Kaseya Integration Guide

Kaseya® is an RMM (Remote Monitoring and Management) tool used commonly among MSPs (Management Service Providers). RMM agents are installed on MSP customer endpoints to discover IT assets and remotely monitor and manage them.

This document describes how to use Kaseya to discover and monitor a WatchGuard Firebox.

Platform and Software

The hardware and software used to complete the steps outlined in this document include:

  • Firebox or WatchGuard XTM device installed with Fireware v11.10.x, with Interface 1 enabled as a trusted interface with the IP address (you can also use an Optional interface)
  • Kaseya version VSA R9.2 (web login)
  • Probe IP address installed on Windows Server 2012 Standard Edition

Test Topology and Workflow

This diagram shows the test topology used in this integration:

Set Up the Firebox

You must configure the SNMP settings on the WatchGuard Firebox before you use Kaseya to discover it.

  1. Log in to Fireware Web UI (https://<your firebox IP address>:8080).
  2. Select System > SNMP.
  3. From the Version drop-down list, select v3.
  4. From the Authentication Protocol drop-down list, select SHA1.
  5. In the Password and Confirm text boxes, type the authentication password.
  6. From the Privacy Protocol drop-down list, select DES.
  7. In the Password and Confirm text boxes, type the encryption password.
  8. In the User Name text box, type WatchGuard.
  9. Click Save.

  1. Select Firewall > Firewall Policies.
  2. Add an SNMP packet filter policy for traffic from Any-Trusted to Firebox.
    If you connect to an optional interface, specifyAny-Optional instead of Any-Trusted.

Set Up Kaseya

  1. Log in to Kaseya.
  2. Download and install the Kaseya Agent on a probe computer. This computer must be in a LAN that connects to the WatchGuard Firebox.

  1. Go to the Discovery page.
  2. Probe the computer shown in Networks > By Agent.

  1. Select Discovery > Networks > By Networks.
  2. Click New to add a new network.

  1. Select the SNMP tab.
  2. Select the Enable SNMP check box.
  3. Leave the Community String text box empty.
  4. Click Save.

  1. In the dialog window that opens, type the gateway name.
  2. Select Network Monitor > Monitoring > View > group (KNM)
  3. Click Edit.

  1. Select the Authentication tab.
  2. For SNMP version, select SNMP v3.
  3. Configure the same SNMP authentication method, encryption method, and credentials that you configured on the Firebox.

  1. Select Discovery > Networks > By Networks > Scan Now to start the scan. Click while the network scan is in progress to check the process.

  1. Select Discovery > Networks > Discovered Devices to see discovered devices. In this example, two Fireboxes were discovered because two Fireboxes on this LAN are configured with SNMP enabled.
  2. Select the Firebox. Click Make Asset.

  1. Select Network Monitor > Monitoring > View > Gateway (WG).

  1. Select Install gateway.

When the gateway installation is done, the page looks like this:

  1. Select the Firebox.

  1. Select Apply template.

  1. Select the WatchGuard XTM template.

  1. Select the Firebox.

  1. Select Add new monitor.

  1. Select SNMP > SNMP.
  2. Select Add monitor.

  1. Configure the Object Identifier (OID). You can type the OID or select it from the MIB tree. If the OID value is a string, from the Value type drop-down list, select Text.

  1. Add three SNMP monitors:
    • XTM Device Model: OID .
    • XTM Device Name: OID .
    • XTM Device Version: OID .

For details about Firebox MIB objects, see:

SNMP monitors information appears on the Monitors tab for the monitored device.

Because of security programs or the firewall configuration, Kaseya may set the name of the discovered device to unknown-MAC address.

To rename a device:

  1. Select Discovery > Networks > Discovered Devices.
  2. Select the device.
  3. Select Rename Device.

The new device name appears in Network Monitor.