1. General
-
Model Ports ----- ----- XG 125 8 1/LAN 2/WAN 3/DMZ 4 5 6 7 8 9 (SFP) XG 135 8 1/LAN 2/WAN 3/DMZ 4 5 6 7 8 9 (SFP) XGS 126 12 1 2 3 4 5 6 7 8 9 10 11/PoE1 12/PoE2 F1 (SFP) F2 (SFP)
2. Licenses
-
Note: For the renewal of the licenses contact Plaifon (Issaraporn Karavong, <Issaraporn.k@2beshop.com>) at 2BeSHOP.
Xstream Appliance Bundle Standard Appliance Bundle ------------------------ ------------------------- Base License Base License Xstream protection Standard protection ------------------------ ------------------------- Network Protection Network Protection Web Protection Web Protection Zero-Day Protection - Central Orchestration - Enhanced Support Enhanced Support
Firewall name SMRU tag Model Serial number Company Expire date Type SMRU-SFW-MKU
SMRU-AS-SERVER-0006
XG 125
C1A103MD9WYYFCB
eLife System
2025-04-07
Enhanced Support
SMRU-SFW-MKT
SMRU-AS-SERVER-0007
XG 125
C1A102GM9DGFQ58
eLife System
2025-04-02
Enhanced Support
SMRU-SFW-SKK
SMRU-AS-SERVER-0009
XG 125
C1A103P9MF8VXC9
eLife System
2025-01-19
Enhanced Support
SMRU-SFW-MSL
SMRU-AS-SERVER-0010
XG 125
C1A109CCTCXQ31C
eLife System
2025-04-13
Enhanced Support
SMRU-SFW-TST
SMRU-AS-SERVER-0011
XG 135
C1B1012TM7QQVCB
eLife System
2025-03-11
Enhanced Support + Web Protection
SMRU-SFW-WPA
SMRU-AS-SERVER-0012
XG 135
C1B1013GF3WQP30
eLife System
2025-02-20
Enhanced Support
SMRU-SFW-MLA
SMRU-AS-SERVER-0013
XGS 126
X12106XTPW7P718
eLife System
2025-02-24
Enhanced Support
SMRU-SFW-MRM
SMRU-AS-SERVER-0014
XGS 126
X12106VK648D467
eLife System
2024-12-08
Enhanced Support + Email Protection + Xstream Protection
SMRU-SFW-MRH
SMRU-AS-SERVER-0015
XGS 126
X12107GTQJKDR0E
eLife System
2025-04-13
Enhanced Support
SMRU-SFW-HPH
SMRU-AS-SERVER-0016
XG 125
C1A0A4DDBM67365
eLife System
2025-03-31
Enhanced Support
-
Select SYSTEM > Administration > Licensing.
SMRU-SFW-MRM SMRU-SFW-MRH SMRU-SFW-TST SMRU-SFW-MKT SMRU-SFW-MLA SMRU-SFW-WPA SMRU-SFW-MSL SMRU-SFW-HPH SMRU-SFW-SKK SMRU-SFW-MKU Model XGS 126 XGS 126 XG 135 XG 125 XGS 126 XG 135 XG 125 XG 125 XG 125 XG 125 Base Firewall 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 2099-12-31 Network Protection 2024-12-08 - - - - - - - - - Web Protection 2024-12-08 - 2024-03-21 - - - - - - - Email Protection 2024-12-12 - - - - - - - - - Web Server Protection - - - - - - - - - - Zero-Day Protection 2024-12-08 - - - - - - - - - Central Orchestration 2024-12-08 - - - - - - - - - Enhanced Support 2024-12-08 2025-04-13 2025-03-11 2025-04-02 2025-02-24 2025-02-20 2025-04-13 2025-03-31 2025-01-19 2025-04-07 Enhanced Plus Support - - - - - - - - -
3. Preparation
3.1. Sophos Central
3.1.1. Registration
-
Browse to https://central.sophos.com.
-
Click Create Sophos Central Trial.
First Name SMRU Last Name IT Business Email smru-it@shoklo-unit.com
-
Click Next.
Job role IT Director/Manager Phone number 055532026 Company SMRU Industry Non-Profit Company Size 300 Country Thailand Zip code/Postcode 63110 State/Province Tak
-
Click Submit.
-
Check Activate your Sophos Central account email in your email inbox.
-
Click Create Password.
-
Type the password in CREATE PASSWORD field.
-
Type the password again in CONFIRM PASSWORD field.
-
Uncheck Make all admins sign in with multi-factor authentication.
-
Click Yes to turn off MFA.
-
Select United State in CENTRAL ADMIN PORTAL dropdown list.
Activate your accounts CREATE PASSWORD ******** CONFIRM PASSWORD ******** ADDED SECURITY □ Make all admins sign in with multi-factor authentication CENTRAL ADMIN PORTAL United States ■ I acknowledge that (i) Sophos processes personal data in accordance with the Sophos Privacy Policy; (ii) the selected data storage region applies to the hosting location for the Central Admin protal only, and that data shared with Sophos may be processed in other locations; and (iii) the Central Admin portal data storage region cannot be changed once set up. □ Enable sample submission. Certain Sophos products allow you to submit file samples to Sophos for improved security. We recommend enabling sample submission, but you my uncheck the box to disable it. ■ I have read, understand, and accept the terms of the Sophos End User License Agreement and/or Sophos Services Agreement, as applicable, and understand that they create legally binding obligations.
-
Click Activate Account.
-
Click Close.
-
Click Close.
-
Logout.
3.1.2. MFA
-
Browse to https://central.sophos.com.
-
Login as smru-it@shoklo-unit.com user.
-
Select Global Settings.
-
Select General | Multi-factor Authentication (MFA).
-
Choose Select admins who will need MFA. (All others sign in with password only.).
-
Click Add admins.
-
Check smru-it@shoklo-unit.com.
-
Click > icon.
-
Click Add.
-
Click Save.
-
Logout and relogin with smru-it@shoklo-unit.com user.
-
Click Next.
-
Check the email for the Security Code.
-
Type
in SECURITY CODE field. -
Type 4-digit for the PIN.
-
Click Next.
-
Choose Sophos/Google Authenticator.
-
Click Next.
-
Todo:.
-
Scan the QR code and save it to WinOTP Authenticator app.
-
Type the security code from WinOTP Authenticator app in the SECURITY CODE field.
-
-
Click Finish.
3.2. VirtualBox
-
Make sure that the virtual machine has two network adapters enabled.
-
Make sure that the 1st network adapter is set to Host-only Adapter.
-
Make sure that the 1st network adapter is attached to VirtualBox Host-Only Ethernet Adapter #10.
-
Make sure that the VirtualBox Host-Only Ethernet Adapter #10 is using the 172.16.16.0/24 subnet.
-
Make sure that the 2nd network adapter is set to NAT.
4. Software
4.1. Installation
-
Note: The installation with the SW-17.5.9_MR-9-577.iso file fails with an Unable to install firmware error.
Use the SW-SFOS_15.01.0-376.iso file instead and upgrade to 17.5. -
Note: USB keyboards stop working during the installation, use a PS1 keyboard instead.
-
Note: Make sure to have internet connection on the RED interface.
-
Boot the virtual machine from the SW-SFOS_15.01.0-376.iso file.
-
Type
yto continue and press Enter. -
Wait for the installation to finish.
-
[opt]:*Optional:* ERROR: No boot disk has been detected or the disk has failed.
-
Restart the computer.
-
-
Select Devices | Optical Drives | Remove disk from virtual drive.
-
Type
yto reboot and press Enter. -
Wait.
-
Type
adminfor the password and press Enter.
4.1.1. Computer
-
Boot the computer from the bootable USB that use SW-18.0.4_MR-4-506.iso.
-
Type
yto continue and press Enter. -
Wait for the installation to finish.
-
Type
yto reboot and press Enter. -
Wait.
-
Type
adminfor the password and press Enter. -
Select Accept and press Enter.
4.2. Registration
-
Note: Make sure that the proxy server is disabled on the host machine.
-
Browse to https://172.16.16.16:4444.
Username: admin Password: admin
-
Click Login.
-
Click I Accept.
-
Choose Installing Sophos Firewall (Virtual or Software).
-
Real Computer: Serial Number: C01001T72MKXH07 (2020-02-05)
-
Virtual Computer: Serial Number: C01001W6YRC8F97 (20xx-xx-xx)
-
Click Activate Device.
-
Click Register Device.
-
Click Sign In.
Email Address: smru-it@shoklo-unit.com Password: ********
-
Click Sign In.
Real ComputerSerial Number: C01001T72MKXH07 Product Type: UTM Model: SF01V
Virtual ComputerSerial Number: C01001W6YRC8F97 Product Type: UTM Model: SF01V
-
Click Confirm Registration.
-
Click Initiate License Synchronization.
4.3. Configuration
-
Select Click Here to start configuring your device.
-
Click Start.
Deployment Mode○ Bridge Mode ● Gateway Mode
-
Click the > button.
-
Select Port1
Port1 Configuration○ Obtain an IP from DHCP ○ Obtain an IP from PPPoE ● Use Static IP IP Address 192.168.26.170 # Real Computer IP Address 172.16.16.16 # Virtual Computer Subnet Mask 255.255.255.0 Zone LAN
-
Select Port2
Port2 Configuration● Obtain an IP from DHCP ○ Obtain an IP from PPPoE ○ Use Static IP IP Address Subnet Mask Zone WAN Gateway Details Gateway Name SMRU-SFW-MRM # Real Computer Gateway Name VBOX-SFW-MRM # Virtual Computer IP Address
-
Click the > button.
DNS ConfigurationIPv4 Configuration ● Obtain DNS from DHCP ○ Obtain DNS from PPPoE ○ Static DNS DNS 1 DNS 2 DNS 3
-
Click the > button.
Default Network Policy□ User / Network Rule
-
Click the > button.
Mail Server ConfigurationSend Notifications to Email Address smru-it@shoklo-unit.com Mail Server IPv4 Address/FQDN eu-smtp-outbound-1.mimecast.com Port (Default - 25) 25 From Email Address smru-sfw-mrm@shoklo-unit.com # Real Computer From Email Address vbox-sfw-mrm@shoklo-unit.com # Virtual Computer Authentication Required ■ Username relay@shoklo-unit.com Password ******** Connection Security STARTTLS Certificate ApplianceCertificate
-
Click the > button.
Date & Time ConfigurationTime Zone Asia/Bangkok Set Date YY MM DD Set Time HH MM SS ■ Automatically Synchronize with NTP Server ● Use pre-defined NTP Server ○ Use Custom NTP Server
-
Click the > button.
-
Uncheck Send App & Threat data.
-
Click Finish.
-
Click OK to confirm.
-
Wait several minutes for the configuration to finish.
-
Real Computer: Select https://192.168.26.16:4444 to access the Admin Console.
-
Virtual Computer: Select https://172.16.16.16:4444 to access the Admin Console.
Username: admin Password: admin
-
Click Login.
5. Hardware Appliance
5.1. First Time Setup
-
Note: By default, the IP address is 172.16.16.16, and DHCP is enabled.
-
Connect LAN cable between Sophos XG/XGS appliance 1/LAN port and computer LAN port.
-
Browse to https://172.16.16.16:4444.
-
Select English.
-
Click Click to begin.
-
Type the new admin password in New admin password field.
-
Type the new admin password again in Reenter the password field.
-
Have internet: Check Install the latest firmware automatically during setup (recommended).
-
Check I agree to the license agreement.
-
Click Continue.
-
Click Update.
-
Wait for the firewall to reboot.
-
Login to the firewall.
-
-
Have no internet: Uncheck Install the latest firmware automatically during setup (recommended).
-
Check I agree to the license agreement.
-
Click Continue.
-
Check Continue offline.
-
Click Continue.
-
-
Type
smru-sfw-<site>in Firewall name field. -
Select Asia/Bangkok.
-
Click Continue.
C1A103MD9WYYFCB Licensed features Feature Status Expiry -------------- --------- ------ Network protection Evaluating □ Web protection Evaluating □ Email protection Evaluating □ Web server protection Evaluating □ Sandstorm Evaluating □ Enhanced support Not evaluating Enhanced plus support Not evaluating □ Opt in to the customer experience improvement program
-
Click Continue.
-
Select This firewall (route mode) in Choose gateway dropdown list.
-
Type
<Firewall IP address>in LAN address and internal client network size. -
Note:
-
Optional: Uncheck Enable DHCP.
-
SMRU-SFW-MLA: Check Enable DHCP.
-
Type
192.168.26.50 - 192.168.26.169in DHCP lease range fields.
Choose gateway This firewall (route mode) LAN address and internal client network size 192.168.26.170/24 ■ Enable DHCP DHCP lease range 192.168.26.50 - 192.168.26.169
-
-
Click Continue.
□ Protect users from network threats □ Protect users from the suspicious and malicious websites □ Scan files that were downloaded from the web for malware □ Send suspicious files to Sophos Sandstorm
-
Click Continue.
-
Type
smru-it@shoklo-unit.comin Email recipient field. -
Type
smru-sfw-<site>@shoklo-unit.comin Email sender field. -
Check Send weekly configuration backup.
-
Type the Level 1 + Level 2 password in Encryption password field.
-
Type the Level 1 + Level 2 password in Confirm encryption password field.
-
Check Specify an external mail server.
-
Type
eu-smtp-outbound-1.mimecast.comin Mail server IPv4 address/FQDN. -
Type
587in Port (Default - 25) field. -
Check Requires an encrypted TLS connection.
-
Check Authentication required.
-
Type
relay@shoklo-unit.comin User name field. -
Type the password in Password field.
Email recipient smru-it@shoklo-unit.com Email sender smru-sfw-<site>@shoklo-unit.com ■ Send weekly configuration backup ■ Specify and external mail server Mail server IPv4 address/FQDN eu-smtp-outbound-1.mimecast.com Port (Default - 25) 587 □ Encrypt the connection when possible ■ Requires an encrypted TLS connection ■ Authentication required User name smru-sfw-<site>@shoklo-unit.com Password ********
-
Click Continue.
-
Click Finish.
-
Wait for the Firewall to finish the restart.
-
Login with admin user.
-
Optional: Check I do not want to register now.
-
Click Continue.
-
Select admin > Logout.
-
Close Browser.
-
-
Optional: Uncheck I do not want to register now.
-
Click Continue.
-
Click Sign In.
-
Type
smru-it@shoklo-unit.comin Email address field. -
Type the password in Password field.
-
Click Sign In.
-
Check I’m not a robot.
-
Click Continue.
-
Click Confirm Registration.
-
Click Initiate Licanse Synchronization.
-
Optional: Click Continue.
-
Click Continue.
Licensed features Feature Status Expiry ------- ------ ------ Base firewall Subscribed Tue 31 Dec 2999 Network protection Unsubscribed - Web protection Unsubscribed - Email protection Unsubscribed - Web server protection Unsubscribed - Sandstorm Unsubscribed - Enhanced support Unsubscribed - Enhanced plus support Unsubscribed -
-
Click Continue.
-
Select admin > Logout.
-
Close Browser.
-
5.2. Activate Subscription
-
Login to the Firewall.
-
Select SYSTEM > Administration.
-
Select the Licensing tab.
-
Click Activate subscription.
-
Type the license key in the Enter your license key for this device field.
-
Click Verify key.
-
Click Confirm for confirmation.
-
Optional: Click Synchronize to sync the license.
-
Logout from the Firewall.
-
Close Browser.
6. Console
-
Start Terminal.
-
Type
adminfor the password and press Enter.1. Network Configuration 2. System Configuration 3. Route Configuration 4. Device Console 5. Device Management 6. VPN Management 7. Shutdown/Reboot Device 0. Exit
1. Reset to Factory Defaults 2. Show Firmware(s) 3. Advanced Shell 4. Flush Device Reports 0. Exit
6.1. Advanced Shell
-
Start Terminal.
-
Type
adminfor the password and press Enter. -
Type
5for Device Management and press Enter. -
Type
3for Advanced Shell and press Enter.
6.1.1. Admin Service Access
6.1.2. Logs
-
Enter the following commands at a Command Line.
vi /log/syslog.log grep -ir 'user portal' /log/ grep -ir 'block admin console' /log/ vi /log/applog.log vi /log/csc.log
6.1.3. Postgresql Database
-
See https://it-tech.wiki/en/2023/11/08/sophos-firewall-database-tables.
-
Enter the following commands at a Command Line.
# List database tables. psql -U pgroot -d corporate -c '\dt' # List users. psql -U pgroot -d corporate -c "select * from tbluser;" # Enter interactive mode. psql -U nobody -d corporate # Show help for psql commands. \? SELECT * FROM tblhost; SELECT * FROM tblfwsource; SELECT * FROM tblfwdest; # Exit interactive mode. \q
6.1.4. Scheduled Jobs
-
See https://community.sophos.com/sophos-xg-firewall/f/discussions/74332/how-to-schedule-a-script-crontab.
-
Enter the following commands at a Command Line.
timer all:summary -ds nosync
6.1.5. Scripts
-
See https://www.avanet.com/en/kb/sophos-firewall-run-scripts.
-
Enter the following commands at a Command Line.
iptables -t filter -L | grep -i drop vi /scripts/check_emp.sh mount -no remount,rw / vi /scripts/check_emp.sh # Comment out all "touch /conf/emp_wan_portal_tel" lines. # Comment out all "disable_portals_on_wan=1" lines. mount -no remount,ro / ls -al /conf/emp_wan_portal_tel rm /conf/emp_wan_portal_tel # Remove the two automatic rules in the "Administration > Devices access > Local service ACL exception rule" section.
6.2. Device Console
-
Start Terminal.
-
Type
adminfor the password and press Enter. -
Type
4for Device Console and press Enter.
6.2.1. Appliance Access
-
Note: Enabling appliance access will disconnect all zones from the internet due to all internet traffic will be dropped.
-
Note: This will cause a network interruption, override the configured Appliance Access, and allow access to all the services.
-
Enter the following commands at a Command Line.
system appliance_access enable system appliance_access disableThis will override the configured Appliance Access and allow access to all the services. All internet traffic will be dropped. Appliance access enabled. Appliance access disabled.
-
Enter the following commands at a Command Line.
psql -U nobody -d corporate -c "select destinationport from tbllocalservicedetails WHERE localserviceid =2" psql -U nobody -d corporate -c "select * from tbladmin_service_access" psql -U nobody -d corporate -c "select * from tbladmin_service_rel" psql -U nobody -d corporate -c "select * from tbladmin_service_access where ruleaction = 'drop'" psql -U nobody -d corporate -c "select * from tbladmin_service_access where ipfamily = '0' and ruleaction = 'drop'" psql -U nobody -d corporate -c "select * from tbladmin_service_rel where accessid = 2" psql -U nobody -d corporate -c "delete from tbladmin_service_rel where accessid = 2" psql -U nobody -d corporate -c "delete from tbladmin_service_access where ipfamily = '0' and ruleaction = 'drop'" # Restart the firewall for the changes to take effect. service -SERROR: update or delete on table "tbladmin_service_access" violates foreign key constraint "tbladmin_service_rel_accessid_fkey" on table "tbladmin_service_rel" DETAIL: Key (id)=(3) is still referenced from table "tbladmin_service_rel". ERROR: update or delete on table "tbladmin_service_access" violates foreign key constraint "tbladmin_service_rel_accessid_fkey" on table "tbladmin_service_rel" DETAIL: Key (id)=(2) is still referenced from table "tbladmin_service_rel".
6.3. Micro USB
-
Connect the Micro USB cable (console cable) with Sophos XGS and the computer.
-
Install the Virtual COM Port driver.
-
Run the CDM212364_Setup.exe with administrative privileges.
-
Click Extract.
-
Click Next.
-
Choose I accept this agreement.
-
Click Next.
-
Click Finish.
-
-
Open Device Manager to check whether the Virtual COM Port and USB drivers are installed correctly.
-
If the USB driver is not installed correctly, run windows update (with WSUS disabled) to install the USB driver correctly.
-
Connect to the Device Console.
-
Check the USB Serial Port whether it is COM1, COM2, COM3, or etc in Device Manager > Port (COM & LPT).
-
Start Putty.
-
Choose Serial for Connection type.
-
Type
<COM3>in the Serial line field. -
Type
38400in the Speed field. -
Click Open.
-
Type the admin password and press Enter.
-
6.4. Reboot
-
Start Terminal.
-
Type
adminfor the password and press Enter. -
Type
7for Shutdown/Reboot Device and press Enter. -
Type
rto reboot and press Enter. -
Close Terminal.
6.5. Serial Cable
-
Start Putty.
-
Choose Serial for Connection type.
-
Type
COM1in the Serial line field. -
Type
38400in the Speed field. -
Click Open.
-
Type the admin password and press Enter.
7. Configuration
-
Note: Connect the Firewall with WAN.
7.1. Device access
-
Browse to https://10.10.1.170:4444.
-
Log in as admin user.
-
Select SYSTEM | Administration.
-
Select the Device access tab.
-
MST: Check only HTTPS, SSH, AD SSO, Captive portal, Radius SSO, Clients, Ping/Ping6, DNS, Wireless Protection, Web proxy, SSL VPN, VPN Portal, User Portal, SMTP Relay, SNMP on LAN Zone.
-
Sites: Check only HTTPS, SSH, Ping/Ping6, DNS, Wireless Protection, SNMP on LAN Zone.
-
MST: Check only SSL VPN on WAN zone.
-
Check HTTPS, SSH, Ping/Ping6, DNS, SNMP on VPN Zone.
-
Click Apply.
7.1.1. Local service ACL exception rule
-
Select SYSTEM > Administration.
-
Select the Device access tab.
-
Click Add under Local service ACL exception rule.
Rule name Admin console WAN access from MORU Rule position Top Description IP version ● IPv4 ○ IPv6 Source zone WAN Source Network /Host MORU Public IP Destination host MST Public IP Services HTTPS Action ● Accept ○ Drop
-
Click Save.
7.2. Guest Network
-
Browse to https://10.10.1.170:4444.
-
Log in as admin user.
Zones
-
Select CONFIGURE > Network.
-
Select Zones.
-
Click Add.
Name LAN-Ruckus-Guest Description Type ● LAN ○ DMZ Members None Device access Admin services □ HTTPS □ SSH Authentication services □ Client authentication □ Captive portal □ AD SSO □ RADIUS SSO □ Chromebook SSO Network services ■ DNS ■ Ping/ping6 Other services □ Web proxy ■ SSL VPN tunnel □ Wireless protection □ User portal □ Dynamic routing □ SNMP □ SMTP relay □ VPN portal -
Click Save.
Interfaces
-
Select CONFIGURE > Network.
-
Select Interfaces.
-
Click Port4.
General settings Name Port4-Guest Hardware Port4 Hardware zone Guest ■ IPv4 configuration IP assignment ● Static ○ PPoE(DSL) ○ DHCP IPv4/netmask 192.168.88.170 /24(255.255.255.0) Gateway detail Gateway name Gateway IP □ IPv6 configuration
-
Click Save.
-
Click Update interface.
Traffic shaping
-
Select CONFIGURE > System services.
-
Select the Traffic shaping tab.
-
Click Add.
Name Guest Network Traffic Policy association ○ Users ● Rules ○ Web categories ○ Applications Rule type ● Limit ○ Guarantee Limit upload/download separately ○ Disable * Enable Priority 2 - [Normal] Upload bandwidth 7168 KB/s Download bandwidth 2048 KB/s Bandwidth usage type ● Individual ○ Shared Description
-
Click Save.
Authentication Groups
-
Select CONFIGURE > Authentication.
-
Select the Groups tab.
-
Click Add.
Group name Guest Admin Group Description The group member can create voucher for Guest WiFi. Group type normal Policies Surfing quota Unlimited Internet Access Access time Allowed all the time Network traffic None Traffic shaping None Remote access No policy applied Clientless No policy applied L2TP ○ Enable ● Disable PPTP ○ Enable ● Disable Quarantine digest ○ Enable ● Disable MAC binding ○ Enable ● Disable IPsec remote access ○ Enable ● Disable Login restriction ● Any node ○ Selected nodes ○ Node range
-
Click Save.
Authentication Users
-
Select CONFIGURE > Authentication.
-
Select the Users tab.
-
Click Add.
Username IT Name SMRU IT Description The user can create voucher for Guest WiFi. User type ● User . Administrator Profile Password Email smru-it@shoklo-unit.com Policies Group Guest Admin Group Surfing quota Unlimited Internet Access Access time Allowed all the time Network traffic None Traffic shaping None SSL VPN policy Remote access No policy applied Clientless No policy applied IPsec remote access ○ Enable ● Disable IP address L2TP ○ Enable ● Disable IP address PPTP ○ Enable ● Disable IP address Quarantine digest ○ Enable ● Disable MAC binding ○ Enable ● Disable MAC address list Simultaneous sign-ins ■ Use global setting ■ Unlimited Login restriction ○ Any node ● User group node(s) ○ Selected nodes ○ Node range -
Click Save.
Hotspot voucher definitions
-
Select PROJECT > Wireless.
-
Select the Hotspot voucher definitions tab.
-
Click Add.
VisitorsName 7Days Description Validity period 7 Days Time quota Minutes Data volume MB
StaffName 180Days Description Validity period 180 Days Time quota Minutes Data volume MB
-
Click Save.
Hotspots
-
Select PROJECT > Wireless.
-
Select Hotspots.
-
Click Add.
Name SMRU_Guest Description Interfaces Port4-Guest Application filter policy None Web policy None IPS policy None Traffic shaping policy Guest Network Traffic Redirect to HTTPS OFF Hotspot type Voucher Voucher definitions 7Days 180Days Devices per voucher 1 Administrative users Guest Admin Group Users have to accept terms of use ON Terms of use Don't do bad things. Redirect to URL after login OFF *Hotspot customization* Enable customization ON Customization type Basic Logo Browse | 150SMRU_RGB.png Scale logo to recommended size ON Title Custom text Voucher template Browse -
Click Save.
-
Click OK.
Hotspot settings
-
Select PROJECT > Wireless.
-
Select Hotspot settings tab.
-
Select OFF to turn on the Delete expired vouchers.
-
Type
3for the Delete expired vouchers after. -
Click Apply.
7.2.1. Create Voucher
-
Browse to https://10.10.1.170/userportal
-
Log in as IT user.
-
Select Hotspots.
VisitorsHotspot SMRU_Guest Hotspot voucher definitions 7Days Amount 20 Description Visitors - YYYY-MM-DD Print OFF Page size A4 (210x297 mm) Vouchers per page 1 Add QR code OFF
StaffHotspot SMRU_Guest Hotspot voucher definitions 180Days Amount 20 Description Staff - YYYY-MM-DD Print OFF Page size A4 (210x297 mm) Vouchers per page 1 Add QR code OFF
-
Click Create Vouchers.
7.3. Smarthost and Relay
-
Browse to https://10.10.1.170:4444.
-
Log in as admin user.
-
Select PROTECT > Email.
-
Select the General settings tab.
-
Check Use smarthost.
■ Use smarthost Hostname: eu-smtp-outbound-1.mimecast.com Port: 587 ■ Authenticate device with smarthost User name: relay@shoklo-unit.com Password: ********
-
Click Apply.
-
Select the Relay settings tab.
Host based relay Allow relay from hosts/network MST Local Network MST DMZ Network Block relay from hosts/networks Any Upstream host Allow relay from hosts/network Block relay from hosts/networks Any Authenticated relay settings □ Enable authenticated relay Users and group -
Click Apply.
-
Log out from Sophos firewall.
-
Close Browser.
7.4. Secure Storage Master key
-
Browse to https://192.168.##.170:4444.
-
Log in as admin user.
-
Click Create key.
-
Type the master key in Enter the secure storage master key field.
-
Type the master key again in Enter your key again to confirm field.
-
Check I have stored the master key in a password manager or another safe place.
-
Click Create key.
-
Log out from Sophos firewall.
-
Close Browser.
7.5. Captcha
-
Enter the following commands at a Command Line.
-
Enter the following command line in Device Console.
system captcha-authentication-vpn show system captcha-authentication-vpn disable system captcha-authentication-vpn show
7.6. Hosts and Services
-
Note: When adding entries enclose the name in double quotes. This makes the entries show at the top of the first page. It also makes the entries stand out from the default entries.
7.6.1. IP host
-
Select SYSTEM | Host and services.
-
Select the IP host tab.
-
Click Add.
-
Type
<Site>in Name field. -
Choose IPv4 for IP version.
-
Choose Network for Type.
-
MST: Type
10.10.1.0in IP address field. -
<Site>: Type
192.168.##.0in IP address field. -
Click Save.
Table 1. HO Name Type Address detail IP version IP - 192.168.26.22
IP address
192.168.26.22/255.255.255.255
IPv4
IP - 10.10.1.41
IP address
10.10.1.41/255.255.255.255
IPv4
IP - 10.10.1.42
IP address
10.10.1.42/255.255.255.255
IPv4
IP - 10.10.1.43
IP address
10.10.1.43/255.255.255.255
IPv4
IP - 10.10.1.44
IP address
10.10.1.44/255.255.255.255
IPv4
IP - 10.10.1.45
IP address
10.10.1.45/255.255.255.255
IPv4
IP - 10.10.1.46
IP address
10.10.1.46/255.255.255.255
IPv4
IP - 10.10.1.47
IP address
10.10.1.47/255.255.255.255
IPv4
IP - 10.10.1.48
IP address
10.10.1.48/255.255.255.255
IPv4
IP - 10.10.1.49
IP address
10.10.1.49/255.255.255.255
IPv4
IP - 10.10.1.50
IP address
10.10.1.50/255.255.255.255
IPv4
IP - 10.10.1.51
IP address
10.10.1.51/255.255.255.255
IPv4
IP - 10.10.1.52
IP address
10.10.1.52/255.255.255.255
IPv4
IP - 10.10.1.53
IP address
10.10.1.53/255.255.255.255
IPv4
IP - 10.10.1.54
IP address
10.10.1.54/255.255.255.255
IPv4
IP - 10.10.1.55
IP address
10.10.1.55/255.255.255.255
IPv4
IP - 61.19.12.16
IP address
61.19.12.16/255.255.255.255
IPv4
IP - 61.19.12.18
IP address
61.19.12.18/255.255.255.255
IPv4
IP - 61.19.12.57
IP address
61.19.12.57/255.255.255.255
IPv4
IP - 64.4.11.25
IP address
64.4.11.25/255.255.255.255
IPv4
IP - 65.52.98.231
IP address
65.52.98.231/255.255.255.255
IPv4
IP - 118.214.190.43
IP address
118.214.190.43/255.255.255.255
IPv4
IP - 118.214.190.73
IP address
118.214.190.73/255.255.255.255
IPv4
IP - 130.14.29.110
IP address
130.14.29.110/255.255.255.255
IPv4
IP - 165.112.7.20
IP address
165.112.7.20/255.255.255.255
IPv4
IP - 203.147.56.230
IP address
203.147.56.230/255.255.255.255
IPv4
IP - 203.147.56.231
IP address
203.147.56.231/255.255.255.255
IPv4
IP - 209.25.134.45
IP address
209.25.134.45/255.255.255.255
IPv4
IP - 209.25.170.7
IP address
209.25.170.7/255.255.255.255
IPv4
IP - 209.25.195.94
IP address
209.25.195.94/255.255.255.255
IPv4
MORU Public IP - 203.147.41.226
IP address
203.147.41.226/255.255.255.255
IPv4
MORU Public IP - 203.147.41.240
IP address
203.147.41.240/255.255.255.255
IPv4
MORU Local Network
IP subnet
10.0.0.0/255.255.255.0
IPv4
MST Public IPs
IP range
110.77.143.112-110.77.143.119
IPv4
MST Public IP - 110.77.143.113
IP address
110.77.143.113/255.255.255.255
IPv4
MST Public IP - 110.77.143.114
IP address
110.77.143.114/255.255.255.255
IPv4
MST Public IP - 110.77.143.115
IP address
110.77.143.115/255.255.255.255
IPv4
MST Public IP - 110.77.143.116
IP address
110.77.143.116/255.255.255.255
IPv4
MST Public IP - 110.77.143.117
IP address
110.77.143.117/255.255.255.255
IPv4
MST Public IP - 110.77.143.118
IP address
110.77.143.118/255.255.255.255
IPv4
MST Public IP - 110.77.148.10
IP address
110.77.148.10/255.255.255.255
IPv4
MST DMZ Network
IP subnet
10.10.0.0/255.255.255.0
IPv4
IP - TBHF-WEB-MRM
IP address
10.10.0.1/255.255.255.255
IPv4
MST Local Network
IP subnet
10.10.1.0/255.255.255.0
IPv4
MRM SSL VPN Network
IP subnet
10.10.9.0/255.255.255.0
IPv4
IP - SMRU-AD02
IP address
10.10.1.1/255.255.255.255
IPv4
IP - tbhf-anc-mrm
IP address
10.10.1.2/255.255.255.255
IPv4
IP - SMRU-SRV
IP address
10.10.1.3/255.255.255.255
IPv4
IP - tbhf-doc-mrm
IP address
10.10.1.4/255.255.255.255
IPv4
IP - tbhf-dwh-mrm
IP address
10.10.1.5/255.255.255.255
IPv4
IP - tbhf-ops-mrm
IP address
10.10.1.6/255.255.255.255
IPv4
IP - TBHF-SYS-MRM
IP address
10.10.1.7/255.255.255.255
IPv4
IP - tbhf-tst-mrm
IP address
10.10.1.8/255.255.255.255
IPv4
IP - SMRU-VEEAM01
IP address
10.10.1.9/255.255.255.255
IPv4
IP - tbhf-kvm-mrm
IP address
10.10.1.11/255.255.255.255
IPv4
IP - SMRU-NPS01
IP address
10.10.1.12/255.255.255.255
IPv4
IP - S-STOR01
IP address
10.10.1.13/255.255.255.255
IPv4
IP - SMRU-HyperV01
IP address
10.10.1.25/255.255.255.255
IPv4
IP - SMRU-IT03
IP address
10.10.1.15/255.255.255.255
IPv4
IP - SMRU-DBP-MST
IP address
10.10.1.17/255.255.255.255
IPv4
IP - SMRU-DBD-MST
IP address
10.10.1.19/255.255.255.255
IPv4
IP - SMRU-FW01
IP address
10.10.1.23/255.255.255.255
IPv4
IP - S-VPLUS01
IP address
10.10.1.24/255.255.255.255
IPv4
MRH Local Network
IP subnet
10.20.1.0/255.255.255.0
IPv4
MST Guest Network
IP subnet
192.168.88.0/255.255.255.0
IPv4
MKT Local Network
IP subnet
192.168.25.0/255.255.255.0
IPv4
MLA Local Network
IP subnet
192.168.26.0/255.255.255.0
IPv4
WPA Local Network
IP subnet
192.168.27.0/255.255.255.0
IPv4
MSL Local Network
IP subnet
192.168.28.0/255.255.255.0
IPv4
HPH Local Network
IP subnet
192.168.29.0/255.255.255.0
IPv4
SKK Local Network
IP subnet
192.168.30.0/255.255.255.0
IPv4
MKU Local Network
IP subnet
192.168.31.0/255.255.255.0
IPv4
TST Local Network
IP subnet
10.30.1.0/255.255.255.0
IPv4
IP - tbhf-anc-mkt
IP address
192.168.25.2/255.255.255.255
IPv4
IP - tbhf-anc-mla
IP address
192.168.26.2/255.255.255.255
IPv4
IP - tbhf-anc-wpa
IP address
192.168.27.2/255.255.255.255
IPv4
IP - tbhf-anc-msl
IP address
192.168.28.2/255.255.255.255
IPv4
IP - SMRU-PMS-MKT
IP address
192.168.25.6/255.255.255.255
IPv4
IP - SMRU-PMS-MLA
IP address
192.168.26.6/255.255.255.255
IPv4
IP - SMRU-PMS-WPA
IP address
192.168.27.6/255.255.255.255
IPv4
IP - SMRU-PMS-MSL
IP address
192.168.28.6/255.255.255.255
IPv4
Table 2. BO Name Type Address detail IP version MST Local Network
IP subnet
10.10.1.0/255.255.255.0
IPv4
MRM SSL VPN Network
IP subnet
10.10.9.0/255.255.255.0
IPv4
SMRU-AD02
IP address
10.10.1.1/255.255.255.255
IPv4
tbhf-anc-mrm
IP address
10.10.1.2/255.255.255.255
IPv4
SMRU-SRV
IP address
10.10.1.3/255.255.255.255
IPv4
SMRU-IT03
IP address
10.10.1.15/255.255.255.255
IPv4
SMRU-DBP-MST
IP address
10.10.1.17/255.255.255.255
IPv4
SMRU-DBD-MST
IP address
10.10.1.19/255.255.255.255
IPv4
MRH Local Network
IP subnet
10.20.1.0/255.255.255.0
IPv4
MKT Local Network
IP subnet
192.168.25.0/255.255.255.0
IPv4
MLA Local Network
IP subnet
192.168.26.0/255.255.255.0
IPv4
WPA Local Network
IP subnet
192.168.27.0/255.255.255.0
IPv4
MSL Local Network
IP subnet
192.168.28.0/255.255.255.0
IPv4
HPH Local Network
IP subnet
192.168.29.0/255.255.255.0
IPv4
SKK Local Network
IP subnet
192.168.30.0/255.255.255.0
IPv4
MKU Local Network
IP subnet
192.168.31.0/255.255.255.0
IPv4
TST Local Network
IP subnet
10.30.1.0/255.255.255.0
IPv4
tbhf-anc-mkt
IP address
192.168.25.2/255.255.255.255
IPv4
tbhf-anc-mla
IP address
192.168.26.2/255.255.255.255
IPv4
tbhf-anc-wpa
IP address
192.168.27.2/255.255.255.255
IPv4
tbhf-anc-msl
IP address
192.168.28.2/255.255.255.255
IPv4
SMRU-PMS-MKT
IP address
192.168.25.6/255.255.255.255
IPv4
SMRU-PMS-MLA
IP address
192.168.26.6/255.255.255.255
IPv4
SMRU-PMS-WPA
IP address
192.168.27.6/255.255.255.255
IPv4
SMRU-PMS-MSL
IP address
192.168.28.6/255.255.255.255
IPv4
-
Content of Entities.xml file.
<?xml version="1.0" encoding="UTF-8"?> <Configuration APIVersion="1800.2" IPS_CAT_VER="1"> <IPHost transactionid=""> <Name>MST Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>10.10.1.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>MRM SSL VPN Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>10.10.9.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>SMRU-AD02</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.1</IPAddress> </IPHost> <IPHost transactionid=""> <Name>tbhf-anc-mrm</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.2</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-SRV</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.3</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-IT03</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.15</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-DBP-MST</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.17</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-DBD-MST</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>10.10.1.19</IPAddress> </IPHost> <IPHost transactionid=""> <Name>MRH Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>10.20.1.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>MKT Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.25.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>MLA Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.26.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>WPA Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.27.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>MSL Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.28.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>HPH Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.29.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>SKK Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.30.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>MKU Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.31.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>TST Local Network</Name> <IPFamily>IPv4</IPFamily> <HostType>Network</HostType> <IPAddress>192.168.32.0</IPAddress> <Subnet>255.255.255.0</Subnet> </IPHost> <IPHost transactionid=""> <Name>tbhf-anc-mkt</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.25.2</IPAddress> </IPHost> <IPHost transactionid=""> <Name>tbhf-anc-mla</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.26.2</IPAddress> </IPHost> <IPHost transactionid=""> <Name>tbhf-anc-wpa</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.27.2</IPAddress> </IPHost> <IPHost transactionid=""> <Name>tbhf-anc-msl</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.28.2</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-PMS-MKT</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.25.6</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-PMS-MLA</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.26.6</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-PMS-WPA</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.27.6</IPAddress> </IPHost> <IPHost transactionid=""> <Name>SMRU-PMS-MSL</Name> <IPFamily>IPv4</IPFamily> <HostType>IP</HostType> <IPAddress>192.168.28.6</IPAddress> </IPHost> </Configuration>
7.6.2. MAC host
-
Select SYSTEM | Host and services.
-
Select the MAC host tab.
-
Add the following rules.
Table 3. HO Name Type Address detail MAC - MAL-iMAC-01 (ethernet)
Address
78:7B:8A:CE:D6:37
MAC - TBHF-PI-MRM (ethernet)
Address
B8:27:EB:03:29:E4
MAC - TBHF-PI-MRM (wireless)
Address
B8:27:EB:56:7C:B1
MAC - SMRUNB-CB08 (ethernet)
Address
A4:BB:6D:1A:60:6C
MAC - SMRUNB-CB08 (wireless)
Address
40:23:43:CF:55:F1
MAC - SMRUNB-DC04 (ethernet)
Address
98:E7:43:83:16:DB
MAC - SMRUNB-DC04 (wireless)
Address
4C:1D:96:3A:9D:37
MAC - SMRUNB-IT02 (wireless)
Address
0C:96:E6:B4:52:3D
MAC - SMRUWS-IT07
Address
E4:54:E8:6B:F8:D7
MAC - SMRUWS-IT08
Address
D0:67:E5:22:B5:A1
MAC - SMRUWS-IT11
Address
E4:54:E8:6B:EA:6E
MAC - SMRUWS-LB32
Address
18:66:DA:46:B8:E4
MAC - SMRUWS-MGT01
Address
34:17:EB:B4:CA:8C
MAC - TBHFWS-IT01
Address
E4:54:E8:64:C2:32
MAC - TBHFWS-IT02
Address
E4:54:E8:64:B9:8A
7.6.3. FQDN host
7.6.3.1. Adding FQDN Host
-
Select SYSTEM | Host and services.
-
Select the FQDN host tab.
-
Click Add.
Name "*.facebook.com" Description To allow direct access to primary domain and subdomains of facebook FQDN *.facebook.com
-
Click Save.
-
Add the following rules.
Table 4. HO Name FQDN SMRU - *.anydesk.com
*.anydesk.com
SMRU - outlook.office365.com
outlook.office365.com
SMRU - vpn.ox.ac.uk
vpn.ox.ac.uk
"eu-smtp-outbound-1.mimecast.com"
eu-smtp-outbound-1.mimecast.com
SMRU - ngs.sanger.ac.uk
ngs.sanger.ac.uk
SMRU - ipinfo.io
ipinfo.io
SMRU - www.bhf-th.org
www.bhf-th.org
SMRU - www.shoklo-unit.com
www.shoklo-unit.com
SMRU - sugarproxy.sharpcast.com
sugarproxy.sharpcast.com
SMRU - malariaapp.ddc.moph.go.th
malariaapp.ddc.moph.go.th
7.6.4. Services
-
Select SYSTEM | Host and services.
-
Select the Services tab.
-
Add the following rules.
Table 5. HO Name Protocol Detail "SMRU" RPC
TCP/UDP
TCP (1:65535) / (135)
TCP 137
TCP/UDP
TCP (1:65535) / (137)
TCP 138
TCP/UDP
TCP (1:65535) / (138)
TCP 222
TCP/UDP
TCP (1:65535) / (222)
"SMRU" SMB
TCP/UDP
TCP (1:65535) / (445)
TCP UDP 500
TCP/UDP
TCP (1:65535) / (500), UDP (1:65535) / (500)
UDP 514
TCP/UDP
UDP (1:65535) / (514)
TCP UDP 1194
TCP/UDP
TCP (1:65535) / (1194), UDP (1:65535) / (1194)
"SMRU" MSSQL
TCP/UDP
TCP (1:65535) / (1433)
TCP 2222
TCP/UDP
TCP (1:65535) / (2222)
TCP 3389 (RDP)
TCP/UDP
TCP (1:65535) / (3389)
TCP UDP 4500
TCP/UDP
TCP (1:65535) / (4500), UDP (1:65535) / (4500)
TCP 6027 (PMP)
TCP/UDP
TCP (1:65535) / (6027)
TCP 6383 (PMP)
TCP/UDP
TCP (1:65535) / (6383)
TCP 6568 (AnyDesk)
TCP/UDP
TCP (1:65535) / (6568)
TCP 8000
TCP/UDP
TCP (1:65535) / (8000)
TCP 8080
TCP/UDP
TCP (1:65535) / (8080)
"SMRU" WSUS
TCP/UDP
TCP (1:65535) / (8530)
TCP UDP 9100 (Printing)
TCP/UDP
TCP (1:65535) / (9100), UDP (1:65535) / (9100)
TCP 10000:10099
TCP/UDP
TCP (1:65535) / (10000:10099)
TCP 19812:19814 (FreezerWorks)
TCP/UDP
TCP (1:65535) / (19812:19814)
TCP 22000:22099
TCP/UDP
TCP (1:65535) / (22000:22099)
TCP 22222
TCP/UDP
TCP (1:65535) / (22222)
TCP 23560 (PRTG)
TCP/UDP
TCP (1:65535) / (23560)
TCP 33000:33099
TCP/UDP
TCP (1:65535) / (33000:33099)
Table 6. BO Name Protocol Detail LINE
TCP/UDP
UDP (1:65535) / (1025:65535)
"SMRU" MSSQL
TCP/UDP
TCP (1:65535) / (1433)
"SMRU" RPC
TCP/UDP
TCP (1:65535) / (135)
TCP 137
TCP/UDP
TCP (1:65535) / (137)
TCP 138
TCP/UDP
TCP (1:65535) / (138)
"SMRU" SMB
TCP/UDP
TCP (1:65535) / (445)
"SMRU" WSUS
TCP/UDP
TCP (1:65535) / (8530)
7.7. Interfaces
7.7.1. WAN
PPPoE option for HO:
-
Select CONFIGURE | Network.
-
Select the Interfaces tab.
-
Select Port2.
General settings Name WAN-Port2 Hardware Port2 Network zone WAN ■ IPv4 configuration IP assignmet ○ Static ● PPPoE(DSL) ○ DHCP IPv4/netmask Preferred IP Gateway detail Gateway name smru-sfw-<site>_WAN-Port2 Gateway IP 128.0.0.1 Username ndno14657104@onnet.hp Password ******** ******** Access concentrator/service name / □ LCP echo interval Send LCP echo request every 20 seconds (5-180, default:20) □ LCP failure Wait for LCP echo reply for 3 attempts (default:3) Schedule time for reconnect All days of the week 00 HH 00 MM □ IPv6 configuration DSL settings □ VDSL VLAN tag Advanced settings Interface speed Auto Negotiation MTU 1500 □ Override MSS 1452 ● Use default MAC address ##:##:##:##:##:## ○ Override default MAC address -
Click Save.
-
Click Update interface.
Aliases:
-
Note: This allows you to ping 110.77.143.113, 110.77.143.114, etc.
-
Select Network > Interfaces.
-
Select Add interface > Add alias.
-
Select WAN for the Physical interface.
-
Choose IPv4.
-
Type
110.77.143.113for the IPv4 / Netmask field. -
Type
110.77.143.114for the IPv4 / Netmask field. -
Type
110.77.143.115for the IPv4 / Netmask field. -
Type
110.77.143.116for the IPv4 / Netmask field. -
Type
110.77.143.117for the IPv4 / Netmask field. -
Type
110.77.143.118for the IPv4 / Netmask field. -
Click Save.
DHCP option for BO:
-
Note: For 3G/4G see WWAN1 Interface.
-
Select CONFIGURE | Network.
-
Select the Interfaces tab.
-
Select Port2.
General settings Name WAN-Port2 Hardware Port2 Network zone WAN ■ IPv4 configuration IP assignmet ○ Static ○ PPPoE(DSL) ● DHCP IPv4/netmask Preferred IP Gateway detail Gateway name smru-sfw-<site>_WAN-Port2 Gateway IP 128.0.0.1
-
Click Save.
-
Click Update interface.
7.7.2. LAN
BO:
-
Select CONFIGURE | Network.
-
Select the Interfaces tab.
-
Select br0.
General settings Name LAN-br0 Hardware br0 Description ■ Enable routing on this bridge pair Member interfaces Interface Zone Port1 LAN Port3 LAN Port4 LAN Port5 LAN Port6 LAN Port7 LAN Port8 LAN Port9 LAN Port10 LAN Port11 LAN Port12 LAN ■ IPv4 configuration IP assignment ● Static ○ DHCP IPv4/netmask 192.168.##.170/24(255.255.255.0) Gateway detail Gateway name Gateway IP □ IPv6 configuration VLAN □ Filter VLANs -
Click Save.
-
Click Update bridge.
7.8. WAN link manager
7.8.1. Active gateway
-
Select CONFIGURE | Network.
-
Select WAN link manager.
-
Fiber Optic: Click Edit on WAN-Port2 interface.
-
WWAN1: Click Edit on WWAN1 interface.
-
Fiber Optic: Type
smru-sfw-<site>_WAN-Port2in Name field. -
WWAN1: Type
smru-sfw-<site>_WWANin Name field. -
Choose Active.
-
Type
1in the Weight field. -
Click Save.
7.8.2. Load Balance and Failover
7.8.3. Failover rules
-
Select CONFIGURE | Network.
-
Select WAN link manager.
-
Fiber Optic: Click Edit on WAN-Port2 interface.
-
WWAN1: Click Edit on WWAN1 interface.
-
SMRU-SFW-MRM: Click Edit on Port2-WAN-CAT interface.
-
SMRU-SFW-MRM: Click Edit on Port5-WAN-3BB interface.
-
Click Add or Edit under Failover rules.
-
Click Save.
SMRU-SFW-MRM Port2-WAN-CAT Active If Not able to PING on IP address '8.8.8.8' Then "SHIFT to another available gateway" SMRU-SFW-MRM Port5-WAN-3BB Backup If Not able to PING on IP address '8.8.8.8' Then "SHIFT to another available gateway"
-
Select PROTECT | Rules and policies.
-
Select the NAT rules tab.
-
Make sure that the Default SNAT IPv4 NAT rule is enabled.
Rule name Default SNAT IPv4 Description Auto created IPv4 SNAT MASQ rule for traffic from "ANY" inbound interface to WAN outbound interface. Updated automatically with WAN interface changes Original source Any Original destination Any Original service Any Translated source (SNAT) MASQ Translated destination (DNAT) Original Translated service (PAT) Original Inbound interface Any Outbound interface WAN WAN-3BB □ Override source translation (SNAT) for specified outbound interfaces
7.9. Dynamic DNS
-
Note: The Sophos Dynamic DNS myfirewall.co is discontinued after 31 January 2022.
-
Note: We don’t need to add DynDns on the sites firewall when using Site-to-site SSL VPN.
-
Select CONFIGURE | Network.
-
Select the Dynamic DNS tab.
-
Click Add.
-
DynDns Type
smru-sfw-<site>.dyndns.orgin Hostname field. -
Sophos Type
smru-sfw-<site>.myfirewall.coin Hostname field.
-
LAN: Select WAN-Port2 in Interface dropdown list.
-
3G/4G module: Select WWAN1 in Interface dropdown list.
-
Choose NATed public IP.
-
DynDns Select DynDns in Service provider dropdown list.
-
Type
SMRUin Login name field. -
Type the password in Password field.
-
-
Sophos Select Sophos in Service provider dropdown list.
DynDnsHost details Hostname smru-sfw-<site>.dyndns.org Interface WAN-Port2 - 192.168.1.## # LAN Interface WWAN1 - ###.###.###.### # 3G/4G module IPv4 address ○ Use port IP ● NATed public IP Service provider’s details Service provider DynDns Login name SMRU Password ********
-
Click Save.
7.10. VPN IPsec
7.11. Web
7.11.1. Policies
-
To Continue.
-
Select PROTECT | Web.
-
Select the Policies tab.
Table 7. "SMRU" Guest Network Web Filter Users Activities Action Constraints Manage Status Anybody
Criminal Activities
Games and Gambling
Nudity and Adult Content
Advertisements
Criminal Activity
Gambling
Games
Hacking
Nudity
Phishing & Fraud
Sexually Explicit
Spam URLs
Spyware & MalwareHTTP is blocked HTTPS is blocked
Add rule Clone Delete
ON
Table 8. "SMRU" Local Network Web Filter Users Activities Action Constraints Manage Status Anybody
Advertisements
Criminal Activity
Gambling
Games
Hacking
Nudity
Phishing & Fraud
Sexually Explicit
Spam URLs
Spyware & MalwareHTTP is blocked HTTPS is blocked
Add rule Clone Delete
ON
SMRU-SFW-MRM Allow Youtube
Youtube
HTTP is allowed
Add rule Clone Delete
ON
Anybody
Youtube
HTTP is blocked HTTPS is blocked
Add rule Clone Delete
ON
7.11.2. Catagories
-
Select PROTECT | Web.
-
Select the Categories tab.
-
Click Add.
Name youtube.com Description Classification Acceptable Traffic shaping policy None Configure category ● Local ○ External URL database Import domain/keyword Domain Keyword Browse Browse Domain/keyword youtube.com youtube.com -
Click Save.
Name Type Classification Traffic shaping policy facebook.com
Custom
Unproductive
twitter.com
Custom
Unproductive
youtube.com
Custom
Unproductive
acrobat.com
Custom
Productive
adobe.com
Custom
Productive
anydesk.com
Custom
Productive
dashlane.com
Custom
Productive
dropbox.com
Custom
Productive
mimecast.com
Custom
Productive
msecnd.net
Custom
Productive
nuget.org
Custom
Productive
powerbi.com
Custom
Productive
visualstudio.com
Custom
Productive
windows.net
Custom
Productive
fmwww.bc.edu
Custom
Productive
ngs.sanger.ac.uk
Custom
Productive
www.stata.com
Custom
Productive
www.stattransfer.com
Custom
Productive
sugarproxy.sharpcast.com
Custom
Productive
ugene.net
Custom
Productive
1password.com
Custom
Productive
lastpass.com
Custom
Productive
github.com
Custom
Productive
services.addons.mozilla.org
Custom
Productive
update.virtualbox.org
Custom
Productive
7.11.3. Exceptions
-
Select PROTECT | Web.
-
Select the Exceptions tab.
-
Todo:.
7.11.4. General settings
-
Select PROTECT | Web.
-
Click General settings.
-
Check Enable web content cache under Advanced.
-
Type
8080in Web proxy listening port field.Web proxy configuration Web proxy listening port 8080 Allowed destination ports 21, 70, 80, 88, 210, 280, 443, 488, 550, 563, 591, 777, 800, 3001, 1025-65535
-
Click Apply.
7.11.5. User notifications
-
Select PROTECT | Web.
-
Select the User notifications tab.
-
Check Use custom block message.
Message for block action + Use custom block message Block message SMRU IT has restricted access to sites categorized as {category}. <br><br>If you think this is incorrect, you may contact SMRU IT <a>smru-it@shoklo-unit.com</a>. -
Click Apply.
7.12. Rules and Policies
-
LINE IP address ranges https://myip.ms/view/ip_owners/159499/Line_Corporation.html.
7.12.1. Firewall Rules
-
Note: The IKE and IMAP services are needed for Wi-Fi calling on smartphone.
-
Select PROTECT | Rules and policies.
-
Select the Firewall rules tab.
-
Add the following Outgoing traffic rules.
Table 9. MST Name Source Destination What Action Features Allow DNS
LAN,
MST Local NetworkWAN,
Any hostDNS
Accept
LinkedNAT LOG
Allow Proxy
LAN,
MST Local NetworkWAN,
Any hostTCP 8080
Accept
AV WEB LinkedNAT PRX LOG
Deny all HTTP HTTPS
LAN,
MST Local NetworkWAN,
Any hostTodo
Accept
WEB LinkedNAT LOG
Table 10. Sites Name Source Destination What Action Features Allow SMRU Default
LAN,
Any hostWAN,
Any hostDNS,
HTTP,
HTTPS,
IKE,
IMAP,
LINE,
NTP,
PING,
SMTP,
SMTP(S),
TeamViewerAccept
LOG
-
Add the following VPN traffic rules.
Name Source Destination What Action Features Allow traffic from MST
VPN,
MST Local Network,
MRM SSL VPN NetworkLAN,
<Site> Local NetworkAny service
Accept
LOG
Allow traffic from <Site> ANC to MST ANC server
LAN,
tbhf-anc-<site>VPN,
tbhf-anc-mrmAny service
Accept
LOG
Allow traffic to SMRU-AD02
LAN,
<Site> Local NetworkVPN,
SMRU-AD02Any service
Accept
LOG
Allow traffic to tbhf-anc-mrm
LAN,
<Site> Local NetworkVPN,
tbhf-anc-mrmHTTP PING
Accept
LOG
Allow traffic to WSUS
LAN,
<Site> Local NetworkVPN,
SMRU-IT03PING "SMRU" WSUS
Accept
LOG
Allow traffic to MST database servers
LAN,
<Site> Local NetworkVPN,
SMRU-DBD-MST,
SMRU-DBP-MSTPING,
"SMRU" MSSQLAccept
LOG
Allow traffic to SMRU-SRV
LAN,
<Site> Local NetworkVPN,
SMRU-SRVPING,
"SMRU" SMBAccept
LOG
Allow ping to MST firewall
LAN,
<Site> Local NetworkVPN,
smru-sfw-mrmPING
Accept
LOG
-
Add the following Inter-site traffic rules.
Name Source Destination What Action Features Allow inter-site ping to PMS server
VPN,
MKT Local Network,
MLA Local Network,
WPA Local Network,
MSL Local Network,
HPH Local Network,
SKK Local Network,
MKU Local NetworkLAN,
SMRU-PMS-<Site>PING
Accept
LOG
Allow inter-site ping to PMS servers
LAN,
<Site> Local NetworkVPN,
SMRU-PMS-MKT,
SMRU-PMS-MLA,
SMRU-PMS-MSL,
SMRU-PMS-WPAPING
Accept
LOG
Allow inter-site SQL Server traffic
VPN,
MKT Local Network,
MLA Local Network,
WPA Local Network,
MSL Local Network,
HPH Local Network,
SKK Local Network,
MKU Local NetworkLAN,
SMRU-PMS-<Site>"SMRU" MSSQL
Accept
LOG
Allow inter-site SQL Servers traffic
LAN,
<Site> Local NetworkVPN,
SMRU-PMS-MKT,
SMRU-PMS-MLA,
SMRU-PMS-MSL,
SMRU-PMS-WPA"SMRU" MSSQL
Accept
LOG
Allow inter-site traffic to WPA ANC server
LAN,
<Site> Local NetworkVPN,
tbhf-anc-wpaHTTP,
PINGAccept
LOG
-
Add the following Inter-zone traffic rules.
Name Source Destination What Action Features Allow LAN to LAN traffic
LAN,
<Site> Local NetworkLAN,
<Site> Local NetworkAny service
Accept
LOG
7.12.2. NAT Rules
-
Note: Sophos recommend to set Outbound interface to WAN interface. If outbound interface is set to Any, the NAT rule will be applied on LAN to VPN (LAN to DMZ) traffic, and stops LAN to VPN (LAN to DMZ) traffic. It is recommended to move the LAN to WAN NAT rule to the bottom, otherwise, it can be applied on other traffic, and cause unexpected results.
-
Select PROTECT | Rules and policies.
-
Select the NAT rules tab.
Table 11. LAN cable (Port2) Name Original Translated Interface ID Usage LAN to WAN (MASQ)
Source: Any host
Service: Any service
Destination: Any hostSource: MASQ
Service: Original
Destination: OriginalInbound: Any interface
Outbound: WAN-Port2
Last used: <Date>#<number>
0
Table 12. 3G/4G (WWAN1) Name Original Translated Interface ID Usage LAN to WAN (MASQ)
Source: Any host
Service: Any service
Destination: Any hostSource: MASQ
Service: Original
Destination: OriginalInbound: Any interface
Outbound: WWAN1
Last used: <Date>#<number>
0
Table 13. DMZ (tbhf-web-mrm) Name Original Translated Interface ID Usage HTTPS from WAN to DMZ (tbhf-web-mrm)
Source: Any host
Service: HTTPS
Destination: MST Public IP - 110.77.143.117Source: Original
Service: HTTPS
Destination: IP - tbhf-web-mrmInbound: Any interface
Outbound: Any interface
Last used: <Date>#<number>
0
7.13. DNS
-
Note: Douwe: 2023-01-17: Computers at remote sites have the following problem.
-
Google Chrome times out when trying to browse to https://zendto.shoklo-unit.com/delta-portal.html.
-
Microsoft Edge times out when trying to browse to https://zendto.shoklo-unit.com/delta-portal.html.
-
Mozilla Firefox is okay when trying to browse to https://zendto.shoklo-unit.com/delta-portal.html.
-
Note: See https://community.sophos.com/sophos-xg-firewall/f/discussions/135055/dns-request-timed-out-vpn.
-
-
Select CONFIGURE | Network.
-
Select the DNS tab.
DNS configuration:
-
Main Office: SMRU-SFW-MRM, SMRU-SFW-TST
-
Note: The DNS Manager on the Windows Server has the Sophos Firewall set up as a forwarder.
-
Note: Do not add the IP address of the DNS Manager in the DNS fields to prevent a DNS loop.
-
-
Remote Sites: SMRU-SFW-MKT, SMRU-SFW-MLA, SMRU-SFW-WPA, SMRU-SFW-MSL, SMRU-SFW-HPH, SMRU-SFW-SKK, SMRU-SFW-MKU
-
Note: Set the DNS Manager on the Windows Server as the primary DNS server as recommended by Microsoft.
-
-
Choose Static DNS.
IPv4 ○ Obtain DNS from DHCP ○ Obtain DNS from PPPoE ● Static DNS Main Office Remote Site -------------- -------------- DNS 1 8.8.8.8 10.10.1.1 DNS 2 1.1.1.1 192.168.##.170 DNS 3 208.67.222.222 8.8.8.8 IPv6 ○ Obtain DNS from DHCP ● Static DNS DNS 1 DNS 2 DNS 3 DNS query configuration ● Choose server based on incoming requests record type ○ Choose IPv6 DNS server over IPv4 ○ Choose IPv4 DNS server over IPv6 ○ Choose IPv6 if request originator address is IPv6, else IPv4 -
Click Apply.
DNS host entry:
-
Select CONFIGURE | Network.
-
Select the DNS tab.
-
Add the following DNS host.
| Host/domain name | IP address | TTL | Weight | Publish on WAN | Reverse DNS lookup |
|---|---|---|---|---|---|
SMRU-AD02.smru.shoklo-unit.com |
10.10.1.1 |
60 |
1 |
No |
On |
SMRU-IT03.smru.shoklo-unit.com |
10.10.1.15 |
60 |
1 |
No |
On |
SMRU-DBP-MST.smru.shoklo-unit.com |
10.10.1.17 |
60 |
1 |
No |
On |
SMRU-SRV.smru.shoklo-unit.com |
10.10.1.3 |
60 |
1 |
No |
On |
tbhf-anc.smru.shoklo-unit.com |
192.168.26.2 |
60 |
1 |
No |
On |
7.14. DHCP
-
Select CONFIGURE | Network.
-
Select the DHCP tab.
-
Click Add.
-
Select the IPv4 tab.
General settings Name <Site> DHCP Interface br0 - 192.168.##.170 □ Accept client request via relay Dynamic IP lease Start IP End IP 192.168.##.50 192.168.##.169 Static IP MAC mapping Hostname MAC address IP address □ □ □ Subnet mask /24 (255.255.255.0) Domain name smru.shoklo-unit.com Gateway ■ Use interface IP as gateway 192.168.##.170 Default lease time 1440 Max lease time 2880 Conflict detection □ Enable DNS server ■ Use device’s DNS settings Primary DNS 192.168.##.170 Secondary DNS 10.10.1.1 WINS server Primary WINS server Secondary WINS server -
Click Save.
7.14.1. Fixed Lease
-
Select CONFIGURE | Network.
-
Select the DHCP tab.
-
Go to Static IP MAC mapping section.
-
Click + Button.
-
Scroll down to the bottom.
-
Fill in data using following instruction.
| Hostname | MAC address | IP address |
|---|---|---|
Name of device |
Ethernet/Wireless MAC address |
IP address of device |
-
Click Save
7.15. AD Server integration
-
Note: For AD users to work properly with Sophos, STAS setup is needed.
-
Select CONFIGURE > Authentication.
-
Select the Servers tab.
-
Click Add.
Server type Active Directory Server name SMRU-AD02 Server IP/domain 10.10.1.1 Connection security Plaintext Port 389 NetBIOS domain SMRU ADS user name ADadmin Password ******** Display name attribute Email address attribute mail Domain name smru.shoklo-unit.com Search queries DC=smru,DC=shoklo-unit,DC=com
-
Click Test connection.
-
Click Save.
-
Select the Services tab.
-
Check Firewall authentication methods | SMRU-AD02.
-
Move Firewall authentication methods | SMRU-AD02 to the top.
-
Click Firewall authentication methods | Apply.
-
Click OK to confirm.
-
Optional: Check User portal authentication methods | SMRU-AD02.
-
Optional: Move User portal authentication methods | SMRU-AD02 to the top.
-
Optional: Click User portal authentication methods | Apply.
-
Optional: Click OK to confirm.
-
Optional: Check VPN portal authentication methods | SMRU-AD02.
-
Optional: Move VPN portal authentication methods | SMRU-AD02 to the top.
-
Optional: Click VPN portal authentication methods | Apply.
-
Optional: Click OK to confirm.
7.16. STAS
7.16.1. File Server Local Security Policy
Administrative User with Log on as a service.
-
Start Windows Administrative Tools > Local Security Policy (secpol.msc).
-
Select Local Policies > User Rights Assignment.
-
Double-click Logon as a service.
-
Select the Local Security Setting tab.
-
Click Add User or Group.
-
Type
Administratorin the Enter the object names to select field. -
Click Check Names.
-
Select Administrator or Administrators.
-
Click OK.
-
Click OK.
-
Click Apply.
-
Click OK.
7.16.2. File Server Windows Firewall
-
Start Control Panel> Windows Defender Firewall.
-
Select Advanced settings.
-
Select Inbound Rules.
-
Select Action > New Rule.
-
Select the Rule Type tab.
-
Choose Port.
-
Click Next.
-
Choose UDP.
-
Choose Specific local ports.
-
Type
6677in the Specific local ports field. -
Click Next.
-
Choose Allow the connection.
-
Click Next.
-
Check Domain.
-
Check Private.
-
Check Public.
-
Click Next.
-
Type
UDP 6677 for STASin the Name field. -
Click Finish.
-
Close Windows Defender Firewall with Advanced Security.
-
Close Windows Defender Firewall.
7.16.3. Download STAS on Sophos Firewall
-
Browse to https://10.10.1.170:4444.
-
Login with admin account.
-
Select CONFIGURE > Authentication.
-
Select the Client downloads tab.
-
Click Sophos Transparent Authentication Suite (STAS) to download STAS.exe.
7.16.4. Configure STAS on Sophos Firewall
-
Select CONFIGURE > Authentication.
-
Select the STAS tab.
-
Click OFF icon to Enable Enable Sophos Transparent Authentication Suite.
-
Click Activate STAS.
-
Click Add new collector.
-
Type
10.10.1.1in the Collector IP field. -
Type
6677in the Collector port field. -
Choose New group for the Collector group.
-
Click Save.
-
Logout from Sophos Firewall web page.
-
Close Browser.
7.16.5. Install STAS on File Server
-
Run the STAS.exe file with administrative privileges.
-
Click Next.
-
Click Next.
-
Uncheck Create a desktop shortcut.
-
Uncheck Create a Quick Launch shortcut.
-
Click Next.
-
Click Install.
-
Choose SSO Suite | Installs all Sophos SSO Suite components on this machine.
-
Click Next.
-
Type
SMRU\Administratorin the User Name field. -
Type the password in the Password field.
-
Type the password again in the Confirm Password field.
-
Click Next.
-
Click Finish.
7.16.6. Configure STAS on File Server
-
Start STAS.
-
Select the STA Collector tab.
-
Click Add.
-
Type
10.10.1.170in the Sophos IP field. -
Click OK.
-
Optional: Remove 192.168.0.1 in the Sophos Appliances list.
-
Select 192.168.0.1.
-
Click Remove.
-
Click Yes to confirm.
-
-
Note: Set Workstation Polling Method to Registry Read Access instead of WMI to prevent the following errors in the Event Viewer.
-
See https://community.sophos.com/sophos-xg-firewall/f/discussions/130199/dcom-stas-10028.
-
DCOM was unable to communicate with the computer 169.254.207.210 using any of the configured protocols; requested by PID 6b8 (C:\Program Files (x86)\Sophos\Sophos Transparent Authentication Suite\stas.exe).
DCOM was unable to communicate with the computer 10.10.1.163 using any of the configured protocols; requested by PID 43d8 (C:\Program Files (x86)\Sophos\Sophos Transparent Authentication Suite\stas.exe), while activating CLSID {8BC3F05E-D86B-11D0-A075-00C04FB68820}.
-
Select Registry Read Access for the Workstation Polling Method.
-
Click Apply.
-
Select the STA Agent tab.
-
Type
10.10.1.1for the Domain Controller IP. -
Click Add under Monitored Networks.
-
Type
10.10.1.0/24. -
Click OK.
-
Optional: Remove 192.168.1.0/24 in the Monitored Networks list.
-
Select 192.168.1.0/24.
-
Click Remove.
-
-
Click Apply.
-
Select the Exclusion List tab.
-
Click Login IP Address / Network Subnet mask Exclusion List | Add.
-
Type
10.10.1.1 - 10.10.1.69. -
Click OK.
-
Click Apply.
-
Select the General tab.
-
Type
SMRUin the NetBIOS Name field. -
Type
smru.shoklo-unit.comin the Fully Qualified Domain Name field. -
Click Start under Status to start the STA Agent service.
-
Click OK.
-
Click Yes to continue*.
-
Note: If everything is working fine, the 10.10.1.170 IP address will show up under Sophos Appliances.
7.17. Time
-
Select SYSTEM | Administration.
-
Select Time.
-
Choose Use custom NTP server.
-
Add 0.pool.ntp.org, 1.pool.ntp.org and 2.pool.ntp.org in Use custom NTP server field.
-
Click Sync now.
Current time YYYY-MM-DD HH:MM:SS Asia/Bangkok Time zone Asia/Bangkok ○ Use pre-defined NTP server ● Use custom NTP server 0.pool.ntp.org 1.pool.ntp.org 2.pool.ntp.org Sync now ○ Do not use NTP server Date Time -
Click Apply.
-
Click OK.
7.18. Notification settings
-
Config Notification settings.
-
Select CONFIGURE > System services.
-
Select the Notification list tab.
-
Select the Email notifications to be ON.
-
Click Expand all.
-
Check Sign-in failed for the Admin.
-
Check Too many failed sign-in atempts for the Admin.
-
Check Installed new firmware for the Firmware.
-
Check Antivirus definition upgrade failed for the System.
-
Check System started for the System.
-
Check High CPU usage for the System.
-
Check Gateway status for the System.
-
Click Save.
-
Click OK.
7.18.1. Notification settings
-
Select SYSTEM > Administration > Notification settings.
Mail Server settings Send notifications via ○ Built-in email server ● External email server Mail server IPv4 address/FQDN - Port eu-smtp-outbound-1.mimecast.com Authentication required ■ Username relay@shoklo-unit.com Password ******** Connection security STARTTLS Email settings From email address smru-sfw-mrm@shoklo-unit.com Send notifications to email address it-notify@shoklo-unit.com Management interface IP address None
7.19. Backups
7.19.1. Configuration
-
Select SYSTEM | Backup & firmware.
-
Select the Backup & restore tab.
-
Choose Email on Backup mode.
-
Type
smru-sfw-<site>in Backup prefix field. -
smru-sfw-<site> Type
smru-it@shoklo-unit.comin Email address field. -
smru-sfw-mrm: Type
smru-it@shoklo-unit.com,it-notify@tropmedres.acin Email address field. -
Choose Daily on Frequency.
-
Select Sunday Day 00 HH 00 MM on Schedule.
-
Type the level 1 + level 2 password in Encryption password field.
-
Type the level 1 + level 2 password again in Confirm Encryption password field.
-
Click Apply.
-
Click OK.
-
Click Backup now.
7.19.2. Extraction
-
Save the backup file to the O:\Tmp folder.
-
Enter the following commands at a Command Line.
# Decrypt the backup file. openssl enc -aes-256-cbc -md md5 -d -in /home/Other/Tmp/smru-sfw-mkt_Backup_C1A102GM9DGFQ58_14Feb2022_00.00.05 > /tmp/smru-sfw-mkt.tgz # Type the level 1 and level 2 passwords and press Enter. # Extract contents of backup file. cd /tmp tar tfz smru-sfw-mkt.tgz tar xfz smru-sfw-mkt.tgz ls -al conf/backupdata/device.backup # List PostgreSQL database dumps. ls -al conf/backupdata/device.backup/db.* vi conf/backupdata/device.backup/db.dump grep "tblfirewallrule" conf/backupdata/device.backup/db.dump cd
7.20. Cellular WAN | 3G/4G module
-
Select CONFIGURE | Network.
-
Select the Cellular WAN tab.
-
Click OFF to turn on Cellular WAN.
-
Click OK.
-
Refresh the page until it detect the 3G/4G module.
-
Click Connect.
-
Click OK.
-
Select the Interfaces tab.
-
Select WWAN1.
-
Click Show recommended configuration.
-
Click Load recommended configuration.
-
Select 99# in Phone number dropdown list.
General settings Interface name WWAN1 IP assignment ● Dial-up(PPP) ○ Network adapter(DHCP) Connect ● Auto ○ Manual Reconnect tries Always Modem port Serial 2 Phone number 99# Username Password SIM card PIN code APN Initialization string *Gateway settings Gateway name smru-sfw-<site>_WWAN Gateway IP 128.0.0.1 Other Settings MTUA 1500 MSS 1460
-
Click Save.
-
Click OK.
7.21. Reports
Admin Events
-
Select MONITOR & ANALYZE > Reports.
-
Click Show Reports settings.
-
Select the Custom view tab.
-
Click Add.
-
Type
SMRU-SFW-<Site> Admin Eventsin the Custom view field. -
Expand Events.
-
Check Admin Events.
-
Click Save.
-
Select the Report scheduling tab.
-
Click Add
-
Choose Report.
-
Type
SMRU-SFW-<Site> Admin Eventsin the Name field. -
Type
smru-it@shoklo-unit.comin the To email address field. -
Choose Report group for Report type.
-
Select SMRU-SFW-<Site> Admin Events in the Report group dropdown list.
-
Choose Daily for Email frequency.
-
Choose Previous day for Report period.
-
Select 24 in the Send email at dropdown list.
-
Click Save.
Admin events are:
-
VPN > IPsec connections
-
VPN > IPsec policies
7.22. Log settings
-
Select CONFIGURE > System services.
-
Select Log settings tab.
-
Click Add.
-
Type
Firewall login the Name field. -
Type the syslog server IP address in the IP address / Domain field.
-
Uncheck Secure log transmission.
-
Type
514in the Port field. -
Select LOCAL0 in the Facility field.
-
Select Information in the Severity level.
-
Select Device Standard Format (legacy).
-
Click Save.
-
Check Firewall rules for Firewall log.
-
Click Apply.
-
Click OK.
-
Select CONFIGURE > System services.
-
Select Log settings tab.
-
Click Add.
-
Type
Web Filter login the Name field. -
Type the syslog server IP address in the IP address / Domain field.
-
Uncheck Secure log transmission.
-
Type
514in the Port field. -
Select LOCAL1 in the Facility field.
-
Select Information in the Severity level.
-
Select Device Standard Format (legacy).
-
Click Save.
-
Check Web filter for Web Filter log.
-
Click Apply.
-
Click OK.
7.23. Active Threat Response
7.23.1. MDR Threat Feeds
-
Select PROTECT > Active threat response.
-
Select MDR threat feeds tab.
-
Enable MDR threat feeds.
-
Choose Log and drop.
-
Click Apply.
7.23.2. Sophos-X-Ops threat feeds (Advanced threat protection)
-
Select PROTECT > Sophos-X-Ops threat feeds (Active threat protection).
-
Enable Sophos-X-Ops threat feeds.
-
Choose Log and drop.
-
Choose Inspect untrusted content.
7.24. Intrusion Prevention
-
Select PROTECT > Intrusion prevention.
-
Select IPS policies.
-
Enable IPS protection.
-
Click Add to add the policy.
-
Type
"LAN to WAN"in the Name field. -
Type
Block backdoor malware and scan the traffic flowing from LAN to WAN; Primarily intended to secure LAN-based client(s)in the Description field. -
Select LAN TO WAN for Clone rules.
-
Click Save.
-
Click Edit icon for "LAN to WAN".
-
Click Add.
-
Type
Malware Backdoorin the Rule name field. -
Check malware-backdoor for the Category.
-
Click OK.
-
Choose Select all.
-
Select Drop packet for Action.
-
Click Save.
-
Click Save.
-
Select PROTECT > Rules and Policies.
-
Expand Outgoin - LAN.
-
Select Allow LAN to WAN traffic rule.
-
Scroll down to the bottom.
-
Select "LAN to WAN" for Detect and prevent exploits (IPS).
-
Click Save.
-
Select Allow Proxy rule.
-
Scroll down to the bottom.
-
Select "LAN to WAN" for Detect and prevent exploits (IPS).
-
Click Save.
8. HA
Auxiliary Device
-
Set the LAN interface IP to 10.10.1.254.
-
Select CONFIGURE > Network.
-
Select Port8.
Name HA-Port8 Hardware Port8 Network zone DMZ ■ IPv4 configuration IP assignment ● Static ○ PPPoE(DSL) ○ DHCP IPv4/netmast 172.16.16.2 Gateway detail Gateway name Gateway IP □ IPv6 configuration
-
Click Save.
-
Click Update interface.
-
Select SYSTEM > Administration.
-
Select the Device access tab.
-
Check DMZ | SSH.
-
Click Apply.
-
Click OK.
-
Select CONFIGURE > System services.
-
Select the High availability tab.
Initial device role ○ Primary (active-passive) ● Auxiliary ○ Primary (active-active) HA configuration mode ○ QuickHA mode ● Interactive mode Passphrase X1/%Bbvih86pN0kd Dedicated HA link HA-Port8
-
Click Save.
Primary Device
-
Set the LAN interface IP to 10.10.1.170.
-
Select CONFIGURE > Network.
-
Select Port8.
Name HA-Port8 Hardware Port8 Network zone DMZ ■ IPv4 configuration IP assignment ● Static ○ PPPoE(DSL) ○ DHCP IPv4/netmast 172.16.16.1 Gateway detail Gateway name Gateway IP □ IPv6 configuration
-
Click Save.
-
Click Update interface.
-
Select SYSTEM > Administration.
-
Select the Device access tab.
-
Check DMZ | SSH.
-
Click Apply.
-
Click OK.
-
Connect the LAN cable between Primary and Auxiliary device PortHA.
-
Select CONFIGURE > System services.
-
Select the High availability tab.
Initial device role ● Primary (active-passive) ○ Auxiliary ○ Primary (active-active) HA configuration mode ○ QuickHA mode ● Interactive mode Cluster ID 0 Passphrase X1/%Bbvih86pN0kd Dedicated HA link HA-Port8 Dedicated peer HA link IPv4 address 172.16.16.2 Select ports to be monitored LAN-Port1 Peer administration settings Interface: LAN-br0 IPv4 address: 10.10.1.254 IPv6 address Reserve bridge port LAN-Port1 Keepalive request interval Send a request every 250 milliseconds (250-500) Keepalive attempts Make 16 attempts before determining it as device failure (16-24) Use host or hypervisor-assigned MAC address □ Fail back to primary device after it recovers ■
-
Click Initiate HA.
-
Click OK.
-
Login to both Primary and Auxiliary device through CLI console.
-
Type
4and press Enter. -
Type
system ha show logsand press Enter.
9. Wireless
9.1. Wireless Networks
9.1.1. Private
-
Select PROTECT > Wireless
-
Select the Wireless networks tab.
-
Click Add.
Name SMRU Hardware wlnet1 Description SSID SMRU Security mode WPA2 Personal Passphrase ******** ******** Client traffic Bridge to AP LAN -
Click Save.
9.1.2. Guest
-
Select PROTECT > Wireless
-
Select the Wireless networks tab.
-
Click Add.
Name SMRU-Guest Hardware wlnet1 Description SSID SMRU-Guest Security mode No Encryption Client traffic Bridge to AP LAN
-
Click Save.
9.2. Access Points
Register AP
-
Select PROTECT > Wireless.
-
Select the Access points tab.
-
Check APX320[<serial number>].
-
Click Accept.
-
Click OK to confirm.
Configure AP
-
Select PROTECT > Wireless.
-
Select the Access points tab.
-
Select APX320[<serial number>].
-
Type
SMRU-AP04in the Label field. -
Select Thailand for the Country.
-
Add SMRU for the Wireless networks.
-
Click Save.
10. Import & Export
10.1. Export
-
Note: Exporting a full configuration takes several minutes and the size of the API-*.tar file is one or more mega bytes.
-
Select SYSTEM > Backup & firmware.
-
Select the Import export tab.
-
Choose Export selective configuration.
-
Click Add new item.
-
Select one or more of the
-
Hosts and services > IP host: Check IPHost.
-
Rules and policies > Firewall rules: Check FirewallRule.
-
Rules and policies > Firewall rule groups: Check FirewallRuleGroup.
-
Rules and policies > NAT rules: Check NATRule.
-
VPN > IPsec connections: Check VPNIPSecConnection.
-
Click Apply 1 selected items.
-
Uncheck Include dependent entity.
-
Click Export.
-
Click Download.
-
Click Choose File.
-
Click OK.
-
Wait for the download to finish.
10.2. Edit
-
Extract the Entities.xml file from the downloaded file.
-
Edit the Entities.xml file.
-
Compress the Entities.xml file to a .tar file.
10.3. Convert xml
-
Extract the Entities.xml file from the downloaded API-*.tar file to the O:\Tmp folder.
-
Enter the following commands at a Command Line.
xsltproc /usr/local/share/sophos-firewall-rules.xsl /home/Other/Tmp/Entities.xml | sed "s/,;/;/g" > smru-sfw-mrm-firewall-rules.xml xsltproc /usr/local/share/sophos.xsl /home/Other/Tmp/Entities.xml | sed "s/,;/;/g" > smru-sfw-mrm-vpn.xml
10.4. Import
-
Select SYSTEM > Backup & firmware.
-
Select the Import export tab.
-
Click Browse.
-
Select the .tar file.
-
Click Open.
-
Click Import.
11. Central synchronization
-
Note: To register to Sophos Central, you need Sophos Central account.
Deregister
-
Select SYSTEM | Sophos Central.
-
Click Deregister.
-
Click OK.
Register
-
Select SYSTEM | Sophos Central.
-
Click Register.
-
Choose Use email address.
-
Type
smru-it@shoklo-unit.comin the Email address field. -
Type the password in the Password field.
-
Click Register.
-
Enable Security Heartbeat.
-
Enable Synchronized Application Control.
-
v17.5: Enable Manage from Sophos Central.
-
v18.0: Enable Sophos Central services.
-
Check Send reports and logs to Sophos Central.
-
Check Manage from Sophos Central.
-
-
Check Send configuration backup to Sophs Central.
-
Click Apply.
-
Logon to https://central.sophos.com with Sophos Central account.
-
Click Firewall Management.
-
Click Show All Firewalls.
-
Click Approval Pending.
-
Click Accept services.
12. OS upgrade/downgrade
-
Download the OS from https://www.sophos.com/en-us/support/downloads/firewall-installers.
12.1. USB bootable
-
Run the balenaEtcher-Portable-1.5.109.exe portable file with administrative privileges.
-
Click Flash from file.
-
Select HW-17.5.14_MR-14-1-714.iso file and click Open.
-
Click Change.
-
Select the USB device.
-
Click Select(1).
-
Click Flash!.
-
Wait about 2 minutes for the flashing to finish.
-
Close Etcher.
12.2. Installation
-
Attach the OS USB in Sophos XG/XGS Hardware Appliance.
-
Connect the keyboard to Sophos XG/XGS Hardware Appliance.
-
Press the power button to start Sophos XG/XGS.
-
Press F7 key to boot from the USB key.
-
Select Yes and press Enter.
-
Wait for the device to reboot and finish the OS installation.
-
Detach the OS USB.
-
Press Y and Enter to reboot the device.
13. Firmware Upgrade
Name Model Version Remarks ============ ============== ======= ======= smru-sfw-hph Sophos XG 125 19.0.0 smru-sfw-mku Sophos XG 125 19.0.0 smru-sfw-mkt Sophos XG 125 19.5.0 smru-sfw-msl Sophos XG 125 19.0.0 smru-sfw-skk Sophos XG 125 19.0.0 Fan 12.0V, 3.4A smru-sfw-tst Sophos XG 135 19.5.0S Fan 12V, 3A smru-sfw-wpa Sophos XG 135 19.5.0 smru-sfw-mla Sophos XGS 126 19.5.0 12.0V, 12.5A, 150.0W smru-sfw-mrm Sophos XGS 126 19.5.0 12.0V, 12.5A, 150.0W smru-sfw-mrh Sophos XGS 126 19.5.0 12.0V, 12.5A, 150.0W
13.1. Firmware is available
-
Browse to https://192.168.##.170:4444.
-
Log in as admin.
-
Select System > Backup & firmware > Firmware.
-
Select HW-18.0.4_MR-4.SF300-506 | GA | Download.
-
Wait for the download to finish.
-
Select HW-18.0.4_MR-4.SF300-506 | GA | Install.
-
Select HW-18.0.5_MR-5.SF300-586 | GA | Install.
-
Wait for the installation to finish.
-
Wait for the firewall to reboot.
13.2. Firmware to be uploaded
-
Note: Copy the .sig file to a remote site computer when having a slow internet connection.
-
Note: Browse to the firewall from the remote site computer to upload the .sig file.
-
Note: Browse to the firewall from your local computer to boot the firmware image.
-
Browse to https://192.168.##.170:4444.
-
Log in as admin.
-
Select System > Backup & firmware > Firmware.
-
Select Inactive SFOS version | Upload firmware.
-
Click Browse.
-
Select the W:\Firmware\Sophos\XG folder.
-
XG 125/135: Select the HW-19.5.0_GA.SF300-197.sig file.
-
XGS 126: Select the HW-19.5.0_GA.SF310-197.sig file.
-
Click Open.
-
Click Upload firmware.
-
Click OK to confirm.
-
Wait for the upload to finish.
-
Select SFOS 19.5.0 GA-Build197 | Boot firmware image.
-
Click OK to confirm.
-
Wait for the installation to finish.
-
Wait for the firewall to reboot.
14. Restore Backup
-
Connect the computer to the Sophos Firewall via the LAN port.
-
Factory Default: Browse to https://172.16.16.16:4444.
-
MRH: Browse to https://10.20.1.170:4444.
-
MKT: Browse to https://192.168.25.170:4444.
-
Log in as admin.
-
Select SYSTEM > Backup & Firmware in the left navigation panel.
-
Click Choose file in Backup restore | Restore configuration.
-
Select the backup file and click Choose.
-
Type the backup encryption password in the Password field.
-
Click Upload and Restore.
-
Click OK in the Notification popup about you will loose the configurations.
-
Type
Passwordfor Secure Storage Master Key. -
Wait for the upload of the backup to finish
-
Wait for the firewall to reboot.
15. Troubleshooting
V18 Proxy
-
See https://support.sophos.com/support/s/article/KB-000036734?language=en_US.
-
See https://support.sophos.com/support/s/article/KB-000036493?language=en_US.
-
See https://support.sophos.com/support/s/article/KB-000037190?language=en_US.
-
See https://support.sophos.com/support/s/article/KB-000038109?language=en_US.
-
See https://superuser.com/questions/664656/how-to-configure-firefox-for-ntlm-sso-single-sign-on.
-
See https://support.sophos.com/support/s/article/KB-000035722?language=en_US.
-
See https://community.sophos.com/sophos-xg-firewall/f/discussions/101061/anydesk-not-working.
16. Certificates
-
-
You will have to first re-edit the information located in the "Default" CA certificate.
-
After this is performed, you will have to again regenerate the "SecurityAppliance_SSL_CA" and the "ApplianceCertificate" located in Certificates.
-
-
Note: If the Default certificate is updated, all SSL VPN connections will be disconnected and you need to download the SSL VPN configuration to add it to the clients.
-
Note: The Default certificate allows for easy logon to the Admin console of the Sophos firewall for IT staff.
-
Note: The SecurityAppliance_SSL certificate allows for all users to get proper Sophos firewall messages inside their web browser.
-
This is the procedure to follow for each Sophos Firewall.
-
Select the ApplianceCertificate certificate for SYSTEM | Administration | Admin and user settings | Certificate | ApplianceCertificate and click Apply, then click OK.
-
Generate a new SYSTEM | Certificates | Certificate authorities | Default certificate.
-
Generate a new SYSTEM | Certificates | Certificate authorities | SecurityAppliance_SSL_CA certificate.
-
Generate a new SYSTEM | Certificates | Certificates | ApplianceCertificate certificate.
-
Delete any existing SYSTEM | Certificates | Certificates | LSC certificate.
-
Generate a new SYSTEM | Certificates | Certificates | LSC smru-sfw-tst certificate.
-
Select the LSC smru-sfw-tst certificate for SYSTEM | Administration | Admin and user settings | Certificate.
-
-
Select SYSTEM | Administration.
-
Select Admin and user settings tab.
-
Select ApplianceCertificate for Certificate under Admin console and end-user interaction.
-
Choose Use a different hostname:.
-
Type
10.10.1.170for the hostname. -
Type
10.20.1.170for the hostname. -
Type
10.30.1.170for the hostname. -
Click Apply under Admin console and end-user interaction.
-
Click OK to confirm.
-
Select SYSTEM | Certificates.
-
Select the Certificate authorities tab.
-
Select Default.
Name Default Country name Thailand State NA Locality name NA Organization name SMRU Organization unit name NA Common name smru-sfw-mrm smru-sfw-tst smru-sfw-mrh Email address smru-it@shoklo-unit.com Private key passphrase ******** Key Type ● RSA ○ Elliptic curve Key length 2048 Secure hash SHA-256
-
Click Save.
-
Click OK to confirm.
-
Click the Default | Download icon to download the Default certificate authority.
-
Note: The downloaded local_certificate_authority.tar.gz file contains the Default.der and Default.pem files.
-
Extract the Default.pem file from the local_certificate_authority.tar.gz file into the T:\IT\Public\X509 Certificates\SMRU-IT folder and rename it into smru-sfw-mrm_CA.pem.
-
Extract the Default.pem file from the local_certificate_authority.tar.gz file into the T:\IT\Public\X509 Certificates\SMRU-IT folder and rename it into smru-sfw-mrh_CA.pem.
-
Extract the Default.pem file from the local_certificate_authority.tar.gz file into the T:\IT\Public\X509 Certificates\SMRU-IT folder and rename it into smru-sfw-tst_CA.pem.
-
Click the SecurityAppliance_SSL_CA | Regenerate certificate authority icon to regenerate the SecurityAppliance_SSL_CA certificate authority.
-
Click OK to confirm.
-
Click the SecurityAppliance_SSL_CA | Download icon to download the SecurityAppliance_SSL_CA certificate.
-
Copy the SecurityAppliance_SSL_CA.pem file to the T:\IT\Public\X509 Certificates\All folder and rename it into SecurityAppliance_SSL_CA-smru-sfw-mrm.pem.
-
Copy the SecurityAppliance_SSL_CA.pem file to the T:\IT\Public\X509 Certificates\All folder and rename it into SecurityAppliance_SSL_CA-smru-sfw-mrh.pem.
-
Copy the SecurityAppliance_SSL_CA.pem file to the T:\IT\Public\X509 Certificates\All folder and rename it into SecurityAppliance_SSL_CA-smru-sfw-tst.pem.
-
Select the Certificates tab.
-
Click the ApplianceCertificate | Regenerate certificate icon to regenerate the ApplianceCertificate certificate.
-
Click OK to confirm.
-
Click the LSC * | Delete icon to delete any LSC locally-signed certificate.
-
Click OK to confirm.
-
Click Add to generate a new certificate.
-
Choose Generate locally-signed certificate.
-
Note: Use the current date and the last acceptable date of 2036-12-31 for the Valid from and Valid until fields.
Certificate details Name LSC smru-sfw-mrm LSC smru-sfw-tst LSC smru-sfw-mrh Valid from <current date> Valid until 2036-12-31 Key type ● RSA ○ Elliptic curve Key length 2048 Secure hash SHA-256 Subject name attributes Country name Thailand State NA Locality name NA Organization name SMRU Organization unit name NA Common name smru-sfw-mrm smru-sfw-tst smru-sfw-mrh Email address smru-it@shoklo-unit.com Distinguished name /C=TH/ST=NA/L=NA/O=SMRU/OU=NA/CN=smru-sfw-mrm/emailAddress=smru-it@shoklo-unit.com Distinguished name /C=TH/ST=NA/L=NA/O=SMRU/OU=NA/CN=smru-sfw-tst/emailAddress=smru-it@shoklo-unit.com Distinguished name /C=TH/ST=NA/L=NA/O=SMRU/OU=NA/CN=smru-sfw-mrh/emailAddress=smru-it@shoklo-unit.com Subject Alternative Names (SANs) DNS names fw.shoklo-unit.com smru-sfw-tst smru-sfw-mrh IP addresses 110.77.143.113 10.10.1.170 10.30.1.170 10.20.1.170 Advanced settings Certificate ID DNS smru-sfw-mrm smru-sfw-tst.dyndns.org smru-sfw-mrh.dyndns.org -
Click Save.
-
Select SYSTEM | Administration.
-
Select Admin and user settings tab.
-
Select LSC smru-sfw-mrm for Certificate under Admin console and end-user interaction.
-
Select LSC smru-sfw-tst for Certificate under Admin console and end-user interaction.
-
Select LSC smru-sfw-mrh for Certificate under Admin console and end-user interaction.
-
Choose Use a different hostname:.
-
Type
10.10.1.170for the hostname. -
Type
10.20.1.170for the hostname. -
Type
10.30.1.170for the hostname. -
Click Apply under Admin console and end-user interaction.
-
Click OK to confirm.
16.1. Private CA
16.1.1. Certificate Authorities
-
Select SYSTEM | Certificates.
-
Select Certificate authorities tab.
-
Click Add.
-
Click Browse or Choose File for the certificate.
-
Select the T:\IT\Helpdesk\X509 Certificates\SMRU-CA.pem file.
-
Click Open.
-
Choose Signing and validation.
-
Click Browse or Choose File for the private key.
-
Select the T:\IT\Helpdesk\X509 Certificates\SMRU-CA.key file.
-
Click Open.
-
Type the certificate level 1 password in the Private key passphrase field.
-
Click Save.
16.1.2. Certificates
-
Select SYSTEM | Certificates.
-
Select Certificates tab.
-
Click Add.
-
Type
_SMRU-Sophos-Firewall-Admin-Consolein the Name field. -
Click Browse or Choose File for the certificate.
-
Select the T:\IT\Helpdesk\X509 Certificates\SMRU-Sophos-Firewall-Admin-Console.pem file.
-
Click Open.
-
Click Browse or Choose File for the private key.
-
Select the T:\IT\Helpdesk\X509 Certificates\SMRU-Sophos-Firewall.key file.
-
Click Open.
-
Type the certificate level 2 password in the Passphrase or preshared key field.
-
Click Save.
16.1.3. Admin And User Settings
-
Select SYSTEM | Administration.
-
Select Admin and user settings tab.
-
Select @SMRU-Sophos-Firewall-Admin-Console for the Certificate under Admin console and end-user interaction section.
-
Click Apply.
-
Click OK to confirm.
16.1.4. SSL/TLS Inspection Rules
-
Select PROTECT | Rules and policies.
-
Select SSL/TLS inspection rules tab.
-
Click SSL/TLS inspection settings.
-
Select @SMRU Root CA (RSA) for Re-sign RSA with.
-
Select @SMRU Root CA (RSA) for Re-sign EC with.
-
Click Save.
16.2. Installation
16.2.1. Delta Windows Tools
-
Enter the following commands at a Command Prompt with administrative privileges.
net use T: \\SMRU-SRV\Teams$ /Persistent:No Set-ConfigWindowsCertificateStore
16.2.2. Local Linux Computer
-
Log in as smru on tbhf-ops-mrm.
-
Enter the following commands at a Command Line.
sudo mkdir -p /media/Teams sudo mount -t cifs -o username=<User>,domain=SMRU,vers=3.0 //SMRU-SRV/Teams$ /media/Teams folder="/media/Teams/IT/Public/X509 Certificates/SMRU-IT" sites="mst tst mkt mla wpa msl hph skk mku" sudo mkdir -p /usr/local/share/ca-certificates/smru for site in ${sites}; do # See https://thomas-leister.de/en/how-to-import-ca-root-certificate #sudo /bin/cp "${folder}/Default-ca-smru-sfw-${site}.pem" "/usr/local/share/ca-certificates/smru/smru-sfw-${site}_CA.crt" 2> /dev/null #sudo /bin/cp "${folder}/smru-sfw-${site}_CA.pem" "/usr/local/share/ca-certificates/smru/smru-sfw-${site}_CA.crt" 2> /dev/null sudo /bin/cp "${folder}/smru-sfw-${site}_CA.pem" "/usr/local/share/ca-certificates/smru/smru-sfw-${site}_CA.crt" sudo chmod a-x "/usr/local/share/ca-certificates/smru/smru-sfw-${site}_CA.crt" done sudo update-ca-certificates sudo umount /media/Teams curl https://smru-sfw-tst.dyndns.org:4444
16.2.3. Local Windows Computer
-
Option 1
-
Enter the following commands at a Command Prompt with administrative privileges.
certutil.exe -addstore root "T:\IT\Public\X509 Certificates\SMRU-IT\smru-sfw-mrm_CA.pem" curl.exe https://10.30.1.170:4444 -
-
Option 2
-
Enter the following commands at a PowerShell Command Prompt with administrative privileges.
$FilePath = "T:\IT\Public\X509 Certificates\SMRU-IT" Import-Certificate -FilePath "$FilePath\smru-sfw-mrm_CA.pem" -CertStoreLocation Cert:\LocalMachine\Root -
17. VPN
17.1. SSL VPN (remote access)
-
Note: When having an ISP router instead of using PPPoE, then port 8443 forwarding must be set up on the ISP router.
17.1.1. Configuration of Sophos Firewall
-
Browse to https://10.10.1.170:4444.
Username: admin Password: ********
-
Click Login.
-
Select CONFIGURE > Authentication > Groups.
-
Click Add.
Group name MRM SSL VPN group Description Group type Normal Surfing quota Unlimited Internet Access Access time Allowed all the time Network traffic None Traffic shaping None SSL VPN policy MST SSL VPN policy Clientless SSL VPN policy No policy applied L2TP ○ Enable ● Disable PPTP ○ Enable ● Disable Quarantine digest ○ Enable ● Disable MAC binding ○ Enable ● Disable IPsec remote access ○ Enable ● Disable Sign-in restriction ● Any node ○ Selected nodes ○ Node range
-
Click Save.
-
Select CONFIGURE > Authentication > Users.
-
Click Add.
Username John.vpn Name John Smith Description User type ● User ○ Administrator Profile Profile Password ******** ******** Email john@shoklo-unit.com Group MRM SSL VPN group Surfing quota Unlimited Internet Access Access time Allowed all the time Network traffic None Traffic shaping None SSL VPN policy MST SSL VPN policy Clientless SSL VPN policy No policy applied IPsec remote access ○ Enable ● Disable IP address L2TP ○ Enable ● Disable IP address PPTP ○ Enable ● Disable IP address Quarantine digest ○ Enable ● Disable MAC binding ○ Enable ● Disable MAC address list Simultaneous sign-ins ■ Use global setting ■ Unlimited Sign-in restriction ○ Any node ● User group node(s) ○ Selected nodes ○ Node range -
Click Save.
-
Select SYSTEM > Hosts and services > IP host.
-
Click Add.
Name MST Local Network IP version ● IPv4 ○ IPv6 Type ○ IP ● Network ○ IP range ○ IP list IP address 10.10.1.0 Subnet /24(255.255.255.0) IP host group
-
Click Save.
-
Select SYSTEM > Hosts and services > IP host.
-
Click Add.
Name MST SSL VPN Network IP version ● IPv4 ○ IPv6 Type ○ IP ● Network ○ IP range ○ IP list IP address 10.10.9.0 Subnet /24(255.255.255.0) IP host group
-
Click Save.
-
Select CONFIGURE > Remote access VPN > SSL VPN.
-
Click Add.
General settings Name MST SSL VPN policy Description Identity Policy members MRM SSL VPN group Tunnel access Use as default gateway OFF Permitted network resources (IPv4) MST Local Network Permitted network resources (IPv6) Idle time-out Disconnect idle clients OFF Override global time-out(Default 15 Minutes) -
Click Apply.
-
Click OK.
-
Select CONFIGURE > Authentication > Services.
-
Click Add.
Firewall authentication methodsAuthentication server list Selected authentication server Local ■ Local -
Click Apply.
-
Click OK.
SSL VPN authentication methods○ Same as VPN ○ Same as firewall ● Set authentication method for SSL VPN Authentication server list Selected authentication server Local ■ Local -
Click Apply.
-
Click OK.
-
Select SYSTEM > Administration > Device access.
-
Check LAN | User Portal.
-
Check LAN | VPN Portal.
-
Check WAN | SSL VPN.
-
Click Apply.
-
Click OK.
-
Note: To change VPN settings, the Sophos firewall needs to be registered.
-
Select CONFIGURE > Site-to-site VPN > SSL VPN > SSL VPN global settings.
protocol ● TCP ○ UDP (Select UDP for better performance) SSL server certificate ApplianceCertificate Override hostname smru-sfw-mrm.dyndns.org Port 8443 Assign IPv4 addresses 10.10.9.0 /24 (255.255.255.0) Assign IPv6 addresses 2001:db8::1:0 /64 Lease mode IPv4 only □ Use static IP adresses IPv4 DNS 10.10.1.1 IPv4 WINS Domain name smru.shoklo-unit.com Disconnect dead peer after 180 Seconds Disconnect idle peer after 15 Minutes Encryption algorithm AES-256-GCM Authentication algorithm SHA2 256 Key size 2048 bit Key lifetime 28800 Seconds ■ Compress SSL VPN traffic ■ Enable debug mode
-
Click Apply.
-
Click OK.
-
Select PROTECT > Rules and policies > Firewall rules.
-
Click Add firewall rule > New firewall rule.
Rule name Allow MST SSL VPN clients Action Accept ■ Log firewall traffic Description Rule position Bottom Rule group VPN traffic Source zones VPN Source networks and devices MST SSL VPN Network During scheduled time All the time Destination zones LAN Destination networks MST Local Network Services Any ■ Match known users MRM SSL VPN group □ Exclude this user activity from data accounting □ Use web authentication for unknown users -
Click Save.
17.1.2. Configuration of certificates
-
Select SYSTEM > Certificates > Certificates.
-
Delete any old user vpn certificate.
-
Click the ApplianceCertificate | Regenerate certificate button.
-
Click OK.
17.1.3. Configuration of Windows client
-
Browse to the Sophos VPN Portal at SMRU-SFW-MRM.
Username: Douwe.vpn Password: ********
-
Click Login.
-
Select SSL VPN.
-
Select Download client and configuration for Windows.
-
Note: When the OpenVPN GUI is up and running, the Sophos SSL VPN Client Setup detects this but doesn’t realise it is another VPN client and asks if the MST SSL VPN Client should be terminated. If you click Yes then it will close the OpenVPN GUI connection. Make sure to click No.
-
Run the sslvpn-douwe.vpn-client.exe file with administrative privileges.
-
Optional: Click No to skip terminating the MST SSL VPN Client.
-
Click Next.
-
Click I Agree.
C:\Program Files (x86)\Sophos\MST SSL VPN Client
-
Click Install.
-
Uncheck Always trust software from "Sophos".
-
Click Install.
-
Click Next.
-
Click Finish.
17.1.4. Troubleshooting
-
Type
tail -f /log/sslvpn.logon the Command Line of SMRU-SFW-MRM.
17.2. SSL VPN (site-to-site)
-
Add an SSL VPN site-to-site server connection.
-
Browse to https://10.10.1.170:4444.
-
Login with admin user account.
-
Select CONFIGURE | VPN.
-
Select SSL VPN (site-to-site).
-
Click Add for the Server.
-
Type
MSTtoMLAin the Connection name field. -
Uncheck Use static virtual IP address
-
Click Add new item for Local networks.
-
Check MST Local Network.
-
Click Apply 1 selected items.
-
Click Add new item for Remote networks.
-
Check MLA Local Network.
-
Click Apply 1 selected items.
Connection name MSTtoMLA Description □ Use static virtual IP address Local networks MST Local Network Remote networks MLA Local Network-
Click Save.
-
Click Download icon for MRMtoMLA.
-
Check Encrypt configuration file.
-
Type the Level 2 password in the Password field.
-
Type the Level 2 password again in the Confirm Password field.
-
Click Download.
-
Move the downloaded file to the T:\IT\Helpdesk\Sophos SSL VPN\Sites folder.
-
-
Add an SSL VPN site-to-site client connection.
-
Browse to https://192.168.26.170:4444.
-
Login with admin user account.
-
Select CONFIGURE | Site-to-site VPN.
-
Select SSL VPN.
-
Click Add for the Client.
-
Type
MLAtoMRMin the Connection name field. -
Click Choose File.
-
Select server_MRMtoMLA.epc.
-
Click Open.
-
Type the Level 2 password in the Password field.
-
Uncheck Use HTTP Proxy server.
-
Uncheck Override peer hostname.
Connection name MLAtoMST Description Configuration file Choose File | server_MSTtoMLA.epc Password ******** (Level 2) □ Use HTTP Proxy server □ Override peer hostname-
Click Save.
-
18. Templates
19. Command Line Prompt
#cat /etc/profile
#echo PS1
PS1=root@`cat /etc/hostname`:$PWD'# '
20. API
20.1. Create read-only administrator profile
-
Select SYSTEM > Profiles.
-
Select the Device access tab.
-
Click Add.
-
Type
APIreadallin Profile name field. -
Choose Read-only for Configuration.
-
Click Save.
-
Select CONFIGURE > Authentication
-
Select the Users tab.
-
Click Add.
-
Type
APIreadallin the Username field. -
Type
APIreadallin the Name field. -
Choose Administrator for the User type.
-
Select APIreadall for the Profile.
-
Type the password.
-
Type the password.
-
Type
smru-it@shoklo-unit.comfor the Email. -
Select Open Group for the Group.
Username apireadall Name APIreadall Description User type ○ User ● Administrator Profile APIreadall Password ******** ******** Email smru-it@shoklo-unit.com Group Open Group Surfing quota Unlimited Internet Access Access time Allowed all the time Network traffic None Traffic shaping None SSL VPN policy No policy applied Clientless SSL VPN policy No policy applied IPsec remote access ○ Enable ● Disable IP address L2TP ○ Enable ● Disable IP address PPTP ○ Enable ● Disable IP address Quarantine digest ○ Enable ● Disable MAC binding ○ Enable ● Disable MAC address list Simultaneous sign-ins ■ Use global setting ■ Unlimited Sign-in restriction ○ Any node ● User group node(s) ○ Selected nodes ○ Node range -
Click Save.
-
Select SYSTEM > Backup & firmware.
-
Select the API tab.
-
Check Enabled to enable the API.
-
Add 10.10.1.2 in the Allowed IP address field.
-
Click Apply.
-
Enter the following commands at a Linux Command Line.
curl --insecure 'https://10.10.1.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********</Password></Login><Get><FirewallRuleGroup></FirewallRuleGroup></Get></Request>' curl --insecure 'https://10.10.1.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********</Password></Login><Get><FirewallRule></FirewallRule></Get></Request>' curl --insecure 'https://10.10.1.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********</Password></Login><Get><NATRule></NATRule></Get></Request>' curl --insecure 'https://10.10.1.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********</Password></Login><Get><VPNIPSecConnection></VPNIPSecConnection></Get></Request>' -
Enter the following commands at a Windows Command Prompt.
curl.exe --insecure "https://192.168.32.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********!</Password></Login><Get><FirewallRuleGroup></FirewallRuleGroup></Get></Request>" curl.exe --insecure "https://192.168.32.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********!</Password></Login><Get><FirewallRule></FirewallRule></Get></Request>" curl.exe --insecure "https://192.168.32.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********!</Password></Login><Get><NATRule></NATRule></Get></Request>" curl.exe --insecure "https://192.168.32.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadonly</Username><Password>********!</Password></Login><Get><VPNIPSecConnection></VPNIPSecConnection></Get></Request>"
21. Static IP MAC mapping
To get the IP address from another DHCP server configured on the Sophos Firewall, enable the static entry scope at the global level.
-
Sign in to the command-line interface (CLI).
-
Select option 4. Device Console.
-
Run the following command:
system dhcp static-entry-scope show system dhcp static-entry-scope global system dhcp static-entry-scope show exit
22. Reset the admin password
-
See how to connect to Device Console with Micro USB cable.
-
See how to connect to Device Console with serial cable.
-
Connect the Micro USB cable (console cable) with Sophos XGS and the computer.
-
Open Device Manager to check whether the Virtual COM Port and USB drivers are installed correctly.
-
Connect to the Device Console by Putty.
-
Check the USB Serial Port whether it is COM1, COM2, COM3, or etc in Device Manager > Port (COM & LPT).
-
Start Putty.
-
Choose Serial for Connection type.
-
Type
<COM3>in the Serial line field. -
Type
38400in the Speed field. -
Click Open.
-
Press Enter.
-
Type
RESETand press Enter. -
Type
4and press Enter. -
Type
yto confirm and press Enter. -
Type the default password admin and press Enter.
-
Close Putty.
-
-
Browse to https://<Firewall IP address>:4444[^].
-
Type
adminin the Username field. -
Type
adminin the Password field. -
Optional: Click Continue.
-
Type
adminin the Current password field. -
Type the new password in the Password field.
-
Type the new password in the Confirm password field.
-
Click Apply.
-
Logout from Sophos Firewall web sonsole.
-
Close Browser.
23. Useful Commands
-
Enter the following commands at a Command Line.
# Get all configuration names. grep -i '^ <[a-z]' /home/Other/Sophos/2022-02-20/smru-sfw-mrm-FullConfiguration-2022-02-20.xml | sed "s/ transactionid=\"\"//" | sed "s/^ <//" | sed "s/>$//" | sort -u > /tmp/configurations-all # Get all configuration files. cd ~delta/github/git/delta-software-labs/Linux-Tools cat share/sophos-configurations.txt | grep -v "^#" | while read i; do echo $i; curl --insecure --silent 'https://10.10.1.170:4444/webconsole/APIController?reqxml=<Request><Login><Username>APIreadall</Username><Password>********</Password></Login><Get>'"<$i></$i>"'</Get></Request>' > /home/Other/Sophos/YYYY-MM-DD/$i.xml; done # Remove tokens from configuration files. for i in /home/Other/Sophos/YYYY-MM-DD/*; do sed -i "s/ TOKEN=.*>/>/" $i; done # Sort some configuration files. xsltproc share/sophos-sort-AntiSpamQuarantineDigestSettings.xsl /home/Other/Sophos/YYYY-MM-DD/AntiSpamQuarantineDigestSettings.xml > /home/Other/Sophos/YYYY-MM-DD/AntiSpamQuarantineDigestSettings-Sorted.xml xsltproc share/sophos-sort-L2TPConfiguration.xsl /home/Other/Sophos/YYYY-MM-DD/L2TPConfiguration.xml > /home/Other/Sophos/YYYY-MM-DD/L2TPConfiguration-Sorted.xml xsltproc share/sophos-sort-PPTPConfiguration.xsl /home/Other/Sophos/YYYY-MM-DD/PPTPConfiguration.xml > /home/Other/Sophos/YYYY-MM-DD/PPTPConfiguration-Sorted.xml ##xsltproc share/sophos-sort-SSLVPNPolicy.xsl /home/Other/Sophos/YYYY-MM-DD/SSLVPNPolicy.xml > /home/Other/Sophos/YYYY-MM-DD/SSLVPNPolicy-Sorted.xml xsltproc share/sophos-sort-User.xsl /home/Other/Sophos/YYYY-MM-DD/User.xml > /home/Other/Sophos/YYYY-MM-DD/User-Sorted.xml xsltproc share/sophos-sort-UserGroup.xsl /home/Other/Sophos/YYYY-MM-DD/UserGroup.xml > /home/Other/Sophos/YYYY-MM-DD/UserGroup-Sorted.xml # Remove unsorted configuration files. rm -f /home/Other/Sophos/YYYY-MM-DD/AntiSpamQuarantineDigestSettings.xml rm -f /home/Other/Sophos/YYYY-MM-DD/L2TPConfiguration.xml rm -f /home/Other/Sophos/YYYY-MM-DD/PPTPConfiguration.xml ##rm -f /home/Other/Sophos/YYYY-MM-DD/SSLVPNPolicy.xml rm -f /home/Other/Sophos/YYYY-MM-DD/User.xml rm -f /home/Other/Sophos/YYYY-MM-DD/UserGroup.xml # Compare configuration files. diff -qr /home/Other/Sophos/2022-02-22P /home/Other/Sophos/2022-02-22Q # Set the interface IP address ifconfig Port1 10.20.1.170 netmask 255.255.255.0 up
24. SSH Commands
ssh -tt admin@10.10.1.170 << EOF 5 3 ls -al exit 0 0 EOF