This help contains the following topics:
The Internet of Things (IoT) is one of the most important technologies in the era of digital transformation, and is intended to connect everything to the Internet. Compared with the traditional Internet, IoT connects a huge number of devices with various types and application scenarios, many of which are located in remote areas and are unattended. This exposes the devices to increased dangers and vulnerabilities. For example, many cameras in video security systems are installed in remote corners to monitor the surrounding environment.
IoT device security management is a technology implementing intelligent detection and security management on IoT devices. The main features include standard format check, device access control, sensitive signal control, and standard flow control.
If a device is configured with more than one of the above features, the device processes a packet in the sequence of standard format check, device access control, sensitive signal control, and standard flow control.
Figure-1 Packet processing procedure
This feature checks IoT device traffic based on different IoT device standards to avoid non-standard devices from accessing IoT networks.
Upon receiving an IoT packet, the device configured with standard format check operates as follows:
Verify whether the packet source address is in the allowlist.
If the address is in the allowlist, the device allows the packets to pass.
If the address is not in the allowlist, the device proceeds to the next step.
Compare the packet source addresses against addresses in the source address object groups to determine whether format check is required.
If format check is not required, the device allows the packet to pass.
If format check is required, the device proceeds to the next step.
You can configure an IPv4 source address object group, an IPv6 source address object group, and a MAC address object group to filter packets. A match is found if the packet matches any object group.
Check the administrative area, device ID, IoT device type, and interface method to identify whether the packet match the corresponding IoT standard.
If all the packet attributes match the standard requirements, the device allows the packets to pass.
If a packet attribute does not meet the standard requirement, the device allows the packets to pass or drops the packets as configured.
Figure-2 Standard format check processing
This feature examines IoT device traffic based on different IoT device standards and the device information configured by the administrators to allow only traffic from permitted IoT devices to pass. This can avoid devices from being tampered.
Upon receiving an IoT packet, the device configured with device access control operates as follows:
Verify whether the packet source address is in the allowlist.
If the address is in the allowlist, the device allows the packets to pass.
If the address is not in the allowlist, the device proceeds to the next step.
Compare the packet source addresses against addresses in the source address object groups to determine whether access control is required.
If access control is not required, the device allows the packet to pass.
If access control is required, the device proceeds to the next step.
You can configure an IPv4 source address object group, an IPv6 source address object group, and a MAC address object group to filter packets. A match is found if the packet matches any object group.
Check whether the packets can be forwarded by checking the authentication information such as the IP address, MAC address, device ID, and standard.
If packet authentication information meets all requirements, the device allows packets to pass directly.
If packet authentication information fails to meet the requirements, the device allows the packets to pass or drops the packets as configured.
Figure-3 Device access control processing
This feature filters traffic by sensitive signals based on different IoT device standards to control sensitive user behaviors, such as querying, access, and control, to avoid data breaches and date tampering.
Upon receiving an IoT packet, the device configured with sensitive signal control operates as follows:
Verify whether the packet source address is in the allowlist.
If the address is in the allowlist, the device allows the packets to pass.
If the address is not in the allowlist, the device proceeds to the next step.
Compare the packet source addresses against addresses in the source address object groups to determine whether sensitive signal check is required.
If sensitive signal check is not required, the device allows the packet to pass.
If sensitive signal check is required, the device proceeds to the next step.
You can configure an IPv4 source address object group, an IPv6 source address object group, and a MAC address object group to filter packets. A match is found if the packet matches any object group.
Check whether the packet information contains specified sensitive signals.
If packets do not contain sensitive signals, the device allows the packets to pass directly.
If packets have sensitive signals, the device allows the packets to pass or drops the packets as configured.
Figure-4 Sensitive signal control processing
This feature checks IoT device traffic based on different standard flow control policies. By comparing the total number of requests per device and request rate per device with the configured thresholds, this feature controls device request traffic and avoids DoS attacks.
When a device receives IoT packets, it compares the packets with standard flow control policies in the sequence as displayed. Once a match is found, the device takes the action defined in the policy on the packet. If no match is found, the device allows the packet to pass directly.
Upon receiving an IoT packet, the device configured with standard flow control operates as follows:
Check the requester ID, IP address, MAC address, and IoT standard by policies to verify whether the packets require standard flow control.
If a packet matches all criterion types in a policy, the packet matches the policy successfully and standard flow control is required for the packet. Note that each criterion type includes one or more criteria, and a packet matches a criterion type if it matches any criterion of the type.
If a packet fails to match one of the criteria types in a policy, the packet continues to compare with the next policy until it is successfully matched. If the packet fails to match any of the policies, standard flow control is not required.
Check whether the request times and rate information in the packet reaches the configured thresholds.
If the request times and rate information in the packet reaches the configured thresholds, the device executes the action configured in the policy on a packet.
If the thresholds are not reached, the device allows the packet to pass directly.
Figure-5 Standard traffic control processing
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
The identification of sensitive signals is based on the APR signature library, which requires a license. After the license expires, the existing APR signature library is still available but you cannot update the signature library. For more information about licensing, see the license management help.
Intelligent check and management is available only for IoT devices that use the GB/T 28181, GB 35114, and GA/T 1400 standards.
Device access control denies all traffic that does not match the filtering criteria, including but not limited to traffic using the GBT28181, GB35114, and GAT1400 standards. As a best practice, disable device access control when it is not required.
Complete the following tasks before you configure this feature:
Assign IP addresses to interfaces on the
Configure routes on the
Create security zones on the
Add interfaces to security zones. You can add interfaces to a security zone on the
Configure security policies to permit the target traffic on the
The standard format check feature identifies whether the traffic of IoT devices meet relevant IoT device standards. It can effectively prevent connections of non-standard devices.
Configure the global allowlist.
Select
Configure the global allowlist. To improve the system processing efficiency and reduce incorrect reporting, you can add address object groups of trusted devices or devices that are reported incorrectly by format check to the allowlist.
Figure-6 Configuring the global allowlist
Enable standard format check for different standards. Supported standards include GB/T 28181, GB 35114, and GA/T 1400.
Select
Configure settings on the
Figure-7 Enabling standard format check for different standards
Table-1 Standard format check configuration items
Item | Description | |
Standards | GB/T 28181 | Enable format check for the specified standard. |
GB 35114 | ||
GA/T 1400 | ||
Logging | Enable logging standard format check failures. | |
Action | Specify the action to take upon standard format check failure. Options include:
| |
Detection Attributes | Configure detection attributes for standard format check. A packet passes the standard format check only after it passes the examination on all the specified detection attributes. | |
Source Address Check | Configure source address object groups to filter out devices for standard format check. The device performs standard format check on packets that match any configured source address object group. |
Click
The device access control feature checks the traffic of IoT devices based on IoT device standards and configured device information. This ensures only traffic from allowed IoT devices can pass and can effectively prevent device tampering.
Select
Configure settings on the
Figure-8 Configuring device access control
Table-2 Device access control configuration items
Item | Description |
Device Access Control | Enable device access control. |
Global Allowlist | To improve the device processing efficiency and reduce incorrect report, you can add address object groups of trusted devices or devices that are reported incorrectly by device access control to the allowlist. |
Source Address Check | Configure source address object groups to filter out devices for standard format check. The device performs standard format check on packets that match any configured source address object group. |
Device Authentication Information | Used to authenticate IoT devices, such as device address, device ID, and device standard. If the IoT device information collected in a packet matches the configured device authentication information, the system permits the packet to pass. To import device authentication information, click Authentication inaccuracy might occur if you access an IoT management platform to edit the device ID or standard information for an authenticated device. To resolve this issue, click |
Detection Duration | Specify the time during which the system continuously collects IoT information in each packet received to authenticate a device. This setting avoids device authentication failure caused by incomplete IoT information in a single packet. |
Action | Specify the action to take upon an authentication failure. Options include:
|
Logging | Enable logging device authentication failures. |
Click
The sensitive signal control feature identifies sensitive signals in IoT device traffic based on IoT device standards, and matches and filters relevant sensitive signals in traffic based on the configurations. This feature can detect sensitive behaviors in IoT device traffic, such as queries, access, and control, effectively avoiding data leakage and tampering.
Configure the global allowlist.
Select
Configure the global allowlist. To improve the system processing efficiency and reduce incorrect reporting, you can add address object groups of trusted devices or devices that are reported incorrectly by sensitive signal control to the allowlist.
Figure-9 Configuring the global allowlist
Enable sensitive signal control for different standards. Supported standards include GB/T 28181, GB 35114, and GA/T 1400.
Select
Configure settings on the
Figure-10 Enabling sensitive signal control for different standards
Table-3 Sensitive signal control configuration items
Item | Description | |
Standards | GB/T 28181 | Enable sensitive signal control for the specified standard. |
GB 35114 | ||
GA/T 1400 | ||
Logging | After logging is enabled, the system reports corresponding logs when sensitive signals are detected. | |
Action | Specify the action upon format check failure. Options include:
| |
Source Address Check | Configure source address object groups to filter out devices for standard format check. The device performs standard format check on packets that match any configured source address object group. | |
Select Sensitive Signals | Select sensitive signals to be detected. The system will check whether packets contain the specified operations, such as edit and delete. |
Click
The standard traffic control feature provides the following functions to control the traffic of requesting devices and effectively prevent DoS attacks:
Detects the traffic of IoT devices, according to standard traffic control policies.
Compares the request count and request rate of a single device with a specific ID against the configured thresholds.
Select
Click
Configure settings to create a policy.
Figure-11 Creating a standard traffic control policy-1
Figure-12 Creating a standard traffic control policy-2
Table-4 Standard traffic control policy configuration items
Item | Description | |
Policy Name | Configure a policy name. | |
Status | Whether the standard flow control policy is enabled. | |
Source Address Check | Configure source address object groups to filter out devices for standard format check. The device performs standard format check on packets that match any configured source address object group. | |
Match Criteria | Standard type | Standard type used by the packet. |
Device information | Basic device information including device ID and address. | |
Detection Attributes | Requests Per ID | Total number of requests sent by an IoT device. |
Request Rate Per ID | Request rate (number of requests per minute) of an IoT device. | |
Logical Operation | Logical relation between the detection attributes. Options include:
| |
Action | Specify the action to take when a packet matches a policy and the detection attributes of the packet reach the thresholds. Options include:
| |
Logging | After logging is enabled, the system reports the corresponding logs when a packet matches a policy and the detection attributes of the packet reach the thresholds. |
Click
Figure-13 Standard traffic control policy created
(Optional.) Set the logging interval on the
If the elapsed time exceeds the logging interval, the system generates a new log message.
If the elapsed time does not exceed the logging interval, the system does not generate a new log message.
Figure-14 Setting the logging interval