
Inside Cato’s SASE Architecture: A Blueprint for Modern Security
🕓 January 26, 2025

Modern internet security is no longer just about who the user is or what application they are accessing. In distributed enterprises, security decisions increasingly depend on the device itself -its type, operating system, manufacturer, and context.
The Cato Networks SASE platform addresses this need by allowing administrators to apply device-aware conditions directly inside Internet Firewall rules. By combining Cato’s Device Inventory intelligence with firewall policy enforcement, organizations gain precise, scalable control over internet access-without adding agents, tools, or manual classification workflows.
This blog explains how device conditions work in the Cato Internet Firewall, why they matter, and how they support Zero Trust and enterprise security outcomes.
Traditional firewall policies rely on static constructs like IP ranges, users, or application categories. In contrast, Cato SASE enables security teams to enforce policies using real-world device context, including:
This approach allows organizations to:
All of this is done natively inside the Cato Management Application (CMA).
Device conditions are configured directly inside Internet Firewall rules under the Device criteria section.
Administrators configure these rules in:
Once added, device conditions become part of the rule-matching logic, evaluated for every internet session.
Cato populates device attributes through its Device Inventory engine, which passively analyzes network traffic and enriches it with metadata.
The following officially supported device attributes can be used in Internet Firewall rules:
These attributes are visible in:
Understanding the evaluation logic is essential to building effective Cato firewall rules.
When multiple different device conditions are configured in a single rule, they are evaluated using AND logic.
Example:
A rule matches only if:
When multiple values are selected within the same condition, they are evaluated using OR logic.
Example:
Device conditions can be combined with:
All conditions together must match for the rule to apply.
Cato documents several practical and enterprise-ready use cases for device-based enforcement.
Organizations can allow access to specific SaaS applications only from approved device types, while blocking the same access from unmanaged or unknown devices.
Device manufacturer attributes can be used to ensure only approved hardware vendors are allowed to access specific internet resources.
Because device attributes are evaluated regardless of user location, the same Internet Firewall policy applies whether users are remote or onsite—supporting hybrid work securely.
Using device attributes in Internet Firewall rules requires a Device Inventory license, which is part of Cato’s IoT/OT Security capabilities.
Firewall rules using device attributes are enforced only for devices whose MAC address has been detected.
Cato recommends:
Administrators can verify device-based enforcement using:
This ensures device-aware policies are transparent, auditable, and easy to validate.
By enabling device conditions in Internet Firewall rules, Cato SASE delivers:
All without deploying additional agents or maintaining parallel security systems.
Enforce Zero Trust where it matters - at the device level → Schedule a free Cato Internet Firewall strategy session Now.

Cato SASE allows administrators to apply device attributes—such as OS, manufacturer, and device type—directly inside Internet Firewall rules, enabling granular, context-aware access control.
Cato Internet Firewall rules support attributes including device category, type, operating system, OS version, manufacturer, and model, sourced from the Cato Device Inventory engine.
No. Device attributes are derived from passive network detection. However, accurate enforcement depends on MAC address detection and Device Inventory licensing.
Different device conditions use AND logic, while multiple values within the same condition use OR logic, ensuring flexible and precise policy design.
Yes. Using device attributes in Cato Internet Firewall rules requires a Device Inventory license as part of the IoT/OT Security service.
Admins can monitor enforcement via the Device Inventory page, Device Dashboard, and Events page within the Cato Management Application.
By enforcing internet access based on verified device context—not just user identity—Cato SASE ensures continuous, device-aware Zero Trust enforcement.
Device conditions transform the Cato Internet Firewall from a traditional policy engine into a context-aware security control point. By combining device intelligence with unified SASE enforcement, Cato enables organizations to protect internet access with precision, simplicity, and scale.

Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.
Share it with friends!
share your thoughts