For some reason, whenever I try to download a larger iOS or macOS update/upgrade (e.g., iOS 13 or macOS Catalina), the update starts but then inevitably fails after a few minutes; and it is only affecting Apple downloads. No problems with updates from Ubuntu, CentOS, Microsoft, etc.
I have gone to Web Protection > Filtering Options and Application Control and exempted every single Apple-related URL, as well as the entire 17.0.0.0/8 range, but it hasn't helped. I have also tried to exempt the iOS and macOS devices, but that hasn't helped either. Switching temporarily to another firewall product allowed me to download and update a few test devices, so I don't think it is the Apple devices or the ISP.
But I cannot figure out what other option to try. By running tcpdump on the UTM, I noticed that the updating device always ends up resetting the connection (see below). If anyone has some insight as to why this is happening, it would be greatly appreciated.
21:13:37.654711 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152689905:152692793, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 2888
21:13:37.654925 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152689905, win 113, options [nop,nop,TS val 267897274 ecr 353833104], length 0
21:13:37.655042 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152692793:152695681, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 2888
21:13:37.655290 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152692793, win 91, options [nop,nop,TS val 267897274 ecr 353833104], length 0
21:13:37.655386 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152695681:152698569, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 2888
21:13:37.655700 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152698569:152701457, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 2888
21:13:37.656015 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152701457:152702901, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 1444
21:13:37.656351 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], seq 152702901:152704345, ack 390, win 117, options [nop,nop,TS val 353833104 ecr 267897259], length 1444
21:13:37.657009 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152704345, win 0, options [nop,nop,TS val 267897276 ecr 353833104], length 0
21:13:37.897580 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], ack 390, win 117, options [nop,nop,TS val 353833348 ecr 267897276], length 0
21:13:37.898222 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152704345, win 0, options [nop,nop,TS val 267897516 ecr 353833104], length 0
21:13:38.369383 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], ack 390, win 117, options [nop,nop,TS val 353833820 ecr 267897516], length 0
21:13:38.370095 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152704345, win 0, options [nop,nop,TS val 267897987 ecr 353833104], length 0
21:13:39.361304 IP ussea4-vip-bx-006.aaplimg.com.http > 192.168.0.202.51888: Flags [.], ack 390, win 117, options [nop,nop,TS val 353834812 ecr 267897987], length 0
21:13:39.361875 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [.], ack 152704345, win 0, options [nop,nop,TS val 267898977 ecr 353833104], length 0
21:13:39.725296 IP 192.168.0.202.51888 > ussea4-vip-bx-006.aaplimg.com.http: Flags [R.], seq 390, ack 152704345, win 0, length 0
This thread was automatically locked due to age.