This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos endpoint security block

Dear Sir,

We are testing Sophos Enterprise console version 5 and we come across below scanario,

User connected outside internet using usb tangle once connected the interenet we have to block browsing and everything except vpn access. Once vpn is connected he have to browse as per office network security policy for which is defined in the management console. So kindly advice how to develop this type of scanario policy. Our aim is after connecting vpn server only able to browse and use other stuffs like file sharing and etc.,

Thanks for your support in advance.

Thanks N regards,

Magesh Kumar .P

:23451


This thread was automatically locked due to age.
Parents
  • Hello Magesh,

    usually you can leave ICMP as it is. In LAN select Local network (detected automatically) and set NetBIOS and Trusted as desired. Note: You should select Local network for the primary location only. If your clients need NetBIOS access from/to LANs other than the local segment (e.g. access spanning several VLANs or a server LAN) add them here.  Other tabs depend on your needs/policy (e.g. you might allow all outgoing TCP for Local network and only create a few application rules).

    For the Secondary I'd suggest you use Interactive mode (I've found this easier than Monitor mode mentioned in the article below - but that is up to you). start the VPN connection and answer the prompts as appropriate (preferably creating custom rules instead of using the suggested predefined ones). Export the policy if everything works, import it into a policy in SEC (select Secondary only) and assign this policy to some clients for testing.  

    Please see also Administrator roll-out guidelines for Sophos firewall version 2.0.

    Christian

    :23717
Reply
  • Hello Magesh,

    usually you can leave ICMP as it is. In LAN select Local network (detected automatically) and set NetBIOS and Trusted as desired. Note: You should select Local network for the primary location only. If your clients need NetBIOS access from/to LANs other than the local segment (e.g. access spanning several VLANs or a server LAN) add them here.  Other tabs depend on your needs/policy (e.g. you might allow all outgoing TCP for Local network and only create a few application rules).

    For the Secondary I'd suggest you use Interactive mode (I've found this easier than Monitor mode mentioned in the article below - but that is up to you). start the VPN connection and answer the prompts as appropriate (preferably creating custom rules instead of using the suggested predefined ones). Export the policy if everything works, import it into a policy in SEC (select Secondary only) and assign this policy to some clients for testing.  

    Please see also Administrator roll-out guidelines for Sophos firewall version 2.0.

    Christian

    :23717
Children
No Data