Device-ID Overview

According to the 2020 Unit 42 IoT Threat Report , 30% of all network-connected devices in an average enterprise are IoT . This presents a constantly growing area of risk with many possibilities for exploitation by malicious users. Additionally, once you identify these devices, how do you secure them from vulnerabilities such as outdated operating software? Using Device-ID™ on your firewalls, you can get device context for events on your network, obtain policy rule recommendations for those devices, write policy rules based on devices, and enforce Security policy based on the recommendations.

Similar to how User-ID provides user-based policy rules and App-ID provides app-based policy rules, Device-ID provides policy rules that are based on a device , regardless of changes to its IP address or location. By providing traceability for devices and associating network events with specific devices, Device-ID lets you gain context for how events relate to devices and adds policy rules that are associated with devices, instead of users, locations, or IP addresses, which can change over time. You can use Device-ID in Security, Decryption, Quality of Service (QoS), and Authentication policies.

For Device-ID features to be available on a firewall, you must purchase an IoT Security subscription and select the firewall during the IoT Security onboarding process . There are two types of IoT Security subscriptions:

With the first subscription, firewalls send data logs to the logging service , which streams them to IoT Security for analysis and to a Cortex Data Lake instance for storage. The data lake instance can either be a new or existing one. With the second subscription, firewalls send data logs to the logging service, which streams them to IoT Security for analysis but not to a Cortex Data Lake instance for storage. It’s important to note that both IoT Security and IoT Security (DRDL) subscriptions provide the same functionality in terms of IoT Security and Device-ID.

To permit connections to IoT Security, a firewall needs a device license ; and to permit connections to the logging service, it needs a logging service license . A firewall also requires a device certificate to authenticate itself when connecting to IoT Security and the logging service.

If you use PAN-OS version 10.0 or later, you can use Device-ID to obtain IP address-to-device mappings to view device context for network events, use IoT Security to obtain policy rule recommendations for these devices, and gain visibility for devices in reports and the ACC.

You can create a device-based Security policy on any Panorama or firewall that uses PAN-OS version 10.0 or later . To enforce the Security policy, the device must have a valid IoT Security license.

To identify and classify devices, the IoT Security app uses metadata from logs, network protocols, and sessions on the firewall. This does not include private or sensitive information or data that is not relevant for device identification. Metadata also forms the basis of the expected behavior for the device, which then establishes the criteria for the policy rule recommendation that defines what traffic and protocols to allow for that device.

When a firewall imports Security policy rule recommendations and IP address-to-device mappings from IoT Security, the firewall sends its device certificate to an edge server to authenticate itself. The edge server authenticates itself to the firewall by sending its own certificate. The firewall uses Online Certificate Status Protocol (OCSP) to validate the server’s certificate by checking it against the following sites using HTTP on TCP port 80:

Panorama performs the same check to validate the edge server’s certificate when Panorama imports policy rule recommendations from IoT Security.

After IoT Security identifies and classifies the devices in your network using the Palo Alto Networks firewalls already there—so you don’t have to implement new devices or third-party solutions—Device-ID can leverage this data to match devices with policy rules and provide device context for network events. Through the visibility that the firewall or Panorama provides for traffic, apps, users, devices, and threats, you can instantly trace network events back to individual devices and obtain Security policy rule recommendations for securing those devices.

All firewall platforms that support PAN-OS 10.0 also support Device-ID and IoT Security with the exception of the VM-50 series, VM-200, and the CN series.

There are six levels of classification (also known as attributes) for devices:

Attribute Example
Category Printer
Profile Sharp Printer
Model MX-6070N
OS Version ThreadX 5
OS Family ThreadX RTOS
Vendor SHARP Corporation

To obtain policy rule recommendations for devices in your network, the firewall observes traffic to generate Enhanced Application logs (EALs) . The firewall then forwards the EALs to the logging service. IoT Security receives logs from the logging service for analysis, provides IP address-to-device mappings, and generates the latest policy rule recommendations for your devices. Using IoT Security, you can review these policy rule recommendations and create a set of Security policy rules for these devices. After you activate the policy rules in IoT Security, import them to the firewall or Panorama and commit your Security policy.

To identify devices with dynamically assigned network settings, the firewall must be able to observe DHCP broadcast and unicast traffic on your network. IoT Security also supports static IP devices. The more traffic the firewall can observe, the more accurate the policy rule recommendations are for the device and the more rapid and accurate the IP address-to-device mappings are for the device. When a device sends DHCP traffic to obtain its network settings, the firewall observes this type of request and generates EALs to send to the logging service, where IoT Security accesses them for analysis.

To observe traffic on an L2 interface, you must configure a VLAN for that interface. By allowing the firewall to treat the interface as an L3 interface for a DHCP relay, it can observe the DHCP broadcast traffic without impacting traffic or performance.

Because the firewall needs to both detect the devices based on their traffic and then enforce Security policy for those devices, the firewall acts as both a sensor to collect metadata from devices and an enforcer by enforcing your Security policy for the devices. IoT Security automatically detects new devices as soon as they send DHCP traffic and can identify 95% of devices within the first week.

05-19-2025-diagram_1

Conceptual data flow illustrating how firewalls act as sensors and enforcers, sending logs to the Logging Service/Cortex Data Lake and IoT Security, which then provides policy recommendations and device mappings back to the firewall.

05-19-2025-diagram_2

Workflow illustrating the Device-ID process from device traffic observation to policy enforcement.

Each application has an individual recommendation that automatically gets pushed to the firewall or Panorama as a rule when you activate its Security policy rule set in IoT Security. After you import a policy rule recommendation into the Security policy rulebase , the firewall or Panorama creates at least two objects to define the device behavior from the recommendation:

If any of the device objects already exist on the firewall or Panorama, the firewall or Panorama updates the device object instead of creating a new one. You can use these device objects in Security, authentication, decryption, and Quality of Service (QoS) policy rules.

Additionally, the firewall assigns two tags to each rule:

Because the tags that the firewall assigns to the rule are the only way to restore your mappings if they become out of sync, do not edit or remove them.

For optimal deployment and operation of Device-ID, we recommend the following best practices:

Key takeaways for PCNSE/PCNSA: Understand the core function of Device-ID (device-based policy), its reliance on IoT Security subscription, required licenses/certificates, minimum PAN-OS version (10.0+), how it classifies devices (attributes), the role of EALs and the Logging Service, the sensor/enforcer model, and the importance of DHCP visibility. Be aware of incompatible platforms (VM-50, VM-200, CN series) and the caveats about not editing/removing tags.

Prepare to Deploy Device-ID

To prepare your network for Device-ID deployment, complete the following predeployment tasks to enable your firewall to generate and send Enhanced Application logs (EALs) through the logging service to IoT Security for processing and analysis.

  1. If you have not already done so, install a device certificate on your firewall or Panorama .

The device certificate authenticates the firewall when connecting to the logging service and IoT Security.

If you use Panorama to manage multiple firewalls, Palo Alto Networks strongly recommends upgrading all firewalls in your Device-ID deployment to PAN-OS 10.0 or later. If you create a rule that uses Device as a match criteria and Panorama pushes the rule to a firewall that uses PAN-OS 9.1 or an earlier version, the firewall omits the Device match criteria because it is not supported, which might cause issues with policy rule traffic matching.

  1. Install a device license and a logging service license on your firewalls.

To do this, click Device > Licenses , and then select Retrieve license keys from license server in the License Management section. This installs the licenses for the logging service and IoT Security on the firewall.

  1. ( L2 interfaces only ) Create a VLAN interface for each L2 interface so the firewall can observe the DHCP broadcast traffic.
  2. ( Optional ) Configure service routes to allow the necessary traffic for Device-ID and IoT Security.

By default, the firewall uses the management interface. To use a different interface, complete the following steps.

    1. If necessary, configure the data interface you want to use as the source interface for required IoT Security communications.
    2. Select Device > Setup > Services > Service Route Configuration and then select Customize .
    3. On the IPv4 tab, select Data Services and then choose the data interface you want to use as the Source Interface.

Its IP address autofills the Source Address field. This service route is for forwarding enhanced application logs (EALs) to the logging service.

Device-ID and IoT Security do not support IPv6.

    1. Click OK .
    2. Click IoT , choose the same data interface as the Source Interface, and then click OK .

This service route is for pulling IP address-to-device mappings and policy recommendations from IoT Security.

    1. Click Palo Alto Networks Services , choose the same data interface, and then click OK .

This service route is for forwarding other logs besides EALs to the logging service and for pulling device dictionary files from the update server.

    1. Click OK to save your configuration changes.
  1. ( Optional ) If you created service routes in the previous step, add Security policy rules permitting services required for the firewall to use IoT Security.
    1. Select Policies > Security > + Add .
    2. On the General tab, enter a name for the Security policy rule and choose interzone as the Rule Type.
    3. On the Source tab, select Any as the source zone and then Add 127.168.0.0/16 as the source address.
    4. On the Destination tab, Add the destination zone with IoT Security, and Add the edge services FQDN for your region as the destination address.
    5. On the Application tab, Add paloalto-iot-security .

The firewall uses this application to pull IP address-to-device mappings and policy recommendations from IoT Security.

    1. On the Actions tab, choose Allow and then click OK .
    2. If you have an intranet policy rule that allows all intranet traffic in the zone where the logging service and update server are, you can use that rule to allow the firewall to forward logs to the logging service and pull dictionary files from the update server.

Otherwise, create an intranet policy rule that allows the firewall to send these three applications to the logging service and update server from the IP address of the firewall interface in the same zone:

  1. If there’s a third-party firewall between the internet and Panorama and Panorama-managed next-generation firewalls, make sure it allows the necessary traffic for Device-ID and IoT Security.
Purpose Address TCP Port
( PAN-OS versions 10.0.3 and later ) Receive the regional FQDN allowing next-generation firewalls to retrieve IP address-to-device mappings and policy rule recommendations from IoT Security. enforcer.iot.services-edge.paloaltonetworks.com 443
( PAN-OS versions 10.0.0 and later ) Let next-generation firewalls receive policy rule recommendations and IP address-to-device mappings from IoT Security. United States: iot.services-edge.paloaltonetworks.com
Canada: ca.iot.services-edge.paloaltonetworks.com
EU region: eu.iot.services-edge.paloaltonetworks.com
Asia-Pacific region: apac.iot.services-edge.paloaltonetworks.com
Japan: jp.iot.services-edge.paloaltonetworks.com
Australia: au.iot.services-edge.paloaltonetworks.com
443
( PAN-OS versions 10.0.0 and later ) Let next-generation firewalls download device dictionary files from the update server. updates.paloaltonetworks.com 443
( PAN-OS versions 10.0.0 and later ) Let Panorama send queries for logs to the logging service. United States: iot.services-edge.paloaltonetworks.com
Canada: ca.iot.services-edge.paloaltonetworks.com
EU region: eu.iot.services-edge.paloaltonetworks.com
Asia-Pacific region: apac.iot.services-edge.paloaltonetworks.com
Japan: jp.iot.services-edge.paloaltonetworks.com
Australia: au.iot.services-edge.paloaltonetworks.com
443
( IoT Security subscription + Cortex Data Lake ) Forward logs to Cortex Data Lake. See TCP Ports and FQDNs Required for Cortex Data Lake .
  1. PAN-OS versions 10.0.0 - 10.0.2 connect to the edge services FQDN in the Americas region by default ( iot.services-edge.paloaltonetworks.com ). For firewalls running these PAN-OS versions to connect to the edge services FQDN in other regions, you must manually configure it (see the FQDNs in the next step). For PAN-OS versions 10.0.3 and later, firewalls automatically discover the correct FQDN to use based on the region set during the IoT Security onboarding process. There is no need to set it manually.
  2. If there’s a third-party firewall between the internet and next-generation firewalls (without Panorama), make sure it allows the necessary traffic for Device-ID and IoT Security.
Purpose Address TCP Port
( PAN-OS versions 10.0.3 and later ) Receive the regional FQDN allowing next-generation firewalls to retrieve IP address-to-device mappings and policy rule recommendations from IoT Security. enforcer.iot.services-edge.paloaltonetworks.com 443
( PAN-OS versions 10.0.0 and later ) Let next-generation firewalls receive policy rule recommendations and IP address-to-device mappings from IoT Security. United States: iot.services-edge.paloaltonetworks.com
Canada: ca.iot.services-edge.paloaltonetworks.com
EU region: eu.iot.services-edge.paloaltonetworks.com
Asia-Pacific region: apac.iot.services-edge.paloaltonetworks.com
Japan: jp.iot.services-edge.paloaltonetworks.com
Australia: au.iot.services-edge.paloaltonetworks.com
443
( PAN-OS versions 10.0.0 and later ) Let next-generation firewalls download device dictionary files from the update server. updates.paloaltonetworks.com 443
( IoT Security subscription + Cortex Data Lake ) Forward logs to Cortex Data Lake. See TCP Ports and FQDNs Required for Cortex Data Lake .
  1. Configure your firewall to observe and generate logs for DHCP traffic then forward the logs for processing and analysis by IoT Security.

This setting is supported from PAN-OS 11.0.1 on the PA-5450 and PA-7000 series and on all other firewalls running any version of PAN-OS 11.0.

  1. Apply a Log Forwarding profile to your Security policy rules.

Apply a predefined Log Forwarding profile for IoT Security to your rules—or update an existing profile or create a new one—so that they forward the required types of logs to the logging service.

Key takeaways for PCNSE/PCNSA: Focus on the core requirements (device certificate, licenses), the importance of Panorama version compatibility, enabling DHCP visibility (DHCP server logs, DHCP relay, virtual wire, tap, ERSPAN, sending logs), and applying Log Forwarding profiles for EALs. Note the IPv6 limitation and the L2 interface/VLAN requirement.

Configure Device-ID

Complete the following tasks to import the IP address-to-device mappings and policy rule recommendations from IoT Security to your firewall or Panorama.

If you use Panorama to manage multiple firewalls, Palo Alto Networks strongly recommends upgrading all firewalls in your Device-ID deployment to PAN-OS 10.0 or a later version. If you create a rule that uses Device as a match criteria and Panorama pushes the rule to a firewall that uses PAN-OS 9.1 or an earlier version, the firewall omits the Device match criteria because it is not supported, which may cause issues with policy rule traffic matching. (This is a repeat from the previous section, reinforcing the point).

  1. Activate your IoT Security license on the hub.

Follow the instructions that you received in your email to activate your IoT Security license.

Initialize your IoT Security app. For more information, refer to Get Started with IoT Security and IoT Security Best Practices .

  1. Define your Security policy rules set in IoT Security.

Create a new set of policy rules for the source device object.

For information about creating security policy rule recommendations in IoT Security, refer to Recommend Security Policies .

  1. Activate the Security policy rules set.

When you activate a policy rules set, IoT Security automatically generates policy rule names by concatenating the policy rules set name with the name of the application in each rule. It then automatically pushes the set of rules to Panorama and all next-generation firewalls subscribed to the IoT Security service.

  1. Import the policy rule recommendations to the Security policy rulebase on the firewall or in Panorama.

Open or refresh the Policy Recommendation (IoT) page.

When you select Policy Recommendation (IoT), the firewall or Panorama communicates with IoT Security to obtain the latest policy rule recommendations. The policy rule recommendations are not cached on the firewall or Panorama. If you are already on this page when a new policy rule set was activated or modified in IoT Security, refreshing the page retrieves the new or updated recommendations from IoT Security.

Select policy rule recommendations to import into the Security policy rulebase.

Verify that the destination and permitted applications are correct in each rule you want to import. Then select up to ten policy rule recommendations to import into the rulebase. For Panorama you can import policy rule recommendations into multiple firewall rulebases in multiple device groups.

Select Import Policy Rule(s) , enter the following, and then click OK :

Choose the name of a rule in the rulebase after which you want PAN-OS to place the imported rules. If you choose No Rule Selection , the firewall imports the selected rules to the top.

Location: Choose one or more device groups where you want to import the policy rules.

Suggested Location: IoT Security learns about zones and device groups in the logs it receives from next-generation firewalls and suggests device groups for various policy rules accordingly. You can choose these suggested device groups among those available in the Location list or any other device groups if you prefer.

Destination Type: Select either Pre-Rulebase to add the recommended policy rules before rules defined locally on a firewall or Post-Rulebase to add them after rules defined locally.

After Rule: Choose a rule after which you want to add the imported rule or rules. If you choose No Rule Selection , the firewall imports the selected rules to the top. This is an optional setting. If you don’t choose a rule, the imported rules are added to the top of the rulebase.

Device-ID rules must precede any existing rules that apply to the same devices in the rulebase. Because IoT Security creates the policy rule recommendation using the trusted behaviors for the device, the default action for each rule is allow .

Repeat this process to import more rules to allow devices to communicate with the specified destinations with the specified applications.

Click OK and Commit your changes.

  1. Enable Device-ID in each zone where you want to use Device-ID to detect devices and enforce your Security policy rules.

By default, Device-ID maps all subnetworks in the zones where you enable it. You can modify which subnetworks Device-ID maps in the Include List and Exclude List.

As a best practice, enable Device-ID in the source zone to detect devices and enforce Device-ID Security policy rules. Only enable Device-ID for internal zones.

Repeat this as necessary for other zones for which you want to enforce Device-ID Security policy rules.

Commit your changes.

  1. Verify your Security policy rules are correct.

Select Policies and then select one of the rules you created from the policy rule recommendations.

IoT Security assigns a Description that contains the source device object and Tags to identify the source device object and that this rule is a recommendation from IoT Security.

  1. Use Explore to verify that the logging service receives your logs and review which logs it gets.
  2. Create custom device objects for any devices that do not have IoT Security policy rule recommendations.

For example, you cannot secure traditional IT devices such as laptops and smartphones using policy rule recommendations, so you must manually create device objects for these types of devices to use in your Security policy rules. For more information on custom device objects, see Manage Device-ID .

  1. Use the device objects to enforce policy rules and monitor and identify potential issues.

The following list includes some example use cases for device objects.

Key takeaways for PCNSE/PCNSA: Understand the process of activating IoT Security licenses, defining/activating policy sets in IoT Security, and the critical step of importing recommendations into the firewall/Panorama rulebase. Know that Device-ID rules should be placed *before* other rules and the default action is *allow*. Crucially, remember to enable Device Identification on the relevant *internal* zones. Understand the need for custom device objects for traditional IT devices.

Manage Device-ID

Perform the following tasks as needed to ensure your policy rule recommendations and device objects are current or to restore policy rule recommendation mappings.

  1. Update your policy rule recommendations as necessary.

As IoT devices gain new capabilities, IoT Security updates its policy rule recommendations to advise what additional traffic or protocols firewalls should allow. Check IoT Security daily for changes and update your policy rule recommendations as soon as possible. The update procedure differs depending on whether you’re using Panorama to manage your firewalls.

When using firewalls with Panorama management:

    1. ( IoT Security ) Edit the policy rules in an activated policy rules set and then click Next .
    2. Select any new recommendations, click Next , and then Save your changes.
    3. ( Panorama ) Select Panorama > Policy > Recommendation (IoT) and then Import Policy Rules .
    4. Choose one or more device groups and then click Yes to confirm that you want to overwrite current rule recommendations and previously imported rules in the rulebase.
    5. Commit your changes.

When using firewalls without Panorama management:

    1. ( IoT Security ) Edit the policy rules in an activated policy rules set and then click Next .
    2. Select any new recommendations, click Next , and then Save your changes.
    3. ( PAN-OS UI ) Select Device > Policy > Recommendation (IoT) , note details of any policy rule recommendations with Yes in the New Updates Available column, and then edit and save the corresponding imported policy rule on the Policies page.
    4. Select Device > Policy > Recommendation (IoT) and then Sync Policy Rules to refresh the mapping between the edited rules and the rule recommendations.

When the corresponding rules on the Policies page and Policy Recommendation (IoT) page match, the New Updates Available column changes from Yes to No .

    1. Commit your changes.
  1. Review, update, and maintain the device objects in the Device Dictionary.

You must create device objects for any devices that do not have an IoT Security policy rule recommendation. For example, you cannot secure traditional IT devices such as laptops and smartphones using IoT Security policy rule recommendations, so you must create device objects for these types of devices and use them in your Security policy to secure these devices.

    1. Select Objects > Devices .
    2. Add a device object.
    3. Browse the list or Search using keywords.

The search results can include multiple types of device object attributes (for example, both Category and Profile ).

    1. To add a custom device object, enter a Name and optionally a Description for the device object.

Always use a unique name for each device object. Do not change the tags in the description for device objects from policy rule recommendations.

    1. ( Panorama only ) Select the Shared option to make this device object available to other device groups.
    2. Select the attributes for the device object ( Category , OS , Profile , OS Family , Model , and Vendor ).
    3. Click OK to confirm your changes.
  1. Delete any policy rule recommendations that are no longer needed.

If policy rule recommendations no longer apply, you can remove the recommendations and the rules mapped to the recommendations.

    1. In IoT Security, delete one or more policy rule recommendations from a policy rule set.

Edit the policy set, clear the policy rules you want to remove, and then Save the policy set.

    1. Remove the mapping between rule recommendations and the related rules in the rulebase.

( Firewall ) Select Device > Policy > Recommendation (IoT) , select up to ten policy rule recommendations to remove, and then Remove Policy Mapping .

( Panorama ) Select Device > Policy > Recommendation (IoT) , select up to ten policy rule recommendations to remove, Remove Policy Mapping , and then select the Location from which you want to remove the mapping.

    1. Click Yes to confirm the mapping removal.
    2. Select Policies > Security . For Panorama, select Policies > Security > Pre-Rules/Post-Rules .
    3. Select the rules you want to remove from the rulebase and then Delete them.
    4. Commit your changes.
  1. Use CLI commands to troubleshoot any issues between the firewall and IoT Security.
Key takeaways for PCNSE/PCNSA: Understand the maintenance tasks: updating policy recommendations (different steps for Panorama vs. standalone), managing custom device objects (necessary for non-IoT devices), and deleting old recommendations/rules. Remember the "Gotcha" about not changing tags on imported rules and using unique names for custom objects. Know where to find Device objects in the UI.

CLI Commands for Device-ID

Use the following CLI commands to view information for troubleshooting any issues between the firewall and IoT Security. In general, CLI commands that include eal show counters for outgoing data and CLI commands that include icd show counters for incoming data.

Example Command
View Enhanced Application Logging (EAL) counters, such as the number of connections between the firewall and the Cortex Data Lake and the volume of the logs. show iot eal all
View more details about the connection between the firewall and Cortex Data Lake. show iot eal conn
View a summary of the EAL counters by plane (dataplane or management plane), such as the PAN-OS version and serial number. show iot eal dpi-eal
View EAL counters by plane (dataplane or management plane) and by protocol. show iot eal dpi-stats all
View EAL counters by protocol. show iot eal dpi-stats subtype dhcp|http
View a summary of Host Information Profile (HIP) Match report counters. show iot eal hipreport-eal
View EAL log response time counters. show iot eal response-time
View details for the health of the connection to the edge service between the firewall and the IoT Security app and counters for the IP address-to-device mappings and policy rule recommendations. show iot icd statistics all
View counters for the connection to the edge service. show iot icd statistics conn
View counters for the IP address-to-device mappings. show iot icd statistics verdict
View all IP address-to-device mappings on the management plane. show iot ip-device-mapping-mp all
View the IP address-to-device mapping for a specific IP address. show iot ip-device-mapping-mp ip <IP-address>
View a list of IP address-to-device mappings on the data plane. show iot ip-device-mapping all
Clear the IP address-to-device mappings on the management plane. debug iot clear-all type device
Clear the IP address-to-device mappings on the data plane. clear user-cache all
Key takeaways for PCNSE/PCNSA: Be familiar with the core CLI commands for troubleshooting Device-ID, especially those related to EALs (outgoing data, like logs to Logging Service) and ICD (incoming data, like policy/mapping from IoT Security). Know how to check the health of connections and view/clear IP-to-device mappings.

Device-ID Quiz

Test your knowledge on Palo Alto Networks Device-ID.

Question 1: Which of the following is NOT a required component or license for a Palo Alto Networks firewall to utilize Device-ID features in PAN-OS 10.0 or later?





Question 2: According to the text, what percentage of network-connected devices in an average enterprise were IoT devices in the 2020 Unit 42 report?





Question 3: Device-ID allows policy rules to be based primarily on what, similar to how User-ID is based on users and App-ID is based on applications?





Question 4: What is the minimum PAN-OS version required to use Device-ID features like IP address-to-device mapping and policy rule recommendations?





Question 5: Which type of log is specifically mentioned as being generated by the firewall and forwarded to the logging service for IoT Security analysis to obtain policy rule recommendations?





Question 6: When using Device-ID, the firewall acts as both a ______ to collect metadata and an ______ to enforce policy.





Question 7: Which of the following is NOT one of the six classification attributes for devices identified by IoT Security mentioned in the text?





Question 8: What protocol does the firewall use to validate the edge server's certificate when importing policy rule recommendations?





Question 9: To observe DHCP broadcast traffic on an L2 interface for Device-ID, what must you configure for that interface?





Question 10: According to best practices, which zones should Device-ID primarily be enabled on?





Question 11: When importing policy rule recommendations from IoT Security, what happens if a policy rule recommendation matches an existing device object on the firewall/Panorama?





Question 12: Which specific tag is assigned to an imported policy rule to indicate it is an IoT policy rule recommendation?





Question 13: What is a critical "Gotcha" regarding the tags assigned to imported policy rules?





Question 14: Where should Device-ID rules be placed in the Security policy rulebase relative to existing rules that apply to the same devices?





Question 15: The default action for policy rules imported from IoT Security recommendations is:





Question 16: Why might you need to create custom device objects in the Device Dictionary?





Question 17: Which of the following CLI commands would you use to view IP address-to-device mappings on the management plane?





Question 18: What is the primary purpose of CLI commands including "eal"?





Question 19: Which deployment method is recommended to ensure a firewall observes DHCP traffic when the DHCP server is on the same network segment as the firewall interface?





Question 20: What does the CLI command show iot icd statistics conn provide?