Skip to main content
🎀 Speaking at KubeCon EU 2026 Lessons Learned Orchestrating Multi-Tenant GPUs on OpenShift AI View Session
🎀 Speaking at Red Hat Summit 2026 GPUs take flight: Safety-first multi-tenant Platform Engineering with NVIDIA and OpenShift AI Learn More
CRA Requirements for Network Equipment: Routers, Switches, and Firewalls
DevOps

CRA for Network Equipment and Firewalls

Network equipment faces strict CRA requirements under Important Products Class I and II. What manufacturers of routers, switches, and firewalls must implement.

LB
Luca Berton
Β· 2 min read

Network Equipment Under the CRA

Routers, switches, and firewalls face some of the strictest CRA requirements. Network equipment is the backbone of connectivity β€” a vulnerability here affects every device behind it.

Classification

EquipmentCRA ClassStandard
Consumer routers/modemsImportant Class IEN 304 627
Physical/virtual network interfacesImportant Class IEN 304 625
Firewalls, IDS/IPSImportant Class IIEN 304 636
Telecom network functionsCriticalEN 304 642

Key Requirements for EN 304 627 (Routers/Switches)

Authentication and Access Control

  • No default credentials β€” unique per-device or user-set on first boot
  • Strong password requirements β€” minimum complexity enforcement
  • Encrypted management interfaces β€” HTTPS/SSH only, no telnet/HTTP
  • Failed login protection β€” account lockout or progressive delays

Firmware Security

βœ… Signed firmware updates (cryptographic verification)
βœ… Secure boot chain (prevent unauthorized firmware)
βœ… Rollback protection (prevent downgrade attacks)
βœ… Automated update notification (inform users of available patches)
βœ… OTA update capability (remote patching without physical access)

Network Security

  • Default firewall rules β€” deny inbound by default
  • No unnecessary services β€” UPnP, WPS disabled by default
  • DNS-over-HTTPS/TLS β€” encrypted DNS as default
  • Network segmentation β€” VLAN/guest network support

Data Protection

  • Encrypted storage β€” credentials, certificates, and configuration
  • Factory reset β€” complete data wipe capability
  • Minimal data collection β€” collect only what’s needed for operation

For Firewall/IDS Manufacturers (Class II)

EN 304 636 adds requirements:

  • Detection efficacy testing β€” documented detection rates for known attacks
  • Rule update mechanism β€” secure, signed, and verified
  • Logging integrity β€” tamper-evident security logs
  • High availability β€” security device failure must not create security gaps

The Telecom Challenge (Critical Products)

Network functions for telecom (EN 304 642) face the highest bar:

  • Mandatory EU-type examination (third-party certification)
  • Continuous monitoring and assessment
  • Coordinated with existing telecom regulations (EECC)

Practical Checklist

For router/switch manufacturers:

  • Eliminate all default passwords
  • Implement signed firmware updates
  • Enable HTTPS-only management interface
  • Generate SBOM for all firmware components
  • Disable unnecessary services by default
  • Document security update support period (min 5 years)
  • Establish vulnerability disclosure process
  • Prepare technical documentation for conformity assessment

Manufacturing network equipment for the EU market? I help organizations prepare for CRA compliance. Get in touch.

Luca Berton Ansible Pilot Ansible by Example Open Empower K8s Recipes Terraform Pilot CopyPasteLearn ProteinLens TechMeOut