Is it possible to get the hardware limitations removed for the home version? Or have they been removed in V18?
C'mon mate, lets imagine that sophos has to pay salaries, developing new solutions, ideas maintain current activities, infrastructure etc etc. We can be glad that sophos is allowing us a home users to using their product just for free with all features. Beside that, for home usage 4 cores and 6 gb is a overkill. With all features on you can gain 1GB/s. look how Fortigate(and other solutions) are expensive, what the are offering etc. With sophos you've got it for free with great community :) appreciate it ^^ and if you wanna use it for commercial just support it - buying it ;)
HP Small Form Factor: i5 4Cores, 8Gb of RAM.Intel Network Card 5x EthSSD: 256Gb
I understand this logic, but there is no reason to limit hardware if it is proven that the UTM is in a home location. There are tons of other UTM packages out there that don't have hardware limitations. I don't mind paying the annual license, but to pay the annual license with a hardware restriction is weak. I guess I'll just stay on PFsense until they finally decide to remove the limitations. Thanks
You seem to fail to understand, there is no limitation on CPU performance, jus the number of real cores.
As BLS has pointed out most home user hardware is way more powerful that the top of the range Sophos hardware.
The recommendation for home users is 4 real CPU cores running as fast as you can. I7s are a waste of money and generate too much heat, you need CPUs that do not have extra features like a maths co-processor which adds no performance value.
XG115W - v19 GA - Home
1225v5 6gb ram, SSID, 4 NICs 20w - v19 EAP - on holiday.
If a post solves your question please use the 'Verify Answer' button.
you can apply the home licence to the Sophos hardware, takes a little bit of doing and I even think there are KBAs on the subject and there are plenty of threads in these forums.
I’m not arguing it’s overkill, but I just don’t want the hardware limited. There’s 16gb of memory. The only thing I can think of is this is built on a 32bit version and they don’t have a 64bit version available.
I run a 6gb system and use all of that memory, to go above 4gb (3.8) you need a 64 bit system. My system uses 3.5gb of the available memory. Now in v17 you will find most home users with 6gb were running about 75% memory utilisation which has been fine tuned in v18.
I have read, but you have to use various disk tools (gparted and such) etc. Which I'm more than happy to do etc. I was mulling an XG105- XG135 appliance at one point (used) but being on a UK ADSL connection, utterly pointless.
I was running an i3 6100T/32GB RAM with a 4 port Intel NIC with pfsense and no probs at all, it's now running ESXi 6.7 atm. It lacks cores for me to turn it into the Sophos XG box.
Find the UI on my Atom system a bit slugish, hence why I may consider an update.
IF / WHEN 1Gbit internet arrives in our area I'd happily review specs again.
75% is horrible. If you had more available memory it wouldn't be pushing the limit like that. I just don't get it. Do they not have a 64-bit system available?
let me try an put things into perspective
1/. XG is a 64bit OS.
2/. many XG installations only have 2gb of ram using v17, v18 needs 4gb.
3/. 75% ram usage on a linux system is not an issue like on a MS system. Linux has a very much better memory management system and uses swap effectively.
4/. a while ago many forum member were very upset that their XG's memory usage was running around the 70-80% mark. Sophos XG devs took notice added a lot of new functionality and refined the XG, they also tuned the load management as reported in the GUI and diagnostics.
My system is currently showing around 60% memory usage which grows if I leave the GUI open for too long, but shrinks when the GUI is closed. Prior to v18 my XG memory usage was around 75% on a 6gb system.
If you are a home user and like to fiddle with your firewall settings, then a J1900 or XG85/6 or XG 105/6 is not for you. If you are a set and leave then they will be fine depending on your internet connection speed of course. I have J1900 4 port NIC system which I use for testing, but it is too slow when making changes or reviewing logs for my regular use.
I had a feeling, which is why I feel like they should just unlock it rather than have the hardware limitations on the package. Until they remove the hardware limitations I can't see the reason to switch to Sophos. I think this is a sad thing they have chosen to do, and could have easily unlocked for the $50/year subscription; as well as allowing unlimited devices. It's not hard to prove the device is at a house location. I hope the developers actually read this post, and see the benefit for unlocking the hardware limitations.
There's quite a lot of people arguing on their behalf that the hardware limitations in the software are more than enough hardware. I feel these people just don't understand that you should be allowed to use faster processors and more ram if you deem it necessary. I understand the company wants you to buy their devices, but then why have a software package available at all to home users. They obviously realized a need, but determined that a limitation should be on that need.
Any who this seems pointless at this time; as the developers will not unlock the software package for users. Therefore, I will continue to use PFSense rather than giving the Sophos developers a yearly subscription fee. Good luck to others; maybe they will finally realize this is the right thing in V20.
There is a thing of cutting off your nose to spite your face - by all means stick with PFSense if you so wish - just to ask....you are aware of the security vulnerabilities that exist in the product?
If not, pass me your IP address and I'll give you a demonstration...
Enterprise Architect & Business owner
you can use the fastest intel processor money can buy, nothing stops you building a system around it, but you need a special mother board, big power supply and lots of heatsinks. But you gain nothing in performance eg my e3 is the same processor Sophos use in their topend models.
Also it is not a developer issue it is a marketing issue.
Please let Tim demonstrate PFSense to you.
As a company, before we take on support of clients networks we put things through a PEN test, PFsense has always produced interesting results to say the least, it's good for a "home" protection and better than the NAT based solutions you had with the standard routers provided, but no where near good enough for the enterprise.
You have to think, what would you prefer? An enterprise solution for home, albeit with some hardware limitations, or an open-source experiment for the home market.
Makes sense and the best way of understanding what you're taking on. Many years ago when I worked in the MSP space we walked away from a big customer as so many issues were identified during the pre-onboarding process. They refused to have items address or money spent, so the contract never moved forward. I visited their rented datacentre space in Canary Wharf and it was horrific.
Interesting re pfsense, particularly as I've seen large orgs using it. Going to google it a bit more, even with version 2.4.5? Problem with any vendor is getting past the marketing blurb. Take Unifi for example, awful edge products imho
I've worked with Fortigate, Cisco (PIX/ASA), Microsoft ISA (shudder).. My main skills though is infra, vmware, Wintel, networking and so forth.
Only exposure to Sophos XG at the moment is at home and I like it. The problem with any solution installed at home is are they left in the default setup.
The only times I've seen large organisations using PFSense is for internal VLAN segregation, and where QoS is required - not for permitter use - they normally seem to leave that to the commercial side of things.
Open Source has been a big no-no for a lot of the companies I support - it's the fear of the source code being available and therefore being examined by hackers for exploits - with closed source you have to take a longer route to find them.
And agree, the problem is that most things at home have been left in the default setup, and that usually is not hardened enough...how many home users would just have an any>any rule, rather than just allow what's needed and block everything else?
Any>Any kind of defeats the object of having a firewall - and a lot of people while they are happy to control what comes in, they forget about securing what goes out.