Advisory: Support Portal Maintenance. Login is currently unavailable, more info available here.
Up2Date 9.406003 package description:
Remark: System will be rebooted
News: Security Release
Bugfixes: Fix [NUTM-1616]: [AWS] Change AMI type to HVM Fix [NUTM-4839]: [AWS] AWS Instances in GovCloud need to use S3 buckets in GovCloud Fix [NUTM-5013]: [Network] TCP Vulnerability (CVE-2016-5696)
RPM packages contained: perf-tools-3.12.48-0.237935773.g86aa827.i686.rpm ep-ha-aws-9.40-191.g83c01f2.rb1.noarch.rpm ep-webadmin-9.40-640.g7ad4baa.rb8.i686.rpm ep-cloud-ec2-9.40-26.g00cde1e.rb2.i686.rpm kernel-smp-3.12.48-0.237935773.g86aa827.i686.rpm kernel-smp64-3.12.48-0.237935773.g86aa827.x86_64.rpm ep-release-9.406-3.noarch.rpm
Installed on 6 UTM's so far - in private network :-) - Everything seems normal...
----
Best regards Martin ;-)
Sophos UTM Certified Engineer v9.7Sophos XG Certified Architect v18.0Homelab: 2 x SG210 XG v18 (HA A/P) - 3xAPX530 - 1 x SG210 v9.7 - 1 x UTM 220 v9.7 - 1 x SG135 v9.7 (All Fullguard Plus licenses)
twister5800 said: Installed on 6 UTM's so far - in private network :-) - Everything seems normal...
Unfortunately, nothing normal here. Installed 9.406-3 on a client network and now the 2 BO-VPN connections don't pass any traffic. Totally at a loss as to how to fix it.
I'm not at all happy this morning.
Trane Francks said: Unfortunately, nothing normal here. Installed 9.406-3 on a client network and now the 2 BO-VPN connections don't pass any traffic. Totally at a loss as to how to fix it. I'm not at all happy this morning.
twister5800 said:BO-VPN? - What is that?
"Branch Office VPN". Another way of saying Site-to-Site.
PLease post some IPSEC live logs from the device :-)
Thanks for clarifying, I guess I still have a lot to learn :-D
Hmm...IPSEC looks great, what about firewall, when you try to access something on "far side" on when and vice versa (Hope you have logging enlabled in IPSEC :-) )
I have now upgraded 15 devices, 4 with HA active/passive, 8 sites have IPSEC, and no issues...
twister5800 said: Thanks for clarifying, I guess I still have a lot to learn :-D Hmm...IPSEC looks great, what about firewall, when you try to access something on "far side" on when and vice versa (Hope you have logging enlabled in IPSEC :-) ) I have now upgraded 15 devices, 4 with HA active/passive, 8 sites have IPSEC, and no issues...
The firewall shows nothing regarding the IPsec traffic. It is a mystery. With one of the two tunnels suddenly starting to work (sporadically), I'm more confused than ever. When the one tunnel stops working, restarting the SG230 (HQ) and SG115 (branch) seems to get it working again for a few hours. Rebooting several times/day now.
It's kind of ridiculous. I will most assuredly not be installing this on any of my other client sites.
I know it may be hard work to mask confidential info, but can you send the whole live log from ipsec for a whole day?
Have you started a support case with support?
twister5800 said: I know it may be hard work to mask confidential info, but can you send the whole live log from ipsec for a whole day? Have you started a support case with support?
There's just nothing useful in there at all. I've opened a support ticket with the Japanese reseller and will revert to Sophos proper should the reseller be unable to solve the problem. Currently, one of the tunnels works intermittently and the other doesn't work at all.
Trane Francks said: There's just nothing useful in there at all. I've opened a support ticket with the Japanese reseller and will revert to Sophos proper should the reseller be unable to solve the problem. Currently, one of the tunnels works intermittently and the other doesn't work at all.
No easy way for me to restore. I'm half-way across the country remotely administering this network.