My new homelab Firewall is insane! // Sophos XGS 2100

Christian Lempa
9 Feb 202215:45

Summary

TLDRThis video showcases the setup and features of the Sophos XG 2100, a next-generation firewall, in a home server rack. The presenter highlights its deep packet inspection for malware detection, management of two new Surface access points, and the ease of network management it provides. The video also discusses the importance of network separation for security, setting up firewall rules, and managing Wi-Fi access points through the Sophos interface. It concludes with a teaser for upcoming content and a recommendation for viewers interested in home lab security solutions.

Takeaways

  • 🔒 The video introduces the Sophos XG 2100, a next-generation firewall designed to secure home networks by managing and protecting devices.
  • 🏠 The firewall connects all devices in the home network and is equipped with deep packet inspection to detect exploits and malware.
  • 📡 Two new Surface Access Points are added to enhance the home Wi-Fi, managed entirely by the firewall for streamlined network management.
  • 🔧 The user shared a Twitter poll indicating that many people are considering firewall solutions for their home labs, suggesting a growing interest in home network security.
  • 📦 The unboxing segment reveals the contents of the Sophos XG 2100 package, including a getting started guide and an Ethernet cable.
  • 🚀 The Sophos XG 2100 is part of the latest series of Sophos XG appliances and is the smallest rackmount model with eight gigabit Ethernet ports and two SFP plus modules.
  • 💡 The user plans to upgrade the network speed with a 4x SFP plus Flexi Port Module for 10 gigabit connectivity, showcasing a step-up in network performance.
  • 🛠️ The video provides a detailed walkthrough of setting up the firewall, including configuring general settings, licensing, and firmware updates.
  • 🌐 The user demonstrates how to create layer 2 bridge interfaces and bind ports for different network zones, emphasizing the importance of network segmentation for security.
  • 🔄 The Sophos XG firewall's advanced features include intrusion prevention system (IPS) engines, malware detection, and traffic prioritization, enhancing the home network's security posture.
  • 🛡️ The video concludes with a discussion on the importance of firewall rules for controlling traffic and protecting critical services within the home network.

Q & A

  • What is the Sophos XGS 2100?

    -The Sophos XGS 2100 is a next-generation firewall that connects and protects network devices, scans traffic for exploits and malware through deep packet inspection, and manages wireless access points.

  • What are the key features of the Sophos XGS 2100?

    -Key features include eight gigabit Ethernet ports that are fully programmable, two SFP plus modules supporting one gigabit, and the capability to manage wireless access points directly from the firewall.

  • What additional hardware is required for the Sophos XGS 2100 to support 10 gigabit?

    -A four-part SFP plus flexi port module is required to extend the capabilities and support 10 gigabit connections.

  • How does the Sophos XGS 2100 manage wireless access points?

    -The firewall can manage access points directly, allowing for centralized configuration of settings such as SSID, password, and Wi-Fi channels through the Sophos X2U wireless dashboard.

  • What is the purpose of the layer 2 bridge interface created in the setup?

    -The layer 2 bridge interface is created to bind specific ports together, allowing them to be part of the same local network and facilitating the configuration of firewall rules and traffic control.

  • How does the Sophos XGS 2100 differentiate between different network zones?

    -The firewall uses different zones such as LAN and DMZ to control and isolate traffic. It allows the creation of specific firewall rules to manage which services and IP addresses can be accessed within each zone.

  • What is the advantage of using the physical Sophos XGS 2100 appliance over a virtual machine?

    -The physical appliance is optimized for computing tasks and can accelerate and offload traffic more efficiently than a virtual machine, especially when multiple scanning engines are enabled.

  • How does the Sophos XGS 2100 protect against exploits and malware?

    -It includes various scanning engines that can detect and block malicious patterns, exploits, and malware, with capabilities like sandboxing and artificial intelligence.

  • What is the significance of the firewall rules created in the Sophos XGS 2100 setup?

    -Firewall rules define the traffic flow and access permissions within the network, ensuring that only authorized and authenticated users can access specific services and servers.

  • How does the Sophos XGS 2100 handle unauthorized access to services running on home servers?

    -The firewall can be configured to allow unauthorized access to specific services and workloads on home servers by creating rules that permit access to certain IP addresses and ports, while still maintaining security controls.

Outlines

00:00

🔒 Introduction to Sophos XG Firewall and Home Network Setup

The video begins with an introduction to the Sophos XGS 2100, a next-generation firewall that protects the home network and servers by scanning for exploits and malware through deep packet inspection. The presenter shares their excitement about integrating the firewall with their home server rack and mentions their recent Twitter poll which indicated many people are considering firewall solutions. The presenter unboxes the Sophos XGS 2100, highlighting its features including eight gigabit Ethernet ports and two SFP plus modules. They also discuss the addition of a four-part SFP plus flexi port module to support 10 gigabit connections and mention plans to explore 10 gigabit capabilities in a future video. The video concludes with the presenter expressing gratitude to Sophos for providing the devices and a tease of upcoming content related to setting up and managing the firewall.

05:00

📡 Network Configuration and Zone Management with Sophos XG

In this segment, the presenter delves into the network configuration of their home server rack, detailing how they've connected various devices to the Sophos XGS 2100 firewall. They explain the setup of a Layer 2 bridge interface for their local area network (LAN) and another for a demilitarized zone (DMZ), which includes their servers and virtual machines. The presenter discusses the strategic placement of devices into different zones within the firewall for better traffic control and security. They also touch on the creation of firewall rules to manage access to the servers, ensuring that only authenticated users can connect to certain services. The video highlights the importance of network segmentation and the use of firewall rules to protect critical services within the home network.

10:01

🛡️ Advanced Firewall Features and Traffic Management

The presenter continues by exploring the advanced features of the Sophos XG firewall, focusing on its ability to inspect network traffic at various layers and detect malicious patterns and exploits. They mention the inclusion of multiple scanning engines within the firewall, which are managed by the Extreme Architecture for high-performance traffic scanning. The video explains how the firewall can be configured to apply specific protection features, such as Intrusion Prevention System (IPS) policies, to detect and block known vulnerabilities like the recent 'Log4Shell' exploit. The presenter also discusses the potential for using the firewall to manage Wi-Fi access points, simplifying the process of configuring and updating network settings across multiple devices. The segment concludes with a brief mention of upcoming changes to the presenter's home lab and a tease for future content related to Sophos products.

15:02

🏠 Home Lab Security and Future Network Enhancements

In the final paragraph, the presenter addresses the practicality of using the Sophos XG firewall for home lab setups, suggesting that the model featured in the video may be overkill for most home users. They recommend exploring virtual options or free home licenses as more accessible alternatives. The presenter also encourages viewers to consider implementing basic firewall systems for their home networks, emphasizing the importance of network separation and security. They hint at future videos that will cover more advanced topics like TLS inspection and network protection. The video ends with a promise to keep viewers updated on any significant changes to the presenter's home lab setup and a farewell until the next video.

Mindmap

Keywords

💡Sophos XGS 2100

The Sophos XGS 2100 is a next-generation firewall device that serves as the central piece of the home server network setup described in the video. It is responsible for connecting and protecting all devices within the network, including critical servers. The firewall's capabilities extend to deep packet inspection for detecting exploits and malware, showcasing its role as a comprehensive security solution. In the script, the presenter adds this device to their home server rack, highlighting its importance in managing and securing the network.

💡Firewall

A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. In the context of the video, the Sophos XGS 2100 acts as a firewall, protecting the home network from external threats and managing internal traffic. The video emphasizes the importance of firewalls in home labs, suggesting that even viewers with basic network setups should consider implementing one for enhanced security.

💡Deep Packet Inspection

Deep Packet Inspection (DPI) is a process that examines the data within network packets to determine their content, source, and destination. In the video, the Sophos XGS 2100 uses DPI to scan traffic for potential security threats such as exploits and malware, providing an additional layer of network security beyond basic firewall functions.

💡Surface Access Points

Surface Access Points are wireless networking devices that extend the coverage and capabilities of a Wi-Fi network. The video mentions that the presenter has connected two new access points to their home network, managed entirely by the Sophos XGS 2100 firewall. This setup allows for centralized management of Wi-Fi, enhancing the ease and efficiency of network administration.

💡Rackmount

A rackmount is a standardized mounting system for mounting hardware devices, such as servers and networking equipment, in a data center or server room. The Sophos XGS 2100 is described as a rackmount device, indicating that it is designed to be installed in a 19-inch equipment rack, which is a common practice for organizing and managing data center equipment efficiently.

💡Gigabit Ethernet Ports

Gigabit Ethernet Ports are high-speed network connections capable of transferring data at a rate of 1 billion bits (1 gigabit) per second. The Sophos XGS 2100 features eight gigabit Ethernet ports, which are fully programmable and can be configured for various network functions. This high-speed connectivity is essential for modern networks that require fast data transfer rates.

💡SFP Plus Modules

SFP Plus Modules are hot-pluggable transceivers used for both telecommunication and data communications applications. The video mentions that the Sophos XGS 2100 has two SFP Plus modules, which support one gigabit speeds. However, the presenter also orders a 4-part SFP Plus Flexi Port Module to support 10 gigabit connections, demonstrating an upgrade in network capacity and speed.

💡Network Zones

Network Zones are logical divisions within a network that help in organizing and managing network traffic based on security policies. In the video, the presenter configures different network zones (LAN and DMZ) on the firewall to control traffic and apply security rules, such as isolating servers from the rest of the home network and applying specific access controls.

💡Firewall Rules

Firewall Rules define the criteria for network traffic that is allowed or blocked by the firewall. The video discusses how the presenter sets up various firewall rules to control access to different parts of the network, such as allowing only authenticated users to access servers or permitting specific services like a Minecraft server to be accessible by all.

💡Authentication

Authentication in the context of networking is the process of verifying the identity of users or devices on a network. The video explains that the Sophos XGS 2100 can be configured to require authentication for certain network access, ensuring that only authorized users can access specific resources, such as the presenter's servers.

💡SD-WAN

SD-WAN stands for Software-Defined Wide Area Network, a technology that abstracts the network hardware and allows for centralized management of the network. The video briefly mentions that the Sophos XGS 2100 can accelerate traffic and perform SD-WAN functions, suggesting that it can optimize and manage wide area network traffic efficiently.

Highlights

Introduction of the Sophos XG 2100 next generation firewall for home server network protection.

The firewall's capability to manage and protect critical servers and scan network traffic for threats.

Integration of two new Surface Access Points for home Wi-Fi, managed by the firewall.

Discussion on the importance of firewall solutions in home labs and a survey of Twitter responses.

Overview of the advanced features of the Sophos XG firewall, especially the Surface XG.

Unboxing and setup process of the Sophos XG 2100 appliance.

Explanation of the firewall's programmable gigabit Ethernet ports and SFP plus modules.

Installation of a 10 gigabit SFP plus flexi port module for enhanced network capabilities.

Introduction of Sophos access points and their management through the firewall.

Physical setup of the firewall in the server rack and initial configuration.

Network configuration detailing the creation of layer 2 bridge interfaces and IP address assignments.

Explanation of network zoning and its role in traffic control and server protection.

Firewall rule creation for controlling access to servers and services within the home network.

Authentication requirements for accessing servers through the firewall.

Demonstration of how to manage Wi-Fi access points through the firewall's wireless dashboard.

Discussion on the benefits of network separation for security and traffic control.

Overview of the firewall's advanced threat detection capabilities, including IPS, malware scanning, and AI.

Recommendations for home lab network protection and the use of firewall systems.

Conclusion and a tease for future content related to Sophos products and home lab updates.

Transcripts

play00:00

[Music]

play00:00

this is the sophos xgs 2100

play00:03

a powerful next generation firewall that

play00:06

i just added to my new home server rack

play00:08

it connects all the devices in my

play00:10

network and protects my critical servers

play00:12

it also scans the traffic in my home

play00:14

network to detect exploits and malware

play00:16

through deep packet inspection

play00:18

absolutely amazing stuff and i also

play00:20

connected two new surface access points

play00:23

that are powering my wifi at home the

play00:25

firewall entirely manages these devices

play00:27

and that's making my wireless and

play00:29

network management extremely easy and

play00:32

comfortable at home

play00:33

by the way i recently made a twitter

play00:35

post where i asked you guys if you're

play00:36

already using a firewall solution in

play00:38

your home lab and it seems like many

play00:41

people don't but at least plan to do it

play00:44

so i hope this will be very interesting

play00:46

for you guys who aren't already familiar

play00:47

with firewalls but also if you are

play00:50

already using pfsense or opensense for

play00:52

example you still might want to watch

play00:54

because i want to show you some

play00:55

conceptual ideas and how i've structured

play00:58

my home network and of course talk about

play01:00

some of the advanced features firewalls

play01:02

especially the surface xg can do and i'm

play01:05

really excited about the new surface xgs

play01:08

rack devices they are just fantastic so

play01:10

many thanks to sophos for sending me

play01:13

these devices

play01:15

and let's let's start unboxing them so

play01:17

there are some smaller packages here i

play01:19

just need to put away for a second

play01:21

because i just want to start with the

play01:23

biggest one

play01:28

so this is it

play01:30

oh man

play01:31

so this one is really heavy and this

play01:33

contains my new firewall device so let's

play01:35

unbox it

play01:38

[Music]

play01:43

i i guess this won't be the firewall

play01:47

it's a getting started guide

play01:51

and this ethernet cable what should i do

play01:54

with this

play01:56

okay so let's put this aside for a while

play01:59

and unbox the firewall

play02:05

so here we have the software xgs 2100 so

play02:08

this will power all the network devices

play02:10

and control the traffic in my home

play02:12

network it is the latest series of sofas

play02:15

xg appliances while this is by the way

play02:17

the smallest one for the rackmounts

play02:19

it has eight gigabit ethernet ports

play02:21

which are fully programmable so you can

play02:24

configure them as local network ports

play02:25

you can configure them as bridges up

play02:27

links to internet vlan tags and so on so

play02:30

really cool stuff and it also has some

play02:32

two sfp plus modules but as far as i

play02:35

know they only support one gigabit so

play02:37

that's why i ordered another box

play02:40

so here we have a four part sfp plus

play02:43

flexi port module for the surface xgs

play02:45

which supports 10 gigabit so this module

play02:48

can be plugged into the xgs to extend

play02:51

the parts and the functionalities and

play02:53

there are also other flexi ports for

play02:55

these devices which have additional

play02:57

ethernet ports for example or this one

play02:59

here like sfp plus modules depending on

play03:02

what you need and into the flexipod i

play03:04

will put these for 10 gigabit uh jibbix

play03:07

so i hope that will all work because

play03:09

this is the first time i am playing

play03:11

around with 10 gigabit but i probably

play03:13

will do a separate video on this if

play03:15

that's something you're interested in so

play03:17

um stay tuned for that

play03:20

i've also ordered access points from

play03:22

software so in case you don't know it

play03:24

sophos has also access point that you

play03:26

can connect and manage directly in the

play03:28

firewall you can also do this with your

play03:30

surface xg home license by the way or

play03:32

you can control these access points in

play03:35

software central in the cloud so they

play03:37

aren't always the cheapest but you can

play03:38

get them in various ranges from small

play03:41

office access points to some bigger ones

play03:43

but i just ordered them to replace my

play03:45

old access points in my network so the

play03:47

most exciting part for me is absolutely

play03:50

this device here the surface xgs so

play03:52

let's get this thing into my server rack

play03:59

[Music]

play04:00

[Applause]

play04:02

[Music]

play04:04

[Applause]

play04:06

[Music]

play04:09

okay so that is what i've done the last

play04:11

weeks and i think the new firewall

play04:12

appliance just looks amazing in this

play04:14

server rack i've now connected

play04:16

everything and i've done the basic setup

play04:18

and as i said in the past i was running

play04:20

the sofas xg as a virtual machine inside

play04:22

my proxmox server

play04:24

this one here and there were two network

play04:27

cards in the server which i had

play04:28

connected to the virtual firewall one

play04:31

for the local network that i connected

play04:32

to my switch and one for the internet

play04:35

connection and now that isn't needed

play04:37

anymore because i now have the firewall

play04:39

as a physical hardware appliance here

play04:41

and i now have the freedom to use and

play04:42

configure all the ethernet ports and the

play04:44

flexi port module exactly how i want

play04:47

that of course gives me much more

play04:49

flexibility to test specific scenarios

play04:51

isolate my network and create separate

play04:53

firewall rules on all these interfaces

play04:55

for example i have connected my switch

play04:57

to the first port on the surface xg to

play05:00

connect all my ethernet devices in my

play05:02

house it doesn't need much speed because

play05:04

these are mostly things like printers

play05:06

laptops or my philips hue bridge for

play05:08

example and i've also connected my poe

play05:10

switch to the fourth part of the

play05:12

firewall and these two ports are bridged

play05:14

together so that means they are in the

play05:16

same local network this is important to

play05:19

keep in mind because i also connected my

play05:20

servers directly to the firewall by

play05:22

using this flexi port module which is a

play05:24

10 gigabit one and these ports on the

play05:26

flexi port module are also bridged

play05:28

together so they are in the same server

play05:30

network and they can talk to each other

play05:32

but not on the same network as my

play05:34

switches so i've put these ports into

play05:37

two different zones on the fireball

play05:38

because then i can better control which

play05:40

traffic is allowed to come in and go out

play05:42

and i also can create firewall rules to

play05:44

do malware scanning or traffic filtering

play05:46

to better protect and isolate my servers

play05:49

from the rest of the network and this is

play05:51

really cool let me explain this in more

play05:52

detail and how you generally configure

play05:54

things like that on the firewall

play05:57

[Music]

play05:59

when i set up a new firewall first i

play06:01

usually configure some general settings

play06:03

like the initial deployment the

play06:05

licensing downloading the latest

play06:07

firmware and so on and i don't think i

play06:09

need to walk you through all of this

play06:10

stuff because this is actually very

play06:12

straightforward to set up the

play06:14

interesting part i want to show you is

play06:16

the network and interface configuration

play06:18

that i changed on the firewall so first

play06:20

i created a layer 2 bridge interface

play06:22

with the name lan underscore br and i

play06:25

bound the ports 1 and the port 4

play06:27

together remember the first port goes to

play06:29

my switch and the second goes to my pue

play06:32

switch which i have connected my home

play06:34

devices to i've put both ports into the

play06:36

lan zone and added the 10.10 ipv4

play06:39

network with a subnet mask of 16 to this

play06:42

interface and this gives me a really

play06:44

huge ip address range for my home

play06:46

network not that i need it for anything

play06:48

but yeah it just looks nice the second

play06:51

layer 2 bridge that i created is called

play06:53

dmz underscore vr and that bounce all

play06:56

the 10 gigabit ports on the firewall

play06:58

together i've put them all in the dmz

play07:00

zone in the 10.20 network also with a

play07:03

subnet mask of 16. this connects my

play07:05

servers the virtual machines the nas and

play07:08

everything like this i mostly use static

play07:11

ip addresses for all of these machines

play07:12

that are also managed on the firewall so

play07:15

all of my servers are assigned to groups

play07:17

here which contain the ip addresses for

play07:19

the actual servers there later can use

play07:21

these objects in the firewall rules to

play07:23

define the access to my internal server

play07:26

network i later also might differentiate

play07:28

this further into vlans because i want

play07:30

to put several vms on my proxmox server

play07:32

into different networks but this is a

play07:35

project for upcoming videos currently

play07:37

putting all of these servers into one

play07:38

single network is fine the main reason

play07:41

why i'm doing all of this is i want to

play07:43

isolate my servers from the rest of my

play07:45

home network and control with firewall

play07:47

rules which services and ip addresses

play07:49

can be accessed because as you probably

play07:52

know a firewall system like this only

play07:54

allows traffic to pass through if a

play07:56

fireball rule matches this specific

play07:58

traffic for example i have created one

play08:01

firewall rule that allows all devices

play08:03

from my lan and the dmz zone to connect

play08:05

to the lan zone but not anywhere else

play08:08

this just allows basic internet access

play08:10

for all of the devices in my network but

play08:12

if i want to connect from my pc which is

play08:14

in the lan zone to my servers which are

play08:16

in the dmz zone i need another fireball

play08:19

rule to specifically allow this and

play08:21

because i don't want everyone in my home

play08:23

network to access my servers i created

play08:25

another firewall rule where i defined

play08:27

that only authenticated users are

play08:29

allowed to connect from the lan zone to

play08:31

any target in the dmz zone with that

play08:34

firewall rule i'm ensuring that only

play08:36

administrators have full access to my

play08:38

servers mainly this is a fiber rule just

play08:40

for me because i'm the only

play08:42

administrator in my home network but the

play08:44

interesting part here is that the

play08:46

surface xg doesn't just work with ip

play08:48

addresses and zones it can also allow

play08:50

traffic based on users so when i want to

play08:53

access my servers i always need to

play08:55

authenticate with the software's client

play08:56

on my pc first to match this firewall

play08:59

rule and access my servers now in a

play09:01

typical company environment you might

play09:03

also have external authentication

play09:05

providers you can set up in the firewall

play09:07

so for example you can create a

play09:09

connection to an active directory or to

play09:11

an ldap to authenticate users to the

play09:13

firewall and even synchronize the

play09:15

authentication with a software's

play09:17

endpoint client and this works even in

play09:19

large environments in networks with

play09:20

thousands of users and this is perfect

play09:23

to add another layer of protection to

play09:25

your network stack

play09:26

however i still might want to allow

play09:29

unauthorized traffic in some cases

play09:31

because my servers are also running some

play09:33

workloads that should be accessible for

play09:35

everyone in my home network so for

play09:37

example this is my password manager i've

play09:39

set up or my minecraft server that i

play09:41

want to play on with my son so i have

play09:43

created other firewall rules and this

play09:45

allows access to my servers even when

play09:47

the user is not authenticated but only

play09:49

to specific ip addresses and ports

play09:52

so this can give anyone access to

play09:54

specific services and workloads running

play09:56

on my virtual servers or maybe i could

play09:58

also configure access to my storage

play10:00

server if i'd like to do file sharing

play10:02

with other pcs and so on

play10:04

the point is that when you set up or

play10:06

allow unauthorized access on your

play10:08

firewall you should at least always

play10:10

limit your ip addresses and services or

play10:12

protocols which are permitted so for

play10:15

example with these firewall rules

play10:17

everyone in my home network can connect

play10:18

to my minecraft server but not to the

play10:21

ssh port

play10:23

but this is not all the surface xg

play10:24

firewall does just look at ip addresses

play10:27

and ports it can also look inside the

play10:29

network protocol stack and is able to

play10:31

detect malicious patterns exploits

play10:33

malware and so on now this is possible

play10:36

because the software's engineers

play10:37

included a bunch of different scanning

play10:39

engines into this system which are all

play10:41

handled by the new extreme architecture

play10:44

and this is a high performant

play10:45

architecture that can decrypt and scan

play10:47

https traffic with the latest protocols

play10:50

it can detect and block malware by

play10:52

including sandboxing and artificial

play10:54

intelligence and you can also accelerate

play10:56

traffic and do things like sd-wan or

play10:59

prioritization of application and

play11:00

protocols now i get this is overwhelming

play11:03

to explain all of this stuff i probably

play11:05

would need a full one hour long video

play11:07

again but to give you a brief overview

play11:09

of what it does you can enable any of

play11:12

these protection features per firewall

play11:14

rule so you can for example use the ips

play11:17

engine to scan the network traffic to

play11:18

your servers and search for specific

play11:21

exploits

play11:22

do you still remember the recent lock

play11:24

for jail vulnerability for example so

play11:26

that incidents where so many java

play11:27

applications were affected with so in

play11:30

the surface xg there are ips patterns

play11:32

that can detect and block this

play11:34

particular exploit and if you enable

play11:36

this ips policy in your firewall rule

play11:38

that allows traffic to your servers the

play11:41

fireball will detect and block these

play11:43

specific attacks even before they ever

play11:45

reach your servers

play11:46

and just like this example there are

play11:48

many many more of these well-known ips

play11:50

signatures surface maintains for the

play11:52

firewall i don't want to go into too

play11:54

much detail here because there's so much

play11:57

you can do with this i already made a

play11:59

video about the surface xg home version

play12:00

on my proxmox server which you can set

play12:02

up entirely for free by the way and in

play12:04

this one i covered some of the advanced

play12:07

filtering engines like the web

play12:08

protection the application protection

play12:11

and so on

play12:12

and from a software or protection site

play12:14

there is just a very minimal difference

play12:16

between the virtual version and the

play12:18

hardware appliance here the features on

play12:20

the system are actually the same the

play12:22

only advantage the firewall appliance

play12:24

has it is optimized for these computing

play12:27

tasks so when you have a lot of scanning

play12:29

engines enabled in your firewall rule

play12:31

the hardware appliance will accelerate

play12:34

and offload this traffic a bit more

play12:36

efficient than the virtual ones anyway i

play12:38

think i have explained the most

play12:40

important concept here and that is to

play12:42

separate your network this is really the

play12:45

foundation for a good security concept

play12:47

because if you're putting everything on

play12:49

one single network the firewall is never

play12:51

in control of this internal traffic and

play12:53

you can't effectively protect your

play12:55

critical services so here the surface

play12:58

xgs really helps me a lot because i can

play13:00

put everything on a different interface

play13:02

and i can bound interfaces together and

play13:05

put them in different network zones and

play13:07

i know creating fiber rules for every

play13:09

traffic and every protocol and

play13:10

everything in your home network that can

play13:12

be a challenge but it is absolutely

play13:15

vital to protect your servers and this

play13:17

is a great practice for everyone who

play13:19

needs to administrate networks and

play13:21

companies so i can just encourage you

play13:23

start looking into firewall systems for

play13:25

your home lab it doesn't need to be

play13:27

complicated but you can just start

play13:29

somewhere and then as your knowledge

play13:31

expands you can also think about new

play13:32

security policies or firewall rules

play13:34

you're setting up

play13:36

okay so enough for firewall rules it was

play13:38

a lot but let me also show you what i'm

play13:40

using the surface xgs4 to manage my wifi

play13:43

access points in my home network because

play13:45

this is also a feature that is extremely

play13:47

useful it is not very complex to explain

play13:50

so we can just go through this very

play13:51

quickly but this is actually the point

play13:54

it should be as simple as possible

play13:56

the only thing i needed to do to set up

play13:58

my new access points is to enable the

play14:00

wi-fi in the zone that is attached to

play14:03

the poe switch in my case the lan zone

play14:05

and then i just connected my access

play14:07

points to my poe switch and they will

play14:09

automatically show up in the software's

play14:11

x2u wireless dashboard all these access

play14:14

points are controllable through this

play14:15

dashboard so you can group them you can

play14:18

set up things like the ssid the password

play14:20

the wifi channels and all of this stuff

play14:22

all the changes are applied to the

play14:23

selected access points remotely so you

play14:26

don't have any web interface where you

play14:27

need to go and configure them one by one

play14:30

and this is absolutely fantastic of

play14:32

course i have configured some other

play14:33

things on the firewall as well but i'm

play14:35

still not finished with all of it

play14:37

because i'm going to change a lot of

play14:38

things here like adding new servers and

play14:41

i want to change my network switches and

play14:43

so on uh by the way there's something

play14:45

really interesting for you sophos fans

play14:46

coming i don't want to talk about it too

play14:48

much right now but i hope this video

play14:50

already gave you some ideas and

play14:52

inspiration about protecting your

play14:53

network and why it's always a great idea

play14:56

to have such a firewall again i just

play14:58

want to say if you are interested in

play14:59

buying these firewall appliances this

play15:02

device here is an absolute overkill for

play15:04

usual home lab and as i've told you i've

play15:07

done many setups with virtual surface

play15:09

xg's and free home licenses which i was

play15:12

running before myself so if you want to

play15:13

check out how you can use the sofas xg

play15:15

at home as a virtual machine for example

play15:17

and if you want to have a deep dive into

play15:19

setting up tls inspection network

play15:22

protection and other firewall rules

play15:24

check out my other video that i did some

play15:26

time ago about the surface xg and if i

play15:28

will change something interesting in my

play15:29

home lab be sure that i will let you

play15:31

know anyway thank you so much for

play15:33

watching everybody take care and i will

play15:35

catch you in the next video bye bye

play15:38

i will let you know anyway thank you so

play15:40

much for watching everybody take care

play15:42

and i will catch you in the next video

play15:43

bye

Rate This

5.0 / 5 (0 votes)

Ähnliche Tags
Network SecurityFirewall SetupHome ServerWi-Fi ManagementSophos XGCyber ProtectionTech ReviewHome LabNetwork DevicesSecurity Features
Benötigen Sie eine Zusammenfassung auf Englisch?