Sonicwall
The Sonicwall can be orchestrated in three ways, Actively (API call from an Orchestration Agent to the Firewall), Passively via Sonicwalls DEAG polling capability, or a combination known as Passive+, where a DEAG is utilized with an active force-download-now call made to the Sonicwall API to shorten the polling period.
Active or Passive orchestration
Active - Knocknoc's Sonicwall orchestration capability utilises the Sonicwall API to actively manage the device, inserting and removing IP addresses as part of the Knocknoc Grant process. This is an active, near-real-time approach that provides the best user experience. Knocknoc manages the IP lists within address groups, but not the firewall policy itself. That is controlled by the Administrator or firewall team/MSSP.
Passive - Knocknoc's Allowlist feature provides a passive integration with firewalls that support polling for IP address lists, Sonicwall calls these Dynamic External Address Groups or DEAGs. This feature pulls from the Knocknoc server a list of IPs of authenticated users, in the correct group/for the assigned firewall policy. The drawback of this feature is that the list can only be fetched every 5 minutes in the case of a Sonicwall.
Passive+ (Passive with an Active sync) - the Passive DEAG can be utilised in conjunction with an Active API hit to trigger a live refresh from the DEAG. This shortens the time taken for polling from 5 minutes to near instantaneous and is useful for large IP address lists.
Requirements
- Sonicwall 7+
- Agent version 25.12+ if you're using an Active or Passive+ integration.
Active (via Sonicwall API)
Sonicwall configuration
Log in to the Sonicwall as an Admin user.
You need to create an "Address group" along with a baseline V4 Host entry. Knocknoc will add/remove host IP entries from these groups actively as users login/logout of Knocknoc.
First we create a baseline host address, Sonicwall requires an entry in the address-group lists as a baseline.
You're now ready to configure Knocknoc.
Knocknoc configuration
Select the "Firewalls / Appliances" Knoc configuration, selecting "Active"
Follow the prompts, as the example below:
A non-admin credential can created and utilized, however management must also be allowed on the network interface. Unfortunately Sonicwall does not allow fine grained controls, they may in future releases.
Testing it out!
Log in to Knocknoc as a user linked in the Knoc.
On the Sonicwall, refreshing the Address Group will now list their IP address and username as an object.
Using this in a firewall rule
You can now use this knocknoc-managed dynamic address group within firewall rules and policies.
Passive (DEAG polling)
Knoc configuration
- Log in to Knocknoc as an Admin
- Navigate to Knocs, Create new
- Select Firewalls, Passive
- Enter a meaningful name and proceed through to the API key step
- Select "Do not require API key" - Sonicwall does not support authentication on the DEAG polling, so a combination of IP source trust and/or randomness (security-through-obscurity..) is relied on to protect the IP address source list.
- Put in source IP addresses if possible, it's unlikely your firewall IPs will change so this is definitely worth doing.
- Save
- Copy the Allowlist URI, it is required in the next step.
Sonicwall configuration
Log in to the Sonicwall as an Admin user.
You're now ready to use this IP address group within your Sonicwall rules!








