This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

UTM 9.601 - RED issues!

Since upgrading all our customers to 9.601, a bigger part of them are complaining about RED's re/disconnection in a no-pattern way.

It started for all of them just the night we upgraded to 9.601, and they all are on different ISP's and located different places around the country.

Been with Sophos support for 2 hours today, and now they escalated it to higher grounds.

Will return with an update....

Suspicious entries in the log - but all connected REDs do this before connection:

2019:03:06-15:15:38 fw01-2 red_server[17509]: SELF: Cannot do SSL handshake on socket accept from 'xxx.xxx.xxx.xxx': SSL connect accept failed because of handshake problems

2019:03:06-15:15:46 fw01-2 red2ctl[12420]: Missing keepalive from reds3:0, disabling peer xxx.xxx.xxx.xxx

I know the last line is written before the tunnel disconnects, because there was no "PING/PONG" answer...

One customer has 2 x RD 50, one 1 100% stable and the other fluctuates in random intervals - we replaced this with a new RED 50, but the same thing occurs.



This thread was automatically locked due to age.
Parents
  • Same issues here after 9.601-5 UTM update. 2x RED50 Rev 1. Drop multiple ISPs at varying intervals and lengths. It was advised to re-create RED in UTM. I have performed this, but problems still persist. I was sent two replacement RED50. The first one has been replaced, a new config created, but problem persists. ISPs modems have been replaced although they were reluctant to do so. One of the REDs wont recognize the presence of ISP on WAN1 at all.

    We are losing a lot of productivity and business. We do a sizeable portion of our business via teleconferencing.

    Support Tickets#

    8710435

    8707203

    8707207

     

    The tech alluded to a potential issue with REDs after the update to 9.6.01-5.

  • My problem is resolved. There is a known issue related to unified firmware.

    from su -

    cc get red use_unified_firmware

    if value returned = 1

    cc set red use_unified_firmware 0

    reds will update and reboot

    confirm value is 0 rerunning get command above

     

    NOT A PERMANENT FIX. The issue needs to be addressed in Sophos UTM firmware permanently.

  • Hallo Reinhold,

    Did you try James Stoy's solution above - switch to MTU1400 and disable/enable the RED?  If that didn't work Sophos may want to RMA the 15.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hello Bob,

    yes, not i tried it out, MTU 1400

    Its a different error in the log now, but it does stikll no connect:

    2019:04:26-08:27:33 fw red_server[4454]: SELF: (Re-)loading device configurations
    2019:04:26-08:27:36 fw red2ctl[4383]: Overflow happened on reds1:0
    2019:04:26-08:27:36 fw red2ctl[4383]: Missing keepalive from reds1:0, disabling peer  xxx.xxx.xxx.xxx
    2019:04:26-08:28:41 fw red_server[8474]: SELF: New connection from xxx.xxx.xxx.xxx with ID XXXXXXXXXXXXXX (cipher AES256-GCM-SHA384), rev1<30>Apr 26 08:28:41 red_server[8474]: XXXXXXXXXXXXXX: connected OK, pushing config
    2019:04:26-08:28:45 fw red_server[8474]: XXXXXXXXXXXXXX: command 'CON_CLOSE reason=fallback_config'
    2019:04:26-08:28:45 fw red_server[8474]: id="4202" severity="info" sys="System" sub="RED" name="RED Tunnel Down" red_id="XXXXXXXXXXXXXX" forced="1"
    2019:04:26-08:28:45 fw red_server[8474]: XXXXXXXXXXXXXX is disconnected.

    I have an open ticket at the german Sophos premium support, but still not solution.

    Need to get it running for a homeoffice start in May.

    Regards, Reinhold

  • Hi Reinhold,

    Have you tried the "disable unified firmware" fix yet? Most users who have tried the MTU 1400 fix state that disabling the unified firmware works for them.

     

    See the answer from  for more details.

    Let us know, if not I'm afraid it is an RMA.

    Kind Regards,

    James.

  • Hi James,

    yes, the Sophos Support did this first, but it did not help.

    It's very strange for me that the Sophos (Premium) Support does not know an anser and does not help me in any way.

    Looks like UTM-RED15 is a non working combination and they prefer XG.

    Regards, Reinhold

  • Reinhold, Premium support just means (in Europe) that you can contact Support directly instead of having to go through the Sophos Partner you purchased from.  You still get the lowest level of support personnel to start with.  Thousands of RED 15s are working well with UTMs.  You will want to request escalation.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi,

    yes, i know, it sounds better than it is.

    In the meantime the Support did point me to the new UTM Firmware 9.602-3, released tonight on the ftp site.

    But it does not help. Now its escalated.

    Regards, Reinhold

  • Hi,

    still no solution, RED15 does not connect to SG115 with Firmware 9.602-3, it trys to connect and at the end says "is disconnected"

    Sophos escalted it to special team and they work on a fix for this new bug. No infor when it will be available

    Too bad that this happens right now, i need a Homeoffice VPN for an employee since 1rst May.

    Regards, Reinhold

  • Hi,

     

    have you tried with unified firmware = 0 just to see if it's the issue or you are facing other problems with the RED?

     

    My issues with RED 50's have been solved with 9.602 AND unified firmware = 1

    -----

    Best regards
    Martin

    Sophos XGS 2100 @ Home | Sophos v20 Architect

  • Workaround for me: Just use 1x tunnel between Red and SGxxx - in redundant configuration we had the same problem. But it depends of the ISP on the site of REDs. With some ISPs we can use redundant tunnels, with other ISP we had to use just only one tunnel!

    good luck

  • BAlfson said:

    Reinhold, Premium support just means (in Europe) that you can contact Support directly instead of having to go through the Sophos Partner you purchased from.  You still get the lowest level of support personnel to start with. 

     

     

    Sadly, I can confirm this. Wish I had known before recommending that our customers here (I work for an MSP) purchase the premium option. They have paid steep fees for it and are not being taken care of very well. In this particular case of REDs disconnecting after 9.601, I initially called German support and was also told it's a known firmware issue, no fix date confirmed. The tech had me switch on the firewall's support access, but no one actually connected to it. He wrote to me a few days later and enclosed the procedure of how to manually reset the system using a config backup on a USB stick... Dankeschön und auf Wiedersehen! If I absolutely have to call in future, it will be after German business hours, when calls get routed to the US.

    Luckily there were already quite a few threads on the topic in this forum. In spite of 1000's of working REDs, it looks like a not insignificant number of installations have been affected by the issue. For us, the sure fix has been to deactivate the Red, set interface to MTU 1400, and reactivate. Thanks to whoever came up with that! 

Reply
  • BAlfson said:

    Reinhold, Premium support just means (in Europe) that you can contact Support directly instead of having to go through the Sophos Partner you purchased from.  You still get the lowest level of support personnel to start with. 

     

     

    Sadly, I can confirm this. Wish I had known before recommending that our customers here (I work for an MSP) purchase the premium option. They have paid steep fees for it and are not being taken care of very well. In this particular case of REDs disconnecting after 9.601, I initially called German support and was also told it's a known firmware issue, no fix date confirmed. The tech had me switch on the firewall's support access, but no one actually connected to it. He wrote to me a few days later and enclosed the procedure of how to manually reset the system using a config backup on a USB stick... Dankeschön und auf Wiedersehen! If I absolutely have to call in future, it will be after German business hours, when calls get routed to the US.

    Luckily there were already quite a few threads on the topic in this forum. In spite of 1000's of working REDs, it looks like a not insignificant number of installations have been affected by the issue. For us, the sure fix has been to deactivate the Red, set interface to MTU 1400, and reactivate. Thanks to whoever came up with that! 

Children
  • __________________________________________________________________________________________________________________

  • LuCar Toni,

    I appreciate Sophos finally acknowledging the issue. We have had 2 REDs RMA'ed. Thanks for supporting us.

    One thing that would help this situation is to allow the "cc set red use_unified_firmware 0" flag change to be persistent on a further firmware upgrades once the UTM is in the 9.6 branch. As it is, this flag is reset on any further update. This was the case for me when I upgraded to 9.603001 from 9.601-5. Previously I had changed the flag to =0 but the UTM set it back to =1 during the upgrade and my new REDs reverted back to the unified firmware. This made me very nervous that I would have two more "bricks" at anytime so I reset the flag back to 0 again. Luckily the units do not "brick" during that process!!

    I can't go through the workaround of disconnecting REDs every time I need to upgrade! I upgrade firmware during late night maintenance windows (as most admins do) so there is no one at the remote office to disconnect the RED! 

    Thanks.

  • Garth's is a good question, Toni.  Do we know if it suffices to disable the RED in the UTM before Up2Dating and then enable it after having disabled unified firmware?

    Unless I'm wrong, the KB should be modified to reflect the fact that use_unified_firmware must be applied separately to each UTM in High Availability.

    NOTE about one day later: see my post below

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  •  can correct me with more information, but as far as i know, you need to set this CC switch on the master and it should be synced to the other Appliance. (like all CC switches). 

    Also this switch should be "off" after a Firmware Update. But you should check it after the firmware Update. 

     

    Sophos slowly increased the switch in the last updates.

    Currently, the unified firmware will only be applied to installations with fewer than 20 RED devices configured.

    __________________________________________________________________________________________________________________

  • LuCar Toni said:

     can correct me with more information, but as far as i know, you need to set this CC switch on the master and it should be synced to the other Appliance. (like all CC switches). 

    Also this switch should be "off" after a Firmware Update. But you should check it after the firmware Update. 

    Currently, the unified firmware will only be applied to installations with fewer than 20 RED devices configured.

     

     

    Hi all,

     

    UTM 9.601 to 9.603 will ENABLE unified firmware from my experience, we had a dusin VERY angry customers :-(

     

     and  20 is WAY too big a number, we have 6 devices in Germany, and we are located in Denmark, can you even think of the problems we where facing? And first of all, Sophos did not recognize this as an firmware issue, but the mere "What have you done wrong?", "what is your licensing number?", "Do you have power to the device?"

    Please reduce the number to 3, as if even one device fails this, it should have stopped immediately!

     

    Sorry for writing in big letters, but you should know how many problems this has caused us = money (Which I'm not aware of, as I am not the boss!=) ;)

    -----

    Best regards
    Martin

    Sophos XGS 2100 @ Home | Sophos v20 Architect

  • I just got this from Sophos Support:

    1. Are any other REDs in danger of being bricked, or is it just the RED 50?
    - So far we have only seen RED 50 but this doesn't rule out RED 15
    2. In High Availability, does use_unified_firmware need to be set to 0 on all nodes?
    - No it would replicate the command
    3. Instead of physically unplugging REDs, would it suffice to disable the RED server objects in WebAdmin before applying the Up2Date and then enable them after 9.604 has had use_unified_firmware set to 0?
    - In theory yes if you disable the service in the UTM or turn off the RED devices, then they won't be able to get the Firmware Update, so they won't be able to contact the server, and once you re-enable the services they will not search for a new firmware update

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • __________________________________________________________________________________________________________________

  • In 9.605 Issues Resolved:

    "NUTM-10962 [RED] Fix for RED50 does not start up after firmware update for most scenarios"

     

    Can Sophos (or anyone else) comment as to whether the "CC SET RED USE_UNIFIED_FIRMWARE 0" is still required with this update and in future? Has the unified firmware bug for the RED50 truly been squashed?

    Cheers,

    Garth

  • Hi All,


    The new unified RED firmware included in UTM 9.605 includes a fix for the issue which some of you have reported when upgrading the firmware on the RED 50.


    However, you should be aware that there is still the possibility that the issue will occur during the update to 9.605 if the RED 50 has the older firmware installed. This will not occur with further firmware updates to your system in the future and unfortunately, can also not be bypassed by using the previous workaround of disabling the unified firmware. This is due to the fact that the issue is within the firmware update process of the old firmware.


    During our tests, we were only able to reproduce this issue with RED 50 devices which are under significant load. As this is a race condition issue, we cannot guarantee that you will not run into this issue again if you have experienced it before, nor can we predict, if it will occur in any particular scenario. However, the issue is certainly less likely to occur in scenarios where the RED 50 is not under load during the update process, and so, if possible, we would advise that you disconnect the local network behind the RED during the update.


    We apologize for the inconvenience this issue has caused.


    Jan

  • garth1138 said:

    In 9.605 Issues Resolved:

    "NUTM-10962 [RED] Fix for RED50 does not start up after firmware update for most scenarios"

     

    Can Sophos (or anyone else) comment as to whether the "CC SET RED USE_UNIFIED_FIRMWARE 0" is still required with this update and in future? Has the unified firmware bug for the RED50 truly been squashed?

    Cheers,

    Garth

     

     

    yes for us it is still required with the RED50!