Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

Sophos Firewall: v20.0 MR1: Feedback and experiences

Release Post:  Sophos Firewall OS v20 MR1 is Now Available 

The old V20.0 GA Post:  Sophos Firewall: v20.0 GA: Feedback and experiences  

To make the tracking of issues / feedback easier: Please post a potential Sophos Support Case ID within your initial post, so we can track your feedback/issue. 

Release Notes:  https://docs.sophos.com/releasenotes/output/en-us/nsg/sf_200_rn.html 

Important Note on EOL Sophos RED Support:

The legacy EOL RED 15, RED 15w, and RED 50 are not supported in v20 MR1. Customers using these devices should upgrade to SD-RED or a smaller XGS appliance before upgrading to MR1 to maintain connectivity. See the following article for details: Sophos RED: End-of-life of RED 15/15(w) and RED 50



Prio Change
[bearbeitet von: LuCar Toni um 4:40 PM (GMT -7) am 23 Sep 2024]
  • Hi bobbylam,

    I found the file and reviewed the data. The NC is in the file.

    A minor point would be good if the file data was written in local time.

    Regards

    Ian

    An update from the SASI file from when I restored to v20.0.1 MR-1

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.



    Added extract fro SASI log showing SASI files update failures since I rolled forward to v20.0.1 MR-1
    [edited by: rfcat_vk at 5:26 AM (GMT -7) on 18 May 2024]
  • I upgraded a 19.5.3 cluster to 20.0.1 and now shows

    This firewall belongs to a Sophos Central firewall group. To prevent potential conflicts, use caution when making changes locally.
    Which is not true. It also did not show that banner before the update.
    It is possible but I'm not sure that this cluster was once a test candidate for Central Groups but that has been deleted 2 years ago! When we tested, I remember I have seen the banner.

    edit: the same happened to a second cluster just upgraded the same upgrade path.
    both clusters are in Central in "Ungrouped"

  • Maybe this is an old entry in central.

    Could you move the firewall in a new group (create one), using skip sync and then remove it again after some seconds?

    __________________________________________________________________________________________________________________

  • I removed the Sophos Central device registrations on the cluster and re-registered both machines again.

    The This firewall belongs to a Sophos Central firewall group  message has now disappeared.

  • Hi folks,

    I run a dual stack system.

    I have been investigating issues with facebook messenger, for those that are not aware facebook has implemented a limited deployment of secure end to end chats for some users.

    With v20 GA there wasn't an issue with secure chats, with V20.0.1 MR-1 with and without the hot fix some of the secure chats failed to send.

    I spent some time investigating the issue and had to create a new firewall rule to allow facebook messenger secure chats to function.

    What I found was using the proxy in v20.0.1 MR-1 does not pickup the web exceptions eg ignores them.

    The new rule uses http, https, quic and port 5222 to the Facebook IPV6 /32 CDN. Even with this rule in place, enabling the proxy causes the chats to fail and fail to update the secure keys. Disable all proxy functions and the chats work.

    The issue is mainly with the messenger application, when using the web browser access chats work where the secure keys update, though the person receiving the chat on the application cannot respond.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • Update went well. I REALLY like the interface in Sophos Central for selecting firmware.

    I won't be able to test the VPN for a few days, but hopefully with the update it won't do any compression and I'll be able to switch to OpenVPN's recommended security level (no compression) rather than their legacy security level (allows downstream compression).

    I was out of the country and messed up and my XStream Protection subscription ran out. Got it straightened out today, and synchronized with Central, but while the Admin Licenses page said I was subscribed, the individual pages (like Monitor & Analyze Zero Day or Protect Web or Protect Applications) had the orange banner that these features require a subscription. Had to reboot to eliminate that. (And presumably to have those features function.) So this might be considered a bug?

  • The changes to the Local service ACL are great. But what I'm missing is a way to reorder the entries. Inserting something at the 2nd or second last position is currently not possible without deleting and creating other rules, because you can only place rules at the bottom or top. As an idea for a future version. 

  • Thank you for your valuable feedback. We will add this to our backlog and prioritize for future releases.

  • Working with Ian in DM.  If anyone else is having a problem that sounds similar please let me know in DM.