It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Setting up SOAR for Cisco Meraki Firewall

  • Last updated on

The documentation below outlines the requirements for the Barracuda XDR Automated Threat Response. All action items listed under the Customer Requirements must be completed. All required data will need to be uploaded to the Customer Security Dashboard in the SOAR Settings > Firewalls section. Please note that these instructions are only for customers using a Cisco Meraki Firewall.

To set up SOAR for Cisco Meraki Firewall, do the following:

  • To enable API Access and generate an API Key from the Meraki Dashboard

  • To collect the Organization ID and the Network ID

  • To create a Network Group Policy Name

  • To ensure the IP address can make inbound connections to the firewall

  • To configure the Barracuda XDR Dashboard

To enable API Access and generate an API Key from the Meraki Dashboard

For access to the API, you must first enable the API for your organization.

  1. Log in to the Meraki dashboard: https://dashboard.meraki.com.

  2. Navigate to Organization > Settings.

  3. Ensure the API Access is set to Enable access to the Cisco Meraki Dashboard API.

    Cisco Meraki.png

  4. After enabling the API, navigate to the profile page by clicking on your account email address in the upper right. Then click My profile.

  5. Scroll down to API Access to generate the API key.

  6. Copy, then store the API key in a safe place. Click Done.

    Cisco Meraki1.png

To collect the Organization ID and the Network ID
  1. From the Meraki dashboard, from the bottom of the page, copy the Organization ID.

    OrgID.png
  2. From the Meraki dashboard, copy the ID of the network.
    For more information on finding the network ID, see the Meraki documentation.

  3. Save these ids for use in the To configure the Barracuda XDR Dashboard procedure.

To create a Network Group Policy Name

Name the Network Group Policy “Barracuda_XDR_Blocked_IPs”. Barracuda XDR uses the Group Policy to automatically block IPs on the firewall.

  1. In the Meraki dashboard, navigate to Network-wide > Configure > Group policies.

  2. Click Add a group to create a new policy.

  3. Do the following:

    1. In Name, type Barracuda_XDR_Blocked_IPs.

    2. In Schedule, select Scheduling disabled.

    3. In Bandwidth, select Use network default.

    4. In Firewall and traffic shaping, select Custom network & shaping rules.

      networkgrouppolicyname.png

  4. Click Save Changes.

  5. Copy the Group Policy ID from the URL at the top of the Group Policies page to use in the To configure the Barracuda XDR Dashboard procedure.

    Cisco Meraki3.png
To ensure the IP address can make inbound connections to the firewall
  • 35.155.74.247 and 44.239.173.232 are the static addresses of Barracuda XDR's SOAR platform. Barracuda XDR authenticates from these IPs to remediate threats. Ensure that 35.155.74.247 and 44.239.173.232 can make inbound connections to the firewall.

To configure the Barracuda XDR Dashboard
  1. In Barracuda XDR Dashboard, click SOAR Settings > Firewalls.

    SOARFirewalls.png

  2. Click Config.

  3. In the Edit Config dialog box, enter the following:

    • API Access Port
      NOTE Unless you have set a custom port for REST API calls, the port is 443.

    • External IP

    • Network ID

    • Network Group Name

    • Network Group ID

    • Organization ID

      ConfigDashboard.png

  4. Click Save.

If you need to edit the configuration at any time, follow the Editing XDR SOAR Settings for a Firewall procedure.