Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos Firewall: v20.0 GA: Feedback and experiences

Release Post:  Sophos Firewall v20 is Now Available  

The EAP Post:  Sophos Firewall: v20.0 EAP1: Feedback and experiences  

The old V19.5 MR3 Post:  Sophos Firewall: v19.5 MR3: Feedback and experiences  

To make the tracking of issues / feedback easier: Please post a potential Sophos Support Case ID within your initial post, so we can track your feedback/issue. 

Release Notes:  https://docs.sophos.com/releasenotes/output/en-us/nsg/sf_200_rn.html 



This thread was automatically locked due to age.
  • Hello,

    Does anyone know if v20 supports AES-NI for IPsec site to site tunnels for the home edition? Thank you in advance!

  • AES-NI for IPsec is not supported.

  • Hello,

    it would be very nice to get IPv6 support on sophos wireless Accesspoints!

    Greetings,

    Christian

  • VPN Profiles still revert to "Failed to load connection" state. Sophos solution is to expose VPN portal on v20 to WAN side and keep it open. This is recipe for disaster. Hardened portal does not make it safe when malicious actors are able to download VPN profile and set up MFA if this has not done previously. Meaning customer support is advising  to set up firewalls using insecure settings.

  • IPsec VPN - Unique preshared keys: nice that there is now at least a solution for IKEv2, but what about IKEv1?

    We have many customers who do not have a static IP at branch offices and devices that do not support IKEv2 - so we still can't sell them an XGS firewall..

    All of this wasn't a problem with Sophos SG/UTM!

  • This approach (using IKEv2 to do this) is as far as i know, the only technically method to do this kind of PSK sharing without loosing an sense of security. 

    What kind of peers are we talking here? If there are UTMs, you could use RED instead, if you want to do a more modern approach (as RED is the same approach like a Route based XFRM approach). 

    UTM had the "probing feature", which was not an feature by strongswan or anything. Instead it was self build and is pretty old. It comes with it downsides and therefore never implemented into SFOS. 

    By the way: You could use certificates instead of Keys, as they bring there own authentication and are unique in this terms. They bring more security in this matter and are, by using selfsigned certs, also pretty quick to implement. 

    __________________________________________________________________________________________________________________

  • If the counterpart is a UTM, we already use certificates.
    The problem is rather the colorful collection of devices like draytek/fritzbox and other devices from german ISPs like digibox/speedport - many of them support IKEv2 but unfortunately not all of them..

  • Thanks for the feedback. Likely not on the near horizon to implemented it for IKEv1, due the lack of implementation method see above. 

    I would always recommend to look into the device, which does not Support IKEv2 and it might be an approach to modernize them anyway. 

    __________________________________________________________________________________________________________________

  • On my XG125w, I updated to SFOS 19.5.4 MR-4-Build718 a few weeks ago, and now I want to update to v20, but v20 doesn't show up in the firmware tab.  I downloaded HW-20.0.0_GA.SF300-222.sig from  https://download.sophos.com/firmware/HW/index.html and when I try to apply it, I get this message: "The firmware you're trying to install is incompatible with your current firmware version. When you restart the firewall with this firmware, the firewall will start with the factory configuration..."

    Any ideas what I'm doing wrong here?

  • You can't go from 19.5.4 to V20.  You'll have to wait for 20 MR1.

    Alternatively, you could take your backup from 19.5.3, proceed with installing V20, and restore your backup.