====== Sophos SG105 ====== The Sophos SG105 comes pre-installed with the (older) UTM 9 firmware, the XG105 comes pre-installed with the (newer) XG Firewall firmware. Both version are being maintained by Sophos. I purchased the SG105 and activated a home use license for UTM 9.4, and then later upgraded to the XG Firewall. Both are not trivial as Sophos does not allow to activate or install a home use license on Sophos hardware appliances (something I did not realize when I ordered the appliance), but I found workarounds for both, which are explained below. I purchased the device from [[https://www.corporatearmor.com|Corporate Armor]] in the USA and had it shipped to a US address. Currently, the price is 340 USD. ===== Initial Setup with existing UTM9 firmware ===== The fastest way is to utilize the installed firmware, but note that the firmware does not allow to be activated with a free home use license. Follow the guide below for a work around. If you are a home user, buy the SG105 without any license. This is called a "basic license" in Sophos terms, but make sure your supplier provides an activation key. After setting up your base license, you need to get SSH access or connect a terminal, before you can register a home use license. Here are the necessary steps: - Download the firmware for [[https://www.sophos.com/en-us/products/free-tools/sophos-utm-home-edition.aspx|Sophos UTM Home Edition]] and install it in a VM to test - Go to the [[https://myutm.sophos.com|MyUTM]] portal, create a MyUTM Account, and login - After login, click "Create a new License", then "Create and use contact set", after which you can create a home use license - To activate the SG105 appliance hardware (or any other Sophos hardware), you need to do the same but create a license by entering your activation key "ACT-SGHxxx-xxx" - After saving the license files,navigate to the appliance at https://192.168.0.1:4444, which will take you through the inital setup wizard - Upload the license file created for the SG105 - Enable SSH access and create the passwords for "root" and "loginuser" - Open an SSH connection to the appliance and rename the file "/etc/asg" to eg. "/etc/asg-basic" - Reconnect to https://192.168.0.1:4444 and upload the license file created for home use ===== Initial Setup clean install with XG Firewall firmware ===== Activation for XG Firewall is fundamentally different from the one for UTM9: - Download the firmware for [[https://www.sophos.com/en-us/products/free-tools/sophos-xg-firewall-home-edition.aspx|Sophos XG Firewall Home Edition]] and install it in a VM to test - Create a VM with dynamic size equal or slightly smaller than the SSD which comes with the appliance. In my SG105 is a Transcend SSD370, the size is slightly larger than 61057 MB, so I created the VM with size 61057 MB. - Enable all 4 network adapters, but you can leave them as "not attached" - Connect the firmware iso and boot into the installer. When the installation is finished, the installer asks to detach the installation iso and reboot. DO NOT REBOOT AT THIS TIME, just power off the VM. - Connect the SSD of the hardware appliance to the computer running the VM, make sure that the host does not utilize this SSD, and attach the SSD to the VM. Make sure that the VM harddisk and the SSD are attached to a SATA controller. For this to work on a Windows host you need to run the VM as administrator. For VirtualBox you need to open a CLI as administrator and run the following command, other Virtualizers such as VMware allow to attach a raw drive in their UI.VBoxManage internalcommands createrawvmdk -filename "C:\Users\\VirtualBox VMs\\.vmdk" -rawdisk \\.\PhysicalDrive#Find the PhysicalDrive# from Control Panel --> Administrative Tools --> Computer Management - Attach any live linux distro iso to the DVD drive of the VM, and boot into the live linux system and enter a CLI. - Verify that the live linux recognizes the VM drive with the pre-installed XG Firewall as sda and the raw attached SSD as sdb (use fdisk -l) - Copy the entire VM drive to the SSD withdd if=/dev/sda of=/dev/sdb bs=1m - If you want to avoid to attach the SSD of the appliance to the VM. you can alternatively do the following: Copy the entire VM drive to a file on a USB drive withdd if=/dev/sda of=/mount/point/of/usb/sophosfw bs=1mthen create a bootable USB with any live linux distro on it and plug it into the SG105 and boot into a CLI and enterdd if=/mount/point/of/usb/sophosfw of=/dev/sda bs=1mThis takes longer but leads to the same result. - After the firmware is copied to the SSD, boot the SG105, and follow the [[https://www.sophos.com/en-us/medialibrary/PDFs/documentation/SophosFirewall/Sophos-Firewall-Software-Appliance---Getting-Started-Guide.pdf?la=en|Getting Started Guide]] for a Sophos Firewall Software Appliance. There is a note in the guide, that "SF OS using Software Appliance ISO can be installed on SG and XG series appliances after deleting hard drive partitions from the devices.", but this seems to work only with paid subscriptions, not with the home use license. ===== Links ===== ==== Sophos ==== * [[https://myutm.sophos.com|MyUTM for UTM 9 appliances]] * [[https://secure2.sophos.com|MySophos for XG Firewall appliances]] * [[https://www.sophos.com/en-us/medialibrary/PDFs/documentation/SophosFirewall/Sophos-Firewall-Software-Appliance---Getting-Started-Guide.pdf?la=en|Getting Started Guide]] * [[https://www.sophos.com/en-us/medialibrary/PDFs/documentation/Sophos-XG-Firewall-Administrator-Guide.pdf?la=en|Sophos XG Firewall Administrator Guide v15.01.0]] ==== Community ==== * [[https://community.sophos.com/products/unified-threat-management/f/52/t/29972|Change loginuser/root passwords and login to SSH on UTM/Astaro Security Gateway]] * [[https://community.sophos.com/products/unified-threat-management/f/52/t/29972|free private license for appliance]] * [[https://community.sophos.com/products/unified-threat-management/f/52/t/29720|Home Use License on UTM appliance?]] * [[https://www.howtoforge.com/converting-a-vmware-image-to-a-physical-machine|Converting A VMware Image To A Physical Machine]] * [[http://www.serverwatch.com/server-tutorials/using-a-physical-hard-drive-with-a-virtualbox-vm.html|Using a Physical Hard Drive with a VirtualBox VM]]