Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Unable to setup an Awair Glow device

I have an Awair Glow device I purchased a few years ago that monitors the air quality in a room. It connects to the network via WiFi and it's worked great until a few months ago. I noticed it was having issues with staying connected to the WiFi access point, so I performed a factory reset to see if maybe that would resolve it. I've done factory resets in the past without any issues. However, I think this was the first time I tried since running Sophos v18 (EAP at the time). It connects to the WiFi network just fine, but when I try to continue the setup process where it communicates with the Awair server, it basically says the connection could not be established. I've tried:

  • Disabling ATP
  • Setting all policies to None and unchecking all scanning (basically a "clean" firewall rule)
  • Connecting to both my primary and guest network
  • Factory reseting the device several times
  • Disabling my ad-blocker (PiHole)

It still does not work. If I pair it to my phone as a hotspot, it works just fine. Anyone else out there with an Awair device on Sophos v18? I'm at a loss with this one.



This thread was automatically locked due to age.
Parents Reply
  • I have read his posts (which are extremely helpful and informative), but that is why I'm confused. If you read my post, it's covering the steps he mentions. Specifically, in regards to IoT devices, he mentions:

    If you have an IoT device that does not work, my recommendation is to first have it working with no filtering/scanning/decryption. Once this is working, administrators can then make changes that improve security around these devices.

    Firewall Rule - The IoT device should hit a rule that has no web policy and no malware scanning. When you open the rule the Web Filtering section should be unexpanded. The Other security features should be be set to None.

    SSL/TLS inspection rules - The IoT device traffic should hit a rule that is Don't Decrypt with a profile Maximum Compatibility, or it should have no matching rule. If you have some TLS decryption rules for some things, you can create a higher level rule with don't decrypt that uses source of your device, similar to your firewall rule.

    Let me highlight the steps he mentions:

    • "no filtering/scanning/decryption" - I did that.
    • "no web policy and no malware scanning" - I did that.
    • "Other security features should be be set to None" - I did that.
    • "or it should have no matching rule" - I did that.

    So again, I don't understand why turning SSL/TLS inspection to off (the "master switch") has any affect for a device that wasn't using SSL/TLS inspection to begin with.

    ---

    Sophos XG guides for home users: https://shred086.wordpress.com/

Children
  • It doesn't matter, since the DPI engine will still look in to the traffic. So you need to make an exception for the URL/IP-address the device is trying to access.

    I know, this is not the answer you would like, but this is who it's works today. I agree that if you choose not to scann and decrypt the DPI engine would NOT play with the traffic, but this is the way it works right now.

    You can also make a rule the uses the "v17.5" version "use proxy instead of DPI" and add the url as the destionation. This will work as well.

     

    //Rickard

  • I'm just trying to understand how Sophos XG works, which even after a couple years, I'm still not quite sure. :)

    So you're saying all traffic, regardless of policies, ATP, etc. go through the DPI engine which is what's causing the issue. That's fine, but I still don't understand why:

    1) When I turned off SSL/TLS inspection (the "master" switch or whatever you want to call it), why it started working? Does this cause all traffic to bypass the DPI? I don't think that's the case, because I can still have ATP enabled or other policies enabled on a firewall rule that use the DPI engine.

    2) One of the first things I tried was "use proxy instead of DPI", but it still didn't work.

    Again, the only thing that worked is turning off the overall SSL/TLS inspection toggle, which is why I'm confused.

    ---

    Sophos XG guides for home users: https://shred086.wordpress.com/

  • This one continues to remain a mystery. I have two Awair devices, the original Awair device and the Awair Glow. This issue only occurs with the Awair Glow. The original Awair device has no issues what so ever with Sophos XG. However, the Awair Glow only works if SSL/TLS inspection is completely turned off, even though the Awair Glow is using a firewall rule with all scanning turned off.

    ---

    Sophos XG guides for home users: https://shred086.wordpress.com/

  • There are improvements hence IoT Devices in the future releases of XG v18. 

    I would rather say, your Awair Glow uses systems, which are kinda break the DPI Engine. 

    If you dump such traffic of your Glow, you will likely see some odd stuff of the communication. IoT developer are kinda "Funky" in their way of implementing stuff. 

    For example, there are IoT Devices which are ignoring all Best practices and RFC of communication via TLS. They connect to devices, ignore the certificate validation and doing downgrades within the connection. Such stuff could properly break the DPI stream connection. 

    Long story short, expect some improvements in the next releases of V18. 

    __________________________________________________________________________________________________________________

  • Thanks for the info! I'll be sure to test it out with the upcoming releases of v18.

    ---

    Sophos XG guides for home users: https://shred086.wordpress.com/