Network Security
Manage Device-ID
Table of Contents
Expand All
|
Collapse All
Network Security Docs
Manage Device-ID
Ensure your policy rule recommendations and device objects are current and delete
imported rules when they are no longer needed.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Perform the following tasks to ensure your policy rule recommendations and device
objects are current.
- Update your policy rule recommendations.As IoT devices gain new capabilities, Device Security updates its policy rule recommendations to advise what additional traffic or protocols firewalls should allow. Periodically check policy rule recommendations for profiles with recommendations you have previously imported (Device or PanoramaPolicy RecommendationIoT). If there are additional ones without an entry in the Imported To column, they have not been imported to the rulebase yet. Assess your security needs and consider importing these recommendations to the Security policy rulebase as described in Configure Device-ID.Review, update, and maintain the device objects in the device dictionary.Create device objects for any devices that don’t have an Device Security policy rule recommendation. For example, you can’t secure traditional IT devices such as laptops and smartphones using Device Security policy rule recommendations, so you must create device objects for these types of devices and use them in your Security policy rules to secure these devices.
- Select ObjectsDevices.Add a device object.Browse the list or Search using keywords.The search results can include multiple types of device object attributes (for example, both Category and Profile).To add a custom device object, enter a Name and optionally a Description for the device object.Always use a unique name for each device object. Don’t change the tags in the description for device objects from policy rule recommendations.(Panorama only) Select the Shared option to make this device object available to other device groups.Select the attributes for the device object (Category, OS, Profile, Osfamily, Model, and Vendor).Click OK to confirm your changes.Delete any policy rule recommendations that you no longer need.If you no longer need some imported policy rules, you can remove them from the rulebase.
- Select PoliciesSecurity. For Panorama, select PoliciesSecurityPre-Rules/Post-Rules.
- Select the rules you want to remove from the rulebase and then Delete them.
- Commit your changes.When you look at policy rule recommendations after deleting their corresponding rules from the rulebase, the Imported To column is now empty for them.
Use CLI commands to troubleshoot any issues between the firewall and Device Security.