zurück zu Aktuelles

Neues Update: Sophos Firewall OS v21.0 MR1 Build 272

vom 23. März 2025

Sophos hat kürzlich das erste Maintenance Release (MR1) für die Sophos Firewall OS v21 veröffentlicht. Diese Version bringt zahlreiche Verbesserungen und neue Funktionen, die die Sicherheit und Performance der Firewall erheblich steigern. Hier sind die wichtigsten Neuerungen und Verbesserungen in dieser Version:

Was ist neu in SFOS v21 MR1?

Verbesserte VPN-Funktionen

SSL-VPN:

  • Erweiterte Schlüsselgrößen: Mit der Unterstützung von Diffie-Hellman-Schlüsselgrößen von 3072 und 4096 Bit wird die Kommunikationssicherheit weiter erhöht und Compliance-Anforderungen erfüllt.
  • Dead-Peer-Erkennung: Eine granulare Einstellung der Zeitüberschreitung für die Dead-Peer-Erkennung bei UDP-basierten SSL-VPN-Tunneln verbessert die Ausfallsicherheit.

IPsec-VPN:

  • Stabilitätsverbesserungen: Probleme mit langsamer Browserleistung bei policybasierten IPsec-VPNs werden durch verbesserte Stabilität bei ausgegliederter Datenverkehr eliminiert.

Unterstützung für moderne Netzwerkprotokolle

NAT64

  • Der Firewall ermöglicht es IPv6-only-Clients, auf IPv4-Websites zuzugreifen, indem er den Datenverkehr im expliziten Web-Proxy-Modus weiterleitet. Zudem wird ein IPv4-Upstream-Proxy für IPv6-only-Clients unterstützt.

Verbesserungen

  • Cellular WAN: Eine automatische Konfiguration mit “8.8.8.8” als zweites Ziel für die Probe verbessert die Überwachung und reduziert die Notwendigkeit manueller Einstellungen, da ISPs Gateway-Pings oft blockieren.
  • DHCP: Der DHCP-Dienst stellt sich automatisch von Fehlern wieder her, was die Ausfallsicherheit erhöht.
  • SD-RED: SD-RED-Geräte bieten nun Remote-Troubleshooting und Diagnose durch Sophos Support, was die Wartung und Fehlerbehebung erheblich erleichtert.

Warum ist das Update wichtig?

Das Update sorgt dafür, dass Ihre Sophos XGS Firewall immer auf dem neuesten Stand ist – mit optimaler Sicherheit, besserer Performance und einer stabileren Plattform für Ihr Unternehmensnetzwerk. Es ist besonders wichtig für Kunden, die noch ältere Versionen verwenden, da es viele Bugfixes und Stabilitätsverbesserungen enthält.

Wie kann ich das Update installieren?

Das Update kann über die Sophos Central Admin Console oder direkt über das Firewall-Interface heruntergeladen werden. Es ist ratsam, das Update so schnell wie möglich durchzuführen, um die Vorteile der neuen Funktionen und Sicherheitsverbesserungen zu nutzen.

Fazit: Sophos Firewall OS v21 MR1 ist ein wichtiger Schritt zur Verbesserung der Sicherheit und Performance Ihrer Netzwerkinfrastruktur. Mit den neuen Funktionen und Optimierungen wird die Verwaltung und Sicherheit Ihrer Firewall erheblich vereinfacht und gestärkt.

Sie haben Fragen?

Wir stehen für Serviceorientierung, zukunftsfähige IT-Architektur und maßgeschneiderte ERP Lösungen.
Lassen Sie sich vom Experten aus Berlin individuell beraten!

Fixed Issues:

Issue IDComponentDescription
NC-138431AuthenticationMFA tokens weren’t working for SSL VPN users after a firmware upgrade to 20.0 MR1.
NC-141413AuthenticationAuthentication service stopped responding because of “read_from_client” issues.
NC-144562AuthenticationUnable to add users to the MFA setting after a certain limit. Error appeared on the web admin console.
NC-139323CertificatesIPS service failed after upgrading to 20.0 MR1.
NC-135473Clientless AccessUnable to download the configuration file from VPN portal after HA failover with specific conditions.
NC-141997Clientless AccessVulnerabilities found in the scan for VPN portal.
NC-147793VPNPattern update failure for SSL VPN.
NC-133133CMGroup configuration import in Sophos Central management failed from XG 86w firewall.
NC-135944CM, CM (Join to Cloud)Unable to access or manage the firewall from Sophos Central.
NC-140829CMIntermittent issues with internet connectivity because Garner main thread was blocked during Sophos Central plugin reconfiguration.
NC-144699CMFRP-SSO failed when a firewall was deregistered from a Sophos Central account and registered to a different account.
NC-137123Core UtilsLow swap memory in a device migrated from 17.5 involving a virtual deployment with two disks.
NC-138159Core UtilsCommand failure wasn’t handled in HA migration.
NC-143615Core UtilsUSB keyboard didn’t work on the CLI in 20.0 MR2 deployed on third-party hardware.
NC-135421CSCFirewall rules stopped working after a power failure.
NC-135613DDNSDDNS didn’t show data on the web admin console.
NC-136462DHCPDHCP service was unresponsive for a valid domain entry in Next-Server.
NC-137870DHCPBackup-restore failed for DoS rules because system interface mapping failed.
NC-133859EmailDKIM signatures didn’t work as expected. Emails were quarantined.
NC-133988EmailEntries for rejected mail weren’t logged because of the message size.
NC-134038EmailEmails bounced or weren’t delivered when the subject contained “&” with SPX turned on.
NC-141753EmailQuarantined digest email’s subject showed an incorrect “From” date.
NC-152919EmailUnable to release quarantine emails from the user portal.
NC-123910FirewallKernel panic in FTP over HTTP scenario.
NC-131411FirewallForwarded traffic didn’t work randomly for connections through SATC.
NC-137779FirewallUser accounting was done for traffic going through a network rule.
NC-152641BaseThe firewall stopped processing traffic due to SWAP memory configuration changes after it was upgraded to 21.0 MR1 Build 237.
NC-123807Gateway ManagementKernel crash dump occurred in a firewall with SFOS 20.0 GA.
NC-100951HAGateway status of an interface configured with dynamic IP assignment was, occasionally, not in sync in an active-passive auxiliary device after HA failover.
NC-137215HATCP traffic didn’t work in active-active HA mode with XFRM deployment.
NC-144474Interface ManagementPhysical interfaces and expanded logical interfaces weren’t visible after upgrading to 21.0 GA.
NC-140591IPS-DAQ-NSEAn AWS website didn’t work randomly. Log viewer showed the following error: “TLS handshake fatal alert: decode error(50)”.
NC-140666IPS-DAQ-NSEUnable to connect Office365 SMTP with SSL/TLS turned on after an upgrade to 20.0 MR1.
NC-138180IPsecAuxiliary device was receiving NAT-T IPsec packets on rekeying after an upgrade to 20.0 MR1.
NC-138822IPsecXFRM interface status appeared as “Not configured” even when the IPsec tunnel was established.
NC-143095IPsecUnable to download IPsec iOS profile from the VPN portal.
NC-146469IPS EngineIPS optimization issue with the number of cores after migration to a different appliance.
NC-143051Logging FrameworkSophos Firewall appliances stopped sending logs to Graylog syslog server.
NC-146431MDR FrameworkMDR threat feeds showed that the requirements weren’t met even though they were.
NC-139922NFP-FirewallMismatched interfaces when IPsec acceleration was turned on.
NC-144311NFP-Firewall, USFPMalformed or specifically crafted inner decrypted L3 payload may result in an unresponsive NPU.
NC-141503PostgresIPS stopped responding. Unable to restart it because postgres connections exceeded the limit.
NC-137106QoSQoS download speed wasn’t restricted for SSL VPN users.
NC-136900REDFixed the RED APU file removal and creation on the auxiliary device after this device restarted.
NC-144581REDOffline-provisioned RED became non-functional after a RED firmware upgrade.
NC-146114REDPrimary device automatically restarted and failed over to the auxiliary device after an upgrade to 21.0 GA.
NC-138286ReportingCustom view wasn’t listed in the custom report when accessing the firewall from Sophos Central.
NC-128242SDWAN RoutingTFTP traffic didn’t flow as expected with an SD-WAN profile.
NC-130534SDWAN RoutingWeb pages timed out with web proxy when MAC address-based SD-WAN rules were used.
NC-137341SDWAN RoutingThe iptable entries of SD-WAN routes disappeared.
NC-141637Security HeartbeatDevices were blocked despite green health and no missing heartbeat alert in Sophos Central.
NC-142435Sentry frameworkSnort, garner, and access server processes weren’t terminated properly because the process was stuck in GenerateDump.
NC-139458SSL VPNServices page and SSL VPN Assistant weren’t loading.
NC-139849SSL VPNDiscrepancies in the site-to-site SSL VPN import validation.
NC-142397SSL VPNOut of memory issue. SSL VPN caused the /tmp partition to fill up.
NC-145261SSL VPNIncorrect count appeared on the dashboard for connected remote users in 21.0 GA.
NC-144955Static RoutingStatic route remained on the auxiliary device after enabling HA.
NC-122478UI FrameworkWeb policy automatically scrolled, leading to a misplaced dialog box.
NC-141688UI FrameworkNeed to support automatic language detection for users with SSO sign-in.
NC-151389UI FrameworkHotspot voucher didn’t load on the user portal.
NC-135798WAFSet Cache-Control to no-cache, no-store for WAF.
NC-140403WAFPop-up appeared when you opened a WAF rule and clicked the cancel button without any modification to the rule.
NC-140550WAFWhen WAF was used, floating HTML with the cart content didn’t appear after items were added to it.
NC-142170WAFFixed how the firewall handles deleted and disabled interfaces referred to in Let’s Encrypt certificates.
NC-144659WAFLet’s Encrypt service showed a busy status in 21.0 GA.
NC-152963FirewallWith Let’s Encrypt turned on, firewall rule positions were altered, affecting the firewall rules that match the traffic.
NC-136403WebWeb policy override must tell the browser not to autofill bypass codes.
NC-136616WebAD SSO didn’t work with Kerberos for a specific server and user.
NC-140864WebThe “Missing template” error appeared instead of the Sophos block page.
NC-141088WebThe Restrict-Access-To-Tenants setting has a character limit of 256.
NC-142515WebContent filter blocking didn’t work with Facebook search. It worked with other websites.
NC-136099WebInSnortSSL/TLS inspection rules containing only unsupported services behaved like Service was set to Any.
NC-140491WWANModem didn’t connect after an upgrade to SFOS 21.0 EAP0 in XGS 116.
NC-142427WWANHuawei Modem (4G dongle) didn’t connect to the firewall after an upgrade to 20.0 MR2.
Cookie Consent mit Real Cookie Banner