• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

War Room

Shells from above

RSM logo

  • Home
  • About
  • Blog
  • Talks/Whitepapers
  • Tools
  • Recreation
Home > Defense > Sophos UTM Home Edition – 2 – The Installation

Sophos UTM Home Edition – 2 – The Installation

October 22, 2014 By Ken Smith

UPDATE: Part 3 – The Setup, Part 4 – Definitions and Rules, and Part 5 – SSL VPN are now available.

Now that we’ve discussed acquiring a Sophos UTM license and downloading the ISO, it’s time for the install.

This process is extremely straightforward assuming the hardware of choice is compatible. Should any questions arise, concerned users should reference the Hardware Compatibility List for Sophos UTM v9. My base machine will be a discarded Dell I picked up from a local high school. I’ve replaced the hard drive with a 500 GB Seagate. I also added in three additional gigabit NICs. They were recognized right away during the install, and I’ve had no issues in the short while that the UTM has been up and running.

Once the appropriate hardware has been acquired and set up and the ISO has been burned to a disc, the installation can begin. Boot up the machine, insert the installation disc, and reboot. Assuming the bios is correctly configured to allow for booting from external media, the following screen should appear:

(Note: All the screenshots within this post are from a VMware install, not a hardware install, but the process is the same)

Sophos UTM2 - Boot
Sophos UTM 9 Install

Hitting enter will initiate the install and bring up the next screen. Selecting ‘Start’ will initiate the automatic hardware detection.

 

Sophos UTM2 - 3 - Support
Support

On my first installation attempt, this led to a hiccup in the process where not all of my cards were detected. I rebooted, selected ‘Support,’ backed out to the Introduction screen, and then clicked ‘Start’ which resulted in a clean installation. I’m not sure exactly what happened, so if anyone that happens to read this encounters the same problem, please feel free to share in the comments.

It’s not a bad idea to note the intended purpose for each NIC (ie: external WAN, internal LAN, wireless, etc). This can save some troubleshooting headaches later on in the set up phase. When the hardware detection is finished, a list of all will be displayed, so check to make sure there are no red flags or missing components.

Sophos UTM2 - 4 - Hardware list
Hardware List

Assuming everything checks out, the next two screens deal with keyboard layout and time zone. Users will then be asked to select a NIC through which to access the WebAdmin interface. I’ve chosen to use the NIC which interfaces with my internal network. Obviously, avoid using one that will connect to the WAN. Manually set the IP for the admin interface.

Finally, Sophos has included the option to only use OpenSource software packages. Going this route will leave only a basic installation of Linux on the other end of the install. In order to actually use Sophos UTM, all capabilities must be installed. The disc will be formatted and the installation will begin. The entire process should take less than fifteen minutes, depending on the hardware, of course. The following screen indicates that the installation has completed without any problems.

Sophos UTM2 - Completing the configuration
Successful Installation

Note the IP and port (same IP as was set during the installation process). Reboot the system (make sure to remove the installation disc) and make sure the OS loads correctly:

Sophos UTM2 - 5 Successful
Success!

Sophos UTM2 - Ready for configuration

 

At this point, the UTM is ready for configuration. That will be covered in the next post!

Share this...
  • Reddit
  • Email
  • Facebook
  • Twitter
  • Linkedin

Ken Smith

Primary Sidebar

Categories

  • Defense
  • Forensics
  • Offense
  • Physical
  • R&D

Most Viewed Posts

  • DLL Injection Part 1: SetWindowsHookEx 10.8k views
  • Sophos UTM Home Edition – 3 – The Setup 10.8k views
  • Leveraging MS16-032 with PowerShell Empire 10k views
  • Bypassing Gmail’s Malicious Macro Signatures 9.8k views
  • How to Bypass SEP with Admin Access 8.9k views

Footer

  • RSS
  • Twitter
  • Tools
  • About
  • RSM US LLP

+1 800 903 6264

1 S Wacker Dr Suite 800
Chicago, IL 60606

Copyright © 2023 RSM US LLP. All rights reserved. RSM US LLP is a limited liability partnership and the U.S. member firm of RSM International, a global network of independent audit, tax and consulting firms. The member firms of RSM International collaborate to provide services to global clients, but are separate and distinct legal entities that cannot obligate each other. Each member firm is responsible only for its own acts and omissions, and not those of any other party. Visit for more information regarding RSM US LLP and RSM International.