Zabbix Sophos Xg



  1. Zabbix Sophos Xg 4
  2. Zabbix Sophos Xg Snmp
  3. Zabbix Sophos Xg Firewall

Sophos XG Firewall provides comprehensive next-generation firewall protection that exposes hidden risks, blocks unknown threats, and automatically responds to incidents.

Grafana.com provides a central repository where the community can come together to discover and share dashboards. Sophos XG Firewall supports IPv4 and IPv6 addresses. Agent configuration allows you to configure the agent details. Community displays a list of all the communities. You can sort, add, update, or delete communities. The current version of the Sophos UTM template for Zabbix is quite straight forward and is based on the knowledgebase article 119371 in which usefull SNMP OID’s can be found. Currently the template consists of: 2 Applications (Network, 37 items &. Sophos (XG) Firewall. I want to moniter sophos firewall xg 500 with zabbix server, how to connect through snmp. This thread was automatically locked due. Sophos XG Firewall Popular SNMPv2 template for XG series Sophos Firewall 56 static items and 45 triggers + discovered interface items and triggers It using (linked) default zabbix templates: Template Module Generic SNMPv2 (Temlate Module ICMP Ping) Template Module Interfaces.

Exposes hidden risks

Sophos XG Firewall provides unprecedented visibility into top risk users, unknown apps, advanced threats, suspicious payloads and much more. You also get rich on-box reporting included at no extra charge and the option to add Sophos iView for centralized reporting across multiple firewalls.

Blocks unknown threats

Sophos XG Firewall provides all the latest advanced technology you need to protect your network from ransomware and advanced threats including top-rated IPS, Advanced Threat Protection, Cloud Sandboxing, Dual AV, Web and App Control, Email Protection and a fullfeatured Web Application Firewall. And it’s easy to setup and manage.

Zabbix

Automatically responds to incidents

XG Firewall is the only network security solution that is able to fully identify the source of an infection on your network and automatically limit access to other network resources in response. This is made possible with our unique Sophos Security Heartbeat™ that shares telemetry and health status between Sophos endpoints and your firewall.

Potent, powerful… fast

We’ve engineered XG Firewall to deliver outstanding performance and security efficiency for the best return on your investment. Our appliances are built using Intel multi-core technology, solid-state drives, and accelerated in-memory content scanning. In addition, Sophos FastPath packet optimization technology ensures you’ll always get maximum throughput.

Simply manage multiple firewalls

Sophos Firewall Manager provides a single console for the complete central management of multiple XG Firewalls. And if you also want to consolidate reporting across multiple XG, SG, and Cyberoam appliances then with Sophos iView, you can.

Security features you can’t get anywhere else

XG Firewall includes a number of innovations that not only make your job a lot easier, but also ensure your network is more secure.

Synchronized Security

An industry first, Synchronized Security links your endpoints and your firewall to enable unique insights and coordination. Security Heartbeat™ relays Endpoint health status and enables your firewall to immediately identify and respond to a compromised system on your network. The firewall can isolate systems until they can be investigated and cleaned up. Another Synchronized Security feature, Synchronized App Control, also enables the firewall to query the endpoint to determine the source of unknown traffic on the network.

Unified Firewall Rules

User identity takes enforcement to a whole new layer with our identity based policy technology enabling user level controls over applications, bandwidth and other network resources regardless of IP-address, location, network or device. It literally takes firewall policy to a whole new layer.

A Firewall That Thinks Like You

Pre-defined policy templates let you protect common applications like Microsoft Exchange or SharePoint quickly and easily. Simply select them from a list, provide some basic information and the template takes care of the rest. It sets all the inbound/ outbound firewall rules and security settings for you automatically – displaying the final policy in a statement in plain English.

Insights into Top Risk Users

The Sophos User Threat Quotient (UTQ) indicator is a unique feature which provides actionable intelligence on user behavior. Our firewall correlates each user’s surfing habits and activity with advanced threat triggers and history to identify users with risk-prone behavior.

Flexible deployment, no compromise

Unlike our competitors, whether you choose hardware, software, virtual or Microsoft Azure, we don’t make you compromise – every feature is available on every model and form- factor.

Overview

The article introduces how to configure DNAT with Load Balancing for outside client can connect to Web Servers

SophosZabbix sophos xg

Zabbix Sophos Xg 4

Diagram

How to configure

Identifier for 2 Web server

  • Navigate to Hosts and Services -> Choose IP Host -> Click Add
  • Name
  • In IP Version: Choose IPv4
  • In Type: Choose IP List
  • In List of IP Address: Enter the IP Addresses of 2 web servers

-> Click Save

Create DNAT rule

  • Rules and policies -> Choose NAT rules -> Click Add NAT rule -> New NAT rule

Zabbix Sophos Xg Snmp

  • Enter name for DNAT rule
  • In Rule position: Choose Top
  • In Original source: Choose Any
  • In Original destination: Choose WAN port
  • In Original service: Choose HTTPS
  • In Translated source (SNAT): Choose Original
  • In Translated destination (DNAT): Choose webservers which was created before
  • In Translated service (PAT): Choose Original
  • In Inbound interface: Choose WAN port
  • In Outbound interface: Choose Any
  • In Load Balancing method: Choose 1 on 5
    • Round-robin: Requests are served sequentially, starting with the server next to the previously assigned server. Use it when you want to distribute traffic equally and don’t require session persistence.
    • First alive: Incoming requests are served to the primary server (the first IP address of the range). If the primary server fails, requests are forwarded to the next server and so on. Use it for failover.
    • Random: Requests are served randomly to the servers with equal load distribution. Use this when you want equal distribution and don’t require session persistence or order of distribution.
    • Sticky IP: Traffic from a specific source is forwarded to the mapped server. Use this when you want the requests to be processed by the same server.
    • One-to-one: Requests are sent to the mapped IP addresses. The IP addresses of the original and translated destinations must be equal in number.
  • In Health check to check server

Zabbix Sophos Xg Firewall

-> Click Save