本文にスキップ

SonicWall Firewall Integration

Overview

This integration collects firewall traffic, IPS, VPN, content filtering, and application control logs from SonicWall UTM/NGFW appliances.

Supported models: TZ270/370/470 (SMB), NSa 2700+ (mid-market) Supported OS: SonicOS 7.x


Prerequisites

  • A KYRA MDR Collector installed and running (Installation Guide)
  • SonicWall administrative access (GUI)
  • Network connectivity from the SonicWall to the collector on port 514

Configuration

Syslog Setup

  1. Log in to the SonicWall management console
  2. Navigate to Log > Syslog
  3. Add a syslog server with the following settings:
SettingValue
Server IPYour KYRA Collector IP
Port514
ProtocolUDP
FormatDefault or ArcSight (CEF)
  1. Click Apply

Tip: Selecting ArcSight (CEF) format simplifies log parsing and is recommended.

Sample Log Format

id=firewall sn=C0EAE4xx time="2026-03-20 10:30:00" fw=10.0.0.1 pri=6 m=97 msg="Connection Opened" srcip=192.168.1.10

Collected Log Types

Log TypeSecurity UsePriority
Firewall trafficNetwork flow visibility, lateral movement detectionHigh
IPS eventsIntrusion detection and attack signaturesCritical
VPNRemote access monitoringHigh
Content FilterWeb access policy enforcementMedium
Application ControlApplication-level traffic visibilityMedium
Anti-Virus / Anti-SpywareMalware detection at the gatewayHigh
DPI-SSLEncrypted traffic inspection eventsMedium
System / AdminConfiguration changes, admin loginsHigh

Troubleshooting

No Logs Received

  1. Verify syslog server IP and port in Log > Syslog
  2. Ensure no firewall rules block UDP 514 between devices
  3. Check that logging is enabled for the desired categories

High Log Volume

Reduce noise by disabling verbose traffic logging and keeping only security-relevant categories (IPS, AV, admin events).

For additional help, contact kyra@seekerslab.com.