Watchguard mobile SSL VPN not connecting - XTM 25 Series

Mitul Prajapati
Mitul Prajapati used Ask the Experts™
on
Hi All,

I am using XTM 25/26 Watchguard firewall in the company and many of the remote users are connected through Mobile SSL VPN. Everything was working fine with no issues and last after internet connectivity break down and restoration no one can able to login using Mobile SSL VPN.

I have checked everything but couldn't understand the issue. Can anyone help me with this?

Few points :

1.  Firewall OS is not upgraded
2.  No new rules is created
3. Reinstall SSL Client software, Create new user with new password. Can login to Webpage of SSL  (https://Firewall IP/sslvpn.html) and able to download fresh software. De-activate and Re-activate Mobile SSL VPN.
4. Internal Network 192.168.1.0/24, Virtual address pool 192.168.111.0/24

Here is the diagnosis report.

2019-01-23 10:43:32 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:32 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:35 sslvpn Entered in sslvpn_takeaddr
2019-01-23 10:43:35 sslvpn Arguments which needs to be sent:openvpn_add 0 1548200615 0
2019-01-23 10:43:35 sslvpn Going to open wgipc:
2019-01-23 10:43:35 sslvpn assign ip address, rip=c0a86f02, lip=0, common_name=0
2019-01-23 10:43:35 sslvpn Sending Data by wgipc to sslvpn_takeaddr is Success,Buffer:192.168.111.2:0.0.0.0:0
2019-01-23 10:43:35 sslvpn Success,Sending Data to sslvpn_firecluster:openvpn_add 0 1548200615 0
2019-01-23 10:43:35 sslvpn Result received on ipc socket:192.168.111.2:0.0.0.0:0
2019-01-23 10:43:37 sslvpn sslvpn_event, add entry, entry->virtual_ip=192.168.111.2, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:37 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 192.168.111.2. Real IP address is 192.168.1.88.
2019-01-23 10:43:37 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:37 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:37 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:37 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:38 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:38 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:40 sslvpn Entered in sslvpn_takeaddr
2019-01-23 10:43:40 sslvpn Arguments which needs to be sent:openvpn_del -1 0 1548200620
2019-01-23 10:43:40 sslvpn Going to open wgipc:
2019-01-23 10:43:40 sslvpn Success,Sending Data to sslvpn_firecluster:openvpn_del -1 0 1548200620
2019-01-23 10:43:44 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:44 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:44 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:44 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:47 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:47 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:48 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:48 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:51 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:51 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:51 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:51 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:52 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:52 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:53 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:53 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:54 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:54 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:58 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:58 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:58 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:58 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:43:58 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:43:58 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:02 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:02 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:05 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:05 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:05 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:05 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:06 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:06 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:08 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:08 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:09 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:09 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:13 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:13 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:15 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:15 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:16 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:16 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:19 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:19 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:19 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:19 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:20 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:20 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:21 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:21 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:23 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:23 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:26 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:26 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:26 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:26 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:27 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:27 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:28 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:28 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:30 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:30 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:33 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:33 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:33 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:33 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:33 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:33 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:34 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:34 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:36 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:36 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:37 sslvpn sslvpn_event, add entry, entry->virtual_ip=0.0.0.0, entry->real_ip=192.168.1.88, dropin_mode=0
2019-01-23 10:44:37 sslvpn Mobile VPN with SSL user Mitul logged in. Virtual IP address is 0.0.0.0. Real IP address is 192.168.1.88.
2019-01-23 10:44:38 sslvpn Entered in sslvpn_takeaddr
2019-01-23 10:44:38 sslvpn Arguments which needs to be sent:openvpn_del 0 0 1548200678
2019-01-23 10:44:38 sslvpn Going to open wgipc:
2019-01-23 10:44:38 sslvpn Success,Sending Data to sslvpn_firecluster:openvpn_del 0 0 1548200678
2019-01-23 10:44:40 sslvpn sslvpn_delete_user_session, delete entry, entry->virtual_ip=192.168.111.2, dropin_mode=0
2019-01-23 10:44:40 sslvpn Mobile VPN with SSL user Mitul logged off. Virtual IP address is 192.168.111.2.
2019-01-23 10:44:40 sslvpn Receiving SIGCHLD from pid:9322, openvpn pid=7933, sslvpn_firecluster pid=1855
2019-01-23 10:44:46 sslvpn Entered in sslvpn_takeaddr
2019-01-23 10:44:46 sslvpn Arguments which needs to be sent:openvpn_del -1 0 1548200686
2019-01-23 10:44:46 sslvpn Going to open wgipc:
2019-01-23 10:44:46 sslvpn Success,Sending Data to sslvpn_firecluster:openvpn_del -1 0 1548200686

Here is the LOG File;

2019-01-21T16:22:17.305 Requesting client configuration from 58.96.101.42:443
2019-01-21T16:22:22.822 VERSION file is 5.31, client version is 5.31
2019-01-21T16:22:23.845 OVPN:>HOLD:Waiting for hold release
2019-01-21T16:22:23.923 OVPN:>LOG:1548048143,D,MANAGEMENT: CMD ''
2019-01-21T16:22:23.939 OVPN:>LOG:1548048143,D,MANAGEMENT: CMD 'hold release'
2019-01-21T16:22:23.955 OVPN:SUCCESS: hold release succeeded
2019-01-21T16:22:23.955 OVPN:>PASSWORD:Need 'Auth' username/password
2019-01-21T16:22:24.033 OVPN:>LOG:1548048143,D,MANAGEMENT: CMD 'username "Auth" "Mitul"'
2019-01-21T16:22:24.033 OVPN:SUCCESS: 'Auth' username entered, but not yet verified
2019-01-21T16:22:24.033 OVPN:>LOG:1548048143,D,MANAGEMENT: CMD 'password [...]'
2019-01-21T16:22:24.033 OVPN:SUCCESS: 'Auth' password entered, but not yet verified
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Control Channel MTU parms [ L:1571 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Socket Buffers: R=[65536->65536] S=[65536->65536]
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Data Channel MTU parms [ L:1571 D:1450 EF:71 EB:12 ET:0 EL:3 ]
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Local Options String: 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'

2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Expected Remote Options String: 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'

2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Local Options hash (VER=V4): '68e0a8e4'
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,Expected Remote Options hash (VER=V4): '070d3472'
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,I,Attempting to establish TCP connection with [AF_INET]58.96.101.42:443 [nonblock]
2019-01-21T16:22:24.111 OVPN:>LOG:1548048144,,MANAGEMENT: >STATE:1548048144,TCP_CONNECT,,,
2019-01-21T16:22:24.111 OVPN:>STATE:1548048144,TCP_CONNECT,,,
2019-01-21T16:22:25.142 OVPN:>LOG:1548048145,I,TCP connection established with [AF_INET]58.96.101.42:443
2019-01-21T16:22:25.142 OVPN:>LOG:1548048145,I,TCPv4_CLIENT link local: [undef]
2019-01-21T16:22:25.158 OVPN:>LOG:1548048145,I,TCPv4_CLIENT link remote: [AF_INET]58.96.101.42:443
2019-01-21T16:22:25.173 OVPN:>LOG:1548048145,,MANAGEMENT: >STATE:1548048145,WAIT,,,
2019-01-21T16:22:25.251 OVPN:>STATE:1548048145,WAIT,,,
2019-01-21T16:22:25.486 OVPN:>LOG:1548048145,,MANAGEMENT: >STATE:1548048145,AUTH,,,
2019-01-21T16:22:25.486 OVPN:>STATE:1548048145,AUTH,,,
2019-01-21T16:22:25.486 OVPN:>LOG:1548048145,,TLS: Initial packet from [AF_INET]58.96.101.42:443, sid=0fbc4d68 7310da5f
2019-01-21T16:22:25.486 OVPN:>LOG:1548048145,W,WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this


2019-01-21T16:22:25.564 OVPN:>LOG:1548048145,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:25.564 OVPN:>LOG:1548048145,,Validating certificate extended key usage
2019-01-21T16:22:25.564 OVPN:>LOG:1548048145,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:25.579 OVPN:>LOG:1548048145,,VERIFY EKU OK
2019-01-21T16:22:25.579 OVPN:>LOG:1548048145,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:25.579 OVPN:>LOG:1548048145,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:25.829 OVPN:>LOG:1548048145,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:25.829 OVPN:>LOG:1548048145,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:25.829 OVPN:>LOG:1548048145,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:25.829 OVPN:>LOG:1548048145,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:25.845 OVPN:>LOG:1548048145,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:25.845 OVPN:>LOG:1548048145,I,[Fireware_SSLVPN_Server] Peer Connection Initiated with [AF_INET]58.96.101.42:443
2019-01-21T16:22:26.473 OVPN:>LOG:1548048146,,MANAGEMENT: >STATE:1548048146,GET_CONFIG,,,
2019-01-21T16:22:26.488 OVPN:>STATE:1548048146,GET_CONFIG,,,


2019-01-21T16:22:26.645 OVPN:>LOG:1548048146,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:26.660 OVPN:>LOG:1548048146,,Validating certificate extended key usage
2019-01-21T16:22:26.660 OVPN:>LOG:1548048146,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:26.660 OVPN:>LOG:1548048146,,VERIFY EKU OK
2019-01-21T16:22:26.660 OVPN:>LOG:1548048146,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:26.660 OVPN:>LOG:1548048146,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:26.910 OVPN:>LOG:1548048146,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:26.926 OVPN:>LOG:1548048146,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:26.941 OVPN:>LOG:1548048146,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:26.957 OVPN:>LOG:1548048146,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:26.957 OVPN:>LOG:1548048146,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:28.129 OVPN:>LOG:1548048148,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:28.129 OVPN:>LOG:1548048148,,TLS: soft reset sec=599999938 bytes=0/-1 pkts=0/0



2019-01-21T16:22:28.285 OVPN:>LOG:1548048148,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:28.301 OVPN:>LOG:1548048148,,Validating certificate extended key usage
2019-01-21T16:22:28.301 OVPN:>LOG:1548048148,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:28.301 OVPN:>LOG:1548048148,,VERIFY EKU OK
2019-01-21T16:22:28.301 OVPN:>LOG:1548048148,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:28.301 OVPN:>LOG:1548048148,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:28.459 OVPN:>LOG:1548048148,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:28.461 OVPN:>LOG:1548048148,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:28.461 OVPN:>LOG:1548048148,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:28.461 OVPN:>LOG:1548048148,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:28.461 OVPN:>LOG:1548048148,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:33.751 OVPN:>LOG:1548048153,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:33.751 OVPN:>LOG:1548048153,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0


2019-01-21T16:22:33.845 OVPN:>LOG:1548048153,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:33.845 OVPN:>LOG:1548048153,,Validating certificate extended key usage
2019-01-21T16:22:33.845 OVPN:>LOG:1548048153,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:33.845 OVPN:>LOG:1548048153,,VERIFY EKU OK
2019-01-21T16:22:33.845 OVPN:>LOG:1548048153,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:33.860 OVPN:>LOG:1548048153,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:34.095 OVPN:>LOG:1548048154,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:34.095 OVPN:>LOG:1548048154,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:34.095 OVPN:>LOG:1548048154,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:34.095 OVPN:>LOG:1548048154,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:34.095 OVPN:>LOG:1548048154,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:38.381 OVPN:>LOG:1548048158,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:38.381 OVPN:>LOG:1548048158,,TLS: soft reset sec=599999936 bytes=0/-1 pkts=0/0



2019-01-21T16:22:38.461 OVPN:>LOG:1548048158,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:38.464 OVPN:>LOG:1548048158,,Validating certificate extended key usage
2019-01-21T16:22:38.469 OVPN:>LOG:1548048158,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:38.470 OVPN:>LOG:1548048158,,VERIFY EKU OK
2019-01-21T16:22:38.470 OVPN:>LOG:1548048158,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:38.470 OVPN:>LOG:1548048158,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:38.626 OVPN:>LOG:1548048158,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:38.626 OVPN:>LOG:1548048158,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:38.626 OVPN:>LOG:1548048158,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:38.626 OVPN:>LOG:1548048158,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:38.626 OVPN:>LOG:1548048158,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:43.802 OVPN:>LOG:1548048163,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:43.802 OVPN:>LOG:1548048163,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0



2019-01-21T16:22:43.880 OVPN:>LOG:1548048163,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:43.880 OVPN:>LOG:1548048163,,Validating certificate extended key usage
2019-01-21T16:22:43.880 OVPN:>LOG:1548048163,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:43.880 OVPN:>LOG:1548048163,,VERIFY EKU OK
2019-01-21T16:22:43.895 OVPN:>LOG:1548048163,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:43.895 OVPN:>LOG:1548048163,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:44.130 OVPN:>LOG:1548048164,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:44.130 OVPN:>LOG:1548048164,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:44.130 OVPN:>LOG:1548048164,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:44.130 OVPN:>LOG:1548048164,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:44.130 OVPN:>LOG:1548048164,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:48.292 OVPN:>LOG:1548048168,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:48.292 OVPN:>LOG:1548048168,,TLS: soft reset sec=599999936 bytes=0/-1 pkts=0/0



2019-01-21T16:22:48.370 OVPN:>LOG:1548048168,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:48.370 OVPN:>LOG:1548048168,,Validating certificate extended key usage
2019-01-21T16:22:48.370 OVPN:>LOG:1548048168,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:48.370 OVPN:>LOG:1548048168,,VERIFY EKU OK
2019-01-21T16:22:48.386 OVPN:>LOG:1548048168,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:48.386 OVPN:>LOG:1548048168,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:48.543 OVPN:>LOG:1548048168,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:48.543 OVPN:>LOG:1548048168,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:48.543 OVPN:>LOG:1548048168,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:48.543 OVPN:>LOG:1548048168,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:48.543 OVPN:>LOG:1548048168,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:22:53.643 OVPN:>LOG:1548048173,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:53.643 OVPN:>LOG:1548048173,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0



2019-01-21T16:22:53.736 OVPN:>LOG:1548048173,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:53.736 OVPN:>LOG:1548048173,,Validating certificate extended key usage
2019-01-21T16:22:53.752 OVPN:>LOG:1548048173,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:53.752 OVPN:>LOG:1548048173,,VERIFY EKU OK
2019-01-21T16:22:53.752 OVPN:>LOG:1548048173,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:53.752 OVPN:>LOG:1548048173,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:53.846 OVPN:>LOG:1548048173,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:53.846 OVPN:>LOG:1548048173,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:53.846 OVPN:>LOG:1548048173,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:53.846 OVPN:>LOG:1548048173,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:53.846 OVPN:>LOG:1548048173,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA

2019-01-21T16:22:55.023 OVPN:>LOG:1548048174,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:55.023 OVPN:>LOG:1548048174,,Validating certificate extended key usage
2019-01-21T16:22:55.039 OVPN:>LOG:1548048174,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:55.054 OVPN:>LOG:1548048174,,VERIFY EKU OK
2019-01-21T16:22:55.070 OVPN:>LOG:1548048174,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:55.070 OVPN:>LOG:1548048174,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:55.148 OVPN:>LOG:1548048175,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:55.148 OVPN:>LOG:1548048175,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:55.148 OVPN:>LOG:1548048175,,NOTE: --mute triggered...
2019-01-21T16:22:58.273 OVPN:>LOG:1548048178,,3 variation(s) on previous 20 message(s) suppressed by --mute
2019-01-21T16:22:58.273 OVPN:>LOG:1548048178,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:22:58.273 OVPN:>LOG:1548048178,,TLS: soft reset sec=599999937 bytes=0/-1 pkts=0/0



2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,Validating certificate extended key usage
2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,VERIFY EKU OK
2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:58.429 OVPN:>LOG:1548048178,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:22:58.592 OVPN:>LOG:1548048178,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:58.592 OVPN:>LOG:1548048178,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:58.592 OVPN:>LOG:1548048178,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:22:58.592 OVPN:>LOG:1548048178,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:22:58.592 OVPN:>LOG:1548048178,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:03.739 OVPN:>LOG:1548048183,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:23:03.739 OVPN:>LOG:1548048183,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0


2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,Validating certificate extended key usage
2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,VERIFY EKU OK
2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:03.817 OVPN:>LOG:1548048183,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:03.989 OVPN:>LOG:1548048183,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:03.989 OVPN:>LOG:1548048183,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:03.989 OVPN:>LOG:1548048183,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:03.989 OVPN:>LOG:1548048183,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:03.989 OVPN:>LOG:1548048183,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:09.149 OVPN:>LOG:1548048189,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:23:09.149 OVPN:>LOG:1548048189,,TLS: soft reset sec=599999934 bytes=0/-1 pkts=0/0



2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,Validating certificate extended key usage
2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,VERIFY EKU OK
2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:09.243 OVPN:>LOG:1548048189,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:09.399 OVPN:>LOG:1548048189,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:09.399 OVPN:>LOG:1548048189,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:09.399 OVPN:>LOG:1548048189,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:09.399 OVPN:>LOG:1548048189,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:09.399 OVPN:>LOG:1548048189,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:14.642 OVPN:>LOG:1548048194,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:23:14.658 OVPN:>LOG:1548048194,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0


2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,Validating certificate extended key usage
2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,VERIFY EKU OK
2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:14.814 OVPN:>LOG:1548048194,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:14.908 OVPN:>LOG:1548048194,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:14.908 OVPN:>LOG:1548048194,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:14.908 OVPN:>LOG:1548048194,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:14.908 OVPN:>LOG:1548048194,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:14.908 OVPN:>LOG:1548048194,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:20.163 OVPN:>LOG:1548048200,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:23:20.163 OVPN:>LOG:1548048200,,TLS: soft reset sec=599999934 bytes=0/-1 pkts=0/0



2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,Validating certificate extended key usage
2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,VERIFY EKU OK
2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:20.257 OVPN:>LOG:1548048200,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:20.428 OVPN:>LOG:1548048200,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:20.428 OVPN:>LOG:1548048200,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:20.428 OVPN:>LOG:1548048200,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:20.428 OVPN:>LOG:1548048200,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:20.428 OVPN:>LOG:1548048200,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:25.577 OVPN:>LOG:1548048205,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
2019-01-21T16:23:25.577 OVPN:>LOG:1548048205,,TLS: soft reset sec=599999935 bytes=0/-1 pkts=0/0



2019-01-21T16:23:25.671 OVPN:>LOG:1548048205,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:25.687 OVPN:>LOG:1548048205,,Validating certificate extended key usage
2019-01-21T16:23:25.749 OVPN:>LOG:1548048205,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:25.749 OVPN:>LOG:1548048205,,VERIFY EKU OK
2019-01-21T16:23:25.749 OVPN:>LOG:1548048205,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:25.749 OVPN:>LOG:1548048205,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:25.843 OVPN:>LOG:1548048205,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:25.843 OVPN:>LOG:1548048205,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:25.843 OVPN:>LOG:1548048205,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:25.843 OVPN:>LOG:1548048205,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:25.843 OVPN:>LOG:1548048205,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:30.930 OVPN:>LOG:1548048210,N,No reply from server after sending 12 push requests
2019-01-21T16:23:30.946 OVPN:>LOG:1548048210,,TCP/UDP: Closing socket
2019-01-21T16:23:30.946 OVPN:>LOG:1548048210,I,SIGUSR1[soft,no-push-reply] received, process restarting
2019-01-21T16:23:30.961 OVPN:>LOG:1548048210,,MANAGEMENT: >STATE:1548048210,RECONNECTING,no-push-reply,,
2019-01-21T16:23:30.961 OVPN:>STATE:1548048210,RECONNECTING,no-push-reply,,



2019-01-21T16:23:30.961 OVPN:>HOLD:Waiting for hold release
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,D,MANAGEMENT: CMD ''
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,D,MANAGEMENT: CMD 'hold release'
2019-01-21T16:23:31.040 OVPN:SUCCESS: hold release succeeded
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Re-using SSL/TLS context
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Control Channel MTU parms [ L:1571 D:1210 EF:40 EB:0 ET:0 EL:3 ]
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Socket Buffers: R=[65536->65536] S=[65536->65536]
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Data Channel MTU parms [ L:1571 D:1450 EF:71 EB:12 ET:0 EL:3 ]
2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Local Options String: 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client'

2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Expected Remote Options String: 'V4,dev-type tun,link-mtu 1571,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server'

2019-01-21T16:23:31.040 OVPN:>LOG:1548048210,,Local Options hash (VER=V4): '68e0a8e4'
2019-01-21T16:23:31.055 OVPN:>LOG:1548048210,,Expected Remote Options hash (VER=V4): '070d3472'
2019-01-21T16:23:31.055 OVPN:>LOG:1548048210,I,Attempting to establish TCP connection with [AF_INET]58.96.101.42:443 [nonblock]
2019-01-21T16:23:31.055 OVPN:>LOG:1548048210,,MANAGEMENT: >STATE:1548048210,TCP_CONNECT,,,
2019-01-21T16:23:31.055 OVPN:>STATE:1548048210,TCP_CONNECT,,,
2019-01-21T16:23:31.996 OVPN:>LOG:1548048211,I,TCP connection established with [AF_INET]58.96.101.42:443
2019-01-21T16:23:31.996 OVPN:>LOG:1548048211,I,TCPv4_CLIENT link local: [undef]
2019-01-21T16:23:32.011 OVPN:>LOG:1548048211,I,TCPv4_CLIENT link remote: [AF_INET]58.96.101.42:443
2019-01-21T16:23:32.027 OVPN:>LOG:1548048211,,MANAGEMENT: >STATE:1548048211,WAIT,,,
2019-01-21T16:23:32.027 OVPN:>STATE:1548048211,WAIT,,,
2019-01-21T16:23:32.355 OVPN:>LOG:1548048212,,MANAGEMENT: >STATE:1548048212,AUTH,,,
2019-01-21T16:23:32.355 OVPN:>STATE:1548048212,AUTH,,,
2019-01-21T16:23:32.355 OVPN:>LOG:1548048212,,TLS: Initial packet from [AF_INET]58.96.101.42:443, sid=60de4478 476af09d
2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_70A60A9EEE152_2013-03-16_07:22:46_GMT__CA

2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,Validating certificate extended key usage
2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,VERIFY EKU OK
2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:32.433 OVPN:>LOG:1548048212,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,,Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,,Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,,Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2019-01-21T16:23:32.511 OVPN:>LOG:1548048212,I,[Fireware_SSLVPN_Server] Peer Connection Initiated with [AF_INET]58.96.101.42:443
2019-01-21T16:23:33.683 OVPN:>LOG:1548048213,,MANAGEMENT: >STATE:1548048213,GET_CONFIG,,,
2019-01-21T16:23:33.683 OVPN:>STATE:1548048213,GET_CONFIG,,,
2019-01-21T16:23:33.683 OVPN:>LOG:1548048213,,TLS: soft reset sec=599999939 bytes=0/-1 pkts=0/0
Comment
Watch Question

Do more with

Expert Office
EXPERT OFFICE® is a registered trademark of EXPERTS EXCHANGE®
DarinTCHSenior CyberSecurity Engineer

Commented:
If there were no changes to the firewall.....which you stated..
Then the most likely culprit ends up being the network.

That being said - power outages are strange birds - they can corrupt existing devices and communications
They can interrupt processes and reset them
Hardware can fail

So try to come all the previous parts and pieces and see what actually is different
This may include reboots and configs

There are many tools that will compare the configs (backup) with currently running

Lastly to clarify - did you mean if you create a new user that he CAN SUCCESSFULLY use the ssl vpn?

Author

Commented:
Thank you DarinTCH for your prompt response.

No, The newly created user is also not able to login to the SSL VPN.

I did reboot many times but have no luck. Everything is working fine, just SSL VPN stops working. I also had configured branch office VPN and it is working fine.

I have never used compare tool for the config comparison. Could you suggest the name?
Iamthecreator OMIT/EE Solution Guide

Commented:
From the logs it seems that user MITUL was able to log in (username and password verified). User session was created and assigned a virtual IP address initially which does not show up in subsequent entries

On one of the affected machine could you please check the ADVANCED Tab of the INTERNET OPTIONS to see if TLS 1.1 and TLS 1.2 are selected. If not selected, please select them. Restart and try to connect again.
Jeremy WeisingerSenior Network Consultant / Engineer

Commented:
Looks like the client is stuck in a loop verifying the cert. A few things you could do.

1. Download the latest version of FIreware and install it (requires an active Live Security)
2. Install the latest version of the SSL VPN client: http://cdn.watchguard.com/SoftwareCenter/Files/MUVPN_SSL/12_2/WG-MVPN-SSL_12_2.exe
3. Recreate the certificates on the XTM (requires reboot): http://customers.watchguard.com/articles/Article/Regenerate-SSL-VPN-certificates

Author

Commented:
HI Iamthecreator,

Thank you for you reply.

You are right, It is got connected successfully but I didn't see the green watchguard symbol and once the connection process get finished, it disconnect automatically.

Selection of TLS matters when we are using Internet explorer as a default browser but in my case I am using chrome as default browser. Still to make sure I have also make the changes as you have suggested. This isn't work for me.

Author

Commented:
Hi Jeremy,

Thank you for your participation.

I have gone through all the options but didn't help me out.
Jeremy WeisingerSenior Network Consultant / Engineer

Commented:
Hi Mitul,

I would open a ticket with WatchGuard then and have them troubleshoot it.

Author

Commented:
Hi Jeremy,

It is fixed now but couldn't understand how it is fixed.

I did factory reset and add the feature key in it. I have added SSL VPN client in rule and check for the VPN connection and It is successfully connected.

After this, I have imported the old configuration file which was running perfect for SSL VPN client but it was keep asking to add feature key again to import it. I did copy paste the same feature key which i pasted after factory reset and import the old configuration but this time SSL VPN stop working. I couldn't understand why?

Finally, I factory reset the watchguard again add the feaure key and create all rules manually, those were in the above old configuration file. Surprisingly, SSL VPN connection works successfully.

MY Question;

1. Why watchguard asking me to paste feature key while importing the configuration file?

2. Why SSL VPN works with all the same rules after manually entering the rules?

Any idea for this?
Jeremy WeisingerSenior Network Consultant / Engineer

Commented:
Can you post the working and non-working xml config files and I’ll take a look.

As for why it’s asking for the feature key, this is the same firewall and not a replacement? Does the config you’re importing include the feature key? If it does then I think the configuration is corrupt. The key is based on a signature so if something was altered (ie corrupted) then it wouldn’t validate and would require you to put in the feature key again.
factory reset the watchguard again add the feaure key and create all rules manually again.
factory reset the watchguard again add the feaure key and create all rules manually again.

Author

Commented:
Thank you for your kind Help.

Do more with

Expert Office
Submit tech questions to Ask the Experts™ at any time to receive solutions, advice, and new ideas from leading industry professionals.

Start 7-Day Free Trial