Skip to content
Find out how we support MDR.

SonicWall SonicOS

You must have the Firewall integrations license pack to use this feature.

You can integrate the SonicWall SonicOS security appliance with Sophos Central so that it sends event messages to Sophos for analysis.

This integration uses a log collector hosted on a virtual machine (VM). Together they're called an integration appliance. The appliance receives third-party data and sends it to the Sophos Data Lake.

This page describes integration using an appliance on ESXi or Hyper-V. If you want to integrate using an appliance on AWS, see Integrations on AWS.

Key steps

The key steps in an integration are as follows:

  • Add an integration for this product. In this step, you create an image of the appliance.
  • Download and deploy the image on your VM. This becomes your appliance.
  • Configure SonicOS to send data to the appliance.

Requirements

Appliances have system and network access requirements. To check that you meet them, see Appliance requirements.

Add an integration

To integrate SonicOS with Sophos Central, do as follows:

  1. In Sophos Central, go to Threat Analysis Center > Integrations > Marketplace.
  2. Click SonicWall SonicOS.

    The SonicWall SonicOS page opens. You can add integrations here and see a list of any you've already added.

  3. In Data Ingest (Security Alerts), click Add Configuration.

    Note

    If this is the first integration you've added, we'll ask for details about your internal domains and IPs. See My domains and IPs.

    Integration setup steps appears.

Configure the appliance

In Integration setup steps, you can configure a new appliance or use an existing one.

We assume here that you configure a new appliance. To do this, create an image as follows:

  1. Add a name and description for the new integration.
  2. Click Create new appliance.
  3. Enter a name and description for the appliance.
  4. Select the virtual platform. Currently we support VMware ESXi 6.7 Update 3 or later and Microsoft Hyper-V 6.0.6001.18016 (Windows Server 2016) or later.
  5. Specify the IP settings for the Internet-facing network ports. This sets up the management interface for the VM appliance.

    • Select DHCP to assign the IP address automatically.

      Note

      If you select DHCP, you must reserve the IP address.

    • Select Manual to specify network settings.

  6. Select the Syslog IP version and enter the Syslog IP address.

    You'll need this syslog IP address later, when you configure SonicOS to send data to your appliance.

  7. Select a Protocol.

    You must use the same protocol when you configure SonicOS to send data to your appliance.

  8. Click Save.

    We create the integration and it appears in your list.

    In the integration details, you can see the port number for the appliance. You'll need this later when you configure SonicOS to send data to it.

    It might take a few minutes for the appliance image to be ready.

Deploy the appliance

Restriction

If you're using ESXi, the OVA file is verified with Sophos Central, so it can only be used once. If you have to deploy another VM, you must create an OVA file again in Sophos Central.

Use the image to deploy the appliance as follows:

  1. In the list of integrations, in Actions, click the download action for your platform, for example Download OVA for ESXi.
  2. When the image download finishes, deploy it on your VM. See Deploy an appliance.

Configure SonicOS

You now configure SonicOS to send data to us.

Note

You can configure multiple instances of SonicOS to send data to Sophos via the same appliance. After you finish integration, repeat the steps in this section for your other instances of SonicOs. You don't need to repeat the steps in Sophos Central.

To configure syslog settings on your SonicOS firewall, do as follows:

Note

If you use SonicWall's Global Management System (GMS) to manage your firewall, you can't change the syslog format (Default) or the syslog ID (Firewall). You can change the other settings. The following instructions don't use GMS.

  1. Go to Log > Syslog.
  2. Select Syslog Servers and click Add.
  3. Enter the syslog IP address you set for your appliance.

    You must enter the same setting you entered in Sophos Central when you added the integration.

  4. In Syslog Format choose ArcSight. The Sophos appliance receives ArcSight CEF format alerts.

    When you select Arcsight, the Configure icon becomes active.

  5. Click the Configure icon. The ArcSight CEF fields Settings configuration window appears.

  6. Select the ArcSight options that you want to log. In most cases, this is All. To select all options, click Select All.
  7. Click Save.
  8. In the Syslog ID box, enter the syslog ID that you want.

    A Syslog ID field is included in all generated messages, prefixed by id=.

    For example, for firewall, the default value, all syslog messages include id=firewall. You can set an ID consisting of 0 to 32 letters, numbers, and underscores.

    Note

    When Override Syslog Settings with Reporting Software Settings option is turned on, the Syslog ID field is fixed to "Firewall". You can't change it.

  9. Click Accept at the top of the page.

  10. Go to Log > Settings to configure which alerts are forwarded to Sophos.
  11. In Logging Level you must select Warning.

    This filters out lower priority events.

  12. On the Log > Settings page you can also filter events according to their Event Attributes.

    1. Select a category and click Configure.
    2. In Edit Log Category, select the syslog checkbox for specific categories.

      Your changes apply to all groups and events in the selected category.

More information