Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

new XG installs are causing ScreenConnect 'last connected' timer resets even though NO security services are enabled.

I have now set up two firewalls for two different clients who also use our screenconnect software on their machines for us to remotely connect for repair, diagnostics, etc. The screenconnect software on the client machine will regularly poll back to the screenconnect server (located in my office) to let the server know that it is available and online. This shows as a 'time connected' counter in the screenconnect dashboard. This has always been very stable, and has not been blocked or otherwise interfered with by any other firewall or security appliance. All clients that do not have sophos firewalls do not exhibit this behavior. However, the two XG (115 and 210) firewalls that I have installed in the last two days are causing that counter to reset every 5 minutes (I can see the activity in the screenconnect logs). Both firewalls are in gateway mode, directly connected to the ISP and have NO security services enabled yet. No AV, no IPS, No web filter...nothing. Just the default rule in the firewall that is put in place during the initial configuration wizard.

FYI, the client is set to relay out to the screenconnect server on port 80 and 443, so I don't understand why that would get reset every 5 minutes.



This thread was automatically locked due to age.
Parents
  • Hi Paul,

    Check #1 in my guide here. Capture drops on the destination/ source IP and port. If you do not see any drops, take a pcap and verify who generates the RESET packet.

    Thanks

  • console> drop-packet-capture 'host 192.168.1.249'
    [See packet capture below]

    from the GUI

     Any help interpreting this would be appreciated

  • Hi Sam,

    Try this, configure a plain FW-rule; all the filters set to NONE for a specific source IP address. LAN(192.168.1.249)> ANY> WAN.

    Do you discover any sort of disconnection on this source after this?

    Thanks

  • ScreenConnect continues to disconnect. 

    Forwarding rule placed on top:

    Source Zone: WAN  |  Allowed Client Networks: Any

    Destination Host/Network: 24.240.246.46  |  Forward Type: Everything

    Forwarded to, Protected Server (internal IP 192.168.1.249)

    Intrusion Prevention: None, Traffic Shaping: None  |  Synchronized Security: No Restriction  |  Minimum Destination HB Permitted: No Restriction

    Routing: Check ON: Rewrite source address (Masquerading)  |  Use Outbound Address (NAT policy using 24.240.246.46)  |  Check ON: Create Reflexive Rule

    ---------------------------------

    Test server on IP 192.168.1.249

    Correct public IP for outbound traffic detected (GRC Shields Up)

    GRC Sheilds Up report:

  • Hi Sam,

    This is a DNAT rule I suppose, if you are trying to connect to a remote system hosted externally from a system behind XG then, configure a LAN to WAN rule with NONE filter. If there is any misunderstanding, I would be glad to realize it now than later.

  • These are the choices I'm given, in version 16 of SFOS

    When creating the rule, I choose, Business Application Rule

     

    Then select DNAT/Full NAT / Load Balancing

  • Hi Sam,

    I read your initial question again, the screen connect server is situated in your network; the question is that, is XG hosting these servers? The plain FW-rule was meant to be configured on the client's end which is user/network rule placed on the TOP with NONE filters defined. 

    Thanks

  • ScreenConnect (Cloud version) the SC server is hosted on the Amazon AWS data center.  The ScreenConnect Clients are installed on the customer's servers behind the XG firewall - at the customer's business location.

    The plain FW-rule was created on the XG at the customer's site.  I don't have access to the AWS datacenter, this is cared for by the ScreenConnect company.

    Confirmed, the plain FW-rule is on on the TOP or highest position, above all other rules

     

     

  • Hi Sam,

    I still don't see a Plain FW-rule on TOP! I see a WAN to LAN FW-rule. Check the screenshot for a glimpse of how the FW-rule must look and be placed.

    Thanks

  • I'm currently testing the XG and have noticed the same behaviour, creating a ANY ANY rule on top did not seem to make a difference, I've since changed the rule to be ANY->Known IP and it also does not help the behaviour, but is clearly the rule being used as the traffic count increases and a packet capture in the GUI shows this rule ID being used - is there any way to download these webgui packet captures as regular pcap files?

    The rule:

     

    Entries on the firewall log (from the log viewer) show that this is reliably every 5 minutes

    Which is also reflected in the connection timeline on our ScreenConnect server - the one here showing 13 minutes was a connection bypassing the XG

    While the client was connected, only a few packets went through the XG displaying only 3 lines in the packet capture GUI. Once the connection dropped and re-established the packet capture page count jumped up to 19! This probably isn't very informative (surely there's a way to export this as a pcap?) but here is a sample of the packet capture, which does show some packets hitting a different rule ID for some reason

    To clarify info on the IPs above:
    172.16.16.30 - client machine
    172.16.16.16 - XG LAN Port1
    10.0.3.15 - XG WAN Port2
    ***.99 - ScreenConnect server

    Hope this somehow helps us all get to the bottom of this one!

  • We've had this issue since v16. In v15, this wasn't an issue.

    Exception fixes it.

Reply Children
No Data