Firebox Security Services or Default Packet Handling Denies Mobile VPN with SSL Traffic
Applies To: Cloud-managed Fireboxes, Locally-managed Fireboxes
When a user tries to connect to Mobile VPN with SSL, the Firebox evaluates the incoming traffic against security services, default packet handling settings, and firewall policies. If the Firebox denies the traffic before it is allowed by the WatchGuard SSLVPN policy, the connection attempt fails even though the traffic reaches the Firebox.
Symptoms
When the Firebox denies Mobile VPN with SSL traffic based on security services or default packet handling settings, you might notice these symptoms:
- VPN connection attempts fail immediately.
- Other users might or might not be affected, based on region, traffic rate, or policy settings.
- Firebox log messages show Deny entries for the public IP address of the client device.
- Firebox log messages show one or more of the following Deny reasons:
- geolocation
- blocked sites
- ddos client
- ddos server
- Deny log messages appear for unhandled packets. For example: 2022-09-29 09:41:30 Deny 192.0.2.99 203.0.113.250 9007/tcp 31069 9007 External1 Firebox Denied 52 51 (Unhandled External Packet-00) proc_id="firewall" rc="101" msg_id="3000-0148" tcp_info="offset 8 S 2192251295 win 65535"
- No log messages appear for the WatchGuard SSLVPN policy at the time of connection attempts.
- Deny log messages appear for a policy other than the WatchGuard SSLPVPN policy at the time of connection attempts.
Diagnostic Steps
- Reproduce the issue and filter the Firebox log messages by the public IP address of the client device.
- Review the Deny log messages and examine the Deny reasons.
- If the Deny reason is geolocation, identify the blocked region or IP address.
- If the Deny reason is blocked sites , review the Blocked Sites list and identify the block reason.
- If the Deny reason is ddos client or ddos server, review the Distributed Denial-of-Service (DDoS) thresholds in the Firebox default packet handling settings.
- If the Deny reason is Unhandled, determine if another policy captured the traffic.
- Review the WatchGuard SSLVPN policy configuration. Verify that:
- The policy is enabled.
- The policy is in an appropriate position in the policy list.
- The policy allows traffic from public IP address of the client device.
- The policy allows traffic to the primary and backup IP addresses or domains configured for Mobile VPN with SSL.
- In the Firebox default packet handling settings, review the DDoS Per Client Quota and Per Server Quota thresholds and determine whether the Mobile VPN with SSL traffic could exceed the configured thresholds.
- Determine whether affected users share a common:
- Geographic region
- ISP or carrier
- Connection pattern or frequency
Possible Causes and Solutions
| Possible Cause | Solution |
|---|---|
| Geolocation settings block the source country or region of the user. |
Add an exception for the public IP address of the client device or unblock the required region. For more information, go to: Configure Exceptions Locally-Managed: Configure Geolocation Exceptions Cloud-Managed: Add Exceptions on a Cloud-Managed Firebox Configure Geolocation Locally-Managed: Configure Geolocation Cloud-Managed: Add Geolocation Actions in WatchGuard Cloud |
| The public IP address of the client is on the Blocked Sites list. |
Review the Blocked Sites list and identify the block reason. For connection issues, the reason is usually a default packet handling setting, the Block Failed Logins feature, or the Intrusion Prevention Service (IPS). You can add an exception for the public IP address of the client or modify the settings that added the IP address to the blocked site. For more information, go to: Configure Exceptions Locally-Managed: Create Blocked Sites Exceptions Cloud-Managed: Add Exceptions on a Cloud-Managed Firebox Configure Default Packet Handling Settings Locally-Managed: About Default Packet Handling Options Cloud-Managed: Configure Default Packet Handling on a Cloud-Managed Firebox Configure Block Failed Logins Feature Locally-Managed: Set Global Firewall Authentication Values Cloud-Managed: Configure Block Failed Login Attempts |
| DDoS thresholds in the default packet handling settings cause the Firebox to deny Mobile VPN with SSL traffic. |
In the default packet handling settings, set the Per Server Quota and Per Client Quota thresholds to the default value of 100. If the thresholds are already configured with the default value, increase the value in increments of 100 until the Firebox allows Mobile VPN with SSL connections. If necessary, you can temporarily disable the DDoS settings while you test and then re-enable them with tuned values. For more information, go to: Locally-Managed: About Distributed Denial-of-Service Attacks Cloud-Managed: Configure Default Packet Handling on a Cloud-Managed Firebox |
|
The WatchGuard SSLVPN policy does not capture Mobile VPN with SSL traffic. |
Make sure the WatchGuard SSLVPN policy is enabled and configured correctly. For more information, go to Missing, Disabled, or Misconfigured WatchGuard SSLVPN Policy. Make sure that the WatchGuard SSLVPN policy is evaluated before more broad inbound policies. For more information, go to Mobile VPN with SSL Traffic Matches the Wrong Policy. |
About Mobile VPN with SSL Policies