Device Visualization
Table of Contents
Expand all | Collapse all
-
- Firewall and PAN-OS Support of IoT Security
- IoT Security Prerequisites
- Onboard IoT Security
- Onboard IoT Security on VM-Series Firewalls with Software NGFW Credits
-
- DHCP Data Collection by Traffic Type
- Firewall Deployment Options for IoT Security
- Configure a Pre-PAN-OS 10.0 Firewall with a DHCP Server
- Configure a Pre-PAN-OS 10.0 Firewall for a Local DHCP Server
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Plan for Scaling when Your Firewall Serves DHCP
- Prepare Your Firewall for IoT Security
- Configure Policies for Log Forwarding
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
- IoT Security Integration with Prisma Access
- IoT Security Licenses
- Offboard IoT Security Subscriptions
-
- Introduction to IoT Security
- IoT Security Integration with Next-generation Firewalls
- IoT Security Portal
- Vertical-themed Portals
- Device-to-Site Mapping
- Sites and Site Groups
- Networks
- Reports
- IoT Security Integration Status with Firewalls
- IoT Security Integration Status with Prisma Access
- Data Quality Diagnostics
- IoT Security Integrations with Third-party Products
- IoT Security and FedRAMP
Device Visualization
Organize how to visualize the devices on your network
using device attributes or Purdue levels.
IoT Security monitors and analyzes network traffic to
provide a data-rich, dynamically updated inventory of the devices
on your network. Through its extensive monitoring and analysis of
network activity, IoT Security can also expose communication patterns
among devices of interest by visualizing them in user-defined device
visualization maps. By focusing on different groups of devices and
different facets of the network, trends, patterns, and aberrations
can emerge in the visualization of device communications and in
the relationship between devices and the network segments on which
they operate or—for Operational Technology (OT) devices—between
the OT devices and the Purdue levels to which they’re assigned.

IoT Security provides two methods to group devices for visualization:
by device attributes and by Purdue levels. It also provides the
option to create a map with either one or two layers. That is, you
first organize devices into groups based on a particular attribute,
such as the VLAN they’re in. This results in a set of device groups
organized by VLAN, allowing you to see the distribution of devices
across the different VLANs in your network. So far, this is a one-layer map.
However, if you want, you can also organize the devices within each
VLAN by another attribute such as device profile. Then, by drilling
down into different VLANs, you can enter a second layer of the map
and see the distribution of devices within each VLAN by profile.