Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

All of a sudden many FW Rule 60001 in FW log

All of a sudden I'm seeing a lot of FW Rule 60001 in the FW log.

What used to be a very quiet FW is now very chatty with spikes of 60001 drops every 5-10 minutes.  I haven't made any configuration changes.  Any idea where I start to begin troubleshooting?

/var/log/packetfilter.log:2016:12:05-11:55:51 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:51 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:51 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:51 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:51 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:52 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="64.4.54.253" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="102" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:53 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"
/var/log/packetfilter.log:2016:12:05-11:55:55 sophos ulogd[4400]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60001" initf="eth1" srcmac="00:17:10:93:fc:96" dstmac="00:0c:29:2a:92:30" srcip="216.58.192.238" dstip="###.##.###.###" proto="1" length="576" tos="0x00" prec="0x00" ttl="58" type="11" code="1"



This thread was automatically locked due to age.
Parents
  • You do not show port numbers or TCP Flags, but I think they should have been in the log detail.   I have investigated similar symptoms, and this is what I learned:

    A normal TCP disconnect involves a packet exchange.   One end says goodbye and then the other end acknowledges the goodbye.   UTM has better things to do than to wait around for the confirmation, so it drops the connection.   They when the reply arrives, the packet is not associated with an active session, so the packet is blocked. 

    Google is not doing anything wrong, it is just an anomaly of UTM's performance optimizations.   I think you will see FIN or RST in the TCP Flags to confirm this scenario.  Additionally, the source port indicates that it is a server you would typically utilize, such as TCP  80, TCP 443, or UDP 53.

    On the other hand, I do recommend blocking UDP 443 in both directions, to prevent Chrome from bypassing your web proxy using its QUIC protocol.

Reply
  • You do not show port numbers or TCP Flags, but I think they should have been in the log detail.   I have investigated similar symptoms, and this is what I learned:

    A normal TCP disconnect involves a packet exchange.   One end says goodbye and then the other end acknowledges the goodbye.   UTM has better things to do than to wait around for the confirmation, so it drops the connection.   They when the reply arrives, the packet is not associated with an active session, so the packet is blocked. 

    Google is not doing anything wrong, it is just an anomaly of UTM's performance optimizations.   I think you will see FIN or RST in the TCP Flags to confirm this scenario.  Additionally, the source port indicates that it is a server you would typically utilize, such as TCP  80, TCP 443, or UDP 53.

    On the other hand, I do recommend blocking UDP 443 in both directions, to prevent Chrome from bypassing your web proxy using its QUIC protocol.

Children
No Data