XG has an SG as upstream firewall. No blocked traffic during pattern updates. Worked nice and smooth when on MR1.
u2d.log shows nothing that concerns me (except the error 500 as described here)
Patterns for the modules ATP, Auth Client, GeoIP, IPS and App Signatures are failing, others work.
DEBUG Jan 09 14:58:58 [16237]: Response length : 11 DEBUG Jan 09 15:01:01 [18822]: --serial = C4207AXxxxxxxxxx DEBUG Jan 09 15:01:01 [18822]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx DEBUG Jan 09 15:01:01 [18822]: --fwversion = 18.0.4.506 DEBUG Jan 09 15:01:01 [18822]: --productcode = CN DEBUG Jan 09 15:01:01 [18822]: --model = XG430 DEBUG Jan 09 15:01:01 [18822]: --vendor = WP02 DEBUG Jan 09 15:01:01 [18822]: --pkg_ips_version = 18.17.76 DEBUG Jan 09 15:01:01 [18822]: --pkg_ips_cv = 16.0 DEBUG Jan 09 15:01:01 [18822]: --pkg_atp_version = 1.0.0336 DEBUG Jan 09 15:01:01 [18822]: --pkg_atp_cv = 1.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_savi_version = 1.0.16453 DEBUG Jan 09 15:01:01 [18822]: --pkg_savi_cv = 1.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_avira_version = 1.0.413046 DEBUG Jan 09 15:01:01 [18822]: --pkg_avira_cv = 4.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_apfw_version = 11.0.014 DEBUG Jan 09 15:01:01 [18822]: --pkg_apfw_cv = 1.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_sslvpn_version = 1.0.008 DEBUG Jan 09 15:01:01 [18822]: --pkg_sslvpn_cv = 1.01 DEBUG Jan 09 15:01:01 [18822]: --pkg_ipsec_version = 2.0.001 DEBUG Jan 09 15:01:01 [18822]: --pkg_ipsec_cv = 1.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_geoip_version = 2.0.003 DEBUG Jan 09 15:01:01 [18822]: --pkg_geoip_cv = 1.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_clientauth_version = 1.0.0019 DEBUG Jan 09 15:01:01 [18822]: --pkg_clientauth_cv = 2.00 DEBUG Jan 09 15:01:01 [18822]: --pkg_redfw_version = 3.0.003 DEBUG Jan 09 15:01:01 [18822]: --pkg_redfw_cv = 2.00 DEBUG Jan 09 15:01:01 [18822]: --oem = Sophos DEBUG Jan 09 15:01:01 [18822]: --server = u2d.sophos.com DEBUG Jan 09 15:01:01 [18822]: --port = 443 DEBUG Jan 09 15:01:01 [18822]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 09 15:01:01 [18822]: Final query string is : ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00 DEBUG Jan 09 15:01:01 [18822]: Response code : 200 DEBUG Jan 09 15:01:01 [18822]: Response body : <Up2Date/> DEBUG Jan 09 15:01:01 [18822]: Response length : 11 DEBUG Jan 09 15:01:04 [18900]: --serial = C4207AXxxxxxxxxx DEBUG Jan 09 15:01:04 [18900]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx DEBUG Jan 09 15:01:04 [18900]: --fwversion = 18.0.4.506 DEBUG Jan 09 15:01:04 [18900]: --productcode = CN DEBUG Jan 09 15:01:04 [18900]: --model = XG430 DEBUG Jan 09 15:01:04 [18900]: --vendor = WP02 DEBUG Jan 09 15:01:04 [18900]: --pkg_sysupdate_version = 0 DEBUG Jan 09 15:01:04 [18900]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443 DEBUG Jan 09 15:01:04 [18900]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443 DEBUG Jan 09 15:01:04 [18900]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443 DEBUG Jan 09 15:01:04 [18900]: Final query string is : ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=&pkg_sysupdate_version=0 DEBUG Jan 09 15:01:05 [18900]: Response code : 500 DEBUG Jan 09 15:01:05 [18900]: Response body : <?xml version="1.0" encoding="iso-8859-1"?> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en"> <head> <title>500 - Internal Server Error</title> </head> <body> <h1>500 - Internal Server Error</h1> </body> </html> DEBUG Jan 09 15:01:05 [18900]: Response length : 369 ERROR Jan 09 15:01:05 [18900]: Received invalid top level tag html, expecting Up2Date ERROR Jan 09 15:01:05 [18900]: FATAL : Error in parsing response, exiting. DEBUG Jan 09 15:04:39 [23158]: --serial = C4207AXxxxxxxxxx DEBUG Jan 09 15:04:39 [23158]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx DEBUG Jan 09 15:04:39 [23158]: --fwversion = 18.0.4.506 DEBUG Jan 09 15:04:39 [23158]: --productcode = CN DEBUG Jan 09 15:04:39 [23158]: --model = XG430 DEBUG Jan 09 15:04:39 [23158]: --vendor = WP02 DEBUG Jan 09 15:04:39 [23158]: --pkg_sysupdate_version = 0 DEBUG Jan 09 15:04:39 [23158]: --oem = Sophos DEBUG Jan 09 15:04:39 [23158]: --server = u2d.sophos.com DEBUG Jan 09 15:04:39 [23158]: --port = 443 DEBUG Jan 09 15:04:39 [23158]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 09 15:04:39 [23158]: Final query string is : ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_sysupdate_version=0 DEBUG Jan 09 15:04:42 [23158]: Response code : 200 DEBUG Jan 09 15:04:42 [23158]: Response body : <Up2Date/> DEBUG Jan 09 15:04:42 [23158]: Response length : 11 DEBUG Jan 09 15:12:01 [30842]: --serial = C4207AXxxxxxxxxx DEBUG Jan 09 15:12:01 [30842]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx DEBUG Jan 09 15:12:01 [30842]: --fwversion = 18.0.4.506 DEBUG Jan 09 15:12:01 [30842]: --productcode = CN DEBUG Jan 09 15:12:01 [30842]: --model = XG430 DEBUG Jan 09 15:12:01 [30842]: --vendor = WP02 DEBUG Jan 09 15:12:01 [30842]: --pkg_ips_version = 18.17.76 DEBUG Jan 09 15:12:01 [30842]: --pkg_ips_cv = 16.0 DEBUG Jan 09 15:12:01 [30842]: --pkg_atp_version = 1.0.0336 DEBUG Jan 09 15:12:01 [30842]: --pkg_atp_cv = 1.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_savi_version = 1.0.16453 DEBUG Jan 09 15:12:01 [30842]: --pkg_savi_cv = 1.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_avira_version = 1.0.413046 DEBUG Jan 09 15:12:01 [30842]: --pkg_avira_cv = 4.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_apfw_version = 11.0.014 DEBUG Jan 09 15:12:01 [30842]: --pkg_apfw_cv = 1.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_sslvpn_version = 1.0.008 DEBUG Jan 09 15:12:01 [30842]: --pkg_sslvpn_cv = 1.01 DEBUG Jan 09 15:12:01 [30842]: --pkg_ipsec_version = 2.0.001 DEBUG Jan 09 15:12:01 [30842]: --pkg_ipsec_cv = 1.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_geoip_version = 2.0.003 DEBUG Jan 09 15:12:01 [30842]: --pkg_geoip_cv = 1.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_clientauth_version = 1.0.0019 DEBUG Jan 09 15:12:01 [30842]: --pkg_clientauth_cv = 2.00 DEBUG Jan 09 15:12:01 [30842]: --pkg_redfw_version = 3.0.003 DEBUG Jan 09 15:12:01 [30842]: --pkg_redfw_cv = 2.00 DEBUG Jan 09 15:12:01 [30842]: --oem = Sophos DEBUG Jan 09 15:12:01 [30842]: --server = u2d.sophos.com DEBUG Jan 09 15:12:01 [30842]: --port = 443 DEBUG Jan 09 15:12:01 [30842]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 09 15:12:01 [30842]: Final query string is : ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00 DEBUG Jan 09 15:12:01 [30842]: Response code : 200 DEBUG Jan 09 15:12:01 [30842]: Response body : <Up2Date/> DEBUG Jan 09 15:12:01 [30842]: Response length : 11 DEBUG Jan 09 15:16:01 [2468]: --serial = C4207AXxxxxxxxxx DEBUG Jan 09 15:16:01 [2468]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx DEBUG Jan 09 15:16:01 [2468]: --fwversion = 18.0.4.506 DEBUG Jan 09 15:16:01 [2468]: --productcode = CN DEBUG Jan 09 15:16:01 [2468]: --model = XG430 DEBUG Jan 09 15:16:01 [2468]: --vendor = WP02 DEBUG Jan 09 15:16:01 [2468]: --pkg_ips_version = 18.17.76 DEBUG Jan 09 15:16:01 [2468]: --pkg_ips_cv = 16.0 DEBUG Jan 09 15:16:01 [2468]: --pkg_atp_version = 1.0.0336 DEBUG Jan 09 15:16:01 [2468]: --pkg_atp_cv = 1.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_savi_version = 1.0.16453 DEBUG Jan 09 15:16:01 [2468]: --pkg_savi_cv = 1.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_avira_version = 1.0.413046 DEBUG Jan 09 15:16:01 [2468]: --pkg_avira_cv = 4.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_apfw_version = 11.0.014 DEBUG Jan 09 15:16:01 [2468]: --pkg_apfw_cv = 1.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_sslvpn_version = 1.0.008 DEBUG Jan 09 15:16:01 [2468]: --pkg_sslvpn_cv = 1.01 DEBUG Jan 09 15:16:01 [2468]: --pkg_ipsec_version = 2.0.001 DEBUG Jan 09 15:16:01 [2468]: --pkg_ipsec_cv = 1.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_geoip_version = 2.0.003 DEBUG Jan 09 15:16:01 [2468]: --pkg_geoip_cv = 1.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_clientauth_version = 1.0.0019 DEBUG Jan 09 15:16:01 [2468]: --pkg_clientauth_cv = 2.00 DEBUG Jan 09 15:16:01 [2468]: --pkg_redfw_version = 3.0.003 DEBUG Jan 09 15:16:01 [2468]: --pkg_redfw_cv = 2.00 DEBUG Jan 09 15:16:01 [2468]: --oem = Sophos DEBUG Jan 09 15:16:01 [2468]: --server = u2d.sophos.com DEBUG Jan 09 15:16:01 [2468]: --port = 443 DEBUG Jan 09 15:16:01 [2468]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 09 15:16:01 [2468]: Final query string is : ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00 DEBUG Jan 09 15:16:02 [2468]: Response code : 200 DEBUG Jan 09 15:16:02 [2468]: Response body : <Up2Date/> DEBUG Jan 09 15:16:02 [2468]: Response length : 11
any idea?
An other cluster we updated to MR4 a day later, does not behave like this.
I noticed, that on the machine with the pattern update status "Failed" there came a ATP update and ATP's info switched from…
I noticed, that on the machine with the pattern update status "Failed" there came a ATP update and ATP's info switched from Failed to Success. Screenshot below.
Maybe we have to wait for new updates on every pattern to get the machine ged rid of the Failed status.
only two failed left.
strange behaviour, though...
I guess, UTM is doing something.
Check this:
DEBUG Jan 09 15:12:01 [30842]: Final query string is :?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00DEBUG Jan 09 15:12:01 [30842]: Response code : 200DEBUG Jan 09 15:12:01 [30842]: Response body :<Up2Date/>,
The response body should be more then this. It looks like the request (This final query string) should give more then this.
What you could do is: curl this request on UTM and on XG and check, if the results are the same.
Check the webfilter log on UTM, if you see any inspection or what so ever.
__________________________________________________________________________________________________________________
Hi Lucar Toni,
I don't think Response Body has ever been different than that. And from the response code 200 I can see, that XG and Cloud Server talk to each other.
Upstream UTM is not doing any Webfiltering, only packet filter.
This is a copy of a old MR1 request - response body also empty.
DEBUG Dec 16 13:53:44 [5593]: --serial = C4207xxxxxxDEBUG Dec 16 13:53:44 [5593]: --deviceid = 6d848b4deb5xxxxxxxxxxxxxxxDEBUG Dec 16 13:53:44 [5593]: --fwversion = 18.0.1.396DEBUG Dec 16 13:53:44 [5593]: --productcode = CNDEBUG Dec 16 13:53:44 [5593]: --model = XG430DEBUG Dec 16 13:53:44 [5593]: --vendor = WP02DEBUG Dec 16 13:53:44 [5593]: --pkg_ips_version = 18.17.71DEBUG Dec 16 13:53:44 [5593]: --pkg_ips_cv = 15.0DEBUG Dec 16 13:53:44 [5593]: --pkg_atp_version = 1.0.0333DEBUG Dec 16 13:53:44 [5593]: --pkg_atp_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_savi_version = 1.0.16369DEBUG Dec 16 13:53:44 [5593]: --pkg_savi_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_avira_version = 1.0.412546DEBUG Dec 16 13:53:44 [5593]: --pkg_avira_cv = 4.00DEBUG Dec 16 13:53:44 [5593]: --pkg_apfw_version = 11.0.012DEBUG Dec 16 13:53:44 [5593]: --pkg_apfw_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_sslvpn_version = 1.0.007DEBUG Dec 16 13:53:44 [5593]: --pkg_sslvpn_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_ipsec_version = 2.0.001DEBUG Dec 16 13:53:44 [5593]: --pkg_ipsec_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_geoip_version = 2.0.003DEBUG Dec 16 13:53:44 [5593]: --pkg_geoip_cv = 1.00DEBUG Dec 16 13:53:44 [5593]: --pkg_clientauth_version = 1.0.0019DEBUG Dec 16 13:53:44 [5593]: --pkg_clientauth_cv = 2.00DEBUG Dec 16 13:53:44 [5593]: --pkg_redfw_version = 3.0.002DEBUG Dec 16 13:53:44 [5593]: --pkg_redfw_cv = 2.00DEBUG Dec 16 13:53:44 [5593]: --oem = SophosDEBUG Dec 16 13:53:44 [5593]: --server = u2d.sophos.comDEBUG Dec 16 13:53:44 [5593]: --port = 443DEBUG Dec 16 13:53:44 [5593]: Added new server : Host - u2d.sophos.com, Port - 443DEBUG Dec 16 13:53:44 [5593]: Final query string is :?&serialkey=C4207xxxxxx&deviceid=6d848b4deb5xxxxxxxxxxxxxxx&fwversion=18.0.1.396&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.71&pkg_ips_cv=15.0&pkg_atp_version=1.0.0333&pkg_atp_cv=1.00&pkg_savi_version=1.0.16369&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.412546&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.002&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.007&pkg_sslvpn_cv=1.00&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00DEBUG Dec 16 13:53:45 [5593]: Response code : 200DEBUG Dec 16 13:53:45 [5593]: Response body :<Up2Date>
There is a different. Do you see the / in your post? Its HTML.
To be more precise:
There is new content to download:
DEBUG Oct 10 12:33:09 [23313]: Response body :<Up2Date> <Package u2dtype="pattern"> <File name="avira_4.00_1.0.411085_immdiff.tar.gz.gpg"> <location>d30ncyzaneb4q0.cloudfront.net/.../location> <version>1.0.411085</version> <size>13802</size> <md5sum>98f0dce85279e99dc0159d4184226c34</md5sum> <module>avira</module> <cv>4.00</cv> <type>immdiff</type> </File> </Package></Up2Date>
There is not:
DEBUG Oct 10 10:33:01 [35281]: Response code : 200DEBUG Oct 10 10:33:01 [35281]: Response body :<Up2Date/>
Basically your string seems to result in: There is no new up2date packages for you in place. Using your String:?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
Failed does not mean, that there is no new content. It basically means, up2date could not download multiple times and skip.
Find the line, where those errors occur.
I see and on XG not behind UTM I see the requests look like this:
(seeing just an other issue there, not updating apfw)
WARNING Jan 13 15:10:23 [20184]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress. .... .... DEBUG Jan 13 17:41:03 [2008]: Response length : 409 DEBUG Jan 13 17:41:03 [2008]: Received name : apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 17:41:03 [2008]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 17:41:03 [2008]: Received version : 11.0.014 DEBUG Jan 13 17:41:03 [2008]: Received size : 73075324 DEBUG Jan 13 17:41:03 [2008]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f DEBUG Jan 13 17:41:03 [2008]: Received module : apfw DEBUG Jan 13 17:41:03 [2008]: Received cv : 1.00 DEBUG Jan 13 17:41:03 [2008]: Received type : full WARNING Jan 13 17:41:03 [2008]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress. DEBUG Jan 13 17:56:06 [6725]: --serial = C1C0B9xxxxxx DEBUG Jan 13 17:56:06 [6725]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx DEBUG Jan 13 17:56:06 [6725]: --fwversion = 18.0.4.506 DEBUG Jan 13 17:56:06 [6725]: --productcode = CN DEBUG Jan 13 17:56:06 [6725]: --model = XG106 DEBUG Jan 13 17:56:06 [6725]: --vendor = XN01 DEBUG Jan 13 17:56:06 [6725]: --pkg_ips_version = 18.17.77 DEBUG Jan 13 17:56:06 [6725]: --pkg_ips_cv = 16.0 DEBUG Jan 13 17:56:06 [6725]: --pkg_atp_version = 1.0.0337 DEBUG Jan 13 17:56:06 [6725]: --pkg_atp_cv = 1.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_savi_version = 1.0.16465 DEBUG Jan 13 17:56:06 [6725]: --pkg_savi_cv = 1.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_avira_version = 1.0.413149 DEBUG Jan 13 17:56:06 [6725]: --pkg_avira_cv = 4.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_apfw_version = 11.0.012 DEBUG Jan 13 17:56:06 [6725]: --pkg_apfw_cv = 1.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_sslvpn_version = 1.0.008 DEBUG Jan 13 17:56:06 [6725]: --pkg_sslvpn_cv = 1.01 DEBUG Jan 13 17:56:06 [6725]: --pkg_ipsec_version = 2.0.001 DEBUG Jan 13 17:56:06 [6725]: --pkg_ipsec_cv = 1.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_geoip_version = 2.0.003 DEBUG Jan 13 17:56:06 [6725]: --pkg_geoip_cv = 1.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_clientauth_version = 1.0.0019 DEBUG Jan 13 17:56:06 [6725]: --pkg_clientauth_cv = 2.00 DEBUG Jan 13 17:56:06 [6725]: --pkg_redfw_version = 3.0.003 DEBUG Jan 13 17:56:06 [6725]: --pkg_redfw_cv = 2.00 DEBUG Jan 13 17:56:06 [6725]: --oem = Sophos DEBUG Jan 13 17:56:06 [6725]: --server = u2d.sophos.com DEBUG Jan 13 17:56:06 [6725]: --port = 443 DEBUG Jan 13 17:56:06 [6725]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 13 17:56:06 [6725]: Final query string is : ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16465&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413149&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00 DEBUG Jan 13 17:56:07 [6725]: Response code : 200 DEBUG Jan 13 17:56:07 [6725]: Response body : <Up2Date> <Package u2dtype="pattern"> <File name="apfw_1.00_11.0.014.tar.gz.gpg"> <location>https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg</location> <version>11.0.014</version> <size>73075324</size> <md5sum>f731a3f00cdbebe94999a0ca0cd91e9f</md5sum> <module>apfw</module> <cv>1.00</cv> <type>full</type> </File> </Package> </Up2Date> DEBUG Jan 13 17:56:07 [6725]: Response length : 409 DEBUG Jan 13 17:56:07 [6725]: Received name : apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 17:56:07 [6725]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 17:56:07 [6725]: Received version : 11.0.014 DEBUG Jan 13 17:56:07 [6725]: Received size : 73075324 DEBUG Jan 13 17:56:07 [6725]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f DEBUG Jan 13 17:56:07 [6725]: Received module : apfw DEBUG Jan 13 17:56:07 [6725]: Received cv : 1.00 DEBUG Jan 13 17:56:07 [6725]: Received type : full WARNING Jan 13 17:56:07 [6725]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress. DEBUG Jan 13 18:00:17 [8013]: --serial = C1C0B9xxxxxx DEBUG Jan 13 18:00:17 [8013]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx DEBUG Jan 13 18:00:17 [8013]: --fwversion = 18.0.4.506 DEBUG Jan 13 18:00:17 [8013]: --productcode = CN DEBUG Jan 13 18:00:17 [8013]: --model = XG106 DEBUG Jan 13 18:00:17 [8013]: --vendor = XN01 DEBUG Jan 13 18:00:17 [8013]: --pkg_sysupdate_version = 0 DEBUG Jan 13 18:00:17 [8013]: --oem = Sophos DEBUG Jan 13 18:00:17 [8013]: --server = u2d.sophos.com DEBUG Jan 13 18:00:17 [8013]: --port = 443 DEBUG Jan 13 18:00:17 [8013]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 13 18:00:17 [8013]: Final query string is : ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_sysupdate_version=0 DEBUG Jan 13 18:00:18 [8013]: Response code : 200 DEBUG Jan 13 18:00:18 [8013]: Response body : <Up2Date/> DEBUG Jan 13 18:00:18 [8013]: Response length : 11 DEBUG Jan 13 18:01:05 [8342]: --serial = C1C0B9xxxxxx DEBUG Jan 13 18:01:05 [8342]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx DEBUG Jan 13 18:01:05 [8342]: --fwversion = 18.0.4.506 DEBUG Jan 13 18:01:05 [8342]: --productcode = CN DEBUG Jan 13 18:01:05 [8342]: --model = XG106 DEBUG Jan 13 18:01:05 [8342]: --vendor = XN01 DEBUG Jan 13 18:01:05 [8342]: --pkg_sysupdate_version = 0 DEBUG Jan 13 18:01:05 [8342]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443 DEBUG Jan 13 18:01:05 [8342]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443 DEBUG Jan 13 18:01:05 [8342]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443 DEBUG Jan 13 18:01:05 [8342]: Final query string is : ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=&pkg_sysupdate_version=0 DEBUG Jan 13 18:01:09 [8342]: Response code : 503 DEBUG Jan 13 18:01:09 [8342]: Response body : DEBUG Jan 13 18:01:09 [8342]: Response length : 0 ERROR Jan 13 18:01:09 [8342]: Response not parsed successfully. ERROR Jan 13 18:01:09 [8342]: FATAL : Error in parsing response, exiting. DEBUG Jan 13 18:11:10 [11574]: --serial = C1C0B9xxxxxx DEBUG Jan 13 18:11:10 [11574]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx DEBUG Jan 13 18:11:10 [11574]: --fwversion = 18.0.4.506 DEBUG Jan 13 18:11:10 [11574]: --productcode = CN DEBUG Jan 13 18:11:10 [11574]: --model = XG106 DEBUG Jan 13 18:11:10 [11574]: --vendor = XN01 DEBUG Jan 13 18:11:10 [11574]: --pkg_ips_version = 18.17.77 DEBUG Jan 13 18:11:10 [11574]: --pkg_ips_cv = 16.0 DEBUG Jan 13 18:11:10 [11574]: --pkg_atp_version = 1.0.0337 DEBUG Jan 13 18:11:10 [11574]: --pkg_atp_cv = 1.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_savi_version = 1.0.16465 DEBUG Jan 13 18:11:10 [11574]: --pkg_savi_cv = 1.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_avira_version = 1.0.413149 DEBUG Jan 13 18:11:10 [11574]: --pkg_avira_cv = 4.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_apfw_version = 11.0.012 DEBUG Jan 13 18:11:10 [11574]: --pkg_apfw_cv = 1.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_sslvpn_version = 1.0.008 DEBUG Jan 13 18:11:10 [11574]: --pkg_sslvpn_cv = 1.01 DEBUG Jan 13 18:11:10 [11574]: --pkg_ipsec_version = 2.0.001 DEBUG Jan 13 18:11:10 [11574]: --pkg_ipsec_cv = 1.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_geoip_version = 2.0.003 DEBUG Jan 13 18:11:10 [11574]: --pkg_geoip_cv = 1.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_clientauth_version = 1.0.0019 DEBUG Jan 13 18:11:10 [11574]: --pkg_clientauth_cv = 2.00 DEBUG Jan 13 18:11:10 [11574]: --pkg_redfw_version = 3.0.003 DEBUG Jan 13 18:11:10 [11574]: --pkg_redfw_cv = 2.00 DEBUG Jan 13 18:11:10 [11574]: --oem = Sophos DEBUG Jan 13 18:11:10 [11574]: --server = u2d.sophos.com DEBUG Jan 13 18:11:10 [11574]: --port = 443 DEBUG Jan 13 18:11:10 [11574]: Added new server : Host - u2d.sophos.com, Port - 443 DEBUG Jan 13 18:11:10 [11574]: Final query string is : ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16465&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413149&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00 DEBUG Jan 13 18:11:11 [11574]: Response code : 200 DEBUG Jan 13 18:11:11 [11574]: Response body : <Up2Date> <Package u2dtype="pattern"> <File name="apfw_1.00_11.0.014.tar.gz.gpg"> <location>https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg</location> <version>11.0.014</version> <size>73075324</size> <md5sum>f731a3f00cdbebe94999a0ca0cd91e9f</md5sum> <module>apfw</module> <cv>1.00</cv> <type>full</type> </File> </Package> </Up2Date> DEBUG Jan 13 18:11:11 [11574]: Response length : 409 DEBUG Jan 13 18:11:11 [11574]: Received name : apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 18:11:11 [11574]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg DEBUG Jan 13 18:11:11 [11574]: Received version : 11.0.014 DEBUG Jan 13 18:11:11 [11574]: Received size : 73075324 DEBUG Jan 13 18:11:11 [11574]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f DEBUG Jan 13 18:11:11 [11574]: Received module : apfw DEBUG Jan 13 18:11:11 [11574]: Received cv : 1.00 DEBUG Jan 13 18:11:11 [11574]: Received type : full WARNING Jan 13 18:11:11 [11574]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress. XG106_XN01_SFOS 18.0.4 MR-4# XG106_XN01_SFOS 18.0.4 MR-4#
updated my response above.
Assuming this is not an actually issue. Because all your versions are up2date.
The Error state simply indicated the latest try. And this was "Not successful" for those packages. Now those packets are up2date and the server tells you "You are up2date".
Thats the reason, the new status of IPS moved to Successful, after we released a new IPS pattern.
BTW: Where do you see a issue right now in this example? It gives you the option to update to 11.0.014. Assuming V11.0.015 will be offered after this.
This looks confusing:
WARNING Jan 13 17:56:07 [6725]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.
is it still downloading (download for a previous update is in progress - for several days now?). Think not, it already has downloaded and is waiting for install.
Is it downloading the 70MB AP firmware every u2d cycle?
This is from the machine from the initial post here:
So I can see, it does download something, and log this, but only when new files appear.
DEBUG Jan 13 05:36:54 [23705]: Response length : 11DEBUG Jan 13 05:38:07 [24946]: --serial = C4207AXPxxxxxxxDEBUG Jan 13 05:38:07 [24946]: --deviceid = 36953340ad5bd8cf1xxxxxxxxxxxxxxxxDEBUG Jan 13 05:38:07 [24946]: --fwversion = 18.0.4.506DEBUG Jan 13 05:38:07 [24946]: --productcode = CNDEBUG Jan 13 05:38:07 [24946]: --model = XG430DEBUG Jan 13 05:38:07 [24946]: --vendor = WP02DEBUG Jan 13 05:38:07 [24946]: --pkg_ips_version = 18.17.77DEBUG Jan 13 05:38:07 [24946]: --pkg_ips_cv = 16.0DEBUG Jan 13 05:38:07 [24946]: --pkg_atp_version = 1.0.0337DEBUG Jan 13 05:38:07 [24946]: --pkg_atp_cv = 1.00DEBUG Jan 13 05:38:07 [24946]: --pkg_savi_version = 1.0.16463DEBUG Jan 13 05:38:07 [24946]: --pkg_savi_cv = 1.00DEBUG Jan 13 05:38:07 [24946]: --pkg_avira_version = 1.0.413141DEBUG Jan 13 05:38:07 [24946]: --pkg_avira_cv = 4.00DEBUG Jan 13 05:38:07 [24946]: --pkg_apfw_version = 11.0.014DEBUG Jan 13 05:38:07 [24946]: --pkg_apfw_cv = 1.00DEBUG Jan 13 05:38:07 [24946]: --pkg_sslvpn_version = 1.0.008DEBUG Jan 13 05:38:07 [24946]: --pkg_sslvpn_cv = 1.01DEBUG Jan 13 05:38:07 [24946]: --pkg_ipsec_version = 2.0.001DEBUG Jan 13 05:38:07 [24946]: --pkg_ipsec_cv = 1.00DEBUG Jan 13 05:38:07 [24946]: --pkg_geoip_version = 2.0.003DEBUG Jan 13 05:38:07 [24946]: --pkg_geoip_cv = 1.00DEBUG Jan 13 05:38:07 [24946]: --pkg_clientauth_version = 1.0.0019DEBUG Jan 13 05:38:07 [24946]: --pkg_clientauth_cv = 2.00DEBUG Jan 13 05:38:07 [24946]: --pkg_redfw_version = 3.0.003DEBUG Jan 13 05:38:07 [24946]: --pkg_redfw_cv = 2.00DEBUG Jan 13 05:38:07 [24946]: --oem = SophosDEBUG Jan 13 05:38:07 [24946]: --server = u2d.sophos.comDEBUG Jan 13 05:38:07 [24946]: --port = 443DEBUG Jan 13 05:38:07 [24946]: Added new server : Host - u2d.sophos.com, Port - 443DEBUG Jan 13 05:38:07 [24946]: Final query string is :?&serialkey=C4207AXPxxxxxxx&deviceid=36953340ad5bd8cf1xxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16463&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413141&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00DEBUG Jan 13 05:38:07 [24946]: Response code : 200DEBUG Jan 13 05:38:07 [24946]: Response body : <Up2Date> <Package u2dtype="pattern"> <File name="avira_4.00_1.0.413143_fdiff20.tar.gz.gpg"> <location>d30ncyzaneb4q0.cloudfront.net/.../location> <version>1.0.413143</version> <size>277868</size> <md5sum>560804a8b4aa1ebaa482869b3b08fcd6</md5sum> <module>avira</module> <cv>4.00</cv> <type>fdiff20</type> </File> <File name="savi_1.00_1.0.16464_immdiff.tar.gz.gpg"> <location>d30ncyzaneb4q0.cloudfront.net/.../location> <version>1.0.16464</version> <size>100862</size> <md5sum>aefee259037245797a418afabb5cce5d</md5sum> <module>savi</module> <cv>1.00</cv> <type>immdiff</type> </File> </Package></Up2Date>
Think I just have to live with the failed status in GUI, they sould disappear in time when new updates appear.
Only a GUI bug.