Solved

SonicWall Network Access entries in Logs

Posted on 2015-01-04
2
223 Views
Last Modified: 2015-01-04
I recently upgraded our router to a SonicWall TZ215W

Our main network is on the 192.168.1.0/24 network and there are 8 site to site VPN tunnels enabled with one of them on the 192.168.3.0/24 network.

All of the tunnels are setup and seem to work great.

When I look at the logs, I am repeatedly getting the following entries:

01/04/2015 10:50:32.896      Notice      Network Access      TCP connection dropped      192.168.1.151, 56917, X0      192.168.3.106, 9100, X1      TCP Port: 9100

01/04/2015 10:50:12.736      Notice      Network Access      UDP packet dropped      192.168.1.113, 63325, X0      192.168.3.200, 161, X1      UDP SNMP

01/04/2015 10:37:52.672      Notice      Network Access      UDP packet dropped      192.168.1.151, 64802, X0      192.168.3.106, 161, X1      UDP SNMP
             
3      01/04/2015 10:37:36.496      Notice      Network Access      TCP connection dropped      192.168.1.117, 56738, X0      192.168.3.200, 9100, X1      TCP Port: 9100



The source IP's (192.168.1.151, 192.168.1.117, 192.168.1.113) are valid PCs on the main network, but the destination IPs are not on the remote network.

1.151 is always trying to access 3.106
1.117 is always trying to access 3.200
1.113 is always trying to access 3.200
0
Comment
Question by:pmitllc
  • 2
2 Comments
 
LVL 6

Author Comment

by:pmitllc
ID: 40530315
I ran wireshark on the 1.151 system and see this entry for the above destination:

192.168.1.151      192.168.3.106      TCP      62      [TCP Spurious Retransmission] 57380→9100 [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1
0
 
LVL 6

Accepted Solution

by:
pmitllc earned 0 total points
ID: 40530668
Apparently a lot of these systems still had old printers locally installed that were pointing to these destinations.  

Once they were removed, the notices went away.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Suggested Solutions

Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

706 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now