Windows issues following Core Agent 2.7.6 and Intercept X 2.0.17 update. See KBA 135504 for more information.
On the Sophos UTM SG 210/230/310/330/430/450 models, the on-board bypass ports are enabled by default. These allow network traffic to pass even when the UTM is turned off. In some specific situations, this may cause issues within the customer network for example, a routing loop. This article explains how to disable the bypass function from the command line of the UTM. The following sections are covered:
Applies to the following Sophos products and versions Sophos UTM
echo 0 > /sys/class/bypass/g3bp0/func echo 0 > /sys/class/bypass/g3bp1/func
If you've spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article. This is invaluable to us to ensure that we continually strive to give our customers the best information possible.
Every comment submitted here is read (by a human) but we do not reply to specific technical questions. For technical support post a question to the community. Or click here for new feature/product improvements. Alternatively for paid/licensed products open a support ticket.