I Recently upgraded our Firebox Core X1000 to Fireware Pro and established several BOVPN tunnels. Now DC's on those VPN's are complaining about RPC endpoint errors.
Traffic monitor is now showing a constant stream of Deny messages relating to netbios like the one below;
Deny 192.168.80.16 255.255.255.255 netbios-dgm/udp 138 138 0-External/IPsec Firebox decrypted packet not allowed by SA selector, drop this packet (decrypted packet, SA info: id 0x6dd32f1c, policy Branch Office 1--00) 229 127 (internal policy)
The branch office VPN policies are set to allow any protocol on any port so i cant see what is blocking it.
Any help would be good!
Cheers Jinx
Traffic monitor is now showing a constant stream of Deny messages relating to netbios like the one below;
Deny 192.168.80.16 255.255.255.255 netbios-dgm/udp 138 138 0-External/IPsec Firebox decrypted packet not allowed by SA selector, drop this packet (decrypted packet, SA info: id 0x6dd32f1c, policy Branch Office 1--00) 229 127 (internal policy)
The branch office VPN policies are set to allow any protocol on any port so i cant see what is blocking it.
Any help would be good!
Cheers Jinx