Skip to main content

BlastShield Documentation

Firmware Version 1.3 Release Notes

Release Date: 28th February 2022

Firmware release 1.3.0
Release content

New Features

  1. Accessing the Orchestrator Console now requires an extra authentication step from within the BlastShield™ Client.

  2. Support for running gateways in NAT mode on a single network interface.

  3. Added a source + destination NAT mode to gateways. This allows for secure remote access without adding a return route to the Blastshield™ prefix on the protected endpoints.

  4. Added support for running gateways in Google Cloud.

  5. Substantially improved Host Agent performance on both Linux and Windows.

  6. Support for running host agents on macOS.

  7. Agents Gateways and Clients can now be upgraded without existing connections being dropped.

Bug Fixes

  1. Fixed lighthouse connection failures due to expired \DST Root CA X3\ certificate on older OS versions.

Components to be upgraded

New firmware is available for the following applications.

  1. BlastShield™ Orchestrator.

  2. BlastShield™ Gateway.

  3. BlastShield™ Agent.

  4. BlastShield™ Desktop client.

Feature Descriptions
Accessing the Orchestrator Console now requires an extra authentication step from within the BlastShield™ Client

This feature prevents malware on the client computer from making unauthorised connections to the Orchestrator when the client is connected.

To access the Orchestrator the User must first select the Launch Orchestrator option n the Client. This will trigger an additional authentication step and the user will authenticate using a QR code and mobile device biometrics using the Mobile Authenticator app.

Once authentication is complete the Client will open an Orchestrator session in the web browser on the Client computer.

Support for running gateways in NAT mode on a single network interface

This simplifies the networking setup within cloud environments to provide a faster setup experience.

Source + destination NAT mode support for gateways

Added a source + destination NAT mode to gateways.

This allows for secure remote access without adding a return route to the Blastshield™ prefix on the protected endpoints.

Support for running gateways in Google Cloud

A Gateway may be deployed as a GCP Compute Engine instance to provide secure encrypted zero-trust access with micro-segmentation for VMs running in the VPC.

Substantially improved host agent performance on both Linux and Windows

The Agent's data throughput has been significantly optimised to allow for high-performance workloads.

Support for running host agents on macOS

Agent support for macOS has been added. The Agent provides secure encrypted zero-trust access with micro-segmentation support. Learn how to install an Agent on macOS here.Install the BlastShield™ Agent on macOS

Agents, gateways and clients can now be upgraded without existing connections being dropped

Upgrading a Gateway, Agent or Client will not cause the existing connections to be dropped.

Upgrade instructions
  1. Upgrade your Desktop Client.

    See the following page for details. Update the BlastShield™ Desktop Client

  2. Upgrade the firmware of the BlastShield™ Orchestrator.

    See the following page for details.Upgrade the Orchestrator firmware

  3. Upgrade the firmware of the connected BlastShield™ Gateways.

    See the following page for details.Upgrade the Gateway

  4. Upgrade your BlastShield™ Agents.

    See the following pages for details.Upgrade an Agent from the host or Upgrade the Agent from the Orchestrator