Sophos Firewall OS v19.0.2 Guidance Supplement v0.5
Sophos Firewall OS v19.0.2 Guidance Supplement v0.5
Sophos Firewall OS
v19.0.2
Guidance
Documentation
Supplement
Evaluation Assurance Level (EAL): EAL4+
Document Version: 0.5
Revision History
Version Modification Date Modified By Description of Changes
0.1 2022-06-01 Manil Trivedi Initial draft.
Corrected TOE version number from v19.0 to v19.0.0 in all cases
Clarified that this document will be co-located with the TOE upon
publication.
Added missing XGS 7500/8500 Quick Start Guide to Table 2
Added Section 3.1.8 User Interfaces
0.2 2023-04-05 Ryan Butler
Added Section 3.1.9 TOE Modes of Operation
Updated list of excluded features in Section 3.2
Removed section 3.3.1.3
General clarity fixes
Updated Corsec mailing address on cover page and final page
Updated Version to 19.0.2
Added section 3.1.10
0.3 2023-05-18 Cole Murphy
Removed section 3.3.1.4
Added section 3.3.4 Troubleshooting and following subsections
Document changed to Sophos Firewall 19.0 Help and date
0.4 2023-06-26 Cole Murphy generated added to the description in Table 1.
Syslog Server Connection info added to 3.3.1.2
0.5 2023-11-16 Iain Holness Updates as per OCSI comments
Table of Contents
1. Introduction ................................................................................................................................................ 4
1.1 Purpose .............................................................................................................................................. 4
1.2 Target Audience .................................................................................................................................. 5
1.3 Evaluated TOE Configuration............................................................................................................... 5
1.4 Assumptions ....................................................................................................................................... 6
2. Installation Procedure ................................................................................................................................. 7
2.1 Introduction ........................................................................................................................................ 7
2.2 Secure Installation .............................................................................................................................. 7
2.2.1 Phase 1 – Initial Preparation ....................................................................................................... 7
2.2.2 Phase 2 – Installation of the TOE ................................................................................................. 9
2.2.3 Phase 3 – Evaluated Configuration of the TOE........................................................................... 12
3. Administrative Guidance ........................................................................................................................... 14
3.1 Clarifications ..................................................................................................................................... 14
3.1.1 Web Browser ............................................................................................................................ 14
3.1.2 Login Page Options ................................................................................................................... 14
3.1.3 Updates .................................................................................................................................... 14
3.1.4 Setting Appliance Access........................................................................................................... 14
3.1.5 SSL Certificate ........................................................................................................................... 15
3.1.6 Changing Passwords ................................................................................................................. 16
3.1.7 Administrator Profiles............................................................................................................... 17
3.1.8 User Interfaces ......................................................................................................................... 17
3.1.9 TOE Modes of Operation .......................................................................................................... 17
3.1.10 HTTPS Port Number Login Authentication ................................................................................. 17
3.2 Exclusions ......................................................................................................................................... 18
3.3 Additions .......................................................................................................................................... 18
3.3.1 Additional Configurations ......................................................................................................... 18
3.3.2 Reporting product Flaws ........................................................................................................... 19
3.3.3 Security Relevant Events........................................................................................................... 19
3.3.4 Troubleshooting ....................................................................................................................... 20
4. Acronyms and Terms ................................................................................................................................. 21
List of Tables
Table 1 – TOE Guidance Documents..................................................................................................................... 4
Table 2 – Additional TOE Installation Documents ................................................................................................. 5
List of Figures
Figure 1 – Hardware Configuration of the TOE Boundary ..................................................................................... 5
Figure 2 – Virtual Configuration of the TOE Boundary .......................................................................................... 6
1. Introduction
The Target of Evaluation (TOE) is the Sophos Ltd. (Sophos) Sophos Firewall OS v19.0.2. The TOE is a Unified Threat
Management solution with firewall and gateway functionality that runs on Sophos XGS series hardware appliances
and virtual appliances. The TOE is installed on a network whenever firewall services are required.
1.1 Purpose
This document provides guidance on the secure installation and secure use of the TOE for the Common Criteria
Evaluation Assurance Level EAL4 Evaluated Configuration. This document provides clarifications and changes to
the Sophos documentation and should be used as the guiding document for the installation and administration of
the TOE in the Common Criteria-evaluated configuration. The official Sophos documentation should be referred
to and followed only as directed within this document.
This document is co-located with the downloadable TOE on the Sophos Licensing Portal 1
The documents listed in Table 1 are the general Sophos Firewall OS guidance documents relevant to the use of
the TOE. Table 2 lists additional documents relevant to the installation of the TOE.
Table 1 – TOE Guidance Documents
Document Name Description Short Weblink / SHA-256 checksum
reference
Sophos Firewall 19.0 Contains detailed [AdminGuide] URL:
Help steps for how to https://docs.sophos.com/nsg/other/RegulatoryCompliance/files/sophosfirewall/
properly Sophos%20Firewall%20_19.0.pdf
configure and
maintain the TOE. SHA256:
Generated on 3534013e586e269f003239674ebe2cb3050942e041c0bed8b19d65
June 15, 2022. ba185719b0
1
https://www.sophos.com/en-us/support/downloads/firewall-installers
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 4 of 22
Guidance Supplement, Version 0.5 November 16, 2023
2 Please note that Quick Start Guides do not have explicit version numbers. They describe prerequisites on how to set up hardware appliances and are
1.4 Assumptions
This section describes the security aspects of the intended environment for the evaluated TOE. The operational
environment must be managed in accordance with assurance requirement documentation for delivery, operation,
and user guidance. Table 3 lists the specific conditions that are required to ensure the security of the TOE and are
assumed to exist in an environment where this TOE is employed.
Table 3 - Assumptions
Name Description
A.AUDIT It is assumed that the IT environment will provide a syslog server and a means to present a readable view of the audit data.
A.GENPUR It is assumed that the TOE will only store and execute security-relevant applications and only store data required for its secure
operation.
A.NETCON It is assumed that the TOE environment will provide the network connectivity required to allow the TOE to perform its
intended function.
A.NOEVIL It is assumed that the TOE users are non-hostile, well trained, and follow all documentation related to the TOE.
A.PHYSEC It is assumed that the TOE is physically secure in a controlled environment and only TOE users gain physical access to the TOE.
A.SINGEN It is assumed that information will not flow between the two networks unless it passes through the TOE.
2. Installation Procedure
This section describes the installation procedure notes and changes.
2.1 Introduction
This section describes the general installation procedures of Sophos Firewall OS hardware and virtual appliances.
For the hardware and virtual installation requirements, the quick start guides are the relevant documents (see
Table 2: Additional TOE Installation documents).
3
https://www.sophos.com/en-us/support/downloads/firewall-installers
4 HTTPS – Hyper Text Transfer Protocol
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 7 of 22
Guidance Supplement, Version 0.5 November 16, 2023
• An external syslog server – remote computer running a syslog daemon for storing audit logs
• An uninterruptible power supply (UPS)
Components Required for the TOE Virtual Configuration (VMWare ESX/ESXI, KVM, Hyper‐V and XenApp)
In the TOE virtual configuration, the TOE runs on a virtual machine (VM) created using virtualization software
installed on a GPC. The following components are required for such an installation:
• A GPC that complies with the base virtual hardware configuration defined in “Deployment Options >
Virtual” [AdminGuide p.75]. If this minimum hardware requirement configuration is not met, the Sophos
virtual appliances will go into “FAILSAFE” mode, implications of which are described in the following
Sophos Knowledge Base Article (https://support.sophos.com/support/s/article/KB-
000036376?language=en_US ).
• VMware ESX/ESXi
o VMware ESX/ESXi v5.0 or later installed on the GPC specified above.
o VMware vSphere Client installed on a Windows machine to connect to the VM from the GPC.
• KVM
o x86 machine running a recent Linux kernel on an Intel (recommended) processor with VT
(virtualization technology) extensions, or an AMD processor with SVM 5 extensions (also called
AMD-V).
o Use commands given below to check if your CPU supports Intel VT or AMD‐V:
o For Intel VT: grep ‐‐color vmx /proc/cpuinfo
o For AMD‐V: grep ‐‐color svm /proc/cpuinfo
o Install Virtual Machine Manager (virt‐manager), a desktop Graphical User Interface (GUI)
application for managing Kernel Based Virtual Machines.
• Hyper‐V
o Make sure that Microsoft Hyper -V Server 2012 R2/2016 has been installed in your network.
• XenApp
o Make sure that XenServer has been installed in your network.
o Install XenCenter, a desktop Graphical User Interface (GUI) application for managing XenServer.
• The TOE firmware downloaded from the "Licensing Portal 6" customer portal.
• A management computer – GPC with one of the following web browsers (with JavaScript enabled):
o Mozilla Firefox v101.0 or later
o Google Chrome v102 or later
o Apple Safari v15.3 or later
o Microsoft Edge v102 or later
o Opera v93 or later
for HTTPS management sessions:
• An external syslog server – remote computer running a syslog daemon for storing audit logs
• An uninterruptable power supply (UPS)
After the initial setup, administrators must verify the version number of Sophos Firewall OS by navigating to
SYSTEM -> Backup & firmware -> Firmware from the Web Admin Console. The firmware version that is installed
is marked as "active".
7As noted above, there are various Quick Start Guides available, so please select the one that matches with your XGS appliance model.
8 LAN – Local Area Network
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 9 of 22
Guidance Supplement, Version 0.5 November 16, 2023
If the active version is not SFOS 19.0.2 MR-2-Build472, administrators are required to install the certified version.
To do so, the certified version must be downloaded from the "Licensing Portal" customer portal. 9 After clicking
the Download button and accepting the End User License Agreement (EULA) and the export restrictions dialog,
the following ISO10 image can be downloaded:
HW-19.0.2_MR-2-472.iso
SHA256: A67BD740374BA348CD4183AABCB2388FE50F58E5DE6A0E5FF2C9FF8B75188003
After downloading the image verify the checksum of the downloaded image with the one above.
To flash the XGS appliance to the certified version that was just downloaded, the customer must burn the
downloaded ISO image to a bootable USB stick. A detailed description is available in “Reimage Sophos Firewall”
[AdminGuide p. 1806] The basic steps are repeated here for convenience:
Important note: Re-imaging will destroy all the data on the Sophos XGS Firewall, so please ensure that a recent
configuration backup has been created and saved.
1. Burn the ISO image to a bootable USB 11 flash drive
2. Download a tool to make a bootable USB flash drive (e.g., Rufus) with downloaded image of the
Firewall-OS
3. Power-off Sophos Firewall appliance
4. Optionally plug a SVGA12 monitor to the SVGA port of your appliance. This step will help monitor the
installation process. If the Sophos Firewall doesn't have an SVGA port, the installation process can be
monitored using the LCD 13 panel. 14
5. Plug the bootable USB flash drive to the USB port of the appliance
6. Power-on the Sophos Firewall appliance
7. Make sure that USB key is the first boot option in the BIOS 15. To enter the BIOS, press the Delete key
during the booting
8. Save and exit from the BIOS, the appliance will reboot
9. The installer starts to re-image the appliance
10. Monitor the installation progress
11. Once the firmware is installed, remove the USB flash disk and type y to reboot.
12. Once the installation is complete, default factory values are set on the device.
Repeat the steps outlined in Sections 1‐5 of the Sophos [QuickstartHW]. 16You can now access the firewall, which
is accessible by default via https://172.16.16.16 on port 4444. When you first connect to the firewall,
you'll see the splash screen welcoming you to XGS Firewall. From here, you can choose your desired language and
then click to begin.
1. The first step is to set your default administrator ('admin') account password. You will be provided with
guidance on the minimum password requirements and whether you meet them as you type.
9 https://www.sophos.com/en-us/support/downloads/firewall-installers
10 ISO – International Standards Organization
11 USB – Universal Serial Bus
12 SVGA – Super Video Graphics Array
13 LCD – Liquid Crystal Display
14 Only available for selected appliances such as XGS 2100 or higher.
15 BIOS – Basic Input/Output System
16 As noted above, there are various Quick Start Guides available, so please select the one that matches with your XGS appliance model.
2. By default, the latest firmware will be automatically installed at the end of the setup process, if you have
an active Internet connection at the time. It is important to deselect the check box.
3. You will need to agree to the Sophos End User License Agreement or Third-Party License and then you can
click Continue.
4. In the next step, you can rename your firewall (by default it is the device serial number) and select your
time zone.
5. Register the firewall, which requires your Licensing Portal ID and an active Internet connection.
6. Click Continue and you will be connected to the registration portal.
7. Here you will either need to log in using your Sophos ID credentials. You will then be asked to confirm,
and the process will finish by prompting you to synchronize your license with the firewall, which can take
several seconds.
8. Once the license has finished synchronizing, the basic setup process is complete, and you will see your
license details displayed on the screen, including the subscriptions you purchased and their expiry dates.
There is also an option to opt into the customer experience improvement program.
9. Click Skip to Finish to complete setting up your firewall in the main console. That way, you will be skipping
the wizard, which is aimed to help you set up some the security networking essentials (e.g., network
configuration (LAN), on-box wireless setup, network protection features to name just a few).
10. On the login screen, log on to the Web Admin Console as 'admin' using the password you had specified
earlier.
To ensure that indeed the certified version was installed, go to SYSTEM -> Backup & Firmware -> Firmware and
verify that SFOS 19.0.2 MR-2-Build472 is active.
2.2.2.2 Virtual Configuration example VMware ESX/ESXI
The virtual configuration is obtained by installing the TOE and Sophos XGS Firewall Virtual Appliance on a VM
provided by VMware ESX/ESXi v5.0 or later. In the ESX/ESXi example there is limitation of the VMware product
version which must be v5.0 or later to run the Sophos Firewall OS in the evaluated configuration. The next sections
are exemplary guidelines to install the TOE on a VMware ESX/ESXi platform. The installation of the other platforms
KVM, Hyper‐V and XenApp are done in a similar way according to their quick start guidance and corresponding
sections in [AdminGuide].
To install the Sophos XGS Firewall Virtual Appliance, first ensure that the GPC hosting the virtualized environment
is configured with the minimum hardware requirements specified in [AdminGuide]. If these minimum
requirements are not met, the Sophos XGS Firewall Virtual Appliance will go into “FAILSAFE” mode, the
implications of which are described in the following Sophos Knowledge Base Article
(https://support.sophos.com/support/s/article/KB-000036376?language=en_US).
Next, install the VMware ESX/ESXi version 5.0 or later using the installation guide links provided in [AdminGuide].
Once the hardware and VMware have been successfully installed, follow the sections entitled "Step 1" and "Step
2" under "Installation Procedure" in the [AdminGuide]. The virtual appliance ZIP file provided for the VMware
ESX/ESXi 5.0 or higher platforms can be downloaded from the Licensing Portal customer portal: 17
VI-19.0.2_MR-2.VMW-472.zip
SHA256: 11AAC8BA9B95C5A62D5E2E46FC66F58E84F0EC2C5C84288DD4EC9D2A4C45F030
17 https://www.sophos.com/en-us/support/downloads/firewall-installers
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 11 of 22
Guidance Supplement, Version 0.5 November 16, 2023
The virtual appliance ZIP files for the other platforms are available from the same download location:
VI-19.0.2_MR-2.HYV-472.zip
SHA256: 95D115FDDE194FE279CBCE0890B66625BDB1A04053FA44BCC3D259E5D5E02EB6
VI-19.0.2_MR-2.KVM-472.zip
SHA256: 82C90A7C69EFCF6F7B63C015246554230F3117A606B7B02BFAC78A99EEAE13D2
VI-19.0.2_MR-2.XEN-472.zip
SHA256: 093C0C3D3C20529A8782FA417F899EED40FB4EAF0C42E7598D7D612E7D329455
After downloading a ZIP file, verify its checksum with the one above. After the TOE is installed and configured,
follow the steps in "Activating and registering Sophos Firewall" [AdminGuide p. 2207] to register the virtual
appliance. This is required to start up the virtual machine and bring it in a state to start the configuration of the
certified version outlined in Chapter 3.
Important Note: It is preferred that a full license, purchased from Sophos, is used in the deployment of the TOE.
If a trial license must be used in the deployment of the TOE, ensure that the optional “Xstream Protection
Bundle" is activated in order for all features to be available.
6. Check the correct version and hotfix is installed. Using PuTTY, connect via SSH and log in with admin
credentials. Enter 4 and press Enter to access the console. Enter the command system
diagnostics show version-info. Ensure the Firmware Version displays SFOS 19.0.2 MR-2-
Build472 and the Hotfix Tag displays HF050823.1.
When using the TOE in both configurations (hardware and virtual), The TOE must be stored in a secure, access-
controlled facility, with all of the administrative guidelines stated in Table 3 followed.
3. Administrative Guidance
This section provides additional guidance not found in the guides listed in Table 1. Any clarifications, exclusions,
or additions are detailed here to allow the TOE Administrator to properly configure and maintain the evaluated
configuration of the TOE. The TOE Administrator should have successfully completed the installation procedures
listed in section 2 before applying the guidance found in sections 1.1, 3.1, and 3.3.
3.1 Clarifications
This section contains clarifications how to use the security-relevant functions and interfaces described in the
operational user guidance.
3.1.3 Updates
1. Go to SYSTEM > Backup and firmware > Firmware. Scroll down to Latest available firmware and click
Check for new firmware.
2. The new firmware version shows. Click Download next to the version you want. Download takes a few
minutes.
3. After the download is complete, click Install. Sophos Firewall closes all sessions and restarts with the
new firmware version.
The TOE offers the default SSL CA certificate to be downloaded in the form of a compressed .zip file that contains
the following files
• default.pem
• default.der
The filename is a combination of the name of the CA and file extension, pem 21 and der22, respectively. These files
are used for the client-side of the SSL connection, which is outside of the scope of this evaluation. The following
paragraphs describe how to install certificates to the various supported web browsers:
Microsoft Edge
1. Click on the three dots on the top right of the browser window. In the dropdown menu, click Settings.
2. Click on Privacy, search, and services. Scroll down to Security and click on Manage certificates.
3. In the popup window, click the Import button to start the Certificate Import Wizard.
4. Import the Certificate downloaded as described in the first paragraph of 3.1.5 using this wizard.
Firefox
1. In the Menu Bar, click Tools -> Options to display the Options window.
2. Switch to the Advanced tab and then select the Certificates tab.
3. Click View Certificate to display the Certificate Manager window.
4. Switch to the Authorities tab and click Import.
5. Select the Certificate downloaded as described in the first paragraph of 3.1.5, click Open.
6. In the Downloading Certificate window, select Trust this CA to identify websites and click OK.
Google Chrome
1. To the right of the Address Bar, click on Customize and control Google Chrome button and click Settings.
2. Click Show advanced settings and scroll down to HTTPS/SSL.
3. Click Manage Certificates... to display the Certificates window.
4. Switch to the Trusted Root Certification Authorities tab and click the Import button to start the Certificate
Import Wizard.
5. Import the Certificate downloaded as described in the first paragraph of 3.1.5 using this wizard.
Safari
1. Download the SSL CA Certificate as described in the first paragraph of 3.1.5.
2. Once downloaded, double-click the Certificate. This launches Keychain Access and displays a Certificate
Not Trusted warning.
3. Click Always Trust to import the certificate into the Login Keychain.
Opera
1. Click the Opera button on the top left corner of the screen and click Settings.
2. Switch to the Privacy & Security tab.
3. Under HTTPS/SSL, click Manage Certificates… to display the Certificates window.
4. Switch to the Trusted Root Certification Authorities tab and click the Import button to start the Certificate
Import Wizard.
5. Import the Certificate downloaded as described in the first paragraph of 3.1.5 using this wizard.
Install the Certificate in the local machines Trusted Root Authority container as follows:
Windows
1. Open the Microsoft Management Console by typing "MMC" in the "Run" box.
2. Open the Add or Remove Snap-in by selecting FILE -> ADD/REMOVE SNAP-IN...
3. Select Certificates from the list and click Add to display the Certificates Snap-in window.
4. Select the Computer Account and click Next.
5. Click Finish and close the list of snap-ins.
6. Click OK to add the certificates snap-in, which should now be visible in the Add/Remove Snap-ins window.
7. Expand the list of certificate containers, right click Trusted Root Authorities, and choose All Tasks ->
Import to start Certificate Import Wizard.
8. Import the Certificate downloaded as described in the first paragraph of 3.1.5 using this wizard.
Mac OS
1. Download the SSL CA Certificate as described in the first paragraph of 3.1.5.
2. Once downloaded, double-click the Certificate. This launches Keychain Access and displays a Certificate
Not Trusted warning.
3. Click Always Trust to import the certificate into Login Keychain.
The TOE additionally contains the Network Traffic In Interface, which is responsible for applying the Traffic
Information Flow Control SFP to the traffic transmitted through this interface. This process happens
transparently, and users have no way to manipulate the TOE through this interface. Additionally, no
management can be performed through this interface.
1. Close the browser after the Web Console port number is altered
2. Re-open the browser
3. Navigate back to https://<TOE IP>:<Port Number>, where Port Number is the port number that the user
has just changed within the Web Console
4. The login screen is displayed, requiring reauthentication to access the TOE
If the browser is not closed, navigating to the Web Console with the new port number in the URL does not require
reauthentication. Users must close the browser to allow for reauthentication into the TOE.
3.2 Exclusions
As stated in the Security Target (ST), the following product features and functionality are excluded from the TOE,
are not part of the evaluated configuration of the TOE and should not be operational. During runtime an
administrator must not use these features to ensure that the TOE is operating in the evaluated configuration:
• Use of the Command Line Interface (CLI)
• Use of the User Portal
• Use of the HAProfile and Crypto Admin profiles
• Creation of new Administrator-type profiles
• Use of the SNMP 23 functionality
• Use of the external authentication functionality
• Use of the VPN 24 functionality
• Use of the intrusion prevention system functionality
• Use of the gateway antivirus/antispyware functionality
• Use of the gateway antispam functionality
• Use of the outbound spam protection functionality
• Use of the web filtering functionality
• Use of the secure syslog functionality
• Use of the log suppression functionality
• Use of the Web Portal login CAPTCHA functionality
• Upgrading from previous TOE firmware versions
3.3 Additions
This section contains additional guidance that was not described in the operational user guidance.
If the connection between the TOE and the external syslog server is lost, any audit logs output during that outage
are lost.
3.3.1.3 DoS & Spoof Prevention
The TOE must be configured to enable the DoS 25 & Spoof Prevention. This is required to ensure that the TOE
remains operable in case of a denial-of-service attack. Go to PROTECT -> Intrusion Prevention -> DoS & Spoof
Protection -> DoS settings and enter the packet rates consistent with your organizational security policy.
[AdminGuide p. 403].
Administrators who report a security flaw are provided with a confirmation that the case was created according
to their service level agreement. Status updates are sent to the case owner by the Support Team. Subsequent
updates are sent in a cadence determined by the severity and/or support level until an estimated time for a fix or
an actual resolution is available. Case owners can inquire about the status of a reported security flaws through
the very same procedures listed above.
After a flaw is resolved, Sophos’ support team members update the support ticket to indicate the release in which
the issue will be resolved and assigns the ticket to the assigned support team member. The support team member
notifies the customer of the resolution and closes the ticket. The support team member uses the information from
the comments field of internal Jira tickets (not customer-facing) to provide flaw remediation information to the
customer. The fix is made available to all customers in the next release or a future release. Customers are notified
of new releases through the Sophos Web Admin Console. Customers may then go to the customer download page
to retrieve the update and its associated checksum. If necessary, the information from the comments field of Jira
will be included in the release notes for security flaws (available from the Sophos Knowledgebase 26).
25 DoS - Denial-of-Service
26 https://community.sophos.com/sophos-xg-firewall/b/blog
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 19 of 22
Guidance Supplement, Version 0.5 November 16, 2023
3.3.4 Troubleshooting
3.3.4.1 UTF-8 Character in Backup File
When a UTF-8 27 character is present in the backup file name, an issue arises where the user is unable to download
the backup file. To resolve this, remove the UTF-8 character from the backup file and the user will be able to
download the backup file normally.
3.3.4.2 /conf File Filling Up
If the On-box reports of the appliance is turned off or disabled, the /conf file gradually fills up. When the conf
partition gets to 100%, the user is unable to login. To resolve this, if the On-box reports are turned off, turn on the
On-box reporting from the console by navigating to the console and entering set on-box-reports on.
27
UTF-8 – Unicode Transformation Format-8
Sophos Firewall OS v19.0.2 ©2023 Sophos Ltd.
This document may be freely reproduced and distributed whole and intact including this copyright notice.
Page 20 of 22
Guidance Supplement, Version 0.5 November 16, 2023
Acronym Definition
TOE Target of Evaluation
BIOS Basic Input/Output System
CA Certificate Authority
CLI Command Line Interface
DoS Denial-of-Service
EAL Evaluation Assurance Level
GPC General Purpose Computer
GUI Graphical User Interface
HTTPS Hypertext Transfer Protocol Secure
IPS Intrusion Prevention System
ISO International Standards Organization
LAN Local Area Network
LCD Liquid Crystal Display
OS Operating System
SHA Secure Hash Algorithm
SNMP Simple Network Management Protocol
SSH Secure Shell
SSL Secure Socket Layer
ST Security Target
SVGA Super Video Graphics Array
SVM Secure Virtual Machine
UPS Uninterrupted Power Supply
USB Universal Serial Bus
VM Virtual Machine
VT Virtualization Technology
VPN Virtual Private Network