Sophos UTM On AWS: Quick Start Guide
Sophos UTM On AWS: Quick Start Guide
Limited Warranty
No guarantee is given for the correctness of the information contained in this document.
Please send any comments or corrections to [email protected].
Contents
1 Introduction 5
2 Overview 6
3 Deployment Model 7
The goal of this document is to help customers quickly deploy and configure Sophos
UTM on AWS.
2 Overview
Sophos UTM on AWS is designed to easily deploy into AWS and provide you with secur
ity tools like NextGen Firewall, Intrusion Prevention System (IPS), Web Application Fire
wall (WAF), Web Protection, and Virtual Private Network (VPN) connections. UTM can
be deployed on a single Amazon Elastic Compute Cloud (EC2) instance, in High Avail
ability (HA) scenarios across AWS Availability Zones (AZs), and supports Auto Scaling
with Elastic Load Balancing (ELB) to distribute traffic across multiple UTMs.
UTM provides this protection by using multiple integrated security applications to scan
both inbound and outbound traffic to identify malware, potential threats, and anom
alies. This all-in-one security approach avoids the need for installing and paying for
multiple security products to protect your environment, which helps save on costs and
simplifies deployment.
l NextGen Firewall controls which augment or replace the AWS Security Groups
and/or Network Access Control Lists (NACLs)
l Inline Network IPS that provides deep packet inspection with signatures auto
matically updated by Sophos Labs
l VPN Gateway functionality to securely connect remote users and locations
l Integrated WAF with Reverse Authentication Support
l Outbound Web Security Controls to secure, protect and control connections from
EC2 Instances and Amazon WorkSpaces
UTM is built to provide advanced security without requiring expert level knowledge.
Designed to be useable and intuitive, UTM offers an easy to deploy and use suite of
security tools to secure and protect your AWS environment.
3 Deployment Model
3 Deployment Model
Before starting with UTM, choose the deployment method for AWS.
Sophos UTM on AWS supports three deployment models that include:
l Stand Alone (no redundancy)
l Stand Alone with HA (cold and warm standby)
l Auto Scaling for inbound and outbound traffic
Below is a decision tree to help you decide which UTM deployment model fits your
needs.
5 UTM Subscription
To subscribe to Sophos UTM on AWS, follow these steps:
1. Navigate to https://aws.amazon.com/marketplace/ and search for Sophos UTM.
2. Select the product you would like to deploy based on the deployment model
(Sophos UTM 9 vs. Sophos UTM 9 Auto Scaling) and pricing (PAYG vs. BYOL) you
want.
3. Select the Region where you want to deploy.
4. Select the delivery methods under Pricing Details.
The delivery method will depend on how you’d like to launch Sophos UTM on AWS.
Generally speaking, there are two ways to deliver Sophos UTM on AWS:
l Single AMI
l CloudFormation Console
Once you complete either forms or delivery methods, you will be subscribed to
Sophos UTM on AWS.
This Quick Start Guide will cover delivery methods Single AMI and CloudFormation Con
sole.
Note – For information on launching AWS Marketplace products within the EC2 con
sole, refer to How do I launch an AWS Marketplace product with the EC2 console?
Note – The only delivery method available for Sophos UTM (Auto Scaling) is the
CloudFormation Console.
assistance in choosing the correct EC2 instance type for your deployment. For help
with the other settings, please refer to Launch Your Software on Amazon EC2.
1. Select Single AMI and click Continue.
2. Under the 1-Click Launch menu, specify the following:
l Applicable Instance Type
l Version (we recommend the latest)
l Region
l VPC Settings
l Security Groups
l Key Pair
3. Click on Accept Software Terms & Launch with 1-Click.
On the next page, you should see the Software Installation Details summarizing
the settings for the launch. From here, you can click Manage in the AWS Console
to check the launch state of Sophos UTM under the EC2 service. Once the instance
status reads as running, click on the Description tab to view the public IP address.
Please note the Public IP address to connect to your UTM (see chapter Stand
Alone Configuration). If you selected 1-Click Launch, you can now proceed to
chapter AWS Marketplace Product Support Connection.
8. Click Next.
9. On the Review page, review the values for parameter and click Create.
This will take you to the CloudFormation management console where you can
watch the Status and Events of the CloudFormation stack creation.
Once the status reads CREATE_COMPLETE, navigate to Services > EC > Instances
within the AWS Management Console to confirm UTM has been deployed on a newly
created EC2 instance. Select the EC2 instance and the Description tab to view the
Public IP address. Please note the Public IP address to connect to your UTM (see
chapter Stand Alone Configuration). If you selected CloudFormation Console for UTM
(Stand Alone), you can now proceed to chapter AWS Marketplace Product Support Con
nection.
l basicAdminEmail: Email address that will receive UTM and SNS notifications
(this information is not sent to Sophos)
l basicAdminPassword: Admin account password that will be used to access
the UTM WebGUI (this information is not sent to Sophos)
l basicCity: Used for configuring the self-signed Certificate Authority (this
information is not transmitted to Sophos)
l basicCountry: Used for configuring the self-signed Certificate Authority (this
information is not transmitted to Sophos)
l basicHostname: Used for configuring the self-signed Certificate Authority
(this information is not transmitted to Sophos)
l optionalExistingElasticIP: Elastic IP address assigned to UTM (if left empty a
new Elastic IP will be allocated automatically)
l optionalExistingS3Bucket: S3 bucket to store and restore backups (if left
empty a new bucket will be created automatically)
l optionalLicensePool: S3 bucket where UTM license is stored (only applicable
to BYOL)
Tags (optional)
l Key: Arbitrary key that can be used to identify your stack for purposes such as
cost allocation
l Value: Arbitrary value for the key
Permissions (optional)
IAM Role: an existing IAM service role that CloudFormation can assume
Advanced (optional)
8. Click Next.
9. On the Review page, review the values for parameter.
This will take you to the CloudFormation management console where you can
watch the Status and Events of the CloudFormation stack creation. Stack creation
time may vary but typically takes anywhere from six to ten minutes to complete.
Once the Status reads CREATE_COMPLETE, you can review the information in the
Outputs tab.
10. Under Capabilities, select I acknowledge that AWS CloudFormation might create
IAM resources and click Create.
Note – For more information on the Sophos support levels, see https://www.sophos.
com/en-us/medialibrary/PDFs/Support/Sophos-Support-Plans.pdf
l Company
l City
l Country, etc.
Note – Both username and passwords are case-sensitive and the UTM by default
will block access attempts after three failed attempts. If you suspect that you
may have triggered this protection feature you must wait for the ten minutes
timeout period to expire before you can attempt access again.
Note – Use only alpha-numeric characters in the password field when entering
this parameter during stack creation. If you require a more complex password,
change it after logging in to Sophos UTM via the web console.
Note – Both username and passwords are case-sensitive and the UTM by default will
block access attempts after three failed attempts. If you suspect that you may have
triggered this protection feature you must wait for the ten minutes timeout period to
expire before you can attempt access again.
Note – Use only alpha-numeric characters in the password field when entering this
parameter during stack creation. If you require a more complex password, change it
after logging in to Sophos UTM via the web console.
Note – Free trials will be automatically converted to paid subscriptions upon expir
ation.
When using BYOL versions of Sophos UTM, you’ll need a license file to unlock the UTM
subscription features during free trial and production. You can store the BYOL license
file in an S3 bucket, which is loaded during the boot up process. After the free trial, you
can upload the production license in Management > Licensing > Installation section,
and once the license had been uploaded details will be shown on the Management >
Licensing > Overview tab.
For more information on BYOL, please contact [email protected].
l The current EC2 Key Pair used for the deployment of the Sophos UTM
instance
l The current EIP, if available
l The VPC for the single/standalone UTM
l The current UTM license model (PAYG or BYOL)
l The VPC Subnets for your deployment model (two for HA solutions)
l The current Security Groups for the Sophos UTM EC2 Instance
l Current size of configuration, log, and database files
l AZ for your deployment model (two AZs are required for HA)
l CloudFormation Stack Name
l Optional – (Default) Copy log files from UTM standalone instance to new
deployment.
l Optional – (Default) Copy database from UTM standalone instance to new
deployment.
l Optional – (Not Default) Terminate UTM standalone after completion of con
version process.
5. Click Convert to begin the conversion process.
The conversion process will create the required AWS resources to support the
Sophos deployment model per your selection. Additional resources will include
VPC Subnets, Security Groups, Auto Scaling groups, and CloudWatch metrics to
support the new deployment model. You can watch the Conversion feature status
results and CloudFormation stack events under the CloudFormation Management
Console to check the status of the conversion.
After running the Conversion feature, you can review three menus to confirm the
completed status:
l Sophos UTM conversion results
l AWS EC2 Instance Status
l VPC subnets
The following figures show the completed status for the HA (Warm Standby) con
version.
The EC2 Instances menu shows two new EC2 Instances replacing the previous stan
dalone instance.
The solution is designed so that all configuration and management is done via the
Queen UTM, which then stores all configuration settings in S3 and gathers all logging
information via the syslog protocol.
The Queen Elastic IP used for management should match the Sophos UTM public IP
address shown in the CloudFormation Outputs section. Sophos UTM instance creation
will typically lag the CloudFormation creation and the EIP may not be attached to the
Queen UTM until the instance is fully launched and ready.
Note – Each UTM worker has a public IP and this can be used to connect to that UTM.
Any changes made on worker UTMs will be overwritten by the Queen configuration,
and will not be synchronized to other workers.
Note – Free trials will be automatically converted to paid subscriptions upon expir
ation.
When using BYOL versions of Sophos UTM, you’ll need a license file to unlock the UTM
subscription features during free trial and production. You can store the BYOL license
file in an S3 bucket, which is loaded during the boot up process. After the free trial, you
can upload the production license in Management > Licensing > Installation section,
and once the license had been uploaded details will be shown on the Management >
Licensing > Overview tab.
For more information on BYOL, please contact [email protected].
Note – At this point you’ll be notified that your load balancer is not using a secure
listener.
Note – This can be found in AWS EC2 area in the Load Balancers list. If you
have many ELBs listed in this section, you can confirm the correct one by
getting the name from the CloudFormation Resources section. Click on the
Description tab and copy the full DNS Name shown.
l Real Webservers: List the internal ELB you have created, which is what
traffic will be sent to once scanned. To create a new DNS object for this
internal ELB, click on the green Plus icon located to the right of the Real Web
servers text. Enter a descriptive name for the Real Webserver and then click
on the green Plus icon to the right of the Host field to create the actual DNS
host object. Copy the internal ELB DNS name into the Hostname field and
enter a descriptive name for this new network definition.
Note – To the right of the Real Webservers text you’ll see the status of the new
internal ELB DNS object you created. It should change to green as shown below
in a few moments. If it does not, check your settings as Sophos UTM is not able to
resolve the DNS name used.
OGW (Outbound Gateway) is a setup in AWS where an Auto Scaling group of UTMs is
load-balanced by gateways. The whole setup, UTM plus gateway, is called Outbound
Gateway. OGWs act as outbound load balancers.
The OGW deployment serves two main purposes, firstly scaling of UTMs to handle
increasing outbound traffic loads, and secondly, in some cases, the establishment of a
communication path to the Internet for instances that are located within VPCs which
lack Internet gateways.
Use cases for the OGW include:
l VDI access to the Internet (e.g. AWS Workspaces) (main use case)
l Server instance access to the Internet (including web access)
The high level architecture of the OGW deployment is shown below. Typical deploy
ment per VPC will consist of three UTM instances, one controller where configuration
is performed, and two workers (one per Availability Zone). Both controller and workers
are contained within Auto Scaling groups, which will launch a replacement UTM should
one fail, and workers may also scale under high load. In addition to the UTMs, there are
gateway instances which are deployed within each VPC. There is a minimum of two of
these per VPC, where they are deployed into separate subnets, and provide High Avail
ability by way of a failover mechanism. To facilitate external traffic routing they con
nect to the UTM workers via GRE (Generic Routing Encapsulating) tunnels (established
during deployment of the gateways).
Figure 12 Overview
To use the feature you have to deploy Outbound Gateway(s) for AWS in UTM. This can
be done:
l via the Resource Manager: The UTM will automatically deploy the CloudFormation
stack
l manually: Deploying the gateway manually with use of the CloudFormation tem
plate
Note – You need to decide for a method during object creation. It cannot be changed
afterwards.
1. In the UTM navigate to Network Protection > Outbound Gateway for AWS.
Note – You cannot change the usage of the Resource Manager after creating the
gateway.
Note – For more information on failover groups, see chapter Fallback Scenarios.
Group Name (if New Failover Group is selected): Enter the name of the new group.
Position: If requested, change the position number, defining the priority of the gate
way.
AWS Subnet ID: ID of a fresh and empty AWS subnet, the gateway should be
deployed to.
Note – Do not use an existing client subnet or a subnet which is already in use.
Networks: Insert the network object for the client subnet in the same Availability
Zone.
Comment (optional): Add a description or other information.
5. Click Save.
The gateway is saved and displayed in the list.
6. Repeat the steps for second gateway using the data of the other two subnets.
You can only enable the object once CloudFormation reports the stack creation as
complete.
Note – If you have to change anything like changing the manual deployment into auto
matic deployment, delete the Outbound Gateway and create a new one.
In every case the network numbers are more important than the order.
Example 1:
In this scenario Y takes over if X fails, because network A is not assigned to another
instance. Z works as passive standby. If X and Y fail, Z takes over.
Note – After stack deletion has begun, you cannot abort it. The stack proceeds to
the DELETE_IN_PROGRESS state.
After the stack deletion is complete, the stack will be in the DELETE_COMPLETE state.
Stacks in the DELETE_COMPLETE state are not displayed in the AWS CloudFormation
console by default. To display deleted stacks, you must change the stack view setting
as described in the CloudFormation User Guide under Viewing Deleted Stacks.
If the deletion failed, the stack will be in the DELETE_FAILED state. For solutions, see
the Delete Stack Fails troubleshooting topic of the CloudFormation User Guide.
AMI B
Amazon Machine Image BYOL
EC2
H
Elastic Compute Cloud
HA
EC2 Instance
High Availability
Compute instance in Amazon EC2 ser-
vice. High Availability
ELB
N
Elastic Load Balancing
Network Access Control List
Security Group W
Acts as virtual firewall for an AWS
instance to control inbound and out- WAF
bound traffic. Web Application Firewall
SNS
Simple Notification Service
SSH
Secure Shell
V
Virtual Private Cloud
VPC provides secure data transfer
between private enterprises and public
cloud provider. Each data remains isol-
ated from every other data both in
transit and inside the cloud provider's
network.