HCHTech
Well-Known Member
- Reaction score
- 4,153
- Location
- Pittsburgh, PA - USA
I am trying to diagnose a problem with remote access for the owner (of course) of one of my clients.
There is a Sonicwall (TZ500 - latest firmware) in the office, and we're using Sonicwall's NetExtender SSLVPN client. This office has about 35 employees and we have about 32 of them setup for remote access using this same setup. They connect the VPN tunnel with NetExtender, then RDP to their office desktops.
For the owner, there is an intermittent problem where NetExtender will report a successful connection, but RDP will fail to connect. Testing has proven that when the problem occurs, you cannot ping any device on the office network, so I believe that NetExtender is reporting a successful connection, but no traffic is actually being allowed through the tunnel, or there really isn't a successful connection despite the status indicator. If you stop to check whether you can ping the office network, and that is successful, then RDP will work every time. Typically, rebooting the remote machine will make things work, but obviously that is cumbersome.
I have been around the block with Sonicwall tech support about this issue for about a month now. Before the latest session with them this morning, I managed to successfully capture all of the packet traffic from the Boss's home computer to the Sonicwall during a connection failure event. In all, I captured about 60 seconds worth of traffic, which resulted in about 46,000 packets of information. Sonicwall searched through these captured packets and found about 40 RST TCP packets (I've copied one below with the identifying data redacted). Sonicwall then declared that the problem was with the boss's ISP (possibly injecting RST packets to thwart VPN connections, or maybe just not "VPN Friendly"). They suggested we test with a hotspot to see if the problem recurred, and declared the ticket resolved. Ugh.
I am seriously out of my depth, so I didn't have an intelligent response for them. It seems to me by looking at the packet below that the SOURCE is the office IP and the DESTINATION is the boss's home IP, so that looks to me like a problem with the OFFICE ISP, not the home ISP, but I could be misinterpreting things. No one else at the client has reported this problem, to that does lend credence to the Home ISP being on the suspect list.
Here is one of the packets:
Does this make sense to anyone?
There is a Sonicwall (TZ500 - latest firmware) in the office, and we're using Sonicwall's NetExtender SSLVPN client. This office has about 35 employees and we have about 32 of them setup for remote access using this same setup. They connect the VPN tunnel with NetExtender, then RDP to their office desktops.
For the owner, there is an intermittent problem where NetExtender will report a successful connection, but RDP will fail to connect. Testing has proven that when the problem occurs, you cannot ping any device on the office network, so I believe that NetExtender is reporting a successful connection, but no traffic is actually being allowed through the tunnel, or there really isn't a successful connection despite the status indicator. If you stop to check whether you can ping the office network, and that is successful, then RDP will work every time. Typically, rebooting the remote machine will make things work, but obviously that is cumbersome.
I have been around the block with Sonicwall tech support about this issue for about a month now. Before the latest session with them this morning, I managed to successfully capture all of the packet traffic from the Boss's home computer to the Sonicwall during a connection failure event. In all, I captured about 60 seconds worth of traffic, which resulted in about 46,000 packets of information. Sonicwall searched through these captured packets and found about 40 RST TCP packets (I've copied one below with the identifying data redacted). Sonicwall then declared that the problem was with the boss's ISP (possibly injecting RST packets to thwart VPN connections, or maybe just not "VPN Friendly"). They suggested we test with a hotspot to see if the problem recurred, and declared the ticket resolved. Ugh.
I am seriously out of my depth, so I didn't have an intelligent response for them. It seems to me by looking at the packet below that the SOURCE is the office IP and the DESTINATION is the boss's home IP, so that looks to me like a problem with the OFFICE ISP, not the home ISP, but I could be misinterpreting things. No one else at the client has reported this problem, to that does lend credence to the Home ISP being on the suspect list.
Here is one of the packets:
Code:
*Packet number: 207*
Header Values:
Bytes captured: 54, Actual Bytes on the wire: 54
Packet Info(Time:09/09/2020 12:09:35.192):
in:X1*(system-stack), out:X1, Generated (Sent Out), 1:3)
Ethernet Header
Ether Type: IP(0x800), Src=[MAC Addr Redacted], Dst=[00:11:22:33:44:55]
IP Packet Header
IP Type: TCP(0x6), Src=[Office IP Redacted], Dst=[Home IP Redacted]
TCP Packet Header
TCP Flags = [RST,], Src=[4433], Dst=[57822], Checksum=0x7e77
Application Header
Not Known
Value:[0]
Hex and ASCII dump of the packet:
00112233 445518b1 REDACTED 08004520 0028ac06 40004006 *.."3DU..i.....E .(..@.@.*
1d874b97 e6214841 f7281151 e1de61REDACTED000 00005004 REDACTED.(.Q..aD......P.*
00007e77 0000
Does this make sense to anyone?