Palo Alto Networks IoT Security: Getting Started & Activation

Licensing Overview

This document covers essential information regarding IoT Security licensing, including extensions, renewals, and conversions.

License Management Options:

Note: Eval licenses cannot be directly converted to Prod licenses as eval firewalls are typically temporary loaner hardware.

graph LR A[License Nearing Expiry] --> B{Need Continued Service?}; B -- Yes --> C[Contact Sales for Renewal]; B -- No --> D[Let License Expire]; E[Trial/Eval License] --> F{Need More Time?}; F -- Yes --> G[Contact Sales for 30-Day Extension]; F -- No --> H[License Expires or Convert]; I[Need Different License Type?] --> J[Contact Sales for Conversion]; J --> K{Upgrade Conversion?}; K -- Yes --> L[Mid-Term Conversion Possible]; K -- No --> M[End-of-Term Conversion Only];

IoT Security Prerequisites

Ensure your environment meets these requirements before deploying IoT Security:

Firewall and PAN-OS Support

Functionality depends on the PAN-OS version:

Exceptions (Limited or No Support):

The following have limitations or no support for certain features:

Consider firewall End-of-Life dates. Licenses can be transferred from retired firewalls to new ones.

Activate IoT Security

Activation begins via the "Activate Subscription" link in your Palo Alto Networks email (unless using ELA).

Two primary subscription types exist based on log handling:

An optional IoT Security Third-party Integrations Add-on enables data exchange with systems like NAC, SIEM, etc., via Cortex XSOAR.

graph TD Start[Receive Activation Email] --> ClickLink{Click 'Activate Subscription'}; ClickLink --> LoginHub[Log in to Hub/CSP]; LoginHub --> ChooseCSP{Select CSP Account}; ChooseCSP --> Allocate[Allocate to Recipient/Tenant]; Allocate --> SelectRegion[Choose Data Ingestion Region]; SelectRegion --> CheckDRDL{DRDL License?}; CheckDRDL -- Yes --> AppSubdomain[Enter App Subdomain]; CheckDRDL -- No --> AddSLS[Add Strata Logging Service Instance]; AddSLS --> AppSubdomain; AppSubdomain --> Agree[Agree & Activate]; Agree --> Associate[Associate Firewalls in Common Services]; Associate --> UsePortal[Access IoT Security Portal];

Activation Steps (Simplified):

  1. Click Activate Subscription in your email.
  2. Log in to the Palo Alto Networks Hub/Customer Support Portal (CSP).
  3. Select your CSP account (if you have multiple).
  4. Allocate the subscription to a Recipient (tenant). You can create subtenants if needed.
  5. Choose the data ingestion Region .
  6. Strata Logging Service: Activation screen showing Strata Logging Service selection
  7. Enter a unique App Subdomain for your portal URL (e.g., `yourcompany.iot.paloaltonetworks.com`). Activation screen showing App Subdomain entry
  8. Agree to terms and click Activate .
  9. Go to Common Services > Device Associations to add firewalls and apply the subscription.
  10. Access your IoT Security portal via the created subdomain.

Onboard IoT Security

Onboarding uses the activation process to create your portal URL and apply subscriptions to firewalls. You might also activate Strata Logging Service or third-party integrations during this process.

(Note: Enterprise License Agreement (ELA) activation follows a different process starting with an authorization code in the CSP).

Main Onboarding Steps:

  1. Click Activate in the email.
  2. Log in to the Hub.
  3. Follow the Activate IoT Security steps detailed above.
  4. Use Common Services > Device Associations to add firewalls to the tenant service group (TSG) and associate the IoT Security application.
  5. (Optional) Manage identity and access.
  6. Configure firewalls and IoT Security to work together (see Firewall Preparation section).
  7. (FedRAMP Only) Submit a support case with source IPs allowed to access your FedRAMP portal.
  8. Log in to the IoT Security portal using your subdomain. A welcome page appears initially. IoT Security Portal Welcome Page
  9. Select a vertical theme (Enterprise Plus, Industrial, Medical) if prompted (owner privilege required). Enterprise Plus is the default if none is selected. IoT Security Portal Theme Selection
  10. Allow time (minutes to days) for device data to populate in the portal. Check status via Administration > Sites and Firewalls > Firewalls .
  11. Explore the portal: Device visibility, applications, vulnerabilities, alerts, policy recommendations.
  12. Proceed to Firewall Preparation steps.

Onboarding VM-Series with Software NGFW Credits

This process uses Software NGFW credits to license VM-Series firewalls with IoT Security.

  1. Create Deployment Profile(s) in CSP:
  2. Activate in Common Services (Hub):
  3. Associate Firewalls:
  4. Configure Firewall: Proceed with Firewall Preparation steps.

Note: Currently, extending, renewing, or offboarding IoT Security licenses activated via Software NGFW credits is not directly supported. ELA and FedRAMP licenses are also not supported with this method.

Manage IoT Security Users (RBAC)

Role-Based Access Control (RBAC) defines user privileges. User accounts are created in the Customer Support Portal (CSP), roles are assigned in the Hub, and site access can be limited within the IoT Security portal.

IoT Security Specific Roles:

User Role Definition Key Privileges
Owner (Also App/Instance Admin) Full access to all functions. All Administrator privileges plus: Global settings (timeout, site assignment method), view all audit logs, set user site access, manage notifications.
Administrator Access to most functions. Create/edit/delete configurations, manage own preferences (API keys, contact info, timeout, notifications), view own audit log. Access limited by site if configured by Owner.
Read only View data only. View data for accessible sites, manage own preferences, view own audit log. Access limited by site if configured by Owner.

(Note: Prisma Access integration uses specific role mappings).

graph TD Superuser[CSP Superuser] --> CreateCSPUser[Creates User in CSP]; HubAdmin[Hub Admin] --> AssignHubRole[Assigns Role in Hub Access Management]; AssignHubRole --> Role{Choose Role}; Role -- Owner/AppAdmin/InstAdmin --> FullAccess[Full IoT Portal Access]; Role -- Administrator --> AdminAccess[Admin IoT Portal Access]; Role -- ReadOnly --> ReadAccess[Read-Only IoT Portal Access]; OwnerRole[IoT Portal Owner] --> SetSiteAccess[Sets Site Access for Admin/ReadOnly]; AdminAccess --> SiteLimitedAdmin[Site-Limited Admin Access]; ReadAccess --> SiteLimitedRead[Site-Limited Read Access];

Creating Users (Palo Alto Networks SSO):

  1. Create user account in CSP (requires CSP superuser permissions).
  2. Log in to the Hub, navigate to Access Management .
  3. Hub Access Management User Selection
  4. Select the IoT Security instance, select the user, and click Assign Roles .
  5. Choose the desired IoT Security role (Owner, Administrator, Read only, etc.). Hub Role Assignment Screen
  6. (Optional, performed by Owner in IoT Portal) Limit site access for Administrator/Read only roles via Administration > User Accounts . IoT Portal User Site Access Configuration

Using Active Directory SSO:

You can configure IoT Security to authenticate against an external IdP (like Active Directory via SAML) instead of the Palo Alto Networks SSO.

  1. Prepare IdP: Configure your IdP with IoT Security URLs (ACS, Entity ID). Export IdP metadata (URL or XML file).
  2. Configure IoT Security SSO:
  3. Role Management:

Offboard IoT Security Subscriptions

Methods to remove IoT Security services from a firewall:

IoT Security Solution Overview

IoT Security uses AI and machine learning to discover, classify, and protect connected devices by analyzing their unique network behavior patterns.

flowchart LR FW[Firewall] -- Logs EALs --> LS[Logging Service] LS -- Metadata --> IoT[IoT Security Cloud AI/ML Analysis] IoT -- Device Dictionary --> US[Update Server] US -- Dictionary --> FW US -- Dictionary --> P[Panorama] IoT -- IP-Device Mappings --> FW IoT -- Policy Recommendations --> FW IoT -- Policy Recommendations --> P P -- Policies --> FW subgraph Data Collection FW LS end subgraph Analysis & Identification IoT end subgraph Policy Enforcement US P end

How it Works:

  1. Data Collection: Firewalls collect metadata via Enhanced Application Logs (EALs) and forward them to the Logging Service.
  2. Analysis (IoT Security Cloud): Diagram showing the three tiers of device identification
  3. Protection & Enforcement:
  4. Alerting: Notifies admins of anomalies and risks via the portal, email, or SMS.
Overall IoT Security Solution Diagram

IoT Security Solution Structure & Setup

The solution integrates firewalls, the logging service, and the IoT Security cloud application, utilizing the update server and CSP/Hub for support functions.

High-level architectural diagram of IoT Security components

Key Components & Flow:

  1. Device Data Collection: Firewalls log traffic and forward logs to the Logging Service (with or without Strata Logging Service storage). Diagram focusing on Data Collection flow
  2. Data Analysis: The IoT Security cloud analyzes metadata using AI/ML for identification, baseline establishment, vulnerability/anomaly detection. Diagram focusing on Data Analysis in the cloud
  3. IoT Device Protection (Device-ID): IoT Security coordinates with firewalls via: Diagram focusing on Device Protection mechanisms
  4. Third-party Integrations (Optional): Uses Cortex XSOAR (cohosted or on-prem) to exchange data with external systems (NAC, SIEM, Asset Management, etc.). Requires an add-on license. Diagram showing Third-Party Integration via XSOAR
  5. Prisma Access Integration (Alternative): Prisma Access can substitute for physical firewalls, sending logs via Strata Logging Service. IoT Security provides mappings/recommendations. SD-WAN ION devices can supplement data collection. Diagram showing Prisma Access data collection Diagram showing Prisma Access policy enforcement flow

Setup Overview:

sequenceDiagram Admin->>+CSP/Hub: Check Prerequisites & Firewall Support Admin->>+CSP/Hub: Onboard IoT Security (Activate Licenses) Admin->>+Firewall/Panorama: Prepare Firewalls (Interfaces, Zones) Admin->>+Firewall/Panorama: Install Certificates & Licenses Admin->>+Firewall/Panorama: Configure Logging & Log Forwarding Firewall/Panorama-->>LoggingService: Send Logs LoggingService-->>IoTCloud: Stream Metadata IoTCloud-->>Firewall/Panorama: Send Mappings & Recommendations UpdateServer-->>Firewall/Panorama: Send Device Dictionary
  1. Check Support & Prerequisites: Verify firewall models, PAN-OS versions, and required licenses. Diagram illustrating prerequisite checks
  2. Onboard IoT Security: Activate subscriptions via email/Hub, create tenant, associate Strata Logging Service (if needed), assign licenses to firewalls. Diagram illustrating onboarding flow
  3. Prepare Firewalls: Position firewalls strategically (especially for DHCP visibility) and configure interfaces/zones. Diagram illustrating firewall placement/preparation
  4. Install Certificates & Licenses: Retrieve licenses from the server. Install device certificates (if not automatic) for secure communication with logging service and IoT Security. Diagram illustrating certificate and license installation
  5. Configure Logging: Enable Enhanced Application Logging (EALs) and configure Security policy rules with log forwarding profiles to send data to the logging service. Enable Device-ID on relevant zones. Diagram illustrating logging configuration

IoT Security Integration with Firewalls (Device-ID)

Integration leverages Device-ID, applying policy based on device attributes identified by IoT Security.

Diagram explaining Device-ID concept

Key Mechanisms:

Firewalls poll IoT Security for mappings every second. Mappings are cached; if connection is lost, cached mappings are still used. Max 1000 unique Device-ID objects per firewall (mapping count varies by model).

Firewall/Panorama Communication Ports & FQDNs:

Prepare Your Firewall for IoT Security

These steps enable log collection and forwarding, crucial for IoT Security analysis.

  1. Install Licenses: Retrieve IoT Security and Logging Service licenses via Device > Licenses > Retrieve license keys... (Firewall) or Panorama > Device Deployment > Licenses > Refresh (Panorama).
  2. Install Certificates (if needed):
  3. Ensure DHCP Visibility: Configure firewall placement/policy rules to capture DHCP traffic (unicast usually required, broadcast exceptions exist). Enable DHCP Broadcast Session (Device > Setup > Session) if firewall hosts DHCP server (PAN-OS 10.1.10+, 10.2.4+, 11.0.1+).
  4. Configure Log Forwarding Profile:
  5. Apply Log Forwarding to Security Rules: On relevant Security policy rules ( Policies > Security ), go to the Actions tab, enable logging (e.g., Log at Session End), and select the configured Log Forwarding profile. Example Security Policy Rules for DHCP
  6. Enable Device-ID on Zones: Under Network > Zones , select zones containing IoT devices and enable Device-ID.
  7. (Optional) Configure Service Routes: If using a data interface (not MGT) for cloud communication, configure service routes under Device > Setup > Services > Service Route Configuration for "Data Services", "IoT", and "Palo Alto Networks Services". Add corresponding Security policy rules allowing traffic from 127.168.0.0/16. Service Route Configuration screen
  8. Commit changes.

Advanced Firewall Visibility Techniques

Using Tap Interfaces

Mirror traffic (especially DHCP) from a switch to a firewall Tap interface to capture data not normally seen by the firewall. Place tap "north" of routed DHCP boundaries to capture unicast traffic. Minimize performance impact by creating specific policy rules for the Tap zone: allow DHCP (with EAL forwarding), deny/drop other traffic (without logging/forwarding).

Diagram showing Tap interface deployment Tap Interface configuration Policy rules for Tap interface traffic

Using Virtual Wire Interfaces

Place a DHCP server behind a Virtual Wire (vWire) interface pair on the firewall. Enable multicast firewalling on the vWire object. This allows the firewall to see and log broadcast DHCP traffic occurring on the same segment as the firewall. Create policy rules allowing necessary traffic (DHCP, ping) between the vWire zones, applying EAL forwarding only to the DHCP rule.

Diagram showing DHCP server on same segment as firewall Diagram showing DHCP server behind vWire Virtual Wire object configuration with multicast Policy rule allowing traffic through vWire Optimized policy ruleset for vWire

Using SNMP Network Discovery (via Plugin)

Use the free Network Discovery plugin (install via Device > Plugins on firewall/Panorama) to query switches via SNMP (v2c or v3) for topology (LLDP/CDP neighbors) and device info (ARP tables for IP-to-MAC bindings, interfaces, VLANs). Helps identify devices when firewall lacks direct traffic visibility. Configure schedule, scope (entry point switch, IP range, hops), and SNMP credentials under Device > IoT Security > Network Discovery . Data is converted to EALs and sent to IoT Security.

Using Network Discovery Polling (via Plugin)

Use the free Network Discovery plugin (v2.0.1+) to actively poll devices using protocols like BACnet, Modbus, SNMP, Profinet, Siemens-S7, WinRM etc. Helps identify devices missed by passive traffic analysis. Configure schedule, global settings (basic/advanced), protocols, IP scope, and credentials under Device > IoT Security > Network Discovery > OT Polling . Data is converted to EALs. Note unsupported firewall models (PA-41x).

OT Polling main settings screen OT Polling Schedule Settings OT Polling Global Settings OT Polling Protocol Settings OT Polling SNMP Settings OT Polling WinRM Settings OT Polling Job Details View

Using ERSPAN over GRE Tunnels

Mirror traffic on remote ERSPAN-capable switches and send it via GRE tunnel to a firewall Layer 3 interface. Enable ERSPAN support ( Device > Session > Session Settings ). Configure L3 interface, zone, tunnel interface, GRE tunnel object (with ERSPAN enabled), and routing. Firewall decapsulates, inspects, logs, and forwards data to IoT Security.

Diagram showing ERSPAN over GRE tunnel Session Settings with ERSPAN enabled ERSPAN Zone Configuration ERSPAN L3 Interface Configuration ERSPAN Tunnel Interface Configuration GRE Tunnel Configuration with ERSPAN IP addressing for ERSPAN interfaces

Using DHCP Server Logs

Configure DHCP servers (Windows, Linux, Infoblox etc.) to send syslog messages (TCP, UDP, or SSL) to the firewall's management interface (ports 10514/16514). Configure firewall under Device > IoT Security > DHCP Server Log Ingestion to accept logs from specific server IPs. Firewall converts syslogs to EALs (subtype dhcp-syslog) and forwards them. Helps get IP-to-MAC bindings when firewall isn't in DHCP path. Requires PAN-OS 11.0+.

Diagram showing DHCP server log ingestion DHCP Server Log Ingestion configuration DHCP Server Log Ingestion status view

Controlling Traffic for Onboarding Devices

To allow new, unidentified devices necessary network access for identification without compromising Zero Trust:

  1. Create Security policy rules allowing basic/expected traffic for new devices (e.g., per VLAN).
  2. In the rule's Source tab, add a Device-ID match for Category = "Onboarding Device".
  3. In the IoT Security portal (Owner role), go to Policy Sets > Settings and enable "Control newly onboarded low-confidence devices...".
  4. Set the onboarding duration (default 7 days). Devices with confidence < 90% are categorized as "Onboarding Device" during this period.
  5. After identification or period expiry, the device moves to its identified category, and standard Device-ID rules apply.

Supporting Isolated Network Segments (Air-Gapped Networks)

Use designated next-generation firewalls (specific models/PAN-OS versions required) as Security Telemetry Gateways (proxies) to forward logs and service requests (licenses, certs, mappings, recommendations, dictionary files) from isolated firewalls to the cloud via a chain of gateways (e.g., OT Gateway -> IT Gateway -> Cloud).

  1. Enable proxy mode on gateway firewalls via CLI (`set system setting paloalto-networks-service-proxy on`) and reboot.
  2. Configure interfaces (e.g., OT-facing, IT-facing, loopback) and routing on each gateway.
  3. Configure DNS Proxy if needed.
  4. Create URL Category (`iot_cloud_traffic`) with required Palo Alto Networks FQDNs/IPs.
  5. Create Security policy allowing traffic from downstream zone to upstream zone for the `iot_cloud_traffic` URL category. Add NAT policy.
  6. Configure Proxy Settings ( Network > Proxy ): Enable Palo Alto Networks Service Proxy, set listening/upstream interfaces, proxy IP, DNS proxy, allowed URL category, and crucially, the *Next Hop Proxy Server/Port* (IP/port of the *next* gateway in the chain, or leave blank for the final gateway connecting to the cloud).
  7. Configure isolated OT firewalls: Set their Default Gateway (MGT interface) or Service Route (data interface) to point to the first gateway (OT Gateway). Configure Proxy Server settings ( Device > Setup > Services ) to point to the OT Gateway IP and port 8080, enabling "Use proxy to send logs...".
  8. Onboard IoT Security on isolated OT firewalls; they will use the proxy chain for all cloud communications.
Diagram showing isolated network segment proxy chain

Navigate the IoT Security Portal

Access the portal via your unique subdomain URL. Login uses Palo Alto Networks SSO (or configured external IdP).

IoT Security Portal Login Screen IoT Security Portal Main Interface Overview

Key Areas:

Vertical-themed Portals

The portal adapts based on the purchased product or theme selected by an Owner.

Owners can switch themes via Administration > About > License > Switch .

License page showing Switch Theme option Switch Theme dialog

A 30-day trial of Enterprise IoT Security can be requested from the License page if you have a higher-tier license.

License page showing Request Trial option Request Trial firewall selection License page showing Enter Trial option Trial tenant License page showing Enter Production option

IoT Security Activation & Getting Started Quiz