Integrate the tracking and management of your distributed IoT devices with powerful, centralized DDI management through a single pane of glass
Internet-enabling “non-user” devices enables them to communicate using the Internet Protocol. Such devices comprise the Internet of Things (IoT). They can serve as probes, report updates or events, or perform directed actions commanded by users or other devices via an enterprise network or the Internet. IoT applications range from widely-applicable remote surveillance and security monitoring to application-specific deployments that provide expanded visibility on buildings, factory floors, and other remote assets. Such automation can help organizations improve efficiencies and reduce costs.
Easily provision IoT devices
Like other IP network participants, IoT devices require IPAM configuration: a subnet to join, an IP address and likely a DNS name. In some scenarios, you may desire to allocate IP addresses to IoT devices as you would non-thing devices using DHCP or APIs. In these cases, normal integrated IPAM processes would apply. Otherwise, where segregated or field-based IoT devices are deployed, other strategies may be required. When deploying remote sensors in a harsh environment you may need to implement protocols such as 6LoWPAN or other IP adaptations. These protocols support address autoconfiguration and limited requisite communications.
Full stack IPAM support
Regardless of your deployment approach, you can utilize Diamond IP solutions to streamline connectivity. Diamond IP enables the following key functions for IoT:
Block/subnet allocation for IoT subnetworks
DHCPv6 configuration if used though in most lossy environments, SLAAC would be more efficient for zero-touch bootstrapping
IPv6 address tracking, particularly when SLAAC is in use. Periodic polling of border router neighbor tables can be useful
DNS configuration as appropriate
Hybrid Exchange Auditing
Cygna Auditor provides a single correlated view of changes in Exchange Online and Exchange On-Premises.
Open Your Eyes to Better Network Security
Visibility is step one to identifying and monitoring network and DDI assets and transactions.
DDI as code
IP Address Management (IPAM) and its corollary functions DHCP and DNS, collectively DHCP-DNS-IPAM (DDI), is often considered a necessary evil by most IT and Operations Engineers.