This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

PCI Compliance with connected REDs. Auto-fail. Sophos gave up.

We have a recorded instance of a Sophos XG (v17+) failing a PCI compliance scan (by a major provider) because they use RED appliances.   I asked if Sophos could provide me with mitigation policy or something I could give the PCI compliance vendor an exception basis.

Support eventually came back with:

Sophos RED communication is designed to use self-signed certificates between the XG and RED devices.  Self-signed certificates will fail/warn on PCI scans as they are not trusted.

We do not have a document to mitigate this design as there is no vulnerability with using self-signed certificates.

Now, the last sentence is laughable, but the concept that a firewall vendor can't make a PCI compliant hardware-accelerated VPN tunnel is mind boggling.



This thread was automatically locked due to age.
  • Thanks Emile.

    Our first exposure to the RED appliance was from a local sales rep which said they could/should be set as same subnet as LAN - as it's literally a REMOTE ETHERNET DEVICE.  I saw great possibilities for this with quite a few clients, then when trying to implement it - was told that wasn't how it was supposed to be setup.  So it was a huge disappointment. 

    But I've seen great performance increases with these compared to IPSec VPNs between firewalls.  So we'll keep using them where we can.

  • Hi John,

    You can do what the rep said, you have to bridge the virtual interface with your main LAN interface then make a LAN to LAN FW rule to allow traffic. I run a RED bridge off my home XG so I can use Steam In-Home Streaming when I am away on install and want to game using my desktop, not bad if your bandwidth is above 20/4.

    The problem is that because of the method of RED functionality, I think official support on this implementation is more "official" support. It's possible but would be a primary focus on any issues you face. I always recommend separate subnets for REDs because it's a more viable implementation :)

    Me too, I actually prefer RED over IPSEC on XG-XG or UTM-UTM (UTM to XG and XG to UTM gets dodgy)!

    Emile