Zones

A zone is a group of IoT assets categorized by their function. Quantum IoT Protect automatically adds the onboarded assets to the relevant zones.

To access the Zones page, go to IoTZones.

For example, IP cameras are added to the IP cameras zone.

Note - The default is the card view. To switch to table view, click .

Item

Description

Create a new zone.

Delete a zone.

Create a clone of the selected zone.

Card view

Family

Family in which the assets in the zone belong.

  • IoT

  • Generic

IoT practice mode

Practice mode of the zone.

Agent's profile

Profile of the agent.

Practices

Sub-practice mode of the zone:

  • Yellow - Learn/Detect mode.

  • Grey - Prevent mode.

Table view

Zone

Name of the zone.

Family

Family in which the assets in the zone belong.

  • IoT

  • Generic

Profile

Profile of the agent.

Protection

Sub-practice mode of the zone

  • Yellow - Learn/Detect mode.

  • Grey - Prevent mode.

>

Click to view detailed information about the zone in these tabs:

General

Shows the basic information about the zone and the query run to add the asset to the zone.

Item

Description

Basic

  • Name - Name of the zone.

  • Device function - Function of the asset.

  • Recognition confidence threshold - The minimum confidence level required to add an asset to the zone.

Query

Query that the system runs to categorize a discovered IoT asset to a zone.

By default, the asset discovery confidence level (recoginitionConfidence parameter) is set to Medium and High. To update the query, change the required field value(s) under the Basic section.

Access Control

You can define the access control mode for the zone that is applied to all the assets in the zone.

The mode for a zone is set through practice and sub-practice(s). A sub-practice inherits the mode from its parent practice by default.

In this example, New Practice 14 is the parent practice and Access to Internet is the sub-practice.

To define the access control mode:

  1. In the New Practice > Mode, select a mode:

    Note - The default mode is Learn / Detect.

    • Prevent - Allows access only to the domains in the approved destinations list. Access to all other domains is blocked. For more information, see Approved Destinations.

    • Disabled - Does not monitor and secure the asset.

    • Learn / Detect - Monitors the traffic without blocking it.This is the recommended mode for the initial three to six months after you provision the asset. This helps in analyzing the traffic and setting up policies. Once the policies are configured, the mode should be switched to Prevent.

  2. Select a Mode for the sub-practice(s):

    Note - The default mode is Learn / Detect.

    • As Top Level - Applies the same access mode as its parent practice.

    • Disabled - Does not monitor and secure the asset.

    • Learn / Detect - Monitors the asset traffic but does not block it even if it violates the policy.

    • Prevent - Allows access only to the domains in the approved destinations list. Access to all other domains is blocked.

Approved Destinations

Check Point maintains a list of approved destinations for every zone. The access to the approved destinations depends on the mode you set.

To view the approved destinations for a zone:

  • In card view, on the zone card, hover the cursor over the approved destinations text.
  • In table view, see the Destination column.

To allow access to a destination not in the approved destination list, add a custom rule or exception. To add or edit a custom rule or exception, expand the Custom Rules and Exceptions drop-down and follow the steps in Custom Rules and Exceptions.

Note - For Quantum IoT Protect, the data fields in the Triggers section are automatically populated. Do not make any changes in this section.

Threat Prevention

Threat Prevention allows you to set a mode of action when an asset's risk level matches the specified risk level. The supported modes are:

  • Learn / Detect - Monitors the traffic without blocking it.This is the recommended mode for the initial three to six months after you provision the asset. This helps in analyzing the traffic and setting up policies. Once the policies are configured, the mode should be switched to Prevent.

  • Prevent - Blocks the traffic if the asset's risk level matches the specified level.

  • Disabled - Threat Prevention is disabled. No action is taken if the asset's risk level matches the specified level.

Notes:

  • Make sure you have configured the IoT Risk Profile.

  • If you have subscribed to Check Point Infinity Playblocks and configured a workflow to handle IoT assets with a certain risk level, then skip this procedure. Infinity Playblocks automatically sends you a notification to enforce an action.

To set a mode for an IoT asset with a certain risk level:

  1. Go to Threat Prevention and set the practice Mode to one of these:

    • Learn / Detect

    • Prevent

    • Disabled

  2. In the Activate when risk is drop-down list, select the risk level.

  3. Click Enforce.

    All the IoT assets in the zone with the selected risk level are blocked.

  4. To allow traffic to an asset identified as risky, add an exception in Custom Rules and Exceptions. For more information, see Custom Rules and Exceptions.

Note - For Quantum IoT Protect, the data fields in the Triggers section are automatically populated. Do not make any changes in this section.

Custom Rules and Exceptions

You can create custom rules and exceptions, for example, to allow or block traffic between an IoT asset and destination.

To add a new custom rule or exception:

  1. Click .

  2. In the New Custom Rule / Exception window:

    • Select an Action.

    • Set the Condition:

      1. Select the parameter:

        • IoT Device Manufacturer

        • Destination

        • Service

      2. Click : to select the qualifier.

      3. Enter the value for the parameter.

      4. To add the second condition, click to specify the operator (AND or OR) and repeat the steps from a to c.

    • (Optional) Comment

  3. Click OK.

To edit, clone and delete an existing custom rule or exception:

  1. To edit:

    1. Click .

    2. In the Edit Exception window, enter the required changes.

    3. Click OK.

  2. To clone, click .

    The existing exception is cloned and added to the list.

  3. To delete, select the exception and click .

Events

View the events logged for all the assets in the zone.

To view the event statistics, click in the Statistics bar on the left.

For card view, click in the Card bar on the right.

Event Parameter

Description

Time

Time of the event.

Blade

Software blade which triggered the logs:

  • Firewall

  • IoT
  • IoT URL Filtering

  • Application Control IoT

Action

Action enforced on the event:

  • Drop - Block.

  • Accept - Allow.

Type

  • Connection - Event generated in an individual connection.

  • Session - Event generated in a session.

Machine Name

Name of the asset.

Source

IP address of the IoT asset.

Resource

Resource accessed by the asset.

Destination

IP address of the destination.

Destination Machine Name

Name of the destination asset.

Service

Service that generated the event.

Rule

Rule number from the relevant policy package and Rulebase (Examples - 7.1, 11.5).

Rule Name

Name of the rule (Examples - Internet IoT all, IoT DNS to internal).

Practices

Shows the different Access Control and Threat Prevention practices applied on the zone.