public:sophos
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
sophos [2020/04/29 17:11] – rhudak | public:sophos [2021/02/09 18:16] – [Sophos Basics] lstolp | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== Sophos Basics====== | ====== Sophos Basics====== | ||
+ | <color # | ||
+ | ==== Sophos Cheat Sheet for the GUI ==== | ||
+ | [[Sophos XG Cheat Sheet]] | ||
+ | ==== Sophos Extras ==== | ||
+ | [[Turning off Captcha]] | ||
+ | |||
+ | [[Generating a Certificate]] | ||
- | ==== Sophos Cheat Sheet for the GUI ==== | ||
==== Configure Your Sophos ==== | ==== Configure Your Sophos ==== | ||
Line 19: | Line 25: | ||
==== To Configure Bridge Mode ==== | ==== To Configure Bridge Mode ==== | ||
- | Unlike the cyberoam, the Sophos has a little more hands configuration. When first configuring your Sophos the wizard will ask how you want to configure the ports (bridge or gateway). If you are unsure, you can skip this step and configure later in the Web GUI. | + | Unlike the cyberoam, the Sophos has a little more hands on configuration. When first configuring your Sophos the wizard will ask how you want to configure the ports (bridge or gateway). If you are unsure, you can skip this step and configure later in the Web GUI. |
Line 43: | Line 49: | ||
==== Configure Time and NTP ==== | ==== Configure Time and NTP ==== | ||
- | To keep the reports sent to satnag-reports synchronizable, | + | To keep the reports sent to satnag-reports synchronizable, |
If the ship has an NTP server, it can be added as a ‘Use Custom NTP Server’. | If the ship has an NTP server, it can be added as a ‘Use Custom NTP Server’. | ||
Line 69: | Line 75: | ||
Applications -> Application Filter | Applications -> Application Filter | ||
- | ==== Configure | + | ===∗Turn Exceptions OFF∗=== |
+ | Web -> Exceptions | ||
+ | |||
+ | Ensure 'Apple Update' | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | ===To Add Web and Application Policies to a Firewall Rule=== | ||
+ | |||
+ | Once you have created your web and application policies you can add them to your firewall rule. | ||
+ | |||
+ | Firewall -> ' | ||
+ | |||
+ | Make sure you click the 'check box' for the policies to be accepted into the firewall rule. | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | ==== User Group ==== | ||
Authentication -> Groups -> Add | Authentication -> Groups -> Add | ||
create offshipUsers | create offshipUsers | ||
Line 83: | Line 106: | ||
It is helpful to use the same syntax you would use for adding users to the ship email system or LDAP or RADIUS server, when adding the users assign them to the group // | It is helpful to use the same syntax you would use for adding users to the ship email system or LDAP or RADIUS server, when adding the users assign them to the group // | ||
+ | |||
+ | ==== Enable Captive Portal ==== | ||
+ | In order to enable the captive portal your device will need two rule groups: //WAN to LAN IPV4 traffic// and //LAN to WAN IPV4 traffic// | ||
+ | |||
+ | Change LAN_WAN_AnyTraffic Firewall rule to DROP | ||
+ | |||
public/sophos.txt · Last modified: 2024/01/25 03:31 by 127.0.0.1