It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Setting up SOAR For the Palo Alto Firewall

  • Last updated on

For more information about SOAR, see Setting up SOAR .

The documentation below outlines the requirements for the Barracuda XDR Security Orchestration, Automation, and Response (SOAR) for the Palo Alto Firewall. When you've set this up, all required data is uploaded to the Customer Security Dashboard in the SOAR Settings > Firewalls section.

These instructions are only for customers using a Palo Alto Firewall.

The following are the procedures in setting up SOAR for Palo Alto Firewall:

  • Create an admin role

  • Create an administrator user

  • Generate the API Key

  • Create an Address Group for XDR Blocked IPs

  • Create a Security Policy to ensure the traffic from malicious IPs gets blocked on the Firewall

  • Enable SOAR in XDR Dashboard

Create an XDR Administrator User for API Access

Create a separate administrative account for XDR that will allow us to implement IP blocking on the firewall via API. First, create a custom Admin Role to assign to the admin user created for XDR. Admin Roles are custom roles that define the access privileges and responsibilities of administrators. The roles assigned to an administrator control which areas of the management interface the administrator can view or make changes.

Create an Admin Role

  1. Select Device > Admin Roles and click Add.

  2. Enter a Name to identify the role.

  3. Under REST API, make sure the following areas are enabled (nothing else is required for XDR):

    • Objects > Addresses

    • Objects > Address Groups

    • Policies > Security Rules

    • System > Configuration

      Picture1.png

  4. Under XML API, make sure the following areas are enabled (nothing else is required for XDR):

    • Operational Requests

    • Commit

      Picture2.png

  5. To save the profile, click OK.

Create an Administrator User

  1. Select Device > Administrators.

  2. Click Add an account.

  3. Enter a Name for the user. (Example: xdradmin)

  4. For the Authentication Profile, select None (default) and enter a Password.

  5. For the Administrator Type, select Role Based and select the admin role profile you previously created for the admin user.

    Picture3.png
  6. Click OK.

Generate the API Key

To use the API, generate the API key required for authenticating API calls.

  • To generate the API key, use the following cURL command to make a POST request to the firewall’s IP address or hostname using the credentials for the XDR admin user. (This can be done through Postman or another RESTAPI client.)
    curl -v --http1.1 -X POST --location "https://firewallIP/api/?type=keygen&user=user&password=password" -H 'Content-Type: application/json'

NOTES

  • A successful API call returns status="success" as well as the API key within the key element.

  • When you retrieve your API Key, use the key in its entirety, including any symbols, such as equal signs.

(Example screenshot using Postman)

Picture4.png

Create an Address Group for XDR Blocked IPs

XDR uses this Group to keep track of the IPs we block on the firewall. Add this group to any preexisting security policies that were created to block traffic to/from anomalous IP addresses. If no security policy exists, please see step 4 for creating a security policy.

Static Address Groups cannot be empty. If you don't have an Address object already defined, create one before creating the Address Group.

  1. Navigate to Object > Address Groups, then click Add.

  2. Enter the Name (Example: Barracuda_XDR_Blocked_IPs).

  3. Select Static as Type.

    Picture5.png

  4. Click OK.

  5. Click Commit.

Create a Security Policy to Block Malicious IP Traffic on the Firewall

For XDR to successfully block IPs on the firewall, you must add the address group to a security policy that blocks this type of traffic. If you don't have a preexisting policy in place, create one and add the address group to the firewall policy.

The order of security policies is important. You must create the block policy on the top of the ruleset. If the policy is shadowed by other rules that allow traffic, it isn’t matched, and the communications are still allowed.

  1. Select Policies > Security and Add a new rule.

  2. Create a policy like the example shown below. Depending on the use case, you might need to create two different policies where the Address Group is used as the source and destination.

    Picture6.png

     

  3. Once created, click Commit to save the security rule(s) to the running configuration on the firewall.

Enable SOAR in XDR Dashboard

Upload all Automated Threat Response data to the Customer Security Dashboard.

  1. Navigate to the SOAR Settings > Firewalls section.

  2. Edit the Config for the individual firewall and upload the following data:

    • External IP

    • Credential (API Key)

    • Group Name (Address Group Name)

      Picture8.png

  3. Click Save.