Firewall and PAN-OS Support of IoT Security
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Network Segments Configuration
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- Authorize On-demand PCAP
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Firewall and PAN-OS Support of IoT Security
IoT Security support varies by firewall model and PAN-OS
version.
For Palo Alto Networks next-generation
firewalls running PAN-OS 8.1, PAN-OS 9.0, or PAN-OS 9.1, the IoT
Security solution provides visibility of discovered IoT devices based
on the logs it receives from the firewall. IoT Security also uses
machine learning (ML) to identify vulnerabilities and assess risk
in devices based on their network traffic behaviors and dynamically
updated threat feeds. Although these PAN-OS versions don’t support
automated policy enforcement of IoT devices through the Device-ID™ framework, which
is available from PAN-OS 10.0, you can still use the policy rule recommendations that
IoT Security generates as a reference when manually adding rules
to your firewalls. IoT Security always generates Security policy
rule recommendations regardless of the PAN-OS version.
Firewalls running PAN-OS 10.0 or later automate policy enforcement
through Device-ID. This is a mechanism that identifies devices by
attributes such as device type, vendor, model, or operating system
and then applies device-based policy rules to those with matching
attributes.
All Palo Alto Networks next-generation firewalls running PAN-OS
10.0 or later fully support IoT Security with the following exceptions.
IoT device visibility and the manual application of policy recommendations
but not Device-ID
- Multi Virtual System (multi-vsys) firewalls
- PA-200 with PAN-OS 8.1
- PA-500 with PAN-OS 8.1
- PA-3020 with PAN-OS 8.1, PAN-OS 9.0, or PAN-OS 9.1
- PA-3050 with PAN-OS 8.1, PAN-OS 9.0, or PAN-OS 9.1
- PA-3060 with PAN-OS 8.1, PAN-OS 9.0, or PAN-OS 9.1
- PA-5020 with PAN-OS 8.1
- PA-5050 with PAN-OS 8.1
- PA-5060 with PAN-OS 8.1
No IoT Security support
- CN-Series firewalls before PAN-OS 11.1
- VM-50
- VM-200
When choosing firewalls to subscribe to IoT Security services,
consider the type of IoT Security functionality they support. Another
factor to consider is when various firewall models will reach the end of sales and service support and
when you plan to update them to newer models. However, even if you
subscribe a firewall to IoT Security and then decide to retire it
while its IoT Security license still has time remaining, you can transfer the license from
that firewall to another one where IoT Security will continue to operate
for the remainder of its subscription period.