I was at a previous job and they had a bunch of these. Other then the occasional reboot they were ok. I even ran the home version of UTM then XG for a few years (in ESXi and barebones). I don’t think the UI is intuitive and well laid out but I didn’t have any of these problems. Answer from Nnyan on reddit.com
🌐
Reddit
reddit.com › r/sysadmin › what is the worst firewall and why is it sophos xg?
r/sysadmin on Reddit: What is the worst firewall and why is it Sophos XG?
October 5, 2020 -

RANT

I've worked with many firewalls over the years and have never come across anything as buggy as Sophos XG. I don't even know where to start so will just do a brain dump.

  1. Web Interface/CLI - The web interface is slow and clunky and sometimes just hangs. A reboot fixes it but sometimes on reboot it takes 5 min to come up, sometimes 15 min.

  2. Configuration disparity - At times, the Web UI configuration will show different values to the CLI. Reboot needed to resolve and you never know which config you'll end up with.

  3. OSPF - Adjacencies not forming. The configuration is correct, packets are arriving at the interface but the XG just decides not to process them. It doesn't drop them, it just does nothing. Again, a restart is needed to resolve.

  4. Buggy firmware - It has happened more than once now where what should be a simple firmware update, bricks one of the devices in an HA pair. Rebuild needed to resolve.

The above has happened across multiple deployments now, all different models so it's unlikely I just got a bung unit.

What I think is the worst is the lack of consistency. As an engineer you never know if you did something wrong or if the firewall is having a tantrum.

Hope other people have had better experiences but for me this bridge has been burned.

RANT OVER

🌐
Reddit
reddit.com › r/sophos › sophos xg... path to an early grave
r/sophos on Reddit: Sophos XG... Path to an early grave
August 31, 2022 -

I try...I really really try to love it, but it is literally the absolutely worst firewall product I have ever used in 20+ years.I want to write a book on all of the things that are wrong with it, but I need to enjoy the rest of my life in peace.What are the things you all don't like? Maybe our lists will align.

EDIT: For clarification....this is hopefully going to provide some insight to Sophos on what to FIX... because, it doesn't seem like after 6+ years they are making much progress...AND, XG does actually have a lot of potential, it just needs a LOT of TLC. Maybe we can make a difference, and make the product usable and functional in larger and more complex environments (where it seems to fall on its face most often).

Top answer
1 of 5
15
XG is garbage compared to the SG.
2 of 5
13
I started writing a list when I was really pissed about a lot of stuff that was bad on XG (or at least worse than SG). To be fair, XG is getting better and V19 is already ten times better than when I started using XG with V17.5. Here are some of my points: No NTP server Since Sophos recommends migrating SG to XG, they should at least support every feature that was supported on the 'old' product No DHCP Options (at least via GUI) They fixed this in V19, took them long enough Interfaces can't be disabled in the Webinterface I don't want to delete and re-enter everything if I want to disable an interface You can't select an Active Directory Group for Sophos Admin Users Was possible on SG, now you have to elevate every user manually if you want to use AD users as admin IPSEC VPN only possible on WAN Interfaces Site-to-site and Remote Access. If you tell this Sophos, they just ask 'Why would you ever need to do this? Configure your segmentation and your zones correctly'. Strangely though, with SSL VPN it is working without problems. Why would I ever need this? HA Port monitoring not possible on VLAN-level No 'where used' for objects This is a huge one, especially because you can't delete some objects when they are used somewhere The 'object-oriented' concept is not really consistent. In many configuration menus you can't use Host Objects but you have to type the IP address manually More maintenance effort and you have to consider many things if e.g. an Ip address changes You can't create Web Filter Exceptions for users Auto-creation of firewall rules when configuring IPSec VPN sucks. They just create a rule with all source and destination networks. This means, if I have 2 subnets on one location in the IPSec VPN, they both can access each other now. Congratulations. OSPF Sophos won't propagate your IPSec Client vpn network with OSPF They change random thigs on updates causing strange behaviour From one version to another, they changed the maximum length of a password field (I think it was in notification settings --> mail server). Because our password was longer before the update, this caused the Firewall to crash everytime we started the update. Took a while to figure that out. I don't know if they already fixed some of them, if so, my bad. Most of these points aren't particularly bad, it's just very tedious and costs more time and nerves than it should. Reading this again, this sounds like a huge rant. It is not supposed to be one. It's just a collection of very small rants I had over the last 3 years..
🌐
Reddit
reddit.com › r/homelab › sophos xg home or opnsense?
r/homelab on Reddit: Sophos XG Home or OPNSense?
October 29, 2023 -

I love the concept of both but I’m conscious of the 4 core/6GB ram limit on the Sophos. I much prefer the fully included WAF/DPI vs the kneecapped “free” Zenarmor which offers the alternative for OPNSense.

Sophos seems to have more features as a NGF than OPNsense, but I’m worried I’ll loose performance due to the limits. Where as I have no limits in OPNSense.

I’m looking at getting a 6 LAN 2.5Gbe i3-N305 box or with the i5-1235u if that helps.

Please could users with experience of both give me advice on how you find them “real world”. I have only tested them in a lab environment before I pull the trigger and buy a firewall box.

Top answer
1 of 12
5
Running Sophos Home on a pair of SG310 Rev.2's for 3-4 months now and not getting near the CPU/RAM limits at all. HA Setup with Dual outbound 1G interfaces, dual 10G internal network with 12-ish VLAN's, 4 Site to Site VPN's, remote access VPN, some basic port forwarding and multiple web/application filters. Also quite some firewall rule sets on each interface/VLAN/VPN as everything is configured zero-trust. Ran OPNSense before (DEC2750) but couldn't get it to run properly in HA and overall quite some things that wouldn't work as I would expect config wise. Sometimes requiring reboots before doing what I wanted etc. Sophos is way more clear interface wise and I like their structuring of rules. VPN's are more stable than OPNsense (in my experiënce, mostly cisco ISR/ASR on the other ends). I found troubleshooting no more difficult (using their log viewer) than OPNSense.
2 of 12
5
I was using an SG310 with an I3-4330, then bought a Partaker 1U appliance, with an i7-10810U, 120gb MSATA and 16gb of RAM. I've started using OPNsense, which I think is great, but you need to compare their feature and see what is the more adapted to your usage. To me Sophos XG Home PRO: -Very easy Interface (FW rule, NAT) -SSLVPN easy to configure -Web, app, IPS filter integrated and easy to use -Sophos Anti-virus -Very stable -Reporting builtin -and more? Sophos XG Home CON: -No DNS over TLS -Hardware limited (4core and 6 GB of ram, but it's enough) -IPS (Snort) is single core per connection -and more? OPNSense PRO: -Flexible/customizable -Can use all hardware performance -DNS Over TLS -Unbound blacklist URL for ADS and more -Zenarmor free is good -very stable -Open VPN is easy to configure -NTopNG -and more? OPNSense CON: -I do think it's less easy to build FW rule with OPNSense -Need to dig more for learning -Need subscrition for zen armor for more policies. Could use squid or other custom, but it's not as simple as Sophos. -More? Hard to say, which one I prefer, I,ve been a Sophos XG user since vers 15 or 16 (and I've been using Cyberoam device before Sophos bought them). Still, Sophos XG miss some features, that will let me stay on OPNsense I think for a couple of time.
🌐
Reddit
reddit.com › r/sophos › reasons (not) to upgrade to xg firewall?
r/sophos on Reddit: Reasons (NOT) to upgrade to XG Firewall?
October 31, 2021 -

We're a very small MSP with very good clients. So my boss is pushing the idea to start migrating UTMs to XGs, some clients are sold on it. I'm planing on staying with the company for about one more year.

Other than the fact that Sophos will at some point terminate the UTM, is there any really good reason to migrate, other than it being "next gen." and zone based? To be completely honest, the whole synchronised security thing smells like pure marketing to me, with only little value, and also, Sophos Central can isolate the endpoint without it as well.

Thing is, I really hate the XG, I've set up 2 new clients with it, I've dealt with support being unable to solve some of my problems which simply resultet in giving up and looking for workarounds, it just feels like a beta version all together, I am hating the whole logic and especially the logging, and I am 100% certain that in the future, I will not work for any company that will be using it unless something big changes with it.

I think you already got the idea, my plan is to push back on those migrations until I'm out.

So, thoughts? What do you think, does the XG offer any real advantages compared to any competing firewalls, the old UTM included?

Top answer
1 of 14
15
It is a garbage product. Slow, the worst UI I've seen in a long time, constant problems from not working templates over working fw rules (especially after updates) and instable software. Lots of basic problems from back in 2016 (when I first touched XG) are still ignored ord 'come with the next release'. We're running some 300 UTMs - with basically no problems - our 35 xg's required more than 50 support hours per month, not counting the incapable and tedious support calls. Non of the really work. Opening a fw rule and save can take as long as creating and testing a fw rule on utm. We're already evaluating other products, as xg will NOT be our future - and UTM has been orphaned for a long time now.
2 of 14
12
Just an individual user here and I've only used the new XGS hardware. So I can't give solid advice, but some of the issues folks here are describing (10 seconds per web page, an hour to add four rules, etc) are unrecognizable to me. I've had reasonable support response times. For example, the XGS I got had a fan that would whine. I was contacted by support, they walked me through installing a BIOS (not firmware) update, it didn't fix it, so they RMA'd it and sent me a new one that's very quiet. I've definitely also had the "send us all kinds of info and we'll ask you questions that have nothing to do with your problem" too. Then again, I'm an end user so I wasn't expecting MSP-level support. The interface -- I'm running v19 EAP right now -- has been improving and it's reasonable. I'd organize it differently and I'd centralize some things, but I haven't found it to be buggy, slow, or confusing. (And in v19 they now have a search feature so you can find the appropriate configuration page more easily.) Again, just a small-time user, not managing dozens or supporting multi-gigabit WAN or anything. Perhaps really high-traffic installations or maybe the XG hardware slow the UI down a lot? (On the other hand, things like the PA 220 take 20 minutes to boot and 3-5 minutes to update a single rule, I hear.)
🌐
Reddit
reddit.com › r/sophos › sophos xg firewall home edition with 10 gbit sfp+?
r/sophos on Reddit: Sophos XG Firewall Home Edition with 10 Gbit SFP+?
September 8, 2025 -

Hi everyone,

I'm planning to build a 10 Gbit homelab and I have a Sophos XG 330 appliance which includes 2 x 10 Gbit SFP+ ports. I’d love to use these for high-speed connectivity in my setup.

However, according to the official Sophos Firewall Home FAQ (Sophos Firewall: Sophos Firewall Home FAQ - Recommended Reads - Sophos Firewall - Sophos Community - Connect, Learn, and Stay Secure), it seems that only 1000 Mbps is officially supported for the Home Edition.

Has anyone managed to get Sophos Home running with 10 Gbit interfaces? If so, does it actually work at full speed, or are there limitations?

Thanks in advance!

EDIT:
Update: Sophos XG Firewall Home Edition with 10 Gbit SFP+ – Successful Bare-Metal Setup

Just wanted to share a quick update for anyone following this thread or planning a similar setup:

I’ve completed a bare-metal installation of Sophos XG Home Edition on a Sophos XG 330 appliance, and everything is working flawlessly. All 12 interfaces are correctly recognized in the GUI, and I’m seeing a full 10,000 Mbps bandwidth on the SFP+ ports.

Contrary to the official FAQ stating that only 1 Gbit is supported, I’ve encountered no technical limitations with 10 Gbit connectivity. Also, the interface naming mismatch that was mentioned earlier did not occur in my case—each port was mapped correctly from the start.

For the installation, I followed this excellent guide:
Sophos XG Home on a Sophos appliance | HiFish.ch
It was straightforward and very helpful for getting the Home Edition running on official Sophos hardware.

Thanks again to everyone who contributed insights. I’ll continue testing and will share more findings if anything interesting comes up. Feel free to ask if you're planning something similar!

🌐
Reddit
reddit.com › r/sophos › sophos firewall: install sophos firewall home on sophos xg hardware [guide]
r/sophos on Reddit: Sophos Firewall: Install Sophos Firewall Home on Sophos XG Hardware [Guide]
May 15, 2025 -

This question raises a lot recently, due the EOL (End of Life) of XG Hardware. You can follow the Guide on the Sophos Community to install Sophos Firewall Home on your XG Hardware to reuse the hardware for Home / Community use cases.

https://community.sophos.com/sophos-xg-firewall/f/recommended-reads/149172/sophos-firewall-install-sophos-firewall-home-on-sophos-xg-hardware

🌐
Reddit
reddit.com › r/homelab › how to best utilize sophos xg 210 rev. 3 for homelab network security- opnsense,openwrt, proxmox, or sophos home? potential hardware upgrades?
r/homelab on Reddit: How to best utilize Sophos XG 210 Rev. 3 for homelab network security- OPNsense,OpenWRT, Proxmox, or Sophos Home? Potential hardware upgrades?
December 28, 2024 -

I just snagged a Sophos XG 210 Rev. 3 for $100, and I was hoping to get some insight as to the optimal configuration of this unit. I am interested to hear your suggestions and learn about your setups.

To start, the unit will be deployed for security purposes in my startup, which is in commercial property that I am living in- (Which makes it a Homelab, riiiiight?!?)

Not a ton of traffic or endpoints, (traffic is @ ~ 1Gbps , ~30 endpoints) but the network needs to be locked down.

After comparing the cost of getting a basic SFF PC like Optiplex or Elitedesk and a decent NIC, Mini PCs like MINIS Forum or Zotac, and even enterprise boxes like HP Z-series, I figured a 1U setup for $100 would be cost effective, robust, reliable, and simple to deploy. (Although, not particularly energy efficient). There is already a rack setup with some decent managed switches and space for a NAS, maybe a cloud-gaming server and some generative AI GPUs as well?

I was wondering what the possibilities are for a decent CPU upgrade, if there are any work arounds for the single SATA port to create a mirrored drive, and recommendations for OS / applications and/or hardware upgrades like Flexiport modules to utilize the full capacity of this rig by expanding to future proof the setup.

I am planning on OPNsense, Suricata, ZenArmor, VPN, basically all the IPS stuff I can throw at it, and hopefully learn about some cool new stuff as well.

I am aware of the limitation of Sophos Home, and am thinking OPNsense or possibly OpenWRT will be the best fit.

For hardware, ideally upgrade to 4c/8t T-series cpu, enterprise SSD, and 16GB of 2133/2400T-series RAM. I would like to know about the Checkpoint modules that may be compatible with this rig, as the Flexiport sells at a high premium.

From what I have gathered so far, I will start with a CPU upgrade that is ideally an i-series "T" variant, or Xeon "L" series. (I have a Xeon E3-1230 v5, i7-7500T, 6700k, and maybe a few other Skylake, Kaby lake CPUs to try).

Will I need to load up Sophos Home and try to update the motherboard BIOS before upgrading the CPU? (The motherboard is proprietary and the BIOS is not publicly available, correct?)

Depending on the health of the drive, I will get an Intel DC S3520 150GB (or something similar) or should I toss in a basic 120GB SSD?

Out on a limb here, but is it possible to use the PCIe port used by the expandable bay to run an NVMe adaptor or something?

Am I overlooking or missing anything, did I pay too much or get the wrong hardware? Thoughts and insights appreciated, thanks in advance!

***Random bonus question- can I get the LCD screen to work in OPNsense?!?

Top answer
1 of 6
2
it's designed a firewall appliance so I think skipping Proxmox on it would be a good move. Sophos XG would be right at home on it. The home licence is restricted on cpu cores (4) and the ram (6GB) - The base software is probably already in place. Believe there's just a file that needs to be deleted to activate the home licence (google will confirm).
2 of 6
2
I was wondering what the possibilities are for a decent CPU upgrade Definitely i3-6100 and i5-6500 (they are used on the XG 310 and 330, respectively), possibly i7-6700 or Xeon E3-1275 v5. The last two are a little speculative; similar upgrades worked on Rev 1 and 2, but on those, all Core processors were 4th generation. So I surmise that it's still a possibility in this revision, but you need to bump the Core generation to the 6th... I am planning on OPNsense, Suricata, ZenArmor, VPN, basically all the IPS stuff I can throw at it, and hopefully learn about some cool new stuff as well. I am aware of the limitation of Sophos Home, and am thinking OPNsense or possibly OpenWRT will be the best fit. First off, there's no need to run Suricata and ZenArmor together (they are similar in purpose). Second, VPN and IPS are different things. Third, Gigabit IDS/IPS is likely to cost you about 6 GHz in processor bandwidth; Gigabit Wireguard, about 8. So you'll need a new processor (I would try i7-6700 before anything else). Fourth, as far as I know, Suricata and ZenArmor do not integrate with OpenWrt (the only IDS/IPS facility available on OpenWrt is the good old Snort). So your best bet is OPNsense. I will start with a CPU upgrade that is ideally an i-series "T" variant, Don't. None of these is likely to be on the whitelist. Try i7-6700 first, and if that doesn't work, fall back to i5-6500. Will I need to load up Sophos Home and try to update the motherboard BIOS before upgrading the CPU? No. The device is built by Portwell. There are no BIOS locks, watchdogs, or bypasses. It's clean as a whistle and ready for whatever OS/firmware you want to install on it. Depending on the health of the drive, I will get an Intel DC S3520 150GB (or something similar) or should I toss in a basic 120GB SSD? Entirely up to you. is it possible to use the PCIe port used by the expandable bay to run an NVMe adaptor or something? No. The expansion bay is intended for additional networking. It accepts expansion modules that can be 4 x Gigabit Ethernet, 8 x Gigabit Ethernet, 4 x Gigabit SFP, 2 x 10-gig SFP+, or 4 x 10-gig SFP+ (and I may be forgetting something). Hint: Check Point and Sophos use the same modules (which they buy from Portwell and Lanner), but in the secondary market, Check Point-branded modules are usually much less expensive. Just make sure that the mounting screws are in the top corners of the faceplate, not on the sides (those would be modules for Lanner devices; you want a module for a Portwell device). did I pay too much or get the wrong hardware? Oh no, you actually lucked out... The cheapest 210 Rev 3 I can see on eBay right now is USD 100 + USD 45 shipping... ***Random bonus question- can I get the LCD screen to work in OPNsense?!? Yes, but it's a little cumbersome. OPNsense has no Web-based management for it, only a way to install. You install the os-lcdproc-sdeclcd plugin using the standard package installation facilities. Then, you go on the command line, change to /usr/local/etc, find three files whose names end in .conf.sample, and rename them so that they retain their names but lose the .sample part (so their names end in .conf). This should be enough to get started. Any other management has to be done by editing the .conf files.
🌐
Reddit
reddit.com › r/sysadmin › i am done with sophos
r/sysadmin on Reddit: I am done with Sophos
March 28, 2022 -

I work for a small business with <25 users distributed technically in 3 offices. We already had random issues with SSL VPN that worsened lately and now a previously fine IPsec tunnel broke down.. No matter how I redo our networks, re-create firewall and NAT rules the number of issues and bugs I run into just increases. The painfully slow hydra makes the already time consuming troubleshooting worse..

The good thing I just learn that we are not tied to Sophos even if our licenses are still valid for some more time.

I'm free to choose new product(s), get these devices nuked and re-architect our network infrastructure. So here I am starting my weekend with researching alternatives

Find elsewhere
🌐
Reddit
reddit.com › r › sophos › comments › 7zx7z2 › thinking_of_trying_sophos_xg_home_some_questions
r/sophos - Thinking of trying Sophos XG Home. Some questions.
December 8, 2014 -

Hi everyone. I have a couple questions. I currently run pfSense in my home network/homelab. I was thinking of maybe trying out Sophos XG. I have no problem with my pfSense it runs great but when I was checking out Sophos it seemed to be more similar to what I work with at work which is Palo Alto. For this reason, I was thinking it may better for my learning to have a similar firewall software running in the house for learning purposes. I have one concern though and a couple questions.

My concern is related to hardware. The hardware I have right now running pfSense is a SuperMicro SYS-5018A-FTN4 1U Server barebone. The CPU in it is an Intel Atom C2758 2.4Ghz 8-Core. I have 16 GB DDR3 RAM and a 120GB SSD in it. I read that Sophos XG Home has hardware limitations which are 4cores and 6GB RAM. Is there no way to remove these? By that I don’t mean working around them but is there any paid subscription (that isn’t ridiculously high enterprise pricing) that will remove the hardware limitations? I am really interested in trying Sophos XG but really don’t like that it is going to neuter my hardware killing over half the power of my box.

The questions I had were as follows:

How do vlans work with Sophos XG? Right now, I have one NIC for WAN, one for LAN, and the other two in a LAGG and all my VLANS use the LAGG for the VLAN interfaces. Is it possible to set Sophos up in a similar way? Or is there a better way to set this up that I should be doing?

Any recommendations/guides for initially setting up rules for a home network? I have watched a ton of videos on setting up rules, vpn, web/app/intrusion/etc. policies, and other parts of Sophos XG. I will be turning on many of these things but will not be blocking things like games and other stuff that you would normally block in enterprise but not in a home environment.

Thank you for your help and time.

🌐
Reddit
reddit.com › r/sysadmin › anyone have any experience using sophos xg?
r/sysadmin on Reddit: Anyone have any experience using Sophos XG?
June 4, 2016 -

We use SonicWALL firewall/UTM at our company. It's really nice and we make good use of it between the various security services, but it still seems to lack some of the functionality we are looking for. We did a little bit of research and Sophos XG looks like it might be a really good fit for us as a firewall/UTM, and we would also be using their endpoint protection services well.

I was just wondering if anyone had any experience with Sophos XG and could offer some input/ feedback. Was there anything unexpectedly negative about it? How is support?

We did have a product demo and everything looked really good but I'm still looking around for various bits of feedback from actual customers.

Top answer
1 of 3
2

I’ve got a few XG’s and they have been fine. Got them a few years ago for a few small sites and got the Sophos endpoint solution to test out how they work together. Have used sonicwall a mainly, especially for larger jobs.

Sophos has been working a lot on adding features and making it better to get people off their older UTM firewalls.

I like how they can work with the endpoints to isolate them if they get infected. I still think the logging could be improved compared to sonicwall s as far as finding why something isn’t working quickly.

Have used the Sophos UTM home edition which I really liked and I think the XGs now have feature parity with the UTM edition.

As far as setting up vpns, adding firewall rules etc. I think they are pretty easy. Not in them enough to really get used to the menus like I am a sonicwall.

I plan on testing out the XG home edition for personal firewall soon, will likely push it a lot more then vs the ones that are at some smaller business sites.

2 of 3
1

We use them, we have about 20 branch offices. A few notes:

  • XG was a total mess at lunch, somewhat expected as the first major version of a new platform. Generally now as of v17 it's pretty solid (still needs some polish in some areas though). I pity the poor people who deployed XG in any scale at v15 or v16 though.

  • There is currently no enterprise-deployable VPN client. If you want VPN, you have to use the built-in Windows VPN, or have users manually log into the user portal and download the SSL client one manually. There is a standalone ipsec VPN client in the works, but it's not out yet.

  • Sophos' wireless has never been great. It seems there's always issues with it. Frankly I wouldn't bother with their wireless, just go with UBNT or something.

  • REDs are awesome. I've been using them from first launch back in the Astaro days and have always really liked their functionality.

We deployed them about 9 months ago and haven't really had any major issues. Though I haven't had to use their support yet, I've heard it's not great.

🌐
Reddit
reddit.com › r/networking › sophos xg firewall experience - feedback wanted
r/networking on Reddit: Sophos XG Firewall experience - feedback wanted
November 10, 2015 -

I was hoping for those whom work with Sophos XG firewalls could provide some feedback.

We have a few in deployment, but on version 16 and 17 of their firmware have hit a number of issues this includes but not limited to;

  • NAT rules not working (version 17)

  • VPN connectivity issues - to other Sophos XG's (ver 16 to ver 17)

  • A lot of HA issues - mainly the cluster dying after a failover. (both ver16 and ver17)

  • Default administrator account locking out, no longer can use it after HA failure

I could go into a lot of detail about each of the issues if needed, and we've been intouch and working with Sophos on all of them. A lot of the issues were in the version 16 of firmware, we were assured these were all fixed in version 17, but we are still seeing various issues out in production.

I'd be greatful of feedback from those out there who either deploy or administer Sophos XG firewalls.

EDIT: full breakdown of issues experienced with one cluster here

🌐
Reddit
reddit.com › r/sysadmin › i'm ready to to take a sledgehammer to our new sophos appliances!
r/sysadmin on Reddit: I'm ready to to take a sledgehammer to our new Sophos Appliances!
January 29, 2023 -

EDIT2: Rural County Govt - Solo Admin

We've been running Sophos UTM appliances for almost the last decade with very very few issues. On the most recent renewal we were told we HAD to go to the new XGS appliances and that it would be an easy transition. BULLSHIT!

EDIT We are a small team, there's just myself and the network admin and we are already stretched thin. Trying to tackle this has us both ready to down a bottle of Jack during the work day.

After purchasing we find out that the quote we got to replace our UTM FULL GUARD doesn't contain the email protection so that's another 10k we have to pull from budget.

  1. You can't just take your config and transfer it, you have to send it to Sophos and they will run some type of voodoo magic to make it compatible. But not all of it.

  2. You have to rebuild all of your firewall rules manually, awesome, that's 600+ rules I have to compare and re-do in the new "intuitive UI".

  3. Oh and your multipath rules don't carry over, you have to rebuild those.

  4. Oh and that great feature of creating "Additional Addresses" for interfaces if you are using multiple Public IPs? Yeah that's not a thing, you can only create an un-named alias on the primary interface. And then you are creating your rules you have no idea which one it is since they are not listed sequentially and you have to mouse over each one to find the right IP.

Gone are the days of having x.x.x.x "<Application> Public IP", now it's "<Interface Name>:<vlan>:<random number>" And those new names don't even show in the interface list IN ORDER.

And you can't toggle those aliases on and off for testing, you have to completely DELETE the alias and in doing so any rules you had created using that alias just remap to the next one on the list. WHAT THE FUCK?!

5) For NAT rules, the UTM had an option to automatically generate firewall rules, awesome. Not in XGS, BUT if you create a firewall rule you can automatically create a NAT rule, as long as you check the box before clicking save, otherwise you have to delete the rule and do it all over again.

This has been the most frustrating and time consuming hardware migration I have ever been a part of, it took so long to get the appliances on site that we are now having to get monthly extensions of our current license and I can already tell the rep is getting annoyed, probably because we didn't pay Sophos directly ANOTHER 10k for 16 more professional hours. Sophos support was so horrible to the point we reached out to a contractor to help fill the gaps and even they are getting frustrated.

🌐
Reddit
reddit.com › r/sophos › why use sophos firewalls?
r/sophos on Reddit: Why use Sophos firewalls?
March 17, 2023 -

I'm working for an MSP and we're deploying Sophos firewalls. Reasons are the filtering capabilities customers like to have (although I'm not particularly fond of the configuration interface), central management with additional REDs and the bundling of other Sophos products. The firewall market is large though, so what arguments do you bring up when selling or using a Sophos firewall?

Top answer
1 of 11
22
I love sophos and i champion them here constantly. So let's set GUI aside (which is fine once you learn it, like most brands) because honestly, i hate all the major players GUIs. Fortinet is a joke, always has been. watchguard was ok, sonicwall ugh. So let's set that over here and just say if you want something with a great gui, it will likely have crap features anyway. You can buy a firewall through distribution without licensing and it will work. By work i mean PTP VPN, SSL user VPN (with MFA and AD integration), it will route and there's on-box reporting which fortinet was without forever if they even have it now it's crazy feature rich if you want to dig into it, even without endpoint integrating into it cloud management is a big deal. that we can make a rule and deploy it across all firewalls is a big deal once you get passed like 5-10 firewalls. Same with firewall config backups, same with centralized alerting and monitoring, mass firmware updates. All that is free with a sophos. the connect flex program makes sense: you can pay monthly for almost any service including firewall subscriptions at whatever level you want and apply it support has been decent, and we had one die and they RMA'd it anyway because we had a cheap subscription on it, they answer when we have questions, etc They have affordable models that will do good throughput. Like one common one we put in small offices is like $550. If an office can't afford a $550 firewall every 5 or more years, can they even be a customer? Bundling that with connect flex means you can take the licensing if they leave but their firewall functions and they own it, you're not in the hole buying like a 2 year subscription i like the hardware even more with the XGS line, good options like dual power supplies on small units, can do failover on them without buying a big one, etc Not that this is only sophos, but i really like the unified OS where i can keep, say, a 125 in stock if someone dies and restore their config to it, even if it's a 116 or a 2300. when there are critical vulnerabilities, they push hotfixes unless you turned that feature off. I don't mean a firmware update, they hotfix that vulnerability for you without any intervention almost instantly. the couple exploits that hit the wild we avoided with no portals web facing but they patched us anyway. you can micromanage what's facing the web. Like, since we use central to manage, we disable the user and admin portal web and internal facing, or you could do just internal facing, etc. Mfa support for admin local login out of the box and for user vpn/login out of the box, even if you don't integrate it with AD or azure or whatever. There's more that i like about them or i just dislike about forti and others, but i feel they're a great choice to build your stack around for small and medium-large businesses, even if you don't want to turn on the more advanced features. Good for your most security checkbox needs customer and good for your 4 person no security needs customer. Also ZTNA looks promising and while that doesn't matter about the firewall now, i've heard that the firewall will be the ZTNA endpoint vs a VM behind it in the future, so that's exciting. There's some hot things to do with MDR and data lake and stuff to. Out of 1-10, we're probably a 7 on our sophos skills, i'm sure someone is SUPER deep into them and doing a lot more intense things. I just want a solid, reliable router that has features on tap if needed to check boxes or secure things, from a reliable company, that i can deploy to all customers without needing to support like a cheap brand or ultra brand at the same time.
2 of 11
18
We install plenty and have very little actual issues with them, combined with then endpoint it makes things very easy to see who is doing what with no issues of making users log in manually, syncronised security and XDR is good The XG series got alot of negativity when it was first launched(rightly so in many cases) but since 18.5 and into v19 it's been as well behaved as any other solutions, alot of people stuck in the SG series because it's "easier" but personally i prefer the XG way of ordering things and lots of people who still claim it's terrible haven't touched it since v15/16 Hardware wise we get very little failures and as as the actual hardware is mostly made by caswell and similar it's not just sophos who use them, the last unit that failed just needed it's bios battery reseated for us and it came back to life
🌐
Reddit
reddit.com › r/homelab › avoid sophos xg home
r/homelab on Reddit: Avoid Sophos XG Home
July 24, 2021 -

I have used Sophos XG Home for years mostly because it was the only solution I could find that would block P2P file sharing to avoid legal hassles from guest users and visitors.

However, their software has really went down hill since v16 of the firmware. It is almost completely unusable because of instability.

On top of that, the community isn't allowed to discuss actual problems.. anything disparaging is deleted and censored..

So if you post looking for assistance you will get responses like:

  1. your hardware is bad

  2. your wan link is bad or unstable

  3. troubleshooting next gen firewalls is difficult

But really, a firewall product should work out of the box with default settings..

Top answer
1 of 5
7
What issue are you having with the software? Perhaps asking in here will find a solution.
2 of 5
7
Just to give some background to this story. There were multiple threads in the Sophos Community from OP. https://community.sophos.com/sophos-xg-firewall/f/discussions/129127/issues-with-home-edition-sophos-xg https://community.sophos.com/sophos-xg-firewall/f/discussions/128866/home-edition-sophos-xg-basic-wan-routing-issues It is hard to find an issue, if the issue is not present anymore. We are happy to help, if this issue occur and give/gave some tools to dig deeper into the issue, if the interest is there. The community members (and Sophos Staff like me), are happy to help but we need the corporation by the Home users. We do not have the tools to support a home users like we could assist a business customer. The business customers have direct links and support case structures etc. A review of your initial thread about the WAN Routing. This entire thread sounds like a ISP/Networking issue, not a Firewall issue. If you introduce a new ISP (WAN link), you need to be careful about the routing of this traffic. I personally have a huge issue with the claim about censorship or anything related to this. The Sophos community is a space created and owned by Sophos. And of course, there are terms of service (TOS): https://support.sophos.com/support/s/article/KB-000035481?language=en_US But i am not able to actually see anything about censorship. There are people dedicated or investing there free time to help others like in this reddit.
🌐
Reddit
reddit.com › r/homelab › sophos xg for home use
r/homelab on Reddit: Sophos XG for home use
August 3, 2016 -

I’ve been using Sophos UTM in my home lab for a while now and I like it. Nothing too fancy; just some vlans, fairly basic firewall rules, hairpin NAT, IP, web filtering. My only issue is that I’m coming up on the 50 IP address limit, so I thought I’d check out XG.

I’ve installed XG in a VM and have been mucking around with it a bit, but haven’t gone too deep yet. The question is, do I gain anything in XG besides a bit fancier (and albeit more complex) UI and unlimited IP’s? I don’t have a ton of complicated rules, so I wouldn’t worry about “migrating”, and would just do it all manually.

From what I’ve read, most people hate XG in an enterprise environment, the migration from SG/UTM seems to be the biggest pain point. Well, that and people sure don’t seem to like the UI.

Anyway, just wondering what homelabbers think of it.

Thanks!

EDIT: Got this (mostly) up and running. Looks like everything works, except DHCP Relay is busted on VLANs. For now just using the DHCP server for the VLANs while I mess with this some more.

🌐
Reddit
reddit.com › r/homelab › ngfw: sophos firewall home edition vs opnsense + zenarmor + suricata
r/homelab on Reddit: NGFW: Sophos Firewall Home Edition vs OPNSense + Zenarmor + Suricata
October 24, 2024 -

Hey there, I'm looking for a firewall for my homelab and home, I would really like to have some fun with NGFW features, like IDS, IPS and DPI, and maybe other features I'm not aware of now, I have never took a deep dive into next gen firewalls to be fair.

I'm considering buying a Sophos XG 330 Rev 2, and installing OPNSense, and run Suricata on a VM in my hypervisor, but I've read in a reddit post that Sophos Home Edition has some NGFW features and it's free.

Which path would you guys choose and why?

It would be possible to install it on a Sophos hardware since they're basically a PC?

Disclaimer: My home/lab contains less than 100 endpoints, two 1Gbps links but the usual traffic is about 200Mbps maybe

Ubiquiti: I know they have some IDS and IPS and a fancy dashboard, but I've saw a lot of users talking about how a lot of features are half baked and poorly implemented, and their updates always break something. All that makes me stay away from their L3 devices...

🌐
Reddit
reddit.com › r/sysadmin › sophos xgs end of life
r/sysadmin on Reddit: SOPHOS XGS END OF LIFE
August 6, 2024 -

Hi We are a small business that is using one of the SOPHOS XGS firewall that is coming to end of life. We have got an update option for 8 months but charging us double for the license fee. What happens if we don’t buy the license. The basic license is till 2099 . It’s a small office up to 10users. Any other suggestions that can help us so that would be budget friendly.