Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Packet loss when not using VPN XGS87w?

Hello,

I have an odd issue with an XGS87w recently installed. We experience a lot of packet loss when using the device's WAN connection to external addresses and the reverse. The packet loss clears up for about two minutes every 20 minutes or so. The loss is also not present when using SSL VPN to connect to device. I may be missing something obvious here but the device has very basic config with allow all out firewall setup and a few VPN users. I'm not really sure how to troubleshoot this issue. We have contacted the ISP regarding the loss and they saw some signal data out of spec but then why does the VPN clear up the packet loss? Any advice is much appreciated.https://showbox.tools/

Image 1 is from device during issue - There is one incoming and one consumed entry for every outgoing, I assume this is the same packet and that device is reporting that it is responding to every echo request.

Second image is from laptop during test where we see only one response packet arrive for every request.

Ping from external address to WAN address - ~50% packet loss most of the time

Ping from device to external address - ~50% packet loss most of the time

Connect from external site to VPN and ping LAN over VPN - No packet loss



This thread was automatically locked due to age.
Parents
  • FormerMember
    0 FormerMember

    Hi ,

    Thank you for reaching out to Sophos Community.

    Do you see any drops packets at the time of instance?

    Please check the packet flow for ICMP communication in CLI

    ==> Login to SSH > 4. Device Console

    console> tcpdump 'host WAN_address and proto ICMP

    ==> Check sequence number in the output.

    eg:

    10:47:30.869048 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1873, length 40
    10:47:30.869170 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1873, length 40
    10:47:31.877389 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1874, length 40
    10:47:31.877456 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1874, length 40
    10:47:32.910141 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1875, length 40
    10:47:32.910188 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1875, length 40
    10:47:33.933905 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1876, length 40
    10:47:33.933959 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1876, length 40

    ==> In other SSH session, check drop-packet-capture

    console> drop-packet-capture 'host WAN_address and proto ICMP

Reply
  • FormerMember
    0 FormerMember

    Hi ,

    Thank you for reaching out to Sophos Community.

    Do you see any drops packets at the time of instance?

    Please check the packet flow for ICMP communication in CLI

    ==> Login to SSH > 4. Device Console

    console> tcpdump 'host WAN_address and proto ICMP

    ==> Check sequence number in the output.

    eg:

    10:47:30.869048 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1873, length 40
    10:47:30.869170 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1873, length 40
    10:47:31.877389 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1874, length 40
    10:47:31.877456 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1874, length 40
    10:47:32.910141 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1875, length 40
    10:47:32.910188 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1875, length 40
    10:47:33.933905 Port2, IN: IP xx.21.xx.25 > xx.21.xx.28: ICMP echo request, id 1, seq 1876, length 40
    10:47:33.933959 Port2, OUT: IP xx.21.xx.28 > xx.21.xx.25: ICMP echo reply, id 1, seq 1876, length 40

    ==> In other SSH session, check drop-packet-capture

    console> drop-packet-capture 'host WAN_address and proto ICMP

Children
No Data