This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG Firewall Initial Setup Easy... too easy? (Rule Review & Best Practice)

This week I jumped from a typical consumer grade box to an XG 125 running a home license. So far so good, but I'm new to Sophos (and more advanced firewall applications in general).

My goal has been:

  • A security focused device with long term firmware support (Check)
  • Allow all devices on the LAN to access to the Internet/WAN (Check and working)
  • Make sure devices on the LAN are behaving (AV & some APP Rules. Done and Working)
  • Country Block Rules (Check, working?)
  • Similar to my consumer router LAN to WAN is ok. WAN to LAN is bad, unless something on the LAN requested it. 
  • Keep an eye on what LAN side devices are requesting, something I wasn't able to do previously (Check and eye opening)
  • Lateral Movement protecting for a few devices on my network (Not yet setup, but the process seems straight forward). 
  • No remote access / VPN for the moment (Done, port 443 and user portal, disabled). 

Screenshots of my current, simple setup: 

 

 

 

I mean, is that it? It seems so simple. My concern here is the default Allow (ID 5) I've configured isn't setup correctly. All of my IOTs, the NAS, Laptops, Computer, Tablets, Phones etc are all working as they did before. Nothing is wrong...setup was simple. Where is the complication, the allow ports/services etc one by one?

Should I instead deny everything, watch everything go down and then open services/ports until everything is working again (and by this method, will end up blocking anything that is not used?) 

The biggest weakness here, isn't Sophos, but rather an inexperienced firewall user unsure if best practices are being followed. 



This thread was automatically locked due to age.
Parents
  • I’m a bit confused by your firewall rules. Here’s a couple of things to consider that may help.

    1. There is a hidden firewall rule, known as “rule 0”, that is the implicit default drop rule in Sophos XG. Basically, if you deleted all of your firewall rules, this is what blocks all traffic from ingressing or egressing Sophos XG.

    2. By default, Sophos XG creates a Default Network rule that you can see on the bottom of your firewall rules. As you can see, it allows any host in your LAN zone to establish a connection with any host in the WAN zone (e.g. internet for the majority of users). This is what allows devices/clients on your local network (LAN) to access the internet. Remember, this is only allowing connections from your LAN to the WAN, but Sophos XG is a stateful firewall meaning once a connection is established, packets can now be exchanged in both directions. This is why you don’t need a firewall rule from the WAN to the LAN to access the internet, nor would you want to since you would open up your local network to the internet which would be bad.

    Personally, I create MAC Hosts for the devices on my network and add them to their respective firewall rules. This way I don’t have to deal with static DHCP mappings.

    I created a blog with some tutorials for Sophos XG home users that may be useful: https://shred086.wordpress.com/

  • From  my understanding if you use the MAC address you do not get the device ID in reports.

    Ian

Reply Children
No Data