advertisement
Sophos XG Firewall v 15.01.0 – Release Notes
Sophos
Central
Firewall Manager Web
Interface Reference and Admin Guide v1
7.1
For Sophos Customers
Document Date:
December
201
8
Contents
| Introduction | 3
Introduction
Sophos Central Firewall Manager (CFM) provides comprehensive central management of Sophos XG Firewall s to
Sophos Partners. With a range of features,CFM simplifies security management for actions like rapid deployment of organization-wide security policies and updates for better protection of dispersed networks, offering benefits of reduced cost, complexity and time.
The Sophos Central Firewall Manager UI offers you 3 work areas: Device Configuration, Templates, and System &
Monitor.
Device Configuration
The Device Configuration work area allows you to manage policies and configurations of individual or group of
Sophos XG Firewall devices. You can select an individual device or device group and use menu items in the left panel to edit Policies, Settings and Objects like in your Firewall UI.
Templates
The Template Configuration work area allows you to create re-usable configuration templates allowing you to set up a new firewall at branch or customer office in minimum time. You have an option to add a template using an existing device configuration, clone an existing template, or setup a fresh template. You can edit the template configuration by using menu items in the left panel to edit Policies, Settings and Objects like in your Firewall UI. Once ready, you can provision the template to one or more firewall devices as per your need.
System & Monitor
The System & Monitor work area lets you manage device settings, monitoring settings and your CFM system settings.
• Device settings: You can add or remove managed devices or device groups, add or remove templates, upgrade firmware of managed devices, create and manage dynamic objects, and change control and logging.
• Monitoring settings: You can edit monitoring settings, setup email alerts, view device events and logs, view management system events.
• Account Settings: You can manage CFM account settings, and set up role-based access, Diagnostics and more.
Dashboards & Monitoring
Sophos Central Firewall Manager offers multiple dashboards for a quick snapshot and easy monitoring of your managed firewalls.
• Device Monitor
• Flat view and card view allow you to monitor the status (Critical, Warning, Normal) of managed devices across a set of parameters for Security, Resource, License and Availability, based on their threshold values.
• In flat view, devices that need attention are automatically listed at the top on the basis of their monitor status.
• You have the flexibility to customize threshold values for Critical, Warning and Normal levels as per your needs.
• Home and Group-level Dashboard
• Device Info: Summary of managed devices like the count of managed devices, unsynchronized devices, and disconnected devices.
• Device monitor summary: A snapshot of firewall count that requires attention in terms of Security, Resource,
License, Availability.
• A list of managed firewalls by their model number, and more.
Group-level dashboard lets you filter the above view for a device group.
• Device Dashboard - It offers you insights into security, resource, license and availability parameters along with device and connection information to enable you to take necessary action
| Using Admin Console | 4
• Alert - Configure alert profiles for one or more firewalls or Firewall group to get alert notifications over email.
This includes alert notifications for parameters like subscription expiry, Device disconnected from central management, Device Gateway status change, VPN connection status change, along with counts of Intrusion attack, ATP events exceed, Web virus, Objectionable + Unproductive surfing hits, and percentage of endpoints with Red health exceeding a threshold limit.
Using Admin Console
Sophos Central Firewall Manager uses a Web 2.0 based easy-to-use graphical interface termed as Admin Console to configure and manage the device.
Log on procedure
The log on procedure authenticates the user and creates a session with the Device until the user logs-off.
To get the login window, open the browser and type Web Address of the Sophos Central Firewall Manager in the browser’s URL box. A dialog box appears prompting you to enter email and password.
Below are the screen elements with their description:
Enter registerd Partner email address.
Password
Enter Partner account password.
Login button
Click to log on the Admin Console.
You will be redirected to Login Verificarion page. Enter Security Code and PIN to continue.
Below are the screen elements with their description:
Security Code
Enter Security Code as received on your registered Partner email address.
PIN
Enter PIN for your Partner account.
Submit
Click to submit entered information.
Choose Another Method
Click to select another method for login verification.
Home appears as soon as you press Submit on Login Verification page.
Admin Console Language
The Admin Console supports multiple languages, but by default appears in English. Apart from English, Brazilian-
Portuguese, Chinese-Simplified, Chinese-Traditional, French, German, Italian, Japanese, Korean, Russian and
Spanish languages are also supported. Administrator can choose the preferred language at the time of logging in.
Administrator can also specify description for various policies, services and custom categories in any of the supported languages.
Log out procedure
To avoid un-authorized users from accessing Sophos Central Firewall Manager , log off after you have finished working. This will end the session.
| Using Admin Console | 5
Supported Browsers
You can connect to CFM using HTTP or a secure HTTPS connection from any management computer using one of the following web browsers:
Latest version of Firefox (recommended), latest version of Chrome, latest version of Safari, or Microsoft Internet
Explorer 9 onwards. JavaScript must be enabled.
The minimum screen resolution for the management computer is 1280 X 768.
Navigating through the Admin Console
The three parts of the admin Console:
• Area Selector
• Navigation Bar
• Content Pane
• Button bar
Use the menus, lists, and configuration pages to configure most settings. Configuration made through Admin Console take effect after some time as it takes time to copy the entire configuration on to the device.
Work Area Selector
The Sophos Central Firewall Manager UI offers you three work areas: Device Configuration, Template Configuration, and System Management. To select any work area, select the icon on the top right corner of the Home.
Once an area is selected, the Navigation bar changes based on the selected work area.
Device Configuration allows you to navigate through pages through which you can manage Device Groups or individual devices. The navigation bar changes dynamically for Device Group and individual device. You can select device group or any device Device Groups or Device on the Dashboard top panel.
Navigation Bar
The navigation bar on the leftmost side provides access to various configuration pages. Menu consists of sub-menus and tabs. On clicking menu item in the navigation bar, related management functions are displayed as submenu items. On clicking submenu item, all the associated tabs are displayed. To view page associated with the tab, click the required tab.
The Main menu tree expands and contracts dynamically when clicked on without navigating to a submenu. When you click on a top-level heading, it automatically expands that heading and contracts the heading for the page you are currently on, but it does not navigate away from the current page. To navigate to a new page, first click on the heading, and then click on the submenu you want navigate to. A breadcrumb on the top of the Content Pane displays the entire navigation path.
Content Pane
The center part of the page is Content Pane that changes according to the menu item and tab. Information of the menu is displayed in the content pane, which includes list of managed devices and configuration screens.
Button Bar
The Button bar on the upper rightmost corner of the every page provides access to several commonly used functions like:
| Using Admin Console | 6
• Device Search – Specify a search string and click to search device(s) in CFM. Device(s) can be searched on following criteria:
Device Name
Model
Serial Number
Firmware
Company
City
State
Country
By default it yields results based on Device Name. Results display following information in tabular form: Device name, Serial number, Company name, Status and Firmware.
Click Device Name to go the dashboard of that device.
• Alerts – Click to view list of alerts generated by CFM.
• Discover – Click to view list of devices sending heartbeat packet to the CFM.Click icon to add newly discovered devices using Add Device Wizard or icon to delete the device.
• Errors – Displays total number of generated errors.
• Monitor - Click to view the Device Monitor graphs which displays critical health status of the managed devices.
• Language - Click to change language.
• Help – CFM includes a Web-based help online help, which can be viewed from any of the page of admin console.
Click Help to open the context-sensitive help for the page.
• Language - Click to change device language.
Menus
The Sophos Central Firewall Manager offers you three work areas: Device Configuration, Template Configuration, and System. To select any work area, select the icon on the top right corner of the Home.
Once an area is selected, the Navigation bar changes based on the selected work area.
The navigation bar on the leftmost side provides access to various configuration pages. Menu consists of sub-menus and tabs. On clicking menu item in the navigation bar, related management functions are displayed as submenu items. On clicking submenu item, all the associated tabs are displayed. To view page associated with the tab, click the required tab.
The left navigation bar expands and contracts dynamically when clicked on without navigating to a submenu. When you click on a top-level heading in the left navigation bar, it automatically expands that heading and contracts the heading for the page you are currently on, but it does not navigate away from the current page. To navigate to a new page, first click on the heading, and then click on the submenu you want navigate to.
Tool Tips
| Using Admin Console | 7
To view the additional configuration information, use tool tip. Tool tip is provided for many configurable fields. Move the pointer over the icon to view the brief configuration summary.
Notification pop-ups
A notification pop-up will be displayed at the top of the every page for error messages or action status. You can click the icon to close the pop-up.
Common Operations
Adding an Entity
You can add a new entity like policy, group, user, rule, or host by clicking the Add button available on most of the configuration pages. Clicking the Add button either opens a new page or pop-up window.
You can add new items for a entity by clicking the Add New Item . Select items by clicking the check box and apply to add the selected items. You can also update/delete the items added.
Set Schedule
For the entire group and subgroup level configuration, administrator can update configuration immediately or schedule the update. Whenever any configuration task – add, update and delete, is done, Set Schedule page with following parameters is opened:
Synchronize Configuration - Select the time and date to update the configuration.
Immediately – Changes will be applied immediately to the device(s).However it takes some time to reflect the changes locally.
At: – Specify date and time in the format YYYY –MM-DD Hours:Minutes or select date and time from the given calendar. Configuration will be updated at the scheduled time. All the scheduled tasks are listed at Account Settings
> Device Settings > Scheduled Task page. If required, scheduled task can also be deleted from Scheduled Tasks page.
Device Time Zone – Select to apply changes as per the device time zone.
Override configuration - Select Yes to override existing configuration of device else select No .
Select Device(s) - Select Device(s) or Device Group(s) for which this task is to be scheduled.
Filter Devices - Click to filter devices on the basis of given criteria.
Select Criteria and specify the value to be matched.
• Model : Specify model.
• Firmware: Specify firmware.
• Company: Specify company name.
• Country: Specify country name.
| Using Admin Console | 8
• State : Specify state name.
• City: Specify city name.
• Device Name: Specify device name.
Note: Filter Devices is available only if Device is selected in Select Device(s) .
Synchronize
You can synchronize configuration of selected entities of managed device(s) with the configuration available in
CFM.To Synchronize settings, click icon or the button.
Entity Usage Reference
Entity Usage Reference points out the co-dependency of an entity with another entity. Entity Usage Reference lists all the dependent entities related to a particular entity. The list includes the entity, sub-entity and the device group details.
Entity Usage Reference is an essential feature for the administrator so that they can identify all co-dependent entities before deleting any particular entity. If the dependency exists, the administrator must remove the dependency before deleting the entity.
To determine the Entity Usage Reference, click . This will display the following information for the selected entity and its dependent entity(ies).
Details of selected entity
Entity
Displays the selected entity type.
Sub Entity
Displays the selected Sub Entity type.
Entity Name
Displays the name of the selected entity.
Details of dependent entities
Sub Entity
Displays the selected Sub Entity type.
Entity Name
Displays the name of the dependent entity.
Device Group
Displays the name of the device group of which the dependent entry is a part of.
Device Group Path
Display the path of the device group based on the device criteria adopted for the group.
Editing an Entity
All the editable entities are hyperlinked. You can edit any entity by clicking either the hyperlink or the icon under the Manage column.
Deleting an Entity
You can delete an entity by selecting the check box and clicking the Delete button or icon.
| Templates | 9
To delete multiple entities, select individual entity and click the Delete button.
To delete all the entities, select the check box in the heading column and click the Delete button.
Sorting Lists
To organize the list spread over multiple pages, sort the list in ascending or descending order of a column attribute.
You can sort a list by clicking a column heading.
• Ascending Order icon in a column heading indicates that the list is sorted in ascending order of the column attribute.
• Descending Order icon in a column heading indicates that the list is sorted in descending order of the column attribute.
Filtering Lists
To search specific information within the long list spread over multiple pages, filter the lists. Filtering criteria vary depending on a column data and can be a number or an IP address or part of an address, or any text string combination.
To create filter, click the Filter icon in a column heading. When a filter is applied to a column, the Filter icon changes to .
Configuring Column Settings
By default on every page all columnar information is displayed but on certain pages where a large number of columnar information is available, all the columns cannot be displayed. It is also possible that some content may not be of use to everyone. Using column settings, you can configure to display only those numbers of columns which are important to you.
To configure column settings, click Select Columns and select the check box against the columns you want to display and clear the check box against the columns which you do not want to display. All the default columns are grayed and not selectable.
Reordering Lists
You can reorder the Security Policies/Groups by dragging and dropping. On successful reordering, a status message will be displayed. Following can also be reordered:
• IPS Policy Rules
• Application Filter Policy Rules
Summary
For convenience in reviewing the firewall rule, a summary of the firewall rule is auto-populated along-side the configuration windows. In addition to this, you can click any summary element to scroll up or down, directly to the configuration section.
Templates
Template is a customizable set of policy configuration including commonly used objects, services and other configurations. CFM allows the administrator to define templates for storing global configurations. The configuration stored in a template can be directly applied to any managed Device(s) or Device group(s).
| System & Monitor | 10
Template enables ease-of-administration by eliminating the need of configuring same entities on the Devices individually. Policy configuration using templates reduces administrative efforts in large enterprises and MSP networks where new Devices are added frequently.
Note: All policy configuration entities for Device Group level can be added to a template, except the following entities, which are outside the scope of templates:
• Administrator Password
• Synchronize
System & Monitor
System & Monitor is meant to manage and configure the basic system options for the Sophos Central Firewall
Manager. This includes the basic network settings to connect the Sophos Central Firewall Manager to the corporate network, the configuration of administrators and their access privileges, managing and updating firmware for the
Sophos Central Firewall Manager, as well as managed Devices.
System allows you to configure the following settings:
•
•
•
Device Settings
Device Settings menu enables the administrator to add devices to the Sophos Central Firewall Manager. Once the devices are added, they can be organized into groups based on various criteria. The administrator can manage and configure devices or groups from Device Management menu. The administrator can also add dynamic objects for all managed devices. The menu also allows administrator to take and download backup of managed devices and restore it later on. Additionally, it gives visibility and control over scheduled tasks and Change Control events for managed devices.
Device Settings lets you configure the following settings:
•
•
•
•
•
•
Managed Devices
Use the Managed Devices menu to add and manage devices using the Sophos Central Firewall Manager.
Managed Devices menu allows you to configure the following settings:
•
•
•
•
Devices
Use the Devices page to add, edit, delete and reboot devices from the Sophos Central Firewall Manager Sophos
Central Firewall Manager.
| System & Monitor | 11
To add or edit device details, go to System Management > Device Settings > Managed Devices > Device
Configuration
You can configure the following Device Settings:
•
• Reboot – Click the reboot icon in the Manage column against the device to be rebooted. The device can be rebooted immediately or scheduled at a later time.
• More
1.
2.
3.
Export Device IP Change Report
Add Device
Use the Add Device page to add new devices or edit device details.
1.
Go to System Management > Device Settings > Managed Devices > Device Configuration and click Add .
2.
Specify Device details based on the given description.
Device Name
Specify device name, which uniquely identifies the Device.
Description
Specify description for the device.
Serial Number
Specify the device serial number.
IP/Domain
Specify IP address assigned to the WAN Interface of the device.
Admin Username
Specify Administrator Username of the device.
Password and Confirm Password
Specify Administrator Password of the device.
Communication Mode
Specify communication mode to manage the device from Sophos Central Firewall Manager.
Available options : Central Management will push updates to this Device :
Select if the managed device is directly accessible from Sophos Central Firewall Manager i.e. there is no intermediate NAT box. Specify Access Protocol and Access Port number to communicate with managed device.
This Device will fetch updates from Central Management :
Select if the managed device is behind NAT box e.g. ADSL. In that case the device will first poll
Sophos Central Firewall Manager in interval of 1 (one) minute for any configuration updates available. If the updates are available the managed device will pull those updated configuration settings.
Enable Change Control (CCL)
Enabling Change Control allows the administrator to maintain list of configuration revisions.
Configuration Revisions are the configuration changes synchronized by the Sophos Central Firewall
Manager.
The administrator can update the CCL settings from System Management > Device Settings >
Change Control page.
Template
| System & Monitor | 12
Select configuration template which has to be applied on the device.
Users
Add Sophos Central Firewall Manager's Administrator who can manage the device.
Administrator Information
Click hyperlink to add additional information of administrator.
Administrator Name
Specify name of the Administrator.
Contact Number
Specify contact number of the Administrator.
Email ID
Specify email ID of the Administrator.
Test Connection
Click to test the connectivity between Sophos Central Firewall Manager and the managed device.
Figure 1: Add Device
3.
Click Save .
| System & Monitor | 13
Add Device Wizard
The Add device wizard enables you to add a device, configure firmware, restore backup, and apply a template.
Wizard is divided into six sections:
1.
Device
2.
Users
3.
Firmwares
4.
Restore backup
5.
Template
6.
Summary
1.
Go to System & monitor > Device settings > Managed devices > Device discovery and click . Alternatively, click Discover to run the wizard.
2.
Add device information a) Enter the Device name .
b)
Enter the Serial number . This field will be autopopulated if you run the wizard from Discover notification.
c) Enter the IP/Domain assigned to the WAN interface of the Device.
d) Enter the Firewall admin username .
e) Enter the Password .
f) Enter a Description .
g) Click Enable change control (CCL) .
h) Click Administrator information to add more information of the firewall manager's administrator.
i) Enter the Administrator name .
j) Enter the Contact number .
k) Enter the Email ID .
l) Select the Communication mode .
Firewall manager will push configuration changes to the firewall
Select if the managed device is directly accessible from the firewall manager without an intermediate NAT box. Specify the access protocol and port number to communicate with the managed device.
Click to Test connection .
The device will fetch configuration changes from the firewall manager
Select if the managed device is behind a NAT box (Example: ADSL). The managed device will poll the firewall manager for configuration updates at one-minute intervals and pull the available updates.
m) Specify the port on which the device and firewall manager should communicate.
n) Click Next to go to Communication mode or Skip to finish to complete the wizard.
| System & Monitor | 14
Figure 2: Device information
3.
Select the firewall manager users.
a) Add Firewall manager users to manage the device.
b) Click Back to go to Device or Next to go to Firmwares or Skip to finish to complete the wizard.
Figure 3: Add firewall manager users
4.
Configure firmware settings
Displays the current firmware version of managed devices, and availability of the latest firmware version.
a) If the device model is available in the firewall manager, the latest version will appear automatically. If it doesn't, go to System & monitor > Device settings > Firmware and click Check for latest firmwares b) Click Yes to upgrade the device with the latest available firmware. It is disabled by default.
c) Click Back to go to Users and Next to go to Restore backup or Skip to finish to complete the wizard.
| System & Monitor | 15
Figure 4: Upgrade device firmware
5.
Configure restore backup a) Click Yes to restore the backup of an existing device in the new device. It is disabled by default.
b) Select an existing device and the backup you wish to restore in the new device. Alternatively, upload the backup file from your computer and restore it in the new device.
c) Click Back to go to Firmwares or Next to go to Template or Skip to finish to complete the wizard.
Figure 5: Restore existing configuration backup
6.
Configure template management a) Click Yes to apply an existing template to the device. The template is disabled by default.
b) Select the template to be applied.
c) Click Next to view Summary or Back to go to Restore backup . Click Skip to finish to complete the wizard.
| System & Monitor | 16
Figure 6: Select the template to configure the device
7.
Review configuration summary.
Summary displays details of the added device, including the device name, device key, IP/Domain, admin username, communication mode, communication ports of firewall manager and XG Firewall, and the status of firmware upgrade, restore backup, and template application.
Click Finish to complete the wizard or Back to go to Template .
Figure 7: Summary
Export Device List
Export Device List option is used to export the list of all managed devices added in the Sophos Central Firewall
Manager.
The list is exported in excel format containing the following details for each device which includes Device Name,
Device Key, IP/Domain, Connection Status, Firmware Version, IPS Version, AV Version, Webcat Version, License
Subscription Expiration, Last backup Time, Upstream Bytes and Downstream Bytes.
Device List report is generated automatically at 11:50 PM Daily by default and the previous report is overwritten by the new report. To see the last generated report, go to System Management > Device Settings > Managed Devices >
Device Configuration and select More > Export > Device List
To generate and download the report manually, follow the steps shown below.
| System & Monitor | 17
1.
Go to System Management > Device Settings > Managed Devices > Device Configuration and select More >
Export > Device List .
2.
Click Generate to generate the report.
3.
You should see the Download hyperlink for the generated report. Click the hyperlink to download the report.
Note: The manually generated report will overwrite the previously generated report.
Export Device IP Change Report
Export Device IP Change Report option is used to export the IP Address revisions for each added device.
Device IP Change Report displays IP address changes or revisions for last 30 days.
This report is generated automatically 11:50 PM Daily.
To download the report, follow the steps shown below.
1.
Go to System Management > Device Settings > Managed Devices > Device Configuration and select More >
Export > Device IP Change Report .
2.
Click Download to download the report in Excel file format.
Note:
The report is exported in the excel format which includes IP change information based on Device Name,
Device Key, Time, Old IP and New IP.
All Managed Devices
Displays list of all devices that are managed by Sophos Central Firewall Manager.
Device Name
Displays name of the device.
Serial Number
Displays Serial Number of the device.
Company Name
Displays company Name for the device.
Model
Displays Model Name for the device.
Status
Displays Status for the device.
Device Discovery
Use the Device Discovery page to view the devices which are sending heartbeat packet to the Sophos Central Firewall
Manager. This page allows you to add these Devices to CFM.
You can View, Add or Delete the discovered devices. Adding discovered devices is similar to
Device Groups
Device Groups are logical grouping of managed devices for ease of administration.
Administrator may want to divide the managed devices into groups for the following reasons:
• Configure group-shared settings and then update the configurations on the devices at once. For example, group all the devices that need to upgrade subscription and upgrade all the devices simultaneously.
• Manage a great number of devices more efficiently.
• Group the devices according to their locations (country/state/city), ownership/company/departments, firmware, device name and device models.
Note: Single device can be part of different groups.
| System & Monitor | 18
Using Device Groups page, you can:
•
• Delete existing device groups
Add Device Groups
1.
Go to System Management > Device Settings > Managed Devices > Device Groups . Click Add to create a new group or Edit Icon to modify the details of the group.
2.
Specify group name, which uniquely identifies group.
3.
Specify Devices to be grouped based on the available options.
Model
Firmware
Company
Country
State
City
Device Name: Specify group condition criterion.
Available options : Starts with, Contains, Substring, Ends with.
Figure 8: Add Device Group
Note: You can select Device Name as a criterion multiple times. All the Devices starting with specified name prefix will be grouped dynamically.
4.
Click Save .
Templates
Template is a customizable set of policy configuration including commonly used objects, services and other configurations. CFM allows the administrator to define templates for storing global configurations. The configuration stored in a template can be directly applied to any managed Device(s) or Device group(s).
Template enables ease-of-administration by eliminating the need of configuring same entities on the Devices individually. Policy configuration using templates reduces administrative efforts in large enterprises and MSP networks where new Devices are added frequently.
Note: All policy configuration entities for Device Group level can be added to a template, except the following entities, which are outside the scope of templates:
• Administrator Password
• Synchronize
| System & Monitor | 19
Template Dashboard
Template dashboard displays summary of the selected template along with the recent activity log. To view the details of individual template, go to Template Configuration and select a template. This page displays following information for selected template:
• Template Summary
• Recent Activities
Template Summary
Displays the name of configuration entity along with number of entries for each entity.
Policies
Displays the name of Policies configured along with number of entries.
Protection
Wireless Protection
Displays name of the Wireless Protection configurations along with number of entries:
• Wireless Networks
• Mesh Networks
• Access Point Groups
• Hotspots
• Hotspot Voucher Definition
• Rogue AP Scan
Web Protection
Displays name of the Web Protection configurations along with number of entries:
• Web Proxy
• Web Content Filter > Configurations
• Web Filter Policies
• Custom Web Category
• URL Group
• Surfing Quota
• File Type
• Malware Protection
Application Protection
Displays name of the Application Protection configurations along with number of entries:
• Application Filter
• Traffic Shaping Settings
Web Server Protection
Displays name of the Web Server Protection configurations along with number of entries:
• Web Servers
• Web App Protection Policies
• Web App Authentication Policies
• Web App Auth Templates
• Certificate
• Certificate Authority
• Certificate Revocation Lists
Email Protection
Displays name of the Email Protection configurations along with number of entries:
• Email Configuration
• Scanning Rules > SMTP/S Malware Scanning Rules
• Scanning Rules > POP3/S and IMAP/S Malware Scanning Rules
• Scanning Rules > Content Scanning Rules
• SPX Configuration
• SPX Templates
• Data Protection
• Address Group
• Email Archiver
• Quarantine Digest Settings
• Trusted Domain
• Malware Protection
System
Networks
Displays name of the Network configurations along with number of entries:
• Wireless Networks
• Mesh Networks
• DNS > DNS Configuration
• DNS > DNS Host Entry
• DNS > Request Routing
• DHCP Relay
Routing
Displays name of the Routing configurations along with number of entries:
• Upstream Proxy
• Static Route
VPN
Displays name of the VPN configurations along with number of entries:
• IPSec
• L2TP Settings
• L2TP Connections
• PPTP
• SSL VPN Settings
• SSL VPN (Site to Site) > Server Connection
• SSL VPN (Site to Site) > Client Connection
• SSL VPN (Remote Access)
• Clientless Access
• Bookmark
• Bookmark Group
• Certificate
• Certificate Authority
• Certificate Revocation Lists
Administration
Displays name of the Administration configurations along with number of entries:
• Settings
• Device Access
• Device Access >> Local Service ACL Exception Rule
| System & Monitor | 20
• Updates
• Messages
• Notification
• Time
• SNMP > Agent Configuration
• SNMP > Community
• SNMP > v3 User
• Netflow
Authentication
System Services
Displays name of the System Services configurations along with number of entries:
• Web Proxy
• Authentication
• Guest User Settings
• Guest User Settings > SMS Gateway
• DoS > Settings
• DoS > Bypass Rules
• Web Content Filter > Configurations
• Web Content Filter > HTTP Scanning Rules
• Web Content Filter > HTTPS Scanning Exceptions
• Traffic Shaping Settings
• RED
• Wireless
• Advanced Threat Protection
• Malware Protection
• Log Settings
• Log Settings > Syslog Servers
Configuration
Displays name of the Configuration configurations along with number of entries:
• CLI Configuration
• Transparent Authentication
Objects
Assets
Displays name of the Authentication configurations along with number of entries:
• Authentication Server
• Groups
• User
• Clientless Users
• Captive Portal
• Guest User Settings
• Guest User Settings > SMS Gateway
• Hotspots
• Hotspot Settings
Displays name of the Assets configurations along with number of entries:
• Authentication Server
• Access Point Groups
| System & Monitor | 21
• Web Servers
Content
Displays name of the Content configurations along with number of entries:
• File Type
• Custom IPS Patterns
• Custom Web Category
• URL Group
• Web App Auth Templates
Identity
Displays name of the Identity configurations along with number of entries:
• Certificate
• Certificate Authority
• Certificate Revocation Lists
• Groups
• User
• Clientless Users
Policies
Displays name of the Policies configurations along with number of entries:
• Schedule
• Access Time
• Surfing Quota
• Network Traffic Quota
• NAT
• IPSec
• IPS
• Web Filter
• Traffic Shaping
• Web App Protection
• Web App Authentication
• Device Access Profile
• Global App Traffic Shaping
• Application Group
• Hotspot Voucher Definition
Hosts and Services
Displays name of the Hosts and Services configurations along with number of entries:
• IP Host
• IP Host Group
• MAC Host
• FQDN Host
• FQDN Host Group
• Country Host
• Country Host Group
• Services
• Service Group
Provision Template
| System & Monitor | 22
| System & Monitor | 23
Click to provision the template configuration. On clicking Provision Template, Template Provision
Summary window is displayed.
Template Provision Summary
Displays list of configuration entries. Select required entities and click Confirm. On clicking
Confirm, Set Schedule window is displayed.
Recent Activities
Time
Displays time of the event in YYYY-MM-DD HH:MM format. The administrator can view following details for an activity: User, IP, Entity, Sub Entity, Action, Status.
Message
Details of change.
Add Template
Use the Add Device page to add new templates. Edit Template page has same parameters.
1.
Go to System Management > Device Settings > Managed Devices > Templates and click Add .
2.
Specify template name, which uniquely identifies the template.
3.
Select the type of template to be added from the available options.
New Template
Select to store global configuration available at Sophos Central Firewall Manager in the form of template.
Import Device Configuration
Select to store configuration available at selected device in the form of template.
Clone Template
Select to add a new template with configuration stored in existing Template.
4.
Select a device from the list of managed devices to store configuration available at that device in the form of template.
5.
Select the template to be cloned.
6.
Specify description of the Device.
Figure 9: Add Template
7.
Click Save .
Provision Template
| System & Monitor | 24
Provision Template page allows you to export a Template to Device(s). To provision a Template, refer the step shown below.
1.
Go to System Management > Device Settings > Managed Devices > Template and click the Provision icon against the template to be exported.
Note: You can also provision a template from Device Configuration > Template Dashboard .
2.
3.
Select required entities and click Confirm to save the settings.
Maintenance
Maintenance facilitates handling the maintenance of the managed devices.
Using the Maintenance menu, you can configure following operation:
•
- Allows to manually take backup or schedule backup of the managed devices.
•
- Allows you to get report on the inactive users, also to delete the inactive users.
Backup & Restore
Use Backup & Restore page to take backup of the managed devices and store on the Sophos Central Firewall
Manager. Sophos Central Firewall Manager acts as a Backup repository for device backups. Administrator can restore this backup on the device whenever required. Sophos Central Firewall Manager automatically takes backup of all the managed devices at the predefined intervals and if required administrator can also take backup manually.
Administrator can schedule the backup or manually take the backup from System Management > Device Settings >
Maintenance > Backup & Restore .
Schedule Backup
Backup Frequency
Select backup frequency.
In general, it is the best to schedule backup on regular basis. Depending on how much information you add or change will help you determine the schedule.
Available options :
• Never – Select this option if you do not want to take backup
• Daily – Configure time at which the backup should be taken.
• Weekly – Configure day and time at which the backup should be taken.
• Monthly – Configure day and time at which the backup should be taken.
Backup Mode
Select backup mode.
Available options :
• Local – Select this option to store Device backup file(s) on local machine.
• FTP – Select this option if you want to store Device backup file(s) on any configured FTP server.
• FTP Server IP – Specify IP address of FTP server
• FTP Path – Specify path of backup folder on FTP server
• Username – Specify FTP server username
• Password – Specify FTP server password
• Mail – Select this option to send backup file(s) on any configured email address.
| System & Monitor | 25
Figure 10: Schedule Backup
Manage Backup
Select Device
Select the Device to take backup.
Take Backup
Click to take backup of the selected Device manually.
Backup Date
Date and time in DD/MM/YYYY HH:MM:SS format on which backup was taken
Backup Type
Type of backup – Manual or Scheduled
Last Good Backup
Select a backup to be stored as ‘last good backup’. This backup will not be purged.
You can take maximum five backups including ‘last good backup’.
Restore
Click to restore the downloaded backup.
Download
Click to download the backup.
Maximum 5 backups of every Device will be preserved but the Last good backup will be preserved all the time.
| System & Monitor | 26
Figure 11: Manage Backup
Inactive User Maintenance
Inactive User Maintenance page is used to Manage Inactive Users. The following management options are available:
• Inactive Users Report – To generate and download Inactive User Reports.
• Delete Inactive Users – To delete Inactive Users.
To manage Inactive Users, go to System Management > Device Settings > Maintenance > Inactive User
Maintenance .
Inactive Users Report
Generate Report
Specify the number of days after which the user is considered Inactive if not logged-on and the date from which the report is to be generated using calendar. Click Generate to generate the report.
Report
Shows the last generated Inactive Users Report. Click Download to download the generated reports.
Figure 12: Inactive Users Report
Delete Inactive Users
Specify the number of days after which the users are to be deleted if not logged-on and the start date using calendar.
Click Delete to delete the Inactive Users.
Figure 13: Delete Inactive Users
Firmware
Use Firmware page to check for the latest available firmware for managed devices. To check for the availability of the latest firmware, go to System Management > Device Settings > Firmware .
Check for Latest Firmware
Click to check availability of latest firmware.
Model
Device Model number.
| System & Monitor | 27
Applicable devices
Click ‘List device’ to view list of devices which can be upgraded with available firmware.
Applicable Version
Applicable firmware version.
Size
Size of downloadable firmware image in MB.
Type
Displays the type of firmware.
Available Options: BetaGA
Action
Click to apply downloaded firmware on the selected device(s).
Apply Firmware
Schedule
Click to schedule firmware upgrade. You can upgrade the selected device(s) with downloaded firmware immediately or you can choose to upgrade it later.
Device
Select the device to be upgraded with downloaded firmware.
Scheduled Task
Any configuration changes done on the Sophos Central Firewall Manager for managed devices can be applied to the device or group of device(s) immediately or can be scheduled at a later time.
Scheduled Task
Scheduled Tasks are the configurations which are to be executed at a set time or interval.
Go to System Management > Device Settings > Schedule Task Schedule Task to view list of task that are scheduled. You can delete or reschedule any scheduled task.
The page displays details of the task – event, entity and sub entity name, device for which task is scheduled and the schedule time.
Dynamic Objects
Dynamic objects – Host, Zone, Interface and Gateway are the network objects whose configurations vary from one device to another. Administrator can configure these objects in and map them to individual devices. Administrator can use these objects while creating Firewall rule and various policies.
All of the dynamic objects are created using a similar method - create object and then specify the dynamic objectdevice mappings.
With dynamic objects, configuration of common objects like mail server, radius servers becomes easy as they need to be configured only once and then can be mapped.
This section covers the following topics:
•
- View the list of dynamic hosts, add new hosts and manage all the configured hosts.
•
this page.
•
- View port wise network (physical interface) and zone details.
•
- Allows to manage gateway.
Host
| System & Monitor | 28
Host is a logical building block used in defining security policies or NAT. By default, the numbers of hosts equal to the ports in the device are already created.
Host represents various types of addresses, including IP addresses, networks and Ethernet MAC addresses.
Hosts allow entities to be defined once and then be re-used in multiple refrential instances throughout the configuration. For example, an internal Mail Server with an IP address as 192.168.1.15. Rather than repeated use of hte IP address while constructing security policies or NAT Policies, it allows creating a single entity called "Internal
Mail Server" as a Host name with an IP address as 192.168.1.15. This host, "Internal Mail Server" can then be easily selected in any configuration screen that uses Hosts as a defining criterion.
By using hosts instead of numerical addresses, you only need to make changes in a single location, rather than in each configuration where the IP address appears. Using Hosts reduces the error of entering incorrect IP addresses, makes it easier to change addresses and increases readability.
Administrator can view the list of all the dynamic hosts from System Management > Device Settings > Dynamic
Objects > Host .
Add Dynamic Host
The Add Dynamic Host page allows you to manually add IP host.
Name
1.
Go to System Management > Device Settings > Dynamic Objects > Host and select Add .
2.
Enter dynamic host details.
Name to identify the Host.
IP Family
Select IP family of the host.
Available Options: IPv4IPv6
Type
Select the type of host.
Available Options: Single IP AddressNetwork IP Address with subnetIP Range
IP list to add assorted IP addresses. Use comma to specify assorted multiple IP addresses. Please note only Class B IP addresses can be added in IP list. IP addresses can be added or removed from
IP list.
• MAC Address
• MAC list
Figure 14: Add Dynamic Host details
3.
Enter Device - Host Mapping details.
Default
Select the host that is to be mapped with the particular device host.
Device
Select the device whose host is to be mapped with the above selected host.
Host
Select the host which is to be mapped.
| System & Monitor | 29
Figure 15: Device-Host Mapping
4.
Select Save .
Zone
A Zone is a logical grouping of ports/physical interfaces and/or virtual subinterfaces if defined.
Zones provide a flexible layer of security for the firewall. With the zone-based security, the administrator can group similar ports and apply the same policies to them, instead of having to write the same policy for each interface.
Default - Zone Types
LAN – Depending on the device in use and network design, one can group one to six physical ports in this zone.
Group multiple interfaces with different network subnets to manage them as a single entity. Group all the LAN networks under this zone.
By default the traffic to and from this zone is blocked and hence the highest secured zone. However, traffic between ports belonging to the same zone will be allowed.
DMZ (DeMilitarized Zone) - This zone is normally used for publicly accessible servers. Depending on the device in use and network design, one can group one to five physical ports in this zone.
WAN - This zone is used for Internet services. It can also be referred as Internet zone.
VPN - This zone is used for simplifying secure, remote connectivity. It is the only zone that does not have an assigned physical port/interface. Whenever the VPN connection is established, port/interface used by the connection is automatically added to this zone and on disconnection; port is automatically removed from the zone. Like all other default zones, scanning and access policies can be applied on the traffic for this zone.
Local – Entire set of physical ports available on your device including their configured aliases are grouped in LOCAL zone. In other words, IP addresses assigned to all the ports fall under the LOCAL zone.
To manage zones, go to System Management > Device Settings > Dynamic Objects > Zone .
Add Dynamic Zone
This page allows you to enter zone details.
1.
Go to System Management > Device Settings > Dynamic Objects > Zone and select Add .
Name
2.
Enter Dynamic Zone details.
Name to identify the zone.
Type
Select Zone Type - LAN, DMZ
Available Options:LAN - Depending on the device in use and network design, one can group one to six physical ports in this zone. Group multiple interfaces with different network subnets to manage them as a single entity. Group all the LAN networks under this zone.
Note: By default the traffic to and from this zone is blocked and hence the highest secured zone. However, traffic between ports belonging to the same zone will be allowed.
| System & Monitor | 30
DMZ (DeMilitarized Zone) - This zone is normally used for publicly accessible servers.
Depending on the device in use and network design, one can group one to five physical ports in this zone.
Figure 16: Add Zone details
Note: By default, entire traffic will be blocked except LAN to Local zone services like Administration, Authentication and Network.
3.
Enter Device-Zone Mapping details.
Default
Select the zone that is to be mapped with the particular device zone.
Device
Select the device whose zone is to be mapped with the above selected zone.
Zone
Select the zone which is to be mapped.
Figure 17: Device-Zone Mapping
4.
Select Save .
Interface
Use Interface page to view port wise network (physical interface) and zone details.
If virtual subinterface is configured for the physical interface, it is also displayed beneath the physical interface.
Virtual subinterface configuration can be updated or deleted.
To manage Interfaces, go to System Management > Device Settings > Dynamic Objects > Interface .
Add Dynamic Interface
This page allows you to configure interfaces.
1.
Go to System Management > Device Settings > Dynamic Objects > Interface and select Add .
Name
2.
Enter Dynamic Interface details.
Name to identify the Interface.
IP Family
Select IP Family of the Interface.
Available Options: IPv4IPv6
| System & Monitor | 31
Type
Select Interface Type - Route and Bridge
For Route interface type you need to select Zone type:
Available Options:LAN – Depending on the device in use and network design, one can group one to six physical ports in this zone. Group multiple interfaces with different network subnets to manage them as a single entity. Group all the LAN networks under this zone.
Note: By default the traffic to and from this zone is blocked and hence the highest secured zone. However, traffic between ports belonging to the same zone will be allowed.
WAN - This zone is used for Internet services. It can also be be referred as Internet zone.
DMZ (DeMilitarized Zone) - This zone is normally used for publicly accessible servers.
Depending on the device in use and network design, one can group one to five physical ports in this zone.
Note: By default, entire traffic will be blocked except LAN to Local zone service likes Administration, Authentication, and Network.
Figure 18: Add Interface details
3.
Enter Device-Interface Mapping.
Device
Select the device.
Interface
Select the interface which is to be mapped.
Figure 19: Device-Interface Mapping
4.
Select Save .
Gateway
Device supports multiple gateways to cope with gateway failure problems. However, simply adding one more gateway is not an end to the problem. Optimal utilization of all the gateways is also necessary. Device's Multi Link
Manger provides link failure protection by detecting the dead gateway and switching over to the active link and provides a mechanism to balance traffic between various links.
To manage Gateway, go to System Management > Device Settings > Dynamic Objects > Gateway .
Gateway Parameters
This page allows you to add a new Gateway.
Name
1.
Go to System Management > Device Settings > Dynamic Objects > Gateway and select Add .
2.
Enter Dynamic Gateway details.
Name to identify the Gateway.
IP Family
Select IP family of the Gateway.
Available Options: IPv4IPv6
| System & Monitor | 32
Figure 20: Add Gateway details
3.
Enter Device-Gateway Mapping details.
Device
Select the device.
Gateway
Select the gateway.
Figure 21: Device-Gateway Mapping
4.
Select Save .
Change Control
Change Control page allows the administrator to view and manage list of revisions for the managed devices.
Revisions are the configuration changes synchronized by the Sophos Central Firewall Manager and stored in Sophos
Central Firewall Manager's repository. Each revision has a unique Change List ID. Additionally, Export Configuration can be used to export configuration and the change list of devices or device groups.
Change Control
Change Control page allows the administrator to view and manage list of revisions for the managed devices.
Revisions are the configuration changes synchronized by Sophos Central Firewall Manager and stored in Sophos
Central Firewall Manager's repository. Each revision has a unique Change List ID.
This page also allows the administrator to view list of affected configuration settings, compare different versions of configurations and roll back to previous configurations.
View the list of Change Control
Devices
Select the device to view configuration revisions.
Refresh Button
Click to refresh configuration revision list.
View Revision
Click to view device revision history.
| System & Monitor | 33
Create Snapshot
Click to take snapshot of the current system configuration manually. In general, Sophos Central
Firewall Manager takes snapshot of the system on set frequency. System Snapshot can be identified by * displayed against the entity name ‘System Snapshot’.
Purge
Click to purge revision history. This option is available only for those devices which are no longer managed by Sophos Central Firewall Manager.
Time
Revision time in YYYY-MM-DD HH:MM format.
Change List
Unique Change List ID.
User Name
Name of the user who has done configuration changes.
IP Address
IP address of the User.
Entity
Type of Entity.
Entity Name
Name of the Entity.
Component
Name of the component used for configuration change.
Possible components:
• Central Management
• GUI
• API
Action
Action performed on the configuration.
Possible Actions:
• Update
• Insert
• Delete
• Reorder
• Enable/Disable
• Custom
Reverted Change List
Displays list of Change List IDs on mouse over. Changes associated with the listed IDs have been reverted.
Manage
Details Icon
Click to view details of the revision. Details include listing of all dependent entities.
For example if there is a change in policy, details will display list of dependent policies.
Revert up to this change list Icon
Click to revert the changes done in the revision.
Restore Icon
Click to restore the configuration revision.
Purge Icon
Click to purge the configuration revision.
View Revision History
Entity
Type of Entity
Entity Name
Name of the Entity
Time
Change List ID
Change List
Change List ID
Username
Name of the user
IP Address
IP address of the User.
Component
Name of the component used for configuration change.
Possible components:
• Central Management
• GUI
• API
Action
Action performed on the configuration.
Possible Actions:
• Update
• Insert
• Delete
• Reorder
• Enable/Disable
• Custom
Revision
Revision number. Click to view revision details.
Details Icon
Click to view details of the revision in XML format.
Difference with Previous Version Icon
Click to compare revision versions.
| System & Monitor | 34
Time
View the Change List Details
Revision time in YYYY-MM-DD HH:MM format.
User Name
Name of the user who has done configuration changes.
IP Address
IP address of the User.
Entity
Type of Entity
Component
Name of the component used for configuration change.
Possible components:
• Central Management
• GUI
• API
Action
Action performed on the configuration.
Possible Actions:
• Update
• Insert
• Delete
• Reorder
• Enable/Disable
• Custom
Revision
Revision number. Click to view revision details.
Details Icon
Click to view details of the revision in XML format.
Difference with Previous Version Icon
Click to compare revision versions.
View Revision Details
Entity
Type of entity.
Sub Entity
Name of the sub entity.
Entity Name
Name of the entity.
Time
Revision time in YYYY-MM-DD HH:MM format.
Change List
Unique Change List ID.
| System & Monitor | 35
Username
Name of the user who has done configuration changes.
IP Address
IP address of the User.
Component
Name of the component used for configuration change.
Possible components:
• Central Management
• GUI
• API
Action
Action performed on the configuration.
Possible Actions:
• Update
• Insert
• Delete
• Reorder
• Enable/Disable
• Custom
Revision
Revision number.
Details of change Icon
Click to view details of the revision in XML format.
Difference with Previous Version Icon
Click to compare revision versions.
Revert the Revision
Entity
Name of entity to be reverted.
Entity Name
Name of entity to be reverted.
Last Revision
Number of revisions. Click to view revision details.
Action
Action to be performed on the entity.
Possible Actions:
• Update
• Insert
• Delete
• Reorder
• Enable/Disable
• Custom
| System & Monitor | 36
| System & Monitor | 37
Details
Click to compare the revisions. It displays XML for current version and previous version configurations. The changes are highlighted by different color codes.
Export Configuration
Export Configuration allows the administrator to export configuration and the change list of Devices or Device groups. Multiple Devices or Device groups can be selected for export. To export configuration go to System
Management > Device Settings > Change Control Export Configuration .
Select the Device or Device Groups from the drop down list and click Export to generate the configuration file in .TAR file format. To stop the export process, click Cancel .
Figure 22: Export Configuration
The .TAR file contains selected Device configuration along with the change list applicable to the Device or Device group. After generating, the .TAR file can be downloaded by clicking Download . The .TAR file must be extracted at preferred location to view configuration details and change list details including Device Name, Device Key and Time.
Monitor
helps administrator to monitor the managed devices for surfing trends, attacks and outages. Graph and Alert Profiles can be used to monitor single device or group of devices.
It normally required Administrator to log on to individual device to view system resources and information but with profiles, administrator can view that same information for all the devices from Sophos Central Firewall Manager itself.
Sophos Central Firewall Manager also provides email alerts for monitoring device in case Administrator cannot log on to Sophos Central Firewall Manager to monitor system resources. Alert informs when an important event occurs on an device, such as a hard disk getting too full. Dashboard Monitoring Graph displays critical heath information of the managed devices in graphical manner.
Device Monitor
Dashboard Monitoring Graph displays critical health information of the managed devices in graphical manner. CFM monitors the managed Device based on the following heath parameters and statuses.
Administrator can also set Dashboard Monitoring thresholds specific to Models, Devices or a graphical manner. CFM monitors the managed device based on the following heath parameters and statuses.
Administrator can also set Dashboard Monitoring thresholds specific to Models, Devices or a combination of both.
Device Monitor Settings
The administrator can set the threshold values for each of the monitoring parameter. For each parameter, the administrator can provide the threshold for 'Critical' and 'Warning' states.
You can set thresholds specific to Models, Devices or a combination of both. To set the threshold values for Model/
Device/Model-Device, click Adjust Threshold and select among Model or Device, then click the manage icon to specify custom threshold values.
To save the values, click Apply .
| System & Monitor | 38
However, if the administrator does not specify custom threshold values, the graphs are generated with Device
Defaults.
Device Monitor Details
Device Monitor details page provides detailed information on the selected device card. The following information will be displayed for the device card.
Basic Information
Device Name
Displays the name the device.
Note: Manage Device Policy option can be used to directly take you to the device dashboard of the selected device. You can change the device policy configurations based on your observation in the Device Card.
Model Number
Displays Device Model.
Device IP
Displays the IP Address of the managed device.
Host Name
Host Name as configured on the SF device.
Security
Level and Count (Last 2 hours) are displayed for the following Security parameters:
• Web Virus
• Mail Virus
• Spam Mails
• Web Usage health
• Intrusion Attacks
• ATP Events
• Endpoint Health (Includes Red Health and missing Heartbeat)
License
Level and Status Expiry are displayed for the following License parameters:
• Base Firewall
• Network Protection
• Web Protection
• Email Protection
• Web Server Protection
• Sandstorm
• Enhanced Support
• Enhanced Plus Support
• Registered Email ID
Note: Click Synchronize to synchronize your device licenses.
Resource
Level Percentage and (Last 2 hours) are displayed for the following Resource parameters:
• CPU
• Memory
• Disk (Report)
• Disk (Config)
| System & Monitor | 39
Availability
Level , Status and Duration are displayed for the following Availability parameters:
• Device Interface status
• Connection to Central Console
• Device Gateway status
• RED Status
Device Monitor
Device Monitor displays critical heath information of the Managed Devices in graphical manner. CFM monitors the
Managed Devices based on the following heath parameters and statuses:
• Security: Mail Virus, Web Virus, Spam Mails, Web Usage Health, Intrusion Attacks, ATP Events, and Endpoint
Health (Includes RED Health and missing Heartbeat).
• Resource: CPU, Memory, Disk (Report) and Disk (Config).
• License: Base Firewall, Network Protection, Web Protection, Email Protection, Sandstorm, WebServer Protection, and Support.
• Availability: Connection to Central Management, Interface status, Gateway Status and RED Status.
Note: Connection to Central Management parameter is not available for the auxiliary device deployed in
Active-Passive HA mode.
Device Monitor continuously monitors the Managed Devices for the wide range of security attacks, resource utilization and license statuses which helps the administrator to take informed decisions in resolving the risk landscape.
Flat view and card view allows you to monitor the status (Critical, Warning, Normal) of Managed Devices across a set of parameters for Security, Resource, License and Availability, based on their threshold values. In flat view, devices that need attention are automatically listed at the top on the basis of their monitor status.
You have the flexibility to customize threshold values for Critical, Warning and Normal levels as per your needs, using Device Monitor Settings.
Open in Full Screen allows you to display Device Monitor in full screen view.
Note: Open in Full Screen is available only if accessed from System Management > Monitor > Device Monitor.
Graphs
Graphs menu allows you to do the following:
•
•
Profile
Profiles are used to generate graphs based on specific parameters. Administrator can add multiple profiles.
Administrator can add profile for group of devices or single device. Tab for each profile is added on Graphs page.
Profile consists of following component:
Device : Select the devices to be included in the graph.
Category : Select from the list of categories to be included in graph.
• CPU Usage (%)
• Memory Usage (%)
• Disk Usage (%)
• Total Virus Attacks (Hits)
• Web Virus Attacks (Hits)
• Mail Virus Attacks (Hits)
| System & Monitor | 40
Title
• IPS Threats (Hits)
• Spam Mails (Hits)
• User Surfing Pattern (Hits)
Administrator can customize number of components for each profile.
To add or edit profile, go to System Management > Monitoring > Graphs > Profile and click Add or Edit Icon to modify profile details.
Profile Parameters
Specify name of the profile.
Devices
Select device(s) whose details are to be displayed on the profile. If the device(s) is/are deployed in
HA (High Availability) mode then it displays Primary device.
Category
Select the components to be displayed on the profile for the device(s) selected in the above field.
Available options:
• CPU Usage (%)
• Memory Usage (%)
• Disk Usage (%)
• Total Virus Attacks (Hits)
• Web Virus Attacks (Hits)
• Mail Virus Attacks (Hits)
• IPS Threats (Hits)
• Spam Mails (Hits)
• User Surfing Pattern (Hits)
If the devices are deployed in HA (High Availability) mode, the graphs for the following categories will display information for both the devices separately.
• CPU Usage (%)
• Memory Usage (%)
• Disk Usage (%)
Add Profile
Profiles are used to generate graphs based on specific parameters. Administrator can add multiple profiles.
Administrator can add profile for group of devices or single device. Tab for each profile is added on Graphs page.
Profile consists of following component:
Device : Select the devices to be included in the graph.
Category : Select from the list of categories to be included in graph.
• CPU Usage (%)
• Memory Usage (%)
• Disk Usage (%)
• Total Virus Attacks (Hits)
• Web Virus Attacks (Hits)
• Mail Virus Attacks (Hits)
• IPS Threats (Hits)
• Spam Mails (Hits)
• User Surfing Pattern (Hits)
Administrator can customize number of components for each profile.
| System & Monitor | 41
Figure 23: Add Profile
Graphs
To view graphs based on profiles, go to System Management > Monitoring > Graphs > Graphs .
If multiple profiles are added, Tab for each profile is displayed.
Depending on the components selected at the time of adding profile, profile displays line graphs for the usage status of the CPU, memory and hard disk, user surfing patter grouped into Neutral, Productive, Non Working and Unhealthy categories, virus, HTTP and mail attacks, IPS threats and spam mails.
If multiple devices are grouped under single profile, line graph of each device is plotted in each component.
Alerts
Sophos Central Firewall Manager allows administrator to create and send email alerts to the specified email address(es) based on predefined criteria. Sophos Central Firewall Manager alert notification ensures the concerned person receive an alert in situations like excess CPU, disk and memory usage or alarming count of viruses or IPS attacks.
Profile
CFM alert profile is a combination of Device(s), email address(s), and criteria to send alert notifications.
DefaultAlertProfile is a pre-configured alert profile. It can be modified but can’t be deleted.
Profile page can be used to view, add or edit alert profiles. Alert Status can be disabled or enabled from Status.
Add Alert Profile
Use this page to add or edit Profile parameters.
1.
Go to System Management > Monitor > Alerts > Profile > and click Add to add a new Alert Profile.
2.
Specify the parameters based on description shown below.
| System & Monitor | 42
Profile Name
Specify a name to identify the Profile.
Send Email(s) alert to
Specify comma separated recipient email address(s) to send alert notification through email.
You need to configure email server from System Management > Account Settings > System >
Notification > to send email alerts on specified email address(s).
Even if a mail server is not configured, the created alert will be displayed under Alerts tab.
Device(s)
Select the device(s) or device group(s).
Type
You can specify a consolidated email for alerts of all devices managed by Sophos Firewall Manager or a separate email per alert per device.
Note: The email subject displays the firewall name and serial number, the SFM serial number, and the specified profile name of the alert.
Alerts Criteria
Configure alert criteria. Select checkbox against criterion to be configured and specify value for the criterion.
Available criteria:
• Any subscription module expires within
• CPU usage exceeds
• Memory usage exceeds
• Disk usage exceeds
• Total Intrusion attack count exceeds
• Critical Intrusion attack count exceeds
• Web virus count exceeds
• Mail Virus count exceeds
• Total virus count exceeds
• Spam Mail count exceeds
• Objectionable + Unproductive surfing hits
• ATP events exceed
• End-points with Security Heartbeat in Red state exceeds
• End-points Security Heartbeat changed to Red state exceeds
• End-points with missing Security Heartbeat exceeds
• Device disconnected from central management
• Device Gateway status change
• VPN connection status change
• HA status change
• RED tunnel status change
• Hostname Change
Specify the duration of sending notifications in Notify me field. The duration can be in hours or minutes.
Description
Specify description of the alert profile.
| System & Monitor | 43
Figure 24: Add Alert Profile
3.
Click Save .
Alerts
Sophos Central Firewall Manager allows you to view the list of generated alerts based on configured alert profiles.
You can view these alerts from System Management > Monitor > Alerts > Alerts .
Event Viewer
Audit and System logs are an important part of any secure system that provides a comprehensive view into the current and past state of almost any type of complex system, and they need to be carefully designed in order to give a faithful representation of system activity.
They can identify what action was taken by whom and when. The existence of such logs can be used to enforce correct user behavior, by holding users accountable for their actions as recorded in the audit log. They are the simplest, yet also one of the most effective forms of tracking temporal information. The idea is that any time something significant happens you write some record indicating what happened and when it happened.
Device Logs
Device Logs page allows to view the logs for modules like Application Filter, Web Filter, Malware and Firewall. This page gives consolidated information about all the events that have occurred.
To view logs of any of the managed Device, go to System & Monitor > Monitor > Event Viewer > Device Logs > and select module and Device and click Get Data .
Click Open PCAP to view packet capture. It will display the packet captures that are automatically filtered based on the values of the currently selected packet.
Click Download to export the logs in a CSV file. Hover over module icons for a detailed view.
Available Log Modules :
• System – System logs provide information about all the system-related logs, including the logs for VPN events.
• Web Filter – Web filter logs provide web surfing details like accessed/blocked sites, users trying to access the blocked websites etc. and the action taken by the device (Allowed or Blocked).
• Application Filter – Application filter logs provide details about applications to which access was denied by the device.
• Malware – Malware logs provide information about the viruses identified by the device.
• Email – Email logs provide information about the mail traffic processed by the device.
| System & Monitor | 44
• Firewall – Firewall logs provide information about how much traffic passes through a particular firewall rule and through which interfaces.
• IPS – IPS logs provide information about the intrusion attempts detected/blocked by the device.
• Authentication – Authentication logs provide information about all the authentication logs including firewall,
VPN and User Portal authentication.
• Admin – Admin logs provide information about administrator event and tasks.
• WAF – WAF logs provide information about HTTP/S requests and action taken on the same.
• Advanced Threat Protection - ATP logs provide information related to threats detected/blocked by the device.
• Security Heartbeat - Security Heartbeat logs provide information on Heartbeat connection and status.
Management System Events
Event Viewer page allows to view the events for various modules – Policy Configuration, System, System Events.
This page gives consolidated information about all the events that occurred for the respective modules and information can be filtered based on Event ID, Username or IP address.
To view CFM events, go to System > Monitoring > Event Viewer > Management System Events > , select date and any of the following modules:
• Policy Configuration Events – Provides information of the administrative events and task occurred at global and device level.
• System Events – Provides information of the administrative events and task occurred at Sophos Central Firewall
Manager.
• System Events– Provides information of the system events and tasks occurred at Sophos Central Firewall
Manager.
Account Settings
Account Settings allows configuration and administration of CFM Device for secure and remote management. It also provides the basic Account Settings of the Web Admin console. Configuration of several non-network features, such as Service Network, Portal Communication, Device Inventory and Time Zone Settings can also be done through
Account Settings.
•
on page 44
•
•
Accounts
Accounts section allows you to view list of companies (Distributors/Partners/Resellers) and manage their respective devices which are part of CFM service network. It also allows configuration and synchronization of Partner Portal with CFM.
•
•
on page 45
•
on page 45
Synchronize
This page allows you to synchronize updated information on Partner Portal with CFM.
The Partner can synchronize CFM with available updated information on Partner Portal and can override all current configurations by synchronizing all the devices available on Partner Portal.
Go to System Management > Account Settings > Accounts > Synchronize click Synchronize to synchronize
CFM with Partner Portal.
| System & Monitor | 45
Device Inventory
This page displays the list of devices which are available for management through CFM.
Use Device Inventory page to view and manage Sophos XG Firewall devices to CFM.
To view and manage devices navigate to System Management > Account Settings > Accounts > Device Inventory .
Serial Number
Serial Number of the managed device.
Company Name
Name of the company which owns the device.
Contact Person
Name of the contact person from the company.
Contact Number
Contact number of the contact person.
Add Device
Use this page to add devices to CFM.
1.
Go to System Management > Account Settings > Accounts > Device Inventory .
2.
Click on to add a new device.
3.
Add device Details: a) Device Name: Specify Device name to uniquely identify the device.
b) Serial Number: Displays Serial Number of the device.
c) Admin Username Specify Administrator Username of the device.
d) Password and Confirm Password Password for the above mentioned Administrator Username of the device.
e) Communication Mode Specify communication mode to manage Firewall device from CFM.
f) Central Management will push updates to this Device: Select if the managed Sophos XG Firewall device is directly accessible from CFM , i.e. there is no intermediate NAT box. Specify access protocol and port number to communicate with managed Firewall device.
g) This Device will fetch updates from Central Management: Select if the managed Firewall device is behind
NAT box.
h) Template: Select configuration template which has to be applied on the device.
i) Access Protocol: Specify Protocol that is to be used to access the device for pushing configuration and synchronizing that is. Protocol used to communicate with the device.
j) Access Port: Specify Port through which device and CFM should communicate.
k) Access to User: Specify CFM Administrator who can manage the Device.
l) Description: Specify description for the device.
m) Administrator Information: Click hyperlink to add additional information of CFM Administrator.
n) Administrator Name: Specify name of the Administrator.
o) Contact Number Specify contact number of the Administrator.
p) Email ID Specify email ID of the Administrator.
q) Customer Information Click hyperlink to view information of the customer.
r) Company Name of the company.
s) Contact Person Name of the contact person.
t) Contact Number Displays contact number of the contact person.
u) Test Connection Click to test the connectivity between CFM and the managed device.
4.
Click Save .
Settings
Use this page to update Time Zone Settings and Sophos Adaptive Learning settings for CFM.
Time Zone Settings : Select relevant time zone for CFM.
| System & Monitor | 46
Apply : Select to apply changes.
Sophos Adaptive Learning
The product sends information periodically to Sophos which is used for the purpose of improving stability, prioritizing feature refinements, and protection effectiveness. It includes configuration and usage information, and
Application usage and threat data.
Configuration and usage data such as Device information (hardware version, vendor), Firmware version and license information (not the owner), Features in use (status, on / off, count, HA status, Central Management status), amount of configured objects (count of hosts, policies), Product errors, CPU, memory and disk usage (in percentage), is collected by default.
No user-specific information or personalized information is collected. The information is transmitted to Sophos over
HTTPS.
Send Monitoring Threshold data
Following Application usage and Threat data is gathered:
• Unclassified applications to improve and enlarge the network visibility and application control library.
• Data for IPS alerts, virus detected (also URL for which virus found), spam, ATP threats such as threat name, threat URL/IP, source IP, and applications used.
Default - Enable
Administration
Administration covers general configuration of Sophos Central Firewall Manager including adding administrators.
You can configure administrative access settings including login parameters and port settings. You can also create new users and view all active users. Using Access Profile, you can enable role-based administration capabilities to offer greater granular access control and flexibility.
Access Profile
Use the Access Profile page to create profiles for Administrators. Role-based administration capabilities are provided to offer greater granular access control and flexibility. Profile sets up access levels for the administrative users. Profile determines the privileges of the administrator and the administrator’s access to managed Sophos XG Firewall Device and CFM features.
Access profile page is divided into access control categories for which you can enable None, Read-only, or Read-
Write access. For ease of use by default, CFM Device is shipped with profile “Administrator” with full privileges and
“Device Administrator” with privileges over specific Devices.
To manage default and custom profiles, go to System Management > Account Settings > Administration >
Access Profile > .
Note:
• You cannot delete the default profiles.
• You cannot delete profile assigned to any user.
You can view added profiles,
add new profiles or edit or delete existing profiles.
Add Access Profile
Use this page to add an Access Profile.
1.
Go to System Management > Account Settings > Administration > Access profile > and click Add .
2.
Enter Profile details.
Profile Name
Name to identify the profile. By default Sophos Central Firewall Manager is shipped with two profiles.
| System & Monitor | 47
• Administrator – super administrator with full privileges device
• device Administrator – read-write privileges for selected device(s)
Configuration
Click on the access level you want to provide to a profile. There are three levels of access each of the created profile can have.
Available Options:
None: No access to any page Read-Only: View the pages Read-Write: Modify the details
Access levels can be set for individual menus as well. You can either set a common access level for all the menus or individually select the access level for each of the menu.
Click icon against a menu to view the items under that menu.
For example, if you set access level as Read-Only against the Web Filter, the profile user would only be able to view the Web Filter menu but would not be able to make any modifications.
To make modifications, Read-Write option is to be used.
| System & Monitor | 48
Figure 25: Add Profile
3.
Click Save .
Users
Use the Users page to view users. It allows configuring administrator access to the Sophos XG Firewall device, including the level of access and which devices administrator have access to. All administrator settings can be configured only when you are logged in as the admin administrator. The admin administrator is the only user with complete access to the entire Sophos Central Firewall Manager device options.
| System & Monitor | 49
To manage users, go to System Management > Account Settings > Administration > Users > .
You can view added users,
add new users or edit or delete existing users.
Add User
1.
Go to System Management > Account Settings > Administration > Users > and click Add to register a new user.
2.
Specify user deatils based on the description shown below.
Username
Specify username, which uniquely identifies user and will be used for login.
Authentication Type
Select type of authentication for the user:
• Local
• External – LDAP, Radius, TACACS+
Refer Authentication Server page for details.
Status
Select the status of the user.
Available Options :
• Active
• Inactive
Password/Confirm Password
Specify Password for the user.
Email ID
Specify Email address of the user.
Access Profile
Select the Profile.
Administrator will get access of various Web Admin console menus as per the configured profile.
You can create a new profile directly from this page itself and attach to the user.
Accessible Device
Select the device to be assigned to the user.
Device Group
Select the Device Group for the user. The user will be able to manage all devices in the group, in addition to the individual devices selected earlier.
Note: Only Super Administrator of Sophos Central Firewall Manager will be able to assign or update device groups.
| System & Monitor | 50
Figure 26: Add User
3.
Click Save .
Live Users
Live Users page displays list of currently logged on users and their important parameters. Use Live User page to manage live users of Sophos Central Firewall Manager.
To manage live users, go to System Management > Account Settings > Administration > Live Users > .
Diagnostics
Diagnostic page allows checking the health of your Sophos Central Firewall Manager device in a single shot.
Information can be used for troubleshooting and diagnosing problems found in your Sophos Central Firewall
Manager device.
It is like a periodic health checkup that helps to identify the impending device related problems. After identifying the problem, appropriate actions can be taken to solve the problems and keep the device running smoothly and efficiently.
This section covers the following topics:
•
Tools - Provides diagnostic tools to test and troubleshoot network issues.
• Troubleshoot Report - Use to generate Consolidated Troubleshooting Report.
• System Graph - View CPU and Memory usage of Sophos Central Firewall Manager device of last two hours.
Tools
This page provides diagnostic tools to test and troubleshoot network issues such as packet loss, connectivity errors or discrepancies in the Sophos Central Firewall Manager network.
| System & Monitor | 51
Go to System Management > Account Settings > Diagnostics > Tools to view the various statistics.
• Ping
• Trace route
• Name lookup
• Route lookup
Ping
Ping is a most common network administration utility used to test the reachability of a host on an Internet Protocol
(IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer.
Ping sends ICMP echo request/replies to test connectivity to other hosts. Use standard ICMP ping to confirm that the server is responding. Ping confirms that the server can respond to an ICMP ping request.
Use Ping diagnostically to:
• Ensure that a host computer you are trying to reach is actually operating or address is reachable or not
• Check how long it takes to get a response back
• Get the IP address from the domain name
• Check for the packet loss
IP Address/Host Name
IP Address or fully qualified domain name to be pinged.
It determines network connection between Sophos Central Firewall Manager and host on the network. The output shows if the response was received, packets transmitted and received, packet loss if any and the round-trip time. If a host is not responding, ping displays 100% packet loss.
Interface
Interface through which the ICMP echo requests are to be sent.
Size
Ping packet size
Range - 1 to 65507
Trace Route
Trace Route is a useful tool to determine if a packet or communications stream is being stopped at the Sophos Central
Firewall Manager, or is lost on the Internet by tracing the path taken by a packet from the source system to the destination system, over the Internet.
Use traceroute to:
• find any discrepancies in the Sophos Central Firewall Manager network or the ISP network within milliseconds
• trace the path taken by a packet from the source system to the destination system, over the Internet
IP Address/Host Name
IP Address or fully qualified domain name.
It determines network connection between Sophos Central Firewall Manager and host on the network. The output shows all the routers through which data packets pass on way to the destination system from the source system, maximum hops and Total time taken by the packet to return measured in milliseconds.
Interface
Interface through which the requests are to be sent.
Name Lookup
Name lookup is used to query the Domain Name Service for information about domain names and IP addresses. It sends a domain name query packet to a configured domain name system (DNS) server. If you enter a domain name, you get back the IP address to which it corresponds, and if you enter an IP address, then you get back the domain
| Copyright Notice | 52 name to which it corresponds. In other words, it reaches out over the Internet to do a DNS lookup from an authorized name server, and displays the information in the user understandable format.
IP Address/Host Name
IP address or fully qualified domain name that needs to be resolved.
DNS Server IP
DNS server to which the query is to be sent.
Route Lookup
If you have routable networks and wish to search through which interface Sophos Central Firewall Manager routes the traffic then lookup the route for the IP address.
IP Address
IP address that needs to be resolved.
Copyright Notice
Copyright 2016-2018 Sophos Limited. All rights reserved.
Sophos is a registered trademark of Sophos Limited and Sophos Group. All other product and company names mentioned are trademarks or registered trademarks of their respective owners.
No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise unless you are either a valid licensee where the documentation can be reproduced in accordance with the license terms or you otherwise have the prior permission in writing of the copyright owner.
advertisement
Related manuals
advertisement
Table of contents
- 2 Contents
- 3 Introduction
- 4 Using Admin Console
- 5 Supported Browsers
- 5 Navigating through the Admin Console
- 6 Menus
- 6 Tool Tips
- 7 Notification pop-ups
- 7 Common Operations
- 7 Set Schedule
- 8 Synchronize
- 8 Entity Usage Reference
- 8 Editing an Entity
- 8 Deleting an Entity
- 9 Sorting Lists
- 9 Filtering Lists
- 9 Configuring Column Settings
- 9 Reordering Lists
- 9 Summary
- 9 Templates
- 10 System & Monitor
- 10 Device Settings
- 10 Managed Devices
- 10 Devices
- 11 Add Device
- 13 Add Device Wizard
- 16 Export Device List
- 17 Export Device IP Change Report
- 17 All Managed Devices
- 17 Device Discovery
- 17 Device Groups
- 18 Add Device Groups
- 18 Templates
- 19 Template Dashboard
- 23 Add Template
- 23 Provision Template
- 24 Maintenance
- 24 Backup & Restore
- 26 Inactive User Maintenance
- 26 Firmware
- 27 Scheduled Task
- 27 Dynamic Objects
- 27 Host
- 28 Add Dynamic Host
- 29 Zone
- 29 Add Dynamic Zone
- 30 Interface
- 30 Add Dynamic Interface
- 31 Gateway
- 31 Gateway Parameters
- 32 Change Control
- 32 Change Control
- 37 Export Configuration
- 37 Monitor
- 37 Device Monitor
- 37 Device Monitor Settings
- 38 Device Monitor Details
- 39 Device Monitor
- 39 Graphs
- 39 Profile
- 40 Add Profile
- 41 Graphs
- 41 Alerts
- 41 Profile
- 41 Add Alert Profile
- 43 Alerts
- 43 Event Viewer
- 43 Device Logs
- 44 Management System Events
- 44 Account Settings
- 44 Accounts
- 44 Synchronize
- 45 Device Inventory
- 45 Add Device
- 45 Settings
- 46 Administration
- 46 Access Profile
- 46 Add Access Profile
- 48 Users
- 49 Add User
- 50 Live Users
- 50 Diagnostics
- 50 Tools
- 52 Copyright Notice