Sophos Firewall: Zoom networks xml import file

Disclaimer: This information is provided as-is for the benefit of the Community. Please contact Sophos Professional Services if you require assistance with your specific environment.

______________________________________________________________________________________________________________________________________

Table of Contents

Overview: 

This Recommended Read shares XML import file to import increasing Zoom Networks into Sophos Firewall

Zoom Network XML File

The zoom network list has increased to over 300 networks.

Attached is the XML file containing all the networks listed on the Zoom site as of 2023 Jan 23. Created as described here. Still a lot of work, though.

You can remove the .zip extension and import it into XG as Entities.tar.

/cfs-file/__key/communityserver-discussions-components-files/258/Zoom_5F00_20230123.tar.zip

______________________________________________________________________________________________________________________________________



Added horizontal lines, edit format, and minor changes on grammar. added table of contents and overview
[edited by: Raphael Alganes at 1:24 PM (GMT -8) on 4 Dec 2023]
  • Thanks for sharing this with the Community!
    ======

    The zoom network list has increased to over 300 networks.

    No fun to edit and import it in Sophos Firewall for firewall rules.

    Attached is the XML file containing all the networks listed on the Zoom site as of 2022 August 09. Created as described here. Still a lot of work, though.

    You can remove the .zip extension and import it into XG as Entities.tar.

    Entities.tar.zip
    =
    ======

    Cheers,

    Karlos
    Community Support Engineer | Sophos Technical Support

    Knowledge Base  |  @SophosSupport  | Sign up for SMS Alerts
    If a post solves your question use the 'This helped me' link.
  • Hey LHerzog,

    Thank you very much for this file.  I have updated my cisco switches this morning for their object gorup for classifying/assigning dscp marking to the traffic.  An d was about to begin the daunting task of entering these into my firewall, then export to a file for adidng to each of my firewalls.  This was a time saver.  Thank you again.

    With the networks defined with this file, i woudl like to see how you use the ip networks ( I have added them to a Zoom ip host group)  for a firewall rule and what settings you put in place to guarantee QOS and such for them.   I've been struggling to grasp the systems services Traffic shaping ( do you guarantee on yoru firewalls?  what settings?) and which firewall rules should have a qos policy assigend to it (just the zoom rule or all rules?).  The documentation is not clear enough on this.

    If you want to PM or shat, please let me know.

    Thanks you,

    John.

  • Hi,

    you can put them into a group - that is fine.

    Besides https, allow these tcp and udp ports to those networks.

    also allow for these tcp and udp ports

    Disable TLS inspection in these fw rules.

    zoom.us is already included in the Managed TLS exclusion list. That is enough.

    We're not using them in QoS currently. The WAN line can handle that traffic easily currently.

    So I have not thought about that. But I would expect you need to QoS all of those destinations on all the UDP ports only. But as this list is so huge it may itself have performance impacts for the QoS decision computing by the firewall. You need to test if you need QoS and if it keeps currend bandwiths and latency for other traffic at good levels.