It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Setting up SOAR for Sophos XG and XGS Firewall

  • Last updated on

To set up SOAR for Sophos Firewall, do the following:

  • To enable the API configuration on the firewall

  • To add an Administrator profile

  • To add an Administrator User and add the the Administrator profile to it

  • To allow API access

  • To create an IP Host Group for Barracuda XDR Blocked IPs

  • To create a Firewall Rule to ensure the traffic from malicious IPs gets blocked on the Firewall

  • To enable SOAR in XDR Dashboard

To enable the API configuration on the firewall

The Sophos API is disabled by default. You will need to enable it and allow access to specific IP addresses.

  1. In Sophos Firewall, navigate to Backup and firmware > API.

  2. Select the API configuration check box.

  3. In Allowed IP address, add the following XDR SOAR IPs, as well as any other local IPs/networks required to use the API configuration.

    • 44.239.173.232

    • 35.155.74.247

      Sophos1.png
  4. Click Apply.

To add an Administrator profile

You can create an admin profile and allow API access to administrators with specific read-write permissions.

  1. In Sophos Firewall, navigate to Profiles > Device access and create an administrator profile with specific rights.

    AddAdminProfile.png
  2. Click Save.  

To add an Administrator User and add the the Administrator profile to it

When you add a user with the API administrator profile, you can limit the administrator's rights based on the profile.

  1. In Sophos Firewall, navigate to Authentication > Users.

  2. Click Add.

  3. Enter a username to use for authentication.
    You can't change the username later.

  4. Enter a name for the user record.

  5. Enter a password.

  6. Set User type to Administrator.

  7. Select the API administrator profile you created.

    AddUser.png
  8. At the bottom of the page, click Administrator advanced settings and specify the following settings:

    • Schedule for device access Allows sign-ins to the web admin console during the schedule you select.

    • Login restriction for device access Allows sign-ins only from specified IP addresses. Add the following Barracuda XDR SOAR IPs, along with any other local IPs/networks required to use the admin user:

      • 44.239.173.232

      • 35.155.74.247

        AddUser2.png
  9. Click Save.

To allow API access

Turn on the API configuration and allow API access from the administrator's IP addresses. (Similar action might have already been completed in step 1.)

Ensure the zone of the administrator's IP address has access to the web admin console. You can do this on the Administration > Device access page using Local service ACL or Local service ACL exception rule.

  1. In Sophos Firewall, navigate to Backup and firmware > API.

  2. Select API configuration.

  3. For Allowed IP address, enter the following SOAR IP addresses:

    • 44.239.173.232

    • 35.155.74.247

      backupAndFirmware.png
  4. Click Apply

To create an IP Host Group for Barracuda XDR Blocked IPs

Barracuda XDR uses this Group to keep track of the IPs that are automatically blocked on the firewall. Add this group to any preexisting security rules/policies created to block traffic to/from anomalous IP addresses. If no security policy exists on the Sophos firewall, see follow the To create a Firewall Rule to ensure the traffic from malicious IPs gets blocked on the Firewall below.

  1. In Sophos Firewall, navigate to Hosts and services > IP host group and click Add.

  2. Type a name for the host group.

  3. Select the IP version.
    NOTE You can't create a host group that contains both IPv4 and IPv6 hosts.)

    IPHost.png
  4. Click Save.

To create a Firewall Rule to ensure the traffic from malicious IPs gets blocked on the Firewall

For Barracuda XDR to successfully block IPs on your firewall, you need to add the IP Host Group to a firewall rule that blocks this type of traffic. If you do not have a preexisting rule(s) in place, create one and add the IP host group to the firewall rule.

  1. Go to Rules and policies > Add firewall rule > New firewall rule.

  2. Create a firewall rule that blocks traffic from the IPs that are in the IP Host Group you created for XDR.

    FirewallRule.png
  3. Click Save.

To enable SOAR in XDR Dashboard

Upload all Automated Threat Response data to the Customer Security Dashboard.

  1. Navigate to the SOAR Settings > Firewalls section.

  2. Edit the Config for the individual firewall and upload the following data:

    • External IP

    • Port (Admin console HTTPS port. Typically, the default port is “4444”.)

    • Admin Username

    • Admin Password

    • IP Host Group Name

      Dashboard.png
  3. Click Save.