User Guide: AMF Security version 2.6.1 for VST-VRT

Device Lookup



This section explains the Device Lookup configured on the System Settings > Trap Monitoring Settings page.

What is Device Lookup

Normally, actions are applied to devices based on their MAC Address or IP Address. In the AMF Application Proxy feature of AW+, IP filter actions can be applied using the device’s IP Address. However, the following actions are applied based on the device’s MAC Address. Note that Device Lookup cannot be used with IP filter actions in the AMF Application Proxy.
Device Lookup operates in association with the “Device ID” configured in AMF Security for the MAC Address to which the action is applied, or with the “Tag” assigned to the Device ID.
The following items are configured for Device Lookup on the System Settings > Trap Monitoring Settings” page.
Tags can be assigned to a Device ID in AMF Security, and the same tag can also be assigned to other Device IDs. When an action is applied to a MAC Address registered to a Device ID, the same action is also applied to MAC Addresses registered to other Device IDs that share the same tag.

How Device Lookup Works

The following are examples of how Device Lookup behaves when “Device” or “Tag” is configured on the System Settings > Trap Monitoring Settings page.

◼ Device
Example behavior when three MAC Addresses are configured for the device ID "Person-A".
Table 1: Device Authentication Data
Device ID: Person-A
MAC Address 00:00:00:00:00:01
00:00:00:00:00:02
00:00:00:00:00:03
When an action is applied to the MAC Address "00:00:00:00:00:01", the same action is also applied to the other two MAC Addresses "00:00:00:00:00:02" and "00:00:00:00:00:03".

In the above configuration, Person-A is using three devices. When an action is applied to the device with the MAC Address "00:00:00:00:00:01", the same action is also applied to the devices with the remaining MAC Addresses "00:00:00:00:00:02" and "00:00:00:00:00:03".

◼ Tag
Example behavior when the same tag is configured for both device IDs "Person-A" and "Person-B".
Table 2: Device Authentication Data
Device ID: Person-A
Tag Department-1
MAC Address 00:00:00:00:00:01
Device ID: Person-B
Tag Department-1
MAC Address 00:00:00:00:00:02
When an action is applied to the device with the MAC Address "00:00:00:00:00:01", the same action is also applied to the device with the MAC Address "00:00:00:00:00:02", which belongs to the device ID "Person-B" that has the same tag configured.

In the above configuration, Person-A and Person-B are each using one device and are assumed to belong to the same department, "Department-1". When an action is applied to the device with the MAC Address "00:00:00:00:00:01", which is used by Person-A, the same action is also applied to the device with the MAC Address "00:00:00:00:00:02", which is used by Person-B and belongs to the same department, "Department-1" (i.e., has the same tag configured).

01 Oct 2025 12:50