What this connector is
This connector covers two approaches for forwarding SonicWall logs to your SIEM:- Direct syslog forwarding (UDP/TCP)
- Syslog-NG collector (local UDP) → TLS forwarding (recommended for production)
Method 1: Direct syslog forwarding (UDP/TCP)
- Log into SonicWall web management UI
- Go to Log → Settings → Syslog
- Enable syslog
- Configure syslog server:
- Host/IP
- Port
- Format (Syslog or CEF)
- Optional Syslog ID
- Select log categories (attacks, drops, user activity, etc.)
- Apply/Accept
Method 2: Syslog-NG collector (recommended)
Architecture
Steps (high level)
- Deploy a local syslog-ng collector:
- Point SonicWall syslog destination to the local collector IP
- Configure syslog-ng to forward via TLS to the SIEM
-
Verify end-to-end flow:
- collector receiving
- TLS connection established
- SIEM receiving and parsing
Notes
- If logs traverse the internet, prefer TLS forwarding.
- Keep NTP/time sync correct.
- Monitor log volume.
