ZaunDocs

Firewalls / Network Security

Integration setup guides for firewall and network security platforms.

Connect your firewalls and network security appliances to Zaun for traffic monitoring, policy analysis, and threat detection.

Cisco Firepower (FMC)

Category: Next-Gen Firewall Management | Auth: Token Auth

Required Credentials

FieldDescription
FMC Hostname/IPFirewall Management Center address
UsernameFMC admin account
PasswordAdmin password

Tokens are valid for 30 min, refreshable up to 3 times.

Setup Steps

  1. Enable REST API: System > Configuration > REST API Preferences > Enable.
  2. Create a dedicated user with a minimal role (e.g. Security Analyst Read Only).
  3. Paste credentials into Zaun.

FortiGate

Category: Next-Gen Firewall | Auth: API Key

Required Credentials

FieldDescription
API TokenAuto-generated when creating a REST API admin
Firewall URLFortiGate management address

Auth: Authorization: Bearer <token>

Setup Steps

  1. Create a custom Admin Profile: System > Admin Profiles > Create New with only needed permissions.
  2. Create a REST API Admin: System > Administrators > Create New > REST API Admin.
  3. Assign the profile and set trusted host IPs (required).
  4. Copy the generated token immediately (shown once). Paste into Zaun.

Set an API Key Lifetime under Device > Setup > Management (default is no expiry).


Juniper SRX

Category: Firewall (Junos OS) | Auth: Basic Auth

Required Credentials

FieldDescription
Firewall AddressSRX management IP:port (default 3443)
UsernameJunos OS user
PasswordUser password

Setup Steps

  1. Enable REST API: set system services rest https port 3443.
  2. Create a dedicated user with a custom login class (e.g. read-only).
  3. Commit configuration. Paste credentials into Zaun.

Cisco Meraki

Category: Cloud-Managed Network | Auth: API Key

Required Credentials

FieldDescription
Dashboard API KeyTied to a Meraki dashboard admin account

Auth: Authorization: Bearer <key>. Rate: 10 req/sec per org.

Setup Steps

  1. In Meraki Dashboard > Organization > API & Webhooks > API keys.
  2. Click Generate API Key. Copy immediately (cannot be viewed again).
  3. Recommended: create a dedicated admin with scoped org access.
  4. Paste into Zaun.

Palo Alto Networks

Category: Next-Gen Firewall (PAN-OS) | Auth: API Key

Required Credentials

FieldDescription
Firewall/Panorama URLManagement address
API KeyGenerated from admin credentials

Auth: X-PAN-KEY: <key> header.

Setup Steps

  1. Create a dedicated admin account with a minimal role (e.g. Device admin readonly).
  2. Generate the API key: POST https://<firewall>/api/?type=keygen&user=<user>&password=<pass>
  3. Store the returned key securely. Paste into Zaun.

Set an API Key Lifetime under Device > Setup > Management > Authentication Settings (recommended: 30-90 days).


SonicWall

Category: Firewall (SonicOS) | Auth: Basic Auth

Required Credentials

FieldDescription
Firewall IP & PortManagement address
UsernameAdmin account
PasswordAdmin password

Setup Steps

  1. Enable API: MANAGE > Network > Appliance > SonicOS API section > enable.
  2. Create a dedicated admin with minimal permissions.
  3. Paste credentials into Zaun.

Sophos Firewall

Category: XG / XGS Series | Auth: Basic Auth

Required Credentials

FieldDescription
Firewall IPManagement address
UsernameAPI admin user
PasswordAdmin password

Setup Steps

  1. Create an API admin: Authentication > Users > Add, set type to Administrator.
  2. Enable API: Backup & Firmware > API > toggle ON.
  3. Add allowed source IP addresses for API calls.
  4. Paste credentials into Zaun.

WatchGuard Firewall

Category: Firebox Management | Auth: OAuth2

Required Credentials

FieldDescription
API KeyFrom WatchGuard Cloud
Access IDRead-only or Read-Write
PasswordPaired with Access ID

Setup Steps

  1. In WatchGuard Cloud > Administration > Managed Access > enable API access.
  2. Note the generated credentials (API Key, Access IDs, Passwords).
  3. Paste into Zaun.