This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web Filtering and IOS update

Sophos UTM SG230
Firmware version:        9.510-5

We use the Sophos UTM SG 230 web filtering to block specific extensions. This means users can not download iOS updates. In the web filtering log I see (forbidden file extension, ZIP).



All apple related links have been added to the exceptions, but users can not download any updates.



As soon as I remove the zip extension from the policy, the updates can be downloaded.

How can I continue to "block" zip extension and download the Apple updates?



This thread was automatically locked due to age.
  • What URL is in the forbidden log entry?

  • This one: https://gdmf.apple.com while still exists in the Filtering exception and allowed websites. But the issue is zip extension (in our case)

  • Hoi and welcome to the UTM Community!

    Show us the line from the Web Filtering log when the block occurs.  Also, a picture of the section above 'Allowed Target Services' on the 'Misc' tab.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • An exception for File Extensions and MIME types should handle your problem, and this product works.   This leaves these possibilities:

    1. You tested too soon after making the change.   There is a reset process after a change is made to an exception entry.  This is usually brief, a few minutes.  Toggling the exception off and back on will expedite the reset.    Not usually an issue, but worth mentioning.
    2. You have the wrong URL.   Lots of update services will initialize using an FQDN, then transition to an IP address for the heavy lifting.   That is why Bob pressed you to show the actual block record from the log.
    3. Your regular expression is wrong.   I do not see anything obvious, but I am a little skeptical of the trailing \.? sequence. 

    Your regular expressions will almost certainly allow stuff that you do not want, like server1.apple.com.badguys.com.   I am adequately competent on regular expressions, but I find that it is very difficult to write one that allows everything that I want without allowing something I do not want.   Fortunately, another UTM feature eliminates the need for regular expressions in most situations.

    • Create a Website entry for your intended FQDN (something.apple.com), or better yet for the organization with subdomains included (apple.com).   
    • Assign the website to a Tag, which you create with a meaningful name, such as "Downloads Allowed".   
    • Then configure an Exception object and link it to the Tag.

    With this approach, you only need regular expressions when you are matching the path or query string of a URL.  In my experience, this is rare.   

    Note that matching on path or query string will only be possible for HTTP, HTTPS-with-Inspection, and FTP-with-Standard-Mode-Web .   When using HTTPS-without-Inspection, the path and query string are in the encrypted portion of the record.