I've got an issue on two sophos xg125 (SFOS 17.5.9 MR-9). I can't access the webinterface over a ipsec site-to-site vpn (port 4444), but i can access all other devices over the vpn. It's possible to access the firewall with ssh over the vpn. HTTPS access on Administration -> Device Access for VPN is enabled. Furthermore i added a acl exeption rule, which allows HTTPS form the subnet i try to access and source zone vpn.
Here you can see the drop-packet-capture:
2019-12-13 09:49:04 010202130 IP 172.31.151.75.46273 > X.X.X.X.4444 : proto TCP: F 3700840076:3700840076(0) win 513 checksum : 3150
0x0000: 4500 0028 4c94 4000 7f06 1da4 ac1f 974b E..(L.@........K
0x0010: 0a2c 4401 b4c1 115c dc96 568c 453f d16c .,D....\..V.E?.l
0x0020: 5011 0201 0c4e 0000 P....N..
Date=2019-12-13 Time=09:49:04 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev= out_dev= inzone_id=0 outzone_id=0 source_mac= dest_mac= l3_protocol=P source_ip=X.X.X.X dest_ip=X.X.X.X l4_protocol=TCP source_port=46273 dest_port=4444 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drp_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A
2019-12-13 09:49:04 010202130 IP 172.31.151.75.46271 > X.X.X.X.4444 : proto TCP: F 1577518726:1577518726(0) win 513 checksum : 36206
0x0000: 4500 0028 4c93 4000 7f06 1da5 ac1f 974b E..(L.@........K
0x0010: 0a2c 4401 b4bf 115c 5e07 0686 9c5d c7c5 .,D....\^....]..
0x0020: 5011 0201 8d6e 0000 P....n..
Date=2019-12-13 Time=09:49:04 log_id=010202130 log_type=Firewall log_component=Invalid_Traffic log_subtype=Denied log_status=N/A log_priority=Alert duration=N/A in_dev= out_dev= inzone_id=0 outzone_id=0 source_mac= dest_mac= l3_protocol=P source_ip=X.X.X.X dest_ip=X.X:X.X l4_protocol=TCP source_port=46271 dest_port=4444 fw_rule_id=0 policytype=0 live_userid=0 userid=0 user_gp=0 ips_id=0 sslvpn_id=0 web_filter_id=0 hotspot_id=0 hotspotuser_id=0 hb_src=0 hb_dst=0dnat_done=0 proxy_flags=0 icap_id=0 app_filter_id=0 app_category_id=0 app_id=0 category_id=0 bandwidth_id=0 up_classid=0 dn_classid=0 source_nat_id=0 cluster_node=0 inmark=0x0 nfqueue=0 scanflags=0 gateway_offset=0 max_session_bytes=0 drp_fix=0 ctflags=0 connid=0 masterid=0 status=0 state=0 sent_pkts=N/A recv_pkts=N/A sent_bytes=N/A recv_bytes=N/A tran_src_ip=N/A tran_src_port=N/A tran_dst_ip=N/A tran_dst_port=N/A
Does someone has any idea how to solve this issue?
This thread was automatically locked due to age.