"Complete IT solutions, Unquestionable Trust"

Blog

What are the differences between the Sophos XG (SF-OS) and SG (UTM) firewalls?

March 1st, 2016 (1 Comment)

With the release of the new Sophos XG Series firewalls there has been some confusion as to what the differences are between the XG and SG systems. The XG and SG firewalls have the same hardware but run different OS's. This information below was taken straight from a Sophos document and covers the key areas of difference between the Sophos XG Series (which run SF-OS Sophos Firewall OS) and the SG Series (which runs UTM OS).

SF-OS vs UTM Features

Major Innovations in Sophos Firewall OS (SF-OS)

- Redesigned user interface with interactive control center and enhanced navigation
- New unified policy model with policy types (user, business application, and network) all managed from a single screen
- Policy Templates for common business applications like Microsoft Exchange or SharePoint that are defined in XML making      them easy to customize and share.
- Policy natural language descriptions
- Configure IPS, Web, App, and Traffic Shaping (QoS) settings for policies all from a single screen
- Layer-8 user identity policies
- Sophos Security Heartbeat connecting Sophos endpoints with the Firewall for telemetry and enhanced ATP protection to identify host, user, and process
- Policy support for Sophos Security Heartbeat to automatically take action in the event the health of an endpoint changes
- User Threat Quotient for identifying risky users
- Fully transparent user-based web filtering without the need for any proxy settings
- FastPath packet optimization (200% performance boost)

Top requested UTM features in SF-OS (that are not in UTM 9)

- User-based firewall polices
- Zone-based firewall policies
- Custom IPS and QoS settings per user or network policy
- Firmware roll-back option
- Improved reporting (50% more reports)
- Improved user authentication tools and deeper user identity integration into all firewall areas
- Packet capture in UI with complete visibility to the packet level
- IMAP Proxy for filtering email
- Configuration API for all features for RMM/PSA integration
- Discover Mode (TAP mode) for seamless integration for trials and PoCs (command-line only initially)

UTM 9.x Features NOT yet in SF-OS

- Customizable dashboard
- Automated backup and restore (manual only)
- One-time password (OTP) / Two-factor authentication
- Zero-config active/passive high- availability (manual setup)
- Multiple node clusters (only 2 node clusters are supported)
- VoIP handling for SIP and H.323 connections
- Advanced spam detection techniques: RBL, heuristics, SPF checking, BATV, URL scanning, grey listing, RDNS/ HELO checks, expression filter and recipient verification
- Email Encryption: S/MIME, OpenPGP, TLS standards and PGP key server support
- Amazon VPC-based site-to-site tunnels
- Site-to-Site (Firewall to Firewall) RED Tunnels (use SSL/IPSEC instead)
- IPsec Tunnel Binding
- Endpoint Management and SEC Integration
- Sophos Mobile Control Integration
- Uploading of custom WAF rules
- CSV exporting of reports (Excel format supported)
- Nightly compression and rotation of logs
- Log file archiving: On-box, FTP, SMB, SSH, Email and Syslog

UTM 9.x Web Protection & Policy Features (changes in SF-OS are noted in BOLD)

Web Protection

- URL Filter database with 35 million+ sites in 96 categories and 65+ languages – new site database backed by SophosLabs
- Application Control: Accurate signatures and Layer 7 patterns for thousands ofapplications - using Cyberoam engine
- Dynamic application control based on productivity or risk threshold - no productivity option
- View traffic in real-time, choose to block or shape - no real-time traffic shaping
- Malware scanning: HTTP/S, FTP and web-based email via dual independent antivirus engines (Sophos & Avira) block all forms of viruses, web malware, trojans and spyware
- Fully transparent HTTPS filtering of URLs
- Option for selective HTTPS Scanning of untrusted sites
- Advanced web malware protection with JavaScript emulation
- Live Protection real-time in-the-cloud lookups for the latest threat intelligence
- Potentially unwanted application (PUA) download blocking - not available
- Malicious URL reputation filtering backed by SophosLabs
- Reputation threshold: set the reputation threshold a website requires to be accessible from internal network - not available
- Active content filter: File extension, MIME type, JavaScript, ActiveX, Java and Flash - file and MIME type controls but no automatic stripping of ActiveX and Flash
- True-File-Type detection/scan within archive files
- YouTube for Schools enforcement
- SafeSearch enforcement
- Google Apps enforcement - not available

Web Policy

- Authentication: Active Directory, eDirectory, LDAP, RADIUS, TACACS+ and local database - no TACACS+
- Single sign-on: Active Directory, eDirectory, Apple Open Directory - no Apple Open Directory
- Proxy Modes: Standard, (Fully) Transparent, Authenticated, Single sign-on and Transparent with AD SSO*
- Transparent captive portal with authentication
- Support for separate filtering proxies in different modes
- Time, user and group-based access policies
- Browsing quota time policies and quota reset option - global quota, not per category
- Allow temporary URL filter overrides with authentication - not available
- Client Authentication Agent for dedicated per-user tracking - block pages only
- Cloning of security profiles
- Customizable user-messages for events in local languages
- Custom HTTPS verification CA support
- Setup wizard and context sensitive online help
- Customizable block pages
- Custom categorization to override categories or create custom categories
- Site tagging for creating custom site categories - not available
- Authentication and filtering options by device type for iOS, Android, Mac, Windows and others - not available
- Policy testing tool for URLs, times, users and other parameters - not available

UTM 9.x Features Available in SF-OS

General Management

- Role-based administration
- Configurable update service
- Reusable system object definitions for networks, services, hosts, time periods, users and groups, clients and servers
- Self-service user portal for one-click VPN setup
- Configuration change tracking
- Email or SNMP trap notification options
- SNMP support

Network Routing and Services

- Routing: static, multicast (PIM-SM) and dynamic (BGP, OSPF)
- Protocol independent multicast routing with IGMP snooping
- Bridging with STP support and ARP broadcast forwarding
- WAN link balancing: multiple Internet connections, auto-link health check, automatic failover, automatic and weighted balancing and granular multipath rules
- 802.3ad interface link aggregation
- QoS with full control over bandwidth pools and download throttling using Stochastic Fairness Queuing and Random Early Detection on inbound traffic
- Full configuration of DNS, DHCP and NTP
- Server load balancing
- IPv6 support
- RED support
- VLAN DHCP support and tagging
- Multiple bridge support

Network Protection

- Stateful deep packet inspection firewall
- Intrusion protection: Deep packet inspection engine, 18,000+ patterns
- Selective IPS patterns for maximum performance and protection
- IPS pattern aging algorithm for optimal performance*
- Flood protection: DoS, DDoS and portscan blocking
- Country blocking by region or individual country (over 360 countries) with separate inbound/outbound settings and exceptions
- Site-to-site VPN: SSL, IPSec, 256- bit AES/3DES, PFS, RSA, X.509 certificates, pre-shared key
- Remote access: SSL, IPsec, iPhone/iPad/Cisco VPN client support
- Connection tracking helpers: FTP, IRC, PPTP, TFTP
- Identity-based rules and configuration with Authentication Agent for users

Advanced Threat Protection

- Detect and block network traffic attempting to contact command and control servers using DNS, AFC, HTTP Proxy and firewall
- Identify infected hosts on the network and contain their network activity
- Selective sandboxing of suspicious code to determine malicious intent

Authentication

- Transparent, proxy authentication (NTLM/Kerberos) or client authentication
- Authentication via: Active Directory, eDirectory, RADIUS, LDAP and TACACS+
- Single sign-on: Active directory, eDirectory
- SSL support
- Tools: server settings check, username/password testing and authentication cache flush
- Graphical browser for users and groups
- Automatic user creation
- Scheduled backend synchronization prefect
- Complex password enforcement

Email Protection

- Reputation service with spam outbreak monitoring based on patented Recurrent-Pattern-Detection technology
- Block spam and malware during the SMTP transaction
- Detects phishing URLs within e-mails
- Global & per-user domain and address black/white lists
- Recipient Verification against Active Directory account
- E-mail scanning with SMTP and POP3 support
- Dual antivirus engines (Sophos & Avira)
- True-File-Type detection/scan within archive files
- Scan embedded mail formats: Block malicious and unwanted files with MIME type checking
- Quarantine unscannable or over-sized messages
- Filter mail for unlimited domains and mailboxes
- Automatic signature and pattern updates
- Sophos Live Anti-Virus real-time cloud lookups

Email Encryption and DLP

- Patent-pending SPX encryption for one way message encryption
- Recipient self-registration SPX password management
- Add attachments to SPX secure replies
- Transparent en-/decryption and digital signing for SMTP e-mails
- Completely transparent, no additional software or client required
- Allows content/virus scanning even for encrypted e-mails
- Central management of all keys and certificates
- No key or certificate distribution required
- DLP engine with automatic scanning of emails and attachments for sensitive data
- Pre-packaged sensitive data type content control lists (CCLs) for PII, PCI, HIPAA, and more, maintained by SophosLabs

Email Management

- User-quarantine reports mailed out daily at customizable times
- Log Management service support
- Customizable User Portal for end-user mail management, in 15 languages
- Anonymization of reporting data to enforce privacy policy
- Over 50 Integrated reports
- PDF and CSV exporting of reports
- Customizable email footers and disclaimers
- Setup wizard and context sensitive online help
- Email header manipulation support

End-User Portal

- SMTP quarantine: view and release messages held in quarantine
- Sender blacklist/whitelist
- Hotspot access information
- Download the Sophos Authentication Agent (SAA)
- Download remote access client software and configuration files
- HTML5 VPN portal for opening clientless VPN connections to predefined hosts using predefined services
- Download HTTPS Proxy CA certificates

VPN Options

- PPTP, L2TP, SSL, IPsec, HTML5-based and Cisco client based remote user VPNs, as well as IPsec, SSL, and Sophos Remote Ethernet Device (RED) plug-and-play VPN

VPN IPsec Client

- Authentication: Pre-Shared Key (PSK), PKI (X.509), Smartcards, Token and XAUTH
- Encryption: AES (128/192/256), DES, 3DES (112/168), Blowfish, RSA (up to 2048 Bit), DH groups 1/2/5/14, MD5 and SHA-256/384/512
- Intelligent split-tunneling for optimum traffic routing
- NAT-traversal support
- Client-monitor for graphical overview of connection status
- Multilingual: German, English and French

VPN SSL Client

- Proven SSL-(TLS)-based security
- Minimal system requirements
- Profile support for varying levels of access
- Supports MD5, SHA, DES, 3DES and AES
- Works through all firewalls, regardless of proxies and NAT
- Support for iOS and Android

Clientless VPN

- True clientless HTML5 VPN portal for accessing applications securely from a browser on any device

VPN One-Click

- Easy setup and installations of every client within minutes
- Download of client-software, individual configuration files, keys and certificates one click away from the Security Gateway end-user portal
- Automatic installation and configuration of the client
- No configuration required by end user

VPN RED

- Central Management of all RED appliances
- No configuration: Automatically connects through a cloud-based provisioning service
- Secure encrypted tunnel using digital X.509 certificates and AES256- encryption
- RED sites are fully protected by the Network, Web and Mail security subscriptions of the Firewall
- Virtual Ethernet for reliable transfer of all traffic between locations
- IP address management with centrally defined DHCP and DNS Server configuration
- Remotely de-authorize RED devices after a select period of inactivity
- Compression of tunnel traffic (RED 50, RED 10 revision 2, 3)
- VLAN port configuration options (RED 50)

Secure Wi-Fi

- Simple plug-and-play deployment, automatically appearing in the Firewall
- Central monitor and manage all access points (APs) and wireless clients through the built-in wireless controller
- Integrated security: All Wi-Fi traffic is automatically routed through the Firewall
- Wireless 802.11 b/g/n at 2.4 GHz and 5GHz (AP 50)
- Power-over-Ethernet 802.3af (AP 30/50)
- Multiple SSID support: Up to 8
- Strong encryption supports state-of-the-art wireless authentication including WPA2-Enterprise and IEEE 802.1X (RADIUS authentication)
- Wireless guest Internet access with customizable splash pages on your captive portal
- Voucher-based guest access for daily or weekly access
- Time-based wireless network access
- Wireless repeating and bridging meshed network mode with AP 50
- Hotspot backend authentication support (RADIUS, TACACS, LDAP, AD)
- Automatic channel selection background optimization
- Multi-tenant hotspot administration
- Support for HTTPS login support

Web Application Firewall Protection

- Reverse proxy
- URL hardening engine with deep-linking and directory traversal prevention
- Form hardening engine
- SQL injection protection
- Cross-site scripting protection
- Dual-antivirus engines (Sophos & Avira)
- HTTPS (SSL) encryption offloading
- Cookie signing with digital signatures
- Path-based routing
- Outlook anywhere protocol support
- Reverse authentication (offloading) for form-based and basic authentication for server access

Web Application Firewall Management

- Virtual server and physical server abstraction
- Integrated load balancer spreads visitors across multiple servers
- Skip individual checks in a granular fashion as required
- Match requests from source networks or specified target URLs
- Support for logical and/or operators
- Assists compatibility with various configurations and non-standard deployments
- Options to change WAF performance parameters
- Scan size limit option
- Allow/Block IP ranges
- Wildcard support for server paths
- Automatically append a prefix/suffix for authentication

Logging and Reporting

- Logging: Remote syslog
- On-box reporting: Packet filter, intrusion protection, bandwidth and day/week/month/year scales
- Identity-based reporting
- PDF report exporting
- Executive report scheduling and archiving
- Reactive reporting engine crafts reports as you click on data
- Save, instantly email or subscribe recipients to any reports
- Hundreds of on-box reports
- Daily activity reporting
- URL filter override report
- Per-user tracking and auditing
- Anonymization of reporting data to enforce privacy policy
- Full transaction log of all activity in human-readable format
- Web log searching parameters per user, URL or action
- Sophos iView dedicated reporting appliance

Reader Comments (1)

Peter Holland said on August 17, 2016

it would be also vital to note that the authentication services, especially for web application proxy, are configured on a users to groups relationship of many to one, so a user can only be a member of one AD group within XG. XG also has no back end sync capability, so if a user changes group membership, they must be purged from XG for this to be picked up, a fully manual process

Leave a comment:

"The guys have been lifesavers, they answer when I phone, they respond quickly when a crisis develops and they talk to me in layman’s terms."

Nancy Buchko - Barrister & Solicitor

"After you guys set up our server and workstations everything just works. We hardly ever get to see you guys"

Tyler Wilson - Performance Compression and Sealing