NOTE: This looks to be the same issue as https://community.sophos.com/products/xg-firewall/f/firewall-and-policies/100393/invalid-tcp-rst/372613 but in that thread people are saying this error message is normal. It is NOT and although the log entry might be wrong there is something else going on blocking these downloads.
I am having a problem trying to get the Office Deployment Tool ( www.microsoft.com/.../details.aspx ) to download Office images/software from Microsoft. When running the tool I was seeing lots of "Invalid TCP RST" entries all from my computer to a Microsoft server:
The deployment tool log showed me this:
10/10/2018 10:15:14.850 SETUP (0xec0) 0x1d40 Click-To-Run Non Task Error bg87a Unexpected DownloadOffice::DownloadFile {"MachineId": "xxxxxxxsnippedxxxxxxx", "SessionID": "xxxxxsnippedxxxxxx", "GeoID": xxx, "Ver": "16.0.10827.20138", "C2RClientVer": "16.0.10827.20138", "ErrorCode": 30125, "ErrorType": "WinHttpSendRequestFailed", "AppVErrorSource": "", "ErrorMessage": "WinHttpSendRequestFailed (Unexpected status code received for Http Send request , Error:0x1a0)", "ErrorDetails": "", "ContextData": "Oexception throw when downloading officecdn.microsoft.com/.../stream.x86.en-us.dat,Retry:1,BufferSize:104857600"}
So it said the file that failed downloading was http://officecdn.microsoft.com/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/16.0.10827.20150/stream.x86.en-us.dat
A quick ping of officecdn.microsoft.com showed the IP address of 23.215.130.144 which matched the log. So as a test I made a new firewall rule:
Rule Name: Allow Unscanned HTTP Access | Source: LAN - Any | Destination: Wan - 23.215.130.144
I turned off all options under Web Malware and Content Scanning and under Advanced I turned off all Intrusion Prevention, Web Policy, etc. I tried the download and it was successful! I then, just to make sure, disabled the rule and tried the download again and again my log filled up with Invalid TCP RST entries and the download failed on the same file. There was no other log entries. The only difference was now the download, over port 80, was going through our "standard" web access rule which has scanning enabled.
Whats going on here? I tried adding a exception rule for *.microsoft.com but it didn't work. I tried officecdn.microsoft.com and that failed also. Only when I specifically called out the IP address in my bypass rule was I able to download the file which I can't rely on as IP addresses change.
Why do I only see "Invalid TCP RST" entries and no other errors when its obviously blocking something and what would be a more permanent fix?
This thread was automatically locked due to age.