Release Notes: https://docs.sophos.com/releasenotes/output/en-us/nsg/sf_190_rn.html
"Old" V18.5 MR4 Thread: https://community.sophos.com/sophos-xg-firewall/f/discussions/134965/sophos-firewall-v18-5-mr4-feedback-and-experiences
V19.0 GA Thread: https://community.sophos.com/sophos-xg-firewall/f/discussions/134009/sophos-firewall-v19-0-ga-feedback-and-experiences
NEW KIL entry:
I have a problem with firewall rules. Since I upgraded from 19.0 GA to 19.0 MR1, my WIFI rule is not working anymore, nothing is let through. No ping, no TCP connection from LAN zone to WIFI zone:
As you can see, 0 bytes sent/received. When I switch back to 19.0 GA it all works again and counters go up. I have no explanation why this is happening, any idea where to look for in the logs?
Edit: Same seems to be the case for Rule #11 SMTP.
Why do you use a rule without Logging?
Check the packet capture - There you should see the used Firewall/NAT Rule.
Maybe another rule picks up the traffic. Automatic VPN Rule is something, which could potentially cause issues.
Thx I will see what turned on logging will bring.
However there was a "breaking change" in 19.0 MR1...
Ok now I moved those 2 rules to the top:
And with MR1 there is still no traffic in the "LAN to WIFI" rule. I even deleted the WIFI rule and recreated it. Still the same.
The log viewer shows nothing for that destination IP 10.0.2.14.
Packet capture showed violation by "Firewall".
Rule 0 is the default drop rule, but how can it be that this is now taken, when my rule should cover the connection?
So it seems there is definitely something broken with the WIFI connections (all others seem to work), as it works with 19.0 GA without a problem.
What kind of appliance is this? Is wlnet1 a internal Wireless?
Its a Home Edition on a Intel based 4-Port Barebone. No internal wireless. The network 10.0.2.0/24 is the network configured on wireless APX120.
It is indeed odd. Looks like something is not rendering your policy. Rule 0 is simply default drop, therefore you do not see anything in Logviewer. If you already recreated the zone, what i could potentially suggest:
Try to re save the IoT Zone. See if you can save the wireless zone or if there is any error.
Then check the policy tester in logviewer, does it give you the same result or rule 32? This will lead to the next steps.
No luck. I tried saving the wireless IoT network, the WiFi zone, all without problem.
Then I even tried to set the rule "LAN to WIFI" Any,Any, to Any,any.
Still the same. All networks and rules are properly evaluated, just this WiFi network is not.
I will try the policy test with 19.0GA
in 19.0 GA it is working and picking the rule:
That is very odd. Try to change the Zone of Wifi to something else. Does the Policy test work?
In any case, feel free to give me the Access ID (Support access) via DM. I will try to reach out to somebody to check this.
OMG. Now as I recreated the zone on 19.0 GA I have the same issue!
I could finally resolve it by deleting the wireless network including its DHCP range, and do it from scratch.
Then a new firewall rule and it starts working and is accepting.
So I was hopeful to try the same thing on MR1, but unfortunately this didn't do the trick. So it really seems something has changed regarding wireless routing (as in separate zones, bridging is working).
I will send you the access ID.
LuCar Toni said:Why do you use a rule without Logging?
Lucar? The more important question is: Why is "log firewall traffic" not checked by default?
It is per design not enabled. If you want Default Drop logged, you can create a own Rule, which does this for you. You cannot enable Default drop logging. docs.sophos.com/.../index.html