I installed Sophos XG Firewall (SFOS 15.01.0 MR-3) in a VM.
Port1 is LAN with default IP settings = 172.16.16.16/24, no gateway
Port2 is WAN with IP settings via DHCP = 192.168.xxx.44/24, gateway 192.168.xxx.96
I login to console and start from Main Menu the Device Activation
After entering the serial number I got following messages:
Device Activation in progress......
Activation process failed.
SSL connection error. SSL handshaking failed. Please contact Support.
I have a home licence and therefore no technical vendor support.
Here is what I saw during the activation process with a network sniffer.
17:14:08.274090 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 66: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [S], seq 3916523970, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
17:14:08.297751 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 66: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [S.], seq 3472106248, ack 3916523971, win 17922, options [mss 8961,nop,nop,sackOK,nop,wscale 7], length 0
17:14:08.297849 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [.], ack 1, win 229, length 0
17:14:08.298164 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 62: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [P.], seq 1:9, ack 1, win 229, length 8
17:14:08.320815 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 310: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [P.], seq 1:257, ack 9, win 141, length 256
17:14:08.320906 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [.], ack 257, win 237, length 0
17:14:08.321175 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 310: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [P.], seq 9:265, ack 257, win 237, length 256
17:14:08.345412 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 74: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [P.], seq 257:277, ack 265, win 149, length 20
17:14:08.345579 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 154: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [P.], seq 265:365, ack 277, win 237, length 100
17:14:08.375170 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1514: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [.], seq 277:1737, ack 365, win 149, length 1460
17:14:08.375247 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1514: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [.], seq 1737:3197, ack 365, win 149, length 1460
17:14:08.375300 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [.], ack 3197, win 283, length 0
17:14:08.630554 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 740: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [P.], seq 3197:3883, ack 365, win 149, length 686
17:14:08.661078 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 69: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [P.], seq 365:380, ack 3883, win 305, length 15
17:14:08.719562 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 60: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [.], ack 380, win 149, length 0
17:14:08.719721 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 82: 192.168.xxx.44.58995 > 52.28.130.115.6061: Flags [P.], seq 380:408, ack 3883, win 305, length 28
17:14:08.745979 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 60: 52.28.130.115.6061 > 192.168.xxx.44.58995: Flags [.], ack 408, win 149, length 0
17:14:12.121669 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 86: 192.168.xxx.44.32988 > 192.168.xxx.96.53: 13984+ A? eu-prod-utm.soa.sophos.com. (44)
17:14:12.121814 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 86: 192.168.xxx.44.26701 > 192.168.xxx.96.53: 24878+ AAAA? eu-prod-utm.soa.sophos.com. (44)
17:14:12.185716 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 199: 192.168.xxx.96.53 > 192.168.xxx.44.26701: 24878 1/1/0 CNAME eu-prod-01-utm.soa.sophos.com. (157)
17:14:12.647940 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 131: 192.168.xxx.96.53 > 192.168.xxx.44.32988: 13984 2/0/0 CNAME eu-prod-01-utm.soa.sophos.com., A 54.77.84.45 (89)
17:14:15.209610 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 89: 192.168.xxx.44.41925 > 192.168.xxx.96.53: 4551+ AAAA? eu-prod-01-utm.soa.sophos.com. (47)
17:14:15.211824 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 89: 192.168.xxx.96.53 > 192.168.xxx.44.41925: 4551 0/0/0 (47)
17:14:15.669639 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 89: 192.168.xxx.44.5528 > 192.168.xxx.96.53: 34608+ A? eu-prod-01-utm.soa.sophos.com. (47)
17:14:15.671692 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 105: 192.168.xxx.96.53 > 192.168.xxx.44.5528: 34608 1/0/0 A 54.77.84.45 (63)
17:14:15.672193 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 66: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [S], seq 516595310, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
17:14:15.672737 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 66: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [S.], seq 43902033, ack 516595311, win 29200, options [mss 1460,nop,nop,sackOK,nop,wscale 7], length 0
17:14:15.672971 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [.], ack 1, win 229, length 0
17:14:15.708885 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 66: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [S.], seq 3663535847, ack 516595311, win 17922, options [mss 1460,nop,nop,sackOK,nop,wscale 8], length 0
17:14:15.708987 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [.], ack 675333483, win 229, length 0
17:14:15.725101 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 571: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [P.], seq 1:518, ack 675333483, win 229, length 517
17:14:15.725220 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 54: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [.], ack 518, win 237, length 0
17:14:15.745053 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 60: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [R], seq 43902034, win 0, length 0
17:14:15.761024 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 60: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [R], seq 43902034, win 0, length 0
17:14:15.830457 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 74: 52.18.180.21.443 > 192.168.xxx.44.54167: Flags [S.], seq 2763694158, ack 2044591030, win 17898, options [mss 1460,sackOK,TS val 267565435 ecr 368480041,nop,wscale 8], length 0
17:14:15.869152 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 66: 52.18.180.21.443 > 192.168.xxx.44.54167: Flags [.], ack 518, win 75, options [nop,nop,TS val 267565444 ecr 368480050], length 0
17:14:15.873065 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1514: 52.18.180.21.443 > 192.168.xxx.44.54167: Flags [.], seq 1:1449, ack 518, win 75, options [nop,nop,TS val 267565445 ecr 368480050], length 1448
17:14:15.873169 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1602: 52.18.180.21.443 > 192.168.xxx.44.54167: Flags [P.], seq 1449:2985, ack 518, win 75, options [nop,nop,TS val 267565445 ecr 368480050], length 1536
17:14:15.873574 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1502: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [P.], seq 675333483:675334931, ack 518, win 237, length 1448
17:14:15.873639 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 1514: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [.], seq 675334931:675336391, ack 518, win 237, length 1460
17:14:15.873707 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 130: 54.77.84.45.443 > 192.168.xxx.44.37536: Flags [P.], seq 675336391:675336467, ack 518, win 237, length 76
17:14:15.873924 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [R], seq 516595828, win 0, length 0
17:14:15.873996 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [R], seq 516595828, win 0, length 0
17:14:15.873999 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.37536 > 54.77.84.45.443: Flags [R], seq 516595828, win 0, length 0
17:14:15.913465 e0:ce:c3:f5:58:f2 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 66: 52.18.180.21.443 > 192.168.xxx.44.54167: Flags [F.], seq 2985, ack 519, win 75, options [nop,nop,TS val 267565455 ecr 368480061], length 0
17:14:16.829549 00:0c:29:21:c2:b7 > 00:0c:29:dd:20:14, ethertype IPv4 (0x0800), length 54: 84.39.152.32.80 > 192.168.xxx.44.44124: Flags [F.], seq 1537311383, ack 665, win 239, length 0
17:14:16.869473 00:0c:29:dd:20:14 > e0:ce:c3:f5:58:f2, ethertype IPv4 (0x0800), length 60: 192.168.xxx.44.44124 > 84.39.152.32.80: Flags [.], ack 1537311384, win 365, length 0
From that I understand that the firewall has access to the internet and contact different server (52.28.130.115 and 52.18.180.21 and 54.77.84.45). From Whois these IP's belong to Amazon. But I have no clue why SSL connection fail.
Did anyone had the same problem and a solution or anyone has an idea how to solve the problem?
Thanks
This thread was automatically locked due to age.