<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Network Guy</title>
	<atom:link href="https://networkguy.de/feed/" rel="self" type="application/rss+xml" />
	<link>https://networkguy.de/</link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Mon, 14 Nov 2022 07:05:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Network Guy</title>
	<link>https://networkguy.de/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Sophos UTM 9.712-13 HA update problem</title>
		<link>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/</link>
					<comments>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 07:05:47 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2954</guid>

					<description><![CDATA[<p>Hello Guys, Lately I have more and more customers who have an update problem to version 9.712-13. This only affects customers who operate a HA. The update stops at version 9.712-12 for the master and the slave does not want to update any further. how do I recognise the error The dashboard reports a pending [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/">Sophos UTM 9.712-13 HA update problem</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>Lately I have more and more customers who have an update problem to version 9.712-13. This only affects customers who operate a HA.<br />
The update stops at version 9.712-12 for the master and the slave does not want to update any further.</p>
<h3>how do I recognise the error</h3>
<p>The dashboard reports a pending update</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1.jpg"><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-2963" src="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-1024x423.jpg" alt="" width="800" height="330" srcset="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-1024x423.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-300x124.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-768x318.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1.jpg 1156w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>The master hangs during the update 9.712-12 and the slave has the status UP2DATE all the time.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA.jpg"><img decoding="async" class="alignnone size-large wp-image-2956" src="https://networkguy.de/wp-content/uploads/2022/11/HA-1024x365.jpg" alt="" width="800" height="285" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-1024x365.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-300x107.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-768x273.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA.jpg 1129w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>And the HA log says that the slave cannot download the update 9.712-12.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-Log.jpg"><img decoding="async" class="alignnone size-large wp-image-2957" src="https://networkguy.de/wp-content/uploads/2022/11/HA-Log-1024x196.jpg" alt="" width="800" height="153" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-Log-1024x196.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log-300x57.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log-768x147.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log.jpg 1431w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<h3>How does the error occur?</h3>
<p>Sophos had released the 9.712-13 update a few weeks ago and had withdrawn the 9.712-12 update. Now we have the problem with the master that it had already downloaded the 9.712-12 update. And 9.712-12 was then also installed during the update process to 9.712-13. For the Slave, however, the updates are not downloaded in advance. And because the 9.712-12 update was withdrawn, the slave can no longer install the update.</p>
<h3>How to fix it?</h3>
<p>You have 2 options.</p>
<p>You have to shut down the slave node and update the master to version 9.712-13. The slave is then booted up again and can then download the appropriate update from the Sophos file server. The problem here is that someone has to be present to start up the slave node again.</p>
<p>Or you can install the Udpate 9.712-13 on the master via CLI. During the update there is a downtime of about 5 minutes because the slave node does not take over the services from the master due to the UPDATE status.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2958" src="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg" alt="" width="569" height="248" srcset="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg 569w, https://networkguy.de/wp-content/uploads/2022/11/CLI-300x131.jpg 300w" sizes="(max-width: 569px) 100vw, 569px" /></a></p>
<p>This command installs any updates that Sophos has already downloaded. The HA status is ignored.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">auisys.plx --verbose --level d</pre>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2959" src="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg" alt="" width="533" height="385" srcset="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg 533w, https://networkguy.de/wp-content/uploads/2022/11/CLI-2-300x217.jpg 300w" sizes="(max-width: 533px) 100vw, 533px" /></a></p>
<h3>The result</h3>
<p>After the reboot, the master installed the update 9.712-13. The slave is still set to UP2DATE. To speed up the update of the slave, it can be restarted. Otherwise it may take a few hours until the slave installs the update by itself. If the slave is rebooted manually, however, the database may be damaged. In this case, you simply have to restore it via CLI.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-2.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2960" src="https://networkguy.de/wp-content/uploads/2022/11/HA-2-1024x355.jpg" alt="" width="800" height="277" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-2-1024x355.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-2-300x104.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-2-768x267.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA-2.jpg 1112w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>After rebooting the slave</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2962" src="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg" alt="" width="806" height="256" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg 989w, https://networkguy.de/wp-content/uploads/2022/11/HA-3-1-300x95.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-3-1-768x244.jpg 768w" sizes="(max-width: 806px) 100vw, 806px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/">Sophos UTM 9.712-13 HA update problem</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2954</post-id>	</item>
		<item>
		<title>Sophos UTM 9.712-12 update released</title>
		<link>https://networkguy.de/sophos-utm-9-712-12-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-712-12-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 18:40:26 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2753</guid>

					<description><![CDATA[<p>News Maintenance Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-13215 [AWS] AWS Pay-As-You-Go license expires on C5/M5 instances NUTM-12872 [Basesystem] LibXML vulnerability &#8211; CVE-2021-3541 NUTM-13227 [Basesystem] uriparser vulnerabilities NUTM-13376 [Basesystem] DHCP Relay not working after upgrade to 9.704 NUTM-13496 [Basesystem] Openssl vulnerability &#8211; CVE-2022-1292 NUTM-13504 [WAF] Enforce usage of valid [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-12-update-released/">Sophos UTM 9.712-12 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<ul>
<li>Maintenance Release</li>
</ul>
<h2 id="mcetoc_1fq6mbdej3">Remarks</h2>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h2 id="mcetoc_1fq6mc35c4">Issues Resolved</h2>
<ul>
<li id="mcetoc_1fq6m92fn2">NUTM-13215 [AWS] AWS Pay-As-You-Go license expires on C5/M5 instances</li>
<li>NUTM-12872 [Basesystem] LibXML vulnerability &#8211; CVE-2021-3541</li>
<li>NUTM-13227 [Basesystem] uriparser vulnerabilities</li>
<li>NUTM-13376 [Basesystem] DHCP Relay not working after upgrade to 9.704</li>
<li>NUTM-13496 [Basesystem] Openssl vulnerability &#8211; CVE-2022-1292</li>
<li>NUTM-13504 [WAF] Enforce usage of valid Let&#8217;s Encrypt root CA</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.711005-712012.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.711005-712012.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-12-update-released/">Sophos UTM 9.712-12 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-712-12-update-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2753</post-id>	</item>
		<item>
		<title>Aruba OS Switch automatic vlan assignment for aruba APs</title>
		<link>https://networkguy.de/aruba-os-switch-automatic-vlan-assignment-for-aruba-aps/</link>
					<comments>https://networkguy.de/aruba-os-switch-automatic-vlan-assignment-for-aruba-aps/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Thu, 05 May 2022 12:13:14 +0000</pubDate>
				<category><![CDATA[Aruba]]></category>
		<category><![CDATA[HPE Networking]]></category>
		<category><![CDATA[WLAN]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2746</guid>

					<description><![CDATA[<p>Hello Guys, &#160; today I will talk about how you can automatic assignment tagged and untagged vlans for a aruba-ap. create a device profile In the device profile, you can configure the VLAN settings, Poe, jumbo frames, etc. As example vlan 1502 untagged and vlan 224 tagged. conf t device-profile name "ArubaAPs" untagged-vlan 1502 tagged-vlan [&#8230;]</p>
<p>The post <a href="https://networkguy.de/aruba-os-switch-automatic-vlan-assignment-for-aruba-aps/">Aruba OS Switch automatic vlan assignment for aruba APs</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>&nbsp;</p>
<p>today I will talk about how you can automatic assignment tagged and untagged vlans for a aruba-ap.</p>
<h4><strong>create a device profile</strong></h4>
<p>In the device profile, you can configure the VLAN settings, Poe, jumbo frames, etc.<br />
As example vlan 1502 untagged and vlan 224 tagged.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">conf t
device-profile name "ArubaAPs"
   untagged-vlan 1502
   tagged-vlan 224
   allow-jumbo-frames
   exit
</pre>
<h4><strong>Assignment of the aruba APs to the created device profile</strong></h4>
<p>Now you must associate the aruba-aps to our new device profile &#8220;ArubaAPs&#8221;.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">device-profile type "aruba-ap"
   associate "ArubaAPs"
   enable
   exit
write mem</pre>
<h4><strong>test it</strong></h4>
<p>With &#8220;show device-profile status&#8221; you can see if it is running.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/05/show-device-profile-status.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2747" src="https://networkguy.de/wp-content/uploads/2022/05/show-device-profile-status.jpg" alt="" width="604" height="180" srcset="https://networkguy.de/wp-content/uploads/2022/05/show-device-profile-status.jpg 604w, https://networkguy.de/wp-content/uploads/2022/05/show-device-profile-status-300x89.jpg 300w" sizes="(max-width: 604px) 100vw, 604px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/aruba-os-switch-automatic-vlan-assignment-for-aruba-aps/">Aruba OS Switch automatic vlan assignment for aruba APs</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/aruba-os-switch-automatic-vlan-assignment-for-aruba-aps/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2746</post-id>	</item>
		<item>
		<title>Sophos UTM 9.711-5 update released</title>
		<link>https://networkguy.de/sophos-utm-9-711-5-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-711-5-update-released/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 22 Apr 2022 14:55:36 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2743</guid>

					<description><![CDATA[<p>Sophos have just released SG UTM version 9.711. This release follows very quickly after 9.710 as it contains some important vulnerability fixes. Sophos recommend that even if you only recently upgraded to 9.710, you should apply this fix as soon as possible. As usual, the release will be rolled out in phases: In phase 1 [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-711-5-update-released/">Sophos UTM 9.711-5 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Sophos have just released SG UTM version 9.711. This release follows very quickly after 9.710 as it contains some important vulnerability fixes. Sophos recommend that even if you only recently upgraded to 9.710, you should apply this fix as soon as possible.</p>
<p>As usual, the release will be rolled out in phases:</p>
<ul>
<li>In phase 1 you can download the update package from our <a href="https://download.astaro.com/#UTM/">download server</a>. Click the link and navigate to the folder <strong>UTM / v9 / up2date</strong>.
<ul>
<li>Up2date package &#8211; 9.710 to 9.711 : <a href="https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.710001-711005.tgz.gpg">https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.710001-711005.tgz.gpg</a></li>
<li>md5sum is 8eede813596e78a58a52f492adcd52c4 : <a href="https://download.astaro.com/UTM/v9/up2date/%20u2d-sys-9.710001-711005.tgz.gpg.md5">https://download.astaro.com/UTM/v9/up2date/ u2d-sys-9.710001-711005.tgz.gpg.md5</a></li>
</ul>
</li>
<li>During phase 2 we will make it available via our Up2Date servers in several stages.</li>
<li>In phase 3 we will make it available via our Up2Date servers to all remaining installations.</li>
</ul>
<p>This version addresses the recent highly-publicised vulnerability in OpenSSL, <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a>. It also addresses a vulnerability recently discovered in Apache, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a>. Apache is used in WAF and for the WebAdmin and user interfaces.</p>
<p>The new Wireless Access Point firmware included with this release is essential for anyone adding new APX access points. Due to supply chain issues we have made some hardware changes in the most recent revisions of our APX models that require this latest firmware version 11.0.109. This version also addresses the recent certificate-parsing vulnerability discovered in OpenSSL so it is worth applying even if you don&#8217;t have any new access points.</p>
<p>Finally, you may notice a small change in the format of the firmware version when you&#8217;re using WebAdmin &#8211; we&#8217;ve added an identifier to make it clear whether you&#8217;re using the 32-bit or 64-bit version of the UTM operating system.</p>
<p><img decoding="async" src="https://community.sophos.com/resized-image/__size/1280x960/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-07/Screen-Shot-2022_2D00_04_2D00_20-at-12.35.08-PM.png" alt="Release 9.711-5 64-bit (c) 2000-2022 Sophos Limited. All rights reserved." /></p>
<h3 id="mcetoc_1g18qv0bi0">Other news</h3>
<ul>
<li>Maintenance Release</li>
</ul>
<h3 id="mcetoc_1g18qv0bj1">Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3 id="mcetoc_1g18qv0bj2">Issues Resolved</h3>
<ul>
<li>NUTM-13334 [Basesystem] PowerShell / Putty &#8211; Default SSH client options result in failed connection</li>
<li>NUTM-13394 [Basesystem] Openssl Vulnerability &#8211; <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a></li>
<li>NUTM-13421 [Basesystem] Upgrade Apache to 2.4.53 (UI) &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a></li>
<li>NUTM-13326 [UI Framework] Identify 32-bit or 64-bit build in WebAdmin footer</li>
<li>NUTM-13419 [WAF] Upgrade Apache to 2.4.53 (WAF) &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a></li>
<li>NUTM-13363 [Wireless] Integrate updated APX firmware version 11.0.019</li>
<li>NUTM-13433 [Wireless] AP/APX : Openssl Vulnerability &#8211; <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a></li>
</ul>
<p>The post <a href="https://networkguy.de/sophos-utm-9-711-5-update-released/">Sophos UTM 9.711-5 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-711-5-update-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2743</post-id>	</item>
		<item>
		<title>Sophos UTM 9.710-1 update released</title>
		<link>https://networkguy.de/sophos-utm-9-710-1-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-710-1-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 20 Mar 2022 19:23:49 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2735</guid>

					<description><![CDATA[<p>News This update removes the end-of-life SSLVPN client. It is no longer available to download from the User Portal. For more information see this end-of-life notice and this vulnerability disclosure. With the standalone IPSec client also reaching end-of-sale on 30 March 2022, we have refreshed the remote access page of the User Portal to better support Sophos Connect. Sophos Connect is the [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-710-1-update-released/">Sophos UTM 9.710-1 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<p>This update removes the end-of-life SSLVPN client. It is no longer available to download from the User Portal. For more information see this <a href="https://support.sophos.com/support/s/article/KB-000043484?language=en_US" target="_blank" rel="noopener noreferrer">end-of-life notice</a> and this <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220303-sslvpn-local-dos" target="_blank" rel="noopener noreferrer">vulnerability disclosure</a>.</p>
<p>With the standalone IPSec client also reaching <a href="https://partnernews.sophos.com/en-us/2022/01/products/end-of-sale-and-end-of-life-ipsec-vpn-client/" target="_blank" rel="noopener noreferrer">end-of-sale on 30 March 2022</a>, we have refreshed the remote access page of the User Portal to better support Sophos Connect. Sophos Connect is the recommended alternative to the old SSLVPN and IPSec clients. Download links on the User Portal now direct users to the Sophos Connect section on <a href="https://sophos.com/utm-downloads#SophosConnect" target="_blank" rel="noopener noreferrer">our downloads page</a>. Configuration links have been updated to provide certificate packages and settings that can be imported by Sophos Connect to get users up and running quickly.</p>
<p><img decoding="async" src="https://community.sophos.com/resized-image/__size/1600x960/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-07/UTM_2D00_UserPortal_2D00_9.710.png" alt="Screenshot of updated user portal" /></p>
<p>&nbsp;</p>
<p>Sophos Connect client should be able to work with any IPSec or SSLVPN configuration you already have set up. Here are some additional links to help understand how it works.</p>
<ul>
<li><a href="https://support.sophos.com/support/s/article/KB-000043396?language=en_US">Sophos UTM: Install and configure Sophos Connect for remote access SSL VPN</a></li>
<li><a href="https://support.sophos.com/support/s/article/KB-000038819?language=en_US">Sophos UTM: Install and configure Sophos Connect for remote access IPsec</a></li>
</ul>
<h3 id="mcetoc_1ftqc23210">Other news</h3>
<ul>
<li>Maintenance release</li>
<li>Security release</li>
</ul>
<h3 id="mcetoc_1ftqc23211">Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3 id="mcetoc_1ftqc23212">Issues Resolved</h3>
<ul>
<li>NUTM-12592 [Basesystem] Use Only Secure Ciphers for UTM SSH Server</li>
<li>NUTM-12784 [Basesystem] Patch BIND vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25219</a>)</li>
<li>NUTM-13101 [Basesystem] Patch Strongswan Vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-41991</a>)</li>
<li>NUTM-13119 [Basesystem] Patch Binutils Vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-3487</a>)</li>
<li>NUTM-13144 [Basesystem] Remove SSLVPN client downloader from UTM</li>
<li>NUTM-13192 [Basesystem] Use Secure Key Exchange Algorithms for SSH</li>
<li>NUTM-13203 [Basesystem] snmpd high memory for snmpwalk v3</li>
<li>NUTM-12615 [Configuration Management] Root password hash exposed via confd*.log (CVE-2022-0652)</li>
<li>NUTM-13013 [Email] Upgrade Exim to v4.95</li>
<li>NUTM-13200 [Email] OAEP RSA padding mode still uses SHA-1 in S/MIME</li>
<li>NUTM-13267 [Email] SQLi in the Mail Manager (CVE-2022-0386)</li>
<li>NUTM-13071 [Logging] IPFIX reporting transferred data on wrong direction</li>
<li>NUTM-12885 [Network] IPS exceptions issue</li>
<li>NUTM-12987 [RED] Issue with RED tunnel on BO after disconnecting PPPoE</li>
<li>NUTM-12936 [Web] Add configuration for overriding warn page to proceed link protocol (Standard Mode SSO)</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.709003-710001.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.709003-710001.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-710-1-update-released/">Sophos UTM 9.710-1 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-710-1-update-released/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2735</post-id>	</item>
		<item>
		<title>Aruba Clearpass problem with certificate chain</title>
		<link>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/</link>
					<comments>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sat, 05 Mar 2022 08:25:56 +0000</pubDate>
				<category><![CDATA[Aruba]]></category>
		<category><![CDATA[HPE Networking]]></category>
		<category><![CDATA[Clearpass]]></category>
		<category><![CDATA[HPE]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2707</guid>

					<description><![CDATA[<p>Hello Guys, Today I am going to talk about a problem with my company&#8217;s wildcard certificate. Because I wanted to display the Clearpass captive portal without certificate errors. I tried to import our company wildcard certificate. And in doing so, I encountered the following problem: Here we have the problem that the certificate chain for [&#8230;]</p>
<p>The post <a href="https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/">Aruba Clearpass problem with certificate chain</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>Today I am going to talk about a problem with my company&#8217;s wildcard certificate.</p>
<p>Because I wanted to display the Clearpass captive portal without certificate errors. I tried to import our company wildcard certificate. And in doing so, I encountered the following problem:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2730" src="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg" alt="" width="1011" height="549" srcset="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg 1011w, https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError-300x163.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError-768x417.jpg 768w" sizes="(max-width: 1011px) 100vw, 1011px" /></a></p>
<p>Here we have the problem that the certificate chain for the Clearpass is in the wrong order. Many systems like the Aruba Mobility Controller or Sophos SG don&#8217;t seem to care if the chain goes from root to server certificate or from server certificate to root CA. But not the Clearpass :D</p>
<h4><strong>The solution</strong></h4>
<p>The only thing that helps here is to rebuild the certificate chain. First, we need the root CA and all sub CAs. The easiest way to get this is from a system where the wildcard certificate is already integrated. For example, the Sophos SG Firewall.</p>
<h5><strong>extract the root and sub CAs</strong></h5>
<p>To do this, simply go to the Sophos SG webadmin or user portal  with the Google Chrome browser and display the certificate.</p>
<p>Als erstens Exportierst du das Root CA.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2710" src="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg" alt="" width="458" height="576" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg 458w, https://networkguy.de/wp-content/uploads/2022/03/Cert1-239x300.jpg 239w" sizes="(max-width: 458px) 100vw, 458px" /></a></p>
<p>Click on the Root CA. Than details and Copy to files</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2711" src="https://networkguy.de/wp-content/uploads/2022/03/CA1-1024x465.jpg" alt="" width="1024" height="465" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1-1024x465.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/03/CA1-300x136.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA1-768x348.jpg 768w, https://networkguy.de/wp-content/uploads/2022/03/CA1.jpg 1144w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Save the certifiact as base 64</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2712" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg" alt="" width="573" height="574" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg 573w, https://networkguy.de/wp-content/uploads/2022/03/CA1.2-300x300.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA1.2-150x150.jpg 150w" sizes="(max-width: 573px) 100vw, 573px" /></a></p>
<p>save it under the name CA1.cer</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2713" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg" alt="" width="574" height="664" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg 574w, https://networkguy.de/wp-content/uploads/2022/03/CA1.3-259x300.jpg 259w" sizes="(max-width: 574px) 100vw, 574px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2714" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg" alt="" width="569" height="595" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg 569w, https://networkguy.de/wp-content/uploads/2022/03/CA1.4-287x300.jpg 287w" sizes="(max-width: 569px) 100vw, 569px" /></a></p>
<p>Repeat the steps for the two sub CAs.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2715" src="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg" alt="" width="924" height="595" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg 924w, https://networkguy.de/wp-content/uploads/2022/03/CA2and3-300x193.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA2and3-768x495.jpg 768w" sizes="(max-width: 924px) 100vw, 924px" /></a></p>
<h5><strong>build the certificate chain</strong></h5>
<p>Now you have to detach the single certificate and the private key from the wildcard package without a certificate chain. The easiest way to do this is with openssl in a Linux machine. I have a Windows subsystem for Linux on my computer. Copy the wildcard certificate and the 3 certificates CA1 to CA3 into the home directory of the Linux machine.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2717" src="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg" alt="" width="953" height="314" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg 953w, https://networkguy.de/wp-content/uploads/2022/03/Linux1-300x99.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux1-768x253.jpg 768w" sizes="(max-width: 953px) 100vw, 953px" /></a></p>
<p>For Ubuntu:<br />
Detach the public and private keys from the certificate.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo -s
openssl pkcs12 -in networkguy.pfx -clcerts -nokeys -out networkguyStar.cer
openssl pkcs12 -in networkguy.pfx -nocerts -nodes  -out networkguyStar.key
</pre>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2718" src="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg" alt="" width="995" height="179" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg 995w, https://networkguy.de/wp-content/uploads/2022/03/Linux2-300x54.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux2-768x138.jpg 768w" sizes="(max-width: 995px) 100vw, 995px" /></a></p>
<p>With <strong>ll</strong> you can now see that you now have the public key &#8220;networkguyStar.cer&#8221; and the private key &#8220;networkguyStar.key&#8221;.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2719" src="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg" alt="" width="995" height="279" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg 995w, https://networkguy.de/wp-content/uploads/2022/03/Linux3-300x84.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux3-768x215.jpg 768w" sizes="(max-width: 995px) 100vw, 995px" /></a></p>
<p>Now we need to build a new wildcard certificate where the certificate chain has the order required by the Clearpass. The Clearpass wants the wildcard certificate first, then the sub CAs and finally the root CA.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2727" src="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg" alt="" width="1025" height="508" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg 1025w, https://networkguy.de/wp-content/uploads/2022/03/Cain1-1-300x149.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Cain1-1-768x381.jpg 768w" sizes="(max-width: 1025px) 100vw, 1025px" /></a></p>
<p>The following command is required for this:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">cat networkguyStar.cer CA3.cer CA2.cer CA1.cer &gt; networkguyStarfullchain.cer</pre>
<p>Now we have created a chain of certificates suitable for the Clearpass. :D</p>
<h4><strong>The Clearpass does not trust the Root or Sub CA</strong></h4>
<p>If the wildcard certificate contains a root or sub CA that Clearpass does not know, this must be imported. For this we can simply use the CA1.cer to CA3.cer.<br />
To do this, go to Administration / Certificates / Trust List in the Policy Manager and then click on Add. Select Usage under -Select to Add&#8211; Other. Do this with CA1.cer, CA2.cer and CA3.cer.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2722" src="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg" alt="" width="922" height="274" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg 922w, https://networkguy.de/wp-content/uploads/2022/03/Cain2-300x89.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Cain2-768x228.jpg 768w" sizes="(max-width: 922px) 100vw, 922px" /></a></p>
<p>Then have fun with your Clearpass. (A cool product) :D</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/">Aruba Clearpass problem with certificate chain</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2707</post-id>	</item>
		<item>
		<title>Sophos UTM 9.709-3 update released</title>
		<link>https://networkguy.de/sophos-utm-9-709-3-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-709-3-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 28 Jan 2022 11:11:44 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2703</guid>

					<description><![CDATA[<p>News Maintenance Release Security Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-12868 [Email] It is not possible to permanently block an IP from the SMTP-Proxy if authentication is enabled NUTM-13008 [Email] Public DNS causing blocked connection with RBL NUTM-13193 [Email] SPX portal 404 NO SUCH USER after upgrading to 9.708 [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-709-3-update-released/">Sophos UTM 9.709-3 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<ul>
<li>Maintenance Release</li>
<li>Security Release</li>
</ul>
<h2 id="mcetoc_1fq6mbdej3">Remarks</h2>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h2 id="mcetoc_1fq6mc35c4">Issues Resolved</h2>
<ul>
<li id="mcetoc_1fq6m92fn2">NUTM-12868 [Email] It is not possible to permanently block an IP from the SMTP-Proxy if authentication is enabled</li>
<li>NUTM-13008 [Email] Public DNS causing blocked connection with RBL</li>
<li>NUTM-13193 [Email] SPX portal 404 NO SUCH USER after upgrading to 9.708</li>
<li>NUTM-12791 [Wireless] Address the Frag Attack vulnerabilities for Local Wifi and connected AP devices (see <a href="https://community.sophos.com/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification">this article</a> for more details)</li>
<li>NUTM-13263 [Wireless] Integrate updated AP firmware (v. 11.0.017) to address FragAttack issues</li>
<li>NUTM-12971 [WAF] Update Apache Runtime Library (APR) to address CVE-2021-35940</li>
<li>NUTM-12861 [WAF] Upgrade Apache to address CVE-2020-13950, CVE-2021-26690, CVE-2021-26691, CVE-2021-34798, CVE-2021-39275, CVE-2021-40438</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.708006-709003.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.708006-709003.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-709-3-update-released/">Sophos UTM 9.709-3 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-709-3-update-released/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2703</post-id>	</item>
		<item>
		<title>HPE Comware how to separate the management vlan from the routing table</title>
		<link>https://networkguy.de/hpe-comware-how-to-separate-the-management-vlan-from-the-routing-table/</link>
					<comments>https://networkguy.de/hpe-comware-how-to-separate-the-management-vlan-from-the-routing-table/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 14 Jan 2022 17:29:18 +0000</pubDate>
				<category><![CDATA[HPE Networking]]></category>
		<category><![CDATA[Comware]]></category>
		<category><![CDATA[HPE]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2693</guid>

					<description><![CDATA[<p>Hello Guys, today I will talk about how you can separate the management vlan from the routing table. Ok that sounds interesting but why do you want that? In this scenario, I use an HPE Comware 5900 as a central core switch that routes between the individual VLANs. This means that the switch needs an [&#8230;]</p>
<p>The post <a href="https://networkguy.de/hpe-comware-how-to-separate-the-management-vlan-from-the-routing-table/">HPE Comware how to separate the management vlan from the routing table</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>today I will talk about how you can separate the management vlan from the routing table.<br />
Ok that sounds interesting but why do you want that?<br />
In this scenario, I use an HPE Comware 5900 as a central core switch that routes between the individual VLANs. This means that the switch needs an IP address for each VLAN and can be addressed via this address.<br />
And in addition, the requirement was that the management traffic be routed through a firewall to scan the data stream and block it if necessary.</p>
<p>&nbsp;</p>
<p><strong>Logical structure</strong></p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/01/network.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2695" src="https://networkguy.de/wp-content/uploads/2022/01/network-1024x398.jpg" alt="" width="1024" height="398" srcset="https://networkguy.de/wp-content/uploads/2022/01/network-1024x398.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/01/network-300x117.jpg 300w, https://networkguy.de/wp-content/uploads/2022/01/network-768x299.jpg 768w, https://networkguy.de/wp-content/uploads/2022/01/network.jpg 1049w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Now comes the exciting part: Because the switch routes in the network, the management VLAN is accessible from all other networks and routes past the firewall directly into the management VLAN.<br />
This also applies to the Out of Band Management Interface.</p>
<p><strong>seperate the management vlan</strong></p>
<p>To separate the management vlan or the OOBM interface from the routing table, we have to put it into a separate VPN instance.<br />
this can be done with the following commands:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">system view
ip vpn-instance Management
interface Vlan-interface666
 description Management-VLAN
 ip binding vpn-instance Management
 ip address 10.69.69.2 255.255.255.0
quit
ip route-static vpn-instance Management 0.0.0.0 0 10.69.69.1
s s f</pre>
<p>If we now run a <strong>dis ip routing-table</strong>, we see that the management vlan is no longer included. And because we have a default route to the firewall, the management traffic is routed through the firewall.<br />
For control you can you enter <strong>dis ip routing-table vpn-instance Management </strong>to see the additional routing table also with its own default route for the vpn instance.</p>
<p><strong>Securing the remaining VLAN interfaces</strong></p>
<p>OK, the management vlan is now protected by the firewall, but the switch can be reached via all other IP addresses four SSH, HTTPS or similar. Therefore, we now have to create a very very long advanced ACL that contains every IP of the switch. Except for the IP of the management vlan, otherwise no one can access it remotely :D Here it is important to specify only the individual IP of the switch. If you simply block ssh and co for 192.168.0.0/16, all other systems that fall under this IP range will also be affected.</p>
<p>ACL example for 2 VLANs</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">acl advanced name NoManagementAccess 
 rule 0 deny tcp destination 10.16.55.1 0 destination-port eq 22
 rule 1 deny udp destination 10.16.55.1 0 destination-port eq 22
 rule 2 deny tcp destination 10.16.55.1 0 destination-port eq 80
 rule 3 deny tcp destination 10.16.55.1 0 destination-port eq 443
 rule 10 deny tcp destination 10.18.69.1 0 destination-port eq 22
 rule 11 deny udp destination 10.18.69.1 0 destination-port eq 22
 rule 12 deny tcp destination 10.18.69.1 0 destination-port eq 80
 rule 13 deny tcp destination 10.18.69.1 0 destination-port eq 443
quit
ssf</pre>
<p>Now the ACL must be bound to each VLAN interface for incoming traffic.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">interface Vlan-interface100
 ip address 10.16.55.1 255.255.255.0
 packet-filter name NoManagementAccess inbound
 dhcp select relay
 dhcp relay server-address 192.168.0.66
 dhcp relay server-address 192.168.0.67
interface Vlan-interface101
 ip address 10.18.69.1 255.255.255.0
 packet-filter name NoManagementAccess inbound
 dhcp select relay
 dhcp relay server-address 192.168.0.66
 dhcp relay server-address 192.168.0.67
quit
ssf</pre>
<p>The what, now the management interfaces of the core switch are only accessible via the firewall exclusively under the management vlan ip.</p>
<p>You don&#8217;t have to change anything for the edge switches, because they only have one IP from the management VLAN and then route via the firewall anyway.</p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/hpe-comware-how-to-separate-the-management-vlan-from-the-routing-table/">HPE Comware how to separate the management vlan from the routing table</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/hpe-comware-how-to-separate-the-management-vlan-from-the-routing-table/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2693</post-id>	</item>
		<item>
		<title>Merry Christmas and a happy new year!</title>
		<link>https://networkguy.de/merry-christmas-and-a-happy-new-year-5/</link>
					<comments>https://networkguy.de/merry-christmas-and-a-happy-new-year-5/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 24 Dec 2021 14:35:47 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2678</guid>

					<description><![CDATA[<p>Hello guys, today is Christmas Eve! Unfortunately, there is only one small Christmas tree this year :) &#160; I wish all of you nice Christmas days, a successful start to the new year 2022 and stay healthy!</p>
<p>The post <a href="https://networkguy.de/merry-christmas-and-a-happy-new-year-5/">Merry Christmas and a happy new year!</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys,</p>
<p>today is Christmas Eve!</p>
<p>Unfortunately, there is only one small Christmas tree this year :)</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/12/Tree.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2679" src="https://networkguy.de/wp-content/uploads/2021/12/Tree-778x1024.jpg" alt="" width="778" height="1024" srcset="https://networkguy.de/wp-content/uploads/2021/12/Tree-778x1024.jpg 778w, https://networkguy.de/wp-content/uploads/2021/12/Tree-228x300.jpg 228w, https://networkguy.de/wp-content/uploads/2021/12/Tree-768x1011.jpg 768w, https://networkguy.de/wp-content/uploads/2021/12/Tree.jpg 1140w" sizes="(max-width: 778px) 100vw, 778px" /></a></p>
<p>&nbsp;</p>
<p><strong>I wish all of you nice Christmas days, a successful start to the new year 2022<br />
</strong><strong>and stay healthy!</strong></p>
<p>The post <a href="https://networkguy.de/merry-christmas-and-a-happy-new-year-5/">Merry Christmas and a happy new year!</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/merry-christmas-and-a-happy-new-year-5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2678</post-id>	</item>
		<item>
		<title>Sophos UTM 9.708-6 update released</title>
		<link>https://networkguy.de/sophos-utm-9-708-6-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-708-6-update-released/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 18:45:25 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2674</guid>

					<description><![CDATA[<p>News Maintenance Release Security Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-12646 [Access &#38; Identity] User E-Mail addresses won&#8217;t be synced properly NUTM-12873 [Access &#38; Identity] GUI issue with selecting Inbound/Outbound ipsec debug option NUTM-12904 [Access &#38; Identity] DUO authentication fails back to AD with success NUTM-12434 [Basesystem] Yukon, Canada [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-708-6-update-released/">Sophos UTM 9.708-6 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 id="mcetoc_1flee8gvj0">News</h3>
<ul>
<li>Maintenance Release</li>
<li>Security Release</li>
</ul>
<h3 id="mcetoc_1flee8gvj1">Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3 id="mcetoc_1flee8gvj2">Issues Resolved</h3>
<ul>
<li>NUTM-12646 [Access &amp; Identity] User E-Mail addresses won&#8217;t be synced properly</li>
<li>NUTM-12873 [Access &amp; Identity] GUI issue with selecting Inbound/Outbound ipsec debug option</li>
<li>NUTM-12904 [Access &amp; Identity] DUO authentication fails back to AD with success</li>
<li>NUTM-12434 [Basesystem] Yukon, Canada region timezone set to stop using DST</li>
<li>NUTM-12507 [Basesystem] Getting error message for command &#8216;last&#8217;</li>
<li>NUTM-12717 [Basesystem] Resolve OpenSSL issues &#8211; Remove DH cipher support &#8211; (CVE-2020-1968) &amp; (CVE-2021-3712)</li>
<li>NUTM-12748 [Basesystem] Address underscore.js vulnerability (CVE-2021-23358)</li>
<li>NUTM-12739 [Email] E-Mails stuck in SMTP spool due to Sandstorm Scan</li>
<li>NUTM-12798 [Email] SPX doesn&#8217;t work with &#8220;&amp;&#8221; in the email local part</li>
<li>NUTM-12875 [Email] PCI compliance scan failure due to exim ciphers</li>
<li>NUTM-12932 [Email] Exim coredumps</li>
<li>NUTM-12934 [Kernel] Fully implement RFC5961 compliance for SYN packets (CVE-2004-0230)</li>
<li>NUTM-12385 [Logging] Automatic log deletion by age of log file not working correctly.</li>
<li>NUTM-11404 [Network] Sierra Wireless MC7430 Qualcomm® SnapdragonX7 LTE-A 4G dongle goes down after few hours</li>
<li>NUTM-12126 [Network] If &#8220;Skip rule on interface error&#8221; is not used multipath rule doesn&#8217;t work as expected</li>
<li>NUTM-12184 [Network] WAN interface switched to DHCP</li>
<li>NUTM-12519 [UI Framework] Post-auth SQLi in User Portal (CVE-2021-36807)</li>
<li>NUTM-12524 [UI Framework] Add Cache-Control header for Web Admin and User Portal</li>
<li>NUTM-13002 [UI Framework] AutoComplete Attribute Not Disabled for Password in Form-Based Authentication</li>
<li>NUTM-12680 [WAF] Unable to renew Let&#8217;s Encrypt Certificate</li>
<li>NUTM-12285 [Web] Avira scan fails for certain files during upload through Webproxy</li>
<li>NUTM-11712 [Wireless] Built-in Wireless with two bridge to AP LAN errors and instability</li>
<li>NUTM-12199 [Wireless] Issue with the certificate chain for Let&#8217;s Encrypt when used for hotspot</li>
<li>NUTM-12372 [Wireless] LocalWiFi : Intermittently unable to connect to the Wireless SSID</li>
<li>NUTM-12859 [Wireless] IPTtables rules are not created for AP being part of &#8216;Access Point Group&#8217;</li>
</ul>
<p>&nbsp;</p>
<h3>Download</h3>
<p><a href="https://ftp.astaro.com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.707005-708006.tgz.gpg">https://ftp.astaro.com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.707005-708006.tgz.gpg</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-708-6-update-released/">Sophos UTM 9.708-6 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-708-6-update-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2674</post-id>	</item>
	</channel>
</rss>
