Sophos SD-RED 20

Sophos SD-RED 20 Rev. 1 Remote Ethernet Device User Manual

Model: SD-RED 20 (R20ZTCHMR)

1. Okwu mmalite

This manual provides comprehensive instructions for the installation, configuration, and operation of your Sophos SD-RED 20 Rev. 1 Remote Ethernet Device. The SD-RED 20 is designed to securely extend your network to remote locations, ensuring encrypted and centrally managed connectivity.

Biko gụọ akwụkwọ ntuziaka a nke ọma tupu i jiri ngwaọrụ ahụ iji hụ na ntọala ya kwesịrị ekwesị ma rụọ ọrụ nke ọma.

2. Ngwaahịa gafereview

The Sophos SD-RED 20 is a Remote Ethernet Device that facilitates secure network extension. It simplifies the process of connecting remote offices or branches to your central Sophos firewall, creating a secure, dedicated VPN tunnel.

2.1 Ogwe ihu

N'ihu view of the Sophos SD-RED 20 device, showing status indicators and ports.

Foto 1: Front Panel of Sophos SD-RED 20. This image displays the front of the device, featuring the Sophos logo, model name (SD-RED 20), a COM port, a USB 3.0 port, and various LED indicators for LAN (LAN1, LAN2, LAN3, LAN4), WAN, Internet, and System status (Tunnel, Router).

The front panel includes status LEDs and essential ports:

  • Ọdụ ụgbọ mmiri COM: For console access and initial configuration.
  • USB 3.0 ọdụ ụgbọ mmiri: For connecting external devices or 3G/4G modules.
  • LAN LEDs (LAN1-LAN4): Indicate link status and activity for each LAN port.
  • WAN LED: Na-egosi ọkwa njikọ WAN.
  • Igwe ọkụ ịntanetị: Na-egosi ọkwa njikọ ịntanetị.
  • System LEDs (Tunnel, Router): Provide status information about the VPN tunnel and router functionality.

2.2 Ogwe azụ

N'azụ view of the Sophos SD-RED 20 device, showing power inputs, LAN ports, WAN port, and USB port.

Foto 2: Rear Panel of Sophos SD-RED 20. This image displays the back of the device, featuring two 12V DC power inputs (DC IN 1, DC IN 2), four LAN ports (LAN1, LAN2, LAN3, LAN4), a shared WAN port, a USB 3.0 port, and a reset button.

The rear panel provides connectivity options:

  • DC IN 1 & 2 (12V): Power input ports.
  • LAN Ports (LAN1-LAN4): Ethernet ports for local network connections.
  • WAN (Shared) Port: Ethernet port for Wide Area Network connection.
  • USB 3.0 ọdụ ụgbọ mmiri: Ọdụ USB ọzọ maka ihe ndị ọzọ.
  • Bọtịnụ Tọgharia: Used to reset the device to factory defaults.

3. Ntọala na nwụnye

The Sophos SD-RED 20 is designed for "Plug-and-Protect" deployment, requiring minimal technical expertise at the remote site.

3.1 Njikọ mbụ

  1. Njikọ ike: Connect the provided power adapter to one of the 12V DC IN ports on the rear panel and plug it into a power outlet.
  2. Njikọ WAN: Connect the WAN port of the SD-RED 20 to your internet service provider's modem or router using an Ethernet cable.
  3. Local Network Connection: Connect your local network devices (e.g., computers, switches) to the LAN ports (LAN1-LAN4) on the rear panel.
  4. Optional Wi-Fi/3G/4G Module: If using, insert the optional Wi-Fi-5 or 3G/4G module into the designated slot or USB port.

3.2 Firewall Integration

The SD-RED 20 must be registered and configured with your central Sophos firewall (XG or SG series) for operation.

  1. Obtain Device ID: Locate the unique device ID on the SD-RED 20 unit.
  2. Sophos Firewall Configuration: Access your Sophos firewall's administrative interface.
  3. Add SD-RED Device: Navigate to the SD-RED configuration section and enter the device ID.
  4. Policy Definition: Define the network policies and routing rules for the remote site. You can choose to:
    • Tunnel all traffic from the remote location through the central firewall.
    • Route only inter-office network traffic through the SD-RED, allowing direct internet access from the remote location.
  5. Automatic Tunnel Establishment: Once the SD-RED 20 is online and connected to the internet, it will automatically contact your Sophos firewall and establish a secure, dedicated VPN tunnel.

4. Ọrụ

4.1 Secure Connectivity

The SD-RED 20 establishes a secure VPN tunnel between the remote site and your central Sophos firewall. All data transmitted through this tunnel is encrypted using AES256, ensuring a secure, tamper-proof, and hacking-proof connection.

4.2 Centralized Management

Management of the SD-RED 20 is performed centrally through your Sophos XG or SG series firewall. This provides transparent protection across your entire distributed network, allowing for customized or replicated security policies.

4.3 Synchronized SD-WAN (with XG Firewall)

When managed by an XG Firewall, the Synchronized SD-WAN feature leverages Sophos Intercept X for 100% reliability, integrating synchronized security for enhanced network performance and security.

4.4 Flexible WAN Options

The device supports flexible WAN connectivity. You can utilize the standard Ethernet WAN port or optionally add a Wi-Fi-5 or 3G/4G module for wireless client connectivity or alternative internet connections.

5. Nlekọta

  • Mmelite femụwe: Ensure your Sophos firewall and SD-RED devices are running the latest firmware versions for optimal security and performance. Updates are managed centrally via the Sophos firewall.
  • Nyocha anụ ahụ: Periodically inspect the device for any physical damage or loose cable connections.
  • Ọnọdụ gburugburu: Ensure the device is operated within recommended temperature and humidity ranges to prevent overheating or damage.
  • Nhicha: Use a soft, dry cloth to clean the exterior of the device. Do not use liquid cleaners.

6. Nchọpụta nsogbu

6.1 Okwu nkịtị na Ngwọta

  • Enweghị ike:

    Ensure the power adapter is securely connected to both the device and a working power outlet. Check the power LED on the front panel.

  • No Internet Connectivity:

    Verify the WAN cable connection. Check the WAN and Internet LEDs on the front panel. Confirm that your upstream modem/router is functioning correctly. Ensure the device ID is correctly entered in your Sophos firewall and the configuration is active.

  • VPN Tunnel Not Established:

    Check the Tunnel LED. Ensure the SD-RED 20 has internet access. Verify the device ID and configuration on your Sophos firewall. Ensure there are no firewall rules blocking the connection between the SD-RED and the central firewall.

  • Local Network Access Issues:

    Check LAN cable connections and LAN LEDs. Verify DHCP settings if the SD-RED is configured to manage DHCP for the remote network. Ensure client devices are configured to obtain IP addresses automatically or have correct static IP settings.

6.2 nrụpụta nrụpụta

To reset the device to factory defaults, press and hold the RESET button on the rear panel for approximately 10 seconds while the device is powered on. Release the button when the system LEDs change state or the device reboots.

7. Nkọwapụta

NjirimaraNkọwa
Aha NlereanyaSD-RED 20
Akụkụ ngwaahịa23.62 x 23.62 x 33.46 sentimita asatọ
Ibu Ibu3 pound
ASINB0873BHT9K
Onye nrụpụtaSophos
ỤdịSophos
Njirimara Pụrụ IcheErgonomic
Klaasị ugboro ugboroAbụọ-Band
Ikuku Communication Standard802.11 ac
Ngwa dakọtaraSophos APX Series Access Points, Sophos SG UTM/XG Firewall
Eji akwadoro maka ngwaahịaAzụmahịa
Ngwa gụnyereIgwefoto ahụ (Note: This information appears to be incorrect in the source data. The device typically includes the SD-RED unit and power supply.)
Teknụzụ NjikọtaWi-Fi
Agbauhie

8. Akwụkwọ ikike na nkwado

For warranty information and technical support, please refer to the official Sophos website or contact your authorized Sophos reseller. Product registration may be required to activate your warranty.

Akụrụngwa dị n'ịntanetị: Sophos Support Portal

Akwụkwọ ndị emetụtara - SD-RED 20

Tupuview Sophos Firewall: Nchekwa dị ike na arụmọrụ
Chọgharịa ihe owuwu Sophos Firewall Xstream, nke emebere iji nye nchekwa netwọkụ siri ike, ịrụ ọrụ dị elu na nchekwa ihe iyi egwu dị elu maka azụmaahịa niile nha. Chọpụta atụmatụ dị ka nyocha TLS 1.3, Nnyocha ngwugwu miri emi, ngwa ngwa ngwa, yana ike SD-WAN.
Tupuview Ntuziaka nchịkwa Sophos UTM maka njikwa ọnụ ụzọ ámá
Ntuziaka nchịkwa zuru oke maka ụdị Sophos UTM Manager (SUM) 4.300, nhazi nhazi, nhazi, nlekota oru, nlekota na mkpesa maka ngwaahịa ọnụ ụzọ Sophos. Ihe dị mkpa maka ijikwa akụrụngwa nchekwa netwọkụ.
Tupuview Onye enyemaka Mbugharị Sophos: SG/UTM gaa na ntuziaka Mbugharị Firewall XG
Ntuziaka a na-enye ntụziaka zuru ezu na omume kachasị mma maka ịkwaga Sophos SG/UTM firewall nhazi na Sophos XG Firewall ikpo okwu na-eji Sophos Migration Assistant Tool. Mụta maka ihe achọrọ, usoro ntụgharị, yana oke nwere ike ime maka mgbanwe dị nro.
Tupuview Sophos XG Firewall Web Ntuziaka interface na ntuziaka onye nchịkwa v17.1
Ntuziaka a zuru oke na-akọwa Sophos XG Firewall, ngwa nchekwa netwọk siri ike emebere iji nye nchebe iyi egwu dị elu yana ịhụ netwọkụ. Ọ na-ekpuchi akụkụ dị mkpa nke ijikwa na ịhazi firewall, gụnyere nghọta ya web-based Admin Console and Command Line Interface (CLI). Users will find detailed information on system monitoring, network configuration, security policies, and troubleshooting. This document serves as a primary resource for administrators to effectively deploy, manage, and maintain the Sophos XG Firewall for optimal network security and performance.
Tupuview Sophos XG Firewall v17: Web Interface Reference and Admin Guide
Comprehensive guide for Sophos XG Firewall v17, covering web interface navigation, administration, configuration, monitoring, and security management for network administrators.
Tupuview Ntuziaka mmalite ngwa ngwa Sophos APX Series (APX 320/530/740)
Ntuziaka mmalite ọsọ ọsọ maka Sophos APX Series Access Point (APX 320, APX 530, APX 740). Mụta otu esi ebuga, wulite, jikọọ, hazie, na dozie ebe ị ga-enweta nsogbu.