Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Best Practices for Hardening Webadmin

Hi, 

I am a SOC Analyst who works with a client who has Sophos UTM.  When I'm analyzing their network, I'm seeing two way traffic (mostly TOR/Malicious scanners) hitting TCP(4444) and getting two-way traffic.  Are there any best practices around hardening the Ports that are used for administration of the UTM? I'm anxious when I see this.

I'm a newbie, but found this on the forum from 8 years ago.

"Your need is more sophisticated, and, in fact, you can write a firewall rule that's applied before proxies. The trick is to use the "(Address)" object created by WebAdmin when you define an Interface or an Additional Address.

With, for example, an Additional Address of "Card Auth" on the External interface, use "External [Card Auth] (Address)" as the 'Destination' in the traffic selector portion of the rule. The rule then will apply to the INPUT chain and be processed before the traffic gets to the WAF.

So, you would have a rule like '{group of allowed IPs} -> HTTPS -> External [Card Auth] (Address) : Allow' followed by a similar Drop rule for "Any" traffic arriving"

Thank you in advance for any assistance you can provide. 

Paul Misner



This thread was automatically locked due to age.
Parents
  • Hi Paul

    Are you able to tell us what is configured in both the "Allowed Administrators" and the "Allowed Network" sections of:

    Management -> WebAdmin Settings -> General -> WebAdmin Access Configuration

    Thanks

Reply
  • Hi Paul

    Are you able to tell us what is configured in both the "Allowed Administrators" and the "Allowed Network" sections of:

    Management -> WebAdmin Settings -> General -> WebAdmin Access Configuration

    Thanks

Children
No Data