This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

UTM 9.601 - RED issues!

Since upgrading all our customers to 9.601, a bigger part of them are complaining about RED's re/disconnection in a no-pattern way.

It started for all of them just the night we upgraded to 9.601, and they all are on different ISP's and located different places around the country.

Been with Sophos support for 2 hours today, and now they escalated it to higher grounds.

Will return with an update....

Suspicious entries in the log - but all connected REDs do this before connection:

2019:03:06-15:15:38 fw01-2 red_server[17509]: SELF: Cannot do SSL handshake on socket accept from 'xxx.xxx.xxx.xxx': SSL connect accept failed because of handshake problems

2019:03:06-15:15:46 fw01-2 red2ctl[12420]: Missing keepalive from reds3:0, disabling peer xxx.xxx.xxx.xxx

I know the last line is written before the tunnel disconnects, because there was no "PING/PONG" answer...

One customer has 2 x RD 50, one 1 100% stable and the other fluctuates in random intervals - we replaced this with a new RED 50, but the same thing occurs.



This thread was automatically locked due to age.
Parents
  • Another spontaneous "overflow". Luckily after hours...

    2019:09:05-16:52:16 neo-2 red_server[6026]: A35xxxxxxxxxxxx: Sending json message {"data":{"seq":39230},"type":"PONG"}
    2019:09:05-16:52:47 neo-2 red_server[6026]: A35xxxxxxxxxxxx: No ping for 30 seconds, exiting.
    2019:09:05-16:52:47 neo-2 red_server[6026]: id="4202" severity="info" sys="System" sub="RED" name="RED Tunnel Down" red_id="A35xxxxxxxxxxxx" forced="0"
    2019:09:05-16:52:47 neo-2 red_server[6026]: A35xxxxxxxxxxxx is disconnected.
    2019:09:05-16:52:47 neo-2 red_server[21506]: SELF: (Re-)loading device configurations
    2019:09:05-16:52:47 neo-2 red2ctl[21514]: Overflow happened on reds2:0
    2019:09:05-16:52:47 neo-2 red2ctl[21514]: Missing keepalive from reds2:0, disabling peer 195.xxxxxxxx
    2019:09:05-16:52:53 neo-2 red2ctl[21514]: Received keepalive from reds2:0, enabling peer 195.xxxxxxxx
    2019:09:05-16:56:23 neo-2 red2ctl[21514]: Missing keepalive from reds2:0, disabling peer 195.xxxxxxxx
    2019:09:05-17:04:25 neo-2 red_server[21506]: SELF: (Re-)loading device configurations
    2019:09:05-17:08:19 neo-2 red_server[2455]: SELF: Cannot do SSL handshake on socket accept from '195.xxxxxxxx': SSL connect accept failed because of handshake problems

     

    We'll see if and when it comes back up...

  • I assuming, this is not related to the Firmware ... Because overflow and other stuff was in the RED protocol since decades and most likely are related to ISP issues. 

    RED Protocol is heavily related to a burst of data (UDP data).
    And some ISP in some scenarios does not like it. 

    Looks like if the RED is firing some data, it could actually crash. 

    If SG/XG is not received enough UDP data in short time and then all those data once, such overflows happen. Maybe you should check with the ISP (Restart router etc, call ISP to reset the wire etc.). 

    Especially if you have only one RED connected. Try to get another RED, check if this is happening with another RED / another location.

    If yes, it could be related to your local SG ISP, if not, it could be related to your RED ISP. 

     

    __________________________________________________________________________________________________________________

  • Thanks for the input. I should tell you that we've had these problems for months now and spent hours on the phone with Sophos "Premium" Support, who ended up RMAing the unit. The replacement is what is online now, and we are seeing the same issues. 

    We have of course also talked to our ISP (Deutsche Telekom at both locations, but separate circuits). They cannot detect any drops in service, or sudden data bursts resulting in disconnects. Which makes sense - we have had the same circuits since 2016. The RED was working fine for 3 years - like many others here, the random disconnects started with 9.601-5

    I very much doubt that this is an ISP related issue. Even if the original disconnect were somehow related to drops on the part of the ISP, it would not explain the SSL handshake failure, or why the configuration fails to load, or how the RED manages to come back online at some point...

  • Disabled the unit re-enabled after 10 minutes, now back online. Outage just over an hour... 

Reply Children
No Data