Customers might be unable to connect with us via the Sophos Malaysia Support Hotline number. Our teams are actively working on a fix. In the interim, we request customers to use the backup hotline number - +65 3157 5922 (Singapore) or raise a support request at https://support.sophos.com/.

Help us enhance your Sophos Community experience. Share your thoughts in our Sophos Community survey.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Sophos UTM 9 with AWS Site-to-Site VPC: Tunnels up, but no ping

I've got an installation of Sophos UTM 9 connected to four AWS VPCs with Site-to-Site. I created Customer Gateways, Virtual Private Gateways and a Site-To-Site connection in each of the private VPCs. I then exported the configuration from AWS and imported into Sophos. So far so good - the tunnels are up. I've set the route tables to propagate routes and the route tables seem to be OK.

 

However, when I try to ping an EC2 in one of the private VPCs, I get 100% packet loss:

 

PING 10.93.1.4 (10.93.1.4) 56(84) bytes of data.

 

--- 10.93.1.4 ping statistics ---

5 packets transmitted, 0 received, 100% packet loss, time 4032ms

 

If I try traceroute, I get the following:

 

traceroute to 10.93.1.4 (10.93.1.4), 30 hops max, 40 byte packets using UDP

1 * * *

2 * * *

3 * * *

4 * * *

5 * * *

6 * * *

 

I set up a static route to the VPC, using the internal network card as the gateway, and I get the following response from traceroute:

 

1 10.93.1.4 (10.93.1.4) 2.209 ms 1.688 ms 1.850 ms

2 10.93.1.4 (10.93.1.4) 4.789 ms 4.688 ms 4.018 ms

3 * * *

4 * * *

5 * * *

6 * * *

7 * * *

8 * * *

9 10.93.1.4 (10.93.1.4) 9.051 ms 8.660 ms 8.439 ms

10 10.93.1.4 (10.93.1.4) 9.112 ms 8.900 ms *

11 * * *

12 * * *

13 * * *

14 * * *

15 * * *

16 10.93.1.4 (10.93.1.4) 14.498 ms * *

17 10.93.1.4 (10.93.1.4) 15.581 ms * *

18 * * *

19 * * *

20 * * *

21 * * *

22 * * *

23 10.93.1.4 (10.93.1.4) 19.517 ms * *

 

This looks like I'm getting intermittent pings back.

 

What is going on? Am I on the right path with the static route?

 

Thanks for any help!



This thread was automatically locked due to age.
  • I should have mentioned in my last post - ping is working in both directions now - I can ping the UTM from the internal network, and from the external network through the tunnel - just not the web admin UI. I agree - this is a bit strange!

     

    loginuser@utm-01:/home/login > sudo /usr/sbin/conntrack -L | grep icmp.*10.93.1.4
    conntrack v1.4.2 (conntrack-tools): 37 flow entries have been shown.
    icmp     1 2 src=169.254.46.86 dst=10.93.1.4 type=8 code=0 id=46866 packets=5 bytes=420 src=10.93.1.4 dst=10.91.3.254 type=0 code=0 id=46866 packets=5 bytes=420 mark=528384 delta-time=32 use=1

     

    I had to run ping again from the web admin to get this log - and this time it worked. I'm a little confused why its working now but not before, possibly because of a bad security group configuration? The good news is that everything is now working as expected - including the web admin ping.

     

    Thanks for your continued assistance,

     

    Martin

  • Possibly a bad security group, possibly something with the UTM, possibly the gravity from the moon, who knows :P   What's important is that it's working for you now. 

    Feel free to post here again if it suddenly stops working again, otherwise good luck Martin!

     

    Tim 

  • Hello Tim,

     

    i've did exactly as you wrote but still facing the issue. all AWS networks are available from behind the UTm but not directly from the WebAdmin.

    even if i'm using vlans, it shouldn't make a difference ....

     

    every help would be appreciated!

    thanks in advance.

    GReets

  • Hoi Rene and welcome to the UTM Community!

    See #2 n Rulz (last updated 2019-04-17), especially 3.  What did you change that made pinging work?

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA
  • Hello Bob,

    thanks for your quick reply. I just got it working by enabling "Rule applies to IPSec packets" in SNAT configuration

    Greets from Munich.

    Rene