Technology - Manufacturer Usage Descriptions (MUD) - Manufacturers
1
Get to know
2
MUD demo
3
Get MUD URL
4
Embed MUD URL
5
Test MUD URL
6
MUD for your customers
MUD benefits for Manufacturers
Improve customer satisfaction and adoption due to reduced operational costs and security risks
Enhance device security throught standard-based onboarding procedure
Differentiate device offerings with embedded network-nased device security feature
Reduce product support costs to customers by following an easy-to-implement process
Step 1
Get to know MUD
Have your basic questions about MUD answered here: what is MUD, why MUD, etc.
Learn More
Step 2
View the online MUD demo
Check the demo to visualize what we deliver through MUD, and to further understand why you need MUD on your network
Try it out
Step 3
Create MUD URL & MUD file
Automatically create the MUD URL & MUD file following a few steps through MUD Maker
Check it out
Step 4
Embed MUD URL in your device
Developer guide
Use developer guide to integrate MUD URL into your IoT devices
See sample code
Sample Code in GitHub
Sample code has been posted on Github to help you program your own MUD elements.
See sample code
Step 5
Test your MUD URL
Test your MUD-enabled elements by capturing a MUD URL in a Wireshark PCAP file
Test it out
Step 6
Introduce MUD to your customers
To differentiate your products and services, now you are ready to showcase this industry standard IoT security approach to your customers.
Share
Industry Endorsement
“MUD technology is valuable for Innovative Lighting. MUD technology will enhance our commissioning process by identifying our devices on the network. Furthermore, MUD technology will provide the appropriate access control policy promoting a more secure system. We look forward to working more with Cisco and the MUD technology.”

Harry Aller, CTO, Innovative Lighting
“MUD was selected to protect Molex IoT solution against malicious parties. MUD is a relatively simple solution to implement at the device level, light on constrained IoT devices but takes advantage of strong network infrastructure including network switches and authorization server. Our goal to reduce exposure footprint and the overall solution allows us to provide a level of security to our customers that is scalable and flexible at the same time. The ability to whitelist specific devices in the field allows us to lock down the network but also to respond quickly to events that may take place post deployment.”

Mo Alhroub, Manager of Software Engineering, Molex
Technology - Manufacturer Usage Descriptions (MUD) - Customers
1
Get to know MUD
2
View the online MUD demo
3
Recommend MUD to your device vendors
4
Ready to deploy MUD
MUD benefits for Customers
Automate IoT device type identification thus reduce operational costs
Simplify and scale IoT device access management by automating policy enforcement process
Reduce threat surface of exploding number of IoT devices by regulating traffic and thus avoiding lateral infections
Secure enterprise network through standard-bases approach
Step 1
Get to know MUD
Have your basic questions about MUD answered here: what is MUD, why MUD, etc.
Learn More
Step 2
View the online MUD demo
Check the demo to visualize what we deliver through MUD, and to further understand why you need MUD on your network
Try it out
Step 3
Recommend MUD to your manufacturer
Encourage your vendors to embed MUD URL into their devices by simply sending out this DevNet link, where they can find the detailed instructions on the implementation.
Share
Step 4
Ready to deploy MUD
Now you are ready to embrace all the MUD benefits as long as you have the right network environment. Visit ISE community and leave your questions to seek for any support you need!
ISE Community
Technology - Manufacturer Usage Descriptions (MUD)
Manufacturer Usage Descriptions
MUD provides a means for end devices to signal to the network what sort of access and network functionality they require to properly function. This bridges the gap between the manufacturer and the user, and facilitates a level of trust and security that network and security administrators truly value. Device manufacturers can thus enhance the security of their devices, and Integrators can leverage this to segment a network with 'Things.'
Why Use MUD
7B
enterprise IoT
devices deployed
by 2020

25%
adds of a data
breach for
an enterprise

$3.6M
average cost
of a security
incident
$5M
costs to industry
of ransomware
in 2017
MUD Features
Device Visibility
Do you know devices
well enough to differentiate service?
Intent-based Policy
Do customers know behavior of devices
to build their policy?
Device Visibility
Is there eny industry
standard way of connecting
IoT devices to enterprise network?
How MUD works
IoT Assets
1
MUD - URL in LLDP/DHCP/802.1X
Network Devices
2
MUD - URL
5
Access controls for asset
MUD Controller
3
MUD Controller fetches file over HTTPS
4
MUD controller receives file, translates it into policy
MUD File Server
Learn More
For Manufacturers
For Customers
Learn MUD
1
Get to know MUD
2
View the online MUD demo
Adopt MUD
3
Create MUD URL & MUD File
4
Embed MUD URL on your device
5
Test your MUD URL
6
Introduce MUD to your customers
Learn MUD
Adopt MUD
1
Get to know MUD
2
View the online MUD demo
3
Recommend MUD to your device vendors
4
Ready to deploy MUD
Industry Endorsement
“MUD technology is valuable for Innovative Lighting. MUD technology will enhance our commissioning process by identifying our devices on the network. Furthermore, MUD technology will provide the appropriate access control policy promoting a more secure system. We look forward to working more with Cisco and the MUD technology.”

Harry Aller, CTO, Innovative Lighting
“MUD was selected to protect Molex IoT solution against malicious parties. MUD is a relatively simple solution to implement at the device level, light on constrained IoT devices but takes advantage of strong network infrastructure including network switches and authorization server. Our goal to reduce exposure footprint and the overall solution allows us to provide a level of security to our customers that is scalable and flexible at the same time. The ability to whitelist specific devices in the field allows us to lock down the network but also to respond quickly to events that may take place post deployment.”

Mo Alhroub, Manager of Software Engineering, Molex
Read Our Blogs
You have question?
Send your question on email
mud@cisco.com