So I was playing with certificates on the Sophos XG the other night in the hopes to publish a PRTG server through the firewall and test out the authentication and other features but in my stupidity I decided to apply a certificate to the UTM appliance itself which was invalid. I had somehow managed to import and select the wrong certificate from my machine, which was used to authenticate me as a person against StartCom where I’d got a free SSL certificate from, and completely locked myself out of the firewall admin portal *sadface*
Maps and dashboards. Visualize your network using real-time maps with live status information. Create dashboards with the PRTG map designer, and integrate all your network components using more than 300 different map objects such as device and status icons, traffic charts, top lists, and more. Can you please tell me how to integrate PRTG in Sophos XG firewall. I tried almost any thing but the PRTG is not working with XG Firewall. SOPHOS-XG-MIB. Sophos XG 135 and Sophos XG 135w. These powerful firewall appliances (Sophos XG 135 and Sophos XG 135w) offer 1U performance with a desktop form factor and price. If you have a small business or branch offices to protect and are working on a tight budget, these models are the ideal choice. XG + Sophos connect VPN client: some users are having frequent drops to RDP sessions. I had my boss (who is having issues) and myself both open connections to the same rdp server while using this client.
Certificate I’d imported into the XG
When trying to access the portal on port 4444 I was greeted with errors in Chrome, IE and Firefox relating to an invalid certificate. I tried lowering all possible security settings on the browsers to no avail and ended up conceding that I’d have to bin the XG and start from a fresh build unless I found a way back in by some miracle.
“172.16.0.2 normally uses encryption to protect your information. When Google Chrome tried to connect to 172.16.0.2 this time, the website sent back unusual and incorrect credentials. This may happen when an attacker is trying to pretend to be 172.16.0.2, or a Wi-Fi sign-in screen has interrupted the connection. Your information is still secure because Google Chrome stopped the connection before any data was exchanged.
You cannot visit 172.16.0.2 at the moment because the website sent scrambled credentials that Google Chrome cannot process. Network errors and attacks are usually temporary, so this page will probably work later.”
Errors in IE and Chrome
As a last ditch hope I popped a message on the Sophos community forums and within the hour I’d had a suggestion: SSH into the XG and follow the on screen prompts using options 2 and 4. This regenerated an admin portal certificate and voila, I was back in!
Prtg Sophos Xg
Prtg Sophos Xg Template
SSH access to the XG firewall
Prtg Sophos Utm Ipsec
So, if you’re completely stuck with your Sophos XG, try using SSH to access it and explore the options there.