Which method does the IoT Security feature use to identify traffic sourced from IoT devices?
Which method does the IoT Security feature use to identify traffic sourced from IoT devices?
The SRX Series device streams metadata from the IoT device transit traffic to Juniper ATP Cloud. This method enables identification of traffic sourced from IoT devices by leveraging the analysis capabilities of the Juniper ATP Cloud.
A is correct For discovery IoT devices srx need connection to ATP, https://www.juniper.net/documentation/us/en/software/junos/security-iot/topics/topic-map/security-iot-discovery-configuration.html
A is correct https://www.juniper.net/documentation/us/en/software/junos/security-iot/topics/topic-map/security-iot-overview.html SRX does not identify the iot device. It streams the metadata to Juniper ATP cloud and Junipe ATP cloud identifies the device.
A is correct The security device is connected to the Juniper Cloud ATP server, and to a host device. The security device collects IoT device metadata and streams the relevant information to the Juniper ATP Cloud. To enable streaming of IoT metadata, you'll need to create security metadata streaming policies and attach these policies to security policies. Streaming of the IoT device traffic pauses automatically when Juniper Cloud server has sufficient details to classify the IoT device.