XG Firewall v18 is now available sporting the all-new Xstream Architecture delivering extreme new levels of visibility, protection and performance.
Also check out our SFOS v18 playlist on YouTube to find out what's new in XG Firewall v18!
XG Firewall v18 also includes support for all new central management, reporting, and deployment options launching on Sophos Central next week:
In addition, there are also a ton of other new features that will enhance your protection, visibility, management experience, and network versatility:
As usual, this firmware update is no charge for all licensed XG Firewall customers. The firmware will be rolled-out automatically to all systems over the coming weeks but you can access the firmware anytime to do a manual update through MySophos.
Check out the relevant sections of the XG v18 release notes for details on:
Please also be aware that RED10 devices are not supported anymore in v18.
Free Online Training
Customer Resources and How-To Videos
Take advantage of Partner and Sophos Professional Services
Here are some direct links to helpful resources:
New to XG Firewall?
If you’re new to XG Firewall, see how it provides the world’s best network visibility, protection and response on the new XG Firewall website.
When I go to download the ISO through MySophos account I only see version 17.5.x.
Hi CdnWolf, please download the latest installer via your MySophos account.
If you are looking for a specific .iso related to an existing HA deployment, please raise a case with Sophos Support.
Links to ISO installers redirect to wrong page. Can someone provide me with a new link?
This is not SD WAN.
Good to know improvement in V18, but still insufficient compared to market trend. SSLVPN & HTTPS admin access runs on TLS 1.3? VPN complications like analyzing logs, frequently tunnels breaks. RA VPN improvements, report improvements (hope it is quicker now as CFR is available), see we lose some security while using DPI, not sure what improved after decoupling NAT and FW rules. I know there is a challenge in creating individual NAT rule for every port of TCP & UDP.