Networking has evolved substantially over the last few years with more users working remotely, networks becoming more distributed, and cloud application usage exploding. Sophos is ensuring you keep pace with new products like ZTNA for remote workers, and now an extremely powerful and helpful Sophos Firewall release with Xstream SD-WAN.
As usual, Sophos Firewall OS v19 is a free upgrade for all licensed Sophos Firewall customers and should be applied to all supported firewall devices as soon as possible as it not only contains great features and performance enhancements, but also important security fixes.
You can manually download SFOS v19 from Licensing Portal and update anytime. Otherwise, it will be rolled out to all connected devices over the coming weeks. A notification will appear on your local device or Sophos Central management console when the update is available allowing you to schedule the update at your convenience.
Sophos Firewall OS v19 is a fully supported upgrade from v17.5 MR14 and later, v18 MR3 and later and all previous versions of v18.5 including v18.5 MR3. Please refer to the Upgrade information tab in the release notes for more details.
Check out the SFOS v19 release notes for full details.
Full product documentation is available online and within the product.
Update training (for v18.5 to v19) is available on the Sophos Training Portal.
If you’re new to Sophos Firewall and the new XGS Series Firewall Appliances, they set the standard for firewall protection and performance, ensuring you get the most value for your firewall investment with unique features you just can’t find anywhere else:
Get started today with a 30-day free trial, or download our Sophos Firewall Solution Brief to learn more about how Sophos Firewall can transform your network protection.
Sincerely,
Sophos Firewall Product Team
Had to roll back to 18.x mr3....The SSL VPN for remote appeared to be working; however some users were getting socket timeout errors when attempting to connect through the IPsec tunnel to a server on the other side. After rolling back those users were able to connect just fine. Had tried the new all in one client as well. This is what it was doing:
SSLVPN IN ---> Out Ipsec Tunnel to Remote Server ---> Program reports Socket Time out (IT Does connect on some ports just fine and does not time out for example 443 works fine; 4443 does not)
on 18.x mr3
SSLVPN IN ---> Out Ipsec Tunnel to Remote Server ---> Connection succeeds
And as stated it does not affect every user and IT does connect to the server remotely. IT is in the correct IP address range; so that change to the SSL IP ranges is not the issue.