Sophos Firewall: Best practices
KBA-000007644Jul 12, 202425 people found this article helpful
Overview
This article describes the best practices for Sophos
Firewall configurations.
The following sections are covered:
Product and Environment
Sophos Firewall
Deployment
- Always
connect the Sophos Firewall WAN interface with a router via a switch and
not with a crossover cable to avoid auto-negotiation problems between the
Sophos Firewall WAN interface and the router.
- By
default, Sophos Firewall sends periodic ping requests to its default
gateway to check connectivity to the internet. It is recommended to change
this setting so that the Sophos Firewall sends ping requests to the
default gateway as well as to multiple hosts on the internet that are
permanently running such as 8.8.8.8 and 1.1.1.1, and will only declare the
WAN link as down if all of them are ping unreachable.
In the example below, Port2 is the Sophos Firewall WAN interface and
10.176.200.253 is the default gateway. Sophos Firewall will declare WAN
Port2 as down if the default gateway, 8.8.8.8 and 1.1.1.1 becomes ping
unreachable for 10 seconds.
- If the
device has a browser-based proxy setting, make sure that the configured
HTTP proxy port is the same in both the Sophos Firewall and the device
browser. By default, Sophos Firewall is configured for port 3128.
- For
security purposes, Gateway mode is preferred because it uses NAT Policies
to secure private addresses of internal or DMZ networks.
- If
Sophos Firewall is deployed in Bridge Mode:
- Do
not configure the Sophos Firewall IP address as a Gateway IP address. If
this happens, users will not be able to access the internet.
- Do
not terminate both ports in the same L2 switch. The switch would become
unstable if it receives packets of the same MAC address from more than
one switch port.
- It
is recommended to use the High Availability feature of the Sophos Firewall
for maximum network uptime.
For more information, go to https://docs.sophos.com/nsg/sophos-firewall/18.0/Help/en-us/webhelp/onlinehelp/nsg/sfos/concepts/HAHighAvailability.html. - For
wireless networks, ensure maximum security by using WPA or WPA2 protocols
rather than WEP.
- Do
not broadcast the SSID of your wireless networks to avoid unauthorized
users from entering into the network.
Administration
- Access
to Sophos Firewall should be carefully monitored and protected. This can
be done by changing the default administration settings such as the
following:
- Administrator
passwords
- Port
used to access the appliance
- Access
protocols (Use secure protocols like SSH and HTTPS)
- Create
multiple administrator profiles for special-purpose administrators like
VPN Administrator, Security Administrator, Audit Administrator, etc. Each
administrator should be assigned only the required permissions according
to their role in the organization.
- It
is recommended to disable administrative access to the Sophos Firewall
from all zones except the internal LAN zone or management zone. Even from
LAN or management zone, use secured protocols like HTTPS and SSH for GUI
and CLI access.
- Check
regularly for firmware releases and upgrade the Sophos Firewall to the
latest firmware available.
- Take
a regular backup of the Sophos Firewall. Also, make sure you take a backup
before any changes are to be made in the configuration of the appliance.
- Test
your firewall rules and policies regularly.
- Conduct
internal audits to check the health of the appliance.
- Enable
login security in terms of:
- Enabling
password complexity for the administrator.
- Restricting
the number of sign-in attempts to prevent brute force attacks.
Firewall
- Create
a firewall rule for DNS IP Addresses if devices are configured with a
public DNS IP address.
- Create
a firewall rule to allow required and critical traffic across each zone
because, by default, traffic across each zone is dropped by the Sophos
Firewall, except for LAN to WAN traffic. This will be applicable in both
bridge and gateway mode. For example, if the mail server is placed in the
DMZ zone, then the Sophos Firewall will not allow access to the mail
server from the LAN and WAN zone.
- To
access specific applications running on the mail server, create the
necessary firewall rule from each zone.
- Create
a firewall rule to give external access to the mail server.
- Create
a firewall rule to allow access to and from applications running on DMZ
because, by default, traffic from LAN to DMZ is dropped.
- If
the Sophos Firewall is configured in Bridge mode and the DHCP server is
running in the WAN zone of the Sophos Firewall, then create a firewall
rule to allow packets from the DHCP server to the LAN to lease IP
addresses on devices.
- If
the MX IP is bound to the WAN port of the Sophos Firewall, create NAT and
Virtual Host rules to map the private IP address of the mail server with
the MX IP.
- If
the LAN zone has Routed Networks, then create static routes in the Sophos
Firewall to forward requests to and from the Routed Networks over the
internet.
- If
the Sophos Firewall is configured for multiple Internet Service Providers
(i.e. multiple gateways) then:
- To
improve browsing speed and reduce latency, create a firewall rule to
route the DNS IP address requests through a specific Gateway. For
example, if the DNS IP address is from ISP1 and DNS request is going to
ISP2, then latency will increase and the time taken to resolve the site
name will also increase.
- If
access to certain applications like VPN applications, SAP, or ERP
application is allowed from a specific IP address, create a firewall rule
to route the application request from the specific IP address only.
- Create
a NAT policy to bind the mail server IP Address with MX IP. This will
establish the connection as well as reduce the chances of return MX check
problem.
- It
is recommended to bypass DoS screening for traffic-intensive servers like
VOIP and FTP to avoid dropping of legitimate traffic.
- Disable
NAT policies for WAN to LAN rule for Mail Server to avoid making it an
open relay.
Authentication
- If
the Sophos Firewall is integrated with one or more external authentication
servers, make sure the servers are selected for firewall authentication
and are in the order of preference.
- In
the case of AD integration with Single Sign-On enabled, create clientless
users for servers like VOIP servers, MFDs, etc. whose manual
authentication is not feasible.
- After
importing groups from AD, modify the order of the groups according to
preference. Any user, who is a part of multiple groups, will be mapped to
the first matching group on the Sophos Firewall. Refer also to https://docs.sophos.com/nsg/sophos-firewall/18.0/Help/en-us/webhelp/onlinehelp/nsg/sfos/learningContent/AuthenticationActiveDirectoryGroupBehavior.html
.
IPS
- Create
custom IPS policies with relevant signatures to decrease packet latency
and improve performance.
- It
is recommended to apply IPS policy in WAN to LAN firewall rules for
servers hosted in the network to protect them against known and unknown
attacks.
VPN
- Create
VPN to LAN firewall rules to enable Threat Free Tunnelling (i.e. protect
the network from malicious traffic through the VPN tunnel). In these
rules, NAT policies should be disabled to allow access to internal
resources.
- For
additional security, use CHAP and MSCHAP Handshaking Protocols for PPTP
remote access VPN.
- If
VPN connectivity is to be configured between a Head Office and multiple
Branch Offices, create a Hub and Spoke VPN configuration (i.e. create
virtual tunnels from each Branch Office directly to the Head Office).
Antivirus
- For
scanning of HTTP and HTTPS traffic, configure the Web proxy scanning
mode as Real-time rather than Batch. The Real-time scan
mode allows virus scanning of files as soon as their download starts while
the Batch scan mode waits for the download of the complete file before
scanning.
- Configure
the Sophos Firewall to disallow access to HTTPS websites with invalid
certificates.
Antispam
- Configure
the Sophos Firewall to “Accept” oversized emails to avoid dropping of
emails that might be useful.
- Enable
Quarantine digest to allow users to manage quarantined mails by
themselves.
- Configure
the Sophos Firewall to verify the IP Reputation of senders of all emails
to improve Antispam performance.
QoS
- Create
appropriate QoS policies for mission-critical applications.
- Assign
the highest priority to real-time traffic like VOIP and the lowest
priority to bulky protocols like FTP or P2P file transfer to manage
bandwidth better.
Sign up to the Sophos Support Notification
Service to get the latest product release information and critical issues.