SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

SG UTM

Suggest, discuss, and vote on new ideas for SG UTM. The ultimate network security package.

Suggest an Idea...

(thinking…)

Enter your idea and we'll search to see if someone has already suggested it.

If a similar idea already exists, you can support and comment on it.

If it doesn't exist, you can post your idea so others can support it.

Enter your idea and we'll search to see if someone has already suggested it.

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback
  1. Wireless: Rogue access point detection

    The UTM should be able to detect rogue access points surreptitiously added to the network.

    34 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    5 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  2. Wireless: Improve Firmware update process

    Currently a power outage for example can damage the APs when hit in the middle of a firmware update. Improve the firmware update process to minimize or even better to eliminate the possibility of breaking the AP.

    7 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
    Under Review  ·  Martin Becker responded

    This problem is acknowledged, although it’s difficult to solve for the current access points. For next-gen APs however I envision a unbreakable firmware so that the AP can fall back to the previously installed FW in case the update fails.

  3. Radius Username at Status Screen

    At the Wireless Status screen we have the client list.
    For services using .1X (radius) it would be useful to se the actual usernames loged on.

    3 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  4. Wireless: Blink LEDS to Locate AP

    In environments with lots of AP's, it would be nice if we could set a "locate" flag in the WebAdmin which would cause all the LED lights to blink steadily. This way if they are not labelled correctly or have been moved, we could visually walk around and locate the AP.

    6 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  5. Remove the "upstream" requirement

    Currently, the ASG needs to be in the "upstream" direction of the data from the APs, i.e. the ASG which is used as a wireless controller must be the default gateway or on the default route on the way to the internet to establish communication with the AP.
    It would be nice if communication with the AP would also work if both devices are in the same broadcast domain without being in the default route, this would ease a quick test setup.

    5 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  6. Wireless Protection: Wireless EAP for user authentication

    Currently, the AP communicates with the backend authentication directly (using the ASG as destination, which DNATs the traffic to the configured backend).

    Use the ASG to authenticate against when using radius authentication. This would enable useful things like automatic user creation, additional reporting (client usernames), better debugging, code centralization. It could also fix subtle problems because the source IP of the radius request does not match the source address contained in the request.

    3 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  7. Wireless: Mounting clips for drop-ceilings

    It would be awesome if the AP's could just clip right onto a drop ceiling bracket.

    2 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
  8. Radius Accounting

    We want to use temporary accounts for our guests to connect the Internat thru our guest-wlan. We have a radius server which generates these accounts. With the Radius Accounting Protocol (RFC 2866) on Port 1813 we will be able to count the Usetime and Traffic for an User and disable the account after the specified time or traffic.

    9 votes
    Sign in
    (thinking…)
    Sign in with: Facebook Google Sophos Features & Ideas Laboratory
    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Wireless Protection  ·  Flag idea as inappropriate…  ·  Admin →
1 2 5 6 7 9 Next →
  • Don't see your idea?

Feedback and Knowledge Base

icon-data-protection icon-endpoint-protection icon-phish-threat icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-central icon-sophos-mobile icon-sophos-utm icon-sophos-utm icon-sophos-utm icon-web-appliance icon-xg-firewall icon-xg-firewall icon-avid-secure icon-lightbulbCreated with Sketch.