Important note about SSL VPN compatibility for 20.0 MR1 with EoL SFOS versions and UTM9 OS. Learn more in the release notes.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG Firewall - Windows Remote Desktop freezing

 

Hi,

We have just started using XG (upgraded from UTM 9) and we are having difficulty with Windows Remote Desktop going through the XG Firewall via an IPsec VPN connection. The Remote Desktop connections temporarily disconnect or pause dozens of times a day.  Sometimes they connect back up, sometimes they drop.  I have added a DoS Bypass rule for the subnet and the RDP server on the other side.  It helped a lot but it is still continuing.  Does anyone know why XG would consider RDP connections as a DoS attack and how to fix this?  This issue is happening in 2 different offices in two different countries (so I know it is not the Internet connection, modem or router). If I put our old UTM 9 firewall back in the issue goes away.  Any help would be appreciated.  Thanks.

Jae

Running the latest firmware SFOS 17.1.4 MR-4 on all sites.

 

 



This thread was automatically locked due to age.
Parents Reply
  • Lucar Toni.

    With all respsect. This is NOT a client issue. It's something that the firewall is doing with the packages when its passing the firewall over IPSec VPN.

    Since there is no issue with UTM and other firewalls with clients and VPN this is a XG issue.

    As soon as there is an XG involved this issue are happening.

    Clients are Windows 10 and servers are Win 2012 and newer.

    Before windows server 2012 MS used only TCP for RDP and now its UDP as primary protocol and tcp as fallback.

    And as I said before, Sophos support where involved with us and logged trafic remotely but culd not find anything.

    Regards

    Rickard

Children
  • The point, i am trying to make is, why not troubleshoot this by yourself? 

    Again. It is a tunnel. 

    So you have the possibility to take a look at both ends. 

    You can look, what comes to XG - What is coming out of the SSL VPN tunnel on XG site? 

    And you can look at, what does the client send into the tunnel? 

     

    There are couple of points, which can cause this issue. 

     

    Maybe the client is sending this traffic not to XG, instead to his local wan ethernet adapter?

    Maybe XG is dropping the traffic for whatever reason?

    Maybe the Client sent the traffic into the tunnel, but never arrive / gets corrupted in the tunnel? 

    Maybe everything is working until the packets comes back to the client and XG is sending it to the wrong Interface?

     

    I have literally the same setup and everything works fine. 

    So there is something going on in your setup and you should start to take a deeper look into this issue. 

     

     

    I would not say, it is not a client issue, as long as you do not have any dump proof of this. 

    __________________________________________________________________________________________________________________

  • I will add to this that I analyzed traffic on both ends, looked at the clients, servers and switches.  Nothing was wrong with anything and all the problems started when we installed XG.  Our UTM 9 firewalls were fine.  We have one small office that didn't need any changes to the DoS but larger offices with 20 plus users or more I think caused the DoS protection to freak out (for lack of a better word) and drop RDP traffic.  I have an office running on the new settings for 3 weeks with no issues now.  The problem is XG and it is the DoS feature if you have more then a couple of users using RDP. 

  • But is this DOS Protection feature not doing its job, if you hitting X amounts of UDP packets per Second, it will start to drop? 

    If you take a look at the dump of one session, it is crazy, how many packets per second being transmitted. 

     

    The question is, what should be fixed? 

    Should there be a DOS Protection with preconfigured bypass rules? 

    __________________________________________________________________________________________________________________

  • Just to clerify. I have not enabled any DoS protection at all and the GUI thats shows droped packages shows 0 in every column. And it is IPSec site to site that is the issue for us.

    We have been running the XG since version 15 and been using every version since. This problem started after we upgraded to v 17.

  • We had almost the exact same issue:

    https://community.sophos.com/products/xg-firewall/f/firewall-and-policies/110335/strange-vpn-connection-issue

     

    We found a workaround to add the registry key to disable UDP over RDP, but still don't know the root cause.  Thought you might find it interesting.