IoT Security Administrator’s Guide
Table of Contents
Where to Begin with IoT Security
IoT Security Solution Structure | See what IoT Security does and how to set it up to integrate with next-generation firewalls. | IoT Security Solution Structure |
IoT Security Solution Setup | ||
Prerequisites | Find out what's required to use IoT Security at its full potential. | Firewall and PAN-OS Support of IoT Security |
IoT Security Prerequisites | ||
Onboard IoT Security | Activate your IoT Security license and subscribe firewalls to its services. | Onboard IoT Security |
Prepare Your Firewall for IoT Security | Deploy your firewall to collect network traffic metadata and forward logs that IoT Security requires. | Firewall Deployment for DHCP Visibility |
Prepare Your Firewall for IoT Security | ||
Configure Policies for Log Forwarding | ||
Introduction to IoT Security | Learn about IoT Security functionality and management. | IoT Security Overview |
Featured Topics
Onboard IoT Security
See instructions for the IoT onboarding process.
IoT Security Integration with Next-generation Firewalls
See how IoT Security integrates with Strata Logging Service and next-generation firewalls using Device-ID.
Medical IoT
View the operational analytics of your medical IoT devices and maximize their use.