Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Tunnel traffic - unable to access web admin for "HO" firewall (previously worked on UTM)

Trying to replace a BO UTM with a XG. Running into issues where allowed networks are not allowed to access the HO :4444 (or any other web traffic within the tunnel).

The issue effects all SSL/TLS traffic. Any web traffic (regardless of port) times out with the following packet logs:

Not sure if this is coincident, but we also get the logs littered with this:

Where 192.168.12.12 is the "public" side of the XG (this is a lab behind another router) and the public IP starting with 69. is the WAN of the HO. As a note: routing works fine and we are able to ping all of these IPs with zero issues. We also see the traffic hitting the HO firewall (and being accepted).

Any suggestions are welcomed.



This thread was automatically locked due to age.
Parents Reply Children
  • Can you generate a tcpdump on both firewalls and extract them via wireshark? 

    I would like to know the MTU Size of the packets as well as the reason for the drop. 

    You can do it on SFOS first. 

    tcpdump -ni any port 443 and host SERVERIP -b -w /tmp/dump.pcap

    Then download it via SCP: https://support.sophos.com/support/s/article/KB-000035842?language=en_US

    Eitherway, it could be a MTU problem or a TLS problem of the engine. We should be able to see the reason in the Dump. 

    You can do the same dump at the same time on UTM as well. So we can compare the packets. 

    __________________________________________________________________________________________________________________

  • Is there a way I can DM you the .pcap files?

  • Looking at your dumps, there is no TLS Handshake. Not even a TCP handshake. You see a simple SYN paket but UTM is not sending it and dropping it. 

    based on the dump of UTM, it sees the packet (unicast to us = getting send the packet) but it does not forward it to the server. 

    This means, the UTM is not forwarding this packet to the server. 

    If you redo the packet captures and do a SSH as well, what do you see? 

    BTW: Just for transparency: You do not see in a tcpdump on SFOS the packets going out the tunnel. Only the coming back packets. 

    __________________________________________________________________________________________________________________

  • I sent another pcap for an attempted RDP session.