Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos XG v18 IoT security setup and/or suggestion for best practices

I am looking to secure my internal network with the IoT devices.

Currently I have a home automation system that controls the IoT devices. There are 20+ devices. Each device has a static IP based on the MAC ID setup in XG.

Current Setup:

Modem <> Sophos XG v18 <> Switch <> WiFi via Unifi AP's.

                                                                  Network PC with VM (home automation) & Plex server (this PC is wired)

                                                                  NAS (wired)

                                                                  Have 5 security cameras (wired) 

My goal is to secure the wireless IoT devices as well as the security cameras.

I need the home automation (VM) to be able to contact the IoT devices. The NAS controls the security cameras so this also needs to have contact with the cameras.

I have seen some posts on setting up a WiFi for the IoT devices and creating some VLANs. I have also seen some posts on using the MAC IDs to do some policies/filtering. Looking for the easiest and best practice to secure.

Thanks



This thread was automatically locked due to age.
Parents
  • Hello Jason,

    Additionally to what rfcat_vk suggested, If you have an IoT device that does not work, the recommendation is to first have it working with no filtering/scanning/decryption. Once this is working, you can then make changes that improve security around these devices.

    Firewall Rule - The IoT device should hit a rule that has no web policy and no malware scanning.

    SSL/TLS inspection rules - The IoT device traffic should hit a rule that is Don't Decrypt with a profile Maximum Compatibility, or it should have no matching rule. If you have some TLS decryption rules for some things, you can create a higher level rule with don't decrypt that uses a source of your device, similar to your firewall rule.

    These recommendations are from this RR that includes IoT.

    Regards,

Reply
  • Hello Jason,

    Additionally to what rfcat_vk suggested, If you have an IoT device that does not work, the recommendation is to first have it working with no filtering/scanning/decryption. Once this is working, you can then make changes that improve security around these devices.

    Firewall Rule - The IoT device should hit a rule that has no web policy and no malware scanning.

    SSL/TLS inspection rules - The IoT device traffic should hit a rule that is Don't Decrypt with a profile Maximum Compatibility, or it should have no matching rule. If you have some TLS decryption rules for some things, you can create a higher level rule with don't decrypt that uses a source of your device, similar to your firewall rule.

    These recommendations are from this RR that includes IoT.

    Regards,

Children
No Data