This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

UTM 9.601 - RED issues!

Since upgrading all our customers to 9.601, a bigger part of them are complaining about RED's re/disconnection in a no-pattern way.

It started for all of them just the night we upgraded to 9.601, and they all are on different ISP's and located different places around the country.

Been with Sophos support for 2 hours today, and now they escalated it to higher grounds.

Will return with an update....

Suspicious entries in the log - but all connected REDs do this before connection:

2019:03:06-15:15:38 fw01-2 red_server[17509]: SELF: Cannot do SSL handshake on socket accept from 'xxx.xxx.xxx.xxx': SSL connect accept failed because of handshake problems

2019:03:06-15:15:46 fw01-2 red2ctl[12420]: Missing keepalive from reds3:0, disabling peer xxx.xxx.xxx.xxx

I know the last line is written before the tunnel disconnects, because there was no "PING/PONG" answer...

One customer has 2 x RD 50, one 1 100% stable and the other fluctuates in random intervals - we replaced this with a new RED 50, but the same thing occurs.



This thread was automatically locked due to age.
Parents
  • Same issues here after 9.601-5 UTM update. 2x RED50 Rev 1. Drop multiple ISPs at varying intervals and lengths. It was advised to re-create RED in UTM. I have performed this, but problems still persist. I was sent two replacement RED50. The first one has been replaced, a new config created, but problem persists. ISPs modems have been replaced although they were reluctant to do so. One of the REDs wont recognize the presence of ISP on WAN1 at all.

    We are losing a lot of productivity and business. We do a sizeable portion of our business via teleconferencing.

    Support Tickets#

    8710435

    8707203

    8707207

     

    The tech alluded to a potential issue with REDs after the update to 9.6.01-5.

  • My problem is resolved. There is a known issue related to unified firmware.

    from su -

    cc get red use_unified_firmware

    if value returned = 1

    cc set red use_unified_firmware 0

    reds will update and reboot

    confirm value is 0 rerunning get command above

     

    NOT A PERMANENT FIX. The issue needs to be addressed in Sophos UTM firmware permanently.

  • Fabio Giacobbe said:

    Hi Jan,

     

    but is possible to start an RMA procedure without a maintenance contract?

     

    thanks

     

    fabio

     

    When having license for reds (network protection), you should be covered ;-)

    -----

    Best regards
    Martin

    Sophos XGS 2100 @ Home | Sophos v20 Architect

  • Jan, I think your first B. should be to 9.604, not 9.605.  See my post above and my latest PM to you.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • You are correct, Fabio, that the standard rule is that there's a 1-year warranty on REDs connected to UTMs.  I think that given that the problem was most likely caused by an Up2Date, Sophos might go ahead and replace the RED.

    If it turns out that you can't get a free replacement, my recommendation is to replace a RED 50 with an SG 115 with a Network Protection subscription.  That will give you more flexibility and will cost less over time than a RED 50 with Warranty Extensions.  You can configure a RED tunnel in your main office UTM and just replace the reds# in your existing Interface definition with the new one.  Depending on your present configuration, there might be very little needed to configure the new SG 115.

    Please let us know what you tried and the results.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hi Bob,

    actually did not receive a PM from you, but anyway the first B is 9.605, in this scenario given that the REDs are not running the unified firmware prior to the update and are not connected during the update they will not receive a faulty unified firmware but only the fixed unified firmware of 9.605 so will not run into the problem, setting the unified firmware to 0 is actually not necessary in this case.

    The disabling of the REDs is done to prevent them from receiving a faulty firmware in the update process, ones on 9.605 that is not a problem anymore.

    Jan

  • Sorry, Jan, I don't see what I'm not understanding, but I can't reconcile your last post with:


    I just read your response to my PM, and my confusion remains.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • William Fraley said:

    My problem is resolved. There is a known issue related to unified firmware.

    from su -

    cc get red use_unified_firmware

    if value returned = 1

    cc set red use_unified_firmware 0

    reds will update and reboot

    confirm value is 0 rerunning get command above

     

    NOT A PERMANENT FIX. The issue needs to be addressed in Sophos UTM firmware permanently.

     


    Anybody (including Sophos Staff) know if this will work with UTM 9.7?

    Best regards 

    Alex 

    -

  • Hi  

    This specific issue regarding RED 50 devices was resolved in UTM v9.605 (https://community.sophos.com/kb/en-us/134398).

    Regards,


    Florentino
    Director, Global Community & Digital Support

    Are you a Sophos Partner? | Product Documentation@SophosSupport | Sign up for SMS Alerts
    If a post solves your question, please use the 'Verify Answer' button.
    The Award-winning Home of Sophos Support Videos! - Visit Sophos Techvids
  • FloSupport said:

    Hi  

    This specific issue regarding RED 50 devices was resolved in UTM v9.605 (https://community.sophos.com/kb/en-us/134398).

    Regards,

    Correct, but there are other issues with RED15, which are loosing connection after some time. That's the reason I am asking.
     
    P.S. Just to have an appropriate tool after the update, because a downgrade is not easy.
     
    Best regards
    Alex

    -

  • Hi  

    I followed up with the team, and the new RED unified firmware handles routing differently. As a result, customers who previously had working configurations on the legacy firmware (with the RED WAN IP overlapping with a listed split network) will experience issues on the new unified firmware.

    Could you please confirm if you are using the RED in a split mode configuration, and if so  - please check that your RED WAN IP is not overlapping with a listed split network subnet?

    Thanks,


    Florentino
    Director, Global Community & Digital Support

    Are you a Sophos Partner? | Product Documentation@SophosSupport | Sign up for SMS Alerts
    If a post solves your question, please use the 'Verify Answer' button.
    The Award-winning Home of Sophos Support Videos! - Visit Sophos Techvids
  • This is not the case, because we have RED 15's running in standard/unified mode that exhibit this same behavior. I just had a disconnect event today in all six of our remote offices running RED 15's that have been updated to 9.605-1. It took anywhere from 20 to 45 minutes for each of them to come back online and they all did this at random times throughout the day between 10:15 a.m. and 2:50 p.m.

    But I do think you've hit the nail on the head when you said it handles routing differently. Maybe it's time to go back to the old way of routing until you get the bugs resolved in the new way.

Reply
  • This is not the case, because we have RED 15's running in standard/unified mode that exhibit this same behavior. I just had a disconnect event today in all six of our remote offices running RED 15's that have been updated to 9.605-1. It took anywhere from 20 to 45 minutes for each of them to come back online and they all did this at random times throughout the day between 10:15 a.m. and 2:50 p.m.

    But I do think you've hit the nail on the head when you said it handles routing differently. Maybe it's time to go back to the old way of routing until you get the bugs resolved in the new way.

Children
  • I already contacted the Sophos support, nevertheless I wanted to share my observation here as well.

    Our customer uses the RED 15 in "Standard/Split" mode, but the WAN IP overlapping is also not the problem in his case. For some weeks now, the RED 15 (firmware version 9.605-1) that connects the branch office with the SG 210 in the head office of our customer has random disconnects and the VPN tunnel goes down. This doesn't happen every day, the RED can even run 14 days without any trouble, but suddenly out of nowhere, the RED loses the connection and remains offline for 30 - 60 minutes. Although it helps to deactivate and re-activate the RED's interface in the UTM Admin Panel, this is not always an option because this can only be done from another location and not from the branch office itself when the internet connection is lost. I already reduced the MTU to 1400, but it was unsuccessful.

    Today, the problem occurred again. The RED was offline from 8:16 AM to 9:12 AM. Here is the relevant passage from the RED log:

    2019:10:10-08:15:45 vpn red_server[11001]: A3602XXXXXXXXXX: command '{"data":{"seq":42112},"type":"PING"}'
    2019:10:10-08:15:45 vpn red_server[11001]: A3602XXXXXXXXXX: Sending json message {"data":{"seq":42112},"type":"PONG"}
    2019:10:10-08:16:16 vpn red_server[11001]: A3602XXXXXXXXXX: No ping for 30 seconds, exiting.
    2019:10:10-08:16:16 vpn red_server[11001]: id="4202" severity="info" sys="System" sub="RED" name="RED Tunnel Down" red_id="A3602XXXXXXXXXX" forced="0"
    2019:10:10-08:16:16 vpn red_server[11001]: A3602XXXXXXXXXX is disconnected.
    2019:10:10-08:16:16 vpn red_server[4647]: SELF: (Re-)loading device configurations
    2019:10:10-08:16:18 vpn red2ctl[4659]: Overflow happened on reds4:0
    2019:10:10-08:16:18 vpn red2ctl[4659]: Missing keepalive from reds4:0, disabling peer 37.24.xxx.xxx
    2019:10:10-08:16:21 vpn red2ctl[4659]: Received keepalive from reds4:0, enabling peer 37.24.xxx.xxx
    2019:10:10-09:11:51 vpn red_server[20876]: SELF: Cannot do SSL handshake on socket accept from '37.24.xxx.xxx': SSL connect accept failed because of handshake problems
    2019:10:10-09:11:51 vpn red_server[20877]: SELF: Cannot do SSL handshake on socket accept from '37.24.xxx.xxx': SSL connect accept failed because of handshake problems
    2019:10:10-09:11:54 vpn red_server[20882]: SELF: New connection from 37.24.xxx.xxx with ID A3602XXXXXXXXXX (cipher AES256-GCM-SHA384), rev1<30>Oct 10 09:11:54 red_server[20882]: A3602XXXXXXXXXX: connected OK, pushing config
    2019:10:10-09:11:56 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{"version":"0"},"type":"INIT_CONNECTION"}'
    2019:10:10-09:11:56 vpn red_server[20882]: A3602XXXXXXXXXX: Initializing connection running protocol version 0
    2019:10:10-09:11:56 vpn red_server[20882]: A3602XXXXXXXXXX: Sending json message {"data":{},"type":"WELCOME"}
    2019:10:10-09:11:57 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{},"type":"CONFIG_REQ"}'
    2019:10:10-09:11:57 vpn red_server[20882]: A3602XXXXXXXXXX: Sending json message {"data":{"pin":"","fullbr_dns":"","split_networks":"192.168.48.0/24 192.168.1.0/24 1.2.3.4", ...}
    2019:10:10-09:12:02 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{"key1":"R645ggLTzrxwXcapf27r7C+UMOexSoJpTjKCAUmmsCE=","key0":"4onPa3XPBDXHQpWtyJ41eTOH+UQDXTZm3Wpm4HPfc\/k=","key_active":0},"type":"SET_KEY_REQ"}'
    2019:10:10-09:12:02 vpn red_server[20882]: A3602XXXXXXXXXX: Sending json message {"data":{},"type":"SET_KEY_REP"}
    2019:10:10-09:12:03 vpn red2ctl[4659]: Overflow happened on reds4:0
    2019:10:10-09:12:03 vpn red2ctl[4659]: Missing keepalive from reds4:0, disabling peer 37.24.xxx.xxx
    2019:10:10-09:12:03 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{"seq":0},"type":"PING"}'
    2019:10:10-09:12:03 vpn red_server[20882]: id="4201" severity="info" sys="System" sub="RED" name="RED Tunnel Up" red_id="A3602XXXXXXXXXX" forced="0"
    2019:10:10-09:12:03 vpn red_server[20882]: A3602XXXXXXXXXX: Sending json message {"data":{"seq":0},"type":"PONG"}
    2019:10:10-09:12:04 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{"wan1_ip":"192.168.178.21","mobile_signal_strength":"","wan2_ip":"","uplink":"WAN1","uplink_state":"0"},"type":"STATUS"}'
    2019:10:10-09:12:06 vpn red2ctl[4659]: Received keepalive from reds4:0, enabling peer 37.24.xxx.xxx
    2019:10:10-09:12:09 vpn red_server[4647]: SELF: (Re-)loading device configurations
    2019:10:10-09:12:19 vpn red_server[20882]: A3602XXXXXXXXXX: command '{"data":{"seq":1},"type":"PING"}'
    2019:10:10-09:12:19 vpn red_server[20882]: A3602XXXXXXXXXX: Sending json message {"data":{"seq":1},"type":"PONG"}

    We have had a lot of problems with the RED in recent weeks and our customer is already very angry because every time the RED is down, his employees are unable to work. This means high costs and unproductivity for our customer and a lot of frustration for the people sitting in the branch office, because they can't do anything in this time.

    Regards

    Stefan

  • Hallo Stefan and welcome to the UTM Community!

    Did you read through earlier posts in this thread?  Have you tried the following?

    cc set red use_unified_firmware 0

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hello Bob, thank you very much for your reply!

    Yes, I read through the entire thread today, but I have not tried the command so far because the breakdown of the VPN connection only happens sporadically in our case (sometimes only once in two weeks). But I will try to set the unified firmware value to 0 tomorrow and then see how the RED will behave in the coming days. I will let you know whether the disconnect occurs again in the next week.

    Thanks again and best regards

    Stefan