<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Sophos UTM in Hyperv</title><link>https://community.sophos.com/utm-firewall/f/utm-manager-formerly-acc/89226/sophos-utm-in-hyperv</link><description>Hi 
 
 I have Sophos UTM running in Hyperv. The os that hyperv runs on is Windows 10 Professional. 
 
 Can somebody please advise on a initial setup and firewall rules/nat etc so that I can accomplish the following:- 
 
 Within the Hyperv environment</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Sophos UTM in Hyperv</title><link>https://community.sophos.com/thread/335757?ContentTypeID=1</link><pubDate>Mon, 05 Jun 2017 14:08:19 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:00f3342b-2ab0-48c7-afdf-73f31ced9078</guid><dc:creator>JW0914</dc:creator><description>&lt;p&gt;I&amp;#39;m not altogether sure if it&amp;#39;s possible to run Sophos UTM as a firewall OS on Windows 10 PC with the purpose of using it to protect the host OS (Windows 10).&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In order for the above to work, network traffic would have to be first directed to the Sophos VM, without Windows having any access to it, otherwise the traffic bypasses the security of the Sophos VM.&lt;/li&gt;
&lt;li&gt;It could potentially be possible by configuring vLAN IDs on all Windows network interfaces, but something says to me this would not result with the end result one would need in order to make this work.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Client Hyper-V &lt;em&gt;(the Hyper-V version used in Windows 8+)&lt;/em&gt; is, I believe, a Type 2 hypervisor, versus that of a Type 1 &lt;em&gt;(ESXi, Hyper-V Server editions, etc.)&lt;/em&gt;. &amp;nbsp;This means a lot of things, however I believe it also means all virtual network traffic on all external virtual NICs are transparent to the host &lt;em&gt;(Windows 10)&lt;/em&gt;, and if this is the case, a router OS cannot be used in a VM to protect the underlying host OS &lt;em&gt;(Windows 10)&lt;/em&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Now, if you were to install Sophos UTM in a VM, you could use it to protect traffic on another VM by creating&amp;nbsp;a private switch(es)... private switches prevent the Host from accessing the traffic, but private switches are only for network traffic between VMs. &amp;nbsp;However, all outbound traffic exiting the Sophos VM will be transparently seen by the host &lt;em&gt;(Windows 10)&lt;/em&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For example, I run Sophos UTM in a VM on ESXi as my WAN facing router, and you can prevent ESXi from accessing network traffic on any of the 5 Ethernet ports on the motherboard, something that cannot be done with Client Hyper-V &lt;em&gt;(or at least that I&amp;#39;m aware of)&lt;/em&gt;.&amp;nbsp;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>