Skip to content
  • Home
Random IT-Blog
  • Home

Sophos SG

  1. Home>
  2. Sophos SG

A customer tale and Sophos SG RED bridge to internal network

  • Post author:Gökhan
  • Post published:April 29, 2022
  • Reading time:4 mins read
  • Post category:Sophos SG
  • Post comments:0 Comments

Hey there. Today I want to tell you about a small issue a colleague of mine encountered with a customer. This is not a large business but the customer works…

Continue ReadingA customer tale and Sophos SG RED bridge to internal network

Wireshark remote capture Sophos SG traffic over SSH (Linux)

  • Post author:Gökhan
  • Post published:November 9, 2021
  • Reading time:4 mins read
  • Post category:Fedora/Linux/Sophos SG/Wireshark
  • Post comments:0 Comments

Hi there. there are a few options to track traffic in Sophos, but none are as in-depth as tcpdump (as far as I am aware at least). The problem here…

Continue ReadingWireshark remote capture Sophos SG traffic over SSH (Linux)

How to get the backup file from a non booting/dead Sophos SG

  • Post author:Gökhan
  • Post published:October 26, 2021
  • Reading time:3 mins read
  • Post category:Linux/Sophos SG
  • Post comments:0 Comments

Hey there. This will be a shorter one. A few weeks ago, I had a weird issue with a customer, where two Sophos SG 135 in an active / passive…

Continue ReadingHow to get the backup file from a non booting/dead Sophos SG
  • RSS Feed

Recent Posts

  • Fedora GNOME Yubikey LUKS2 Encryption and sudo FIDO2/2FA AuthenticationDecember 18, 2025
  • ArubaOS-CX EVPN VXLAN Configuration (Part 2)December 13, 2025
  • Extreme Networks Fabric Connect (SPBM/ISIS) configurationDecember 10, 2025
  • Active Directory / FreeIPA TrustNovember 7, 2025

Recent Comments

  1. Gökhan on HPE / Mellanox / Nvidia SN2100M | First steps, MLAG, split-cable setup
  2. Gökhan on Ceph Storage Cluster deployment on Rocky Linux 9/CentOS 9
  3. AMIT KUMAR on HPE / Mellanox / Nvidia SN2100M | First steps, MLAG, split-cable setup
  4. Amit Kumar on Ceph Storage Cluster deployment on Rocky Linux 9/CentOS 9
  5. User on Deploying a Linux Server Environment from Scratch (Part 4)

Categories

Alletra Ansible Aruba ArubaOS-CX Authentik Bash BGP BorgWarehouse Ceph Certificate Docker Fedora Fedora 36 FreeIPA GNOME GNS3 Group Policy HPE KVM LAPS Linux MFA MinIO Network Nginx-Proxy-Manager NTFY OSPF Pi-Hole Powershell Proxmox Rocky Linux Script Server Hardware Sophos Sophos XG SSH Veeam Veeam Backup & Replication Veeam SureBackup VOSS VSX VXLAN Windows Windows Server Yubikey

Archives

  • December 2025 (3)
  • November 2025 (1)
  • August 2025 (1)
  • March 2025 (2)
  • February 2025 (1)
  • November 2024 (1)
  • August 2024 (1)
  • July 2024 (3)
  • June 2024 (3)
  • May 2024 (2)
  • April 2024 (1)
  • March 2024 (1)
  • February 2024 (1)
  • January 2024 (1)
  • December 2023 (2)
  • November 2023 (4)
  • September 2023 (1)
  • August 2023 (1)
  • July 2023 (1)
  • May 2023 (3)
  • April 2023 (2)
  • March 2023 (1)
  • January 2023 (5)
  • December 2022 (2)
  • November 2022 (1)
  • October 2022 (1)
  • September 2022 (1)
  • August 2022 (3)
  • July 2022 (2)
  • June 2022 (3)
  • May 2022 (3)
  • April 2022 (2)
  • March 2022 (2)
  • February 2022 (3)
  • January 2022 (1)
  • December 2021 (4)
  • November 2021 (8)
  • October 2021 (6)
  • Home
  • About Me
  • Privacy Policy
  • Datenschutz
  • Terms & conditions
  • Cookie Policy (EU)
Random IT-Blog |
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Preferences
  • {title}
  • {title}
  • {title}