According to cybersecurity research, a significant percentage (e.g., 30%) of network-connected devices in typical enterprises are Internet of Things (IoT) devices. This presents a growing attack surface. Device-ID on Palo Alto Networks firewalls helps address this risk by providing device context for network events, enabling device-based policy rules, offering policy recommendations, and enforcing security based on those recommendations.
Similar to how User-ID enables user-based policies and App-ID enables application-based policies, Device-ID enables policies based on the device itself, regardless of IP address or location changes. This traceability provides valuable context for network events and allows for more precise security controls.
Device-ID can be used in Security, Decryption, Quality of Service (QoS), and Authentication policy rules.
This diagram shows how the IoT Security subscription enables the Device-ID feature by analyzing logs to identify devices and recommend policies, which are then used by the firewall/Panorama.
To use Device-ID features on a firewall, you must purchase an IoT Security subscription and select the firewall during the IoT Security onboarding process. Two subscription types exist:
Both subscriptions provide the same core IoT Security analysis and Device-ID functionality. Additionally:
When importing policy recommendations or mappings, the firewall/Panorama validates the IoT Security edge server certificate via OCSP checks (HTTP, TCP port 80) to
*.o.lencr.org
and
x1.c.lencr.org
.
IoT Security classifies devices using metadata from logs, network protocols, and sessions. It assigns up to six attributes:
Attribute | Example |
---|---|
Category | Printer |
Profile | Sharp Printer |
Model | MX-6070N |
OS Version | ThreadX 5 |
OS Family | ThreadX RTOS |
Vendor | SHARP Corporation |
DHCP traffic visibility (via DHCP server logs, DHCP relay config, VLAN/L3 on L2 interface, SPAN/ERSPAN, or virtual wire) is crucial for accurately mapping dynamic IP addresses to devices.
Imported rules are tagged (e.g.,
NetworkDevice - TrendNet
,
IoTSecurityRecommended
). Do not remove these tags, as they are used for mapping synchronization.
Before configuring Device-ID, ensure the following prerequisites are met:
Device > Licenses > Retrieve license keys from license server
).
Device > Setup > Services > Service Route Configuration
) to use specific data interfaces for:
paloalto-iot-security
to the appropriate regional IoT edge service FQDN (see tables below).
paloalto-shared-services
,
paloalto-logging-service
, and
paloalto-updates
to the logging service and update server FQDNs (or use an existing trusted outbound rule).
Note: PAN-OS 10.0.3+ typically discovers the correct regional FQDN automatically. Manual configuration might be needed for 10.0.0-10.0.2 if not in the US region.
Purpose | Address/FQDN | TCP Port |
---|---|---|
Regional FQDN Discovery (PAN-OS 10.0.3+) |
enforcer.iot.services-edge.paloaltonetworks.com
|
443 |
Receive Policy Recommendations & Mappings (Regional Endpoints) |
iot.services-edge.paloaltonetworks.com
(US)
ca.iot.services-edge.paloaltonetworks.com
(Canada)
eu.iot.services-edge.paloaltonetworks.com
(EU)
apac.iot.services-edge.paloaltonetworks.com
(APAC)
jp.iot.services-edge.paloaltonetworks.com
(Japan)
au.iot.services-edge.paloaltonetworks.com
(Australia)
|
443 |
Download Device Dictionary Files |
updates.paloaltonetworks.com
|
443 |
Forward Logs to Logging Service / Cortex Data Lake | Refer to Cortex Data Lake documentation for required FQDNs/ports based on region. | |
OCSP Check for Server Cert Validation |
*.o.lencr.org
x1.c.lencr.org
|
80 (HTTP) |
After preparation, configure Device-ID by importing recommendations:
Policies > Security
) - check source device, destination, application, action, description, and tags.
Objects > Devices > Add
) for devices not covered by IoT recommendations (e.g., laptops, servers). Define by Category, Profile, Model, OS, Vendor as needed.
Maintain your Device-ID deployment:
Objects > Devices
as needed.
Policy Recommendation > IoT > Remove Policy Mapping
).
Policies > Security
).
Use these CLI commands on the firewall to view information for troubleshooting:
Note: Commands with
eal
generally show outgoing data counters (to Logging Service/CDL), while commands with
icd
show incoming data counters (from IoT Security).
Command | Description |
---|---|
show iot eal all
|
View overall Enhanced Application Logging (EAL) counters. |
show iot eal conn
|
View connection details between firewall and Logging Service/CDL. |
show iot eal dpi-eal
|
View EAL counters summary by plane (DP/MP). |
show iot eal dpi-stats all
|
View EAL counters by plane and protocol. |
show iot eal dpi-stats subtype
|
View EAL counters for a specific protocol. |
show iot eal hipreport-eal
|
View HIP Match report EAL counters summary. |
show iot eal response-time
|
View EAL log response time counters. |
show iot icd statistics all
|
View overall IoT Cloud Daemon (ICD) stats (connection health, mappings, recommendations). |
show iot icd statistics conn
|
View ICD connection counters to the IoT edge service. |
show iot icd statistics verdict
|
View ICD IP-to-device mapping counters. |
show iot ip-device-mapping-mp all
|
View all IP-to-device mappings on the management plane. |
show iot ip-device-mapping-mp ip
|
View mapping for a specific IP on the management plane. |
show iot ip-device-mapping all
|
View IP-to-device mappings on the data plane. |
debug iot clear-all type device
|
Clear IP-to-device mappings on the management plane. |
clear user-cache all
|
Clear user/device mappings on the data plane (use with caution). |