Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG Firewall Maintenance Release MR-1.1

 

We’ve just released a maintenance release for Sophos XG Firewall. This update contains fixes for a number of issues reported on XG firewall thus far.

News

  • Maintenance Update

Remarks

  • System will be rebooted

Bugfixes

  • NC-5673 - Improve system behavior when loading new patterns 
  • NC-4708 - Improvements to stability of web content filter lookups
  • NC-5858 - Support newest tlds in custom category creation         
  • NC-5771 - Resolve high memory usage by SMTP filter     
  • NC-6003 - Resolve AV reloading after update when no subscriptions present
  • NC-4826 - Remove "upgrade Type" option on new VW installs
  • NC-5001 - Correct cosmetic error in notification following license upgrade
  • NC-5138 - Correct display problem in user objects
  • NC-5657 - Resolve condition preventing hotfixes from installing under certain circumstances
  • NC-5661 - Improve license communication
  • NC-3951 - Ensure pattern update progress is shown during update
  • NC-5942 - Improve device activation communication reliability
  • NC-5960 - Improve pattern update service to prevent unnecessary failure retries
  • NC-5754 - Allow EULA acceptance on Console
  • NC-4842 - Clearly indicate subscription evaluations on licensing screen
  • NC-5703 - Correct Certificate Authority update issue, during CR migration
  • NC-5478 - Fix IPv6 incorrectly blocking valid gateway address as broadcast
  • NC-4543 - Allow wlan interface to be used in static and multicast routing
  • NC-5098 - DHCP Security Update
  • NC-4535 - Ensure Masquerading on by default when necessary, when creating firewall rules
  • NC-5066 - Resolve IU issue where popup notification not closing after adding an IP Host to the Local Service ACL Exception Rule       
  • NC-5756 - Improvements to licensing calculations
  • NC-5503 - HA reliability improvements 
  • NC-5698 - Web proxy stability improvements       
  • NC-5778 - DNS config change handling improvements 
  • NC-5834 - AV scanning reliability improvements
  • NC-5837 - Improve handling of Netflix and other streaming media
  • NC-5648 - Improve system performance when a high volume of APs are connected              
  • NC-5587 - Correct error where Business policy for Email server (SMTP) showing wrong pre-configured ports
  • NC-4776 - Localization improvements and fixes
  • NCCC-1600 - Fix issue where order of user groups set in SFM may not be properly reflected in XG
  • LOC-319 - Localization improvements and fixes
  • NC-5529 - Improve Heartbeat authentication
  • NC-6136 - Telemetry reliability improvements
  • NC-6380 - Improve IPS session timeout handling behavior
  • NC-6515 - Improve SSH device host key generation
  • NC-6422 - Heartbeat device registration improvement
  • NC-6975 - Correct issue where admins are not able to download SATC Agent (Sophos Authentication Thin Client v2.0.6.0) from Authentication client and user portal   
  • NC-5919 - Improve display of failed up2date attempts in the UI

Updating your Firmware

Note: There's a convenient "How-to" video covering firmware updates and roll-backs (also embedded below).

Sophos Up2Date technology makes it easy to update your Sophos XG Firewall to the latest version.

In most cases, a notification will automatically appear in the Control Center of your Firewall, indicating a firmware update is available.  Simply click through to the Firmware update screen or navigate to System > Administration > Firmware and click the “Download” option next to the available firmware update followed by “Install" to begin the update process.  The system will reboot during the update process, so plan your update accordingly.

If the update does not automatically appear, you can use the “Check for new Firmware” option to force a check for new firmware updates.  

Alternatively, download the firmware update files manually from MySophos.  Firmware file sizes and signatures will be different for different appliance types. The correct reference values for your installations will be shown at the link above.  Then in your XG Firewall, navigate to System > Administration > Firmware and click the “Upload Firmware” icon in the empty firmware slot below your existing version in the firmware table.  Select the firmware file and click “Upload & Boot” to apply the update.

Rolling-back to a Previous Firmware

Whenever a firmware update is applied, the previous firmware version is preserved enabling you to roll back at any time.  To do so, navigate to System > Administration > Firmware and identify the previous firmware version in the table at the top of the screen.  Click the "Boot Firmware Image” icon in the table to restore that firmware version and reboot the device.  Note that any configuration changes made between the upgrade, and rollback, will be lost. 

Providing Feedback

Please provide feedback and discuss this release or other aspects of the product with fellow community members and Sophos staff here on the forums. Please indicate the version you are using to enable everyone to better assist you.

Video



This thread was automatically locked due to age.
Parents
  • Thanks for the update however NC-5837 Netflix still not working on Android devices, What did you fix?

    • Improve handling of Netflix and other streaming media
  • I was excited to see this as well but it did not work for me either.  Interested to know it additional settings are required to make this work.

  • I agree Netflix does work with AV scanning off. Please update if you find a better way then turning of AV scanning for the entire affected device. I just can't believe this very old problem from UTM 9 has not been fixed in XG. It is fixable because in UTM 9 all we had to do was create Regex entries and not disable protection totally for the Android device but that workaround does not work in XG from what I have seen. Come on Sophos please get this very old problem FIXED once and for all.

  • Thanks for the clarification.  Though i am not seeing the issue I hope it gets resolved quickly as reporting is an important part of XG.

  • Big Ray said:

    I agree Netflix does work with AV scanning off. Please update if you find a better way then turning of AV scanning for the entire affected device. I just can't believe this very old problem from UTM 9 has not been fixed in XG. It is fixable because in UTM 9 all we had to do was create Regex entries and not disable protection totally for the Android device but that workaround does not work in XG from what I have seen. Come on Sophos please get this very old problem FIXED once and for all.

    I'm sure Sophos have bigger things to worry about like fixing bugs that actually matter for a corporate environment instead of attending to bugs for small things like Netflix. 

  • There is no bug to small that should not be fixed, If its a bug affecting any part of your user base payed or otherwise it should get fixed.

    Thanks for your views.

  • Netflix is just an example but the problem affects lots of services and some of them are business related. For example Windows Update - I had problems with it when webfilter was on. I know - I can proxy Windows Updates but let's be honest with a small company without IT infrastructure and relying on Cloud and Windows Intune - that's not an option.

    Regards,
    Slawek

  • I agree with you 100%, I am a member of the Windows 10 Insider program and I could not get new builds without bypassing my computer from scanning I have not had a chance to test this after Sophos XG maintenance update so I don't know if this has been fixed. Lots of problems to be fixed corporate/business or not.

  • I just updated a Sophos XG firewall.  Netflix stopped working.  Previously the only way to get Netflix working was to disable "content filtering" (set to none, because even allow all would block it".  I have all scanning off, allow any services, and Netflix now does not play on Amazon TV devices.  Works on computers, just not these devices.

  • Update:

    Today, i want boot the old Firmware. 

    Much Exceptions at boot -> XG boot into Safe Mode.

    2nd Reboot - All OK.

    Purge all Reports over Console

    Boot the second MR1.1 Firmware. Boot normal.

    Login into Admin Panel - All OK. ReportDB Service Up and Gateway Up. Reports looks good. 

    I'm very happy :D

    Regards

  • Netflix issue resolved with MR1.1, IPS is the problem.  Even disabling it does not fix it, you must modify the IPS rule.

    Here is the list of requirements:

    1. Policy must have "HTTP/HTTPS scanning" disabled

    2. Policy must have "content filter" set to "none"

    3. Objects/Policies/Intrusion Prevention: lantowan_general or which one you have in your LAN to WAN policy, add an item with only "LOIC DoS Tool TCP traffic threshold" and set to "allow packet"

    Confirmed working with all Android devices at home and Amazon sticks.  I have yet to test Netflix on the SmartTV but will confirm soon if this fix solves that too.  This issue was identified using iView 2.0 as it is able to identify the signatures by name which match the XG firewall settings for IPS.  The XG firewall local log themselves only identify signatures by number making it impossible to match the rule.  It's seems odd but I saw no way to search by number to match the signature.

  • Thanks for the info. For a minute I got all excited that Netflix may be finally fixed but no such luck. In my case Netflix on Android devices Netflix plays fine with everything enabled ex HTTP/HTTPS scaning so your fix does not help me.

Reply
  • Thanks for the info. For a minute I got all excited that Netflix may be finally fixed but no such luck. In my case Netflix on Android devices Netflix plays fine with everything enabled ex HTTP/HTTPS scaning so your fix does not help me.

Children
No Data