This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Any experience with an excessive number of ThunderVPN hits?

I recently set up a new XG firewall at our main branch location in order to assist with IPS and application control service.   I am currently using the "Block high risk (Risk Level 4 and 5) apps" setting for app control.

What I am noticing is a large amount of ThunderVPN hits on our network, and I'm at a bit of a loss on what could be causing this traffic.  I'm glad they are being blocked, but I wanted to see if anyone had any experience with this and what might be utilizing this service.

Our entire network consists of Dell workstations and the traffic is coming from various IP addresses, not just one machine.

Thanks in advance for any information!



This thread was automatically locked due to age.
Parents
  • The issue is under review of Sophos Labs. 

    __________________________________________________________________________________________________________________

  • Thank you.  There was a pattern update this AM to 18.18.58 but it didn't seem to address this.  Please keep us up to date.

  • So i need a tcpdump (pcap) of this traffic, like last time. 

    tcpdump -ni any port 123 -b -w /tmp/thundervpn.pcap 

    conntrack -L | grep 123 

    __________________________________________________________________________________________________________________

  • any progres to report?

    Ian

    XG115W - v20 GA - Home

    XG on VM 8 - v20 GA

    If a post solves your question please use the 'Verify Answer' button.

  • I cannot reproduce this on any of my firewalls. Therefor we need the dumps, as mentioned. 

    __________________________________________________________________________________________________________________

  • I will see what I can capture. I see about 100 hits, but 288B of data (bytes) which makes capture difficult.

    ian

    XG115W - v20 GA - Home

    XG on VM 8 - v20 GA

    If a post solves your question please use the 'Verify Answer' button.

  • I had a case open for this issue.  Support's answer was to have me create a workaround FW rule to allow NTP traffic at the top of the rule stack.  The tech led me to believe this was being worked on and to wait for a pattern update.  Not an acceptable answer, but eh, what else was I supposed to do?  So my case is closed now.

    That said, I'd be happy to try and collect what you need, as I disabled that FW rule just now and no surprise I'm getting tons of blocks for Thunder VPN again on UDP/123.  

    But, can you be a bit more specific on what to run and HOW to run the commands?  I tried the first command you mentioned above from CLI by SSH'ing into my FW, but the command doesn't run as you've got it typed.  The conntrak command doesn't seem to exist, as I recall when I tried it.  Glad to try and help if you can help me with more detail.

Reply
  • I had a case open for this issue.  Support's answer was to have me create a workaround FW rule to allow NTP traffic at the top of the rule stack.  The tech led me to believe this was being worked on and to wait for a pattern update.  Not an acceptable answer, but eh, what else was I supposed to do?  So my case is closed now.

    That said, I'd be happy to try and collect what you need, as I disabled that FW rule just now and no surprise I'm getting tons of blocks for Thunder VPN again on UDP/123.  

    But, can you be a bit more specific on what to run and HOW to run the commands?  I tried the first command you mentioned above from CLI by SSH'ing into my FW, but the command doesn't run as you've got it typed.  The conntrak command doesn't seem to exist, as I recall when I tried it.  Glad to try and help if you can help me with more detail.

Children