Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

NPR Podcasts won't download

Sophos UTM 9.403-4.  Download of NPR podcasts used to work, but began failing 10 days ago.  No changes on my side other than UTM maintenance patches, but I don't know if NPR made changes.  Trying to download NPR podcasts on Android devices and now receive an error that I am unable to reach npr.mc.tritondigital.com.  I added the site to a list of sites that bypass the proxy but that didn't resolve the issue.  Log below: 

5/31/16
8:17:34.000 PM
May 31 20:17:34 192.168.0.254 2016:05:31-20:17:39 castleblack ulogd[18401]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth1" srcmac="00:30:18:a3:04:1a" srcip="54.225.143.212" dstip="192.168.0.126" proto="6" length="40" tos="0x00" prec="0x00" ttl="64" srcport="443" dstport="33042" tcpflags="RST"
host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall
5/31/16
8:17:15.000 PM
May 31 20:17:15 192.168.0.254 2016:05:31-20:17:20 castleblack ulogd[18401]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth1" srcmac="00:30:18:a3:04:1a" srcip="31.13.93.3" dstip="192.168.0.126" proto="6" length="40" tos="0x00" prec="0x00" ttl="64" srcport="443" dstport="44700" tcpflags="RST"
host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall
5/31/16
8:17:04.000 PM
May 31 20:17:04 192.168.0.254 2016:05:31-20:17:09 castleblack ulogd[18401]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth1" srcmac="00:30:18:a3:04:1a" srcip="216.58.209.14" dstip="192.168.0.126" proto="6" length="40" tos="0x00" prec="0x00" ttl="64" srcport="80" dstport="46773" tcpflags="RST"
host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall
5/31/16
8:17:03.000 PM
May 31 20:17:03 192.168.0.254 2016:05:31-20:17:08 castleblack httpproxy[5537]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.168.0.126" dstip="216.58.209.14" user="" group="" ad_domain="" statuscode="204" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="0" request="0xa0785800" url="clients3.google.com/generate_204" referer="" error="" authtime="0" dnstime="1529" cattime="325" avscantime="0" fullreqtime="378343" device="0" auth="0" ua="Dalvik/2.1.0 (Linux; U; Android 5.1; XT1060 Build/LPAS23.12-39.7-1)" exceptions="" category="178" reputation="neutral" categoryname="Internet Services" country="United States"
host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall:utm:firewall



This thread was automatically locked due to age.
Parents
  • Hi Scott,

    The log shows client3.google.com is allowed through UTM. 

    May 31 20:17:03 192.168.0.254 2016:05:31-20:17:08 castleblack httpproxy[5537]: id="0001" severity="info" sys="SecureWeb" sub="http" name="http access" action="pass" method="GET" srcip="192.168.0.126" dstip="216.58.209.14" user="" group="" ad_domain="" statuscode="204" cached="0" profile="REF_DefaultHTTPProfile (Default Web Filter Profile)" filteraction="REF_DefaultHTTPCFFAction (Default content filter action)" size="0" request="0xa0785800" url="clients3.google.com/generate_204" referer="" error="" authtime="0" dnstime="1529" cattime="325" avscantime="0" fullreqtime="378343" device="0" auth="0" ua="Dalvik/2.1.0 (Linux; U; Android 5.1; XT1060 Build/LPAS23.12-39.7-1)" exceptions="" category="178" reputation="neutral" categoryname="Internet Services" country="United States"
    host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall:utm:firewall

    Please post logs for the IP address lease on you mobile phone. Try command, tail -f *.log | grep x.x.x.x ( ipaddress).

    Alongside, why is TCP protocol dropped. Do you have any AntiDoS configured in UTM for TCP communications?

    May 31 20:17:34 192.168.0.254 2016:05:31-20:17:39 castleblack ulogd[18401]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth1" srcmac="00:30:18:a3:04:1a" srcip="54.225.143.212" dstip="192.168.0.126" proto="6" length="40" tos="0x00" prec="0x00" ttl="64" srcport="443" dstport="33042" tcpflags="RST" 
    host = 192.168.0.254 source = udp:514 sourcetype = sophos:utm:firewall

    Thanks

  • No AntiDOS.  192.168.0.126 was the phone.  You've confirmed that the log isn't telling us anything.  Here's a trace, maybe that will help.  Client is .55 this time.

Reply Children