{"id":2933,"date":"2018-08-16T11:05:55","date_gmt":"2018-08-16T10:05:55","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2018\/08\/16\/sophos-utm-firewall-hardening\/"},"modified":"2024-01-30T16:42:44","modified_gmt":"2024-01-30T16:42:44","slug":"sophos-utm-firewall-hardening","status":"publish","type":"post","link":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/","title":{"rendered":"Sophos UTM Firewall Hardening"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2933\" class=\"elementor elementor-2933\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7174f598 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7174f598\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2b88c43f\" data-id=\"2b88c43f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30563f5d elementor-widget elementor-widget-text-editor\" data-id=\"30563f5d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2 class=\"rtejustify\">INTRODUCTION<\/h2><p class=\"rtejustify\">Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls. Sophos is just one of the vendors that provides such solutions to many organisations, alongside Check Point, FortiNet, Juniper, and Cisco.<\/p><p class=\"rtejustify\">There is a command line interface for Sophos UTM, however Sophos are understood to prefer supporting the GUI and provide documentation for this approach, as such it will be used for this guide. Please note that the following recommendations were verified against a Sophos UTM 9 appliance. As such, the menus might differ for other versions.<\/p><h2 class=\"rtejustify\">ACCESS CONTROL<a id=\"access_control\" name=\"access_control\"><\/a><\/h2><h3 class=\"rtejustify\">Configure CENTRAL Authentication<a id=\"central_auth\" name=\"central_auth\"><\/a><\/h3><p class=\"rtejustify\">The use of a central authentication service allows organisations to easily and centrally manage user accounts. This simplifies account management processes, such as by ensuring that users&#8217; accounts can easily be disabled across all network devices once they leave the organisation.<\/p><p class=\"rtejustify\">We will discuss three common methods for configuring central authentication in Sophos: TACACS+, RADIUS, and LDAP.<\/p><h5 class=\"rtejustify\">TACACS+<a id=\"tacacs\" name=\"tacacs\"><\/a><\/h5><p class=\"rtejustify\">1) Create a new authentication server<\/p><p class=\"rtejustify\">To configure Sophos UTM to use TACACS+, you can use the following steps in WebAdmin:<\/p><p class=\"rtejustify\">Go to\u00a0<em>Definition &amp; Users -&gt; Authentication Services -&gt; Servers. <\/em>Click\u00a0<strong>&#8220;New Authentication Server<\/strong>&#8220;, and choose the TACACS+ protocol in the dropdown menu in Backend.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"width: 603px; height: 285px; border-width: 1px; border-style: solid;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_tacacs%2B_1.png\" \/><\/p><p class=\"rtejustify\">2) Configure the TACACS+ server:<\/p><p class=\"rtejustify\">Click the <strong>green plus <\/strong>button to enter the IPv4 address of the TACACS+ server and specify a name in the \u201c<strong>Name<\/strong>\u201d field.<\/p><p class=\"rtejustify\">To enter the host name instead of the IPv4 address, choose \u201cDNS Host\u201d from the drop down list \u201c<strong>Type<\/strong>\u201d.<\/p><p class=\"rtejustify\">Choose the interface you wish users to be authenticated from in the \u201c<strong>Advanced<\/strong>\u201d tab, then add the TACACS+ server name and IP Address and the TACACS+ parameters, for instance the port number and symmetric server secret key, which would be supplied by the TACACS+ server administrator.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"width: 603px; height: 533px; border-width: 1px; border-style: solid;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_tacacs%2B_2.png\" \/><\/p><p class=\"rtejustify\">Please refer to section 5.7.2.5 TACAS+ in the following documentation for more information on how to configure TACACS+:<\/p><p class=\"rtejustify\"><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/documentation\/utm9501_manual_eng.pdf\">https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/documentation\/utm9501_manual_eng.pdf<\/a><\/p><h5 class=\"rtejustify\">RADIUS<a id=\"radius\" name=\"radius\"><\/a><\/h5><p class=\"rtejustify\">The way to configure RADIUS authentication in Sophos UTM is similar to TACACS+. In the drop down list for \u201cBackend\u201d, select RADIUS and configure the rest of the parameters using the same steps that were used for TACACS+. Please refer to the following URL for more information:<\/p><p class=\"rtejustify\"><a href=\"https:\/\/community.sophos.com\/kb\/en-us\/116144#Configure%20Radius%20Server%20(UTM)\">https:\/\/community.sophos.com\/kb\/en-us\/116144#Configure%20Radius%20Server%20(UTM)<\/a><\/p><h5 class=\"rtejustify\">LDAP<a id=\"ldap\" name=\"ldap\"><\/a><\/h5><p class=\"rtejustify\">To configure LDAP for Sophos UTM, please refer to Section 5.7.2.3 LDAP in the following article:<\/p><p class=\"rtejustify\"><a href=\"https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/documentation\/utm9501_manual_eng.pdf\">https:\/\/www.sophos.com\/en-us\/medialibrary\/PDFs\/documentation\/utm9501_manual_eng.pdf<\/a><\/p><p class=\"rtejustify\">Please note that by default, plain text communication is used to communicate with the LDAP Server which would cause administrative credentials and sensitive configuration to be sent across the network unencrypted and so be vulnerable to interception. To address this, enabling SSL for LDAP requests can be done by checking the box marked \u201cSSL\u201d as highlighted.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 495px; height: 603px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_ldap.png\" \/><\/p><h4 class=\"rtejustify\">ASSIGNING INDIVIDUAL LOCAL ADMINISTRATOR ACCOUNTS<a id=\"named_accounts\" name=\"named_accounts\"><\/a><\/h4><p class=\"rtejustify\">Assigning individual administrator accounts ensures that every action can be traced back to the user who is responsible for making that action. Additionally, different privilege levels can be assigned to individual users to only grant the access needed for their role. In combination with user authorisation, this allows fine-grained control over the operations that are accessible to each user, ensuring that the principle of minimal privilege can be enforced.<\/p><p class=\"rtejustify\">To create an administrative account using WebAdmin, perform the following steps. Note that privilege levels can range from Read-only, Help Desk, Admin and Super Admin, with Super Admin being the highest level of access possible:<\/p><p class=\"rtejustify\">1) Go to <em>Definition &amp; Users -&gt; Users &amp; Groups<\/em><\/p><p class=\"rtejustify\">2) Click &#8220;<strong>New User<\/strong>&#8221; to create a new user.<\/p><p class=\"rtejustify\">3) Within the identity window you can fill in the username and password.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 391px; height: 693px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_local_admin_1.png\" \/><\/p><p class=\"rtejustify\">4) Save the newly created user, and click on the \u201cGroups\u201d tab at the top. The group \u201c<strong>SuperAdmins<\/strong>\u201d will appear in the list.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 204px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_local_admin_2.png\" \/><\/p><p class=\"rtejustify\">5) Click on \u201c<strong>Edit<\/strong>\u201d to edit the user group and click on the browse button. The list of users available will appear on the left, drag the new user in the \u201c<strong>Edit Group<\/strong>\u201d window<\/p><p class=\"rtejustify\">6) The new user will be added to the list, click \u201c<strong>Save<\/strong>&#8220;.<\/p><p class=\"rtejustify\">For more information on how to configure administrator accounts within Sophos UTM, please refer to the following URL:<\/p><p class=\"rtejustify\"><a href=\"https:\/\/community.sophos.com\/kb\/en-us\/131888\">https:\/\/community.sophos.com\/kb\/en-us\/131888<\/a><\/p><h4 class=\"rtejustify\">ENFORCE PASSWORD COMPLEXITY<a id=\"complexity\" name=\"complexity\"><\/a><\/h4><p class=\"rtejustify\">Enforcing password complexity rules that comply with the organisation\u2019s password policy ensures that the accounts are protected using complex passwords, that are difficult to guess or brute force. Password complexity is often in place on Windows Active Directory, but overlooked on networking devices.<\/p><p class=\"rtejustify\">Password complexity can be configured using the following steps in WebAdmin:<\/p><p class=\"rtejustify\">Go to\u00a0<em>Definitions &amp; Users -&gt; Authentication Services -&gt; Advanced.<\/em>\u00a0Within the GUI you can set a number of options, which are listed below:<\/p><ul><li class=\"rtejustify\">Password length (1-32)<\/li><li class=\"rtejustify\">Lower case characters (a-z)<\/li><li class=\"rtejustify\">Upper Case Characters (A-Z)<\/li><li class=\"rtejustify\">Digits (0-9)<\/li><li class=\"rtejustify\">Non alpha-numeric characters<\/li><\/ul><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 208px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_password_complexity.png\" \/><\/p><p class=\"rtejustify\">\u00a0Changes to this setting do not affect existing passwords. A password change should therefore be required for all existing accounts when password complexity rules are changed. Note that it could be acceptable to reduce the complexity requirements with a compensating control of a longer minimum password length, such as if passphrases are preferred.<\/p><h4 class=\"rtejustify\">ENFORCE LOCAL ACCOUNT LOCKOUTS<a id=\"lockouts\" name=\"lockouts\"><\/a><\/h4><p class=\"rtejustify\">Enforcing account lockouts protects the accounts against password guessing and brute force attacks. In combination with enforcing password complexity, this reduces the likelihood of an account being compromised using password guessing or brute force attacks.<\/p><p class=\"rtejustify\">Account lockout can be configured using the following steps in WebAdmin:<\/p><p class=\"rtejustify\">Go to <em>Definitions &amp; Users -&gt; Authentication Services -&gt; Advanced.<\/em>\u00a0Administrators can then choose the number of attempts before being locked out and specify the time an account is locked out for. The option \u201c<strong>Drop packets from blocked hosts<\/strong>\u201d, prevents hosts from accessing the specified services ( WebAdmin, SSH etc.) when an account lockout was triggered from such hosts. The default is to block access to hosts for 10 minutes after 3 failed attempts.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 385px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_account_lockout.png\" \/><\/p><p class=\"rtejustify\">It&#8217;s fine to increase the lockout value from the default 3 attempts to a slightly higher value such as 5 attempts, as this will not significantly aid a brute force attack and may address nuisance lockouts experienced accidentally with a lower value.<\/p><h4 class=\"rtejustify\">ACCESS TO ADMINISTRATIVE PORTS<a id=\"admin_ports\" name=\"admin_ports\"><\/a><\/h4><p class=\"rtejustify\">Telnet and HTTP are disabled by default and Sophos does not permit these protocols to be used for administrative access, therefore nothing needs to be changed to disable these services.<\/p><h2 class=\"rtejustify\">FIREWALL RULES<a id=\"rules\" name=\"rules\"><\/a><\/h2><h3 class=\"rtejustify\">ADD COMMENTS TO RULES<a id=\"comments\" name=\"comments\"><\/a><\/h3><p class=\"rtejustify\">Adding a clear description to every rule that shows ownership, date and purpose of the rule, or a ticket reference, is crucial for identifying whether a rule is still required or could potentially be removed. This facilitates housekeeping and general management of the firewall rules.<\/p><p class=\"rtejustify\">Adding comments to existing firewall rules can be achieved using the following steps in WebAdmin:<\/p><p class=\"rtejustify\">1) Go to <em>Network Protection -&gt; Firewall, <\/em>then click the \u201c<strong>Edit<\/strong>\u201d button in the section for the rule that you wish to add a comment to<em>.<\/em><\/p><p class=\"rtejustify\" style=\"margin-left: 18.0pt;\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 259px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_add_comment_1.png\" \/><\/p><p class=\"rtejustify\">2) In the parameter \u201c<strong>Comment<\/strong>\u201d, add a description of the rule for example including the date, owner and ruler.<\/p><p class=\"rtejustify\" style=\"margin-left: 18.0pt;\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 230px; height: 378px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_add_comment_2.png\" \/><\/p><p class=\"rtejustify\" style=\"margin-left: 18.0pt;\">The comment could include a helpdesk ticket number relating to the change or a change control request reference number, depending on how the organisation operates.<\/p><h3 class=\"rtejustify\">REMOVE INACTIVE RULES<a id=\"inactive_rules\" name=\"inactive_rules\"><\/a><\/h3><p class=\"rtejustify\">Inactive rules make it harder to manage the firewall rule groups effectively.<\/p><p class=\"rtejustify\">Removing inactive rules can be achieved using the following steps in WebAdmin::<\/p><p class=\"rtejustify\">1) Go to\u00a0 <em>Network Protection -&gt; Firewall <\/em>and choose \u201c<strong>status<\/strong>\u201d from the drop-down \u201c<strong>Sort by<\/strong>\u201d<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 449px; height: 173px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_inactive_rule_1.png\" \/><\/p><p class=\"rtejustify\">2) The option in the drop-down list \u201c<strong>Sort by<\/strong>\u201d is changed to \u201c<strong>status asc<\/strong>\u201d by default. This option sorts the rules to make the inactive rules to appear at the top of the list. Inactive rules are indicated by the switch showing grey with the symbol \u201cO\u201d, instead of green with the symbol \u201cI\u201d.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 280px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_inactive_rule_2.png\" \/><\/p><p class=\"rtejustify\">3) Delete the inactive rule by clicking \u201c<strong>Delete<\/strong>\u201d on the left of the rule.<\/p><h3 class=\"rtejustify\">APPLY AN EXPLICIT DEFAULT DENY RULE<a id=\"explicit_deny\" name=\"explicit_deny\"><\/a><\/h3><p class=\"rtejustify\">A default deny rule ensures that traffic without specific rules to permit it, will get denied by default. Sophos UTM has a global default deny rule by default that drops all inbound traffic, although it does not show the rule in WebAdmin.<\/p><p class=\"rtejustify\">However, it is good practice to create an explicit deny all rule at the bottom of the list of rules for TCP connections to and from the WAN interface and also for the LAN interface.<\/p><p class=\"rtejustify\">This can be achieved in WebAdmin using the following steps:<\/p><p class=\"rtejustify\">1) Go to\u00a0<em>Network Protection -&gt; Firewall<\/em><\/p><p class=\"rtejustify\">2) Add a new rule by clicking the\u00a0&#8220;<strong>+ New Rule\u2026<\/strong>&#8221;\u00a0button. In the pop-up window, select the &#8220;<strong>Deny<\/strong>&#8221; in the drop-down list \u201c<strong>Action<\/strong>\u201d.<\/p><p class=\"rtejustify\">3) Ensure that the Source and Destination criteria are set to &#8220;<strong>Any<\/strong>&#8220;, and that the service is set to &#8220;<strong>Any<\/strong>&#8220;.<\/p><p class=\"rtejustify\">4) Open up the \u201c<strong>Advanced<\/strong>\u201d tab and check the box \u201c<strong>Log traffic<\/strong>\u201d to log the explicit deny rule.<\/p><h3 class=\"rtejustify\">RESTRICT OVERLY PERMISSIVE RULES<a id=\"permissive\" name=\"permissive\"><\/a><\/h3><p class=\"rtejustify\">Overly permissive rules are a risk to the organisation, as they allow unintended traffic to get through the firewall. An organisation should tighten overly permissive rules to the required source address(es), destination address(es) and service(s) or destination port(s). In order to achieve this without impacting the organisation&#8217;s operations or accidentally causing a denial of service, organisations should monitor the rules to identify traffic matching them. Rules should be monitored for a sufficient period of time as determined by the organisation.\u00a0 Once the data has been collected and analysed, the organisation can tighten the firewall rule to match the identified traffic. Organisations should consider using a remote syslog server to collect the logs and limit monitoring to a small number of rules.<\/p><h4 class=\"rtejustify\">CONFIGURE A SYSLOG SERVER AND ENABLE LOGGING TO THIS SERVER<a id=\"syslog\" name=\"syslog\"><\/a><\/h4><p class=\"rtejustify\">The following steps can be used to configure a syslog server using WebAdmin:<\/p><p class=\"rtejustify\">1) Go to <em>Logging &amp; Reporting -&gt; Log Settings -&gt; Remote Syslog Server.<\/em>\u00a0Click the grey switch to enable Remote syslog.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"width: 800px; height: 333px; border-width: 1px; border-style: solid;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_syslog_1.png\" alt=\"\" \/><\/p><p class=\"rtejustify\">2) Click the plus button in \u201c<strong>Syslog Servers<\/strong>\u201d and specify the name of the server, the IP address or the network object of where the Syslog server is located and the port or service object.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 457px; height: 389px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_syslog_2.png\" \/><\/p><p class=\"rtejustify\">3) Click \u201c<strong>Save<\/strong>\u201d and then \u201c<strong>Apply<\/strong>\u201d to save the changes. After adding a server, go to \u201c<strong>Remote Syslog Log Selection<\/strong>\u201d and select the type of logs that should be sent to the remote syslog server e.g. Firewall<\/p><p class=\"rtejustify\"><ins cite=\"mailto:Oliver%20Wen\" datetime=\"2018-08-16T09:31\">\u00a0<img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 603px; height: 344px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_syslog_3.png\" \/><\/ins><\/p><h4 class=\"rtejustify\">ENABLE LOGGING FOR SPECIFIC ACCESS RULES<a id=\"logging\" name=\"logging\"><\/a><\/h4><p class=\"rtejustify\">The following steps can be used to enable monitoring on a specific rule using WebAdmin:<\/p><p class=\"rtejustify\"><em>Network Protection -&gt; Firewall. <\/em>Click \u201c<strong>Edit<\/strong>\u201d on one of the rules and then \u201c<strong>Advanced<\/strong>\u201d. Tick the &#8220;<strong>Log traffic<\/strong>&#8221; checkbox, and set the time period in the drop down menu.<\/p><h4 class=\"rtejustify\">FIND LOGS FOR A SPECIFIC RULE<a id=\"find_logs\" name=\"find_logs\"><\/a><\/h4><p class=\"rtejustify\">Logs are given a logmark value and an id value to help track which logs relate to which rule.<\/p><p class=\"rtejustify\">Logmark values are identified by the numbers beginning with 60***, and they are used to identify the purpose of the rule itself, for example logmark value 60004 is used to identify forbidden SSH connections and 60005 is used to log forbidden WebAdmin connections. This will help narrow down the search in the log file for the specific rule.<\/p><p class=\"rtejustify\">Each rule has a unique id value with numbers beginning with 200* and they can be used <ins cite=\"mailto:Bil%20Bragg\" datetime=\"2018-08-16T07:41\">on <\/ins><del cite=\"mailto:Bil%20Bragg\" datetime=\"2018-08-16T07:41\">the <\/del><ins cite=\"mailto:Bil%20Bragg\" datetime=\"2018-08-16T07:41\">a remote s<\/ins><del cite=\"mailto:Bil%20Bragg\" datetime=\"2018-08-16T07:41\">S<\/del>yslog server to search for logs related to a specific rule. A further list of logmark values can be found here: <a href=\"https:\/\/community.sophos.com\/kb\/en-us\/115029\">https:\/\/community.sophos.com\/kb\/en-us\/115029<\/a><\/p><h4 class=\"rtejustify\">MODIFY AN EXISTING RULE<a id=\"modify\" name=\"modify\"><\/a><\/h4><p class=\"rtejustify\">The following steps can be used to modify a rule using WebAdmin:<\/p><p class=\"rtejustify\">Go to\u00a0<em>Network Protection -&gt; Firewall.<\/em>\u00a0 Click &#8220;<strong>Edit<\/strong>&#8221; to modify the rule. Refine the parameters such as &#8220;<strong>Destinations<\/strong>&#8221; and &#8220;<strong>Services<\/strong>&#8220;, and click &#8220;<strong>Save<\/strong>&#8221; to confirm.<\/p><p class=\"rtejustify\"><img decoding=\"async\" style=\"border-width: 1px; border-style: solid; width: 421px; height: 793px;\" src=\"\/wp-content\/uploads\/files\/sites\/other\/files\/sophos_utm_modify_rule.png\" \/><\/p><h3 class=\"rtejustify\">FIREWALL RULES GOOD PRACTICES<a id=\"good_practices\" name=\"good_practices\"><\/a><\/h3><h4 class=\"rtejustify\">RESTRICT INTERNET ACCESS TO THE WEB PROXY<a id=\"proxy\" name=\"proxy\"><\/a><\/h4><p class=\"rtejustify\">Allowing internal users to freely access the Internet could result in them accidently visiting phishing websites or malicious websites hosting malware which could lead to the compromise of the internal network.<\/p><p class=\"rtejustify\">In addition to enforcing the use of a Web Proxy through Group Policy, it is recommended to also enforce this on the boundary firewall to ensure that it cannot be bypassed. \u00a0This can be achieved by only allowing the proxy&#8217;s address to access external websites using HTTP or HTTPS protocol and preventing all other internal hosts from sending traffic to external destinations using HTTP or HTTPS protocol.<\/p><h4 class=\"rtejustify\">RESTRICT ACCESS TO HIGH RISK PORTS FROM EXTERNAL UNTRUSTED SOURCES<a id=\"high_risk\" name=\"high_risk\"><\/a><\/h4><p class=\"rtejustify\">Services can be considered high risk for a number of reasons. They are used by clear-text protocols, allow privileged access, or are commonly targeted by attackers because of the popularity or vulnerabilities of the underlying software. Wherever possible and practical It is recommended to restrict access to such ports\/services to trusted sources in order to reduce the potential attack surface exposed by the organisation.<\/p><p class=\"rtejustify\">An example of ports that can be considered\u00a0<em>high risk<\/em>\u00a0is shown below:<\/p><ul><li class=\"rtejustify\">HTTP (TCP 80, 8080)<\/li><li class=\"rtejustify\">RDP (TCP 3389)<\/li><li class=\"rtejustify\">Telnet (TCP 23)<\/li><li class=\"rtejustify\">FTP (TCP 21)<\/li><li class=\"rtejustify\">TFTP (UDP 69)<\/li><li class=\"rtejustify\">VNC (5900-590x)<\/li><li class=\"rtejustify\">SMB (TCP 445, 1137, 139, UDP 137, 138)<\/li><li class=\"rtejustify\">Kerberos (TCP 88, UDP 88)<\/li><li class=\"rtejustify\">SSH (TCP 22)<\/li><li class=\"rtejustify\">LDAP (TCP\/UDP 389)<\/li><\/ul><p class=\"rtejustify\">Please note that this is not an exhaustive list.<\/p><h4 class=\"rtejustify\">RESTRICT OUTBOUND TRAFFIC FROM THE INTERNAL NETWORK OR DMZ<a id=\"restrict_outbound\" name=\"restrict_outbound\"><\/a><\/h4><p class=\"rtejustify\">Overly permissive rules from the internal network to external sources could allow data to be exfiltrated from the internal network, as well as allow compromised hosts to communicate with command and control servers. Outbound traffic from the internal network and DMZ should be restricted to the resources and services required by users to carry out their job.<\/p><p class=\"rtejustify\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.<\/p>\n","protected":false},"author":1,"featured_media":8931,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[209],"class_list":["post-2933","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","tag-infrastructure","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sophos UTM Firewall Hardening<\/title>\n<meta name=\"description\" content=\"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sophos UTM Firewall Hardening\" \/>\n<meta property=\"og:description\" content=\"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-16T10:05:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-30T16:42:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"Sophos UTM Firewall Hardening\",\"datePublished\":\"2018-08-16T10:05:55+00:00\",\"dateModified\":\"2024-01-30T16:42:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/\"},\"wordCount\":2243,\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Webheader-min.jpg?fit=1920%2C1080&ssl=1\",\"keywords\":[\"infrastructure\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/\",\"name\":\"Sophos UTM Firewall Hardening\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Webheader-min.jpg?fit=1920%2C1080&ssl=1\",\"datePublished\":\"2018-08-16T10:05:55+00:00\",\"dateModified\":\"2024-01-30T16:42:44+00:00\",\"description\":\"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Webheader-min.jpg?fit=1920%2C1080&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/dionach.com\\\/wp-content\\\/uploads\\\/2018\\\/08\\\/Webheader-min.jpg?fit=1920%2C1080&ssl=1\",\"width\":1920,\"height\":1080,\"caption\":\"Sophos UTM Firewall Hardening\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/sophos-utm-firewall-hardening\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sophos UTM Firewall Hardening\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#website\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/dionach.com\\\/nl\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\\\/\\\/dionach.com\\\/nl\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dionach.com\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/dionachcyber\",\"https:\\\/\\\/x.com\\\/dionachcyber\",\"https:\\\/\\\/uk.linkedin.com\\\/company\\\/dionach-ltd\",\"https:\\\/\\\/www.instagram.com\\\/dionachcyber\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/dionach.com\\\/nl\\\/#\\\/schema\\\/person\\\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sophos UTM Firewall Hardening","description":"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/","og_locale":"nl_NL","og_type":"article","og_title":"Sophos UTM Firewall Hardening","og_description":"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.","og_url":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2018-08-16T10:05:55+00:00","article_modified_time":"2024-01-30T16:42:44+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Geschreven door":"Dionach Admin","Geschatte leestijd":"13 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"Sophos UTM Firewall Hardening","datePublished":"2018-08-16T10:05:55+00:00","dateModified":"2024-01-30T16:42:44+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/"},"wordCount":2243,"publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"image":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","keywords":["infrastructure"],"articleSection":["researchblog"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/","url":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/","name":"Sophos UTM Firewall Hardening","isPartOf":{"@id":"https:\/\/dionach.com\/nl\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","datePublished":"2018-08-16T10:05:55+00:00","dateModified":"2024-01-30T16:42:44+00:00","description":"Firewalls are used as the main defence for an organisation\u2019s network infrastructure, and are used to prevent unauthorised access to or from the private network. The aim of this article is to provide guidance for network administrators on how to harden Sophos UTM firewalls.","breadcrumb":{"@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","width":1920,"height":1080,"caption":"Sophos UTM Firewall Hardening"},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/nl\/sophos-utm-firewall-hardening\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/nl\/"},{"@type":"ListItem","position":2,"name":"Sophos UTM Firewall Hardening"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/nl\/#website","url":"https:\/\/dionach.com\/nl\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/dionach.com\/nl\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/nl\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/nl\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2018\/08\/Webheader-min.jpg?fit=1920%2C1080&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Lj","_links":{"self":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/comments?post=2933"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/posts\/2933\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media\/8931"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/media?parent=2933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/categories?post=2933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/nl\/wp-json\/wp\/v2\/tags?post=2933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}