This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

v18 u2d - Pattern update failing since upgrade from MR1 to MR4

XG has an SG as upstream firewall. No blocked traffic during pattern updates. Worked nice and smooth when on MR1.

u2d.log shows nothing that concerns me (except the error 500 as described here)

Patterns for the modules ATP, Auth Client, GeoIP, IPS and App Signatures are failing, others work.

DEBUG     Jan 09 14:58:58 [16237]: Response length : 11
DEBUG     Jan 09 15:01:01 [18822]: --serial = C4207AXxxxxxxxxx
DEBUG     Jan 09 15:01:01 [18822]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx
DEBUG     Jan 09 15:01:01 [18822]: --fwversion = 18.0.4.506
DEBUG     Jan 09 15:01:01 [18822]: --productcode = CN
DEBUG     Jan 09 15:01:01 [18822]: --model = XG430
DEBUG     Jan 09 15:01:01 [18822]: --vendor = WP02
DEBUG     Jan 09 15:01:01 [18822]: --pkg_ips_version = 18.17.76
DEBUG     Jan 09 15:01:01 [18822]: --pkg_ips_cv = 16.0
DEBUG     Jan 09 15:01:01 [18822]: --pkg_atp_version = 1.0.0336
DEBUG     Jan 09 15:01:01 [18822]: --pkg_atp_cv = 1.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_savi_version = 1.0.16453
DEBUG     Jan 09 15:01:01 [18822]: --pkg_savi_cv = 1.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_avira_version = 1.0.413046
DEBUG     Jan 09 15:01:01 [18822]: --pkg_avira_cv = 4.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_apfw_version = 11.0.014
DEBUG     Jan 09 15:01:01 [18822]: --pkg_apfw_cv = 1.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_sslvpn_version = 1.0.008
DEBUG     Jan 09 15:01:01 [18822]: --pkg_sslvpn_cv = 1.01
DEBUG     Jan 09 15:01:01 [18822]: --pkg_ipsec_version = 2.0.001
DEBUG     Jan 09 15:01:01 [18822]: --pkg_ipsec_cv = 1.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_geoip_version = 2.0.003
DEBUG     Jan 09 15:01:01 [18822]: --pkg_geoip_cv = 1.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_clientauth_version = 1.0.0019
DEBUG     Jan 09 15:01:01 [18822]: --pkg_clientauth_cv = 2.00
DEBUG     Jan 09 15:01:01 [18822]: --pkg_redfw_version = 3.0.003
DEBUG     Jan 09 15:01:01 [18822]: --pkg_redfw_cv = 2.00
DEBUG     Jan 09 15:01:01 [18822]: --oem = Sophos
DEBUG     Jan 09 15:01:01 [18822]: --server = u2d.sophos.com
DEBUG     Jan 09 15:01:01 [18822]: --port = 443
DEBUG     Jan 09 15:01:01 [18822]: Added new server : Host - u2d.sophos.com, Port - 443
DEBUG     Jan 09 15:01:01 [18822]: Final query string is :
?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
DEBUG     Jan 09 15:01:01 [18822]: Response code : 200
DEBUG     Jan 09 15:01:01 [18822]: Response body :
<Up2Date/>

DEBUG     Jan 09 15:01:01 [18822]: Response length : 11
DEBUG     Jan 09 15:01:04 [18900]: --serial = C4207AXxxxxxxxxx
DEBUG     Jan 09 15:01:04 [18900]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx
DEBUG     Jan 09 15:01:04 [18900]: --fwversion = 18.0.4.506
DEBUG     Jan 09 15:01:04 [18900]: --productcode = CN
DEBUG     Jan 09 15:01:04 [18900]: --model = XG430
DEBUG     Jan 09 15:01:04 [18900]: --vendor = WP02
DEBUG     Jan 09 15:01:04 [18900]: --pkg_sysupdate_version = 0
DEBUG     Jan 09 15:01:04 [18900]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443
DEBUG     Jan 09 15:01:04 [18900]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443
DEBUG     Jan 09 15:01:04 [18900]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443
DEBUG     Jan 09 15:01:04 [18900]: Final query string is :
?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=&pkg_sysupdate_version=0
DEBUG     Jan 09 15:01:05 [18900]: Response code : 500
DEBUG     Jan 09 15:01:05 [18900]: Response body :
<?xml version="1.0" encoding="iso-8859-1"?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
         "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml" xml:lang="en" lang="en">
 <head>
  <title>500 - Internal Server Error</title>
 </head>
 <body>
  <h1>500 - Internal Server Error</h1>
 </body>
</html>

DEBUG     Jan 09 15:01:05 [18900]: Response length : 369
ERROR     Jan 09 15:01:05 [18900]: Received invalid top level tag html, expecting Up2Date
ERROR     Jan 09 15:01:05 [18900]: FATAL : Error in parsing response, exiting.
DEBUG     Jan 09 15:04:39 [23158]: --serial = C4207AXxxxxxxxxx
DEBUG     Jan 09 15:04:39 [23158]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx
DEBUG     Jan 09 15:04:39 [23158]: --fwversion = 18.0.4.506
DEBUG     Jan 09 15:04:39 [23158]: --productcode = CN
DEBUG     Jan 09 15:04:39 [23158]: --model = XG430
DEBUG     Jan 09 15:04:39 [23158]: --vendor = WP02
DEBUG     Jan 09 15:04:39 [23158]: --pkg_sysupdate_version = 0
DEBUG     Jan 09 15:04:39 [23158]: --oem = Sophos
DEBUG     Jan 09 15:04:39 [23158]: --server = u2d.sophos.com
DEBUG     Jan 09 15:04:39 [23158]: --port = 443
DEBUG     Jan 09 15:04:39 [23158]: Added new server : Host - u2d.sophos.com, Port - 443
DEBUG     Jan 09 15:04:39 [23158]: Final query string is :
?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_sysupdate_version=0
DEBUG     Jan 09 15:04:42 [23158]: Response code : 200
DEBUG     Jan 09 15:04:42 [23158]: Response body :
<Up2Date/>

DEBUG     Jan 09 15:04:42 [23158]: Response length : 11
DEBUG     Jan 09 15:12:01 [30842]: --serial = C4207AXxxxxxxxxx
DEBUG     Jan 09 15:12:01 [30842]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx
DEBUG     Jan 09 15:12:01 [30842]: --fwversion = 18.0.4.506
DEBUG     Jan 09 15:12:01 [30842]: --productcode = CN
DEBUG     Jan 09 15:12:01 [30842]: --model = XG430
DEBUG     Jan 09 15:12:01 [30842]: --vendor = WP02
DEBUG     Jan 09 15:12:01 [30842]: --pkg_ips_version = 18.17.76
DEBUG     Jan 09 15:12:01 [30842]: --pkg_ips_cv = 16.0
DEBUG     Jan 09 15:12:01 [30842]: --pkg_atp_version = 1.0.0336
DEBUG     Jan 09 15:12:01 [30842]: --pkg_atp_cv = 1.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_savi_version = 1.0.16453
DEBUG     Jan 09 15:12:01 [30842]: --pkg_savi_cv = 1.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_avira_version = 1.0.413046
DEBUG     Jan 09 15:12:01 [30842]: --pkg_avira_cv = 4.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_apfw_version = 11.0.014
DEBUG     Jan 09 15:12:01 [30842]: --pkg_apfw_cv = 1.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_sslvpn_version = 1.0.008
DEBUG     Jan 09 15:12:01 [30842]: --pkg_sslvpn_cv = 1.01
DEBUG     Jan 09 15:12:01 [30842]: --pkg_ipsec_version = 2.0.001
DEBUG     Jan 09 15:12:01 [30842]: --pkg_ipsec_cv = 1.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_geoip_version = 2.0.003
DEBUG     Jan 09 15:12:01 [30842]: --pkg_geoip_cv = 1.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_clientauth_version = 1.0.0019
DEBUG     Jan 09 15:12:01 [30842]: --pkg_clientauth_cv = 2.00
DEBUG     Jan 09 15:12:01 [30842]: --pkg_redfw_version = 3.0.003
DEBUG     Jan 09 15:12:01 [30842]: --pkg_redfw_cv = 2.00
DEBUG     Jan 09 15:12:01 [30842]: --oem = Sophos
DEBUG     Jan 09 15:12:01 [30842]: --server = u2d.sophos.com
DEBUG     Jan 09 15:12:01 [30842]: --port = 443
DEBUG     Jan 09 15:12:01 [30842]: Added new server : Host - u2d.sophos.com, Port - 443
DEBUG     Jan 09 15:12:01 [30842]: Final query string is :
?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
DEBUG     Jan 09 15:12:01 [30842]: Response code : 200
DEBUG     Jan 09 15:12:01 [30842]: Response body :
<Up2Date/>

DEBUG     Jan 09 15:12:01 [30842]: Response length : 11
DEBUG     Jan 09 15:16:01 [2468]: --serial = C4207AXxxxxxxxxx
DEBUG     Jan 09 15:16:01 [2468]: --deviceid = xxxxxxxxxxxxxxxxxxxxxx
DEBUG     Jan 09 15:16:01 [2468]: --fwversion = 18.0.4.506
DEBUG     Jan 09 15:16:01 [2468]: --productcode = CN
DEBUG     Jan 09 15:16:01 [2468]: --model = XG430
DEBUG     Jan 09 15:16:01 [2468]: --vendor = WP02
DEBUG     Jan 09 15:16:01 [2468]: --pkg_ips_version = 18.17.76
DEBUG     Jan 09 15:16:01 [2468]: --pkg_ips_cv = 16.0
DEBUG     Jan 09 15:16:01 [2468]: --pkg_atp_version = 1.0.0336
DEBUG     Jan 09 15:16:01 [2468]: --pkg_atp_cv = 1.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_savi_version = 1.0.16453
DEBUG     Jan 09 15:16:01 [2468]: --pkg_savi_cv = 1.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_avira_version = 1.0.413046
DEBUG     Jan 09 15:16:01 [2468]: --pkg_avira_cv = 4.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_apfw_version = 11.0.014
DEBUG     Jan 09 15:16:01 [2468]: --pkg_apfw_cv = 1.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_sslvpn_version = 1.0.008
DEBUG     Jan 09 15:16:01 [2468]: --pkg_sslvpn_cv = 1.01
DEBUG     Jan 09 15:16:01 [2468]: --pkg_ipsec_version = 2.0.001
DEBUG     Jan 09 15:16:01 [2468]: --pkg_ipsec_cv = 1.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_geoip_version = 2.0.003
DEBUG     Jan 09 15:16:01 [2468]: --pkg_geoip_cv = 1.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_clientauth_version = 1.0.0019
DEBUG     Jan 09 15:16:01 [2468]: --pkg_clientauth_cv = 2.00
DEBUG     Jan 09 15:16:01 [2468]: --pkg_redfw_version = 3.0.003
DEBUG     Jan 09 15:16:01 [2468]: --pkg_redfw_cv = 2.00
DEBUG     Jan 09 15:16:01 [2468]: --oem = Sophos
DEBUG     Jan 09 15:16:01 [2468]: --server = u2d.sophos.com
DEBUG     Jan 09 15:16:01 [2468]: --port = 443
DEBUG     Jan 09 15:16:01 [2468]: Added new server : Host - u2d.sophos.com, Port - 443
DEBUG     Jan 09 15:16:01 [2468]: Final query string is :
?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
DEBUG     Jan 09 15:16:02 [2468]: Response code : 200
DEBUG     Jan 09 15:16:02 [2468]: Response body :
<Up2Date/>

DEBUG     Jan 09 15:16:02 [2468]: Response length : 11

any idea?



This thread was automatically locked due to age.
Parents
  • I guess, UTM is doing something. 

    Check this: 

    DEBUG Jan 09 15:12:01 [30842]: Final query string is :
    ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
    DEBUG Jan 09 15:12:01 [30842]: Response code : 200
    DEBUG Jan 09 15:12:01 [30842]: Response body :
    <Up2Date/>,

    The response body should be more then this. It looks like the request (This final query string) should give more then this.

    What you could do is: curl this request on UTM and on XG and check, if the results are the same. 

    Check the webfilter log on UTM, if you see any inspection or what so ever. 

    __________________________________________________________________________________________________________________

  • Hi Lucar Toni,

    I don't think Response Body has ever been different than that. And from the response code 200 I can see, that XG and Cloud Server talk to each other.

    Upstream UTM is not doing any Webfiltering, only packet filter.

    This is a copy of a old MR1 request - response body also empty.

    DEBUG     Dec 16 13:53:44 [5593]: --serial = C4207xxxxxx
    DEBUG     Dec 16 13:53:44 [5593]: --deviceid = 6d848b4deb5xxxxxxxxxxxxxxx
    DEBUG     Dec 16 13:53:44 [5593]: --fwversion = 18.0.1.396
    DEBUG     Dec 16 13:53:44 [5593]: --productcode = CN
    DEBUG     Dec 16 13:53:44 [5593]: --model = XG430
    DEBUG     Dec 16 13:53:44 [5593]: --vendor = WP02
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_ips_version = 18.17.71
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_ips_cv = 15.0
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_atp_version = 1.0.0333
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_atp_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_savi_version = 1.0.16369
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_savi_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_avira_version = 1.0.412546
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_avira_cv = 4.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_apfw_version = 11.0.012
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_apfw_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_sslvpn_version = 1.0.007
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_sslvpn_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_ipsec_version = 2.0.001
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_ipsec_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_geoip_version = 2.0.003
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_geoip_cv = 1.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_clientauth_version = 1.0.0019
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_clientauth_cv = 2.00
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_redfw_version = 3.0.002
    DEBUG     Dec 16 13:53:44 [5593]: --pkg_redfw_cv = 2.00
    DEBUG     Dec 16 13:53:44 [5593]: --oem = Sophos
    DEBUG     Dec 16 13:53:44 [5593]: --server = u2d.sophos.com
    DEBUG     Dec 16 13:53:44 [5593]: --port = 443
    DEBUG     Dec 16 13:53:44 [5593]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     Dec 16 13:53:44 [5593]: Final query string is :
    ?&serialkey=C4207xxxxxx&deviceid=6d848b4deb5xxxxxxxxxxxxxxx&fwversion=18.0.1.396&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.71&pkg_ips_cv=15.0&pkg_atp_version=1.0.0333&pkg_atp_cv=1.00&pkg_savi_version=1.0.16369&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.412546&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.002&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.007&pkg_sslvpn_cv=1.00&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
    DEBUG     Dec 16 13:53:45 [5593]: Response code : 200
    DEBUG     Dec 16 13:53:45 [5593]: Response body :
    <Up2Date>

  • There is a different. Do you see the / in your post? Its HTML. 

    To be more precise: 


    There is new content to download: 

    DEBUG Oct 10 12:33:09 [23313]: Response body :
    <Up2Date>
    <Package u2dtype="pattern">
    <File name="avira_4.00_1.0.411085_immdiff.tar.gz.gpg">
    <location>d30ncyzaneb4q0.cloudfront.net/.../location>
    <version>1.0.411085</version>
    <size>13802</size>
    <md5sum>98f0dce85279e99dc0159d4184226c34</md5sum>
    <module>avira</module>
    <cv>4.00</cv>
    <type>immdiff</type>
    </File>
    </Package>
    </Up2Date>

    There is not: 

    DEBUG Oct 10 10:33:01 [35281]: Response code : 200
    DEBUG Oct 10 10:33:01 [35281]: Response body :
    <Up2Date/>


    Basically your string seems to result in: There is no new up2date packages for you in place. 

    Using your String:
    ?&serialkey=C4207AXxxxxxxxxx&deviceid=xxxxxxxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.76&pkg_ips_cv=16.0&pkg_atp_version=1.0.0336&pkg_atp_cv=1.00&pkg_savi_version=1.0.16453&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413046&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00

    Failed does not mean, that there is no new content. It basically means, up2date could not download multiple times and skip.

    Find the line, where those errors occur. 

    __________________________________________________________________________________________________________________

  • I see and on XG not behind UTM I see the requests look like this:

    (seeing just an other issue there, not updating apfw)

    WARNING   Jan 13 15:10:23 [20184]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.
    ....
    ....
    DEBUG     Jan 13 17:41:03 [2008]: Response length : 409
    DEBUG     Jan 13 17:41:03 [2008]: Received name : apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 17:41:03 [2008]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 17:41:03 [2008]: Received version : 11.0.014
    DEBUG     Jan 13 17:41:03 [2008]: Received size : 73075324
    DEBUG     Jan 13 17:41:03 [2008]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f
    DEBUG     Jan 13 17:41:03 [2008]: Received module : apfw
    DEBUG     Jan 13 17:41:03 [2008]: Received cv : 1.00
    DEBUG     Jan 13 17:41:03 [2008]: Received type : full
    WARNING   Jan 13 17:41:03 [2008]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.
    DEBUG     Jan 13 17:56:06 [6725]: --serial = C1C0B9xxxxxx
    DEBUG     Jan 13 17:56:06 [6725]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx
    DEBUG     Jan 13 17:56:06 [6725]: --fwversion = 18.0.4.506
    DEBUG     Jan 13 17:56:06 [6725]: --productcode = CN
    DEBUG     Jan 13 17:56:06 [6725]: --model = XG106
    DEBUG     Jan 13 17:56:06 [6725]: --vendor = XN01
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_ips_version = 18.17.77
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_ips_cv = 16.0
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_atp_version = 1.0.0337
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_atp_cv = 1.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_savi_version = 1.0.16465
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_savi_cv = 1.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_avira_version = 1.0.413149
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_avira_cv = 4.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_apfw_version = 11.0.012
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_apfw_cv = 1.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_sslvpn_version = 1.0.008
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_sslvpn_cv = 1.01
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_ipsec_version = 2.0.001
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_ipsec_cv = 1.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_geoip_version = 2.0.003
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_geoip_cv = 1.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_clientauth_version = 1.0.0019
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_clientauth_cv = 2.00
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_redfw_version = 3.0.003
    DEBUG     Jan 13 17:56:06 [6725]: --pkg_redfw_cv = 2.00
    DEBUG     Jan 13 17:56:06 [6725]: --oem = Sophos
    DEBUG     Jan 13 17:56:06 [6725]: --server = u2d.sophos.com
    DEBUG     Jan 13 17:56:06 [6725]: --port = 443
    DEBUG     Jan 13 17:56:06 [6725]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     Jan 13 17:56:06 [6725]: Final query string is :
    ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16465&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413149&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
    DEBUG     Jan 13 17:56:07 [6725]: Response code : 200
    DEBUG     Jan 13 17:56:07 [6725]: Response body :
    <Up2Date>
      <Package u2dtype="pattern">
        <File name="apfw_1.00_11.0.014.tar.gz.gpg">
          <location>https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg</location>
          <version>11.0.014</version>
          <size>73075324</size>
          <md5sum>f731a3f00cdbebe94999a0ca0cd91e9f</md5sum>
          <module>apfw</module>
          <cv>1.00</cv>
          <type>full</type>
        </File>
      </Package>
    </Up2Date>
    
    DEBUG     Jan 13 17:56:07 [6725]: Response length : 409
    DEBUG     Jan 13 17:56:07 [6725]: Received name : apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 17:56:07 [6725]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 17:56:07 [6725]: Received version : 11.0.014
    DEBUG     Jan 13 17:56:07 [6725]: Received size : 73075324
    DEBUG     Jan 13 17:56:07 [6725]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f
    DEBUG     Jan 13 17:56:07 [6725]: Received module : apfw
    DEBUG     Jan 13 17:56:07 [6725]: Received cv : 1.00
    DEBUG     Jan 13 17:56:07 [6725]: Received type : full
    WARNING   Jan 13 17:56:07 [6725]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.
    DEBUG     Jan 13 18:00:17 [8013]: --serial = C1C0B9xxxxxx
    DEBUG     Jan 13 18:00:17 [8013]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx
    DEBUG     Jan 13 18:00:17 [8013]: --fwversion = 18.0.4.506
    DEBUG     Jan 13 18:00:17 [8013]: --productcode = CN
    DEBUG     Jan 13 18:00:17 [8013]: --model = XG106
    DEBUG     Jan 13 18:00:17 [8013]: --vendor = XN01
    DEBUG     Jan 13 18:00:17 [8013]: --pkg_sysupdate_version = 0
    DEBUG     Jan 13 18:00:17 [8013]: --oem = Sophos
    DEBUG     Jan 13 18:00:17 [8013]: --server = u2d.sophos.com
    DEBUG     Jan 13 18:00:17 [8013]: --port = 443
    DEBUG     Jan 13 18:00:17 [8013]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     Jan 13 18:00:17 [8013]: Final query string is :
    ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_sysupdate_version=0
    DEBUG     Jan 13 18:00:18 [8013]: Response code : 200
    DEBUG     Jan 13 18:00:18 [8013]: Response body :
    <Up2Date/>
    
    DEBUG     Jan 13 18:00:18 [8013]: Response length : 11
    DEBUG     Jan 13 18:01:05 [8342]: --serial = C1C0B9xxxxxx
    DEBUG     Jan 13 18:01:05 [8342]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx
    DEBUG     Jan 13 18:01:05 [8342]: --fwversion = 18.0.4.506
    DEBUG     Jan 13 18:01:05 [8342]: --productcode = CN
    DEBUG     Jan 13 18:01:05 [8342]: --model = XG106
    DEBUG     Jan 13 18:01:05 [8342]: --vendor = XN01
    DEBUG     Jan 13 18:01:05 [8342]: --pkg_sysupdate_version = 0
    DEBUG     Jan 13 18:01:05 [8342]: Added new server : Host - us-west-2.u2d.sophos.com., Port - 443
    DEBUG     Jan 13 18:01:05 [8342]: Added new server : Host - ap-northeast-1.u2d.sophos.com., Port - 443
    DEBUG     Jan 13 18:01:05 [8342]: Added new server : Host - eu-west-1.u2d.sophos.com., Port - 443
    DEBUG     Jan 13 18:01:05 [8342]: Final query string is :
    ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=&pkg_sysupdate_version=0
    DEBUG     Jan 13 18:01:09 [8342]: Response code : 503
    DEBUG     Jan 13 18:01:09 [8342]: Response body :
    
    DEBUG     Jan 13 18:01:09 [8342]: Response length : 0
    ERROR     Jan 13 18:01:09 [8342]: Response not parsed successfully.
    ERROR     Jan 13 18:01:09 [8342]: FATAL : Error in parsing response, exiting.
    DEBUG     Jan 13 18:11:10 [11574]: --serial = C1C0B9xxxxxx
    DEBUG     Jan 13 18:11:10 [11574]: --deviceid = a9a61df52aacc8axxxxxxxxxxxxx
    DEBUG     Jan 13 18:11:10 [11574]: --fwversion = 18.0.4.506
    DEBUG     Jan 13 18:11:10 [11574]: --productcode = CN
    DEBUG     Jan 13 18:11:10 [11574]: --model = XG106
    DEBUG     Jan 13 18:11:10 [11574]: --vendor = XN01
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_ips_version = 18.17.77
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_ips_cv = 16.0
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_atp_version = 1.0.0337
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_atp_cv = 1.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_savi_version = 1.0.16465
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_savi_cv = 1.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_avira_version = 1.0.413149
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_avira_cv = 4.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_apfw_version = 11.0.012
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_apfw_cv = 1.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_sslvpn_version = 1.0.008
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_sslvpn_cv = 1.01
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_ipsec_version = 2.0.001
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_ipsec_cv = 1.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_geoip_version = 2.0.003
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_geoip_cv = 1.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_clientauth_version = 1.0.0019
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_clientauth_cv = 2.00
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_redfw_version = 3.0.003
    DEBUG     Jan 13 18:11:10 [11574]: --pkg_redfw_cv = 2.00
    DEBUG     Jan 13 18:11:10 [11574]: --oem = Sophos
    DEBUG     Jan 13 18:11:10 [11574]: --server = u2d.sophos.com
    DEBUG     Jan 13 18:11:10 [11574]: --port = 443
    DEBUG     Jan 13 18:11:10 [11574]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     Jan 13 18:11:10 [11574]: Final query string is :
    ?&serialkey=C1C0B9xxxxxx&deviceid=a9a61df52aacc8axxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG106&appvendor=XN01&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16465&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413149&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.012&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
    DEBUG     Jan 13 18:11:11 [11574]: Response code : 200
    DEBUG     Jan 13 18:11:11 [11574]: Response body :
    <Up2Date>
      <Package u2dtype="pattern">
        <File name="apfw_1.00_11.0.014.tar.gz.gpg">
          <location>https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg</location>
          <version>11.0.014</version>
          <size>73075324</size>
          <md5sum>f731a3f00cdbebe94999a0ca0cd91e9f</md5sum>
          <module>apfw</module>
          <cv>1.00</cv>
          <type>full</type>
        </File>
      </Package>
    </Up2Date>
    
    DEBUG     Jan 13 18:11:11 [11574]: Response length : 409
    DEBUG     Jan 13 18:11:11 [11574]: Received name : apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 18:11:11 [11574]: Received location : https://d30ncyzaneb4q0.cloudfront.net/apfw_1.00_11.0.014.tar.gz.gpg
    DEBUG     Jan 13 18:11:11 [11574]: Received version : 11.0.014
    DEBUG     Jan 13 18:11:11 [11574]: Received size : 73075324
    DEBUG     Jan 13 18:11:11 [11574]: Received md5sum : f731a3f00cdbebe94999a0ca0cd91e9f
    DEBUG     Jan 13 18:11:11 [11574]: Received module : apfw
    DEBUG     Jan 13 18:11:11 [11574]: Received cv : 1.00
    DEBUG     Jan 13 18:11:11 [11574]: Received type : full
    WARNING   Jan 13 18:11:11 [11574]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.
    XG106_XN01_SFOS 18.0.4 MR-4#
    XG106_XN01_SFOS 18.0.4 MR-4#
    

  • updated my response above. 


    Assuming this is not an actually issue. Because all your versions are up2date.

    The Error state simply indicated the latest try. And this was "Not successful" for those packages. Now those packets are up2date and the server tells you "You are up2date". 

    Thats the reason, the new status of IPS moved to Successful, after we released a new IPS pattern. 

    __________________________________________________________________________________________________________________

  • BTW: Where do you see a issue right now in this example? It gives you the option to update to 11.0.014. Assuming V11.0.015 will be offered after this. 

    __________________________________________________________________________________________________________________

  • This looks confusing:

    WARNING   Jan 13 17:56:07 [6725]: A new update is available for apfw but we are ignoring it as download for a previous update is in progress.

    is it still downloading (download for a previous update is in progress - for several days now?). Think not, it already has downloaded and is waiting for install.

    Is it downloading the 70MB AP firmware every u2d cycle?

  • This is from the machine from the initial post here:

    So I can see, it does download something, and log this, but only when new files appear.

    DEBUG     Jan 13 05:36:54 [23705]: Response length : 11
    DEBUG     Jan 13 05:38:07 [24946]: --serial = C4207AXPxxxxxxx
    DEBUG     Jan 13 05:38:07 [24946]: --deviceid = 36953340ad5bd8cf1xxxxxxxxxxxxxxxx
    DEBUG     Jan 13 05:38:07 [24946]: --fwversion = 18.0.4.506
    DEBUG     Jan 13 05:38:07 [24946]: --productcode = CN
    DEBUG     Jan 13 05:38:07 [24946]: --model = XG430
    DEBUG     Jan 13 05:38:07 [24946]: --vendor = WP02
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_ips_version = 18.17.77
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_ips_cv = 16.0
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_atp_version = 1.0.0337
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_atp_cv = 1.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_savi_version = 1.0.16463
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_savi_cv = 1.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_avira_version = 1.0.413141
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_avira_cv = 4.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_apfw_version = 11.0.014
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_apfw_cv = 1.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_sslvpn_version = 1.0.008
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_sslvpn_cv = 1.01
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_ipsec_version = 2.0.001
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_ipsec_cv = 1.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_geoip_version = 2.0.003
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_geoip_cv = 1.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_clientauth_version = 1.0.0019
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_clientauth_cv = 2.00
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_redfw_version = 3.0.003
    DEBUG     Jan 13 05:38:07 [24946]: --pkg_redfw_cv = 2.00
    DEBUG     Jan 13 05:38:07 [24946]: --oem = Sophos
    DEBUG     Jan 13 05:38:07 [24946]: --server = u2d.sophos.com
    DEBUG     Jan 13 05:38:07 [24946]: --port = 443
    DEBUG     Jan 13 05:38:07 [24946]: Added new server : Host - u2d.sophos.com, Port - 443
    DEBUG     Jan 13 05:38:07 [24946]: Final query string is :
    ?&serialkey=C4207AXPxxxxxxx&deviceid=36953340ad5bd8cf1xxxxxxxxxxxxxxxx&fwversion=18.0.4.506&productcode=CN&appmodel=XG430&appvendor=WP02&useragent=SF&oem=Sophos&pkg_ips_version=18.17.77&pkg_ips_cv=16.0&pkg_atp_version=1.0.0337&pkg_atp_cv=1.00&pkg_savi_version=1.0.16463&pkg_savi_patch=2&pkg_savi_cv=1.00&pkg_avira_version=1.0.413141&pkg_avira_patch=2&pkg_avira_cv=4.00&pkg_geoip_version=2.0.003&pkg_geoip_cv=1.00&pkg_clientauth_version=1.0.0019&pkg_clientauth_cv=2.00&pkg_apfw_version=11.0.014&pkg_apfw_cv=1.00&pkg_redfw_version=3.0.003&pkg_redfw_cv=2.00&pkg_sslvpn_version=1.0.008&pkg_sslvpn_cv=1.01&pkg_ipsec_version=2.0.001&pkg_ipsec_cv=1.00
    DEBUG     Jan 13 05:38:07 [24946]: Response code : 200
    DEBUG     Jan 13 05:38:07 [24946]: Response body :
    <Up2Date>
      <Package u2dtype="pattern">
        <File name="avira_4.00_1.0.413143_fdiff20.tar.gz.gpg">
          <location>d30ncyzaneb4q0.cloudfront.net/.../location>
          <version>1.0.413143</version>
          <size>277868</size>
          <md5sum>560804a8b4aa1ebaa482869b3b08fcd6</md5sum>
          <module>avira</module>
          <cv>4.00</cv>
          <type>fdiff20</type>
        </File>
        <File name="savi_1.00_1.0.16464_immdiff.tar.gz.gpg">
          <location>d30ncyzaneb4q0.cloudfront.net/.../location>
          <version>1.0.16464</version>
          <size>100862</size>
          <md5sum>aefee259037245797a418afabb5cce5d</md5sum>
          <module>savi</module>
          <cv>1.00</cv>
          <type>immdiff</type>
        </File>
      </Package>
    </Up2Date>

    Think I just have to live with the failed status in GUI, they sould disappear in time when new updates appear.

    Only a GUI bug.

  • No thats the reason we are not downloading it all the time. The up2date process stores it one time until you are ready to install it. (Firmware update).

    Actually there is a way to reset this status, but i am not able to recall, how to do so.

    Maybe can help? How to reset the current status of Up2Date to trigger a new Firmware update. 

    __________________________________________________________________________________________________________________

Reply
  • No thats the reason we are not downloading it all the time. The up2date process stores it one time until you are ready to install it. (Firmware update).

    Actually there is a way to reset this status, but i am not able to recall, how to do so.

    Maybe can help? How to reset the current status of Up2Date to trigger a new Firmware update. 

    __________________________________________________________________________________________________________________

Children
No Data