IMPORT PROCEDURE GUIDE FOR NETWORK MONITORING APPLIANCES
A Network Monitoring appliance is a dedicated device used to collect, analyze and display network status, traffic, events, logs, device performance, abnormal access patterns or cybersecurity indicators. If it is generally described as “server”, “network appliance” or “monitoring device” without a locked model, function and technical file, the shipment may face incorrect HS classification, missing cybersecurity product import license, inaccurate labeling or post-ETA document requests. This guide provides an E2E (End-to-End) review map covering HS code, duty, C/O, specialized policy, customs dossier, clearance workflow and risks to block before ETA.
QUICK FACT
| Item | Direction for Network Monitoring | Operational note |
|---|---|---|
| Suggested goods description | Network Monitoring appliance, model…, used for monitoring network traffic, logs/events and cybersecurity alerts | Do not merge with firewall, NAC, IPS/IDS, DDoS appliance, SIEM or UTM if the model has a different function. |
| HS codes to review | 8471.30.90 / 8471.41.90 / 8471.49.90 or 8517.62.43 / 8517.62.49 depending on product nature | Circular 10/2022/TT-BTTTT lists Network Monitoring with these code groups in the licensed cybersecurity import list; final HS depends on catalogue/datasheet/model. |
| Suggested duties | General import duty 5%; MFN duty 0%; VAT 10%; FTA duty may be 0% with valid C/O | Check the tariff schedule at declaration date, final HS and C/O conditions. |
| Specialized policy | May fall under cybersecurity products imported under license; civil cryptography must be reviewed if encryption/VPN/key management is present | Do not state “no license required” before reviewing model, functions and technical documents. |
| Key technical documents | Catalogue, datasheet, admin guide, user manual, security function list, license sheet, model list, test report if any, original label and serial photos | Distinguish physical hardware appliance from software/virtual appliance/license subscription. |
SCOPE OF APPLICATION
This article applies to Network Monitoring appliances imported as standalone physical hardware, commonly used in data centers, SOC/NOC environments, factories, banks, FDI/EPE enterprises or projects requiring performance and cybersecurity visibility.
Applicable to
- Dedicated appliance for monitoring network traffic, device status, logs, events, anomalies or cybersecurity alerts.
- Devices with dashboard, collector, probe, sensor, packet capture, NetFlow/sFlow/IPFIX, SNMP, syslog or event analytics engine.
- Hardware imported with license enabling the Network Monitoring function.
Not automatically applicable to
- Firewall, NAC, IPS/IDS, DDoS appliance, SIEM or UTM even if in the same menu group.
- Standard server installed with monitoring software but essentially imported as server/ADP equipment.
- Software license, subscription or cloud service without physical hardware.
Must be reviewed separately
- Used/refurbished goods, warranty replacement, samples or project cargo.
- Devices with VPN, encryption, key management, SSL inspection or advanced security functions.
- Devices with Wi‑Fi/Bluetooth/4G/5G module, battery, adapter, charger or special accessory.
Application principle
- Do not use one policy conclusion for all network security equipment.
- Review by catalogue, datasheet, model and actual import purpose.
- Policy may change by function, condition and technical documents.
CLASSIFICATION & TECHNICAL IDENTIFICATION
Network Monitoring may be identified through terms such as network monitoring appliance, network visibility, packet broker/probe, traffic analyzer, performance monitoring, log/event collector, flow analytics, network sensor or centralized monitoring. The key question is whether the device monitors cybersecurity status or only performs ordinary performance monitoring.
| Checkpoint | Document to review | Risk if incorrectly described | Suggested description on documents/declaration |
|---|---|---|---|
| Main function | Catalogue, datasheet, admin guide, function matrix | Incorrect HS code or wrong/missing cybersecurity license | Network Monitoring appliance, model…, used to collect and monitor network traffic/events. |
| Hardware nature | Datasheet, port photos, CPU/RAM/storage, power, port list | May be classified as server/ADP or another data transmission device | Specify hardware appliance, network ports, power supply and accessories. |
| Cybersecurity function | Security function list, license sheet, white paper | May miss licensed cybersecurity product policy | State cybersecurity monitoring function if the device has it. |
| Encryption/VPN/key management | Encryption statement, admin guide, datasheet | Civil cryptography review may arise | Obtain written manufacturer confirmation if civil cryptography is not included. |
| Goods condition | Invoice, contract, photos, serial list | Used/refurbished IT goods may trigger additional policy | Declare 100% new only when supported by documents. |
HS CODE – DUTY – C/O
HS classification for Network Monitoring must be based on product nature: ADP machine/function unit, or a device for transmitting/receiving/converting network data. From a cybersecurity licensing angle, the appendix to Circular 10/2022/TT-BTTTT lists “Network Monitoring” with the code groups to review.
| Reference HS code | Applicable condition | Risk if misapplied | Documents to review |
|---|---|---|---|
| 8471.30.90 / 8471.41.90 / 8471.49.90 | Device essentially being ADP machine or functional unit of data processing system | HS explanation on CPU/RAM/storage/system nature may be required | Datasheet, hardware configuration, OS, BOM, user/admin guide. |
| 8517.62.43 / 8517.62.49 | Device transmitting, receiving, converting or processing network data with network appliance functions | Wrong duty, wrong specialized policy and C/O impact | Port list, network function description, catalogue, label/port photos. |
| Software/license without hardware | Only license/subscription/virtual appliance imported, not physical equipment | Wrong treatment of intangible/tangible goods, value and tax file | License agreement, software/service invoice, payment documents. |
SUGGESTED DUTY TABLE
| Tax type | Suggested rate | Condition | Review documents |
|---|---|---|---|
| General import duty | 5% | Applied when MFN/FTA condition is not met or under current tariff for final HS | Tariff at declaration date, final HS. |
| MFN import duty | 0% | Applied to eligible MFN origin/territory and matching HS code | MFN tariff, commercial documents. |
| VAT | 10% | Applied under VAT policy at import date unless otherwise provided | Declaration, customs value, current VAT policy. |
| FTA preferential duty | May be 0% | Only when C/O is valid, correct in form, origin criterion, description and transport route | Draft/original/e-C/O, Invoice, Packing List, B/L/AWB. |
SPECIALIZED POLICY MATRIX
| Goods scenario | Potential policy | Documents to check | Authority/portal if identifiable | Suggested timing | Risk note |
|---|---|---|---|---|---|
| Network Monitoring with cybersecurity monitoring functions | May be a cybersecurity product imported under license | Catalogue, datasheet, security function list, model list | Authority of Information Security – Ministry of Information and Communications; online submission via the MIC Public Service Portal or National Public Service Portal if applicable | Before ETA, preferably before purchase/shipment | Do not state no license before model and function review. |
| Device only for ordinary network performance monitoring | Nature must still be explained to distinguish it from cybersecurity products | Datasheet, user manual, log/alert/analytics functions | Customs and specialized authority upon request | Before declaration | Need manufacturer confirmation if no cybersecurity functions. |
| Encryption/VPN/key management present | Review civil cryptography under Decree 211/2025/ND-CP and relevant lists | Encryption statement, admin guide, white paper, license sheet | Civil cryptography authority/competent portal | Before shipment | Encryption function must be confirmed technically. |
| Wireless module/battery/adapter | Review ICT group 2, conformity, supplementary labeling or safety standards if applicable | RF datasheet, adapter label, test report, label photos | Relevant specialized authority if applicable | Before ETA | Accessories may affect labeling and quality files. |
| Used/refurbished goods | Review used IT goods policy and import conditions, including Circular 26/2025/TT-BKHCN if within scope | Invoice, contract, serial list, photos, condition statement | Customs/relevant authority | Before purchase | Do not purchase used/refurbished goods before policy conclusion. |
| Import for EPE/FDI/factory use | Review import purpose, customs regime, asset management and post-clearance records | PO, contract, purpose statement, fixed asset list | Customs branch handling the declaration | Before declaration | Import purpose affects regime and recordkeeping. |
LEGAL DOCUMENTS TO REVIEW
| Document group | Name/number | Issuing authority | Effective/applicable date | Role in procedure | Notable provisions/appendix | Review note |
|---|---|---|---|---|---|---|
| Law | Law on Cyberinformation Security No. 86/2015/QH13 | National Assembly | Effective from 01/07/2016 | Legal framework for cybersecurity products/services and civil cryptography | Review ATTT/MMDS provisions according to actual file | Do not infer license conclusion before list review. |
| Decree | Decree 108/2016/ND-CP | Government | Effective from 01/07/2016 | Business conditions for cybersecurity products/services and licensed cybersecurity imports | Cybersecurity product and licensing conditions | Check amendments/supplements if any. |
| Circular | Circular 13/2018/TT-BTTTT | Ministry of Information and Communications | Effective from 01/12/2018 | List and dossier/procedure for cybersecurity products imported under license | Appendix I and licensing dossier | Read together with Circular 10/2022/TT-BTTTT. |
| Amending circular | Circular 10/2022/TT-BTTTT | Ministry of Information and Communications | Effective from 15/09/2022 | Amends the list and licensing procedures | Appendix I includes “Network Monitoring” | Use to review model, HS code and function. |
| Civil cryptography decree | Decree 211/2025/ND-CP | Government | Effective from 09 September 2025 | Regulates civil cryptography activities and related imports | Only if the device has functions within civil cryptography scope | Review by actual encryption function. |
| Used IT goods circular | Circular 26/2025/TT-BKHCN | Ministry of Science and Technology | Effective from 31 October 2025 | Reviews import conditions for goods under the list of used IT products banned from import | Applies only when the goods are used/refurbished or fall under processing scenarios within the circular scope | Review goods condition, serial numbers, photos and actual transaction documents. |
| Tariff | Current import-export tariff schedule | Tax/customs competent authority | At declaration date | Determines general, MFN, VAT and FTA duty | Final HS code and tariff at declaration date | Do not use outdated duty rates. |
VIEW / DOWNLOAD ORIGINAL LEGAL DOCUMENTS
The importer may search by document number on the official legal document portal, Government portal or issuing authority website. Before applying, the importer should cross-check on official legal portals or the issuing authority website.
CUSTOMS DOCUMENT DOSSIER
Commercial documents
- Commercial Invoice.
- Packing List.
- Bill of Lading/Air Waybill.
- Sales Contract/Purchase Order if available.
- Certificate of Origin – C/O if claiming preferential duty.
Technical/specialized documents
- Catalogue, datasheet, admin guide, user manual.
- Security function list, license sheet, model/serial list.
- Cybersecurity product import license if applicable.
- Civil cryptography file if functions fall under control.
- Labeling file, test report or conformity documents if arising.
| Document group | Required documents | Used for which step | Usually prepared by | Common mistake | Pre-ETA check |
|---|---|---|---|---|---|
| Commercial | Invoice, Packing List, Contract/PO | Value, description, quantity, origin declaration | Importer, shipper, sales/docs | Generic description, missing model/serial | Match line by line with catalogue and PO. |
| Transport | B/L/AWB, arrival notice, pre-alert | D/O, declaration, ETA tracking | Forwarder/agent/docs | Wrong consignee, mismatch weight/packages | Check pre-alert immediately. |
| Technical | Catalogue, datasheet, admin guide, function matrix | HS, policy review, customs explanation | Manufacturer, importer, IT/compliance | Monitoring/cybersecurity function unclear | Request documents for exact model. |
| License/specialized | Cybersecurity/civil cryptography license, test report, conformity docs if any | Specialized file/customs supplement | Compliance/legal/importer | Applying after ETA, model mismatch | Lock model list before shipment. |
| Origin | Draft C/O, original/e-C/O | FTA duty claim | Shipper/exporter/importer | Wrong form, description or HS | Review draft C/O before issuance. |
Consistency rule: Goods description, quantity, model, serial, origin and technical parameters must match across commercial documents, catalogue, label, specialized file and customs declaration.
DECISION POINTS THAT MAY HOLD THE SHIPMENT
| Decision point | Question to answer | Proof documents | Consequence if unclear | Recommended handling |
|---|---|---|---|---|
| HS code | Is it ADP/server, network appliance or data transmission equipment? | Datasheet, catalogue, port list, hardware configuration | Reclassification request, prolonged clearance | Prepare classification explanation and technical file. |
| Cybersecurity license | Does the model fall under “Network Monitoring” imported under license? | Circular 13/2018, Circular 10/2022, datasheet, function list | License supplement or specialized explanation | Review by model and function before ETA. |
| Civil cryptography | Does it include VPN, dedicated encryption or key management? | Encryption statement, admin guide, white paper | Possible license/file review | Obtain written confirmation from manufacturer. |
| Model/serial | Do document models match catalogue, label and license sheet? | Invoice, Packing List, label, model list, license sheet | Channel inspection, amendment or explanation | Lock model/serial list before documents are issued. |
| C/O | Is the form, origin criterion, description and HS correct? | Draft C/O, Invoice, B/L/AWB, Packing List | FTA duty may be refused | Review draft C/O before issuance. |
| Goods condition | New, used or refurbished? | Invoice, contract, photos, serial list | Used IT goods policy risk | Do not declare new without supporting documents. |
E2E OPERATIONAL WORKFLOW
Pre-ETA review
Finalize HS, duties, C/O, labeling, goods condition, cybersecurity policy, civil cryptography risk and technical file. For Network Monitoring, clarify cybersecurity monitoring, packet/log/flow analytics and license functions.
Lock documents and technical file
Cross-check Invoice, Packing List, B/L/AWB, catalogue, datasheet, model list, serial list and license sheet. Goods description must support customs explanation.
Register specialized license/inspection if applicable
If the model falls under cybersecurity import license or civil cryptography review, prepare the dossier before ETA. Do not wait until cargo arrival to request function confirmation from manufacturer.
Open customs declaration
Green channel may clear under system conditions; Yellow channel checks documents; Red channel checks documents and physical goods. Common questions: HS, value, model, C/O, cybersecurity/civil cryptography policy.
Clearance, delivery and recordkeeping
Deliver cargo to warehouse, complete supplementary labeling/conformity mark if applicable, archive shipment file and keep documents for post-clearance review.
PRE-ETA RISK CHECKLIST
| Risk | Consequence | How to block before ETA | Documents to check |
|---|---|---|---|
| Generic goods description | Incorrect HS or cybersecurity policy query | State Network Monitoring appliance, model and monitoring function | Invoice, Packing List, catalogue, datasheet. |
| Missing cybersecurity license if applicable | Clearance delay and storage/demurrage cost | Check Appendix to Circular 10/2022/TT-BTTTT by model | Function list, admin guide, model list. |
| Unclear encryption/VPN function | Civil cryptography review after ETA | Request manufacturer statement on encryption/VPN/key management | Encryption statement, admin guide. |
| Model mismatch | Inspection/explanation/document amendment | Lock model list and serial list before shipment | Invoice, Packing List, label, license sheet. |
| Incorrect C/O | Loss of FTA duty preference | Review draft C/O before issuance | Draft C/O, invoice, B/L/AWB. |
| Used/refurbished condition not reviewed | Used IT import policy risk | Confirm condition at purchase stage | Contract, invoice, photos, serial list. |
FAQ
Does Network Monitoring require an import license?
Possibly, if the model falls under cybersecurity products imported under license. Review catalogue, datasheet, model and actual functions.
Does it require quality inspection/conformity certification?
No absolute conclusion should be made. Wireless modules, adapters or ICT group 2 factors must be separately reviewed.
Is Vietnamese supplementary labeling required?
It may be required when goods circulate in Vietnam. Label details must match goods description, model, origin, manufacturer and responsible entity.
Can C/O reduce duty?
Yes, if the C/O is valid under the relevant FTA, correct in form, origin criterion, description and HS code.
Do samples/warranty goods follow the same procedure?
Not automatically. They must still be declared correctly by nature, value, condition and applicable specialized policy.
What if invoice model differs from catalogue?
Request amendment or manufacturer confirmation before declaration. Do not leave model mismatch until cargo arrival.
RELATED ARTICLES
IMPLEMENTATION SUPPORT FROM TGIMEX
This guide provides a map of HS code, duties, documents and specialized policies for Network Monitoring. In actual shipments, the importer should still review catalogue, datasheet, model, documents, origin and import purpose.
Support scope
- Pre-ETA review: HS, cybersecurity/civil cryptography policy, C/O, duties, labeling and technical file.
- Compliance file control: cross-check Invoice, Packing List, B/L/AWB, C/O, catalogue, license sheet and label.
- Coordinate international logistics, agents, carriers/airlines, pre-alert, ETA and transport documents.
Operational risk control
- Prepare customs declaration and handle Green/Yellow/Red channel questions.
- Support explanations on HS, value, origin and specialized policy.
- Archive shipment file and review supplementary label/conformity mark if applicable.
For shipments likely to involve specialized inspection, licenses, C/O or labeling requirements, the importer should not wait until cargo arrival to start document review. A small mismatch among Invoice, Packing List, catalogue, datasheet, C/O or label may lead to document supplement requests, delayed clearance or unplanned storage costs.
Tiếng Việt
中文 (中国)
NEED TO REVIEW IMPORT PROCEDURES OR A SHIPPING PLAN?
Send us the product name, shipping route, current dossier, or implementation request in advance so we can suggest a suitable approach that is practical, focused, and aligned with your shipment.
Import procedure guide for crypto appliance into Vietnam
Import procedure guide for NAS
Import procedure guide for smart plugs
Import Procedure Guide for Storage Appliance
Import procedures for SAN controller into Vietnam
Import Procedures for Smart Hubs
Import Procedure Guide for Smart Lock
Import procedures for Wi-Fi IP camera
Smart Speaker Import Procedure Guide
Import Procedures for Key Management Device
Database Security Import Procedure into Vietnam
Import Procedure Guide for DLP
Import procedure guide for encryption device/module
Import Procedures for Storage Security Appliances
Import procedures for Vulnerability scanner