Devices with Overlapping IP Addresses
Focus
Focus
Device Security

Devices with Overlapping IP Addresses

Table of Contents

Devices with Overlapping IP Addresses

Device Security uses network segments to detect and learn about devices that share an overlapping IP address.
Where Can I Use This?What Do I Need?
  • Device Security (Managed by Strata Cloud Manager)
  • (Legacy) IoT Security (Standalone portal)
One of the following subscriptions:
  • Device Security subscription for an advanced Device Security product (Enterprise, OT, or Medical)
  • Device Security X subscription
Overlapping IP addresses, also known as shared IP blocks, occur when an IP CIDR block is reused across different networks. In industries where each site operates independently, such as retail or manufacturing plants, a shared IP block can exist at multiple sites. Other common use cases for overlapping IP addresses include guest networks, or local resources that don't need enterprise-wide access. In these scenarios, devices using shared IP blocks don't communicate with other devices using the same shared IP block.
Device Security uses network segments to identify when there are overlapping IP addresses because multiple networks are using a shared IP block. A network segment is an association of one or more firewalls that is assigned to a site. Each firewall can only be assigned to one network segment, and each network segment can only be assigned to one site. This helps Device Security distinguish devices with overlapping IP addresses, based on what firewall and IP address the traffic is coming from.
Because Device Security relies on a combination of both network segment and IP address block assignments to a site, you must use IP address-based site assignment to support device identification when there are overlapping IP addresses. Deployments that use firewall-based site assignment cannot use network segments.
Using a combination of IP address and network segment, Device Security identifies distinct devices within overlapping IP blocks that different firewalls observe and creates more accurate IP address-to-MAC address bindings. THis improves the completeness of the asset inventory by accurately representing the unique devices, their attributes, and behaviors within each shared IP block. Additionally, by matching traffic from overlapping IP addresses to the correct devices, Device Security creates a more accurate behavior baseline for both devices and profiles. In turn, an accurate behavior baseline provides higher confidence in risk assessments and policy recommendations, while reducing false positives due to inaccurate anomaly detections.
To support identification of devices in a network with shared IP block groups, add and manage network segment configurations.