This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Implement Cisco WAN Accelerator - bypass statefull inspection on UTM 9

Hi,

we have an SG230 running Firmware version: 9.508-10 and some SG115s in our remote offices. The Sophos UTM replaced an old Cisco ASA and now we are having issues re-establishing our WAN accelerators (Cisco WAAS). As the WAAS appliances renumbers tcp packets they get dropped by the UTM. One suggestion was to establish some kind of bypass on the UTM for the affected networks. I found an solution for the Sophos XGs - is this supported on the UTM also?

e.g. set advanced-firewall bypass-stateful-firewall-config add source_network 10.10.90.0 source_netmask 255.255.255.0 dest_network 10.10.10.0 dest_netmask 255.255.255.0 
source: https://community.sophos.com/products/xg-firewall/f/firewall-and-policies/92313/strange-drops

Has someone running an UTM with WAN accelerators?

Thanks in advance
B



This thread was automatically locked due to age.