Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos XG Firewall 16.01.1 on XG135 - Unable to run SSL VPN (Remote Access) - Please Help...

Hello,

After configuring the VPN SSL client (as described into the documentation) our SSL VPN clients can't connect to the firewall:

Mon Nov 21 16:35:58 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:03 2016 MANAGEMENT: >STATE:1479742563,RESOLVE,,,,,,
Mon Nov 21 16:36:03 2016 MANAGEMENT: >STATE:1479742563,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:13 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:18 2016 MANAGEMENT: >STATE:1479742578,RESOLVE,,,,,,
Mon Nov 21 16:36:18 2016 MANAGEMENT: >STATE:1479742578,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:28 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:33 2016 MANAGEMENT: >STATE:1479742593,RESOLVE,,,,,,
Mon Nov 21 16:36:33 2016 MANAGEMENT: >STATE:1479742593,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:43 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:48 2016 MANAGEMENT: >STATE:1479742608,RESOLVE,,,,,,
Mon Nov 21 16:36:48 2016 MANAGEMENT: >STATE:1479742608,TCP_CONNECT,,,,,,

The firewall is behind a NAT router which forwards the traffic correctly (we tried to setup the tunnel from the LAN too without success).

As you can see the PCAP tool logs the 8443 port traffic from the VPN client

The configuration:

 

 

 

We tried to use a new self signed certificate too, but nothing changes...

 

Some additional info:

We changed the appliance LAN and WAN IP after the setup wizard.

The appliance is in HA mode.

 

Thank you for your help.

Stefano

 



This thread was automatically locked due to age.
Parents Reply
  • HI Stefano27383, 

    I would need some more information on this issue. 

    Are you using External Authentication server or is the user local ?

    After changing the settings on SSL , did you re-download the configuration file and import it ?

    Is your WAN IP private or Public Address ?

    Do you see the logs on Authentication for SSL connection. ?

Children
  • Aditya Patel said:

    HI Stefano27383, 

    I would need some more information on this issue. 

    1. Are you using External Authentication server or is the user local ?

    2. After changing the settings on SSL , did you re-download the configuration file and import it ?

    3. Is your WAN IP private or Public Address ?

    4. Do you see the logs on Authentication for SSL connection. ?

     

    Hi Aditya,

    I'll reply point by point:

    1. Active Directory auth - working fine with user portal we selected this mechanism for VPN SSL too. [I think the issue is before the auth]

    2. Yes, settings updated but same behavior

    3. No, We have a NAT router forwarding TCP 8443, UDP 8443 and other working ports. Even trying from LAN he client logs the same error (obviously resolving and pointing to the private/natted IP of the WAN interface)

    4. No logs for VPN. Only AD and STAS..

     

    One thing to note: since the appliances came with SFOS v15 I used the SGOS v16.01 iso image on a DVD to format and start from scratch... This should not be an issue but...

    Thank you for helping.

    Stefano.

  • Hi Stefano,

    How is the network structured? Is there an adjacent network device to XG communicating with the internet? Provide us a network diagram.

    Show us a picture of FW-rules for SSL VPN. On what port does SSL VPN is configured to communicate, any changes?

    Remove the auxilliary appliance from HA and try to connect the SSL VPN, does that help ?

    Thanks

  • Hi sachingurung,

    we have the following layout (working with the previous UTM)

     

    [DSL line]------[WAN Public IP][Internet Router][LAN 192.168.1.1]-------[WAN 192.168.1.254][Sophos XG1][LAN 10.7.7.1/24]

                                                                                                   |                                                      [HA on eth4]

                                                                                                   | -------[WAN 192.168.1.254][Sophos XG2][LAN 10.7.7.3/24]

     

    From the internet router WAN interface to the XG appliance we successfully NAT the ports 443 (user portal), 4422 (SUM), 3389, etc... we see packets coming in trough the 8443 port to the XG WAN interface.

     

    Here the screenshots:

     

    I'm thinking to remove the primary node, format, reconfigure and test again....

    Thank you for you time.

    Stefano.

     

  • Solved rebuilding the cluster.

    • Removed node 2 from HA, and reverted to factory default configuration.
    • Rebuilt VPN configuration on node 1.

    Everything fine now...

    ...but I have no clue of what happened to the configuration sync process, and why only VPN SSL service was affected.

    Thank you all for you support.

     

  • Hi Stefano,

    Wonderful that the issue is resolved rebuilding HA. XG might have encountered a backend glitch while syncing the ctsyncd and msync files in HA modes. The RCA can only be provided via support.

    Thanks

  • Hi All,

    still facing the same issue when joining HA nodes....

    When the system is running as stand-alone there are no issues.

    I want the UTM ha sync daemon back :(

     

     

  • Stefano,

    Open a ticket with the Support. It can be a bug or some daemon that stop working.

    Let us know the answer.

    Thanks

  • Just ot let you know:

    On Friday I reinstalled both devices.

    Re-imported the config (on a single node) and everything was fine.

    After setting up the HA I lost the SSL VPN service and the IPSEC service (again).

    How many of you have a working setup with HA and SSL VPN Clients?

     

    I will open a case....

  • Hi,

    Provide me the case# from support. I will monitor the case.

    Thanks

  • Stefano,

    just to let you know you're not alone.


    I currently have several tickets by the support because of HA (and HA with IPsec): split-brain on reboot of the primary (secondary locked in "fail-safe mode"), broken sync DB, IPsec not handled by HA (tunnel goes down for 70 to 180 seconds - but this seems related to lack of IKEv2), etc...