Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos XG Firewall 16.01.1 on XG135 - Unable to run SSL VPN (Remote Access) - Please Help...

Hello,

After configuring the VPN SSL client (as described into the documentation) our SSL VPN clients can't connect to the firewall:

Mon Nov 21 16:35:58 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:03 2016 MANAGEMENT: >STATE:1479742563,RESOLVE,,,,,,
Mon Nov 21 16:36:03 2016 MANAGEMENT: >STATE:1479742563,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:13 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:18 2016 MANAGEMENT: >STATE:1479742578,RESOLVE,,,,,,
Mon Nov 21 16:36:18 2016 MANAGEMENT: >STATE:1479742578,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:28 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:33 2016 MANAGEMENT: >STATE:1479742593,RESOLVE,,,,,,
Mon Nov 21 16:36:33 2016 MANAGEMENT: >STATE:1479742593,TCP_CONNECT,,,,,,
Mon Nov 21 16:36:43 2016 TCP: connect to [AF_INET]x.x.x.x:8443 failed, will try again in 5 seconds: The system tried to join a drive to a directory on a joined drive.
Mon Nov 21 16:36:48 2016 MANAGEMENT: >STATE:1479742608,RESOLVE,,,,,,
Mon Nov 21 16:36:48 2016 MANAGEMENT: >STATE:1479742608,TCP_CONNECT,,,,,,

The firewall is behind a NAT router which forwards the traffic correctly (we tried to setup the tunnel from the LAN too without success).

As you can see the PCAP tool logs the 8443 port traffic from the VPN client

The configuration:

 

 

 

We tried to use a new self signed certificate too, but nothing changes...

 

Some additional info:

We changed the appliance LAN and WAN IP after the setup wizard.

The appliance is in HA mode.

 

Thank you for your help.

Stefano

 



This thread was automatically locked due to age.
  • Hi All,

    still facing the same issue when joining HA nodes....

    When the system is running as stand-alone there are no issues.

    I want the UTM ha sync daemon back :(

     

     

  • Stefano,

    Open a ticket with the Support. It can be a bug or some daemon that stop working.

    Let us know the answer.

    Thanks

  • Just ot let you know:

    On Friday I reinstalled both devices.

    Re-imported the config (on a single node) and everything was fine.

    After setting up the HA I lost the SSL VPN service and the IPSEC service (again).

    How many of you have a working setup with HA and SSL VPN Clients?

     

    I will open a case....

  • Hi,

    Provide me the case# from support. I will monitor the case.

    Thanks

  • Stefano,

    just to let you know you're not alone.


    I currently have several tickets by the support because of HA (and HA with IPsec): split-brain on reboot of the primary (secondary locked in "fail-safe mode"), broken sync DB, IPsec not handled by HA (tunnel goes down for 70 to 180 seconds - but this seems related to lack of IKEv2), etc...

  • Thank you for sharing David.

    Yesterday we restored our UTM in order to re-format the two XGs and start with a brand new configuration too (without importing the backup config).

    The intention was to solve this basic issues without firing up a support case.

    After reading your message, I doubt this exercise will be useful.

    Maybe running on a stand alone appliance is the only safe option for now.

    Regards.

    Stefano.

  • Just got confirmation by the support team...

    IPsec tunnel goes down for 50 to 170 seconds when switching from active to passive appliance.
    Might change (be fixed?) in SFOS 17 with IKEv2 but not sure.


    There's currently no public (customer or support L2/L3) way to rebuild the sync DB in case of "Probable DB sync problem".
    Switching from active to passive doesn't rebuild either, it is suppose to rebuild itself in case it's needed.
    The only official way is to break (disable) HA, that makes the passive appliance do a factory reset (means you have to reconfigure it from scratch) and rebuild the cluster.

  • Replying to myself...
    I've just disabled HA on a XG105 cluster with the "Probable DB sync problem" in the log.

    The error keeps on showing up every 50 seconds in the log.
    And the "Control Center" shows "Services" in orange because msyncd is stopped.

  • this is a cluster issue and should have priority on releasing a fix.

    Can you investigate internally and provide more information with JIRA number and ETA?

    I think that cluster configuration need more attention than single installation.

    Thanks

  • Hi David,

    VPN traffic will not be load balanced in HA. When a failover happens, the connection is handled by the standalone device that acts on the HA failure of the other device. I doubt that is the reason for IPSec tunnel to go down when switching from Active to Passive. Did support provide you an RCA?

    Thanks