This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Open VPN 3.2.1 works on Android 10 ( Samsung S9 ) but not ChromebookOS 83.0.4103.97

We have an HA pair of Sophos XG firewalls running 17.5.12 MR-12 and have about 20 users who connect to it using an SSL-VPN.

Most of our users are running Windows 10 and use the Sophos SSL-VPN client and these are trouble free.

We have a few users running Chromebooks who are now experiencing problems with the VPN. The SSL-VPN connections were working in mid March when we first set them up ( we dont' have records of the software versions in use then ) but now they fail.

Testing with a Chromebook ( fully updated ) running ChromeOS 83.0.4103.97 and the OpenVPN client V3.2.1 and when I connect to the Sophos XG I lose all networking!

On the Chromebook I can run network diagnostics and it gives me the following information:

  • MAC: none ( reasonable for a virtual interface )
  • IP Address: 100.115.92.2 - this is part of the RFC 6598 Shared Address Space
  • Subnet mask: 255.255.255.255 - odd to say the least, 1 network of 1 device
  • Gateway: 100.115.92.2 - same as the IP address
  • DNS: 0.0.0.0,0.0.0.0,0.0.0.0,0.0.0.0 - not much use

None of these networking values make any sense!

The exact same profile works on my Samsung S9 running Android 10 phone using the same Open VPN V3.2.1 client and the IP addresses I get as are expected given the configuration of the SSL-VPN on the Sohpos XG.

Any thoughts?



This thread was automatically locked due to age.
Parents
  • Hello Guy Dawson,

    Thank you for contacting the Sophos Community.

    Just to clarify the SSL VPN connects, however after it is connected, the user lost all internet connectivity, correct?

    Do the users have full permissions to run the program in their chrome, can you share the logs for the SSL VPN client. Maybe it can give us more information as to why this his happening.

    Regards,

Reply
  • Hello Guy Dawson,

    Thank you for contacting the Sophos Community.

    Just to clarify the SSL VPN connects, however after it is connected, the user lost all internet connectivity, correct?

    Do the users have full permissions to run the program in their chrome, can you share the logs for the SSL VPN client. Maybe it can give us more information as to why this his happening.

    Regards,

Children
  • Hi,

    Yes, once the SSL-VPN client connects the Chromebook loses all internet connectiviy.

    The Chromebook is connected via WiFi to my local LAN and everything works fine. I then establish an SSL-VPN connection and I lose all internet connectivity.

    When browsing Chrome says there's no network connecivity and that a DNS probe failed. When I diagnose the connection in Chrome that's when I'm shown the network details with an IP AND Gateway address of 100.115.92.2 and DNS server addresses of 0.0.0.0

    I've attached the logs from the Chromebook and my Android 10 phone, both running Open VPN V3.2.1 downloaded from their respective Play Stores and connecting with the same user account to the same Sophos XG server.

     

    15:17:43.576 -- ----- OpenVPN Start -----
    
    15:17:43.614 -- EVENT: CORE_THREAD_ACTIVE
    
    15:17:43.629 -- OpenVPN core 3.git::728733ae:Release android i386 32-bit PT_PROXY built on Aug 14 2019 14:12:51
    
    15:17:43.634 -- Frame=512/2048/512 mssfix-ctrl=1250
    
    15:17:43.653 -- UNUSED OPTIONS
    3 [resolv-retry] [infinite]
    4 [nobind]
    5 [persist-key]
    6 [persist-tun]
    14 [route-delay] [4]
    15 [verb] [3]
    
    15:17:43.658 -- EVENT: RESOLVE
    
    15:17:43.719 -- Contacting 94.175.241.190:8443 via TCPv4
    
    15:17:43.720 -- EVENT: WAIT
    
    15:17:43.753 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4
    
    15:17:43.771 -- EVENT: CONNECTING
    
    15:17:43.788 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client
    
    15:17:43.799 -- Creds: Username/Password
    
    15:17:43.800 -- Peer Info:
    IV_GUI_VER=OC30Android
    IV_VER=3.git::728733ae:Release
    IV_PLAT=android
    IV_NCP=2
    IV_TCPNL=1
    IV_PROTO=2
    IV_LZO_STUB=1
    IV_COMP_STUB=1
    IV_COMP_STUBv2=1
    
    
    15:17:44.126 -- VERIFY OK : depth=1
    cert. version     : 3
    serial number     : 94:2C:96:F9:40:D8:6B:BC
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2019-05-13 17:32:43
    expires on        : 2036-12-31 17:32:43
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=true
    
    
    15:17:44.126 -- VERIFY OK : depth=0
    cert. version     : 3
    serial number     : 15:57:76:87:62
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=SophosApplianceCertificate_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2015-08-01 00:00:00
    expires on        : 2036-12-31 23:59:59
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=false
    
    
    15:17:45.335 -- SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
    
    15:17:45.336 -- Session is ACTIVE
    
    15:17:45.336 -- EVENT: GET_CONFIG
    
    15:17:45.343 -- Sending PUSH_REQUEST to server...
    
    15:17:46.244 -- OPTIONS:
    0 [route-gateway] [192.168.10.1]
    1 [ping] [45]
    2 [ping-restart] [180]
    3 [route] [91.220.234.128] [255.255.255.128]
    4 [route] [172.16.0.0] [255.255.0.0]
    5 [route] [192.168.42.0] [255.255.255.0]
    6 [topology] [subnet]
    7 [route] [remote_host] [255.255.255.255] [net_gateway]
    8 [inactive] [900] [7680]
    9 [ifconfig] [192.168.10.16] [255.255.255.0]
    
    
    15:17:46.244 -- PROTOCOL OPTIONS:
      cipher: AES-128-CBC
      digest: SHA256
      compress: LZO_STUB
      peer ID: -1
    
    15:17:46.245 -- EVENT: ASSIGN_IP
    
    15:17:46.260 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway]  : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument
    
    15:17:46.378 -- Connected via tun
    
    15:17:46.378 -- LZO-ASYM init swap=0 asym=1
    
    15:17:46.378 -- Comp-stub init swap=0
    
    15:17:46.394 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.16/ gw=[192.168.10.1/]' trans=TO_CONNECTED
    
    15:21:57.126 -- ----- OpenVPN Start -----
    
    15:21:57.135 -- EVENT: CORE_THREAD_ACTIVE
    
    15:21:57.165 -- OpenVPN core 3.git::728733ae:Release android i386 32-bit PT_PROXY built on Aug 14 2019 14:12:51
    
    15:21:57.210 -- Frame=512/2048/512 mssfix-ctrl=1250
    
    15:21:57.247 -- UNUSED OPTIONS
    3 [resolv-retry] [infinite]
    4 [nobind]
    5 [persist-key]
    6 [persist-tun]
    14 [route-delay] [4]
    15 [verb] [3]
    
    15:21:57.262 -- EVENT: RESOLVE
    
    15:21:57.299 -- Contacting 94.175.241.190:8443 via TCPv4
    
    15:21:57.300 -- EVENT: WAIT
    
    15:21:57.482 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4
    
    15:21:57.495 -- EVENT: CONNECTING
    
    15:21:57.510 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client
    
    15:21:57.510 -- Creds: Username/Password
    
    15:21:57.510 -- Peer Info:
    IV_GUI_VER=OC30Android
    IV_VER=3.git::728733ae:Release
    IV_PLAT=android
    IV_NCP=2
    IV_TCPNL=1
    IV_PROTO=2
    IV_LZO_STUB=1
    IV_COMP_STUB=1
    IV_COMP_STUBv2=1
    
    
    15:21:58.331 -- VERIFY OK : depth=1
    cert. version     : 3
    serial number     : 94:2C:96:F9:40:D8:6B:BC
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2019-05-13 17:32:43
    expires on        : 2036-12-31 17:32:43
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=true
    
    
    15:21:58.332 -- VERIFY OK : depth=0
    cert. version     : 3
    serial number     : 15:57:76:87:62
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=SophosApplianceCertificate_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2015-08-01 00:00:00
    expires on        : 2036-12-31 23:59:59
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=false
    
    
    15:22:00.474 -- SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
    
    15:22:00.475 -- Session is ACTIVE
    
    15:22:00.475 -- EVENT: GET_CONFIG
    
    15:22:00.493 -- Sending PUSH_REQUEST to server...
    
    15:22:01.223 -- OPTIONS:
    0 [route-gateway] [192.168.10.1]
    1 [ping] [45]
    2 [ping-restart] [180]
    3 [route] [91.220.234.128] [255.255.255.128]
    4 [route] [172.16.0.0] [255.255.0.0]
    5 [route] [192.168.42.0] [255.255.255.0]
    6 [topology] [subnet]
    7 [route] [remote_host] [255.255.255.255] [net_gateway]
    8 [inactive] [900] [7680]
    9 [ifconfig] [192.168.10.16] [255.255.255.0]
    
    
    15:22:01.224 -- PROTOCOL OPTIONS:
      cipher: AES-128-CBC
      digest: SHA256
      compress: LZO_STUB
      peer ID: -1
    
    15:22:01.232 -- EVENT: ASSIGN_IP
    
    15:22:01.268 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway]  : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument
    
    15:22:01.388 -- Connected via tun
    
    15:22:01.390 -- LZO-ASYM init swap=0 asym=1
    
    15:22:01.390 -- Comp-stub init swap=0
    
    15:22:01.395 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.16/ gw=[192.168.10.1/]'
    
    15:16:34.285 -- ----- OpenVPN Start -----
    
    15:16:34.286 -- EVENT: CORE_THREAD_ACTIVE
    
    15:16:34.292 -- OpenVPN core 3.git::728733ae:Release android arm64 64-bit PT_PROXY built on Aug 14 2019 14:13:26
    
    15:16:34.293 -- Frame=512/2048/512 mssfix-ctrl=1250
    
    15:16:34.293 -- UNUSED OPTIONS
    3 [resolv-retry] [infinite]
    4 [nobind]
    5 [persist-key]
    6 [persist-tun]
    14 [route-delay] [4]
    15 [verb] [3]
    
    15:16:34.294 -- EVENT: RESOLVE
    
    15:16:34.298 -- Contacting 94.175.241.190:8443 via TCPv4
    
    15:16:34.299 -- EVENT: WAIT
    
    15:16:34.308 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4
    
    15:16:34.310 -- EVENT: CONNECTING
    
    15:16:34.312 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client
    
    15:16:34.312 -- Creds: Username/Password
    
    15:16:34.312 -- Peer Info:
    IV_GUI_VER=OC30Android
    IV_VER=3.git::728733ae:Release
    IV_PLAT=android
    IV_NCP=2
    IV_TCPNL=1
    IV_PROTO=2
    IV_LZO_STUB=1
    IV_COMP_STUB=1
    IV_COMP_STUBv2=1
    
    
    15:16:34.458 -- VERIFY OK : depth=1
    cert. version     : 3
    serial number     : 94:2C:96:F9:40:D8:6B:BC
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2019-05-13 17:32:43
    expires on        : 2036-12-31 17:32:43
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=true
    
    
    15:16:34.458 -- VERIFY OK : depth=0
    cert. version     : 3
    serial number     : 15:57:76:87:62
    issuer name       : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    subject name      : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=SophosApplianceCertificate_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com
    issued  on        : 2015-08-01 00:00:00
    expires on        : 2036-12-31 23:59:59
    signed using      : RSA with SHA-256
    RSA key size      : 2048 bits
    basic constraints : CA=false
    
    
    15:16:34.943 -- SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA
    
    15:16:34.946 -- Session is ACTIVE
    
    15:16:34.948 -- EVENT: GET_CONFIG
    
    15:16:34.954 -- Sending PUSH_REQUEST to server...
    
    15:16:35.802 -- OPTIONS:
    0 [route-gateway] [192.168.10.1]
    1 [ping] [45]
    2 [ping-restart] [180]
    3 [route] [91.220.234.128] [255.255.255.128]
    4 [route] [172.16.0.0] [255.255.0.0]
    5 [topology] [subnet]
    6 [route] [remote_host] [255.255.255.255] [net_gateway]
    7 [inactive] [900] [7680]
    8 [ifconfig] [192.168.10.7] [255.255.255.0]
    
    
    15:16:35.803 -- PROTOCOL OPTIONS:
      cipher: AES-128-CBC
      digest: SHA256
      compress: LZO_STUB
      peer ID: -1
    
    15:16:35.804 -- EVENT: ASSIGN_IP
    
    15:16:35.824 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway]  : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument
    
    15:16:35.943 -- Connected via tun
    
    15:16:35.944 -- LZO-ASYM init swap=0 asym=1
    
    15:16:35.944 -- Comp-stub init swap=0
    
    15:16:35.944 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.7/ gw=[192.168.10.1/]'
    
    15:18:01.553 -- EVENT: DISCONNECTED trans=TO_DISCONNECTED
    
    15:18:01.556 -- Tunnel bytes per CPU second: 0
    
    15:18:01.557 -- ----- OpenVPN Stop -----
    
    15:57:31.269 -- ----- OpenVPN Start -----
    
    15:57:31.270 -- EVENT: CORE_THREAD_ACTIVE
    
    15:57:31.273 -- OpenVPN core 3.git:released:59f201be:Release android arm64 64-bit PT_PROXY
    
    15:57:31.274 -- Frame=512/2048/512 mssfix-ctrl=1250
    
    15:57:31.285 -- UNUSED OPTIONS
    3 [resolv-retry] [infinite]
    4 [nobind]
    5 [persist-key]
    6 [persist-tun]
    14 [route-delay] [4]
    15 [verb] [3]
    
    15:57:31.288 -- EVENT: RESOLVE
    
    15:57:31.292 -- Contacting 94.175.241.190:8443 via TCPv4
    
    15:57:31.292 -- EVENT: WAIT
    
    15:57:32.335 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4
    
    15:57:32.361 -- EVENT: CONNECTING
    
    15:57:32.393 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client
    
    15:57:32.395 -- Creds: Username/Password
    
    15:57:32.397 -- Peer Info:
    IV_VER=3.git:released:59f201be:Release
    IV_PLAT=android
    IV_NCP=2
    IV_TCPNL=1
    IV_PROTO=2
    IV_LZO_STUB=1
    IV_COMP_STUB=1
    IV_COMP_STUBv2=1
    IV_GUI_VER=net.openvpn.connect.android_3.2.0-4893
    IV_SSO=openurl
    
    
    15:57:32.950 -- VERIFY OK: depth=1, /C=GB/ST=Berkshire/L=Slough/O=Crossflight Limited/OU=OU/CN=Sophos_CA_C330AC73MVJ2YF5/emailAddress=it.operations@crossflight.com
    
    15:57:32.951 -- VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Slough/O=Crossflight Limited/OU=OU/CN=SophosApplianceCertificate_C330AC73MVJ2YF5/emailAddress=it.operations@crossflight.com
    
    15:57:33.584 -- SSL Handshake: CN=SophosApplianceCertificate_C330AC73MVJ2YF5, TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    
    15:57:33.587 -- Session is ACTIVE
    
    15:57:33.588 -- EVENT: GET_CONFIG
    
    15:57:33.596 -- Sending PUSH_REQUEST to server...
    
    15:57:34.508 -- OPTIONS:
    0 [route-gateway] [192.168.10.1]
    1 [ping] [45]
    2 [ping-restart] [180]
    3 [route] [91.220.234.128] [255.255.255.128]
    4 [route] [172.16.0.0] [255.255.0.0]
    5 [route] [192.168.42.0] [255.255.255.0]
    6 [topology] [subnet]
    7 [route] [remote_host] [255.255.255.255] [net_gateway]
    8 [inactive] [900] [7680]
    9 [ifconfig] [192.168.10.14] [255.255.255.0]
    
    
    15:57:34.510 -- PROTOCOL OPTIONS:
      cipher: AES-128-CBC
      digest: SHA256
      compress: LZO_STUB
      peer ID: -1
    
    15:57:34.519 -- EVENT: ASSIGN_IP
    
    15:57:34.534 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway]  : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument
    
    15:57:34.613 -- Connected via tun
    
    15:57:34.615 -- LZO-ASYM init swap=0 asym=1
    
    15:57:34.615 -- Comp-stub init swap=0
    
    15:57:34.616 -- EVENT: CONNECTED info='guy.test@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.14/ gw=[192.168.10.1/]'
    
    15:57:37.796 -- EVENT: DISCONNECTED trans=TO_DISCONNECTED
    
    15:57:37.796 -- Tunnel bytes per CPU second: 0
    
    15:57:37.796 -- ----- OpenVPN Stop -----
    
    16:58:10.006 -- ----- OpenVPN Start -----
    
    16:58:10.007 -- EVENT: CORE_THREAD_ACTIVE
    
    16:58:10.027 -- OpenVPN core 3.git:released:a290b87d:Release android arm64 64-bit PT_PROXY
    
    16:58:10.028 -- Frame=512/2048/512 mssfix-ctrl=1250
    
    16:58:10.029 -- UNUSED OPTIONS
    3 [resolv-retry] [infinite]
    4 [nobind]
    5 [persist-key]
    6 [persist-tun]
    14 [route-delay] [4]
    15 [verb] [3]
    
    16:58:10.030 -- EVENT: RESOLVE
    
    16:58:10.036 -- Contacting 94.175.241.190:8443 via TCPv4
    
    16:58:10.036 -- EVENT: WAIT
    
    16:58:10.039 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4
    
    16:58:10.053 -- EVENT: CONNECTING
    
    16:58:10.055 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client
    
    16:58:10.056 -- Creds: Username/Password
    
    16:58:10.056 -- Peer Info:
    IV_VER=3.git:released:a290b87d:Release
    IV_PLAT=android
    IV_NCP=2
    IV_TCPNL=1
    IV_PROTO=2
    IV_LZO_STUB=1
    IV_COMP_STUB=1
    IV_COMP_STUBv2=1
    IV_GUI_VER=net.openvpn.connect.android_3.2.1-4961
    IV_SSO=openurl
    
    
    16:58:10.317 -- VERIFY OK: depth=1, /C=GB/ST=Berkshire/L=Slough/O=Crossflight Limited/OU=OU/CN=Sophos_CA_C330AC73MVJ2YF5/emailAddress=it.operations@crossflight.com
    
    16:58:10.319 -- VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Slough/O=Crossflight Limited/OU=OU/CN=SophosApplianceCertificate_C330AC73MVJ2YF5/emailAddress=it.operations@crossflight.com
    
    16:58:10.723 -- SSL Handshake: CN=SophosApplianceCertificate_C330AC73MVJ2YF5, TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
    
    16:58:10.724 -- Session is ACTIVE
    
    16:58:10.726 -- EVENT: GET_CONFIG
    
    16:58:10.736 -- Sending PUSH_REQUEST to server...
    
    16:58:11.540 -- OPTIONS:
    0 [route-gateway] [192.168.10.1]
    1 [ping] [45]
    2 [ping-restart] [180]
    3 [route] [91.220.234.128] [255.255.255.128]
    4 [route] [172.16.0.0] [255.255.0.0]
    5 [route] [192.168.42.0] [255.255.255.0]
    6 [topology] [subnet]
    7 [route] [remote_host] [255.255.255.255] [net_gateway]
    8 [inactive] [900] [7680]
    9 [ifconfig] [192.168.10.3] [255.255.255.0]
    
    
    16:58:11.542 -- PROTOCOL OPTIONS:
      cipher: AES-128-CBC
      digest: SHA256
      compress: LZO_STUB
      peer ID: -1
    
    16:58:11.546 -- EVENT: ASSIGN_IP
    
    16:58:11.570 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway]  : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument
    
    16:58:11.676 -- Connected via tun
    
    16:58:11.677 -- LZO-ASYM init swap=0 asym=1
    
    16:58:11.677 -- Comp-stub init swap=0
    
    16:58:11.681 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.3/ gw=[192.168.10.1/]' trans=TO_CONNECTED