You are on page 1of 61

 

 More

Sophos Firewall  Recommended Reads  More  New

Thread Info

  +9 
16 replies

36 subscribers

30656 views

1 member is here

 Group Policy

 Sophos Firewall

 logon type

 firewall

 live user

 GPO

 collector

 Agent

 AD

 wmi

 workstation poll method

 Restrict client traffic during identity probe

 Identity probe time-out

 STAS

Options

Sophos XG firewall: Best practice for STAS


This website uses cookies to make your browsing experience better. By
This website uses cookies to make your browsing experience better. By
taowang over 2 years ago Accept
using our site you agree to our use of cookies.  Learn More!
Note: Please contact Sophos Professional Services if you require direct assistance with your specific environment.

Sophos Transparent Authentication Suite (STAS) enables users to automatically log into Sophos Firewall when
logging on Windows AD workstation.

STAS requires software installation on AD severs only, and no need to install any software on workstation.

This article provides best practices to configure STAS on Sophos Firewall v18.5.

The configuration example provided in the article is quite simple, but it explains how STAS works.

It covers Windows AD GPO and Windows Firewall rules needed for STAS, and also provides basic troubleshooting
guides.

If you notice any errors in the article or improvements can be made, please let me know.

Here is the table of contents for preview.

Table of Contents
1. How STAS works
a) Deploy STA Agent and STA Collector
b) STA Collector group on Sophos Firewall
c) Deployment example
d) Summary of ports
2. Limitation
a) Max number of live users
b) Computers must be in AD domain
3. Lab environment
a) Network Topology
b) Find out the NetBios Name, FQDN, and Search DN
4. Configure Sophos Firewall
a) Enable Client Authentication in Device Access
b) Configure authentication server
c) Enable STAS
5. Configure Windows AD GPO
a) Enable audit logon events on AD computers
b) Allow inbound WMI on AD computers
c) Update Group Policy settings
d) Verify audit logon events were applied correctly
e) Verify event ID 4768 was generated for user logon
6. Install and configure STAS
a) Install STAS
b) Configure STA Agent
c) Configure STA Collector
d) Configure Exclusion List
d) Configure Exclusion List
e) Advanced
f) Start STA Collector
g) Create Windows Firewall rules to allow STAS traffic
h) Verify workstation poll method
7. Verify STAS is working
a) check STAS live users
b) create a firewall rule for user group
8. Troubleshooting
a) STA Collector shows no Sophos Firewall IP address
c) STA Collector shows no live user
c) Sophos Firewall has no STAS live user, although STA Collector has them
d) STA Collector keeps removing live user
e) Sophos Firewall has some STAS live users missing
f) Group policy of audit logon events is not updated on AD computer
g) STAS service did not start due to a logon failure
9. Known issues
10. Appendix
a) Enable SSL on Windows LDAP service
11. Edition History

1. How STAS works


STAS is to authenticate users on workstations, not servers.

STAS consists of an agent and a collector.

The agent monitors AD domain controller for user logon event, which is Windows Event ID 4768, and sends it to the
collector UDP port 5566 (#1, and #2 in diagram logon.type2.png)

The collector analyses the logon event, and sends it to Sophos firewall UDP port 6060, if a user isn’t an existing STAS
live user. (#3, and #4 in diagram logon.type2.png)

Sophos Firewall lookups the username in AD domain controller to retrieve group, email address, and more details of
the user. (#5 in diagram logon.type2.png)

Then the user will be displayed on Sophos Firewall as STAS live user. (#6 in diagram logon.type2.png)

User detected in such way is known as STAS logon type 2.

Diagram:  logon.type2.png
The collector can also help Sophos Firewall to get user logged on an AD workstation.

For example, Sophos Firewall doesn't have live user on an AD workstation, but firewall rule requires user
authentication for traffic from the AD workstation. (#1, and #2 in diagram logon.type1.png)

In such situation, Sophos Firewall sends a query to the collector UDP port 6677, asking for username on the
workstation. (#3 in diagram logon.type1.png)

The collector talks to the workstation via methods defined in Workstation Polling Method, such as WMI. (#4 in
diagram logon.type1.png)

Workstation replies with username in WMI,

then the collector records the live user, (#5 in diagram logon.type1.png) and sends it back to Sophos Firewall on UDP
port 6060

Sophos Firewall lookups the username in AD domain controller to retrieve group, email address, and more details of
the user. (#6 in diagram logon.type1.png)

Then the user will be displayed on Sophos Firewall as STAS live user. (#7 in diagram logon.type1.png)

User detected in such way is known as STAS logon type 1.

Diagram: logon.type1.png
STA Agent and Collector support to change the default communication ports.

UDP port 6060 on Sophos Firewall for STAS cannot be changed.

a) Deploy STA Agent and STA Collector


STA Agent can run on AD DC (domain controller), or Windows AD member server.
STA Collector is not recommended to run on DC, as it generates a high volume of traffic, according to Sophos
Firewall Online Help. It is recommended to run on member server.
STA Agent can serve single or multiple STA Collectors.
STA Collector can serve single or multiple Sophos Firewalls

[ Note: Member server is a computer that runs an operating system in the Windows Server family, belongs to a
domain, and is not a domain controller. ]

b) STA Collector group on Sophos Firewall


Sophos Firewall can have multiple STA Collectors in a single Collector group, but it communicates only with the
primary collector in the Collector group. The primary collector is the one on top of the list.
If the primary collector doesn't respond, Sophos Firewall will communicate with the 2nd collector.
STA Collectors for the same AD domain is recommended to be configured in the same Collector group. 2 Collector
groups should be enough for an AD domain, when redundancy is needed.
When there are multiple AD domains, need to create a Collector group for each AD domain.

c) Deployment example
For AD domain with 1 DC, my recommendation is

install STA Agents on the DC,


install STA Collector on member server,
configure STA Agent to serve the Collector,
configure the Collector to serve Sophos Firewall,
on Sophos Firewall, put the Collector into a Collector group

For AD domain with 2 DC, my recommendation is:

install STA Agents on those 2 DC


install STA Collectors on another 2 member servers
install STA Collectors on another 2 member servers
configure each STA Agent to serve both Collectors
configure the Collectors to serve Sophos Firewall
on Sophos Firewall, put those 2 Collectors into same Collector group, since they are in same AD domain

d) Summary of ports
STA Collector open TCP port 5566 for STA Agent to upload user logon information
STA Collector open UDP port 6677 for Sophos Firewall to connect
Sophos Firewall open UDP port 6060 for STA Collectors to connect
STA Collector sends packet to STA Agent UDP port 50001 for Test connection,
STA Agent sends packet to STA Collector UDP port 50001 for Test connection,
STA Collector sends packet to Sophos Sophos Firewall UDP port 6060 for Test connection.

2. Limitation
a) Max number of live users
Sophos Firewall v17.5 and later supports 12,288 live users, by default.

That can be verified as below

Log on Sophos Firewall SSH terminal as admin. Once authenticated, you will be presented with the Sophos
Firewall console menu.
Go to 5. Device Management > 3. Advanced Shell, and run the following commands
cish
system auth max-live-users show

The limitation can be lifted with the Device Console command


system auth max-live-users set <8192-32768>
but make sure your Sophos Firewall is up to sizing.

b) Computers must be in AD domain


STAS can only detect users on AD domain workstation.

If a workstation is not a member of the AD domain, STAS won't be able to detect live user on it.

In such a scenario, Sophos Client Authentication Agent is the solution. Details of Client Authentication Agent is
available at https://support.sophos.com/support/s/article/KB-000038465

3. Lab environment
a) Network Topology
192.168.20.5 is AD DC, and STA Agent will be installed on it
192.168.20.9 is a member server, and STA Collector will be installed on it.
192.168.20.19 is AD workstation
192.168.20.251 is Sophos Firewall LAN interface IP

b) Find out the NetBios Name, FQDN, and Search DN


You can find out AD NetBIOS Name, FQDN, and Search DN as described below.

Log in to your Windows AD DC as a user with Administrative privileges.


Go to Start > Programs > Administrative Tools > Active Directory Users and Computers.
Right Click on the required domain and go to the Properties

In this example, FQDN is tao.xg, and NetBIOS name is TAOXG


Search DN is required when we configure the authentication server on the Sophos Firewall.

To find out Search DN, run the command dsquery user in Windows CMD, as shown below.

C:\Users\Administrator>dsquery user 
"CN=Administrator,CN=Users,DC=tao,DC=xg" 
"CN=Guest,CN=Users,DC=tao,DC=xg" 
"CN=krbtgt,CN=Users,DC=tao,DC=xg" 
"CN=One User,OU=ABP Users,DC=tao,DC=xg" 
"CN=Two User,CN=Users,DC=tao,DC=xg" 
"CN=AD Admin,CN=Users,DC=tao,DC=xg" 
"CN=User Super,CN=Users,DC=tao,DC=xg" 
C:\Users\Administrator>

Search DN for "Two User" is "CN=Users,DC=tao,DC=xg"


Search DN for "One User" is "OU=ABP Users,DC=tao,DC=xg"

Later, we’ll configure search DN "DC=tao,DC=xg" in the authentication server on Sophos Firewall.

4. Configure Sophos Firewall


a) Enable Client Authentication in Device
Access
Log on to Sophos Firewall webadmin, go to Administration > Device access, enable "Client Authentication" on the
zone where STA Collector and user workstation locate. In this example, it’s the LAN zone.
b) Configure authentication server
1) Authentication Server

We need to configure Windows AD DC as an authentication server on Sophos Firewall, so that Sophos Firewall can
fetch group and other information of STAS live user from AD DC.

Sophos Firewall Online Help: Configure Active Directory authentication

Log on to the Sophos Firewall webadmin, go to Authentication > Servers, click on the "Add" button.
Configure authentication server as below
-Server Type: Active Directory
-Server Name: any name for the AD DC
-Server IP: IP address of the AD DC
-Connection security: SSL/TLS, by default
-Port: 636, default TCP port for LDAP service on SSL/TLS

[ Note: To enable SSL on Windows LDAP service, just need to generate a CA on AD DC, reboot DC, DC would
automatically assign the CA to LDAP service, and accept LDAP traffic on TCP port 636. Details in the section "10.
Appendix > a) Enable SSL on Windows LDAP service ]

-NetBIOS Domain: TAOXG, as discovered above


-ADS username: an AD user with AD administrator privilege
-Password: password of ADS username
-Display Name Attribute: leave it blank. If you need to use another AD attribute for Name, please refer to Microsoft
KBA docs.microsoft.com/.../attributes-all
-Email Address Attribute: mail, by default. If you need to use other AD attribute for Email, please refer to Microsoft
KBA docs.microsoft.com/.../attributes-all
-Domain Name: tao.xg, as discovered above.
-Search Queries: "DC=tao,DC=xg" as discovered above.

Once the configuration is completed, click "Test connection" to make sure the Sophos Firewall can communicate with
AD DC via LDAP.
2) Import AD user group

This step is optional, however, it’s recommended to import AD user groups, to simplify user management on the
Sophos Firewall.

To apply firewall rule on specific AD user groups, those AD user groups need to be imported into the Sophos Firewall.

Go to Authentication > Server, click the "Import" icon next to an AD server, as shown below

Set Base DN to "DC=tao,DC=xg"


Check the desired groups

Set common policies for those Groups. Normally we leave it as default during the initial setup.
Click on Next to import the group.

Go to Authentication > Groups, verify the AD group has been imported, as shown below
3) Authentication Service

Go to the Sophos Firewall webadmin > Authentication > Services, choose the Windows AD DC as the first server for
"Firewall Authentication Methods", as shown below.

c) Enable STAS
Go to Sophos Firewall webadmin > Authentication > STAS, turn on "Enable Sophos Transparent Authentication Suite",
and then click "Activate STAS" button, as shown below
Change default settings,

Identity probe time-out: 3 seconds


Restrict client traffic during identity probe: No
Enable user inactivity: enabled

Note:

With the default settings of "Identity probe time-out": 120 seconds, and "Restrict client traffic during identity
probe": Yes, AD workstation experiences 2-minute network outage every hour once STAS is enabled on Sophos
Firewall.
Details about "Restrict client traffic during identity probe" can be found in section "Drop timeout in Learning
Mode" of Sophos KBA https://support.sophos.com/support/s/article/KB-000035730 

Next step is to add STAS server.

Click the "Add new collector button", and add the IP address of the STAS server. In this example, it is 192.168.20.5
Collector Port can be checked on STAS Suite> General tab > Listening to the Sophos appliance on Port, as shown
below
5. Configure Windows AD GPO
a) Enable audit logon events on AD computers
1. Log on to Windows AD DC as a member of the Administrators group.
2. Open Administrative Tools, and then click Group Policy Management.
3. In the console tree, open Forest: YOUR_FOREST > Domains > YOUR_DOMAIN_NAME, right-click on Default Domain
Policy, and then click Edit.
[ Note: You can also edit other group policy as needed. ]
4. In Group Policy Management Editor, open Computer Configuration > Policies > Windows Settings > Security
Settings > Local Policies > Audit Policies.
5. Double-click on Audit account logon events, and enable "Define these policy settings: Success and Failure"

6. Open Computer Configuration > Policies > Windows Settings > Security Settings > Advanced audit policy
configuration > Audit Policies > Account Logon
7. Double-click on Audit Kerberos Authentication Service, and enable "Configure the following audit events: Success
and Failure"
8. open Computer Configuration > Policies > Windows Settings > Security Settings > Advanced audit policy
configuration > Audit Policies > Logon/Logoff
9. Double-click on Audit Logon, and enable "Configure the following audit events: Success and Failure."

b) Allow inbound WMI on AD computers


Make sure Firewall rule on AD workstation allows incoming WMI.

1. Log on to Windows AD DC as a member of the Administrators


2. Open Administrative Tools, and then click Group Policy Management.
3. In the console tree, open Forest: YOUR_FOREST > Domains > YOUR_DOMAIN_NAME, right-click on Default Domain
Policy, and then click Edit.
[ Note: You can also edit other group policy as needed. ]
4. In Group Policy Management Editor, open Computer Configuration > Policies > Windows Settings > Security
Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security, right-click on
Inbound Rules > New Rules
5. set Rule Type to "Predefined: Windows Management Instrumentation (WMI)"
Check WMI-In 

Action: Allow the connection


c) Update Group Policy settings
1. On an AD computer, click Start, point to All Programs, click Accessories, right-click on Command Prompt, and
then click "Run as administrator".
2. If the User Account Control dialog box appears, click Yes to continue.
3. Type
gpupdate /force
and then press ENTER.

Once group policy is updated, you can continue to the next step to verify audit policy settings were applied correctly.

You can also wait for the group policy to be updated as per the Windows schedule.

d) Verify audit logon events were applied correctly


1. On AD computer, click Start, point to All Programs, click Accessories, right-click Command Prompt, and then click
Run as administrator.
2. If the User Account Control dialog box appears, click Yes to continue.
3. Run the following 2 commands.
auditpol.exe /get /category:"Logon/Logoff"
auditpol.exe /get /category:"Account Logon"
4. Make sure Success and Failure is enabled for "Logon" and "Kerberos Authentication Service", as below

C:\WINDOWS\system32>auditpol.exe /get /category:"Logon/Logoff" 
System audit policy 
Category/Subcategory                      Setting 
Logon/Logoff 
  Logon                                   Success and Failure 
  Logoff                                  No Auditing 
  Account Lockout                         No Auditing 
  IPsec Main Mode                         No Auditing 
  IPsec Quick Mode                        No Auditing 
  IPsec Extended Mode                     No Auditing 
  Special Logon                           No Auditing 
  Other Logon/Logoff Events               No Auditing 
  Network Policy Server                   No Auditing 
  User / Device Claims                    No Auditing 
  Group Membership                        No Auditing 
  

C:\WINDOWS\system32>auditpol.exe /get /category:"Account Logon" 
System audit policy 
Category/Subcategory                      Setting 
Account Logon 
  Kerberos Service Ticket Operations      No Auditing 
  Other Account Logon Events              No Auditing 
  Kerberos Authentication Service         Success and Failure 
  Credential Validation                   No Auditing 
C:\WINDOWS\system32>

e) Verify event ID 4768 was generated for user logon


Event ID 4768 is for user logon.

If AD DC doesn't generate event ID 4768 in Windows Event Viewer, the STA Agent cannot detect any user logon
activity.

Once event ID 4768 is generated, STA Agent forwards that information to the STA Collector UDP port 5566.

Please check Windows Event Viewer to make sure Event ID 4768 is generated when a user logs on a workstation.

The following screenshot shows user1 logged on AD domain tao.xg from workstation 192.168.20.19.
6. Install and configure STAS
a) Install STAS
Sophos KBA for STAS https://support.sophos.com/support/s/article/KB-000035732

Latest STAS can be downloaded from Sophos Firewall webadmin > Authentication > Client downloads, as below

In this example, STA Agent was installed on a Windows AD DC 192.168.20.5. STA Collector was installed on a member
server 192.168.20.9.

Please install STAS by right click on installation file > 'Run as administrator' to prevent any potential permission issue
on Windows.
For STA Agent, choose "STA Agent"

For STA Collector, choose "STA Collector"

Enter Windows AD administrator credentials, as shown below. The account is needed to


query Windows Event Viewer on AD DC for Event ID 4768,
start/stop "Sophos Transparent Authentication Suite" service, and
send Windows WMI query to AD workstation to perform workstation polling

It is not necessary to be administrator, but it must be a member of group Domain Admins.

b) Configure STA Agent


Open STAS on domain controller 192.168.20.5.

1) In "General" tab, put in NETBIOS name of AD domain, together with Fully Qualified Domain Name

And then click on Start button to start agent


2) Wait for Current Status of STA Agent to be "Start"

If STA agent cannot be started, please double check Administrator Credentials, NetBIOS Name, and Fully Qualified
Domain Name.

3) Go to "STA Agent" tab, and specify the subnet where all Windows AD users belong to, as shown below.

"STA Agent Mode": EVENTLOG is recommended.


"Domain Controller IP": It is only needed when STA Agent is installed on a member server. It must be blank if STA Agent
is installed on an AD DC. Otherwise, STA Agent can't read local Windows Event logs.
“Monitor Networks”: 192.168.20.0/24 for the example
"Collector List": In the example , it is 192.168.20.9
"Domain Controller Polling" is available for configuration if STA Agent Mode is set to NETAPI. In the example, I set STA
Agent Mode to be EVENTLOG, therefore, no need to configure the option.

Remember to click on "OK" to save configuration on STA agent.


c) Configure STA Collector
Open STAS on member server 192.168.20.9.

In "General" tab, put in NetBIOS Name and Fully Qualified Domain Name of AD domain.
Go to "STA Collector" tab,

"Sophos Appliances": the internal IP address of the Sophos Firewall, 192.168.20.251. If Sophos Firewall is in HA,
please use interface IP address, not HA peer administration IP.
"Workstation Polling Method": WMI is recommended
"Enable Logoff Detection": checked
"Detection Method": Workstation polling
"Dead entry timeout": must be 0. Details in section "9. Known issues".
d) Configure Exclusion List
Go to "Exclusion List",

1) In "Login User Exclusion List": we put in any background service accounts, for example trendupd, trendupd2,
OktaService, and more, depending on software installed on workstation.

That prevents STAS live user to be logged off when a background service account logs in to start background tasks.

Note:
- "Login User Exclusion List" only supports "username", and doesn't support "username@domain.com", nor
"domain\username".
- Username in "Login User Exclusion List" is case insensitive.
2) In "Login IP Address/Network Exclusion List", add IP addresses of any server, for example Citrix terminal server,
Microsoft RDS server, DNS server, web server, to prevent frequent user logon/logoff.

The reason is STAS is to authentication users on workstation, not servers.

In the example, I put IP address of DNS server and web server into Login IP Address Exclusion List.
e) Advanced
The following is recommended, in case STAS troubleshooting is needed.

STAS log file size: 25


Log level: Debug
Reduce log: disable

STAS log files, stas.log, and stas.log1, are located on the Windows server installed with STAS in the directory of
C:\Program Files (x86)\Sophos\Sophos Transparent Authentication Suite, by default.

stas.log and stas.log1 get rotated at every 25 MB (or as defined by Log File Size).

Remember to click on "OK" to save configuration.


f) Start STA Collector
We have completed configuration of STA Collector.

Click "Start" to start STAS service.


Once STAS and Sophos Firewall establishe communication, the IP address of the Sophos Firewall is displayed on the
"General" tab, as below

Sometimes, STAS service might fail to be started, with the error "Failed: Cannot start service: STAS". Please refer to
section "8. Troubleshooting > g) STAS service did not start due to a logon failure" for solution.
Note:

When there are multiple STA Collectors in the same collector group, Sophos Firewall only communicates with the
STA Collector on the top of list, and only that STA Collector can establish communication with Sophos Firewall,
and only that STA Collector can dispaly IP address of Sophos Firewall in General tab.
To find out which STA Collector is communicating with Sophos Firewall,
go to STAS > General tab, check if it has Sophos Firewall IP address displayed. If yes, it is the STA Collector
communicating with Sophos Firewall, or
check backend logs in Sophos Firewall SSH terminal,

SSH to Sophos Firewall as admin, and go to 5. Device Management > 3. Advanced Shell, and run the following
command
grep "CTA LIVE Received from\|sending CTA_IS_ACTIVE" /log/access_server.log | tail
The sample output below shows Sophos Firewall has been communicating with STA Collector 192.168.20.5
since 16:00 8 Feb

SFVUNL_SO01_SFOS 18.0.4 MR‐4# grep "CTA LIVE Received from\|sending CTA_IS_ACTIVE" /log/access_server.
DEBUG Feb 08 16:00:36.719168 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:01:06.733092 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:01:36.748435 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:02:06.753870 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:02:36.754746 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:03:06.770399 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:03:36.784307 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
DEBUG Feb 08 16:04:06.799499 [access_server]: process_cta_live: CTA LIVE Received from 192.168.20.5 
MESSAGE Feb 09 11:01:29.423157 [access_server]: process_cta_live: sending CTA_IS_ACTIVE 192.168.20.5 
MESSAGE Feb 09 11:08:30.094186 [access_server]: process_cta_live: sending CTA_IS_ACTIVE 192.168.20.5 
SFVUNL_SO01_SFOS 18.0.4 MR‐4#
 

g) Create Windows Firewall rules to allow STAS traffic


If STA Collector and STA Agent are installed on different servers,

create Windows Firewall rules on STA Collector, to allow


inbound traffic on TCP port 5566, UDP port 6677, and UDP port 50001
outbound traffic to UDP port 6060
create Windows Firewall rules on STA Agent, to allow
inbound traffic on UDP port 50001
outbound traffic to TCP port 5566 and UDP port 50001

If STA Collector and STA Agent are installed on the same Windows server, create Windows Firewall rules on the
Windows server, to allow

inbound traffic to TCP port 5566, and UDP port 6677


outbound traffic to UDP port 6060

Ports needed by STAS is described in section "1. How STAS works > d) Summary of ports"

Windows Firewall rules are applied on network profile (Domain, Private, Public). Make sure above Windows Firewall
rules are applied to correct network profile.

h) Verify workstation poll method


To make STAS works without problem, STA Collector has to communicate with all workstations via the workstation
poll method.

In above configuration, we configured STA Collector to use WMI as workstation polling method.

We need verify STA Collector can communicate with any AD workstation via WMI:

Go to member server installed with STA Collector,


Open STAS, go to Advanced > Troubleshooting > STAS Polling Utilities > WMI Verification, enter IP address of a
workstation, and test
It should be successful. Otherwise, please check Windows GPO configuration for wmi in section "5. Configure
Windows AD GPO > b) Allow inbound WMI on AD computers"

To troubleshoot wmi issue, please refer to

Sophos Firewall: Configure user sign off detection in STAS using WMI
Microsoft KBA: Setting up a Remote WMI Connection
7. Verify STAS is working
a) check STAS live users
user1 re-logged on AD workstation 192.168.20.19 after STAS was setup

On STA collector, open STAS, go to Advanced > Show Live Users, there was the live user.

On Sophos Firewall webadmin, Current Activity > Live Users also showed the live user
b) create a firewall rule for user group
Create a firewall rule to allow users in IT group to access Internet
Now, 192.168.20.19 can access Internet

Sophos Firewall webadmin > Current activities > Live connections > Live connections for: Username shows live
connection of user1@tao.xg
Firewall rule traffic stats also confirmed traffic from 192.168.20.19 was generated by the user in the IT group and hit
the firewall rule.

8. Troubleshooting
a) STA Collector shows no Sophos Firewall IP address
When STA Collector cannot communicate with Sophos Firewall, STAS "General" tab doesn't show the Sophos Firewall
IP address.
Make sure

Sophos Firewall webadmin > Device Access has "Client Authentication" enabled on the zone where STA Collector
is located.
Windows Firewall on STA Collector allows traffic from/to Sophos Firewall. Details in the section " Install and
configure STAS > f) Create Windows Firewall rules to allow STAS traffic"

c) STA Collector shows no live user


In case STA Collector doesn't detect any live user
Make sure

STAS service is started on both STA agent and STA collector

  
  

STA Collector and Sophos Firewall established communication


STA Collector can communicate with AD workstation via workstation polling method. Details in the section "
Install and configure STAS > h) Verify workstation poll method"
Event ID 4768 is generated in Windows Event Viewer when an AD user logs on an AD workstation. Details in
section "5. Configure Windows AD GPO > e) Verify event ID 4768 was generated for user logon"
STAS was installed by right click on installation file > Run as administrator

c) Sophos Firewall has no STAS live user, although STA Collector has
them
If Sophos Firewall doesn't show any live user, but STAS shows live users, make sure

Windows Firewall rule on STAS server is configured properly, as per section " Install and configure STAS > f) Create
Windows Firewall rules to allow STAS traffic"
Sophos Firewall has "Client Authentication" enabled on the zone where the STA Collector and AD workstation
are located.
Authentication service on Sophos Firewall is running. It can be verified onable Sophos Transparent
Authenticationn Sophos Firewall webadmin > System services > Services, as below
Check if Sophos Firewall reaches STAS server via static route. Details in section "9. Known issues"

d) STA Collector keeps removing live user


STAS can detect live user on AD workstation, however, it removes live user after a while.

Make sure

STAS can communicate with AD computers via the workstation poll method. Details in the section " Install and
configure STAS > h) Verify workstation poll method"
all background service accounts on AD computers have been added into STAS > "Login User Exclusion List".
Details in the section " Install and configure STAS > d) Configure Exclusion List"

e) Sophos Firewall has some STAS live users missing


Firewall webadmin GUI > Current Activity > Live Users show some STAS live users, but not all of them. Some STAS live
users are missed on Sophos Firewall.

Make sure

STA Collector can communicate with AD computers via the workstation poll method. Details in the section "
Install and configure STAS > h) Verify workstation poll method "
all background service accounts on AD computers have been added into STAS > "Login User Exclusion List".
Details in the section " Install and configure STAS > d) Configure Exclusion List"

Please also check if Sophos Firewall reaches STAS server via static route. Details in section "9. Known issues".

f) Group policy of audit logon events is not updated on AD computer


Make sure NIC on AD computer connected to AD DC belongs to Domain network.
Here is the Microsoft Technet post about how to change network profile of a NIC.
https://social.technet.microsoft.com/Forums/en-US/1a948231-a6ef-4bd1-9676-2b565d572762/domain-
network-turns-to-public?forum=win10itpronetworking
On AD workstation, try to disable Windows Firewall on all NIC, and enable it later once GPO is updated.
If the above doesn't solve the issue, please contact Microsoft technical support.

g) STAS service did not start due to a logon failure


If STAS service fails to start with "Fatal Error: The service did not start due to a logon failure.", make sure the account
for STAS is a member of AD group "Domain Admins".
You can update the account for STAS in the "General" tab, as below

If the above doesn't fix the issue, please try the following:

1) Go to Windows Service, find "Sophos Transparent Authentication Suite". Right click on it, and click on "Properties"

2) Go to "Log On" tab, and enter AD Domain admin account and password again.
3) Go back to STAS, click on "Start" button, and now STAS should Start.

9. Known issues
a) Dead entry timeout: must be 0, otherwise STAS stops working (applies to STAS v2.5.1.0 and earlier)

b) When Sophos Firewall reaches STAS server via a static route, Sophos Firewall cannot communicate with STAS
server after reboot/boot-up. 

Symptom: Sophos Firewall doesn't send packets to STAS server UDP port 6677 to actively query live user on
workstations. Sophos Firewall can only passively receive live user information from STAS server.

Workaround: Manually restart authentication service after firewall reboot/boot-up.


Workaround: Manually restart authentication service after firewall reboot/boot-up.
- in Advanced Shell, please run the command "service access_server:restart -ds nosync", or
- in webadmin GUI, go to "System service" > "Services", and then Restart "Authentication" service, as below

[ Note: This bug (NC-84910) will be fixed in Sophos Firewall OS v18.5 MR5. ]

10. Appendix
a) Enable SSL on Windows LDAP service
Note: If you need technical support to enable SSL on Windows LDAP service, please seek help from Microsoft.

In Server Manager, Add Roles and Features


Select "Role-based or feature-based installation"
Add role of "Active Directory Certificate Services"

Click on "Next", install "Certificate Authority"


Install

Once the installation is complete, in Server Manager, click on "Notifications" > Post-deployment Configuration >
Configure Active Directory Certificate Services
In "AD CS Configuration", click Next to continue
Choose "Enterprise CA"

Choose "Root CA"


"Create a new private key"
Key length: at least 2048

Hash algorithm: SHA256 or higher, don't choose SHA1/MD5...

Input essential information for the CA


Click on "Configure" to generate root CA.

Now, restart the DC, and Windows automatically enables SSL on LDAP service.
11. Edition History
2022-05-04, major updates:

provided details about STAS logon type1 and 2


improved STAS deployment - STA Collector is not recommended to run on DC, as it generates a high volume of
traffic, according to Sophos Firewall Online Help.

2021-10-06, minor change, renamed "XG firewall" to "Sophos Firewall"

2021-08-13, updated section "Configure Exclusion List"

2021-07-23, added section "9. Known issues"

2021-02-10

added section "1. How STAS works > c) Deployment example"


updated section "6. Install and configure STAS > c) Configure STA Collector"
updated section "6. Install and configure STAS > g) Start STAS"
added section "8. Troubleshooting > e) Sophos Firewall has one more STAS live users missing"
updated ToC

2021-01-29, updated ToC.

2021-01-25, converted from PDF to HTML by emmosophos. Thank you.

2021-01-19

updated section "3. Test environment > a) Network Topology"


added section "7. Verify STAS is working > b. create firewall rule for user group "
updated section "8. Troubleshooting "

2021-01-15, first edition

major update
[edited by: taowang at 2:05 AM (GMT -7) on 4 May 2022]

Top Replies

taowang over 1 year ago in reply to TobiasHäcker +2


Hello TobiasHäcker,

- when there are 4 DC in a domain, I recommend 


on 2 DC, install STA Suite (Agent + Collector)
on the other 2 DC, install STA Agent, and configure them to serve those 2 STA Colle…
Oldest Votes Newest

TobiasHäcker over 1 year ago


I would like to see information about

- having multiple Agents and Collectors - best practise (e.g. 4 DC in a domain: 4 agents, 2 collectors? Must we
set up every collector on every agent?)

- Using more than one collector in a collector group - how can we make sure that in case of any device failing
redundancy applies?

- Using a XG cluster: do we have to set up the native IPs of the XG in the collector or the cluster one?

taowang over 1 year ago in reply to TobiasHäcker


Note, it will be update it within 2 weeks.

taowang over 1 year ago in reply to TobiasHäcker


Hello TobiasHäcker,

- when there are 4 DC in a domain, I recommend 


on 2 DC, install STA Suite (Agent + Collector)
on the other 2 DC, install STA Agent, and configure them to serve those 2 STA Collectors
on XG firewall, put those 2 STA Collectors into same Collector group, since they are in same AD
domain

- to check which collector communicates with XG firewall,

go to STAS > General tab, check if it has XG firewall IP address displayed. If yes, it is the STAS
communicating with XG firewall, or
Advanced Shell command 
grep "CTA LIVE Received from\|sending CTA_IS_ACTIVE" /log/access_server.log | tail

Details in section "6. Install and configure STAS > g) Start STAS"

- need to put XG firewall interface IP, not HA peer administration IP, into STA Collector

Paul Brawn 12 months ago


This is a much better and more thorough article than the official guide, which fails to mention entering the
audit settings in the default domain policy. It only suggests putting these setting on the DCs with the
collector installed.

Thanks!

FloSupport 12 months ago in reply to Paul Brawn


Hi Paul, thanks for taking the time to share your feedback!

Which official guide are you referring to? I'd like to follow up with our product documentation team
to have this updated.

Florentino
Director, Global Community & Digital Support
Are you a Sophos Partner? | Product Documentation | @SophosSupport | Sign up for SMS Alerts
If a post solves your question, please use the 'Verify Answer' button.
If a post solves your question, please use the 'Verify Answer' button.

The Award‐winning Home of Sophos Support Videos! ‐ Visit Sophos Techvids

Max Hendrik Backs 9 months ago in reply to FloSupport


Every other guide. There are around 15?

for example in no one is described, who is doing WMI polling. agent or collector?

DBASQL 10 months ago


Excellent Guide Thank you!

Theron Maddox 10 months ago


Very great manual, it's useful, thanks for this

Kevin Kuphal 9 months ago


Question about this setup:

Two Windows Core domain controllers (DC1, DC2)


One WIndows 2019 Standard domain controller (DC3)

Does the STAS Agent support installation on Windows Core?

If not, I presume I need to use the member server installation of 2.5.  Do I install an agent only on the member
server if I have a collector installed on DC3?  Also, how do I handle the two Core DCs.  Do I have to have a 1:1
relationship between member servers and DCs if I'm not installing the agent/collector on the Core DC?  

Does my setup have to be:

Member server 1 (MS1) configured to talk to DC1 (agent or agent+collector)


Member server 2 (MS2) configured to talk to DC2
STAS installed (agent or agent + collector) on DC3

Abdul Mohamedbhai 5 days ago in reply to Kevin Kuphal


Hi, interested to know if you got this to work by any chance, will appreciate your feedback

Kevin Kuphal 5 days ago in reply to Abdul Mohamedbhai


Yes.  After a bit of back and forth with Sophos the result is that you have to have an Agent
on a windows member server in 1:1 relationship with with any Core domain controllers.  It
is exactly how I describe above.

Abdul Mohamedbhai 5 days ago in reply to Kevin Kuphal


Thaks for your reply. Ok so does the windows member server need to be a DC as well or just
a server joined to the domain works?

Kevin Kuphal 5 days ago in reply to Abdul Mohamedbhai


Our are not DC.  They only need to be on the domain

marcus33241 3 months ago


Nice Howto. Thanks.

But... running STAS as Domain Admin - really? I think it's a security risk.

Does anyone know if this works with Admin tiering?

Abdul Mohamedbhai 5 days ago


Very good article, however i have an evironment with the DC running on server 2019 core edition? does STAS
support core edition of servers? i have got mixed responses, some say stas supports core, some say it
doesnt. would appreciate your feedback. 

Vivek Jagad 5 days ago in reply to Abdul Mohamedbhai


Hey Abdul Mohamedbhai,

STAS 2.5 is supported on Windows Server 2008R2, 2012R2, 2016, and 2019. The Essentials
versions should also be supported, starting with SBS 2011. Further more you can refer the
following article - https://support.sophos.com/support/s/article/KB-000038628?
language=en_US

Thanks & Regards,

Vivek Jagad | Technical Account Manager 3 | Cyber Security Evolved


Sophos Community | Product Documentation | Sophos Techvids | SMS
If a post solves your question please use the 'Verify Answer' button.

Suggested

User account used for STAS (Best Practice)?


STAS Best Practice
I'm about to implement STAS for our Sophos UTM and try…
Hello, I have 2 DCs and 5 XG firewalls conected with a VP…

User account used for STAS (Best Practice)?


STAS Collectors - Best Practice?
I'm about to implement STAS for our Sophos UTM and try…
Hey guys, Does anyone have / know what Sophos XG be…

STAS Best Practice


Hello, I have 2 DCs and 5 XG firewalls conected with a VP…

Getting started Legal Privacy Cookies


© 1997 - 2022 Sophos Ltd. All rights reserved.

You might also like