Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Error 500 with web policy or malware scanning active

 I have the default firewall rule which is used for internet browsing. Whenever I enable Malware scanning or web policy I can't visit any website. Even if the web policy is set to allow all, I get an error.

 

The error I get is always an error 500.

 

I've looked at the CPU and memory stats, they don't change as a result of changing these settings. CPU is always very low and memory sits around 60% pretty consistently.



This thread was automatically locked due to age.
Parents
  • Stephen,

    check that the patterns are updated.

    Regards

  • Thanks Luk

     

    I checked them and they have failed, I also tried to sync the license and it failed.

     

    I had the XG's DNS set to a local DNS server and separately google's DNS servers and it wasn't working, but when I set it to be the one provided by the PPPoE connection it worked. Oddly the rest of my client devices have no problems using that same DNS server to get online.

    Any thoughts on this root issue?

     

    ****further update*****

     

    I left the DNS setting on the PPPoE provided server, then the next time the XG went to check for updates(each 15 minutes) traffic stopped again(with malware scanning and web filter active). I checked for updates manually, and they failed.

     

    It seems the DNS client in the XG might be having an intermittency issue. I struggle with the possibility that all 3 of my internal DNS server, Google's and my ISP's DNS servers are intermittent.

     

    Any other thoughts or things I should check?

Reply
  • Thanks Luk

     

    I checked them and they have failed, I also tried to sync the license and it failed.

     

    I had the XG's DNS set to a local DNS server and separately google's DNS servers and it wasn't working, but when I set it to be the one provided by the PPPoE connection it worked. Oddly the rest of my client devices have no problems using that same DNS server to get online.

    Any thoughts on this root issue?

     

    ****further update*****

     

    I left the DNS setting on the PPPoE provided server, then the next time the XG went to check for updates(each 15 minutes) traffic stopped again(with malware scanning and web filter active). I checked for updates manually, and they failed.

     

    It seems the DNS client in the XG might be having an intermittency issue. I struggle with the possibility that all 3 of my internal DNS server, Google's and my ISP's DNS servers are intermittent.

     

    Any other thoughts or things I should check?

Children
  • Stephen,

    make sure that patterns are updated correctly. I had this issue after the XG installation several time, so a simple reboot forced the patterns to update correctly. If it does not work,

    have a look at this thread.

    For the dns, on client side use XG as DNS server. This will protect against pharmings attacks, caching, etc.

    Regards

  • Thanks

     

    I tried rebooting, and at first the XG was able to update patterns, but then 5 mins later they started failing. When I turned those protection items back on traffic didn't work again.

     

    I'm happy to use the XG for DNS, but I've found it to be pretty intermittent, so that's one of the reasons I have opted to use another DNS server. I'd want to overcome the stability issues first.

     

    Also, which thread are you referring you?

  • I tried looking into the u2d logs per that thread, but the symptoms they had with the excessive bandwidth and the u2d log file showing those errors are different to mine. I'm not having my bandwidth consumed.

    I also noticed that changing the DNS from the PPPoE radio button to the Static DNS server radio button allowed it to work, I suspect this is somehow part of the intermittency problem, however here are the two log files, one from before I changed anything, and the second from after I changed the DNS per above. 

    I noticed this line in the log, it's the 3rd last line from the second log, this was from a successful pattern update (second of the two logs shown below). This didn't happen in the 4th log.

    Mon Jun 12 07:49:31 2017 Either FILE or MSID received in U2DVERSION is blank, avira_19665-19685.tar.gz,

    Made a cup of coffee

    After leaving the device for about 20 minutes with no other settings changed, I tried to manually download another pattern updated, and I received the same log output as in the first instance.

    After flipping the DNS setting back to PPPoE again, it worked.

    Below are the 4 sets of logs

    First Log - Before changing DNS

    DEBUG Jun 12 07:44:11 [9719]: --serial = XXXX
    DEBUG Jun 12 07:44:11 [9719]: --deviceid = yyyy
    DEBUG Jun 12 07:44:11 [9719]: --fwversion = 16.05.5.233
    DEBUG Jun 12 07:44:11 [9719]: --productcode = CN
    DEBUG Jun 12 07:44:11 [9719]: --model = SF01V
    DEBUG Jun 12 07:44:11 [9719]: --vendor = SO01
    DEBUG Jun 12 07:44:11 [9719]: --pkg_ips_version = 3.13.65
    DEBUG Jun 12 07:44:11 [9719]: --pkg_ips_cv = 12.0
    DEBUG Jun 12 07:44:11 [9719]: --pkg_atp_version = 1.0.0145
    DEBUG Jun 12 07:44:11 [9719]: --pkg_atp_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_savi_version = 1.0.11071
    DEBUG Jun 12 07:44:11 [9719]: --pkg_savi_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_avira_version = 1.0.19684
    DEBUG Jun 12 07:44:11 [9719]: --pkg_avira_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_apfw_version = 8.0.001
    DEBUG Jun 12 07:44:11 [9719]: --pkg_apfw_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_waf_version = 1.0.0006
    DEBUG Jun 12 07:44:11 [9719]: --pkg_waf_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_sslvpn_version = 1.0.006
    DEBUG Jun 12 07:44:11 [9719]: --pkg_sslvpn_cv = 1.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_clientauth_version = 1.0.0007
    DEBUG Jun 12 07:44:11 [9719]: --pkg_clientauth_cv = 2.00
    DEBUG Jun 12 07:44:11 [9719]: --pkg_redfw_version = 2.0.007
    DEBUG Jun 12 07:44:11 [9719]: --pkg_redfw_cv = 2.00
    DEBUG Jun 12 07:44:11 [9719]: Added new server : Host - b, Port - 0
    DEBUG Jun 12 07:44:11 [9719]: Final query string is :
    ?&serialkey=XXXX&deviceid=yyyy&fwversion=16.05.5.233&productcode=CN&appmodel=SF01V&appvendor=SO01&useragent=SF&oem=&pkg_ips_version=3.13.65&pkg_ips_cv=12.0&pkg_atp_version=1.0.0145&pkg_atp_cv=1.00&pkg_savi_version=1.0.11071&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.19684&pkg_avira_patch=2&pkg_avira_cv=1.00&pkg_clientauth_version=1.0.0007&pkg_clientauth_cv=2.00&pkg_apfw_version=8.0.001&pkg_apfw_cv=1.00&pkg_redfw_version=2.0.007&pkg_redfw_cv=2.00&pkg_waf_version=1.0.0006&pkg_waf_cv=1.00&pkg_sslvpn_version=1.0.006&pkg_sslvpn_cv=1.00
    DEBUG Jun 12 07:44:11 [9719]: Response code : 0
    DEBUG Jun 12 07:44:11 [9719]: Response body :

    DEBUG Jun 12 07:44:11 [9719]: Response length : 0
    ERROR Jun 12 07:44:11 [9719]: Response not parsed successfully.
    ERROR Jun 12 07:44:11 [9719]: FATAL : Error in parsing response, exiting.

     

    Second Log - After changing DNS

    DEBUG Jun 12 07:47:50 [10216]: --serial = xxxx
    DEBUG Jun 12 07:47:50 [10216]: --deviceid = yyyy
    DEBUG Jun 12 07:47:50 [10216]: --fwversion = 16.05.5.233
    DEBUG Jun 12 07:47:50 [10216]: --productcode = CN
    DEBUG Jun 12 07:47:50 [10216]: --model = SF01V
    DEBUG Jun 12 07:47:50 [10216]: --vendor = SO01
    DEBUG Jun 12 07:47:50 [10216]: --pkg_ips_version = 3.13.65
    DEBUG Jun 12 07:47:50 [10216]: --pkg_ips_cv = 12.0
    DEBUG Jun 12 07:47:50 [10216]: --pkg_atp_version = 1.0.0145
    DEBUG Jun 12 07:47:50 [10216]: --pkg_atp_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_savi_version = 1.0.11071
    DEBUG Jun 12 07:47:50 [10216]: --pkg_savi_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_avira_version = 1.0.19684
    DEBUG Jun 12 07:47:50 [10216]: --pkg_avira_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_apfw_version = 8.0.001
    DEBUG Jun 12 07:47:50 [10216]: --pkg_apfw_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_waf_version = 1.0.0006
    DEBUG Jun 12 07:47:50 [10216]: --pkg_waf_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_sslvpn_version = 1.0.006
    DEBUG Jun 12 07:47:50 [10216]: --pkg_sslvpn_cv = 1.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_clientauth_version = 1.0.0007
    DEBUG Jun 12 07:47:50 [10216]: --pkg_clientauth_cv = 2.00
    DEBUG Jun 12 07:47:50 [10216]: --pkg_redfw_version = 2.0.007
    DEBUG Jun 12 07:47:50 [10216]: --pkg_redfw_cv = 2.00
    DEBUG Jun 12 07:47:50 [10216]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 07:47:50 [10216]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443
    DEBUG Jun 12 07:47:50 [10216]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 07:47:50 [10216]: Final query string is :
    ?&serialkey=xxxx&deviceid=yyyy&fwversion=16.05.5.233&productcode=CN&appmodel=SF01V&appvendor=SO01&useragent=SF&oem=&pkg_ips_version=3.13.65&pkg_ips_cv=12.0&pkg_atp_version=1.0.0145&pkg_atp_cv=1.00&pkg_savi_version=1.0.11071&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.19684&pkg_avira_patch=2&pkg_avira_cv=1.00&pkg_clientauth_version=1.0.0007&pkg_clientauth_cv=2.00&pkg_apfw_version=8.0.001&pkg_apfw_cv=1.00&pkg_redfw_version=2.0.007&pkg_redfw_cv=2.00&pkg_waf_version=1.0.0006&pkg_waf_cv=1.00&pkg_sslvpn_version=1.0.006&pkg_sslvpn_cv=1.00
    DEBUG Jun 12 07:47:51 [10216]: Response code : 200
    DEBUG Jun 12 07:47:51 [10216]: Response body :
    <Up2Date>
    <Package u2dtype="pattern">
    <File name="avira_1.00_1.0.19685_fdiff20.tar.gz.gpg">
    <location>d30ncyzaneb4q0.cloudfront.net/.../location>
    <version>1.0.19685</version>
    <size>9620006</size>
    <md5sum>8bd08d61ee67d4427ce77574311cafdc</md5sum>
    <module>avira</module>
    <cv>1.00</cv>
    <type>fdiff20</type>
    </File>
    <File name="savi_1.00_1.0.11073_fdiff20.tar.gz.gpg">
    <location>d30ncyzaneb4q0.cloudfront.net/.../location>
    <version>1.0.11073</version>
    <size>300822</size>
    <md5sum>10858763df89a34e979042eb6884c1e6</md5sum>
    <module>savi</module>
    <cv>1.00</cv>
    <type>fdiff20</type>
    </File>
    </Package>
    </Up2Date>

    DEBUG Jun 12 07:47:51 [10216]: Response length : 798
    DEBUG Jun 12 07:47:51 [10216]: Received name : avira_1.00_1.0.19685_fdiff20.tar.gz.gpg
    DEBUG Jun 12 07:47:51 [10216]: Received location : d30ncyzaneb4q0.cloudfront.net/avira_1.00_1.0.19685_fdiff20.tar.gz.gpg
    DEBUG Jun 12 07:47:51 [10216]: Received version : 1.0.19685
    DEBUG Jun 12 07:47:51 [10216]: Received size : 9620006
    DEBUG Jun 12 07:47:51 [10216]: Received md5sum : 8bd08d61ee67d4427ce77574311cafdc
    DEBUG Jun 12 07:47:51 [10216]: Received module : avira
    DEBUG Jun 12 07:47:51 [10216]: Received cv : 1.00
    DEBUG Jun 12 07:47:51 [10216]: Received type : fdiff20
    DEBUG Jun 12 07:47:51 [10216]: Received name : savi_1.00_1.0.11073_fdiff20.tar.gz.gpg
    DEBUG Jun 12 07:47:51 [10216]: Received location : d30ncyzaneb4q0.cloudfront.net/savi_1.00_1.0.11073_fdiff20.tar.gz.gpg
    DEBUG Jun 12 07:47:51 [10216]: Received version : 1.0.11073
    DEBUG Jun 12 07:47:51 [10216]: Received size : 300822
    DEBUG Jun 12 07:47:51 [10216]: Received md5sum : 10858763df89a34e979042eb6884c1e6
    DEBUG Jun 12 07:47:51 [10216]: Received module : savi
    DEBUG Jun 12 07:47:51 [10216]: Received cv : 1.00
    DEBUG Jun 12 07:47:51 [10216]: Received type : fdiff20
    Mon Jun 12 07:48:30 2017 Starting download for file avira_1.00_1.0.19685_fdiff20.tar.gz.gpg
    Mon Jun 12 07:48:30 2017 Starting download for file savi_1.00_1.0.11073_fdiff20.tar.gz.gpg
    Mon Jun 12 07:49:30 2017 Download completed for file avira_1.00_1.0.19685_fdiff20.tar.gz.gpg
    gpg: Signature made Sun Jun 11 21:46:38 2017 EST using RSA key ID 6A20EB0B
    gpg: NOTE: trustdb not writable
    gpg: Good signature from "Sophos Up2Date Server <updates@sophos.com>"
    Mon Jun 12 07:49:30 2017 Download for file avira_1.00_1.0.19685_fdiff20.tar.gz.gpg passed integrity and gpg checks
    Mon Jun 12 07:49:31 2017 Either FILE or MSID received in U2DVERSION is blank, avira_19665-19685.tar.gz,
    Mon Jun 12 07:49:31 2017 Current avira patterns are at /content/avira_1.00/1.0.19684
    Mon Jun 12 07:49:31 2017 New updated patterns are now at /content/avira_1.00/1.0.19685

    3rd Log - After waiting 20 minutes

    DEBUG Jun 12 08:10:50 [12787]: --serial = xxxx
    DEBUG Jun 12 08:10:50 [12787]: --deviceid = yyyy
    DEBUG Jun 12 08:10:50 [12787]: --fwversion = 16.05.5.233
    DEBUG Jun 12 08:10:50 [12787]: --productcode = CN
    DEBUG Jun 12 08:10:50 [12787]: --model = SF01V
    DEBUG Jun 12 08:10:50 [12787]: --vendor = SO01
    DEBUG Jun 12 08:10:50 [12787]: --pkg_ips_version = 3.13.65
    DEBUG Jun 12 08:10:50 [12787]: --pkg_ips_cv = 12.0
    DEBUG Jun 12 08:10:50 [12787]: --pkg_atp_version = 1.0.0145
    DEBUG Jun 12 08:10:50 [12787]: --pkg_atp_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_savi_version = 1.0.11073
    DEBUG Jun 12 08:10:50 [12787]: --pkg_savi_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_avira_version = 1.0.19685
    DEBUG Jun 12 08:10:50 [12787]: --pkg_avira_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_apfw_version = 8.0.001
    DEBUG Jun 12 08:10:50 [12787]: --pkg_apfw_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_waf_version = 1.0.0006
    DEBUG Jun 12 08:10:50 [12787]: --pkg_waf_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_sslvpn_version = 1.0.006
    DEBUG Jun 12 08:10:50 [12787]: --pkg_sslvpn_cv = 1.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_clientauth_version = 1.0.0007
    DEBUG Jun 12 08:10:50 [12787]: --pkg_clientauth_cv = 2.00
    DEBUG Jun 12 08:10:50 [12787]: --pkg_redfw_version = 2.0.007
    DEBUG Jun 12 08:10:50 [12787]: --pkg_redfw_cv = 2.00
    DEBUG Jun 12 08:10:50 [12787]: Added new server : Host - b, Port - 0
    DEBUG Jun 12 08:10:50 [12787]: Final query string is :
    ?&serialkey=xxxx&deviceid=yyyy&fwversion=16.05.5.233&productcode=CN&appmodel=SF01V&appvendor=SO01&useragent=SF&oem=&pkg_ips_version=3.13.65&pkg_ips_cv=12.0&pkg_atp_version=1.0.0145&pkg_atp_cv=1.00&pkg_savi_version=1.0.11073&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.19685&pkg_avira_patch=2&pkg_avira_cv=1.00&pkg_clientauth_version=1.0.0007&pkg_clientauth_cv=2.00&pkg_apfw_version=8.0.001&pkg_apfw_cv=1.00&pkg_redfw_version=2.0.007&pkg_redfw_cv=2.00&pkg_waf_version=1.0.0006&pkg_waf_cv=1.00&pkg_sslvpn_version=1.0.006&pkg_sslvpn_cv=1.00
    DEBUG Jun 12 08:10:50 [12787]: Response code : 0
    DEBUG Jun 12 08:10:50 [12787]: Response body :

    DEBUG Jun 12 08:10:50 [12787]: Response length : 0
    ERROR Jun 12 08:10:50 [12787]: Response not parsed successfully.
    ERROR Jun 12 08:10:50 [12787]: FATAL : Error in parsing response, exiting.

    4th Log - After changing DNS back

    DEBUG Jun 12 08:13:21 [13259]: --serial = xxxx
    DEBUG Jun 12 08:13:21 [13259]: --deviceid = yyyy
    DEBUG Jun 12 08:13:21 [13259]: --fwversion = 16.05.5.233
    DEBUG Jun 12 08:13:21 [13259]: --productcode = CN
    DEBUG Jun 12 08:13:21 [13259]: --model = SF01V
    DEBUG Jun 12 08:13:21 [13259]: --vendor = SO01
    DEBUG Jun 12 08:13:21 [13259]: --pkg_ips_version = 3.13.65
    DEBUG Jun 12 08:13:21 [13259]: --pkg_ips_cv = 12.0
    DEBUG Jun 12 08:13:21 [13259]: --pkg_atp_version = 1.0.0145
    DEBUG Jun 12 08:13:21 [13259]: --pkg_atp_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_savi_version = 1.0.11073
    DEBUG Jun 12 08:13:21 [13259]: --pkg_savi_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_avira_version = 1.0.19685
    DEBUG Jun 12 08:13:21 [13259]: --pkg_avira_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_apfw_version = 8.0.001
    DEBUG Jun 12 08:13:21 [13259]: --pkg_apfw_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_waf_version = 1.0.0006
    DEBUG Jun 12 08:13:21 [13259]: --pkg_waf_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_sslvpn_version = 1.0.006
    DEBUG Jun 12 08:13:21 [13259]: --pkg_sslvpn_cv = 1.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_clientauth_version = 1.0.0007
    DEBUG Jun 12 08:13:21 [13259]: --pkg_clientauth_cv = 2.00
    DEBUG Jun 12 08:13:21 [13259]: --pkg_redfw_version = 2.0.007
    DEBUG Jun 12 08:13:21 [13259]: --pkg_redfw_cv = 2.00
    DEBUG Jun 12 08:13:21 [13259]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:13:21 [13259]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:13:21 [13259]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:13:21 [13259]: Final query string is :
    ?&serialkey=xxxx&deviceid=yyyy&fwversion=16.05.5.233&productcode=CN&appmodel=SF01V&appvendor=SO01&useragent=SF&oem=&pkg_ips_version=3.13.65&pkg_ips_cv=12.0&pkg_atp_version=1.0.0145&pkg_atp_cv=1.00&pkg_savi_version=1.0.11073&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.19685&pkg_avira_patch=2&pkg_avira_cv=1.00&pkg_clientauth_version=1.0.0007&pkg_clientauth_cv=2.00&pkg_apfw_version=8.0.001&pkg_apfw_cv=1.00&pkg_redfw_version=2.0.007&pkg_redfw_cv=2.00&pkg_waf_version=1.0.0006&pkg_waf_cv=1.00&pkg_sslvpn_version=1.0.006&pkg_sslvpn_cv=1.00
    DEBUG Jun 12 08:13:23 [13259]: Response code : 200
    DEBUG Jun 12 08:13:23 [13259]: Response body :
    <Up2Date/>

    DEBUG Jun 12 08:13:23 [13259]: Response length : 11
    DEBUG Jun 12 08:14:21 [13616]: --serial = xxxx
    DEBUG Jun 12 08:14:21 [13616]: --deviceid = yyyy
    DEBUG Jun 12 08:14:21 [13616]: --fwversion = 16.05.5.233
    DEBUG Jun 12 08:14:21 [13616]: --productcode = CN
    DEBUG Jun 12 08:14:21 [13616]: --model = SF01V
    DEBUG Jun 12 08:14:21 [13616]: --vendor = SO01
    DEBUG Jun 12 08:14:21 [13616]: --pkg_ips_version = 3.13.65
    DEBUG Jun 12 08:14:21 [13616]: --pkg_ips_cv = 12.0
    DEBUG Jun 12 08:14:21 [13616]: --pkg_atp_version = 1.0.0145
    DEBUG Jun 12 08:14:21 [13616]: --pkg_atp_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_savi_version = 1.0.11073
    DEBUG Jun 12 08:14:21 [13616]: --pkg_savi_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_avira_version = 1.0.19685
    DEBUG Jun 12 08:14:21 [13616]: --pkg_avira_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_apfw_version = 8.0.001
    DEBUG Jun 12 08:14:21 [13616]: --pkg_apfw_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_waf_version = 1.0.0006
    DEBUG Jun 12 08:14:21 [13616]: --pkg_waf_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_sslvpn_version = 1.0.006
    DEBUG Jun 12 08:14:21 [13616]: --pkg_sslvpn_cv = 1.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_clientauth_version = 1.0.0007
    DEBUG Jun 12 08:14:21 [13616]: --pkg_clientauth_cv = 2.00
    DEBUG Jun 12 08:14:21 [13616]: --pkg_redfw_version = 2.0.007
    DEBUG Jun 12 08:14:21 [13616]: --pkg_redfw_cv = 2.00
    DEBUG Jun 12 08:14:21 [13616]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:14:21 [13616]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:14:21 [13616]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443
    DEBUG Jun 12 08:14:21 [13616]: Final query string is :
    ?&serialkey=xxxx&deviceid=yyyy&fwversion=16.05.5.233&productcode=CN&appmodel=SF01V&appvendor=SO01&useragent=SF&oem=&pkg_ips_version=3.13.65&pkg_ips_cv=12.0&pkg_atp_version=1.0.0145&pkg_atp_cv=1.00&pkg_savi_version=1.0.11073&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.19685&pkg_avira_patch=2&pkg_avira_cv=1.00&pkg_clientauth_version=1.0.0007&pkg_clientauth_cv=2.00&pkg_apfw_version=8.0.001&pkg_apfw_cv=1.00&pkg_redfw_version=2.0.007&pkg_redfw_cv=2.00&pkg_waf_version=1.0.0006&pkg_waf_cv=1.00&pkg_sslvpn_version=1.0.006&pkg_sslvpn_cv=1.00
    DEBUG Jun 12 08:14:22 [13616]: Response code : 200
    DEBUG Jun 12 08:14:22 [13616]: Response body :
    <Up2Date/>

    DEBUG Jun 12 08:14:22 [13616]: Response length : 11

  • Hi Luk

     

    I did a bit more digging into the logs and am starting to think there are deeper DNS issues causing this issue.

     

    I posted this new thread as it seems to better reflect where my troubleshooting is taking me.