By extending DHCP traffic visibility further
into your network, you can now discover and monitor even more devices
than ever. IoT Security employs multiple methods to detect and monitor
network activity and correlate it to individual devices. A particularly
useful method is the examination of DHCP traffic, which allows IoT
Security to associate dynamically assigned IP addresses with device MAC
addresses and then add these devices to its inventory and track
their network behavior. When it’s difficult to route DHCP traffic
in certain areas of the network to or through a firewall, there
can be gaps in the coverage that IoT Security provides. To improve
visibility into DHCP traffic that otherwise wouldn't reach the firewall,
you can configure DHCP servers to send
the firewall their server logs as syslog messages. The firewall
then forwards the logs through the logging service to IoT Security. |