<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sophos XG Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/category/sophos-xg/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Fri, 19 Nov 2021 11:28:25 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Sophos XG Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Sophos SG/XG How to find the PPPoE password</title>
		<link>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/</link>
					<comments>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 13:46:38 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2625</guid>

					<description><![CDATA[<p>Hello guys, today I want to show you how to find out the PPPoE password on a Sophos SG/XG if you don&#8217;t have it documented. This only works if the SG/XG itself establishes the connection. Start a TCPDump on the hardware interface via the shell. In this example eth1. tcpdump -i eth1 Then press the [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/">Sophos SG/XG How to find the PPPoE password</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys,</p>
<p>today I want to show you how to find out the PPPoE password on a Sophos SG/XG if you don&#8217;t have it documented.</p>
<p>This only works if the SG/XG itself establishes the connection.</p>
<p>Start a TCPDump on the hardware interface via the shell. In this example eth1.</p>
<p>tcpdump -i eth1</p>
<p>Then press the reconnect button in the webgui.</p>
<p>Now you just have to look in the dump for the line that contains your PPPoE username. And directly behind it is the password in plain text. :D</p>
<p>&nbsp;</p>
<p>08:49:12.384612 PPPoE [ses 0xdc82] PAP, Auth-Req (0x01), id 1, Peer <strong>networkguy0001@telekom.de</strong>, Name <strong>Password123</strong></p>
<p>&nbsp;</p>
<p><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/">Sophos SG/XG How to find the PPPoE password</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2625</post-id>	</item>
		<item>
		<title>Aruba Mobility Controller with Sophos SG/XG hotspot Portal</title>
		<link>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/</link>
					<comments>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 04 Apr 2021 18:27:11 +0000</pubDate>
				<category><![CDATA[Aruba]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<category><![CDATA[WLAN]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2555</guid>

					<description><![CDATA[<p>Hello Guys, &#160; today I will talk about how to configuring a guest Wifi with a Aruba Mobility Controller and the Sophos hotspot solution. In this example I will using the Sophos SG hotspot solution. With Sophos XG, it&#8217;s basically the same. Sophos SG Create a new Interface It&#8217;s recommandet, to use a own interface [&#8230;]</p>
<p>The post <a href="https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/">Aruba Mobility Controller with Sophos SG/XG hotspot Portal</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>&nbsp;</p>
<p>today I will talk about how to configuring a guest Wifi with a Aruba Mobility Controller and the Sophos hotspot solution.</p>
<p>In this example I will using the Sophos SG hotspot solution. With Sophos XG, it&#8217;s basically the same.</p>
<p><span style="font-size: 18pt;"><strong>Sophos SG</strong></span></p>
<p><strong>Create a new Interface</strong></p>
<p>It&#8217;s recommandet, to use a own interface for the guests. If you use a hardware interface or a VLAN interface, it&#8217;s your choice. I using VLAN interfaces.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-2556" src="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg" alt="" width="350" height="331" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg 350w, https://networkguy.de/wp-content/uploads/2021/04/SG1-300x284.jpg 300w" sizes="(max-width: 350px) 100vw, 350px" /></a></p>
<p><strong>Create a firewall rule for the web access </strong></p>
<p>To avoid problems with VIP visitors, I recommend allowing any service to access the internet. I will come to the topic of proxy in a moment.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg"><img decoding="async" class="alignnone size-full wp-image-2557" src="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg" alt="" width="986" height="243" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg 986w, https://networkguy.de/wp-content/uploads/2021/04/SG2-300x74.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG2-768x189.jpg 768w" sizes="(max-width: 986px) 100vw, 986px" /></a></p>
<p><strong>masquerading rule</strong></p>
<p>Without it, the package also gets on the internet, but not back :D</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg"><img decoding="async" class="alignnone size-full wp-image-2558" src="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg" alt="" width="985" height="236" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg 985w, https://networkguy.de/wp-content/uploads/2021/04/SG3-300x72.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG3-768x184.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></a></p>
<p><strong>The DHCP </strong></p>
<p>Do not use your AD DHCP server. If you still have a server at all thanks to Azure. Always keep guest solutions as far away as possible from your infrastructure. That&#8217;s why I use the DHCP server from the Sophos SG and also send DNS queries directly to google DNS. Do not use the SG as DNS server for guest solutions. Because most UTMs have a query route to their own domain and the guest user can query your SG/XG via DNS queries about your environment.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2559" src="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg" alt="" width="607" height="596" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg 607w, https://networkguy.de/wp-content/uploads/2021/04/SG4-300x295.jpg 300w" sizes="(max-width: 607px) 100vw, 607px" /></a></p>
<p><strong>hotspot portal</strong></p>
<p>Here you have to put in the new interface and activate the hotspot type of your choice. I prefer the voucher solution.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2577" src="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg" alt="" width="513" height="817" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg 513w, https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot-188x300.jpg 188w" sizes="(max-width: 513px) 100vw, 513px" /></a></p>
<p><strong>And finally the proxy</strong></p>
<p>For the guests, only the transparent proxy comes into consideration. No guest user wants to enter a static proxy into the system first. You should also only activate URL filtering, because no one wants to import the proxy CA. Now you have to define the policy and that&#8217;s it for the UTM configuration.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2560" src="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg" alt="" width="998" height="470" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg 998w, https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1-300x141.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1-768x362.jpg 768w" sizes="(max-width: 998px) 100vw, 998px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2561" src="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg" alt="" width="751" height="537" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg 751w, https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2-300x215.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a></p>
<p>What web categories you allow via policy, you have to decide yourself.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2562" src="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg" alt="" width="751" height="205" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg 751w, https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3-300x82.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a></p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong>Aruba Mobility Controller</strong></span></p>
<p>My recommendation, configure everything under Mobility Controller level and not on the individual controller.</p>
<p><strong>Add a new VLAN interface</strong></p>
<p>We only need a VLAN interface with the same VLAN ID as the guest interface on the Sophos SG. No IP configuration is required on the mobility controller.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2563" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1024x396.jpg" alt="" width="1024" height="396" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1024x396.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-300x116.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-768x297.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1536x594.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface.jpg 1566w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p><strong>Create the SSID</strong></p>
<p>I recommend using the tunnel mode. This way I don&#8217;t have to maintain all VLANs at the access points. Instead, I let the traffic first break out at the Mobility Controller.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2572" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-1024x477.jpg" alt="" width="1024" height="477" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-1024x477.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-300x140.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-768x358.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1.jpg 1447w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2566 size-medium" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2-300x115.jpg" alt="" width="300" height="115" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2-300x115.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2.jpg 448w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>We need a simple open WLAN.<br />
Because we are using the Sophos SG guest solution in this example, I won&#8217;t go into detail about the possible Aruba solutions.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2567 size-full" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg" alt="" width="605" height="385" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg 605w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3-300x191.jpg 300w" sizes="(max-width: 605px) 100vw, 605px" /></a></p>
<p>Now we have to remember the name of the default role. Because we have to edit these right away.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2568 size-full" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg" alt="" width="451" height="146" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg 451w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4-300x97.jpg 300w" sizes="(max-width: 451px) 100vw, 451px" /></a></p>
<p><strong>Edit  the role</strong></p>
<p>For simplicity, we could write an Any rule because the Sophos SG takes care of security. But for the good feeling, we restrict the traffic a bit.</p>
<p>Because it&#8217;s a bit hard to read, here&#8217;s the content: We only allow the client to talk to the Sophos SG on the guest interface. Forbid the rest of the private IP address ranges and then allow Any for the Internet access.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2668" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1024x403.jpg" alt="" width="1024" height="403" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1024x403.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-300x118.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-768x302.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1536x604.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL.jpg 1566w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2669" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-1024x78.jpg" alt="" width="1024" height="78" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-1024x78.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-300x23.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-768x58.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1.jpg 1532w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2671" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1024x36.jpg" alt="" width="1024" height="36" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1024x36.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-300x11.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-768x27.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1536x55.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2.jpg 1549w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/">Aruba Mobility Controller with Sophos SG/XG hotspot Portal</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2555</post-id>	</item>
		<item>
		<title>Sophos UTM how to install a virtual home firewall under ubuntu via KVM</title>
		<link>https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm/</link>
					<comments>https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sat, 12 Sep 2020 09:10:53 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<category><![CDATA[KVM]]></category>
		<category><![CDATA[ubuntu]]></category>
		<category><![CDATA[UTM]]></category>
		<category><![CDATA[XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2320</guid>

					<description><![CDATA[<p>Hello guys! today I will tell you how I configured my home server for a virtual Sophos UTM. All configurations in ubuntu can also be used for a virtual Sophos XG. In this article I assume that Ubuntu and virt manager are installed. The following link deals with the basic configuration of virt manager under [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm/">Sophos UTM how to install a virtual home firewall under ubuntu via KVM</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys!</p>
<p>today I will tell you how I configured my home server for a virtual Sophos UTM.<br />
All configurations in ubuntu can also be used for a virtual Sophos XG.</p>
<p>In this article I assume that Ubuntu and virt manager are installed. The following link deals with the basic configuration of virt manager under ubuntu:</p>
<p>german https://wiki.ubuntuusers.de/virt-manager/<br />
english https://www.howtogeek.com/117635/how-to-install-kvm-and-create-virtual-machines-on-ubuntu/</p>
<p><strong>What do you need for this?</strong></p>
<ul>
<li>A PC (AMD or Intel, what you like. A virt XG also runs under a AMD CPU)</li>
<li>A Ubuntu System (with a GUI, it&#8217;s easier ;) )</li>
<li>3 NICs
<ul>
<li>I use the Mainboard NIC for the Server management</li>
<li>the second NIC in bridge mode for the VMs</li>
<li>and the last NIC via PCI Passthrough exclusive for the UTM WAN interface (you can&#8217;t use a dual NIC for this)
<ul>
<li><strong>you need a pcie slot for the NIC where the PCIe lanes are not shared with the chipset or other components</strong></li>
</ul>
</li>
</ul>
</li>
<li>Sophos UTM ISO for Software Appliance</li>
</ul>
<p>Why do I use PCI Passthrough? It is safer. With PCI Passthrough, all traffic goes directly to the virtual firewall and cannot escape from a virtual switch and has no logical contact with the hypervisor (the Ubuntu server).</p>
<p>OK,<br />
we have been busy and now have a fully installed Ubuntu and Virt Manager and are starting to configure the virtual UTM.</p>
<ul>
<li><strong>Install a new VM</strong></li>
</ul>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2322" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1-300x210.jpg" alt="" width="700" height="490" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1-300x210.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1-1024x717.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1-768x538.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1-1536x1076.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-instqall-new-vm-1.jpg 1700w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2323" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2-300x300.jpg" alt="" width="500" height="500" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2-300x300.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2-150x150.jpg 150w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2-768x769.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-2.jpg 807w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2324" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-3-286x300.jpg" alt="" width="500" height="524" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-3-286x300.jpg 286w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-3.jpg 751w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-4.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2325" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-4-280x300.jpg" alt="" width="500" height="536" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-4-280x300.jpg 280w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-4.jpg 749w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-5.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2326" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-5-297x300.jpg" alt="" width="500" height="505" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-5-297x300.jpg 297w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-5-768x776.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-install-new-vm-5.jpg 792w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<ul>
<li><strong>Adjust the new VM</strong></li>
<li style="list-style-type: none;">
<ul>
<li><strong>activate auto start while booting of the hypervisor</strong></li>
</ul>
</li>
</ul>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2327" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1-256x300.jpg" alt="" width="500" height="586" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1-256x300.jpg 256w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1-874x1024.jpg 874w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1-768x900.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-1.jpg 1039w" sizes="(max-width: 500px) 100vw, 500px" /></a></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>activate the bridge mode for the &#8220;LAN NIC&#8221;<br />
</strong>I recommend virtio for NIC device model, because according to my own experience it offers the best data throughput.</li>
</ul>
</li>
</ul>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2334" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2-300x285.jpg" alt="" width="501" height="476" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2-300x285.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2-1024x971.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2-768x729.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-2.jpg 1267w" sizes="(max-width: 501px) 100vw, 501px" /></a></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li><strong>insert the &#8220;WAN NIC&#8221; via PCI Passthrough<br />
</strong>Be sure if it is the right PCIe slot and NIC.</li>
</ul>
</li>
</ul>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2328" src="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3-300x206.jpg" alt="" width="700" height="480" srcset="https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3-300x206.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3-1024x704.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3-768x528.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3-1536x1056.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/09/virt-manager-adjust-vm-3.jpg 1848w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<ul>
<li><strong>Install the UTM<br />
</strong>When installing the UTM, you must select a LAN NIC. The LAN-NIC should be the first interface. If it was the wrong interface, restart the installation process and select the other NIC in the list for the LAN.<br />
After the installation, you have 2 hardware NICs in the UTM . On my UTM for LAN eth0 (virtio) and for WAN eth1(PCI Passtrough realtec NIC).</li>
</ul>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2329" src="https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces-300x147.jpg" alt="" width="700" height="343" srcset="https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces-300x147.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces-1024x500.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces-768x375.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/UTM-hardware-interfaces.jpg 1476w" sizes="(max-width: 700px) 100vw, 700px" /></a></p>
<p>A nice feature. You can use vlan interfaces for eth0 without any setup by the hypervisor. But you need a vlan-enabled switch.<br />
You can use it for guest wifi or whatever you want.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2330" src="https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces-300x100.jpg" alt="" width="696" height="232" srcset="https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces-300x100.jpg 300w, https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces-1024x342.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces-768x256.jpg 768w, https://networkguy.de/wp-content/uploads/2020/09/UTM-VLAN-interfaces.jpg 1474w" sizes="(max-width: 696px) 100vw, 696px" /></a></p>
<p>If you need inspiration for a home server. These are my server components:</p>
<table style="border-collapse: collapse; width: 69.2308%; height: 198px;">
<tbody>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">CPU</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/AMD-Ryzen-3400G-Cache-Wraith/dp/B07SXNDKNM/ref=sr_1_3?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=AMD+Ryzen+3400G&amp;qid=1600964127&amp;sr=8-3&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">AMD Ryzen 3400G</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">mainboard</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/Gigabyte-B450-Aorus-B450-Sockel-Schwarz/dp/B07G36DF29/ref=sr_1_1?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=Gigabyte+B450+Aorus+M&amp;qid=1600964182&amp;sr=8-1&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">Gigabyte B450 Aorus M</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">RAM</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/Corsair-Vengeance-3000MHz-Performance-Arbeitsspeicher/dp/B014UYPEXE/ref=sr_1_1_sspa?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=Corsair+32GB+DDR4-3000&amp;qid=1600964219&amp;sr=8-1-spons&amp;psc=1&amp;spLa=ZW5jcnlwdGVkUXVhbGlmaWVyPUE4WkY0Q1daWTVRMUwmZW5jcnlwdGVkSWQ9QTA4NDQ2MzAxQkNGU1ZENzhGUzlYJmVuY3J5cHRlZEFkSWQ9QTA2ODY5NTVTUkxOQTBPRlBUMzAmd2lkZ2V0TmFtZT1zcF9hdGYmYWN0aW9uPWNsaWNrUmVkaXJlY3QmZG9Ob3RMb2dDbGljaz10cnVl&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">Corsair 32GB DDR4-3000</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">PSU</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/Netzteil-quiet-400W-System-Power/dp/B079KG3TZ5/ref=sr_1_1?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=be+quiet%21+System+Power+9+400W&amp;qid=1600964285&amp;sr=8-1&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">be quiet! System Power 9 400W</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">SSD</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/SanDisk-PLUS-Sata-Interne-SSD-535MB/dp/B07D998212/ref=sr_1_1?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=1TB+SanDisk+SDSSDA-1T00-G26&amp;qid=1600964316&amp;sr=8-1&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">1TB SanDisk SSD</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">HDD</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/Toshiba-X300-Interne-Festplatte-schwarz/dp/B013J7HO8G/ref=sr_1_1?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=toshiba+x300+4tb&amp;qid=1600964372&amp;sr=8-1&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">4x Toshiba X300 4 TB as RAID 5</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">NIC</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/TP-Link-TG-3468-Netzwerk-1000Mbit-s-PCIe-Adapter/dp/B003CFATNI/ref=sxts_sxwds-bia-wc-drs1_0?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;cv_ct_cx=TP-Link+TG-3468&amp;dchild=1&amp;keywords=TP-Link+TG-3468&amp;pd_rd_i=B003CFATNI&amp;pd_rd_r=72bc6d2a-b6a1-4d04-b2c9-ad34f30f7ea1&amp;pd_rd_w=sEtL5&amp;pd_rd_wg=oGjQR&amp;pf_rd_p=578deb70-f9b7-4aa5-9f96-98765f2717c8&amp;pf_rd_r=889A96RB7HQMEF8VTA3S&amp;psc=1&amp;qid=1600964410&amp;sr=1-1-5a42e879-3844-4142-9c14-e77fe027c877&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">2x TP-Link TG-3468</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">case</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/Zalman-Midi-Tower-PC-Geh%C3%A4use-externe-Stromversorgung/dp/B00HES0JAM/ref=sr_1_3?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=zalman+midi+tower&amp;qid=1600964638&amp;s=computers&amp;sr=1-3&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">Zalman Z1</a></td>
</tr>
<tr style="height: 22px;">
<td style="width: 14.7612%; height: 22px;">case fan</td>
<td style="width: 85.2388%; height: 22px;"><a href="https://www.amazon.de/quiet-Pure-Wings-High-Speed-120mm/dp/B07M7TGY9Y/ref=sr_1_5?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&amp;dchild=1&amp;keywords=be+quiet+l%C3%BCfter+12cm&amp;qid=1600964786&amp;s=computers&amp;sr=1-5&amp;tag=netguy-21" target="_blank" rel="noopener noreferrer">2x be Quiet Pure Wings 2 (case back and for the hdd&#8217;s) </a></td>
</tr>
</tbody>
</table>
<h2>Registration, Software Download and Installation</h2>
<table style="width: 69.0046%;">
<tbody>
<tr>
<td style="width: 24.9527%;"><strong>Sophos UTM</strong></td>
<td style="width: 43.9338%;"><strong>Sophos XG</strong></td>
</tr>
<tr>
<td style="width: 24.9527%;"><a href="https://myutm.sophos.com/" target="_blank" rel="noopener noreferrer">Account registration</a></td>
<td style="width: 43.9338%;"><a href="https://id.sophos.com/" target="_blank" rel="noopener noreferrer">Account registration</a></td>
</tr>
<tr>
<td style="width: 24.9527%;"><a href="https://www.sophos.com/en-us/support/utm-downloads.aspx" target="_blank" rel="noopener noreferrer">ISO file download</a></td>
<td style="width: 43.9338%;"><a href="https://www.sophos.com/en-us/mysophos/my-account/network-protection/download-installers.aspx" target="_blank" rel="noopener noreferrer">ISO file download</a></td>
</tr>
</tbody>
</table>
<p>Feel free to comment the recommendation or ask for further installation help. If you want to support me, buy <a href="https://amzn.to/2O99fAb" target="_blank" rel="noopener noreferrer">stuff over my Amazon links</a> or click on an advertisement. Thank you very much!</p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm/">Sophos UTM how to install a virtual home firewall under ubuntu via KVM</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2320</post-id>	</item>
		<item>
		<title>Sophos XG how to secure VMware Horizon via WAF</title>
		<link>https://networkguy.de/sophos-xg-how-to-secure-vmware-horizon-via-waf/</link>
					<comments>https://networkguy.de/sophos-xg-how-to-secure-vmware-horizon-via-waf/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 19:32:37 +0000</pubDate>
				<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2285</guid>

					<description><![CDATA[<p>Hello guys! &#160; I had the task to secure VMware Horizon via the Sophos XG WAF. In this example we have a VMware Horizon server with the IP 192.168.100.20. The Sophos XG DMZ interface has the IP 192.168.100.1. The following steps were necessary: Create a new Webserver definition For a better searce. I write Host [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-xg-how-to-secure-vmware-horizon-via-waf/">Sophos XG how to secure VMware Horizon via WAF</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys!</p>
<p>&nbsp;</p>
<p>I had the task to secure VMware Horizon via the Sophos XG WAF.</p>
<p>In this example we have a VMware Horizon server with the IP 192.168.100.20.<br />
The Sophos XG DMZ interface has the IP 192.168.100.1.</p>
<p>The following steps were necessary:</p>
<h3>Create a new Webserver definition</h3>
<p>For a better searce. I write Host for a client/server or LAN for a network before a definition name. In this example Host horizon-server.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2291" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer-300x225.jpg" alt="" width="545" height="409" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer-300x225.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer-1024x767.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer-768x575.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-AddServer.jpg 1282w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<h3>Create the WAF policy</h3>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2298" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2-258x300.jpg" alt="" width="545" height="634" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2-258x300.jpg 258w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2-881x1024.jpg 881w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2-768x893.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2-1321x1536.jpg 1321w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-HorizonPolicy2.jpg 1664w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<p>skip filter rules:<br />
920370<br />
941100<br />
941160<br />
949110<br />
980130</p>
<h3>Create the VMware Blast protocol definition</h3>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2286" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service-300x226.jpg" alt="" width="545" height="411" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service-300x226.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service-1024x770.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service-768x578.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-create-blast-service.jpg 1399w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<h3>Create the WAF firewall rule</h3>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2292" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1-225x300.jpg" alt="" width="545" height="727" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1-225x300.jpg 225w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1-769x1024.jpg 769w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1-768x1023.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1-1153x1536.jpg 1153w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule1.jpg 1457w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<h3>Create a NAT rule for the VMware blast protocol with the Server access assistant</h3>
<p>That isn&#8217;t a security problem. Before using the blast protocol, the user must be authenticated by the Horizon server which is protected by the WAF.</p>
<p>After Franks hint in the comments. If you need PCoIP for Teradici ZeroClients you have to add port 4672 UDP with a second DNAT Rule.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1.jpg"><img loading="lazy" decoding="async" class="alignnone  wp-image-2317" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1-300x203.jpg" alt="" width="546" height="370" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1-300x203.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1-1024x694.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1-768x521.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-DNAT-HorizonBlast-1-1.jpg 1475w" sizes="(max-width: 546px) 100vw, 546px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2293" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2-300x205.jpg" alt="" width="546" height="373" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2-300x205.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2-1024x701.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2-768x525.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule2.jpg 1491w" sizes="(max-width: 546px) 100vw, 546px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2294" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3-300x236.jpg" alt="" width="545" height="429" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3-300x236.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3-1024x806.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3-768x605.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule3.jpg 1473w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2295" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4-300x214.jpg" alt="" width="545" height="389" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4-300x214.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4-1024x730.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4-768x548.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule4.jpg 1481w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2296" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5-300x266.jpg" alt="" width="545" height="483" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5-300x266.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5-1024x908.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5-768x681.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-WAF-Horizon-FirewallRule5.jpg 1483w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<p>&nbsp;</p>
<h3>And now here comes the tricky part.</h3>
<p>The Horizon server (192.168.100.20) is protected by the WAF and from its perspective the server is only communicating with the Sophos XG (192.168.100.1).<br />
But as soon we have the protocol change to blast (port 8443) we can&#8217;t use the WAF and a classic DNAT dosn&#8217;t change the source IP. (In this case a random WAN IP from the Users ISP).<br />
But why do we need this? Because, if the user comes with his original WAN IP, the Horizon server says &#8220;I don&#8217;t know you. You have not authenticated with me. Get lost&#8221; and cuts the connection.</p>
<p>Therefore we must adjust the DNAT rule for the blast protocol.<br />
We must activate a SNAT with the DMZ IP from the Sophos XG (192.168.100.1).</p>
<p><a href="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2290" src="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2-300x218.jpg" alt="" width="545" height="396" srcset="https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2-300x218.jpg 300w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2-1024x743.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2-768x557.jpg 768w, https://networkguy.de/wp-content/uploads/2020/08/SophosXG-VMwareBlast-SNAT-2.jpg 1446w" sizes="(max-width: 545px) 100vw, 545px" /></a></p>
<p>Finaly from the point of view of the Horizon server we now also have no changed communication partner by a protocol change.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-xg-how-to-secure-vmware-horizon-via-waf/">Sophos XG how to secure VMware Horizon via WAF</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-xg-how-to-secure-vmware-horizon-via-waf/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2285</post-id>	</item>
		<item>
		<title>Sophos XG/UTM Home Edition</title>
		<link>https://networkguy.de/sophos-xg-utm-home-edition/</link>
					<comments>https://networkguy.de/sophos-xg-utm-home-edition/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Mon, 22 Jul 2019 11:47:44 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2172</guid>

					<description><![CDATA[<p>Hello again! Some days ago I talked to a Sophos employee and he founds out that I am the Network Guy and he said that I need to update my recommended hardware for the home edition deployment of the Sophos XG and Sophos UTM Home Edition. Also some of my followers wanted it also, so [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-xg-utm-home-edition/">Sophos XG/UTM Home Edition</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello again! Some days ago I talked to a Sophos employee and he founds out that I am the Network Guy and he said that I need to update my recommended hardware for the home edition deployment of the Sophos XG and Sophos UTM Home Edition. Also some of my followers wanted it also, so I took some hours of research to find a good hardware for UTM and also XG use. The UTM supports some Realtek network cards and also a USB NIC compatibility. The XG only supports Intel network cards and won&#8217;t start until there are two recognized network interfaces. Since there is only a feature request for XG USB NIC support, we need to add an additional network card in our setup. I think a passive cooled system is a good way to deploy a home firewall system. Since our home internet connection speed reaches 100Mbit per second and beyond, we will need a performant hardware device to route traffic.</p>
<p>I compared many vendors and thought that we give a chance to the ASRock mini ITX mainboard series. The ASRock website makes it easy to compare different mainboard modells. I found the <a href="https://amzn.to/2XT8IXD" target="_blank" rel="noopener noreferrer">J4105-ITX</a> and the <a href="https://amzn.to/2Sx6FCD" target="_blank" rel="noopener noreferrer">J5005-ITX</a>, both have the same hardware, the only difference is the built-in processor. The ASRock J5005-ITX has the Intel Quad-Core Pentium Silver Processor J5005 (up to 2.8 GHz) processor and the ASRock J4105-ITX has the Intel Quad-Core Processor J4105 (up to 2.5 GHz). So what does this mean? The SG and XG hardware are using of course also Intel CPUs. You can see it in the Sophos SG/XG Series Appliances Technical Specifications datasheet:</p>
<div class='w3eden'><!-- WPDM Link Template: Default Template -->

<div class="link-template-default card mb-2">
    <div class="card-body">
        <div class="media">
            <div class="mr-3 img-48"><img decoding="async" class="wpdm_icon" alt="Icon"   src="https://networkguy.de/wp-content/plugins/download-manager/assets/file-type-icons/pdf.svg" /></div>
            <div class="media-body">
                <h3 class="package-title"><a href='https://networkguy.de/download/sophos-sg-xg-series-appliances-technical-specifications/'>Sophos SG/XG Series Appliances Technical Specifications</a></h3>
                <div class="text-muted text-small"><i class="fas fa-copy"></i> 1 file(s) <i class="fas fa-hdd ml-3"></i> 96.65 KB</div>
            </div>
            <div class="ml-3">
                <a class='wpdm-download-link download-on-click btn btn-primary ' rel='nofollow' href='#' data-downloadurl="https://networkguy.de/download/sophos-sg-xg-series-appliances-technical-specifications/?wpdmdl=2155&refresh=6991164b767091771116107">Download</a>
            </div>
        </div>
    </div>
</div>

</div>
<p>&nbsp;</p>
<p>So based on this information I compared it with the SG/XG 230 hardware (using Intel Pentium G4400). I found the website UserBenchmark.com to compare CPU benchmarks. The <a href="https://cpu.userbenchmark.com/Compare/Intel-Pentium-G4400-vs-Intel-Celeron-J4105/3539vsm444211" target="_blank" rel="noopener noreferrer">battle between the Intel Pentium G4400 and the J4105-ITX</a> shows, that the CPU are very similiar (only a difference of 7%):</p>
<p><a href="https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2160" src="https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105.jpg" alt="Benchmark with Intel Pentium G4400 and Intel Celeron J4105" width="1445" height="859" srcset="https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105.jpg 1445w, https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105-300x178.jpg 300w, https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105-768x457.jpg 768w, https://networkguy.de/wp-content/uploads/2019/07/benchmark-intel-pentium-g4400-intel-celeron-j4105-1024x609.jpg 1024w" sizes="(max-width: 1445px) 100vw, 1445px" /></a></p>
<p>&nbsp;</p>
<p>The J5005-ITX mainboard with the Intel Pentium Silver J5005 is <a href="https://cpu.userbenchmark.com/Compare/Intel-Pentium-G4400-vs-Intel-Pentium-Silver-J5005/3539vsm487063" target="_blank" rel="noopener noreferrer">only 7% faster</a> but it costs about 45€ more than the J4105-ITX mainboard. So I would recommend the ASRock J4105-ITX mainboard. The original Sophos SG/XG 230 hardware (8GB memory) costs about 1800€ and can easily secure a 100 user company with a firewall throughput of 7Gbit/sec. With all activated security features (Intrusion Prevention, Advanced Threat Protection, Web Protection, Application Control, etc.) you can nearly reach 1GBit/sec. So I think this is a pretty good home hardware ;-)</p>
<p>&nbsp;</p>
<h2>Hardware recommendation</h2>
<h3>Self-built system</h3>
<p>This recommendations <span style="text-decoration: underline;">are not tested</span>! Maybe I will order this hardware for proofing or someone of you can proof it.</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 21.6582%; text-align: center;"><strong>Article</strong></td>
<td style="width: 45.0084%; text-align: center;"><strong>Name</strong></td>
<td style="width: 16.6667%; text-align: center;"><strong>Ø Price </strong></td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Mainboard</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/2XT8IXD" target="_blank" rel="noopener noreferrer">ASRock J4105-ITX</a></td>
<td style="width: 16.6667%; text-align: center;">99€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Second NIC</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/372KDxa" target="_blank" rel="noopener noreferrer">Intel EXPI9301CTBLK Gigabit</a></td>
<td style="width: 16.6667%; text-align: center;">29€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Memory</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/32yu8bc" target="_blank" rel="noopener noreferrer">Crucial CT2K4G4SFS824A DDR4 8GB (2x 4GB Kit)</a></td>
<td style="width: 16.6667%; text-align: center;">38€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Hard drive</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/2Go6S6d">Crucial BX500 CT120BX500SSD1(Z) 120GB</a></td>
<td style="width: 16.6667%; text-align: center;">19€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Case</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/2O7OlS7" target="_blank" rel="noopener noreferrer">SilverStone SST-ML06B</a></td>
<td style="width: 16.6667%; text-align: center;">62€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">Power supply</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/2St6RD4" target="_blank" rel="noopener noreferrer">SilverStone SST-ST30SF v 1.0 &#8211; SFX Serie, 300W</a></td>
<td style="width: 16.6667%; text-align: center;">50€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;">PCI express extension cable</td>
<td style="width: 45.0084%; text-align: center;"><a href="https://amzn.to/2Y9khoK" target="_blank" rel="noopener noreferrer">glotrends PCI-E Verlängerungskabel 0,6 m UEX101</a></td>
<td style="width: 16.6667%; text-align: center;">10€</td>
</tr>
<tr>
<td style="width: 21.6582%; text-align: center;"></td>
<td style="width: 45.0084%; text-align: right;"><strong>Total:</strong></td>
<td style="width: 16.6667%; text-align: center;"><strong>307€</strong></td>
</tr>
</tbody>
</table>
<h3>complete system</h3>
<p>I found a similar complete system: <a href="https://amzn.to/2GpWlrj" target="_blank" rel="noopener noreferrer">Kettop Mi5250L (Intel I5-5200U, 8GB Memory, 128GB SSD, 4 NICs)</a> for 353€ including shipping from Hongkong. The device has four Intel I211-AT network interfaces. <span style="text-decoration: underline;">I didn&#8217;t tested this device</span>, so I give no guaranty that it works with Sophos UTM and/or XG. There is also a <a href="https://amzn.to/2MbiLRE" target="_blank" rel="noopener noreferrer">cheaper device</a> with four Intel NICs.</p>
<p>&nbsp;</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 33.3333%; text-align: center;"><strong>Article</strong></td>
<td style="width: 33.3333%; text-align: center;"><strong>Link</strong></td>
<td style="width: 33.3333%; text-align: center;"><strong>Ø Price includig shipping</strong></td>
</tr>
<tr>
<td style="width: 33.3333%; text-align: center;">System with SG/XG 230 performance</td>
<td style="width: 33.3333%; text-align: center;"><a href="https://amzn.to/2GpWlrj" target="_blank" rel="noopener noreferrer">Kettop Mi5250L (Intel I5-5200U, 8GB Memory, 128GB SSD, 4 NICs</a></td>
<td style="width: 33.3333%; text-align: center;">353€</td>
</tr>
<tr>
<td style="width: 33.3333%; text-align: center;">System with SG/XG 135 performance</td>
<td style="width: 33.3333%; text-align: center;"><a href="https://amzn.to/2MTzHvt" target="_blank" rel="noopener noreferrer">Mi19W-S2 (Intel Celeron J1900, 4GB Memory, 64GB SSD, 4 NICs</a></td>
<td style="width: 33.3333%; text-align: center;">259€</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2>Registration, Software Download and Installation</h2>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 50%; text-align: center;"><strong>Sophos UTM</strong></td>
<td style="width: 50%; text-align: center;"><strong>Sophos XG</strong></td>
</tr>
<tr>
<td style="width: 50%;"><a href="https://myutm.sophos.com/" target="_blank" rel="noopener noreferrer">Account registration</a></td>
<td style="width: 50%;"><a href="https://id.sophos.com/" target="_blank" rel="noopener noreferrer">Account registration</a></td>
</tr>
<tr>
<td style="width: 50%;"><a href="https://www.sophos.com/en-us/support/utm-downloads.aspx" target="_blank" rel="noopener noreferrer">ISO file download</a></td>
<td style="width: 50%;"><a href="https://www.sophos.com/en-us/mysophos/my-account/network-protection/download-installers.aspx" target="_blank" rel="noopener noreferrer">ISO file download</a></td>
</tr>
<tr>
<td style="width: 50%;"><a href="https://networkguy.de/install-sophos-utm-from-usb-stick/" target="_blank" rel="noopener noreferrer">Install Sophos UTM from USB Stick</a></td>
<td style="width: 50%;"><a href="https://networkguy.de/install-sophos-xg-from-usb-stick/" target="_blank" rel="noopener noreferrer">Install Sophos XG from USB Stick</a></td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<p>Feel free to comment the recommendation or ask for further installation help. If you want to support me, buy <a href="https://amzn.to/2O99fAb" target="_blank" rel="noopener noreferrer">stuff over my Amazon links</a> or click on an advertisement. Thank you very much!</p>
<p>The post <a href="https://networkguy.de/sophos-xg-utm-home-edition/">Sophos XG/UTM Home Edition</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-xg-utm-home-edition/feed/</wfw:commentRss>
			<slash:comments>56</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2172</post-id>	</item>
		<item>
		<title>Easy migration to Sophos XG firewall</title>
		<link>https://networkguy.de/easy-migration-to-sophos-xg-firewall/</link>
					<comments>https://networkguy.de/easy-migration-to-sophos-xg-firewall/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Wed, 10 Jul 2019 12:16:07 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2144</guid>

					<description><![CDATA[<p>Migrating firewall systems between two different vendors can take a loooooooong time. In this case, I needed to migrate to a Sophos XG system. Most of the work is to reconfigure definitions like hosts-, network- and service-objects. There is a way, where you can import XML config files into the Sophos XG. We found this [&#8230;]</p>
<p>The post <a href="https://networkguy.de/easy-migration-to-sophos-xg-firewall/">Easy migration to Sophos XG firewall</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Migrating firewall systems between two different vendors can take a loooooooong time. In this case, I needed to migrate to a Sophos XG system. Most of the work is to reconfigure definitions like hosts-, network- and service-objects. There is a way, where you can import XML config files into the Sophos XG. We found this out, as we exported &#8220;IPHost&#8221; as a selective configuration:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2019/07/sophos-xg-export-configuration.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2147" src="https://networkguy.de/wp-content/uploads/2019/07/sophos-xg-export-configuration.png" alt="Sophos XG export xml configuration to tar" width="847" height="824" srcset="https://networkguy.de/wp-content/uploads/2019/07/sophos-xg-export-configuration.png 847w, https://networkguy.de/wp-content/uploads/2019/07/sophos-xg-export-configuration-300x292.png 300w, https://networkguy.de/wp-content/uploads/2019/07/sophos-xg-export-configuration-768x747.png 768w" sizes="(max-width: 847px) 100vw, 847px" /></a></p>
<p>you will get a .tar file. Open this .tar file with <a href="https://www.7-zip.org/download.html" target="_blank" rel="noopener noreferrer">7-Zip</a> and go into the &#8220;.&#8221;-dot folder. There you will find an Entities.xml, open it and you can see some definitions. I already filled in some variables (##number##) for our later XML conversion. There are net definitions:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;IPHost transactionid=""&gt;
  &lt;Name&gt;##1##&lt;/Name&gt;
  &lt;IPFamily&gt;IPv4&lt;/IPFamily&gt;
  &lt;HostType&gt;Network&lt;/HostType&gt;
  &lt;IPAddress&gt;##2##&lt;/IPAddress&gt;
  &lt;Subnet&gt;##3##&lt;/Subnet&gt;
&lt;/IPHost&gt;</pre>
<p>hosts definitions:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;IPHost transactionid=""&gt;
  &lt;Name&gt;##1##&lt;/Name&gt;
  &lt;IPFamily&gt;IPv4&lt;/IPFamily&gt;
  &lt;HostType&gt;IP&lt;/HostType&gt;
  &lt;IPAddress&gt;##2##&lt;/IPAddress&gt;
&lt;/IPHost&gt;</pre>
<p>and service definitions:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;Services transactionid=""&gt;
  &lt;Name&gt;##1##&lt;/Name&gt;
  &lt;Type&gt;TCPorUDP&lt;/Type&gt;
  &lt;ServiceDetails&gt;
    &lt;ServiceDetail&gt;
      &lt;SourcePort&gt;1:65535&lt;/SourcePort&gt;
      &lt;DestinationPort&gt;##3##&lt;/DestinationPort&gt;
      &lt;Protocol&gt;##2##&lt;/Protocol&gt;
    &lt;/ServiceDetail&gt;
  &lt;/ServiceDetails&gt;
&lt;/Services&gt;</pre>
<p>with this information and a documented or exported csv sheet, we can migrate this csv file to a perfect xml import file for our Sophos XG firewall (look at the possibilities from your source firewall system, maybe you can copy a list into Excel, delete every unnecessary things and convert it to a csv file like I did). I used the CSV to XML converter from <a href="https://www.freeformatter.com/csv-to-xml-converter.html" target="_blank" rel="noopener noreferrer">freeformatter.com</a> to built my new xml file (thanks for this!). Example csv for hosts:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">pc-mister-bob;192.168.10.5
pc-mister-carl;192.168.10.54</pre>
<p>example for networks:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">wlan-guests;192.168.250.0;255.255.255.0
wlan-internal;172.16.54.0;255.255.255.0</pre>
<p>example for services:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="null">pcANYWHERE-data;tcp;5631
pcANYWHERE-stat;udp;5632</pre>
<p>so the converter will convert the csv, delimited by semicolon and will put each line in a new xml format. Just copy your csv and your xml template into the site, choose semicolon as the delimiter like I did and click on &#8220;convert csv to xml&#8221;:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2151" src="https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter.png" alt="CSV to XML converter" width="1217" height="944" srcset="https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter.png 1217w, https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter-300x233.png 300w, https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter-768x596.png 768w, https://networkguy.de/wp-content/uploads/2019/07/csv-to-xml-converter-1024x794.png 1024w" sizes="(max-width: 1217px) 100vw, 1217px" /></a></p>
<p>copy only the definitions from the output (Example:)</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;IPHost transactionid=""&gt;
     &lt;Name&gt;wlan-guests&lt;/Name&gt;
     &lt;IPFamily&gt;IPv4&lt;/IPFamily&gt;
     &lt;HostType&gt;Network&lt;/HostType&gt;
     &lt;IPAddress&gt;192.168.250.0&lt;/IPAddress&gt;
     &lt;Subnet&gt;255.255.255.0&lt;/Subnet&gt;
  &lt;/IPHost&gt;
  &lt;IPHost transactionid=""&gt;
     &lt;Name&gt;wlan-internal&lt;/Name&gt;
     &lt;IPFamily&gt;IPv4&lt;/IPFamily&gt;
     &lt;HostType&gt;Network&lt;/HostType&gt;
     &lt;IPAddress&gt;172.16.54.0&lt;/IPAddress&gt;
     &lt;Subnet&gt;255.255.255.0&lt;/Subnet&gt;
  &lt;/IPHost&gt;</pre>
<p>open the extracted Entities.xml and copy it between this lines:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;?xml version="1.0" encoding="UTF-8"?&gt;
&lt;Configuration APIVersion="1702.1" IPS_CAT_VER="1"&gt;</pre>
<p>and</p>
<pre class="EnlighterJSRAW" data-enlighter-language="xml">&lt;/Configuration&gt;</pre>
<p>after this, save the xml file and copy it back to the .tar file. Now you can import the file into the XG and your new definitions are migrated easily. If you have many definitions, only import 100 definitions at one time (I had this also on a Sophos XG 650 device).</p>
<p>&nbsp;</p>
<p>Feel free to ask in the comments. Have a nice day!</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/easy-migration-to-sophos-xg-firewall/">Easy migration to Sophos XG firewall</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/easy-migration-to-sophos-xg-firewall/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2144</post-id>	</item>
		<item>
		<title>Sophos XG v17.5 released</title>
		<link>https://networkguy.de/sophos-xg-v17-5-released/</link>
					<comments>https://networkguy.de/sophos-xg-v17-5-released/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Thu, 29 Nov 2018 16:05:28 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2060</guid>

					<description><![CDATA[<p>What&#8217;s New in XG Firewall v17.5 Here&#8217;s a quick overview of the key new features in v17.5. For a more detailed description please refer to: Sophos-XG-firewall-v17.5-whats-new.pdf &#160; Lateral Movement Protection Lateral Movement Protection extends our Security Heartbeat automated threat isolation to prevent any threat from moving laterally or spreading across the network, even on the same [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-xg-v17-5-released/">Sophos XG v17.5 released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>What&#8217;s New in XG Firewall v17.5</h1>
<p>Here&#8217;s a quick overview of the key new features in v17.5. For a more detailed description please refer to: <a href="https://community.sophos.com/cfs-file/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-06/Sophos_2D00_XG_2D00_firewall_2D00_v17.5_2D00_whats_2D00_new.pdf">Sophos-XG-firewall-v17.5-whats-new.pdf</a></p>
<p>&nbsp;</p>
<h2>Lateral Movement Protection</h2>
<div>Lateral Movement Protection extends our Security Heartbeat automated threat isolation to prevent any threat from moving laterally or spreading across the network, even on the same subnet. The firewall instructs all healthy endpoints to completely isolate any unhealthy endpoints.</div>
<p>&nbsp;</p>
<h2>Synchronized User ID</h2>
<div>Synchronized User ID utilizes Security Heartbeat™ to greatly streamline authentication for user-based policy enforcement and reporting in any Active Domain network by eliminating the need for any kind of server or client agent.</div>
<p>&nbsp;</p>
<h2>Education Features</h2>
<div>Education Features such as per-user policy-based control over SafeSearch and YouTube restrictions, teacher enabled block-page overrides, and Chromebook authentication support.</div>
<p>&nbsp;</p>
<h2>Email Features</h2>
<div>Sender Policy Framework (SPF) anti-spoofing protection and a new MTA based on Exim which closes a couple of top requested feature differences with SG Firewall is added.</div>
<p>&nbsp;</p>
<h2>IPS Protection</h2>
<div>IPS is enhanced with greatly expanded categories enabling you to better optimize your performance and protection.</div>
<p>&nbsp;</p>
<h2>Management Enhancements</h2>
<div>Management including enhanced firewall rule grouping with automatic group assignment, a custom column selection for the log viewer and revamped online help with learning content approach.</div>
<p>&nbsp;</p>
<h2>VPN and SD-WAN Failover and Failback</h2>
<div>New IPSec failover and failback controls and SD-WAN link failback options.</div>
<p>&nbsp;</p>
<h2>Client Authentication</h2>
<div>Client Authentication gets a major update with a variety of new enhancements such as per-machine deployment, a logout option, support for wake from sleep, and MAC address sharing.</div>
<p>&nbsp;</p>
<h2>Sophos Connect</h2>
<div>Sophos Connect is our new IPSec VPN Client that’s free for all XG Firewall customers that makes remote VPN easy for users and supports Synchronized Security.</div>
<p>&nbsp;</p>
<h2>Additionally</h2>
<p>Coming in a following Maintenance Release we have:</p>
<ul>
<li>Wireless APX Access Point Support provides support for the new Wave 2 access points providing faster connectivity and added scalability.</li>
<li>Airgap Support for deployments where XG Firewall can’t get updates automatically via an internet connection (due to an “airgap” or physical isolation) – Patterns and Licenses can now be updated manually.</li>
<li>Sophos Central Management of XG Firewall With v17.5, XG Firewall is also joining Sophos Central.  The Early Access Program for Sophos Central Management of XG Firewall is expected to start soon.You will be able to manage XG Firewall from within Sophos Central along with all your other Sophos Central products.  And there’s a few great new features coming along with Sophos Central Management of XG Firewall:
<ul>
<li>Secure access and management with single-sign-on through Sophos Central from anywhere</li>
<li>Backup management and storage for your regularly scheduled firewall backups</li>
<li>Firmware update management to make multiple firewall updates easy</li>
<li>Light-touch deployment to enable easy remote setup of a new Firewall</li>
</ul>
</li>
</ul>
<p>&nbsp;</p>
<h1>Notes</h1>
<ul>
<li>Enforcement of search engine Safe Search and additional image filters is now configurable per-web policy and is no longer a global option. The settings have been moved from Web &gt;&gt; General Settings into the additional options that are available when editing a web policy. In addition, configuration for YouTube restrictions have been broken out into a separate option.<br />
Product behaviour will be preserved on upgrade by automatically migrating the existing global settings to all existing web policies.The exceptions to this are the following built-in, uneditable policies: Allow All, Deny All and ClPA-Compliance. <a href="https://community.sophos.com/kb/en-us/123589">KBA 123589</a></li>
<li>IPS now with Cisco Talos IPS library and more granular IPS categories <a href="https://sophtrac.sophos.net/default.aspx?articleid=133197">KBA 133197</a></li>
</ul>
<h1>Issues Resolved</h1>
<ul>
<li>NC-39029 [Authentication] Show proper error message in UI if you enter an used port in Chromebook SSO configuration</li>
<li>NC-39212 [Authentication] CSD: make sure the userSessions map is not overwritten</li>
<li>NC-39532 [Authentication] Migration from 17.1 fails if host definition for &#8220;*.<a href="http://gstatic.com/" rel="nofollow">gstatic.com</a>&#8221; exists</li>
<li>NC-39677 [Authentication] Success message shown in ui even though deleting a user fails</li>
<li>NC-37683 [Base System] cURL (libcurl) NTLM Authentication Code Buffer Overrun Vulnerability (CVE-2018-14618)</li>
<li>NC-39192 [CM-Join-to-cloud] Appropriate status should update on SF and Sophos Central once FW is remove from Central and register again</li>
<li>NC-36497 [Email] POP3 mails reach the proxy empty</li>
<li>NC-38052 [Email] Subject not displayed properly in mail log with sender generated password method</li>
<li>NC-38282 [Email] mail_sender opcode stuck in CSC</li>
<li>NC-38470 [Email] Some reason filters on mail log page are not working as expected</li>
<li>NC-38571 [Email] Port validation not working when adding new port in SMTP via CLI</li>
<li>NC-39233 [Email] Email delivery failed for some recipients when email containing 512 recipients</li>
<li>NC-39280 [Email] Error message &#8216;Relay not permitted&#8217; when sending an inbound mail to email address base profile</li>
<li>NC-39379 [Email] Bad (malformed syntax) mails should be displayed separately from network failed emails on UI</li>
<li>NC-39454 [Email] Mail doesn&#8217;t get formatted properly when file filter protection applied</li>
<li>NC-39513 [Email] Network type IP host should not allowed to add in exception policy</li>
<li>NC-39668 [Email] RDNS check should be applied to inbound emails only</li>
<li>NC-39737 [Email] Mail from header changed when wrong &#8220;Return-Path&#8221; used in smart host deployment</li>
<li>NC-39953 [Email] Email attachments get corrupted with BDAT</li>
<li>NC-38505 [IPS] IPS policy backup is not created while applying signature upgrade</li>
<li>NC-39687 [IPS] IPS log filling up with entries and causing problems for legitimate traffic</li>
<li>NC-39083 [IPsec] IPsec: charon starts parsing fragmented messages before they are reassembled</li>
<li>NC-38832 [Network Services] Issue with wildcard FQDN based rule</li>
<li>NC-37817 [UI Framework] SAC tab not loaded because of OutOfMemory error</li>
<li>NC-39310 [UI Framework] Control Center: Icons for VPN and Connections have been switched</li>
<li>NC-38184 [Web] Check settings functionality is not working from device level of firewall manager(SFM)</li>
<li>NC-38844 [Web] Web Policy Override not working in HA(A-A) mode if traffic served from Aux appliance</li>
<li>NC-39039 [Web] When &#8220;Drop connection&#8221; feature is enabled, blocked/warned events are not logged correctly</li>
</ul>
<h1>Issues Resolved in EAP1</h1>
<ul>
<li>NC-32763 [Authentication] Importing users with .csv file having usernames with Thai characters creates junk character</li>
<li>NC-34340 [Authentication] Users not getting authenticated via Radius SSO</li>
<li>NC-37091 [Authentication] Show error when Chromebook SSO is not configured correctly</li>
<li>NC-37300 [Authentication] Create FQDN Hosts and Groups for Chromebook</li>
<li>NC-38381 [Authentication] &#8220;Record does not exist&#8221; error when trying to open created LDAP server</li>
<li>NC-36185 [Azure] Upgrade Linux VM Agent</li>
<li>NC-38176 [Base System] garner memory corruption affecting RED</li>
<li>NC-38471 [Base System] EULA not shown on GUI on Azure</li>
<li>NC-38473 [Base System] Reading of /proc/timer_list file leads to NMI watchdog soft lockups</li>
<li>NC-31499 [Email] Unable to send .eml attachments to specific domain</li>
<li>NC-32682 [Email] SPX generates password for same email recipient in different case</li>
<li>NC-32690 [Email] SPX encryption corrupting attachments by adding line breaks</li>
<li>NC-32754 [Email] XG not able to insert spool query</li>
<li>NC-33360 [Email] Add missing header fields in notification emails</li>
<li>NC-33391 [Email] Quarantine digest and released emails not sent</li>
<li>NC-33977 [Email] Unable to release unscannable quarantined emails</li>
<li>NC-34450 [Email] Fail to send email notifications</li>
<li>NC-35494 [Email]Â  UI hangs when user selects specific date on SMTP quarantine page</li>
<li>NC-36612 [Email] Cross version import/export not working for exception policy</li>
<li>NC-37849 [Email] Console command &#8216;subsystem-info&#8217; shows awarrensmtp and smtpd service with same name</li>
<li>NC-37945 [Email] Scanner crash on low end devices due to high number of forwarders</li>
<li>NC-38005 [Email] Improper IP reputation reject status message in mail log</li>
<li>NC-38013 [Email] Typo in Authentication Relay drop message</li>
<li>NC-38015 [Email]Â  Emails moved to error queue when header part is big</li>
<li>NC-38021 [Email] Return-Path/Reply-To header ignored while sending failure notifications</li>
<li>NC-38252 [Email] Add support of email based routing and RBL scanning</li>
<li>NC-38257 [Email] No reason logged in mail logs for mails dropped due to file filter</li>
<li>NC-38297 [Email] Improper label in exception policy at device level from SFM</li>
<li>NC-38312 [Email] SFM pushes exception policy to firewalls even in legacy mode</li>
<li>NC-38391 [Email] Core dump in mail scanner</li>
<li>NC-38392 [Email]Â  Notifications are logged with &#8216;0 bytes&#8217; in MailLogs</li>
<li>NC-38501 [Email] SPX fails to encrypt on hardware appliances when SPX reply portal is enabled template</li>
<li>NC-39024 [Email] Do not allow multi use for port 587</li>
<li>NC-32530 [Firewall] Post-Authentication SQL injection in Firewall User Interface</li>
<li>NC-34612 [Firewall] Appliance frequently rebooting when having IPv6 permitted networks for remote access SSLVPN</li>
<li>NC-34675 [Firewall] Live connections page not showing connection list</li>
<li>NC-35656 [Firewall] Internet access being lost, SFOS consuming all memory.</li>
<li>NC-35660 [Firewall] MAC address missing in export of MAC list having only one list member</li>
<li>NC-37274 [Firewall] SMTP MTA mode does not support TCP port 587</li>
<li>NC-37760 [Firewall] Misleading message when adding rule using automatic grouping and group has already 200 rules</li>
<li>NC-37992 [Firewall] Transferred data not shown in firewall rules when reaching tera bytes</li>
<li>NC-36318 [IPS, SFM-SCFM] Application filter policy rule not containing any application being pushed from SFM is not applied on SF</li>
<li>NC-36565 [IPS] Category replacement not working on export/import</li>
<li>NC-38347 [IPS] Category based IPS policy import not mapping to Talos categories</li>
<li>NC-30016 [IPsec] Merged IKE gets deleted when one connection is disabled in UI</li>
<li>NC-32269 [IPsec] GRE traffic forwarded through WAN interface after HA failover event</li>
<li>NC-34131 [IPsec] L2TP still connects after user was disabled</li>
<li>NC-38310 [IPsec] IPsec site-to-site tunnel not established with Cisco ASA and gateway type &#8220;Initiate the connection&#8221;</li>
<li>NC-39059 [Localization] Using &#8220;state&#8221; causes mistranslations</li>
<li>NC-36455 [Networking] WWAN is not connected automatically at boot time if the primary WAN link is disconnected/down</li>
<li>NC-36720 [Networking] Traffic might flow via backup gateway even hard gateway failback configured</li>
<li>NC-34149 [nSXLd] Keywords are not deleted when custom web category is deleted</li>
<li>NC-37809 [nSXLd] Proxy authentication is not cleared after config reload</li>
<li>NC-38125 [SSLVPN] Unable to edit SSLVPN (remote access) page</li>
<li>NC-35500 [UI Framework] Apache service start fails if webadmin certificate passphrase having single quote character</li>
<li>NC-35682 [WAF] UnableÂ  to edit and load business app rule for WAF</li>
<li>NC-37178 [Web] Name should not be pre-filled while creating new overrides</li>
<li>NC-37179 [Web] Improve UI for adding website domains to an Application Override</li>
</ul>
<h1>Issues Resolved in EAP0</h1>
<ul>
<li>NC-29648 [Base System] If Default CA is not configured, Generate CSR option should be disabled</li>
<li>NC-29906 [Base System] Unable to edit NTP server when 10 servers are configured</li>
<li>NC-30497 [Base System] [VMware] SFOS Guest OS detail shows wrong/missing</li>
<li>NC-30635 [Base System] Missing focus after closing dialog when editing default certificate</li>
<li>NC-31010 [Base System] Configuration import running into timeout on SG/XG 100 series appliances</li>
<li>NC-31100 [Base System] Upgrade notification pop-up does not work in some cases</li>
<li>NC-35536 [Base System] OpenSSL &#8211; â€œDenial of service during forward secrecy setupâ€ (CVE-2018-0732)</li>
<li>NC-34154 [Clientless Access] Unable to connect RDP type bookmark with NLA</li>
<li>NC-34803 [Email] Possible denial-of-service due to secure client-initiated renegotiation</li>
<li>NC-35175 [Email] Sophos XG is not adding received-by header as per RFC 5321</li>
<li>NC-35256 [Email] Invalid XML is generated for Email -&gt; General Settings -&gt; Blocked Senders</li>
<li>NC-35915 [Email] &#8220;POP-IMAP Scanning&#8221; policy generated XML does not contain information of filter criteria &#8220;Source IP/Network Address&#8221;</li>
<li>NC-26440 [Firewall] Firewall rule dropping traffic when there is no user identity attached to the rule</li>
<li>NC-30989 [Firewall] CVE-2018-8897: Don&#8217;t use IST entry for #BP stack</li>
<li>NC-31282 [Firewall] Firewall rule group entity name not sent to SFM upon insert/update/delete</li>
<li>NC-22889 [Hardware] XG85: poweroff command reboots the device instead of shutting it down</li>
<li>NC-21909 [IPsec] Do not show empty-value-warning on page entry</li>
<li>NC-30319 [IPsec] Backup fails import when containing IPv6 remotes</li>
<li>NC-30462 [IPsec] Site-to-Site connection not initiated after DHCPv6 interface update</li>
<li>NC-30618 [IPsec] New virtual IP on every Phase 1 rekey even though client requests same IP</li>
<li>NC-30794 [IPsec] NAT checkbox is always enabled in IE11</li>
<li>NC-30796 [IPsec] Local gateway selection shows invalid interface in IE11</li>
<li>NC-33410 [IPsec] VPN Connection Status shows &#8216;Any&#8217; on both sides even when configured only on one side</li>
<li>NC-22604 [Logging] GUI alignment issue when sender name or subject is longer</li>
<li>NC-25714 [Logging] Firewall rule ID in log viewer not linking to actual rule anymore</li>
<li>NC-29974 [Network Services] Disconnect PPPoE interface doesn&#8217;t update corresponding interface based DNS static entry</li>
<li>NC-30753 [Network Services] DGD service in stopped state and segmentation fault</li>
<li>NC-33876 [Network Services] IPset command shows wrong information for wildcard and FQDN Host</li>
<li>NC-30483 [Networking] Port and IP address may show &#8220;undefined&#8221; in WAN Link Manager &#8220;Failover Rules&#8221;</li>
<li>NC-30493 [Networking] Link status not updated in WAN Link Manager when RA client has no IP address</li>
<li>NC-30544 [Networking] Full and selective configuration import fails when bridge innterface configured in WAN zone</li>
<li>NC-31399 [Networking] Full backup import fails when bridge member interface is LAG</li>
<li>NC-33628 [Networking] LAG mode related configuration missing on configuration export</li>
<li>NC-34573 [Networking] Configuration changes of CFM not propagated to XG</li>
<li>NC-20785 [Reporting] PDF export of reports taking much time or failing completely</li>
<li>NC-26459 [Reporting, UI Framework] Reports for &#8220;Traffic Insight&#8221; not shown on dashboard</li>
<li>NC-29573 [Reporting] Sending of scheduled reports does not consider changes of daylight saving time</li>
<li>NC-31243 [Reporting] Table headers in reports span two lines and cannot be seen</li>
<li>NC-32490 [Reporting] Unable to click &#8220;PDF&#8221;, &#8220;CSV&#8221;, &#8220;Bookmark&#8221; or &#8220;Schedule&#8221; under &#8220;Report &gt; Applicazioni &amp; Web&#8221; when WebAdmin language is Italian</li>
<li>NC-28206 [SecurityHeartbeat] Heartbeat deamon does not handle all allowed MAC address formats correctly</li>
<li>NC-32459 [SecurityHeartbeat] Endpoint name in StoneWall message</li>
<li>NC-32580 [SecurityHeartbeat] Extend StoneWall protocols/messages</li>
<li>NC-34169 [SSLVPN] Fail to access SSLVPN (site-to-site) page after any tunnel modification</li>
<li>NC-30984 [Synchronized App Control] [SAC] improve usability</li>
<li>NC-30987 [Synchronized App Control] [SAC] no action &#8220;acknowledge&#8221; for acknowledged apps</li>
<li>NC-30988 [Synchronized App Control] [SAC] filter with deleted apps should be last in the dropdown field</li>
<li>NC-28064 [WAF] Form hardening sets block-reason only in case of GET requests</li>
<li>NC-25805 [Web] Handle non-compliant HTTP status code 999</li>
<li>NC-27519 [Web] Proxy continues to download files in batch mode even if client closes connection</li>
<li>NC-28851 [Web] Default Web policies contain duplicate rules</li>
<li>NC-29305 [Web] &#8220;Expect&#8221; header not handled correctly</li>
<li>NC-31837 [Web] Add &#8220;alert.hitmanpro.com&#8221; to proxy bypass list</li>
<li>NC-33650 [Web] Enabling web content cache for Sophos Updates blocks further updates</li>
</ul>
<h1>Download</h1>
<p>To manually install the upgrade, you can find the firmware for your appliance at <a title="MySophos portal" href="https://www.sophos.com/en-us/mysophos" target="_blank" rel="noopener">MySophos portal</a>. Please see the following KBA &#8211; Sophos Firewall: How to upgrade the firmware: <a href="https://community.sophos.com/kb/en-us/123285" target="_blank" rel="noopener">KBA 123285</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Source: <a href="https://community.sophos.com/products/xg-firewall/b/xg-blog/posts/sfos-17-5-ga-released" target="_blank" rel="noopener">community.sophos.com</a></p>
<p>The post <a href="https://networkguy.de/sophos-xg-v17-5-released/">Sophos XG v17.5 released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-xg-v17-5-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2060</post-id>	</item>
		<item>
		<title>Sophos XG &#8211; SFOS 17.1.0 GA Released</title>
		<link>https://networkguy.de/sophos-xg-sfos-17-1-0-ga-released/</link>
					<comments>https://networkguy.de/sophos-xg-sfos-17-1-0-ga-released/#respond</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Thu, 21 Jun 2018 14:14:26 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=1929</guid>

					<description><![CDATA[<p>What&#8217;s New Check out all the enhancements in XG Firewall v17.1 including the new Cloud Application Visibility feature in our XG Firewall v17.1 demo video. Cloud App Visibility &#8211; brings the visibility pillar of CASB to XG Firewall, providing quick and easy Shadow IT discovery and visibility into data that may be at risk in cloud applications with [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-xg-sfos-17-1-0-ga-released/">Sophos XG &#8211; SFOS 17.1.0 GA Released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1>What&#8217;s New</h1>
<p>Check out all the enhancements in XG Firewall v17.1 including the new Cloud Application Visibility feature in our <a href="https://vimeo.com/273413093" target="_blank" rel="noopener">XG Firewall v17.1 demo video</a>.</p>
<ul>
<li><strong>Cloud App Visibility</strong> &#8211; brings the visibility pillar of CASB to XG Firewall, providing quick and easy Shadow IT discovery and visibility into data that may be at risk in cloud applications with great reporting on users and volume of data being uploaded and downloaded from cloud services.</li>
<li><strong>Synchronized App Control</strong> &#8211; gets further enhancements in managing newly discovered applications, including options to search, filter, and delete applications.  You’ll also see the category assigned to the discovered app in the list for easy reference.</li>
<li><strong>Email Security</strong> &#8211; adds user management over individual SMTP block and allow lists via the User Portal.  Domains or email addresses added to the Allow list will bypass policies (except for malware or sandboxing enforcement) and adding domains or addresses to the block list will automatically quarantine emails from those senders.  In addition, more flexible SMTP policy exceptions are supported to provide parity with Sophos SG UTM.</li>
<li><strong>SSL VPN Port Option</strong> &#8211; one of the most requested features on XG Firewall is the option to customize the SSL VPN listening port.</li>
<li><strong>Firewall Enhancements</strong> &#8211; Enhancements have been made to the firewall and rule management to improve flexibility and streamline management even further.  You can now double-click a firewall rule in the list to open it for editing.  There&#8217;s a new option to block Google QUIC&#8217;s HTTPS over UDP forcing a fallback to TCP enabling full SSL inspection of the traffic.  And there is now added flexibility in defining ACL exceptions to restrict access to services like the User Portal from a single alias, for example.</li>
<li><strong>Wireless Enhancements</strong> &#8211; XG Firewall v17.1 provides wireless networking enhancements including the option to set the channel width for wireless radios in the GUI as well as Radius Accounting.</li>
<li><strong>IPSec VPN IKEv2 Enhancements</strong> &#8211; XG Firewall v17 introduced new IKEv2 support for IPSec VPN connections and all stability and reliability enhancements, included in subsequent maintenance releases, are included with v17.1.</li>
<li><strong>New Hardware Support</strong> &#8211; Support for the latest XG Series desktop hardware connectivity and features, unveiled in an earlier maintenance release, is also included in XG Firewall v17.1</li>
</ul>
<p>You can find the PDF of what&#8217;s new here: <a href="https://www.sophos.com/medialibrary/pdfs/factsheets/xg-firewall-whats-new.pdf" target="_blank" rel="noopener">Sophos XG Firewall v17.1 Whats New.pdf</a>.</p>
<h1>Notes</h1>
<p>In case you are managing your Firewalls using SFM/CFM, Firewalls running SFOS 17.1 GA won’t accept application filter rules when applied from a device group or template. You can manage application rules from the device-level view in SFM/CFM until this limitation is addressed in SFOS 17.1 MR-1.</p>
<h1>Issues Resolved</h1>
<ul>
<li>NC-31554 [Base System] Missing color indication for ATP widget</li>
<li>NC-31662 [Base System] Change of the XG Firewall login screen</li>
<li>NC-31484 [Email] Emails are not removed from spool after update to SF 17.0 MR8</li>
<li>NC-31514 [Firewall] Editing IPv6 host is not possible</li>
<li>NC-31030 [SSLVPN] Remove misleading message &#8220;Port 443 is already in use by User Portal&#8221;</li>
<li>NC-31615 [Web] Remove file type data columns in cloud application dashboard</li>
</ul>
<h3>Issues Resolved in Beta3 build</h3>
<ul>
<li>NC-30212 [Base System] Device displays fail message for SFM/CFM heartbeat</li>
<li>NC-29075 [Email] Unable to update mail spool if mail address contains special character (&#8216;)</li>
<li>NC-29757 [Email] CVE-2011-1473: POP/IMAP &#8211; Secure Client-Initiated Renegotiation vulnerability</li>
<li>NC-30160 [Email] Option &#8220;Skip mails (for malware scan) greater than&#8221; is not working for outbound traffic</li>
<li>NC-30183 [Email] Notification test email fails with authentication when mail send without saving configuration</li>
<li>NC-30303 [Email] Possible authenticated remote code execution in mail_sender</li>
<li>NC-30649 [Email] Permissions for Email protection are not exported correctly</li>
<li>NC-29216 [Firewall] Separate out filter and NAT table chains for IPsec in two different services</li>
<li>NC-29505 [Firewall] Traffic shaping rule for firewall has wrong default policy association</li>
<li>NC-29776 [Firewall] After migrating from CR to SF DNAT rules stop working after every reboot</li>
<li>NC-29990 [Firewall] Import/Export of destination local acl always set to &#8220;any&#8221; if any port is selected before</li>
<li>NC-30037 [Firewall] Validation missing if IPv4 is selected as IP version</li>
<li>NC-30197 [Firewall] Firewall rule filter is not working from second page onwards</li>
<li>NC-30588 [Firewall] Policy Tester ignores IP host groups in the firewall rule</li>
<li>NC-30766 [Firewall] Unauthenticated XSS in diagnostics component</li>
<li>NC-30871 [Firewall] Japanese column header not displayed in the right place in Protect -&gt; Firewall</li>
<li>NC-19980 [Framework(UI)] Filter search containing backslash char will not find the match</li>
<li>NC-30575 [Framework(UI)] VPN FO Group selection widget doesn&#8217;t display correctly in Chrome</li>
<li>NC-28826 [HA] HA migration does not complete if dedicated link goes down during migration process</li>
<li>NC-29572 [IPsec] GUI allows admin to select external certificate for Remote Certificate for IPsec Connection for Remote Access</li>
<li>NC-30830 [IPsec] CVE-2018-10811 &amp; memleak: Import upstream strongswan patches</li>
<li>NC-30979 [IPsec] IPsec route can disappear if two connections use the same</li>
<li>NC-29889 [Network Services] Unable to lease the IP to some users</li>
<li>NC-31017 [RED] RED S2S client does not work with routed server address</li>
<li>NC-29733 [Reporting] Showing unknown character for Current HA status under reports with HA</li>
<li>NC-29846 [Reporting] Sort by Users/Byte is not working on Cloud Applications page</li>
<li>NC-30155 [Reporting] Wrong label displayed for widget of Cloud Application</li>
<li>NC-30190 [Reporting] Records are not displaying in HTML export for &#8220;Records Per Chart 25 and more&#8221; for some widget of Cloud application</li>
<li>NC-28789 [Sandstorm] ExcludeSandstormFileTypes is not available in SandboxSettings XMLAPI data</li>
<li>NC-27461 [SFM-SCFM] Compatibility v17: Firewall UI issues at device level</li>
<li>NC-28913 [SFM-SCFM] Compatibility v17: Appliance unsync when applying L2TP (Remote Access) or IPSEC configuration</li>
<li>NC-29907 [SSLVPN] Not able to edit SSL VPN (Remote Access) policy</li>
<li>NC-30847 [SSLVPN] Unable to set user portal port to SSL VPN port</li>
<li>NC-29278 [Synchronized App Control] Renaming an Endpoint does not update SAC table</li>
<li>NC-29820 [Synchronized App Control] No new logs since 2 days &#8211; /tmp is full on XG85</li>
<li>NC-31020 [Synchronized App Control] Synchronized Application Control page is taking too long to load</li>
<li>NC-31229 [Synchronized App Control] SAC data table not loaded after migration to v17.1 Beta1</li>
<li>NC-30054 [UI] Device Access page showing error on Auxiliary machine</li>
<li>NC-29602 [WAF] API Get for SecurityPolicy does not return Traffic Shaping settings for the policy</li>
<li>NC-29876 [WAF] Website hosted over WAF taking more time to load when Common Threat Filter enabled</li>
<li>NC-30448 [WAF] Rewrite HTML for site path with special characters leads to memory allocation failure</li>
<li>NC-28699 [Web] Cloud Applications Control center widget &#8211; spacing issue</li>
<li>NC-28762 [Web] After power failure, Android devices captive portal does not disappear after logging in</li>
<li>NC-29002 [Web] API Import for WebFilterPolicy with dependent entities failed</li>
<li>NC-29164 [Web] Proxy drops HTTP Response when 100 and 200 in same packet</li>
<li>NC-29166 [Web] AV files served from cache are not scanned if &#8216;scan av&#8217; flag enabled after file was cached</li>
<li>NC-29385 [Web] Data mismatch for Control Center and reporting widget for Cloud Application</li>
<li>NC-29479 [Web] Usercache is not updated when classification set through AppClassificationBatchAssignment</li>
<li>NC-29504 [Web] Captive Portal customization Reset to Defaults does not work</li>
<li>NC-29601 [Web] Policy Test Tool not working</li>
<li>NC-29809 [Web] When cloud dash board page contains more than 10 apps, some apps will not show app-icon warning exclamation triangle mark when changing app classification</li>
<li>NC-29984 [Web] WebFilterURLGroup API Doc is misleading</li>
<li>NC-30606 [Web] Fail to change application classification when changing to other languages</li>
<li>NC-30682 [Web] Cloud Applications page loading failed in XG85 appliance</li>
<li>NC-31042 [Web] Cloud Applications dashboard column names have overlapping text in French</li>
<li>NC-27033 [Wireless] Pending text is wrapping to next line for Wireless APs counter</li>
<li>NC-27535 [Wireless] UI is not displaying WiFi client&#8217;s IP when multiple clients are connected to AP</li>
<li>NC-28763 [Wireless] UI displays AP as inactive even if AP was active</li>
<li>NC-28765 [Wireless] AP goes in inactive mode when used &#8220;2.4 Ghz and 5 Ghz&#8221; Frequency band</li>
<li>NC-29419 [Wireless] Not able to configure channel 12 and channel 13 on Desktop refresh devices</li>
<li>NC-29988 [Wireless] Wireless network update is not reflecting when it is assigned to LocalWiFi1(OptionalWiFi)</li>
</ul>
<h3>Issues Resolved in Beta2 build</h3>
<ul>
<li>NC-29977 [WAF] Reverse authentication: Access possible for empty protection profile</li>
</ul>
<h3>Issues Resolved in Beta1 build</h3>
<ul>
<li>NC-28797 [Access] User Edit page doesn&#8217;t load for some users who are part of multiple groups</li>
<li>NC-26797 [API] HA devices update from MR2 to MR3 result in primary unit being factory reset</li>
<li>NC-22530 [Authentication] Webfilter policy is not working for auto-created AD user</li>
<li>NC-28175 [Authentication] Customer from NC-21823 has updated and getting segfault for access_server</li>
<li>NC-16090 [Base System] Source port changes to random over IPSec VPN</li>
<li>NC-25783 [Base System] Import certificate option is missing for CSR</li>
<li>NC-26328 [Base System] Additional CPU cores not detected in v17 after license upgrade</li>
<li>NC-27022 [Base System] Import from configuration failed due to too long certificate name</li>
<li>NC-27076 [Base System] Ping utility not working</li>
<li>NC-27263 [Base System] Incorrect interface speed is shown via SNMP</li>
<li>NC-28033 [Base System] Packet capture and connection list issue</li>
<li>NC-28220 [Base System] Garner active.db file size is too big in /tmp/eventlogs due to LogViewer output plug-in</li>
<li>NC-28566 [Base System] Garner service restarts</li>
<li>NC-27087 [Certificates] Default CA regeneration fails</li>
<li>NC-27853 [DDNS] DynDNS update does not happen in the configured time range</li>
<li>NC-28177 [DNS] Unable to resolve DNS of services.vip.symantec.com when registering it in Services/FQDN Host</li>
<li>NC-22864 [Firewall] Quick QUIC block</li>
<li>NC-22878 [Firewall] Allow user to edit rule while double clicking on the rule</li>
<li>NC-22927 [Firewall] NATPolicy API export fails when it contains NAT profile created on network</li>
<li>NC-26433 [Firewall] Captive Portal access issue for Android devices</li>
<li>NC-26560 [Firewall] One time schedule in firewall rule for VPN traffic doesn&#8217;t block traffic when schedule expires</li>
<li>NC-27004 [Firewall] Unable to send email due to Default Internet Scheme Policy</li>
<li>NC-27164 [Firewall, Performance] LAN interface become unresponsive</li>
<li>NC-28025 [Firewall] Policy Tester ignores service groups in the firewall rule</li>
<li>NC-28710 [Firewall] Display of firewall rule in Firewall Group overlaps with display of action</li>
<li>NC-28756 [Firewall] Appliance inaccessible after the backup restore</li>
<li>NC-28785 [Firewall] Packet capture log is empty when opened via hyperlink in log viewer for IPv6</li>
<li>NC-28791 [Firewall] Sometimes VPN is not working when bridge has WAN interface</li>
<li>NC-28800 [Firewall] Firewall Rule ID is shown with an incorrect ID</li>
<li>NC-29379 [Firewall] HA Aux appliance goes in failsafe mode when failed to load LBS module (occurs only in specific IPv6 condition)</li>
<li>NC-29243 [Framework(UI)] Subnet creation is broken for IE11</li>
<li>NC-25854 [HA] Disable HA fails on auxiliary appliance when LAG interface is used as peer admin port and a bridge interface is also configured in SFOS</li>
<li>NC-29040 [Hotspot] File name containing space is not working for images/stylesheets and logos of hotspots</li>
<li>NC-26514 [IPS] IPS core dumps with appliances in HA (A-A)</li>
<li>NC-27549 [IPS] ATP Exception is getting removed automatically</li>
<li>NC-28602 [IPS] Filter alignments in Application Filter Policy Rule are displayed incorrect</li>
<li>NC-29174 [IPS] IPS Policies are not being pushed out via SFM template</li>
<li>NC-25380 [IPsec] Add an option to auto create a Firewall rule</li>
<li>NC-22604 [Logging] GUI alignment issue when sender name or subject is longer</li>
<li>NC-26357 [Logging] Log viewer is not loading after adding any filter and read/write goes high after activity</li>
<li>NC-21745 [Mail Proxy] i18n file name is not displayed in log viewer and on sandstorm activity page for sandstorm module</li>
<li>NC-25746 [Mail Proxy] CVE-2012-4929: SSL/TLS CRIME Vulnerability on port 8094</li>
<li>NC-26472 [Mail Proxy] AwarrenMTA: few mails appear on queue after delivery (DB connect fail)</li>
<li>NC-26930 [Mail Proxy] XG not able to update spool due to special characters in failure reason</li>
<li>NC-27240 [Mail Proxy] Unable to send emails due to auto routing to rcpt DNS in case of greylisting reply for MX</li>
<li>NC-27365 [Mail Proxy] Display issues with german umlauts in SPX Template</li>
<li>NC-28081 [Mail Proxy] Unable to save the SMTP policy when some MIME types are selected</li>
<li>NC-28364 [Mail Proxy] Email should be quarantined if scanning fails due to unscannable file</li>
<li>NC-28819 [Mail Proxy] Quarantined emails are not visible on SMTP Quarantine</li>
<li>NC-29018 [Mail Proxy] XG is unable to block email attachments when sent via Powershell v5.1</li>
<li>NC-29103 [Mail Proxy] Unable to release quarantine mails with special characters from spam digest</li>
<li>NC-29315 [Mail Proxy] CTIPD service should be stopped if Email or WAF subscription is not activated</li>
<li>NC-29319 [Mail Proxy] Unable to release false positive outbound spam emails</li>
<li>NC-29339 [Mail Proxy] CVE-2013-0169: Multiple SSL/TLS vulnerabilities &#8211; POP/IMAP</li>
<li>NC-29437 [Mail Proxy] Multi-level subdomain getting 501 syntax error while “Reject invalid HELO or missing RDNS” enabled</li>
<li>NC-29671 [Mail Proxy] AwarrenMTA restarts when used with high CCLs on certain mails</li>
<li>NC-21993 [Network Services] Static MAC-IP binding issue</li>
<li>NC-28815 [Network Services] CVE-2018-5732 and CVE-2018-5733: DHCP vulnerabilities</li>
<li>NC-27874 [Networking] IP address in static DHCP leases is shown incompletely</li>
<li>NC-28029 [Networking] Firewall configured as DHCP relay agent is generating flood on internal DHCP server</li>
<li>NC-28564 [Networking] Backup-Restore failed for different interface name devices when VDSL interface is configured</li>
<li>NC-29721 [Networking] HA failover is taking 10 minutes in v17.0 MR5</li>
<li>NC-28320 [nSXLd] URL Category Lookup provides different results for UI and command line</li>
<li>NC-27556 [PPTP] PPTP Remote Access fails when user name is not in lower case</li>
<li>NC-27881 [Qos] Unit for bandwidth parameter is incorrect on the Dashboard</li>
<li>NC-27942 [RED] XG red to XG red not connecting over MPLS network</li>
<li>NC-22787 [Reporting] Dashboard uses incorrect design for ATP and UTQ widgets</li>
<li>NC-22829 [Reporting] Reports section in Control Center gets stucked when &#8220;None&#8221; is configured as Admin Profile for &#8220;Reports Access&#8221;</li>
<li>NC-25786 [Reporting] Logo is not displayed properly in SAR report</li>
<li>NC-27046 [Reporting] &#8220;Search Key&#8221; filter not working for Google Search Engine</li>
<li>NC-28918 [Reporting] Unable to view Objectionable websites in Control Center and Reports</li>
<li>NC-29465 [Reporting] Not able to send mail digest &#8211; due to PG connections full</li>
<li>NC-26575 [SecurityHeartbeat] Heartbeat DB opcode sync command gets stuck</li>
<li>NC-27258 [SecurityHeartbeat] Ipset opcode stucks in HA setup</li>
<li>NC-28065 [SSLVPN] Port 8443 should be useable at any time when not used somewhere else</li>
<li>NC-28219 [SSLVPN] Site-Site SSLVPN: Routes aren&#8217;t added with IP HOST Group in remote network</li>
<li>NC-23106 [Synchronized App Control] [SAC] Extended Filter/Search function in app Lists</li>
<li>NC-22122 [UI] CVE-2007-6750: Apache Partial HTTP Request Denial of Service Vulnerability for port 8443, 443, 4444</li>
<li>NC-26436 [WAF] Common Threat Filter should be disabled in default Outlook Anywhere Web Protection Policy</li>
<li>NC-28405 [WAF] Content gets lost when using form-hardening</li>
<li>NC-28944 [WAF] HTTPS Certificate Error when editing a Business Application Rule</li>
<li>NC-29483 [WAF] Creating IP host object inline leads to hanging SlowHTTP UI</li>
<li>NC-29650 [WAF] CVE-2018-1301: Possible out of bound access after failure in reading the HTTP request</li>
<li>NC-18038 [Web] Page redirections for authentication (and others) should use hostname not IP</li>
<li>NC-25617 [Web] Log virus name for unscannable content as &#8220;Unscannable&#8221; in the Web Virus report</li>
<li>NC-25745 [Web] CVE-2016-2183, CVE-2016-6329: SWEET32 SSL/TLS Vulnerability and Triple DES on port 8090</li>
<li>NC-26136 [Web] Change link of Guest User Registration on Captive Portal page into https</li>
<li>NC-27893 [Web] Unable to use apostrophe character in Captive Portal settings</li>
<li>NC-28457 [Web] No response when clicking on Captive Portal login button</li>
<li>NC-28601 [Web] Dynamic app filter rules which do not contain any applications is enforced for all applications</li>
<li>NC-28695 [Web] Block and warnpage previews use wrong template</li>
<li>NC-28759 [Web] Awarrenhttp segfaults when killed while scanning</li>
<li>NC-28792 [Web] IPS fails to close connections which are blocked by an app filter (causing proxy to timeout after 60 sec)</li>
<li>NC-28899 [Web] &#8216;Block HTTP&#8217; option disappears if switching from a dynamic category to a non-dynamic one for an activity</li>
<li>NC-29124 [Web] Possible buffer overflow in Web Proxy&#8217;s warn-proceed transformer</li>
<li>NC-5395 [Wireless] Wrong interface status shown on auxiliary appliance for wireless network</li>
<li>NC-19851 [Wireless] Support Radius Accounting on Remote APs &amp; Local Wifi models</li>
<li>NC-26278 [Wireless] IP addresses not visible in Wireless Client List</li>
<li>NC-27261 [Wireless] Wizard is failing in XG85W(old model) after configuring SSID from wireless config page of wizard</li>
</ul>
<h1>Download</h1>
<p>To manually install the upgrade, you can find the firmware for your appliance at <a title="MySophos portal" href="https://www.sophos.com/en-us/mysophos" target="_blank" rel="noopener">MySophos portal</a>. Please see the following KBA &#8211; Sophos Firewall: How to upgrade the firmware: <a href="https://community.sophos.com/kb/en-us/123285" target="_blank" rel="noopener">KBA 123285</a>.</p>
<p>&nbsp;</p>
<p>Check out all the enhancements in XG Firewall v17.1 including the new Cloud Application Visibility feature in our <a href="https://vimeo.com/273413093" target="_blank" rel="noopener">XG Firewall v17.1 demo video</a>.</p>
<p>The post <a href="https://networkguy.de/sophos-xg-sfos-17-1-0-ga-released/">Sophos XG &#8211; SFOS 17.1.0 GA Released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-xg-sfos-17-1-0-ga-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1929</post-id>	</item>
		<item>
		<title>High availability with Sophos XG</title>
		<link>https://networkguy.de/high-availability-with-sophos-xg/</link>
					<comments>https://networkguy.de/high-availability-with-sophos-xg/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Mon, 14 May 2018 06:45:22 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=1852</guid>

					<description><![CDATA[<p>High availability with Sophos UTM was very easy: You need to plug in an ethernet cable at the &#8220;HA&#8221; labeled port between both devices, that&#8217;s all. At the XG, you need to configure it manually. I&#8217;m using two Sophos XG 125 Rev.3 devices. We will built HA between &#8220;Port8&#8221;. Actually the new Sophos devices are [&#8230;]</p>
<p>The post <a href="https://networkguy.de/high-availability-with-sophos-xg/">High availability with Sophos XG</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>High availability with Sophos UTM was very easy: You need to plug in an ethernet cable at the &#8220;HA&#8221; labeled port between both devices, that&#8217;s all. At the XG, you need to configure it manually. I&#8217;m using two Sophos XG 125 Rev.3 devices. We will built HA between &#8220;Port8&#8221;. Actually the new Sophos devices are very nice:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/04/xg.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1855" src="https://networkguy.de/wp-content/uploads/2018/04/xg.jpg" alt="" width="1280" height="960" srcset="https://networkguy.de/wp-content/uploads/2018/04/xg.jpg 1280w, https://networkguy.de/wp-content/uploads/2018/04/xg-300x225.jpg 300w, https://networkguy.de/wp-content/uploads/2018/04/xg-768x576.jpg 768w, https://networkguy.de/wp-content/uploads/2018/04/xg-1024x768.jpg 1024w" sizes="(max-width: 1280px) 100vw, 1280px" /></a></p>
<p>at the first step you need to enable SSH (under &#8220;Device Access&#8221;) for the DMZ zone. The HA port will be configured in the DMZ zone:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/04/xg-ha-1.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1856" src="https://networkguy.de/wp-content/uploads/2018/04/xg-ha-1.png" alt="" width="732" height="495" srcset="https://networkguy.de/wp-content/uploads/2018/04/xg-ha-1.png 732w, https://networkguy.de/wp-content/uploads/2018/04/xg-ha-1-300x203.png 300w" sizes="(max-width: 732px) 100vw, 732px" /></a></p>
<p>Configure an IP address which is not in use in your network. Choose &#8220;DMZ&#8221; as the network zone like this:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-2.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1872" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-2.png" alt="" width="951" height="567" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-2.png 951w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-2-300x179.png 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-2-768x458.png 768w" sizes="(max-width: 951px) 100vw, 951px" /></a></p>
<p>go on with the primary node and configure the peer parameters and choose and document a complex password for the HA data encryption</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-3.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1873" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-3.png" alt="" width="868" height="760" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-3.png 868w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-3-300x263.png 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-3-768x672.png 768w" sizes="(max-width: 868px) 100vw, 868px" /></a></p>
<p>the slave device is getting 10.1.1.2/30 on DMZ Port 8 and this auxiliary device configuration:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-4.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1874" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-4.png" alt="" width="859" height="656" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-4.png 859w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-4-300x229.png 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-4-768x587.png 768w" sizes="(max-width: 859px) 100vw, 859px" /></a></p>
<p>your final configuration will look like this:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-5.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1875" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-5.png" alt="" width="860" height="655" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-5.png 860w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-5-300x228.png 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-5-768x585.png 768w" sizes="(max-width: 860px) 100vw, 860px" /></a></p>
<p>now you can connect both Port8 with a network cable:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1876" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.jpg" alt="" width="954" height="697" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.jpg 954w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7-300x219.jpg 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7-768x561.jpg 768w" sizes="(max-width: 954px) 100vw, 954px" /></a></p>
<p>after this, you will see a new log entry in the system log file:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-6.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1877" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-6.png" alt="" width="881" height="43" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-6.png 881w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-6-300x15.png 300w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-6-768x37.png 768w" sizes="(max-width: 881px) 100vw, 881px" /></a></p>
<p>HA status is also visible in the dashboard:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1878" src="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.png" alt="" width="602" height="454" srcset="https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7.png 602w, https://networkguy.de/wp-content/uploads/2018/05/xg-ha-7-300x226.png 300w" sizes="(max-width: 602px) 100vw, 602px" /></a></p>
<p>a &#8220;little&#8221; bit more complicated but easy after initial configuration :-) keep in mind that you connect all your different networks (LAN, DMZ, WAN [DSL, Cable, etc]) to <strong>both</strong> devices!</p>
<p>&nbsp;</p>
<p>Have a nice sunny day!</p>
<p>The post <a href="https://networkguy.de/high-availability-with-sophos-xg/">High availability with Sophos XG</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/high-availability-with-sophos-xg/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1852</post-id>	</item>
		<item>
		<title>Install Sophos XG from USB Stick</title>
		<link>https://networkguy.de/install-sophos-xg-from-usb-stick/</link>
					<comments>https://networkguy.de/install-sophos-xg-from-usb-stick/#comments</comments>
		
		<dc:creator><![CDATA[Michel]]></dc:creator>
		<pubDate>Fri, 06 Apr 2018 09:03:19 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=1845</guid>

					<description><![CDATA[<p>Some years ago, I wrote an article about installing Sophos UTM with an USB stick. Now it&#8217;s time for XG ;) First, I had a problem creating the stick with Rufus. The decive couldn&#8217;t boot from the usb device: Starting Firmware Installation Failed getting ISO disk press y to reboot than I tried the DD [&#8230;]</p>
<p>The post <a href="https://networkguy.de/install-sophos-xg-from-usb-stick/">Install Sophos XG from USB Stick</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Some years ago, I wrote an <a href="https://networkguy.de/?p=728" target="_blank" rel="noopener">article</a> about installing Sophos UTM with an USB stick. Now it&#8217;s time for XG ;)</p>
<p>First, I had a problem creating the stick with <a href="https://rufus.akeo.ie/" target="_blank" rel="noopener">Rufus</a>. The decive couldn&#8217;t boot from the usb device:</p>
<blockquote><p>Starting Firmware Installation<br />
Failed getting ISO disk<br />
press y to reboot</p></blockquote>
<p><a href="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-failure.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1847" src="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-failure.jpg" alt="" width="971" height="591" srcset="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-failure.jpg 971w, https://networkguy.de/wp-content/uploads/2018/04/xg-boot-failure-300x183.jpg 300w, https://networkguy.de/wp-content/uploads/2018/04/xg-boot-failure-768x467.jpg 768w" sizes="(max-width: 971px) 100vw, 971px" /></a></p>
<p>than I tried the DD mode in <a href="https://rufus.akeo.ie/" target="_blank" rel="noopener">Rufus</a>. Just load the ISO file from Sophos Portal and load it into Rufus. Plugin your USB stick and click on the small CD-ROM icon, choose the ISO file and click start. You will get a message where you can choose ISO or DD Image mode. Choose DD mode in this case:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/04/iso-dd-xg.png"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1848" src="https://networkguy.de/wp-content/uploads/2018/04/iso-dd-xg.png" alt="" width="520" height="596" srcset="https://networkguy.de/wp-content/uploads/2018/04/iso-dd-xg.png 520w, https://networkguy.de/wp-content/uploads/2018/04/iso-dd-xg-262x300.png 262w" sizes="(max-width: 520px) 100vw, 520px" /></a></p>
<p>now you can successful install XG on your device:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-1849" src="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success.jpg" alt="" width="1435" height="881" srcset="https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success.jpg 1435w, https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success-300x184.jpg 300w, https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success-768x472.jpg 768w, https://networkguy.de/wp-content/uploads/2018/04/xg-boot-success-1024x629.jpg 1024w" sizes="(max-width: 1435px) 100vw, 1435px" /></a></p>
<p>The post <a href="https://networkguy.de/install-sophos-xg-from-usb-stick/">Install Sophos XG from USB Stick</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/install-sophos-xg-from-usb-stick/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1845</post-id>	</item>
	</channel>
</rss>
