Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

UDP500-Packet killed by Default Drop rule

Hi everyone,

I am using an Sophos 9.1 UTM with internet access through a DSL-modem, so the Sophos' etxernal interface has a private IP-address.
I set up a Site-to-Site VPN using automatic firewall rules, but are unable to establish a connection.
The remote VPN-endpoint does not "see" any packets arriving from my firwall, so I decided to run a tcpdump on the Sophos firewall.
Not one single packet using port 500 or port 4500 was to be detetcted on the external interface.
The packet filter's live log however shows that packet destined to the remote VPN endpoint using port 500 are filtered by the Default Drop Rule.

How can this be ?
And why is it port 500 and not port 4500 like it should be when using NAT-T ?

Regards
Tobias


This thread was automatically locked due to age.
Parents Reply Children
No Data
Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?