vbpana.blogg.se

Sonicwall packet capture tool
Sonicwall packet capture tool





Why these changes were chosen, or why they worked we don't know.īut, we believe the ASA was much more sensitive to the communication problems we were seeing in the Wireshark capture, while laptop firewall was much more tolerant of the communication errors and the TCP state table remained intact. Why it stopped working in the first place we don't know. I think he said 1428, but to be honest that may not be the exact number.Īnd poof, the webpage at 4433 now came up! He added Google DNS server to the DNS server list, and he changed the MTU to something less than 1500. The SonicWall admin, configured the Sonicwall's router facing interface to static IP, previously it was set to DHCP. Webpage at 443 had no such communication errors. The admin of the Sonicwalls in question took three actions, once we proved via Wireshark captures, that errors were associated with the webpage found at port 4433. We are left wondering why the problem occurred, and what part of the solution actually fixed it. We have resolved the problem, it wasn't on our end (ASA). But the unsuccessful connection eventually has some spurious SSL packets ", Continuation Data" minus the quote marks in Info column. Packet capture comparisons show that the successful connection involved TLSv1.2 only. Yet, since connection to SonicWall works from elsewhere, it does appear that some other part of our ASA configuration is responsible for the inability to connect to the Sonicwall Netextender login page.

sonicwall packet capture tool

I believe our tests would indicate that the issue isn't ACL related since the special internet only VLAN produced the same result. The Sonicwall port for the Netextender is set to 4433, but SonicWall admin is willing to change if it needed. If we connect via any other means from the same work computer e.g, smartphone hotspot (different ISP, ASA no longer in equation), or from user's home the connection to the Sonicwall Netextender works without issue. This result is the same whether we have the user on our inside VLAN with ASA inside ACL in play, or we put them on a special test network on its own ASA interface with internet only access. Users get browser message "This site can't be reached" after it appears to timeout. We have verified that users behind our ASA 5525 are unable to reach a remote site's Sonicwall Netextender via our outside internet connection.







Sonicwall packet capture tool