Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Problems accessing web site

Hello

Our client is having lots of issues with their web based Line of Business application. It occurrs at multiple sites thorugh multiple Sophos devices.

It manifests as 'Cannot reach this page' errors in IE and various site specific errors.

An example of a dropped packet is:

2019-12-04 16:56:19 010202130 IP 192.168.13.66.50879 > xxx.xxx.xxx.xxx.443 : proto TCP: F 3536931129:3536931129(0) win 1023 checksum : 16508
0x0000: 4500 0028 7538 4000 8006 f338 c0a8 0d42 E..(u8@....8...B
0x0010: 50fd 7377 c6bf 01bb d2d1 4939 0cdf e794 P.sw......I9....
0x0020: 5011 03ff 407c 0000 0000 0000 0000 P...@|........
Date=2019-12-04 Time=16:56:19 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev=Port1 out_dev= inzone_id=0 outzone_id=0 source_mac=aa:bb:cc:dd:ee:ff dest_mac=00:11:22:33:44:55 l3_protocol=IP source_ip=192.168.13.66 dest_ip=xxx.xxx.xxx.xxx l4_protocol=TCP source_port=50879 dest_port=443 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0 dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drop_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A

I've found [UNREPLIED] entries in conntrack, but I'm struggling to determine if that means that the web server isn't replying, or the Sophos isn't replying to the Web Server.

I feel that this might be an issue with the website, but they claim that it cannot be. I've edited TCP timeouts and stripped rules back to the minimum. The devices are running various firmware (17.5.8 MR-8 on the head office device). 

I think my primary question at this point is Why would an outbound connection be denied/Invalid Traffic?

Thanks 



This thread was automatically locked due to age.
  • Your Dropped packet is a Finish packet. 

    https://www.geeksforgeeks.org/tcp-flags/

    Basically the client decide "nope i dont want to talk to this website". 

     

    My first guess would be: There is something broken in the application of this server, so the client drops the connection.

    Basically you know the IP of the webserver.

    Try: 

    tcpdump -ni any host IPWebsite

    Open the Website and verify, who is causing this. 

     

    XG is logging those Finish packets because they are "duplicates". Some clients / browser / apps sends multiple finish packets at once (just to be sure). XG uses the first finish to close the conntrack and drops all other, because there is no valid conntrack anymore (Invalid Traffic). 

    __________________________________________________________________________________________________________________

  • Hi LuCar

    Thanks for your help. What you've suggested exactly matched what happend:

    09:45:05.910026 Port1, IN: IP 192.168.1.151.55982 > x.x.x.x.443: Flags [R.], seq 4951, ack 4371, win 0, length 0
    09:45:05.910263 Port1, IN: IP 192.168.1.151.55983 > x.x.x.x.443: Flags [R.], seq 110608, ack 417861, win 0, length 0
    09:45:05.941029 Port1, IN: IP 192.168.1.151.55979 > x.x.x.x.443: Flags [R.], seq 251093, ack 270337, win 0, length 0
    09:45:06.042207 Port1, IN: IP 192.168.1.161.55428 > x.x.x.x.443: Flags [R.], seq 74612, ack 261595, win 0, length 0

    2019-12-05 09:45:05 010202130 IP 192.168.1.151.55982 > x.x.x.x.443 : proto TCP: R 3731968717:3731968717(0) checksum : 26979
    0x0000: 4500 0028 c9d9 4000 8006 aa42 c0a8 0197 E..(..@....B....
    0x0010: 50fd 7377 daae 01bb de71 52cd f23b bfd4 P.sw.....qR..;..
    0x0020: 5014 0000 6963 0000 0000 0000 0000 P...ic........
    Date=2019-12-05 Time=09:45:05 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev=Port1 out_dev= inzone_id=0 outzone_id=0 source_mac=xx:xx:xx:xx:xx:xx dest_mac=xx:xx:xx:xx:xx:xx l3_protocol=IP source_ip=192.168.1.151 dest_ip=x.x.x.x l4_protocol=TCP source_port=55982 dest_port=443 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0 dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drop_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A

    2019-12-05 09:45:05 010202130 IP 192.168.1.151.55983 > x.x.x.x.443 : proto TCP: R 1538453917:1538453917(0) checksum : 17903
    0x0000: 4500 0028 c9da 4000 8006 aa41 c0a8 0197 E..(..@....A....
    0x0010: 50fd 7377 daaf 01bb 5bb2 f19d 3920 8052 P.sw....[...9..R
    0x0020: 5014 0000 45ef 0000 0000 0000 0000 P...E.........
    Date=2019-12-05 Time=09:45:05 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev=Port1 out_dev= inzone_id=0 outzone_id=0 source_mac=xx:xx:xx:xx:xx:xx dest_mac=xx:xx:xx:xx:xx:xx l3_protocol=IP source_ip=192.168.1.151 dest_ip=x.x.x.x l4_protocol=TCP source_port=55983 dest_port=443 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0 dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drop_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A

    2019-12-05 09:45:05 010202130 IP 192.168.1.151.55979 > x.x.x.x.443 : proto TCP: R 3689589127:3689589127(0) checksum : 1055
    0x0000: 4500 0028 c9db 4000 8006 aa40 c0a8 0197 E..(..@....@....
    0x0010: 50fd 7377 daab 01bb dbea a987 f7a0 cb83 P.sw............
    0x0020: 5014 0000 041f 0000 0000 0000 0000 P.............
    Date=2019-12-05 Time=09:45:05 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev=Port1 out_dev= inzone_id=0 outzone_id=0 source_mac=xx:xx:xx:xx:xx:xx dest_mac=xx:xx:xx:xx:xx:xx l3_protocol=IP source_ip=192.168.1.151 dest_ip=x.x.x.x l4_protocol=TCP source_port=55979 dest_port=443 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0 dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drop_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A

    2019-12-05 09:45:06 010202130 IP 192.168.1.161.55428 > x.x.x.x.443 : proto TCP: R 2770289622:2770289622(0) checksum : 27076
    0x0000: 4500 0028 4cc1 4000 8006 2751 c0a8 01a1 E..(L.@...'Q....
    0x0010: 50fd 7377 d884 01bb a51f 43d6 7ec0 7d58 P.sw......C.~.}X
    0x0020: 5014 0000 69c4 0000 0000 0000 0000 P...i.........
    Date=2019-12-05 Time=09:45:06 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev=Port1 out_dev= inzone_id=0 outzone_id=0 source_mac=xx:xx:xx:xx:xx:xx dest_mac=xx:xx:xx:xx:xx:xx l3_protocol=IP source_ip=192.168.1.161 dest_ip=x.x.x.x l4_protocol=TCP source_port=55428 dest_port=443 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0 dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drop_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A

     

    I now need to match up with the users if this is when the issue occurrs.

     

    As an aside, I once saw a Sophos tech use a command to quickly switch between Device Console and Advanced Console. Do you know that command? 

  • Check that you are public IP is not blacklisted or some additional IP checklist is implemented on the website side.

    The command works in the reverse order. From advanced shell you can move to console by typing: cish

    From the console you can type exit and you will return to advanced shell (only if you were connected from advanced shell, otherwise you will exit from the console and return to the XG menu).

    Regards

  • @rogermwl When when you get the error page please check first the website is able to ping or not at the same time. And also check with the server that it is not overloaded as it is not replying to your request send from the firewall. 

     

    If it is the with the specific page of the website functionality like downloading a report, then check with the proxy timeout in the firewall and the time required to download the file from the website.

  • Hi Sumit

    Ping was part of my initial testing. Unfortunately the site replies with "TTL expired in transit." from anywhere, which the web site developer says is by design. I have to take the developer's word that there are no issues what-so-ever with the site.

    Errors can occur with any part of the web application and are intermittent. Apart from the very occasional glitch, other web sites function fine. 

    Thanks 

  • We have also faced the same issue with one of the website that we have now. We have contacted for Sophos support and at the end we have to replace the server to fix the overloading of the website.

     

    Please refer the below link with the same issue faced by us :-

    https://community.sophos.com/products/xg-firewall/f/network-and-routing/115258/website-giving-random-error-err-connection-timeout