I also use clientless users so that every machine has a user ID. (This part could be made easier rather than as a separate step, for sure.) And almost all of my firewall rules require a user ID for packets to get through. So something that just gets plugged in or jumps onto the WiFi will: a) immediately stand out based on its IP, and b) won't be able to get anywhere.
I've blocked STUN ports (TCP/UDP 3478 and TCP 5349) under IPv6, and it is in fact blocking traffic. I'm wondering if this is an oddity whereby STUN is focusing on IPv4 but Apple prioritizes IPv6. I also have a separate IPv4 firewall rule for STUN ports, to monitor things and traffic under this rule is low. Which is why I'm assuming that SFOS follows the connection resulting from STUN mechanisms and considers it STUN for some Application purposes. (Though I think there are other Application displays where the traffic is thrown under SSL or some other Application type.)
I don't have an answer for you, but to be clear, you mean you can no longer access the firewall via the web interface, but you do have direct console access (or SSH or something)? So you're basically asking for a CLI-based way to de-active a NAT rule?
However, I cannot get to internet on the Access Point that XG's LAN is connected to. Ideally I should be able to add additional routers or Wireless APs that LAN and everything should be behind the FW. I am assuming I need to enable a policy of some sort? Sorry this is my first time working with any firewall. Any direction you can provide would be very helpful. Thank you for your help in advance.
Extending Synchronized Security to MDR and XDR provides a direct feed for security analysts to share active threat information with the firewall, enabling it to automatically respond to active threats without creating any firewall rules.
As with every firewall release, Sophos Firewall v20 is a free upgrade for all licensed Sophos Firewall customers and should be applied to all supported firewall devices as soon as possible. This release not only contains great features and performance enhancements, but also important security fixes.
Chris McCormack is a network security specialist at Sophos where he has been focused on firewall and network protection since joining Sophos in 2008. When not evangelizing Sophos network security products, Chris specializes in providing advice and insight into the latest threats and network protection technologies and strategies.
Sophos Firewall integrates leading technologies into a single next-generation solution without compromising security. Highlights include deep packet inspection with IPS, ATP, URL filtering, and in-depth reporting; Bidirectional AV for WAF with authentication offloading, path-based routing, country-level blocking; and self-service SSL and HTML5 VPRN technologies to make connecting from anywhere and on any device a reality - without administrative overhead.
Preconfigured templates and centralized policy management save time managing user, application and network policies, and provide pre-packaged web filtering, IPS, traffic shaping and app control policies for Active/Active and Active/Passive deployments spanning multiple availability zones.
Sophos synchronized security allows organizations to link endpoints, cloud workloads, and firewall to relay health status and immediately to respond to threats on your network.
Part of a complete SaaS security platform. A selection of Sophos AWS solutions are included below with more at www.sophos.com/cloud.
Certified virtual machine and Azure Resource Manager templateswith centralized policy management enable teams to manage and apply all user,application and network policies from a single console. With time-savingbusiness application and server protection templates, plus pre-packaged webfiltering, IPS, traffic shaping and app control policies at your fingertips.
Sophos synchronized security allows organizations to linkendpoints, cloud workloads, and firewall to relay health status and immediatelyto respond to threats on your network.
Part of a complete SaaS security platform. The complete range ofSophos solutions for Microsoft Azure are available at www.sophos.com/azure.
Flexible Pricing
Sophos offers two pricing options for Firewall on Azure: Pay-As-You-Go and Bring-Your-Own-License. PAYG allows you to pay hourly only what you use, with no minimum commitment and the ability to stop at any time. BYOL allows you to use a standard 1,2, or 3 year Sophos Firewall Virtual license to protect your Azure Vnets and resources.