How is possible active traceroute in Sophos XG, in the last models exist one part on activate or desactivate this options but in the XG i don't see any check for this purposal.
My hosts are reachable from ping but when i launch traceroute always the last hop is sophos and i not view any hop after firewall.
Traceroute uses ICMP calls to find the hosts.
So basically your Client tries to reach every hop via ICMP. If the last station is XG, it seems like XG is blocking your ICMP requests. Do you have a firewall rule to allow this client to use ICMP ?
I remember on v15 or v16 to have the same issue. Depending on the OS you are performing the tests from.
In my case, Mac OS, traceroute does not work even if I create an ICMP firewall rule at the top.
Here the tcpdump result:
19:20:37.858433 Port1, IN: IP 192.168.0.8.33641 > 18.104.22.168.33435: UDP, length 2419:20:37.858588 Port1, OUT: IP 192.168.0.1 > 192.168.0.8: ICMP time exceeded in-transit, length 60
19:20:37.865663 Port1, IN: IP 192.168.0.8.33641 > 22.214.171.124.33436: UDP, length 2419:20:37.865805 Port1, OUT: IP 192.168.0.1 > 192.168.0.8: ICMP time exceeded in-transit, length 6019:20:37.867118 Port1, IN: IP 192.168.0.8.33641 > 126.96.36.199.33437: UDP, length 2419:20:37.867249 Port1, OUT: IP 192.168.0.1 > 192.168.0.8: ICMP time exceeded in-transit, length 6019:20:37.868407 Port1, IN: IP 192.168.0.8.33641 > 188.8.131.52.33438: UDP, length 24
UTM Certified Architect - XG Certified Architect
Tried it with Windows, works fine.
Could you please create a drppkt of those drops?
And which filter for tcpdump did you use?
Same here. I hit the XG and from then on *.
I run the same test on W10 out the same firewall rule and success.
Sent pcap via PM.
Let us know LuCar Toni
I would need the drop packet capture, not a Wireshark Dump.
the tcpdump comes from xg console.
I mean drop packet capture, not tcpdump.
on CLI (advanced shell) simply use 'drppkt' on Console use drop-packet-capture.
I prefer advanced shell - You can set all filter via Grep (Piping | )