WatchGuard System Manager Version 11.5.1 – Update 1 was released recently to correct some XSS Flaws that were reported to WatchGuard, it also corrects two internally identified vulnerabilities. You can obtain the latest version via the WatchGuard support portal.
Category Archives: Watchguard
[RESOLVED] – Watchguard Fireware 11.5.1 – XTM 2 Series Appliance Locksup, Stops Responding to Login Requests and/or outbound traffic rejected
Please be aware that Watchguard Fireware OS 11.5.1 and 11.5.2 have a very recently identified issue where by an XTM 2 Series unit will randomly not respond to Login requests and will not route outbound traffic. I have been informed by Watchguard support that this is still not fully resolved in 11.5.2 so we have had to downgrade many of our units to 11.4.2 to avoid them locking up and requiring a physical restart (pull power cord out). An updated release of 11.5.1 can now be requested from Watchguard support that should resolve the lockups. This updated 11.5.1 release is tagged as a debug build so other issues may be present. A CSP Service Pack release is due for 11.5.2 to resolve this issue and a permanant fix is expected to be in the 11.5.3 release of the XTM OS.
Please request Fireware XTM OS 11.5.2 – CSP1 Build # 338385 for the XTM 2 Series from Watchguard, this 11.5.2 CSP release resolves the lockups that were first introduced with 11.5.1.
Lockup Fixes included within 11.5.2 CSP1:
Multiple bug #s: changes to resolve file system writing error introduced in v11.5.1 on XTM 21-23 models. The file system error caused several problems such as; management access stops, wireless stops working, new connections through the Firebox may fail.
More detail can be found here http://aidinit.com/2012/03/watchguard-xtm-2-series-xtm-3-series-xtm-5-series-xtm-8-series-fireware-xtm-os-11-5-2-csp1-build-338385/
Watchguard – SSL VPN clients cannot resolve internal host names despite DNS servers being configured for the connection
You may find that when you configure your Watchguard XTM Firewall to accept SSL VPN connections that clients can connect to
the VPN and ping IP addresses of internal resources, however you cannot resolve internal hosts even via FQDN using DNS. You
may also find that when you run NSLOOKUP on the SSL VPN connected client that the result is your Internet Service Providers
DNS servers rather than the DNS servers assigned via the VPN connection.
To resolve the issue you can change your SSL VPN configuration from a “Routed VPN” to a “Bridge VPN”, the routed VPN uses a
virtual IP address pool (192.168.113.0/24) which does not match your internal IP range or the address range of the internal
DNS Servers. When a Windows client connects to the “Routed VPN” it appears that due to the DNS server mismatch they are not
utilised by the client.
When you configure the VPN in “Bridge VPN” mode you can work around this issue, the Bridge VPN configuration allows you to
exclude some addresses from your Windows DHCP Server Pool and add the into them “Start” and “End” IP addresses on your
Watchguard SSL VPN Configuration Page. The Watchguard will now become responsible for assigning these internal IPs to VPN
clients as they connect rather than the Windows DHCP Server.
You should now find that when your SSL VPN clients connect that they are assigned an IP address and DNS server that are all
within the existing internal IP range of your network. An NSLOOKUP should now return your internal DNS server address and
you should be able to ping hostnames and FQDNs that reside within your internal network.
Examples:
ping windowsserver
ping windowsserver.exampledomain.local
Please remember that the only down side with this configuration is that a “Bridge VPN” bridges to the “Trusted” interface,
this means that the client computer can access any internal resources that they have permissions for by default. A “Routed
VPN” allows you to offer traffic to Optional/secondary networks and gives you more control by letting you lock down access
using “Specify allowed resources”.