I run mostly a Ubiquiti Unifi network at home with a 24-port POE switch and 4 8-port switches in parts of the home where there are clusters of devices and three access points. I'm currently using a Zyxel USG40 router that I want to replace with Sophos XG Home running on a 1U box I built based on a Jetway NF592-Q170 8-port motherboard and an i3-7100 CPU, 8G of RAM and a 120G SSD. In my existing configuration I have an SSID that I use for guest access and my IOT devices that runs on a VLAN with an ID of 2 and I want to support that with the new firewall/router.
The initial installation was straight forward and I've got the box up and running with the WAN port connected to one of my switches as I configure it from a PC attached to the LAN port. I've updated it to the lates v17 build.
A few newbie questions:
- Am I correct in assuming that given that this is a firewall, that it comes functional but secure in the default configuration, meaning that if I were to simply plug it in replacing the USG40, that I'd get Internet access for all LAN devices, but that it would be secure from the WAN side, ignoring my VLAN for now or that I might want to change the DHCP addresses from the defaults to the addresses I've been using?
- Is there a repository of HowTo docs or videos that provide more of an overview of an entire implementation process? One of my observations in looking over the documentation and the HowTo videos from Sophos, is that these are all very compartmentalized, and they don't really stitch together everything needed to make the configuration operational. VLANs are a good example of this. I can find plenty of references that regurgitate the user interface, but I'm struggling to find the "recipe" that says in order to implement VLAN support for a typical guest network you need to do X, Y and Z.
- Specific to VLAN support what is the recipe to make an existing VLAN (implemented at my switches and access points) operational on the XG Firewall? So far, I think I've gleaned that I need to create the VLAN interface, define a DHCP scope and configure it to NAT to the WAN interface.
- Specific to my hardware: Aside from the fact that I'd need to use another port on my switch, is there a reason I wouldn't want to put the VLAN on a separate Ethernet interface on the XG firewall given that I've got a bunch of them available on that motherboard?
And a big THANKYOU to Sophos for making this available to home users!
This thread was automatically locked due to age.