<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sophos Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/tag/sophos/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Mon, 14 Nov 2022 07:05:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Sophos Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Sophos UTM 9.712-13 HA update problem</title>
		<link>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/</link>
					<comments>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Mon, 14 Nov 2022 07:05:47 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2954</guid>

					<description><![CDATA[<p>Hello Guys, Lately I have more and more customers who have an update problem to version 9.712-13. This only affects customers who operate a HA. The update stops at version 9.712-12 for the master and the slave does not want to update any further. how do I recognise the error The dashboard reports a pending [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/">Sophos UTM 9.712-13 HA update problem</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>Lately I have more and more customers who have an update problem to version 9.712-13. This only affects customers who operate a HA.<br />
The update stops at version 9.712-12 for the master and the slave does not want to update any further.</p>
<h3>how do I recognise the error</h3>
<p>The dashboard reports a pending update</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1.jpg"><img fetchpriority="high" decoding="async" class="alignnone size-large wp-image-2963" src="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-1024x423.jpg" alt="" width="800" height="330" srcset="https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-1024x423.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-300x124.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1-768x318.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/UTM-Dashboard-1.jpg 1156w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>The master hangs during the update 9.712-12 and the slave has the status UP2DATE all the time.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA.jpg"><img decoding="async" class="alignnone size-large wp-image-2956" src="https://networkguy.de/wp-content/uploads/2022/11/HA-1024x365.jpg" alt="" width="800" height="285" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-1024x365.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-300x107.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-768x273.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA.jpg 1129w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>And the HA log says that the slave cannot download the update 9.712-12.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-Log.jpg"><img decoding="async" class="alignnone size-large wp-image-2957" src="https://networkguy.de/wp-content/uploads/2022/11/HA-Log-1024x196.jpg" alt="" width="800" height="153" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-Log-1024x196.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log-300x57.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log-768x147.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA-Log.jpg 1431w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<h3>How does the error occur?</h3>
<p>Sophos had released the 9.712-13 update a few weeks ago and had withdrawn the 9.712-12 update. Now we have the problem with the master that it had already downloaded the 9.712-12 update. And 9.712-12 was then also installed during the update process to 9.712-13. For the Slave, however, the updates are not downloaded in advance. And because the 9.712-12 update was withdrawn, the slave can no longer install the update.</p>
<h3>How to fix it?</h3>
<p>You have 2 options.</p>
<p>You have to shut down the slave node and update the master to version 9.712-13. The slave is then booted up again and can then download the appropriate update from the Sophos file server. The problem here is that someone has to be present to start up the slave node again.</p>
<p>Or you can install the Udpate 9.712-13 on the master via CLI. During the update there is a downtime of about 5 minutes because the slave node does not take over the services from the master due to the UPDATE status.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2958" src="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg" alt="" width="569" height="248" srcset="https://networkguy.de/wp-content/uploads/2022/11/CLI.jpg 569w, https://networkguy.de/wp-content/uploads/2022/11/CLI-300x131.jpg 300w" sizes="(max-width: 569px) 100vw, 569px" /></a></p>
<p>This command installs any updates that Sophos has already downloaded. The HA status is ignored.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">auisys.plx --verbose --level d</pre>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2959" src="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg" alt="" width="533" height="385" srcset="https://networkguy.de/wp-content/uploads/2022/11/CLI-2.jpg 533w, https://networkguy.de/wp-content/uploads/2022/11/CLI-2-300x217.jpg 300w" sizes="(max-width: 533px) 100vw, 533px" /></a></p>
<h3>The result</h3>
<p>After the reboot, the master installed the update 9.712-13. The slave is still set to UP2DATE. To speed up the update of the slave, it can be restarted. Otherwise it may take a few hours until the slave installs the update by itself. If the slave is rebooted manually, however, the database may be damaged. In this case, you simply have to restore it via CLI.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-2.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2960" src="https://networkguy.de/wp-content/uploads/2022/11/HA-2-1024x355.jpg" alt="" width="800" height="277" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-2-1024x355.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/11/HA-2-300x104.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-2-768x267.jpg 768w, https://networkguy.de/wp-content/uploads/2022/11/HA-2.jpg 1112w" sizes="(max-width: 800px) 100vw, 800px" /></a></p>
<p>After rebooting the slave</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2962" src="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg" alt="" width="806" height="256" srcset="https://networkguy.de/wp-content/uploads/2022/11/HA-3-1.jpg 989w, https://networkguy.de/wp-content/uploads/2022/11/HA-3-1-300x95.jpg 300w, https://networkguy.de/wp-content/uploads/2022/11/HA-3-1-768x244.jpg 768w" sizes="(max-width: 806px) 100vw, 806px" /></a></p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/">Sophos UTM 9.712-13 HA update problem</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-712-13-ha-update-problem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2954</post-id>	</item>
		<item>
		<title>Sophos UTM 9.712-12 update released</title>
		<link>https://networkguy.de/sophos-utm-9-712-12-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-712-12-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Wed, 24 Aug 2022 18:40:26 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2753</guid>

					<description><![CDATA[<p>News Maintenance Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-13215 [AWS] AWS Pay-As-You-Go license expires on C5/M5 instances NUTM-12872 [Basesystem] LibXML vulnerability &#8211; CVE-2021-3541 NUTM-13227 [Basesystem] uriparser vulnerabilities NUTM-13376 [Basesystem] DHCP Relay not working after upgrade to 9.704 NUTM-13496 [Basesystem] Openssl vulnerability &#8211; CVE-2022-1292 NUTM-13504 [WAF] Enforce usage of valid [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-12-update-released/">Sophos UTM 9.712-12 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<ul>
<li>Maintenance Release</li>
</ul>
<h2 id="mcetoc_1fq6mbdej3">Remarks</h2>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h2 id="mcetoc_1fq6mc35c4">Issues Resolved</h2>
<ul>
<li id="mcetoc_1fq6m92fn2">NUTM-13215 [AWS] AWS Pay-As-You-Go license expires on C5/M5 instances</li>
<li>NUTM-12872 [Basesystem] LibXML vulnerability &#8211; CVE-2021-3541</li>
<li>NUTM-13227 [Basesystem] uriparser vulnerabilities</li>
<li>NUTM-13376 [Basesystem] DHCP Relay not working after upgrade to 9.704</li>
<li>NUTM-13496 [Basesystem] Openssl vulnerability &#8211; CVE-2022-1292</li>
<li>NUTM-13504 [WAF] Enforce usage of valid Let&#8217;s Encrypt root CA</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.711005-712012.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.711005-712012.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-712-12-update-released/">Sophos UTM 9.712-12 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-712-12-update-released/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2753</post-id>	</item>
		<item>
		<title>Sophos UTM 9.711-5 update released</title>
		<link>https://networkguy.de/sophos-utm-9-711-5-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-711-5-update-released/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 22 Apr 2022 14:55:36 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2743</guid>

					<description><![CDATA[<p>Sophos have just released SG UTM version 9.711. This release follows very quickly after 9.710 as it contains some important vulnerability fixes. Sophos recommend that even if you only recently upgraded to 9.710, you should apply this fix as soon as possible. As usual, the release will be rolled out in phases: In phase 1 [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-711-5-update-released/">Sophos UTM 9.711-5 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Sophos have just released SG UTM version 9.711. This release follows very quickly after 9.710 as it contains some important vulnerability fixes. Sophos recommend that even if you only recently upgraded to 9.710, you should apply this fix as soon as possible.</p>
<p>As usual, the release will be rolled out in phases:</p>
<ul>
<li>In phase 1 you can download the update package from our <a href="https://download.astaro.com/#UTM/">download server</a>. Click the link and navigate to the folder <strong>UTM / v9 / up2date</strong>.
<ul>
<li>Up2date package &#8211; 9.710 to 9.711 : <a href="https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.710001-711005.tgz.gpg">https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.710001-711005.tgz.gpg</a></li>
<li>md5sum is 8eede813596e78a58a52f492adcd52c4 : <a href="https://download.astaro.com/UTM/v9/up2date/%20u2d-sys-9.710001-711005.tgz.gpg.md5">https://download.astaro.com/UTM/v9/up2date/ u2d-sys-9.710001-711005.tgz.gpg.md5</a></li>
</ul>
</li>
<li>During phase 2 we will make it available via our Up2Date servers in several stages.</li>
<li>In phase 3 we will make it available via our Up2Date servers to all remaining installations.</li>
</ul>
<p>This version addresses the recent highly-publicised vulnerability in OpenSSL, <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a>. It also addresses a vulnerability recently discovered in Apache, <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a>. Apache is used in WAF and for the WebAdmin and user interfaces.</p>
<p>The new Wireless Access Point firmware included with this release is essential for anyone adding new APX access points. Due to supply chain issues we have made some hardware changes in the most recent revisions of our APX models that require this latest firmware version 11.0.109. This version also addresses the recent certificate-parsing vulnerability discovered in OpenSSL so it is worth applying even if you don&#8217;t have any new access points.</p>
<p>Finally, you may notice a small change in the format of the firmware version when you&#8217;re using WebAdmin &#8211; we&#8217;ve added an identifier to make it clear whether you&#8217;re using the 32-bit or 64-bit version of the UTM operating system.</p>
<p><img decoding="async" src="https://community.sophos.com/resized-image/__size/1280x960/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-07/Screen-Shot-2022_2D00_04_2D00_20-at-12.35.08-PM.png" alt="Release 9.711-5 64-bit (c) 2000-2022 Sophos Limited. All rights reserved." /></p>
<h3 id="mcetoc_1g18qv0bi0">Other news</h3>
<ul>
<li>Maintenance Release</li>
</ul>
<h3 id="mcetoc_1g18qv0bj1">Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3 id="mcetoc_1g18qv0bj2">Issues Resolved</h3>
<ul>
<li>NUTM-13334 [Basesystem] PowerShell / Putty &#8211; Default SSH client options result in failed connection</li>
<li>NUTM-13394 [Basesystem] Openssl Vulnerability &#8211; <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a></li>
<li>NUTM-13421 [Basesystem] Upgrade Apache to 2.4.53 (UI) &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a></li>
<li>NUTM-13326 [UI Framework] Identify 32-bit or 64-bit build in WebAdmin footer</li>
<li>NUTM-13419 [WAF] Upgrade Apache to 2.4.53 (WAF) &#8211; <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-22720">CVE-2022-22720</a></li>
<li>NUTM-13363 [Wireless] Integrate updated APX firmware version 11.0.019</li>
<li>NUTM-13433 [Wireless] AP/APX : Openssl Vulnerability &#8211; <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220318-openssl-dos">CVE-2022-0778</a></li>
</ul>
<p>The post <a href="https://networkguy.de/sophos-utm-9-711-5-update-released/">Sophos UTM 9.711-5 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-711-5-update-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2743</post-id>	</item>
		<item>
		<title>Sophos UTM 9.710-1 update released</title>
		<link>https://networkguy.de/sophos-utm-9-710-1-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-710-1-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 20 Mar 2022 19:23:49 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2735</guid>

					<description><![CDATA[<p>News This update removes the end-of-life SSLVPN client. It is no longer available to download from the User Portal. For more information see this end-of-life notice and this vulnerability disclosure. With the standalone IPSec client also reaching end-of-sale on 30 March 2022, we have refreshed the remote access page of the User Portal to better support Sophos Connect. Sophos Connect is the [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-710-1-update-released/">Sophos UTM 9.710-1 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<p>This update removes the end-of-life SSLVPN client. It is no longer available to download from the User Portal. For more information see this <a href="https://support.sophos.com/support/s/article/KB-000043484?language=en_US" target="_blank" rel="noopener noreferrer">end-of-life notice</a> and this <a href="https://www.sophos.com/en-us/security-advisories/sophos-sa-20220303-sslvpn-local-dos" target="_blank" rel="noopener noreferrer">vulnerability disclosure</a>.</p>
<p>With the standalone IPSec client also reaching <a href="https://partnernews.sophos.com/en-us/2022/01/products/end-of-sale-and-end-of-life-ipsec-vpn-client/" target="_blank" rel="noopener noreferrer">end-of-sale on 30 March 2022</a>, we have refreshed the remote access page of the User Portal to better support Sophos Connect. Sophos Connect is the recommended alternative to the old SSLVPN and IPSec clients. Download links on the User Portal now direct users to the Sophos Connect section on <a href="https://sophos.com/utm-downloads#SophosConnect" target="_blank" rel="noopener noreferrer">our downloads page</a>. Configuration links have been updated to provide certificate packages and settings that can be imported by Sophos Connect to get users up and running quickly.</p>
<p><img decoding="async" src="https://community.sophos.com/resized-image/__size/1600x960/__key/communityserver-blogs-components-weblogfiles/00-00-00-00-07/UTM_2D00_UserPortal_2D00_9.710.png" alt="Screenshot of updated user portal" /></p>
<p>&nbsp;</p>
<p>Sophos Connect client should be able to work with any IPSec or SSLVPN configuration you already have set up. Here are some additional links to help understand how it works.</p>
<ul>
<li><a href="https://support.sophos.com/support/s/article/KB-000043396?language=en_US">Sophos UTM: Install and configure Sophos Connect for remote access SSL VPN</a></li>
<li><a href="https://support.sophos.com/support/s/article/KB-000038819?language=en_US">Sophos UTM: Install and configure Sophos Connect for remote access IPsec</a></li>
</ul>
<h3 id="mcetoc_1ftqc23210">Other news</h3>
<ul>
<li>Maintenance release</li>
<li>Security release</li>
</ul>
<h3 id="mcetoc_1ftqc23211">Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3 id="mcetoc_1ftqc23212">Issues Resolved</h3>
<ul>
<li>NUTM-12592 [Basesystem] Use Only Secure Ciphers for UTM SSH Server</li>
<li>NUTM-12784 [Basesystem] Patch BIND vulnerabilities (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25214#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25214</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25215#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25215</a>, <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-25219#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-25219</a>)</li>
<li>NUTM-13101 [Basesystem] Patch Strongswan Vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-41991#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-41991</a>)</li>
<li>NUTM-13119 [Basesystem] Patch Binutils Vulnerability (<a href="https://nvd.nist.gov/vuln/detail/CVE-2021-3487#vulnCurrentDescriptionTitle" target="_blank" rel="noopener noreferrer">CVE-2021-3487</a>)</li>
<li>NUTM-13144 [Basesystem] Remove SSLVPN client downloader from UTM</li>
<li>NUTM-13192 [Basesystem] Use Secure Key Exchange Algorithms for SSH</li>
<li>NUTM-13203 [Basesystem] snmpd high memory for snmpwalk v3</li>
<li>NUTM-12615 [Configuration Management] Root password hash exposed via confd*.log (CVE-2022-0652)</li>
<li>NUTM-13013 [Email] Upgrade Exim to v4.95</li>
<li>NUTM-13200 [Email] OAEP RSA padding mode still uses SHA-1 in S/MIME</li>
<li>NUTM-13267 [Email] SQLi in the Mail Manager (CVE-2022-0386)</li>
<li>NUTM-13071 [Logging] IPFIX reporting transferred data on wrong direction</li>
<li>NUTM-12885 [Network] IPS exceptions issue</li>
<li>NUTM-12987 [RED] Issue with RED tunnel on BO after disconnecting PPPoE</li>
<li>NUTM-12936 [Web] Add configuration for overriding warn page to proceed link protocol (Standard Mode SSO)</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.709003-710001.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.709003-710001.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-710-1-update-released/">Sophos UTM 9.710-1 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-710-1-update-released/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2735</post-id>	</item>
		<item>
		<title>Sophos UTM 9.709-3 update released</title>
		<link>https://networkguy.de/sophos-utm-9-709-3-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-709-3-update-released/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 28 Jan 2022 11:11:44 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2703</guid>

					<description><![CDATA[<p>News Maintenance Release Security Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-12868 [Email] It is not possible to permanently block an IP from the SMTP-Proxy if authentication is enabled NUTM-13008 [Email] Public DNS causing blocked connection with RBL NUTM-13193 [Email] SPX portal 404 NO SUCH USER after upgrading to 9.708 [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-709-3-update-released/">Sophos UTM 9.709-3 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2 id="mcetoc_1fq6jqjmj0">News</h2>
<ul>
<li>Maintenance Release</li>
<li>Security Release</li>
</ul>
<h2 id="mcetoc_1fq6mbdej3">Remarks</h2>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h2 id="mcetoc_1fq6mc35c4">Issues Resolved</h2>
<ul>
<li id="mcetoc_1fq6m92fn2">NUTM-12868 [Email] It is not possible to permanently block an IP from the SMTP-Proxy if authentication is enabled</li>
<li>NUTM-13008 [Email] Public DNS causing blocked connection with RBL</li>
<li>NUTM-13193 [Email] SPX portal 404 NO SUCH USER after upgrading to 9.708</li>
<li>NUTM-12791 [Wireless] Address the Frag Attack vulnerabilities for Local Wifi and connected AP devices (see <a href="https://community.sophos.com/b/security-blog/posts/multiple-vulnerabilities-aka-fragattacks-in-wifi-specification">this article</a> for more details)</li>
<li>NUTM-13263 [Wireless] Integrate updated AP firmware (v. 11.0.017) to address FragAttack issues</li>
<li>NUTM-12971 [WAF] Update Apache Runtime Library (APR) to address CVE-2021-35940</li>
<li>NUTM-12861 [WAF] Upgrade Apache to address CVE-2020-13950, CVE-2021-26690, CVE-2021-26691, CVE-2021-34798, CVE-2021-39275, CVE-2021-40438</li>
</ul>
<h3>Download</h3>
<p><a href="https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.708006-709003.tgz.gpg">https://ftp-astaro-com.s3-eu-west-1.amazonaws.com/UTM/v9/up2date/u2d-sys-9.708006-709003.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-709-3-update-released/">Sophos UTM 9.709-3 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-709-3-update-released/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2703</post-id>	</item>
		<item>
		<title>Sophos SG/XG How to find the PPPoE password</title>
		<link>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/</link>
					<comments>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Fri, 25 Jun 2021 13:46:38 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2625</guid>

					<description><![CDATA[<p>Hello guys, today I want to show you how to find out the PPPoE password on a Sophos SG/XG if you don&#8217;t have it documented. This only works if the SG/XG itself establishes the connection. Start a TCPDump on the hardware interface via the shell. In this example eth1. tcpdump -i eth1 Then press the [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/">Sophos SG/XG How to find the PPPoE password</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys,</p>
<p>today I want to show you how to find out the PPPoE password on a Sophos SG/XG if you don&#8217;t have it documented.</p>
<p>This only works if the SG/XG itself establishes the connection.</p>
<p>Start a TCPDump on the hardware interface via the shell. In this example eth1.</p>
<p>tcpdump -i eth1</p>
<p>Then press the reconnect button in the webgui.</p>
<p>Now you just have to look in the dump for the line that contains your PPPoE username. And directly behind it is the password in plain text. :D</p>
<p>&nbsp;</p>
<p>08:49:12.384612 PPPoE [ses 0xdc82] PAP, Auth-Req (0x01), id 1, Peer <strong>networkguy0001@telekom.de</strong>, Name <strong>Password123</strong></p>
<p>&nbsp;</p>
<p><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/">Sophos SG/XG How to find the PPPoE password</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-sg-xg-how-to-find-the-pppoe-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2625</post-id>	</item>
		<item>
		<title>Sophos UTM 9.706-9 update released</title>
		<link>https://networkguy.de/sophos-utm-9-706-9-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-706-9-update-released/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 16 May 2021 14:50:47 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2614</guid>

					<description><![CDATA[<p>News Maintenance Release/ Security Release Remarks System will be rebooted Configuration will be upgraded Issues Resolved NUTM-12780 Upgrade Exim to v4.94.2 &#8211; 9.706 Download https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.706008-706009.tgz.gpg</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-706-9-update-released/">Sophos UTM 9.706-9 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3>News</h3>
<ul>
<li>Maintenance Release/ Security Release</li>
</ul>
<h3>Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
</ul>
<h3>Issues Resolved</h3>
<ul>
<li>NUTM-12780 Upgrade Exim to v4.94.2 &#8211; 9.706</li>
</ul>
<h3>Download</h3>
<p><a href="https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.706008-706009.tgz.gpg" target="_blank" rel="noopener noreferrer">https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.706008-706009.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-706-9-update-released/">Sophos UTM 9.706-9 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-706-9-update-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2614</post-id>	</item>
		<item>
		<title>Sophos UTM 9.706 update released</title>
		<link>https://networkguy.de/sophos-utm-9-706-update-released/</link>
					<comments>https://networkguy.de/sophos-utm-9-706-update-released/#respond</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Wed, 05 May 2021 09:14:57 +0000</pubDate>
				<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2580</guid>

					<description><![CDATA[<p>News Maintenance Release Strict TCP Session Handling enabled by defaultNew installations of UTM 9.706 have strict TCP session handling enabled by default. When updating to 9.706 and strict TCP session handling is not enabled, admins can enable it under Network Protection &#62; Firewall &#62; Advanced. Secure Up2DateUp2Date updates will be downloaded via HTTPS connections. In [&#8230;]</p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-706-update-released/">Sophos UTM 9.706 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h3 id="mcetoc_1f4ovfbkb0">News</h3>
<ul>
<li>Maintenance Release</li>
<li>Strict TCP Session Handling enabled by defaultNew installations of UTM 9.706 have strict TCP session handling enabled by default.<br />
When updating to 9.706 and strict TCP session handling is not enabled, admins can enable it under Network Protection &gt; Firewall &gt; Advanced.</li>
<li>Secure Up2DateUp2Date updates will be downloaded via HTTPS connections. In cases where UTM 9 is being used with an upstream proxy or behind a different firewall, it may be necessary to change the configuration on these devices to allow UTM 9 to retrieve Up2Date information via HTTPS.</li>
<li>Email Protection anti-spam engine changed to Sophos Anti-Spam Interface (SASI)Starting with this release, E-Mail Protection will use the Sophos Anti-Spam Interface (SASI) for anti-spam scanning. SASI is already being used as part of Sophos Email and will replace the currently used anti-spam engine in UTM 9.<br />
In case of false positive or false negative detections, please follow the instructions in <a href="https://support.sophos.com/support/s/article/KB-000033422">this support article</a> on how to submit a sample.</li>
</ul>
<h3>How to activate Strict TCP Session Handling</h3>
<p><a href="https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2585" src="https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling-1024x493.jpg" alt="" width="1024" height="493" srcset="https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling-1024x493.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling-300x145.jpg 300w, https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling-768x370.jpg 768w, https://networkguy.de/wp-content/uploads/2021/05/Strict-TCP-Session-Handling.jpg 1492w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<h3>Remarks</h3>
<ul>
<li>System will be rebooted</li>
<li>Configuration will be upgraded</li>
<li>Connected REDs will perform firmware upgrade</li>
<li>Connected Wifi APs will perform firmware upgrade</li>
</ul>
<h3>Issues Resolved</h3>
<ul>
<li>NUTM-12050 [Access &amp; Identity] IPv6 auto-firewall rules missing with IPsec S2S respond only</li>
<li>NUTM-12062 [Access &amp; Identity] AD Group object not updated when user with an Umlaut in the username logs in</li>
<li>NUTM-12188 [Access &amp; Identity] openl2tp service is dead and unable to start</li>
<li>NUTM-12198 [Basesystem, UI Framework] Webadmin host injection reported</li>
<li>NUTM-11753 [Basesystem] SG450 RAID status not alerting</li>
<li>NUTM-11988 [Basesystem] Interface goes down after re-assigning the hardware of an interface</li>
<li>NUTM-11989 [Basesystem] BGP issue causes long delay in UTM startup</li>
<li>NUTM-12064 [Basesystem] Perl &#8211; Vulnerabilities</li>
<li>NUTM-12112 [Basesystem] Libc Vulnerabilities</li>
<li>NUTM-12122 [Basesystem] net-snmp Vulnerability CVE-2019-20892</li>
<li>NUTM-12354 [Basesystem] Patch BIND (CVE-2020-8620 CVE-2020-8621 CVE-2020-8622 CVE-2020-8623 CVE-2020-8624)</li>
<li>NUTM-12471 [Basesystem] OpenSSL: CVE-2020-1971 &#8211; DoS</li>
<li>NUTM-11941 [Email] unnecessary SMTP restarts due to a SSL VPN login</li>
<li>NUTM-12286 [Email] ECC Ciphers ECDH-ECDSA not supported by Exim SMTP</li>
<li>NUTM-12542 [Email] Arbitrary Config Object Deletion via User Portal&lt;/Fix&gt;</li>
<li>NUTM-11915 [Network] Ipsec routes will be removed if a wifi network will be added and the ipsec local networks overlap with an existing wifi network</li>
<li>NUTM-12045 [Network] INFO-122 Dhcpd not running</li>
<li>NUTM-12280 [RED] RED site-to-site tunnels reconnecting at random intervals (utm to tum)</li>
<li>NUTM-12253 [RED_Firmware] Split DNS doesn&#8217;t work with SD-RED</li>
<li>NUTM-12379 [RED_Firmware] RED doesn&#8217;t reboot after reconnect doesn&#8217;t work properly</li>
<li>NUTM-12098 [UI Framework] Remote crash of User Portal index.plx</li>
<li>NUTM-11950 [WAF] AH00051 child pid XXXX exit signal Segmentation fault (11), possible coredump in /tmp</li>
<li>NUTM-12148 [WAF] WAF not always sending SNI to backend</li>
<li>NUTM-12029 [Web] AWS https scanning connect timeout on some sites with chrome</li>
<li>NUTM-12204[Web] High CPU with http proxy coredumps.</li>
<li>NUTM-12032 [Wireless] &#8220;&amp;&#8221; sign in PSK cause issues after config change</li>
<li>NUTM-12127 [Wireless] wireless client list empty</li>
<li>NUTM-12254 [Wireless] Website not loading for wireless user due to large packets whose size is larger than the MTU of the link</li>
<li>NUTM-12362 [Wireless] AP55/55C/100X/320X : Communication issue for Clients which are connected to the same SSID but at different APs</li>
<li>NUTM-12383 All SSIDs disappears from AP and disconnects all connected clients</li>
</ul>
<h3>Download</h3>
<p><a href="https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.705003-706008.tgz.gpg">https://download.astaro.com/UTM/v9/up2date/u2d-sys-9.705003-706008.tgz.gpg</a></p>
<p>The post <a href="https://networkguy.de/sophos-utm-9-706-update-released/">Sophos UTM 9.706 update released</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/sophos-utm-9-706-update-released/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2580</post-id>	</item>
		<item>
		<title>Aruba Mobility Controller with Sophos SG/XG hotspot Portal</title>
		<link>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/</link>
					<comments>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sun, 04 Apr 2021 18:27:11 +0000</pubDate>
				<category><![CDATA[Aruba]]></category>
		<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[Sophos XG]]></category>
		<category><![CDATA[WLAN]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[Sophos SG]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2555</guid>

					<description><![CDATA[<p>Hello Guys, &#160; today I will talk about how to configuring a guest Wifi with a Aruba Mobility Controller and the Sophos hotspot solution. In this example I will using the Sophos SG hotspot solution. With Sophos XG, it&#8217;s basically the same. Sophos SG Create a new Interface It&#8217;s recommandet, to use a own interface [&#8230;]</p>
<p>The post <a href="https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/">Aruba Mobility Controller with Sophos SG/XG hotspot Portal</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>&nbsp;</p>
<p>today I will talk about how to configuring a guest Wifi with a Aruba Mobility Controller and the Sophos hotspot solution.</p>
<p>In this example I will using the Sophos SG hotspot solution. With Sophos XG, it&#8217;s basically the same.</p>
<p><span style="font-size: 18pt;"><strong>Sophos SG</strong></span></p>
<p><strong>Create a new Interface</strong></p>
<p>It&#8217;s recommandet, to use a own interface for the guests. If you use a hardware interface or a VLAN interface, it&#8217;s your choice. I using VLAN interfaces.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2556" src="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg" alt="" width="350" height="331" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG1.jpg 350w, https://networkguy.de/wp-content/uploads/2021/04/SG1-300x284.jpg 300w" sizes="(max-width: 350px) 100vw, 350px" /></a></p>
<p><strong>Create a firewall rule for the web access </strong></p>
<p>To avoid problems with VIP visitors, I recommend allowing any service to access the internet. I will come to the topic of proxy in a moment.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2557" src="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg" alt="" width="986" height="243" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG2.jpg 986w, https://networkguy.de/wp-content/uploads/2021/04/SG2-300x74.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG2-768x189.jpg 768w" sizes="(max-width: 986px) 100vw, 986px" /></a></p>
<p><strong>masquerading rule</strong></p>
<p>Without it, the package also gets on the internet, but not back :D</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2558" src="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg" alt="" width="985" height="236" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG3.jpg 985w, https://networkguy.de/wp-content/uploads/2021/04/SG3-300x72.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG3-768x184.jpg 768w" sizes="(max-width: 985px) 100vw, 985px" /></a></p>
<p><strong>The DHCP </strong></p>
<p>Do not use your AD DHCP server. If you still have a server at all thanks to Azure. Always keep guest solutions as far away as possible from your infrastructure. That&#8217;s why I use the DHCP server from the Sophos SG and also send DNS queries directly to google DNS. Do not use the SG as DNS server for guest solutions. Because most UTMs have a query route to their own domain and the guest user can query your SG/XG via DNS queries about your environment.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2559" src="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg" alt="" width="607" height="596" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG4.jpg 607w, https://networkguy.de/wp-content/uploads/2021/04/SG4-300x295.jpg 300w" sizes="(max-width: 607px) 100vw, 607px" /></a></p>
<p><strong>hotspot portal</strong></p>
<p>Here you have to put in the new interface and activate the hotspot type of your choice. I prefer the voucher solution.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2577" src="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg" alt="" width="513" height="817" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot.jpg 513w, https://networkguy.de/wp-content/uploads/2021/04/SG8-Hotspot-188x300.jpg 188w" sizes="(max-width: 513px) 100vw, 513px" /></a></p>
<p><strong>And finally the proxy</strong></p>
<p>For the guests, only the transparent proxy comes into consideration. No guest user wants to enter a static proxy into the system first. You should also only activate URL filtering, because no one wants to import the proxy CA. Now you have to define the policy and that&#8217;s it for the UTM configuration.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2560" src="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg" alt="" width="998" height="470" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1.jpg 998w, https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1-300x141.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/SG5-Proxy1-768x362.jpg 768w" sizes="(max-width: 998px) 100vw, 998px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2561" src="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg" alt="" width="751" height="537" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2.jpg 751w, https://networkguy.de/wp-content/uploads/2021/04/SG6-Proxy2-300x215.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a></p>
<p>What web categories you allow via policy, you have to decide yourself.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2562" src="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg" alt="" width="751" height="205" srcset="https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3.jpg 751w, https://networkguy.de/wp-content/uploads/2021/04/SG7-Proxy3-300x82.jpg 300w" sizes="(max-width: 751px) 100vw, 751px" /></a></p>
<p>&nbsp;</p>
<p><span style="font-size: 18pt;"><strong>Aruba Mobility Controller</strong></span></p>
<p>My recommendation, configure everything under Mobility Controller level and not on the individual controller.</p>
<p><strong>Add a new VLAN interface</strong></p>
<p>We only need a VLAN interface with the same VLAN ID as the guest interface on the Sophos SG. No IP configuration is required on the mobility controller.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2563" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1024x396.jpg" alt="" width="1024" height="396" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1024x396.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-300x116.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-768x297.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface-1536x594.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-VLAN-interface.jpg 1566w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p><strong>Create the SSID</strong></p>
<p>I recommend using the tunnel mode. This way I don&#8217;t have to maintain all VLANs at the access points. Instead, I let the traffic first break out at the Mobility Controller.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2572" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-1024x477.jpg" alt="" width="1024" height="477" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-1024x477.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-300x140.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1-768x358.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN1.jpg 1447w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>&nbsp;</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2566 size-medium" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2-300x115.jpg" alt="" width="300" height="115" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2-300x115.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN2.jpg 448w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>We need a simple open WLAN.<br />
Because we are using the Sophos SG guest solution in this example, I won&#8217;t go into detail about the possible Aruba solutions.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2567 size-full" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg" alt="" width="605" height="385" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3.jpg 605w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN3-300x191.jpg 300w" sizes="(max-width: 605px) 100vw, 605px" /></a></p>
<p>Now we have to remember the name of the default role. Because we have to edit these right away.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2568 size-full" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg" alt="" width="451" height="146" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4.jpg 451w, https://networkguy.de/wp-content/uploads/2021/04/ArubaMC-WLAN4-300x97.jpg 300w" sizes="(max-width: 451px) 100vw, 451px" /></a></p>
<p><strong>Edit  the role</strong></p>
<p>For simplicity, we could write an Any rule because the Sophos SG takes care of security. But for the good feeling, we restrict the traffic a bit.</p>
<p>Because it&#8217;s a bit hard to read, here&#8217;s the content: We only allow the client to talk to the Sophos SG on the guest interface. Forbid the rest of the private IP address ranges and then allow Any for the Internet access.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2668" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1024x403.jpg" alt="" width="1024" height="403" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1024x403.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-300x118.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-768x302.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL-1536x604.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL.jpg 1566w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2669" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-1024x78.jpg" alt="" width="1024" height="78" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-1024x78.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-300x23.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1-768x58.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL1.jpg 1532w" sizes="(max-width: 1024px) 100vw, 1024px" /></a><a href="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2.jpg"><img loading="lazy" decoding="async" class="alignnone size-large wp-image-2671" src="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1024x36.jpg" alt="" width="1024" height="36" srcset="https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1024x36.jpg 1024w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-300x11.jpg 300w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-768x27.jpg 768w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2-1536x55.jpg 1536w, https://networkguy.de/wp-content/uploads/2021/04/ArubaACL2.jpg 1549w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>&nbsp;</p>
<p>The post <a href="https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/">Aruba Mobility Controller with Sophos SG/XG hotspot Portal</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/aruba-mobility-controller-with-sophos-sg-xg-hotspot-portal/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2555</post-id>	</item>
		<item>
		<title>Ubuntu how to setup a virtual DMZ with a virt. Sophos UTM</title>
		<link>https://networkguy.de/ubuntu-how-to-setup-a-virtual-dmz-with-a-virt-sophos-utm/</link>
					<comments>https://networkguy.de/ubuntu-how-to-setup-a-virtual-dmz-with-a-virt-sophos-utm/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Thu, 22 Oct 2020 19:25:40 +0000</pubDate>
				<category><![CDATA[Sophos UTM]]></category>
		<category><![CDATA[KVM]]></category>
		<category><![CDATA[Sophos]]></category>
		<category><![CDATA[sophos utm]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2397</guid>

					<description><![CDATA[<p>Hello guys, today I will talk about how you can setup a virtual DMZ with a virt. Sophos UTM. The logical network structure For a better understanding, I have create a little grafic with the logical network structure. I am using an Ubuntu server with KVM as hypervisor. My UTM, DMZ and LAN servers only [&#8230;]</p>
<p>The post <a href="https://networkguy.de/ubuntu-how-to-setup-a-virtual-dmz-with-a-virt-sophos-utm/">Ubuntu how to setup a virtual DMZ with a virt. Sophos UTM</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello guys,</p>
<p>today I will talk about how you can setup a virtual DMZ with a virt. Sophos UTM.</p>
<h1>The logical network structure</h1>
<p>For a better understanding, I have create a little grafic with the logical network structure.<br />
I am using an Ubuntu server with KVM as hypervisor. My UTM, DMZ and LAN servers only run on the one server.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2440" src="https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1-300x133.jpg" alt="" width="735" height="326" srcset="https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1-300x133.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1-1024x454.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1-768x341.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1-1536x681.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/logical-structure-1.jpg 1750w" sizes="(max-width: 735px) 100vw, 735px" /></a></p>
<p>If you want to know how to set up a virtual UTM, just have a look at my blog entry about it.<br />
<a href="https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm">https://networkguy.de/sophos-utm-how-to-install-a-virtual-home-firewall-under-ubuntu-via-kvm</a></p>
<h1>Create the virtual switch</h1>
<h3><strong>First we need a dummy interface.</strong></h3>
<p>You can create it with the following commands:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo ip link add name "what you want" type dummy
sudo ifconfig "what you want" up</pre>
<p>For example I have call it &#8220;DMZ-Dummy5&#8221;<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2403" src="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-300x20.jpg" alt="" width="450" height="30" srcset="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-300x20.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface.jpg 755w" sizes="(max-width: 450px) 100vw, 450px" /></a><br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2404" src="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-2-300x217.jpg" alt="" width="934" height="676" srcset="https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-2-300x217.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/create-dummy-interface-2-768x555.jpg 768w" sizes="(max-width: 934px) 100vw, 934px" /></a></p>
<h3><strong>Second create the switch.</strong></h3>
<p>Modus = forwarded. You must give it an IP, otherwise there is an error message.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2407" src="https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch-300x288.jpg" alt="" width="510" height="490" srcset="https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch-300x288.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch-1024x984.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch-768x738.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/create-virt-switch.jpg 1097w" sizes="(max-width: 510px) 100vw, 510px" /></a></p>
<h3><strong>As the last step we have to isolate the server from the virtual DMZ.</strong></h3>
<p>For this we need an iptables rule to drop all incoming traffic to the dummy interface. And because it is so beautiful, we also ban outgoing traffic too.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo iptables -A INPUT -i Dummy-DMZ5 -j DROP
sudo iptables -A OUTPUT -o virbr3 -j DROP
sudo iptables-save</pre>
<p>For what do we actually need this iptables rule? Quite simple. The DMZ server could access the hypervisor via this interface.</p>
<p>In this example, the hypervisor have in the virtual DMZ network the IP 10.3.69.1/24. The test server have the IP 10.3.69.2/24.<br />
Ping test<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/Ping-Test-Ubuntu-Test-VM.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2409" src="https://networkguy.de/wp-content/uploads/2020/10/Ping-Test-Ubuntu-Test-VM-300x97.jpg" alt="" width="387" height="125" srcset="https://networkguy.de/wp-content/uploads/2020/10/Ping-Test-Ubuntu-Test-VM-300x97.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/Ping-Test-Ubuntu-Test-VM-768x249.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/Ping-Test-Ubuntu-Test-VM.jpg 777w" sizes="(max-width: 387px) 100vw, 387px" /></a><br />
ssh access to the hypervisor (not so good for a DMZ)<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/ssh-to-Hypervisor-Ubuntu-Test-VM.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2410" src="https://networkguy.de/wp-content/uploads/2020/10/ssh-to-Hypervisor-Ubuntu-Test-VM-300x281.jpg" alt="" width="380" height="356" srcset="https://networkguy.de/wp-content/uploads/2020/10/ssh-to-Hypervisor-Ubuntu-Test-VM-300x281.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/ssh-to-Hypervisor-Ubuntu-Test-VM-768x720.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/ssh-to-Hypervisor-Ubuntu-Test-VM.jpg 1016w" sizes="(max-width: 380px) 100vw, 380px" /></a></p>
<p>with iptables rule<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/Ping-and-SSH-DROP-Ubuntu-Test-VM.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2411" src="https://networkguy.de/wp-content/uploads/2020/10/Ping-and-SSH-DROP-Ubuntu-Test-VM-300x72.jpg" alt="" width="371" height="89" srcset="https://networkguy.de/wp-content/uploads/2020/10/Ping-and-SSH-DROP-Ubuntu-Test-VM-300x72.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/Ping-and-SSH-DROP-Ubuntu-Test-VM-768x184.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/Ping-and-SSH-DROP-Ubuntu-Test-VM.jpg 895w" sizes="(max-width: 371px) 100vw, 371px" /></a></p>
<h1>Connect the DMZ with the UTM and the test server</h1>
<p>OK, we have create the virtual DMZ. Now we need a connection with a test server and our virtual UTM.</p>
<p>For this example I use the virtual switch VirtDMZ3.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2413" src="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-300x201.jpg" alt="" width="369" height="247" srcset="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-300x201.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-768x513.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch.jpg 872w" sizes="(max-width: 369px) 100vw, 369px" /></a><br />
The switch nic is called virbr3, I don&#8217;t know why. But you can find it by IP address.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2414" src="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2-300x124.jpg" alt="" width="484" height="200" srcset="https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2-300x124.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2-1024x422.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2-768x317.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/my-virt-switch-2.jpg 1242w" sizes="(max-width: 484px) 100vw, 484px" /></a></p>
<h3><strong>UTM</strong></h3>
<p>Connect the virtual switch as an additional NIC.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2416" src="https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect-300x269.jpg" alt="" width="482" height="432" srcset="https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect-300x269.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect-1024x918.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect-768x688.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect-1536x1377.jpg 1536w, https://networkguy.de/wp-content/uploads/2020/10/virt-UTM-DMZ-connect.jpg 1601w" sizes="(max-width: 482px) 100vw, 482px" /></a></p>
<h3><strong>Test server</strong></h3>
<p>For the test server, use the virtual switch as NIC.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2417" src="https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch-300x253.jpg" alt="" width="383" height="323" srcset="https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch-300x253.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch-1024x864.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch-768x648.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/test-server-virt-switch.jpg 1376w" sizes="(max-width: 383px) 100vw, 383px" /></a></p>
<h1>Needed configurations on the UTM<strong><br />
</strong></h1>
<h3><strong>insert the new DMZ interface</strong></h3>
<p>You can find the correct interface using the MAC address. Compare it with the Virt Manager and the UTM.</p>
<p>virtmanager:<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2424" src="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2-300x261.jpg" alt="" width="457" height="398" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2-300x261.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2-1024x892.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2-768x669.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-2.jpg 1285w" sizes="(max-width: 457px) 100vw, 457px" /></a></p>
<p>UTM:<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2425" src="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-300x264.jpg" alt="" width="444" height="391" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-300x264.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-1024x900.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac-768x675.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-interface-mac.jpg 1496w" sizes="(max-width: 444px) 100vw, 444px" /></a></p>
<p>Add the new interface:<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2426" src="https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface-300x227.jpg" alt="" width="440" height="333" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface-300x227.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface-1024x775.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface-768x581.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-add-interface.jpg 1484w" sizes="(max-width: 440px) 100vw, 440px" /></a></p>
<p>&nbsp;</p>
<h3><strong>Network Services</strong></h3>
<h4><strong>DNS</strong></h4>
<p><strong>Don&#8217;t do this! </strong>If you allow the DMZ devices to use the DNS service of the UTM, DNS queries can be made via all devices known to the UTM. Every hacker is happy about this.</p>
<p>negative example:<br />
The DMZ device can resolve the IP address from my LAN client.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2434" src="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1-300x82.jpg" alt="" width="476" height="130" srcset="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1-300x82.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1-1024x280.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1-768x210.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-1.jpg 1289w" sizes="(max-width: 476px) 100vw, 476px" /></a></p>
<p>without UTM DNS service<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2435" src="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-300x103.jpg" alt="" width="475" height="163" srcset="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-300x103.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-1024x350.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-768x263.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2.jpg 1318w" sizes="(max-width: 475px) 100vw, 475px" /></a></p>
<h4><strong>DHCP</strong></h4>
<p>If you want a DHCP, use for DNS open DNS server like google DNS or quad9.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-dhcp.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2428" src="https://networkguy.de/wp-content/uploads/2020/10/utm-dhcp-221x300.jpg" alt="" width="396" height="538" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-dhcp-221x300.jpg 221w, https://networkguy.de/wp-content/uploads/2020/10/utm-dhcp.jpg 743w" sizes="(max-width: 396px) 100vw, 396px" /></a></p>
<h4><strong>NTP</strong></h4>
<p>I recommend, to use the UTM own NTP service for your devices. The fewer external services allowed, the better.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-ntp.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2429" src="https://networkguy.de/wp-content/uploads/2020/10/utm-ntp-300x218.jpg" alt="" width="376" height="273" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-ntp-300x218.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-ntp-768x558.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-ntp.jpg 817w" sizes="(max-width: 376px) 100vw, 376px" /></a></p>
<p>&nbsp;</p>
<h3><strong>Network Protection</strong></h3>
<h4><strong>Firewall</strong></h4>
<p>For the DMZ you need 2 firewall rules. One for the internet access and one for the management.<br />
The permitted services are only exemplary. Just check which services you need and allow them.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2431" src="https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules-300x135.jpg" alt="" width="531" height="239" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules-300x135.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules-1024x460.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules-768x345.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-dmz-firewall-rules.jpg 1483w" sizes="(max-width: 531px) 100vw, 531px" /></a></p>
<h4><strong>ICMP</strong></h4>
<p>The UTM has the special feature that ping is also handled under ICMP and can overwrite firewall rules if ping is prohibited. Therefore you should disable pinging via the gateway interface and enable firewall rules if required. Otherwise it would be possible that DMZ devices can map the IP network structures via IP scanner.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-icmp.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2432" src="https://networkguy.de/wp-content/uploads/2020/10/utm-icmp-300x205.jpg" alt="" width="528" height="361" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-icmp-300x205.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-icmp-1024x701.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-icmp-768x526.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-icmp.jpg 1507w" sizes="(max-width: 528px) 100vw, 528px" /></a></p>
<h4><strong>NAT</strong></h4>
<p>I recommend to use a SNAT rule for accessing the DMZ, so that no conclusions can be drawn from the communication to the rest of the network.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2438" src="https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule-300x105.jpg" alt="" width="514" height="180" srcset="https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule-300x105.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule-1024x360.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule-768x270.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/utm-snat-rule.jpg 1495w" sizes="(max-width: 514px) 100vw, 514px" /></a></p>
<p>without SNAT rule:<br />
You can see the IP from my client<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2435" src="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-300x103.jpg" alt="" width="516" height="177" srcset="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-300x103.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-1024x350.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2-768x263.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-2.jpg 1318w" sizes="(max-width: 516px) 100vw, 516px" /></a></p>
<p>with SNAT rule:<br />
You see only the UTM DMZ gateway.<br />
<a href="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3.jpg"><img loading="lazy" decoding="async" class="alignnone wp-image-2437" src="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3-300x108.jpg" alt="" width="511" height="184" srcset="https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3-300x108.jpg 300w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3-1024x368.jpg 1024w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3-768x276.jpg 768w, https://networkguy.de/wp-content/uploads/2020/10/dmz-dns-3.jpg 1322w" sizes="(max-width: 511px) 100vw, 511px" /></a></p>
<p>&nbsp;</p>
<p>That&#8217;s all</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/ubuntu-how-to-setup-a-virtual-dmz-with-a-virt-sophos-utm/">Ubuntu how to setup a virtual DMZ with a virt. Sophos UTM</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/ubuntu-how-to-setup-a-virtual-dmz-with-a-virt-sophos-utm/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2397</post-id>	</item>
	</channel>
</rss>
