety communication should be physically or logically isolated from non-life safety
infrastructure. Examples of such isolation could include a VLAN, VPN, or dedicated network. See Figure 2.1, “VPN Type 1” on
page 9 and Figure 2.2, “VPN Type 3” on page 10.
3.6 NFC-50/100
The following Cybersecurity practices are highly recommend for the NFC-50/100:
• Install the NFC-50/100 panel in a secure location considering both software and hardware vulnerabilities.
• Change the default password to a unique password.
• Securely configure networks and firewalls.
• Develop a Disaster and Recovery Plan.
• Develop a Backup and Recovery Strategy.
• Install, configure, and maintain anti-virus software on all computers which access the panel.
• Keep the operating system updated and maintain version compatibility with the panel.
• Deliver all required system information upon delivery to the system owner.
• Train end-users on security maintenance tasks upon system delivery.
• For decommissioning, dispose of data securely.
• Ensure the Ethernet cable is removed from the NFC-50/100 when not being utilized for configuration.
3.7 SWIFT
The following Cybersecurity practices are highly recommended when using SWIFT Tools
• When using SWIFT Tools to update the firmware of the gateway or gateway devices, ensure updates are preformed on a
secure/encrypted Wi-Fi Network.
• Ensure the PC running SWIFT Tools has full disk encryption. Full encryption of any backed-up data is also recommended.
• The wireless gateway should be secured in a location which is only accessible to authorized personnel.
• When any SWIFT gateway or device is decommissioned from service, return the equipment to the factory default state.
Warn-HL-08-2009.fm