SonicWall NetFlow Integration with ThreatSync+ NDR
The SonicWall firewall uses the NetFlow protocol to export data about IP traffic that enters its interfaces and exports this data as NetFlow fields to a NetFlow collector. The NetFlow collector is a server used to collect network traffic and upload to ThreatSync+ NDR to analyze for security, administration, accounting, and troubleshooting.
WatchGuard provides integration instructions to help customers configure WatchGuard products to work with products created by other organizations. If you want more information or technical support about how to configure a third-party product, go to the documentation and support resources for that product.
This document describes how to integrate the SonicWall with ThreatSync+ NDR using the NetFlow protocol.
Contents
Integration Summary
The hardware and software used to complete the steps outlined in this document include:
- SonicWall TZ670 with SonicOS 7.0.0-R906
- WatchGuard Cloud account with a ThreatSync+ NDR or Total NDR license
- ThreatSync+ NDR Collection Agent (for more information, go to About ThreatSync+ NDR Collection Agents)
Topology
This diagram shows the integration topology of the SonicWall firewall and ThreatSync+ NDR.
Configure the ThreatSync+ NDR Collection Agent
Make sure the ThreatSync+ NDR Collection Agent is installed on your Windows or Linux computer, and the status of the collection agent is Success. For detailed instructions about the ThreatSync+ NDR Collection Agent installation, go to Configure Collection Agents for ThreatSync+ NDR (Windows Computers) or Configure Collection Agents for ThreatSync+ NDR (Linux Computers).
Configure the SonicWall
Before you can configure SonicWall NetFlow, configure these basic settings.
- Log in to the SonicWall management UI at https://<IP address of the SonicWall device>.
- Configure the management IP, external IP and DNS servers.
SonicWall configures the route rules and access rules to the Internet automatically. - Configure the zones for the different networks management. In our example, we created internal-1.
- Configure the interface. In our example, we assigned zone internal-1 which we created in the previous step to Interface X6.
SonicWall configures the route rules, NAT rules, and access rules to the Internet automatically. - Click OK.
For more information, go to the SonicWall documentation.
Configure NetFlow on SonicWall
To configure your SonicWall as a NetFlow exporter:
- Log in to the SonicWall management UI.
- From the top navigation, click DEVICE.
- From the left navigation, select AppFlow > Flow Reporting > Settings.
- In the Report Connections section, select Interface-based.
- Enable Enable Aggregate AppFlow Report Data Collection.
- Enable Enable Real-Time Data Collection [*].
- In the Local Server Settings section, enable Enable AppFlow To Local Collector.
- For other settings, keep the default values.
- Click Accept.
- From the top navigation, click DEVICE.
- From the left navigation, select AppFlow > Flow Reporting > External Collector.
- Enable Send Flows and Real-Time Data To External Collector [*].
- From the External Flow Reporting Format drop-down list, select Netflow version-9 .
- In the External Collector's Server Address section, check IP.
- In the text box under AddrObj, enter the collector ip. In our example, we entered 10.12.0.20.
- In the External Collector's UDP Port Number text box, enter the collector port number that receives NetFlow traffic. In our example, we entered 2055.
- Enable Send IPFIX/Netflow Templates At Regular Interval.
- Enable Report On Connection OPEN.
- Enable Report On Connection CLOSE.
- Enable Report Connection On Active Timeout.
- For other settings, keep the default values.
- Click Accept.
- After the configuration is saved, there will be a warning at the top of the page. Click Restart to save the configuration.
It might take several minutes to complete the reboot.
Test the Integration
To test the SonicWall integration with ThreatSync+ NDR:
- Log in to your WatchGuard Cloud account.
- Select Configure > ThreatSync+ Integrations > Collection Agents. If you have a Service Provider account, you must select an account from Account Manager.
- Select the ThreatSync+ NDR Collection Agents tab to view the Last Activity column of your collection agent. This column shows the last time the collection agent uploaded the NetFlow records to ThreatSync+ NDR. It might take a few hours for the first upload.
- From the navigation menu, select Monitor > ThreatSync+ to view the Network Summary page.
For more information about ThreatSync+, go to ThreatSync+.