XG Firewall - Roadmap?

Hej,

is there a roadmap for the XGs for the next major versions and the planned functions?

Thanks.

  • In reply to Bjoern Freiherr:

    Then what are the changes in 17.5? In the last roadmap I have seen there were 17.2, 17.3 and 18, no 17.5.

  • In reply to Steppenwolf:

    Hi Steppenwolf!

    17.5 beta should be already available in October.

    Quick overview of the key new features in v17.5:

    • Sophos Central Management of XG Firewall with new features for backup and firmware management, as well as a new zero-touch deployment option
    • Synchronized Security features including Lateral Movement Protection to prevent threats from spreading on the same network segment and Synchronized User ID to eliminate the need to integrate with Active Directory for user identification
    • Wireless APX access point support offers support for the new Wave 2 access points, providing faster connectivity and added scalability (and will come shortly following the main v17.5 release in MR1)
    • Education features such as policy-based control over SafeSearch and YouTube restrictions, block-page overrides, and Chromebook authentication support
    • Email features with Sender Policy Framework (SPF) anti-spoofing protection and a new MTA based on Exim which closes a couple of top requested feature differences with SG UTM
    • IPS protection is enhanced with the Cisco Talos IPS pattern library and more granular categories
    • Management enhancements including enhanced firewall rule grouping with automatic group assignment and a custom column selection for the log viewer
    • VPN and SD-WAN failover and failback including new IPSec failover and failback controls and SD-WAN link failback options
    • Client authentication gets a major update with a variety of new enhancements, such as per-machine deployment, a logout option, support for wake from sleep, and MAC address sharing
    • Airgap support enables XG Firewall to be updated via USB in situations where XG Firewall can’t get updates automatically via an internet connection due to an “airgap” or physical isolation (coming shortly following the main v17.5 release in a MR)
    • Sophos Connect IPSec VPN client, free for all XG Firewall customers, that makes remote VPN easy for end users (not part of v17.5 but being made available at the same time for early access)
  • In reply to KingRolo:

    Hi,

    were is v17.5.b hiding?

    Ian

  • In reply to rfcat_vk:

    Never heard of 17.5.b unless someone in marketing invented the term.

    In short, the originally planned 17.2 and 17.3 with lists of features have been replaced with 17.5 and the list of features above.

    Also see community.sophos.com/.../xg-firewall-v17-5-is-coming-soon where they mention "We are expecting the beta to be available in the coming days".

     

  • In reply to Michael Dunn:

    v17.5.b is the beta version of v17.5 to give it a name.

    Ian

  • Bumping this thread version December 2018.  

     

    1. Logs are still helpless. 
      1. Would be nice we had something that compares to Checkpoint ...
      2. Some shy improvements in v17.5.
      3. The best would be a direct link with WireShark while logs becomes acceptable in a future version.
    2. STAS needs a complete remelting. 
      1. Why not having A SINGLE CLIENT FOR ALL SOPHOS PRODUCTS AND APPLIANCES ?
      2. Instead of going tru all those ports, registry keys, et.c. non-sense setups ?
    3. XG as an NTP is a basic requirement.  Should have been done long ago.
    4. Full features DHCP.
      1. At least we could point desktops to 2 or 3 trustable NTPs.
      2. Pooled NTP web sites is such a non sens to me.
    5. 2017 and 2018 were dedicated to bug fixes and stability almost exclusively.  Seems to me the real improvement this year was the MTA.
    6. Hope 2019 will bring us on par with the competition.

    Merry Christmas and Happy new year.

    Paul Jr

  • In reply to KingRolo:

    Sorry to hear the UTM/EXIM is the point of comparison for mail filtering, since UTM/EXIM:

    • is unable to examine the From header (the one that the user sees), so it cannot block forged values in this header (one common complaint is the inability to block From domain=receipient doman)
    • is unable to do filtering based on server name (whether Reverse DNS, Forward-Confirmed Reverse DNS, or Forward-confirmed DNS of HELO/EHLO name),
    • cannot check or enforce sender DMARC policy checking,
    • cannot export a message log into CSV, Excel, or any other usable format.

    Email filtering seems like the weakest component in UTM, so if XG is reaching up to meet UTM, it is reaching up to a pretty low goal.

  • In reply to DouglasFoster:

    Hello

    Is it still the same with EXIM version 4.91 ? Those first three items are deal killers for me.  I read that DKIM can be implemented on EXIM by calling external services.  Same for anti-spam et.c.  I do not know yet how EXIM was implement on XG.  Possibly it was done by Sophos already ...

    Paul Jr 

  • In reply to Big_Buck:

    No one has rebuked me yet...  

    I would be hapoy to be wrong, or to be the motivation to implement features that should have been in place 10 years sgo.

  • In reply to DouglasFoster:

    Well ... Let's start :) !!!

    This guy here: https://forum.directadmin.com/showthread.php?t=55929 as somewhat integrated EXIM with OpenDMARC.

    I haven't checked yet, but maybe we have something equivalent in XG now in v17.5.

     

    Paul Jr

  • In reply to Big_Buck:

    Currently, I am a UTM user, but I bounce over to the XG group occasionally to see if a migration would be worth the pain.   

    I read the EXIM documentation to see if I could do something under the covers to improve on the UTM SPAM filter, which is where I realized that EXIM did not examine the FROM header at all.   That exercise was at least a year ago, so it is possible that the situation may change in a newer release.  EXIM has a couple of technologies for writing filter definitions.   It may be possible to create Reverse DNS filters using the EXIM filter mechanisms, but I could not easily see where these files existed inside UTM.   If I had found them, I assumed that the UTM interface would overwrite them, and I knew that any under-the-cover manipulation would make my device unsupportable, so I gave up.   

    I already had another product that is my primary mail filter so we have kept it going.   UTM/EXIM provides a second look which captures some things that the primary device misses.

    Sophos Email Appliance appears to be Sophos' flagship mail product.   It does DMARC enforcement, but does not have Reverse DNS filtering, so I was underwhelmed.

    I have been looking for a product that does everything that I think a minimally-acceptable mail product should do.   So far, the solution will cost about 8 times what I am paying now for my primary mail device.  I do not think I can sell that expense up the management chain.   So I am still looking. 

  • In reply to DouglasFoster:

    Hello

    I have stopped using Sophos Mail Gateway , I also stopped using XG mail gateway, and turned back to Symantec Mail Gateway (Brigthmail).

    1. Took Sophos too long to upgrade to SMBv2.
    2. Far more easier to use.  By that, I also mean far more intuitive.
    3. Complete reporting.  And all features required for a mail appliance running for a Bank !!!
    4. Around $CAN 15 per user for the appliance "Only" licence.  Cheaper if you combine with EndPoint Protection.
    5. For some incomprehensible reasons, "Symantec Enterprise" license do not exist anymore.
    6. I also tested Spam Titan, but in 2018, it had too much false alarms.  It was rock solid before ...

    My renewal with Sophos is in few months.  At this moment, I intend to swap back endpoint protections to Symantec.  Sophos SEC installation is way too complicated.  Ports here, ports there, password here, password there, users here, users there, folder permissions here, folder permissions there.  It never ends.  And unexisting uninstall.  Yes, Uninstall is manual.  And maintenance requires way too much interventions.  For XG, I am not fixed yet. But if things progress this year as slow as it was last year, I will migrate to a more common and streamline product as well.  XG as it is, is too unintuitive and requires way too much care.

    Paul Jr

  • In reply to Big_Buck:

    Man, With all the people thinking about leaving XG, I wonder if Sophos is actually selling more than people leaving. 

  • In reply to tom greene:

    Not really - the XG is getting to be a great product. Sure it has shortcomings but in general it does what we want.

    Not a fan of XG for Mail Scanning or controlling my WiFi but web policies, Firewall, Authentications, VPNs etc its quite stable (now)

     

    In the late v16s firmware I was ready to chuck it out and get something that worked. I have since bought an XG450....

     

  • In reply to M8ey:

    I agree it is getting to be a great product, but even today it is still missing some fundamental pieces to make it equal to the UTM.

    Just today I was putting together a quote, and couldn't use the XG because it is missing a proper DHCP, DNS & NTP server, a to name a few modules which are in dire need of updating.