IoT Security
Network Visualizations
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
-
-
- Firewall Deployment Options for IoT Security
- Use a Tap Interface for DHCP Visibility
- Use a Virtual Wire Interface for DHCP Visibility
- Use SNMP Network Discovery to Learn about Devices from Switches
- Use Network Discovery Polling to Discover Devices
- Use ERSPAN to Send Mirrored Traffic through GRE Tunnels
- Use DHCP Server Logs to Increase Device Visibility
- Control Allowed Traffic for Onboarding Devices
- Support Isolated Network Segments
-
Network Visualizations
Organize how to visualize the devices on your network
using device attributes or Purdue levels.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
IoT Security monitors and analyzes network traffic to provide a
data-rich, dynamically updated inventory of the devices on your network. Through its
extensive monitoring and analysis of network activity, IoT Security can also
expose communication patterns among devices of interest by visualizing them in
user-defined network visualization maps. By focusing on different groups of devices and
different facets of the network, trends, patterns, and aberrations can emerge in the
visualization of device communications and in the relationship between devices and the
network segments on which they operate or—for Operational Technology (OT)
devices—between the OT devices and the Purdue levels to which they’re assigned.
IoT Security provides various methods to group devices for visualization:
by device attributes such as subnet, VLAN, vendor, category and profile, and by Purdue
level. It also provides the option to create visualization maps with either one or two
layers. That is, you first organize devices into groups based on a particular attribute,
such as the VLAN they’re in. This results in a set of device groups organized by VLAN,
allowing you to see the distribution of devices across the different VLANs in your
network. So far, this is a one-layer map. However, if you want, you can also organize
the devices within each VLAN by another attribute such as device profile. Then, by
drilling down into different VLANs, you can enter a second layer of the map and see the
distribution of devices within each VLAN by profile.