Tcpdump Sophos



I analyze a tcpdump from a Sophos SG Firewall cluster, because we have Problems to send and receive Fax. Most of them cuttet. We only get or send a half Pages. In the dump file I see every Packet twice. Maybe its a mysterious of the Firewall Cluster? Has anyone seen this before? Sophos XG’s packet capture feature is a very useful tool when it comes troubleshooting connectivity issues. It provides a deeper level of information compared to looking at firewall log files. To be able to do basic troubleshooting on RED devices it would be fine to include CLI access and some basic commands like: tcpdump traceroute ping telnet (for Port checks). This would be fine, if something fails between remote location and central device. It would be nice to be able to prove functionality for other involved parties. Follow the steps below to create a packet capture on the Sophos XG Firewall and download it via the PSCP utility or from a web browser. Capture and download via the PSCP utility Starting a packet capture. Sign in to the CLI of the Sophos XG Firewall using PuTTY. Enter the following command: tcpdump filedump 'host.

Firewall software[edit]

FirewallLicenseCost and usage limitsOS
Avast Internet SecurityProprietaryPaidMicrosoft Windows
Comodo Internet
Security
ProprietaryFreeWindows 10/8.1/8/7/Vista x86/x64, XP x86
Intego VirusBarrierProprietaryPaidMac OS X10.5 or later; on an Xserve
Kaspersky
Internet Security
ProprietaryPaid / 30 day trialWindows unknown versions x86/x64
Lavasoft
Personal Firewall
ProprietaryPaidWindows unknown versions x86/x64
Microsoft
Forefront Threat
Management
Gateway
ProprietaryDiscontinuedWindows unknown versions x64
NetLimiterProprietaryPaidWindows 10, 8, 7 x64
Norton 360ProprietaryPaidWindows unknown versions x86/x64
Online Armor
Personal Firewall
ProprietaryDiscontinuedWindows unknown versions x86/x64
Outpost
Firewall Pro
ProprietaryDiscontinuedWindows 10, 8, 7, Vista, XP x86/x64
PC Tools
Firewall Plus
ProprietaryDiscontinuedWindows unknown versions x86/x64
Sygate
Personal Firewall
ProprietaryDiscontinuedWindows unknown versions x86
Windows FirewallProprietaryIncluded with Windows
XP SP2 and later
Windows versions x86/x64
ZoneAlarmProprietaryFree / PaidWindows 10/8.1/8/7/Vista x86/x64, XP x86
Netfilter/iptablesGPLFreeLinux kernel module
nftablesGPLFreeLinux kernel (>=3.13) module
ShorewallGPLFreeLinux-based appliance
PeerBlockGPLFreeWindows 8/8.1, 7, Vista x86/x64
NPFBSDFreeNetBSD kernel module
PFBSDFree*BSD kernel module
ipfirewallBSDFree*BSD package
IPFilterGPLv2FreePackage for multiple UNIX-like operating systems

Firewall appliances[edit]

FirewallLicenseCostOS
ClavisterProprietaryIncluded on all Clavister
NGFWs
Proprietary operating system cOS Core
Check PointProprietaryIncluded on Check Point
security gateways
Proprietary operating system Check Point IPSO
and Gaia (Linux-based)
FortiGateProprietaryIncluded on all Fortigate
devices
Proprietary, FortiOS,

Based on the Linux kernel

Palo Alto NetworksProprietaryIncluded on Palo Alto
Networks firewalls
Proprietary, PAN-OS,

Based on the Linux kernel

SophosProprietaryIncluded on Sophos UTMLinux-based appliance
Cisco ASA FirepowerProprietaryIncluded on all CISCO
ASA devices
Proprietary operating system.

Based on the Linux kernel.

Cisco PIXProprietaryIncluded on all CISCO
PIX devices
Proprietary operating system
Juniper SSGProprietaryIncluded on Netscreen
security gateways
Proprietary operating system ScreenOS
Juniper SRXProprietaryIncluded on SRX
security gateways
Proprietary operating system Junos
SonicwallProprietaryIncluded on Dell applianceProprietary operating system SonicOS

Based on the Linux kernel

Barracuda FirewallProprietaryIncluded Firewall Next Generation applianceWindows-based appliance
embedded firewall distribution
CyberoamProprietaryIncluded Firewall Sophos applianceWindows-based appliance
embedded firewall distribution
D-LinkProprietaryIncluded Firewall DFLWindows-based appliance
embedded firewall distribution
Endian FirewallProprietaryFree / PaidLinux-based appliance
Forcepoint NGFWProprietaryIncluded on all Forcepoint NGFW devicesProprietary operating system
OPNsenseSimplified BSD / FreeBSD LicenseFree / PaidFreeBSD-based appliance
firewall distribution
pfSenseApache 2.0 / Proprietary (Plus)Free / PaidFreeBSD-based appliance
firewall distribution
ZeroshellGPLFree / PaidLinux/NanoBSD-based appliance
firewall distribution
SmoothWallGPLFree / PaidLinux-based appliance
embedded firewall distribution
IPFireGPLFree (Donations welcomed)Linux-based appliance
embedded firewall distribution
WatchGuardProprietaryIncluded on all Firebox devicesProprietary, Fireware OS,

Based on the Linux kernel

WinGateProprietaryFree / PaidWindows-based appliance
embedded firewall distribution

Firewall rule-set Appliance-UTM filtering features comparison[edit]

Can Target:Changing default policy to accept/reject (by issuing a single rule)IP destination address(es)IP source address(es)TCP/UDP destination port(s)TCP/UDP source port(s)Ethernet MAC destination addressEthernet MAC source addressInbound firewall (ingress)Outbound firewall (egress)
Trend Micro Internet SecurityYesYesYesYesYesNoNoYesYes
VyattaYesYesYesYesYesYesNoNoYes
Windows XP FirewallNoNoYesPartial[a]NoNoNoYesNo
Windows Vista FirewallYesYesYesYesYesNoNoYesYes
Windows 7 /
Windows 2008 R2
Firewall
YesYesYesYesNoNoYesYesYes
WinGateYesYesYesYesYesNoNoNoYes
ZeroshellYesYesYesYesYesYesYesYesYes
ZorpYesYesYesYesYesYesNoNoNo
pfSenseYesYesYesYesYesNoNoYesYes
IPFireYesYesYesYesYesYesYesYesYes
Notes
  1. ^can target only single destination TCP/UDP port per rule, not port ranges.

Firewall rule-set advanced features comparison[edit]

Can:work at OSI Layer 4 (stateful firewall)work at OSI Layer 7 (application inspection)Change TTL? (Transparent to traceroute)Configure REJECT-with answerDMZ (de-militarized zone)Filter according to time of day (quota)Redirect TCP/UDP ports (port forwarding)Redirect IP addresses (forwarding)Filter according to User AuthorizationTraffic rate-limit / QoSTarpitLog
SidewinderYesYesYesYesYesYesYesYesYesYesYesYes
WinGateYesYesYesNoYesYesYesNoYesYesNoYes
ZeroshellYesYesNoYesYesYesYesYesYesYesNoYes
OPNsenseYesYesNoYesYesYesYesYesYesYesNoYes
pfSenseYesYesNoYesYesYesYesYesYesYesNoYes
IPFireYesYes?NoYesYesYesYes?YesNoYes
Features:Configuration: GUI, text or both modes?Remote Access: Web (HTTP), Telnet, SSH, RDP, Serial COM RS232, ...Change rules without requiring restart?Ability to centrally manage all firewalls together
WinGateGUIProprietary user interfaceYesN/A
ClearOSbothRS232, SSH, WebConfig,YesYes with ClearDNS
ZeroshellGUISSH, Web (HTTPS), RS232YesNo
OPNsensebothSSH, Web (HTTP/HTTPS), RS232YesNo
pfSensebothSSH, Web (HTTP/HTTPS), RS232YesNo
IPFirebothSSH, Web (HTTPS), RS232YesNo

Firewall's other features comparison[edit]

Features:Modularity: supports third-party modules to extend functionality?IPS : Intrusion prevention systemOpen-Source License?supports IPv6?Class: Home / ProfessionalOperating Systems on which it runs?
VyattaYesYesYesYesProfessionalVyatta OS (built on Debian)
WinGateYes[a]?NoNoProfessionalWindows 2000, Windows XP, Windows 2003, Windows Vista, Windows 2008. 32bit and 64bit.
OPNsenseYesYes, with Snort and Suricata (modules)YesYesBothFreeBSD/NanoBSD-based appliance
pfSenseYesYes, with Snort and Suricata (modules)YesYesBothFreeBSD/NanoBSD-based appliance
IPFireYesYes, with SuricataYesYes (manual setup needed)BothLinux (based on Linux From Scratch)
Notes
  1. ^WinGate 6.x supports 3rd party modules for data scanning only (e.g. antivirus and content filtering).
Sophos

Non-Firewall extra features comparison[edit]

These are not strictly firewall features, but are sometimes bundled with firewall software or appliance. Features are also marked 'yes' if an external module can be installed that meets the criteria.

Can: NAT[a]NAT64, NPTv6 Intrusion Detection System (IDS)[b] Virtual Private Network (VPN)[c] Antivirus (AV) Packet captureProfile selection[d]
VyattaYes (three NAT types)?Yes (integrated Snort)Yes (IPsec and OpenVPN)Yes (with clamav, Sophos Antivirus (optional))Yes (with wireshark or tcpdump)?
WinGateYes?Yes (with NetPatrol)Yes (proprietary)Yes (Kaspersky Labs)Yes (filtered capturing to pcap format)No
OPNsenseYesYes (NPt)Yes (integrated Suricata)Yes (WireGuard, OpenVPN, IPsec, L2TP, IKEv2, Tinc, PPTP)Yes (with squid and clamav)Yes (tcpdump)No
pfSenseYesYes (NPt)Yes (with Snort)Yes (OpenVPN, IPsec, L2TP, IKEv2, Tinc, PPTP)Yes (with squid and clamav)Yes (tcpdump)No
IPFireYes?Yes (with Snort)Yes (OpenVPN, IPsec, IKEv2)Yes (with squid and clamav)Yes (tcpdump)No
Notes
  1. ^static, dynamic w/o ports, PAT
  2. ^monitors for malicious activity or policy violations
  3. ^types include: PPTP, L2TP, MPLS, IPsec, SSL
  4. ^store sets of firewall settings to switch between

See also[edit]

References[edit]

Retrieved from 'https://en.wikipedia.org/w/index.php?title=Comparison_of_firewalls&oldid=1016614708'

Sophos Connect client is VPN software that runs on Microsoft Windows 7 SP2 and later, and Mac OS 10.12 and later. It establishes highly secure, encrypted VPN tunnels for off-site employees.

You can download the Sophos Connect client and Sophos Connect Admin by clicking Download on the Sophos Connect client page. You can check if the pattern for the Sophos Connect client has been downloaded from Backup & Firmware > Pattern updates.

Note Version 2.0 of the Sophos Connect client supports IPsec and SSL connections. For instructions on how to allow remote access to your network through the Sophos Connect client using an SSL connection, see Sophos Connect SSL.
To allow remote access to your network through the Sophos Connect client using an IPsec connection you need to do as follows:
  • Enable the Sophos Connect client, specify VPN settings and add users on the Sophos Connect client page.
  • Add a firewall rule so that the Sophos Connect clients can access the configured LAN networks. For information on how to add a firewall rule, see Add a firewall rule. If you want to allow LAN and VPN traffic in both directions, add both LAN and VPN to the source and destination zones. If you want to allow specific traffic for each direction, you need to create separate rules.
Sophos packet capture
Note The Sophos Connect client policy is configured as tunnel all by default. You can modify the policy to use split tunneling from Sophos Connect Admin. See Sophos Connect Help for instructions on how to modify the policy.

To export a connection, enable the Sophos Connect client and click Export connection.

Restriction You cannot export the connection when an external certificate is selected as Remote certificate.

The remote users import the connection file and establish a connection using the Sophos Connect client. See Sophos Connect Help for more details.

To revert to factory settings, click Reset.

General settings

Sophos Connect client
Enable the Sophos Connect client.
Interface
Select the WAN port, which acts as the endpoint for your tunnel.
Authentication type

Sophos Tcpdump Port

Authentication to use for the connection.

Preshared key: Authenticates endpoints using the secret known to both endpoints.

Digital certificate: Authenticates endpoints by exchanging certificates (either self-signed or issued by a certificate authority).

Local ID
For preshared key, select an ID type and type a value.DER ASN1DN (X.509) is not acceptable.
Remote ID
For preshared key, select an ID type and type a value.DER ASN1DN (X.509) is not acceptable.
Allowed user
Add users who are allowed to connect using the configured Sophos Connect client.
Sophos
Note If you haven't configured the WAN interface of XG Firewall with its public IP address, you must modify the configuration file in Sophos Connect Admin. Configure the target host as the public IP address or FQDN of XG Firewall.

Client information

Assign IP from
Range from which an address will be leased to the client. The client uses the assigned address for the duration of the connection. This must be a private IP address range with at least a 24-bit netmask.
Note The IP address range leased to Sophos Connect clients must not contain IP addresses that are in use.

Sophos Tcpdump Filedump

Allow leasing IP address from RADIUS server for L2TP, PPTP, and Sophos Connect client
When users are authenticated on a RADIUS server, use the IP address provided by the RADIUS server. If no addresses are provided by the RADIUS server, the static address configured for the user will be assigned or an address will be leased from the specified range.

Advanced settings

Sophos Tcpdump File

Disconnect when tunnel is idle
Disconnects idle clients from the session after the specified time.
Idle session time interval
Time, in seconds, after which idle clients will be disconnected.