After working for months, our Astaro Command Center has lost linkage with our remote ASGs. The ACC packet filter log shows it dropping Port 4433 packets from the public address of each remote ASG. (The log also shows the ACC dropping its own packets intended for our local time server.) Our ACC remains linked to our local ASG, which shares the same class C internal network. All four Axx's have always had the same 'Shared Secret' for central management.
I cannot find any way to re-enable the traffic. The ACC has no Network Security tab and therefore no Packet Filter page. I have tried restarting each Axx device and all routers between them that I admin.
LOG EXTRACT:
22:56:21 Default DROP TCP 98.114.xx.xx:44394 :4433 [SYN] len=60 ttl=59 tos=0x00 srcmac= dstmac=
22:56:23 Default DROP TCP 98.114.xx.xx:44394 :4433 [SYN] len=60 ttl=59 tos=0x00 srcmac= dstmac=
22:56:24 Default DROP TCP 98.114.yyy.yy:46495 :4433 [SYN] len=56 ttl=61 tos=0x00 srcmac= dstmac=
22:56:27 Default DROP TCP 98.114.yyy.yy:46495 :4433 [SYN] len=56 ttl=61 tos=0x00 srcmac= dstmac=
22:56:31 Default DROP TCP 98.114.xx.xx:47536 :4433 [SYN] len=60 ttl=59 tos=0x00 srcmac= dstmac=
22:56:33 Default DROP TCP 98.114.xx.xx:47536 :4433 [SYN] len=60 ttl=59 tos=0x00 srcmac= dstmac=
22:56:33 Default DROP UDP :123 :123 len=76 ttl=64 tos=0x00
22:56:34 Default DROP TCP 98.114.yyy.yy:46496 :4433 [SYN] len=56 ttl=61 tos=0x00 srcmac= dstmac=
How can I get the ACC to stop dropping legitimate traffic?
Thanks.
ACC version 2.201, Pattern 20079
ASG version 8.001, Pattern 20222
This thread was automatically locked due to age.