Shopping Cart

No products in the cart.

Configure Sophos Connect Client on XG Firewall (SFOS)

In this guide, we will show you how to set up the Sophos Connect client for your employees as a Sophos Firewall administrator. SFOS 17.5 or newer is required.

Sophos Connect Client – Series

This article is part of a series that will give you everything you need to get started with the Sophos Connect client.

Preparation

Log in to your XG Firewall as an administrator and go to VPN > Sophos Connect Client from the menu. On this page we will now go through the settings in 12 steps and make the necessary entries.

Also note the following graphic with the steps drawn in so that you can follow the instructions more easily:

General settings

1. activate Connect Client

The beginning is quite easy. Check the box to enable the Sophos Connect client.

2. select interface

In this step, you need to select the interface on which the traffic will arrive on the Sophos. Typically, this is a WAN interface with a public IP address. If you have multiple WAN interfaces because you have more than one Internet provider, choose either the faster one, the more reliable one, or the one with less traffic. Decide for yourself which criterion is most important to you.

3. authentication type

You can choose two options here:

  • Distributed key – Define a password yourself.
  • Digital certificate – select a certificate in this option.

4. define distributed key

For this tutorial, we have chosen the Distributed Key method, which must now be defined at this point. If you have selected the Digital Certificate method, you can then select a certificate from your appliance at this point.

5. local ID (optional)

If you have multiple tunnels, you can define a local identification here so that the correct tunnel can be identified. There are the following options here:

  • DNS
  • IP address
  • Email
  • Certificate (if you have chosen the certificate at point 3)

6. remote ID (optional)

Here you can make the same selection as in point 5.

7. authorized users

If you already have users on your XG, or if you have synchronized the entire Active Directory, you can select the users/groups that are allowed to use the Sophos Connect client here.

Client data

8. name

Define a name for this IPsec connection here. In our example we have called the connection homeoffice.

9. assign IP from

The firewall assigns an IP address via DHCP to all users who connect through the Sophos Connect client. In this step you can define the IP range to be assigned. Select an area here that is not yet used on the firewall.

10. DNS server

It is often the case that VPN users want to connect to internal servers. For this purpose, it makes sense to work with the FQDNs as in the corporate network. Enter your internal DNS server here.

If you do not have an internal DNS server or do not need this feature, you can also specify an external DNS server, such as:

  • Cloudflare: 1.1.1.1 and 1.0.0.1
  • Google: 8.8.8.8 and 8.8.4.4
  • Quad9: 9.9.9.9 and 149.112.112.112
  • OpenDNS: 208.67.222.222 and 208.67.220.220

Advanced settings

11. session timeout

Experience shows that users do not always consistently disconnect a VPN connection when it is no longer needed. You can decide for yourself how you want to handle open connections here. The Sophos Connect client gives you the option to automatically disable the connection when no traffic has passed through after a certain time. In our example, we have configured the following:

  • Abort connection when tunnel is inactive: enabled
  • Time limit for inactive session: 120 seconds

Thus, the connection is automatically closed by Sophos Firewall when no traffic has been registered from the client for 2 minutes.

12. save

To save your settings now, all you have to do is click on Übernehmen.

Set up firewall rule

In order for the firewall to now also allow traffic from VPN users, a firewall rule must still be set up for this. To do this, use the menu to go to Firewall and click on Firewall-Regel hinzufügen > Benutzer-/Netzwerkregel . Take a look at the following screenshot and try to set the rules exactly the same way.

  • Source Zone: VPN
  • Destination Zone: LAN

By default, the Sophos Connect client routes all traffic through the IPsec tunnel. This means that Internet traffic is also sent through the tunnel. We have to allow this on the firewall first and create another rule for this.

  • Source Zone: VPN
  • Destination Zone: WAN

Further information

After using this guide to configure the Sophos Connect client on your XG Firewall, you may want to go ahead and download and install the Connect client for Windows or macOS next.