Hello Sophos,
can we still expect the XG V18 MR 3 this week ?
[locked by: FloSupport at 4:35 PM (GMT -7) on 13 Oct 2020]
Hello Sophos,
can we still expect the XG V18 MR 3 this week ?
Make exception rules was what I was told too. If you look at Sophos own built-in exception rules (for Microsoft updates for example), you'll notice that many of them disable ssl inspection very widely to a point it is not usefull anymore.
Paul Jr
Hello Argo,
I'm afraid they would have to fire everyone who had anything to do with a firewall rules, NAT rules and TLS / SSL rules too.
So is it about half of all developers?
I think they would definitely deserve it, but I'm afraid it didn't happen ....
Regards
alda
Hello rfcat_vk,
That is true, but it has been cut across all departments. It was not aimed at incompetent developers.
Unfortunately, it also affected workers who were very capable and were definitely a benefit to Sophos.
When the forest is felled, splinters fly - we say here.
Regards
alda
Maybe if/when this update comes it will allow me to fight this tumor in my head that is VPN issues I seem to be encountering, Hopefully before it does any real permanent damage. Just chaotic instability issues it seems - mostly seen with 2FA enabled on VPN. Many of them keep having to re-enter their one-time password all day D:
Maybe this will help you. Look for my last answers to this bug.
The global maximum session limit with activated MFA / OTP crashes the user session behind the vpn.
https://community.sophos.com/xg-firewall/f/discussions/102442/vpn-timeout-key-negotion-after-8-hours
Thanks Jonnie,
I think that gives me some good information. I think I'm going to disable 2FA for IPsec / SSL VPN as I can use certs and only enable it for the user portal. This stops people from downloading the config with a compromised account if it happens but keeps the user experience optimal. At least until it works better...
EDIT: Well damn I found that green thing you asked if it was a bad joke... I guess that makes sense, I was starting to find 4/ 8 hour connection issues. Mostly 4 hours as we moved many of the systems to IPsec because the SSL VPN clients weren't seemingly playing as nice as I'd like... or something. We just did for fun. Though I remember seeing 4 hours in some logs, the tickets lay out a 4-5 hour window and the one from last night was 8 hours exactly. It's very noticeable when they suddenly have to enter their 2FA code again so I'm disabling it on everything but the user portal for now. Jeesh. Thanks again for helping out that VPN tumor that has been growing :S
Thanks Jonnie,
I think that gives me some good information. I think I'm going to disable 2FA for IPsec / SSL VPN as I can use certs and only enable it for the user portal. This stops people from downloading the config with a compromised account if it happens but keeps the user experience optimal. At least until it works better...
EDIT: Well damn I found that green thing you asked if it was a bad joke... I guess that makes sense, I was starting to find 4/ 8 hour connection issues. Mostly 4 hours as we moved many of the systems to IPsec because the SSL VPN clients weren't seemingly playing as nice as I'd like... or something. We just did for fun. Though I remember seeing 4 hours in some logs, the tickets lay out a 4-5 hour window and the one from last night was 8 hours exactly. It's very noticeable when they suddenly have to enter their 2FA code again so I'm disabling it on everything but the user portal for now. Jeesh. Thanks again for helping out that VPN tumor that has been growing :S
Glad to hear! =)
Beside from disabling the 2FA, you can easily set the Maximum Session Limit at the XG to 12 hours, if it reasonable for your network. We did this also for our ssl vpn clients and there are no further disconnects.
Yea. We also have most people using IPsec with the new connect thing haha. The hard coded timeout crap. Though with the new 2.0 client, I think we can get them back to SSL VPN as it seems to work nicely. I started the discussion internally so that's fun. Stupid rekey time thing with 2FA hah.