This help contains the following topics:
Identifying IoT terminals, such as cameras and sensors, is fundamental to establish secure Internet of Things (IoT) connections.
When the terminal traffic passes through a device, the device performs the following tasks:
Analyzes and extracts the terminal information, such as the vendor, model, and MAC address of the terminal.
Generates a log when a terminal is identified for the first time or the terminal information changes.
You can predefine terminals in the device characteristics library to identify the terminal characteristics.
To enable terminal identification, select
You can add terminals sharing similar characteristics to a terminal group. The device can provide the same DPI service for packets of the same terminal group.
You can configure object groups for accurate terminal address identification. The device supports the following address object groups:
The device permits the traffic of a terminal if the IP address of the terminal is in the terminal identification whitelist. Otherwise, the device drops the traffic of a terminal. The terminal identification whitelist supports the following actions:
Permit—Permits the traffic of a terminal all the time.
Block—Drops the traffic of a terminal all the time only after the terminal information changes.
Terminal identification supports the following operating modes:
To set an operating mode, select
Figure-1 Terminal identification workflow
Terminal identification works as follows:
The system identifies each terminal and checks whether the IP address of each terminal (including terminals classified as other category) is in the whitelist. An unidentifiable terminal is classified as other category.
If the IP address of a terminal is not in the whitelist, the system drops the traffic of the terminal. If the IP address of a terminal is in the whitelist, the system checks whether the terminal information changes. If the terminal information does not change, the system permits the traffic.
If the terminal information changes, the system sends a log message and check whether the whitelist action is permit.
If the whitelist action is permit, the system permits the traffic. Otherwise, the system drops the traffic.
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
To use terminal identification, you must purchase and install the required license. After the license expires, terminal identification can still use the existing APR signature library but cannot update the signature library. For more information about licensing, see the license management help.
In whitelist mode with the block action, the system drops traffic of a terminal in the whitelist when the terminal comes online for the first time. To permits the traffic of the terminal, click
If you configure both a manager address object group or a terminal address object group, the manager address object group has higher priority.
Complete the following tasks before you configure this feature:
Assign IP addresses to interfaces on the
Configure routes on the
Create security zones on the
Add interfaces to security zones. You can add interfaces to a security zone on the
Configure security policies to permit the target traffic on the
In whitelist mode, the system permits traffic of only terminals in the whitelist. When the system detects a terminal information change, such as a vendor, model, or MAC address change, it sends a log message to the log host by using the fast log output feature. This mode is applicable to scenarios that have strict security requirements.
Click the
In the navigation pane, select
Click
Figure-2 Clicking
Figure-3 Selecting an operating mode
Select
Click
Click the
In the navigation pane, select
Click
Configure address object groups.
Figure-4 Clicking
Figure-5
Table-1 Object group configuration items
| Item | Description |
IPv4 address object group | Manager address object group | Select a manager address object group. |
Terminal address object group | Select a terminal address object group. | |
Terminal address object group in the whitelist | Select a terminal address object group in the whitelist. The object group is used to filter terminal traffic. The system permits the traffic of a terminal if the IP address of the terminal is in the terminal identification whitelist. Otherwise, the system drops the traffic of a terminal. | |
IPv6 address object group | Manager address object group | Select a manager address object group. |
Terminal address object group | Select a terminal address object group. |
Click
In alarm mode, the system permits traffic of all terminals. When the system identifies a terminal for the first time or detects a terminal information change, it sends a log message to the log host by using the fast log output feature. This mode is applicable to scenarios that do not have strict security requirements.
Click the
In the navigation pane, select
Click
Figure-6 Clicking
Figure-7 Selecting an operating mode
Select
Click
Configure a minimum of one address object group (manager address object group or terminal address object group). For more information, see "
You can add multiple terminals sharing similar characteristics to a terminal group. A terminal group can be used in a security policy.
To configure a terminal group:
Click the
In the navigation pane, select
Click
Select terminals from the
Figure-8 Clicking Add
Figure-9 Adding a terminal group
Table-2 Terminal group configuration items
Item | Description |
Terminal group name | Enter a name for the terminal group. |
Description | Enter a description for the terminal group. |
Available Terminals | Terminals that can be added to the terminal group. |
Selected Terminals | Terminals that have been added to the terminal group. |
Click