SNMP Network Discovery for IoT Security
Table of Contents
Expand all | Collapse all
-
- Authenticate LSVPN Satellite with Serial Number and IP Address Method
- Private Key Export in Certificate Management
- Clone a Snippet
- Security Checks
- GlobalProtect Portal and Gateway
- IP Optimization for Mobile Users - GlobalProtect Deployments
- License Enforcement for Mobile Users (Enhancements)
- Multiple Virtual Routers Support on SD-WAN Hubs
- Native SASE Integration with Prisma SD-WAN
- New Prisma Access Cloud Management Location
- Normalized Username Formats
- PAN-OS Software Patch Deployment
- Policy Analyzer
- Saudi Arabia Compute Location
- Site Template Configuration
- TACACS+ Accounting
- Tenant Moves and Acquisitions
- Traceability and Control of Post-Quantum Cryptography in Decryption
- User Session Inactivity Timeout
-
- FedRAMP High "In Process" Requirements and Activation
- License Activation Changes
- Performance Policy with Forward Error Correction (FEC)
- View and Monitor ZTNA Connector Access Objects
- Software Cut-Through Support for PA-3400 and PA-5400 Series Firewalls
- Persistent NAT for DIPP
- ZTNA Connector Wildcard and FQDN Support for Applications and Additional Diagnostic Tools
-
- 5G Cellular Interface for IPv4
- Advanced WildFire Inline Cloud Analysis
- API Key Certificate
- App Acceleration in Prisma Access
- ARM Support on VM-Series Firewall
- Authentication Exemptions for Explicit Proxy
- BGP MRAI Configuration Support
- Cloud Managed Support for Prisma Access China
- Configuration Audit Enhancements
- Cortex Data Lake (CDL) Logging with CN-Series Firewall
- Device-ID Visibility and Policy Rule Recommendations in PAN-OS
- Dynamic IPv6 Address Assignment on the Management Interface
- Dynamic Routing in CN-Series HSF
- Enhanced IoT Policy Recommendation Workflow for Strata Cloud Manager
- Enhanced SaaS Tenants Control
- Exclude All Explicit Proxy Traffic from Authentication
- Region Support for Strata Logging Service
- GlobalProtect Portal and Gateway Support for TLSv1.3
- IKEv2 Certificate Authentication Support for Stronger Authentication
- Improved Throughput with Lockless QoS
- Increased Device Management Capacity for the Panorama Virtual Appliance
- Inline Security Checks
- Integrate Prisma Access with Microsoft Defender for Cloud Apps
- IoT Security: Device Visibility and Automatic Policy Rule Recommendations
- IOT Security Support for CN-Series
- IP Protocol Scan Protection
- IPSec VPN Monitoring
- Link Aggregation Support on VM-Series
- Maximum of 500 Remote Networks Per 1 Gbps IPSec Termination Node
- New Platform Support for Web Proxy
- New Template Variables
- PA-415-5G Next-Generation Firewall
- PA-450R Next-Generation Firewall
- PA-455 Next-Generation Firewall
- PA-5445 Next-Generation Firewall
- PA-7500 Next-Generation Firewall
- Policy Rulebase Management Using Tags
- Post Quantum IKE VPN Support
- PPPoE Client for IPv6
- Public Cloud SD-WAN High Availability (HA)
- Remote Browser Isolation
- Secure Copy Protocol (SCP) Support
- Security Checks
- Service Connection Identity Redistribution Management
- Service Provider Backbone Integration
- Session Resiliency for the VM-Series on Public Clouds
- Intelligent Security with PFCP for N6 and SGI Use Cases
- SNMP Network Discovery for IoT Security
- Strata Cloud Manager: Application Name Updates
- Support for Cortex Data Lake Switzerland Region
- TACACS+ Accounting
- Throughput Enhancements for Web Proxy
- TLSv1.3 Support for Administrative Access Using SSL/TLS Service Profiles
- Traceability and Control of Post-Quantum Cryptography in Decryption
- Traffic Replication Remote Network and Strata Cloud Manager Support
- VM-Series Device Management
- View and Monitor App Acceleration
- View and Monitor Remote Browser Isolation
- Virtual Routing Forwarding for WAN Segmentation
-
- New Prisma Access Cloud Management Location
- Cortex Data Lake Regional Support
- Integrate Prisma Access with Microsoft Defender for Cloud Apps
- Delete a Snippet
- Create a Custom Path Quality Profile
- High-Bandwidth Private App Access with Colo-Connect
- Refresh Pre Shared Keys for Auto VPN
- New Predefined BGP Redistribution Profile
- Troubleshoot NGFW Connectivity and Policy Enforcement Anomalies
- Cloud IP-Tag Collection
- Web Proxy for Cloud-Managed Firewalls
- Config Version Snapshot
- Log Viewer Usability Enhancements
- Introducing ADEM APIs
- July 2023
-
- High-Bandwidth Private App Access with Colo-Connect
- Traffic Replication and PCAP Support
- Third-Party Device-ID in Prisma Access
- New and Remapped Prisma Access Locations and Compute Locations
- Transparent SafeSearch Support
- Private IP Visibility and Enforcement for Explicit Proxy Traffic Originating from Remote Networks
- Service Provider Backbone Integration
- Cloud Management of NGFWs
- Feature Adoption Dashboard
- Best Practices Dashboard
- Compliance Summary Dashboard
- Security Posture Insights Dashboard
- Advanced Threat Prevention Dashboard
- Custom Dashboard
- Device Health Dashboard
- Incidents and Alerts
- NGFW SDWAN Dashboard
- Capacity Analyzer
- Enhancements to CDSS Dashboard
-
- Conditional Connect Method for GlobalProtect
- Enhanced Split Tunnel Configuration
- Prisma Access Explicit Proxy Connectivity in GlobalProtect for Always-On Internet Security
- Host Information Profile (HIP) Exceptions for Patch Management
- Host Information Profile (HIP) Process Remediation
- License Activation
SNMP Network Discovery for IoT Security
Extend IoT Security coverage deeper into the network by using SNMP to collect device
data from network switches.
To identify devices on the network, IoT Security requires network traffic
metadata for analysis. Palo Alto Networks firewalls extract and log this metadata
when they apply Security policy rules that have logging enabled. The firewalls send
the logs to the logging service. The logging service then streams the metadata to
IoT Security, which uses AI and machine learning to automatically discover and
identify network-connected devices, dynamically construct an asset inventory, detect
device vulnerabilities, and determine a baseline of acceptable network behaviors
that IoT Security recommends next-generation firewalls allow in Device-ID policy
rules.
However, depending on where the firewalls are placed, they might not have
visibility into all network traffic, resulting in device discovery gaps and lower
efficacy in identifying devices, monitoring behaviors, and enforcing Device-ID
rules. When firewalls don’t receive traffic from all devices, they can still gather
IP address-to-MAC address bindings and additional network data by using SNMP to
query switches and other forwarding devices throughout the network.
When using SNMP to query network switches, firewalls first develop a
network topography by requesting the Link Layer Discovery Protocol (LLDP) neighbors
and Cisco Discovery Protocol (CDP) neighbors of one switch (the entry point switch)
and then repeating the request with neighboring switches and child switches one by
one throughout the network. After obtaining a list of switches throughout the
network, or within a limited area of the network, the firewalls next query each one
for its ARP table as well as other information. The ARP table contains the IP
address-to-MAC address binding information for the devices connected through the
switch to the network. Other device details for which firewalls query include the
physical interfaces or ports on the switch to which devices connect, their VLANs and
subnets, and DHCP and DNS server IP addresses. After the firewalls receive this
information, they create logs and send them through the logging service to IoT
Security for analysis. By using SNMP to collect more data from switches and
forwarding devices in parts of the network that firewalls don’t have visibility
into, you enable IoT Security to form a greater view of the devices on the network
and expand its services to even more devices.