Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Site2Site VPN established, but Firewall blocking traffic

Hello folks,

I have succesfully established an IPSec Tunnel between an Astaro UTM 9 and a Watchguard Firebox XTM v. 11.7
The config looks like this:

(local) 10.20.100.0/24=10.0.88.200  (remote) 82.194.116.122=10.188.28.0/24

There seem to be two (probably different) problems here:

I can ping from local to remote, but not from remote to local.
When I try to ssh from local to remote, I can see the attempt being blocked by the firewall:

11:33:19 Default DROP TCP 10.20.100.144:33000 → 10.188.28.250:22 [SYN] len=60 ttl=64 tos=0x00 srcmac=0:50:56:8e:c:98

There is the default rule that should allow any traffic of type "Terminal Applications" from local networks to any destination, but this does not seem to apply.
I have tried rules additional rules in top position, that should allow this traffic to pass, but to no avail. I really hope someone out there can help me out.
Screenshots of the config are attached to this post.

Thanks to everybody.
playersons


This thread was automatically locked due to age.
Parents
  • Hi, Playersons, and welcome to the User BB!

    Please show a picture of the edit of the definition "FRB" with 'Advanced' expanded.

    Also, please post the 11:33:19 log line above from the full log file.  Only limited information appears in the Firewall Live Log - this applies only to the Firewall log the other Live Logs aren't limited.

    Cheers - Bob
     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi, Playersons, and welcome to the User BB!

    Please show a picture of the edit of the definition "FRB" with 'Advanced' expanded.

    Also, please post the 11:33:19 log line above from the full log file.  Only limited information appears in the Firewall Live Log - this applies only to the Firewall log the other Live Logs aren't limited.

    Cheers - Bob


    below are the screen shots for the firewall rule "FRB".
    and this here is an extract from the current full firewall log:

    srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:44 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:46 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:50 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:58 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN"
Reply
  • Hi, Playersons, and welcome to the User BB!

    Please show a picture of the edit of the definition "FRB" with 'Advanced' expanded.

    Also, please post the 11:33:19 log line above from the full log file.  Only limited information appears in the Firewall Live Log - this applies only to the Firewall log the other Live Logs aren't limited.

    Cheers - Bob


    below are the screen shots for the firewall rule "FRB".
    and this here is an extract from the current full firewall log:

    srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:44 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:46 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:50 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN" 
    2013:02:01-07:39:58 vipsec ulogd[4500]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60003" outitf="eth0" srcmac="0:50:56:8e:c:98" srcip="10.20.100.144" dstip="10.188.28.250" proto="6" length="60" tos="0x00" prec="0x00" ttl="64" srcport="36889" dstport="22" tcpflags="SYN"
Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?