Hello everyone
I recently added a Sophos UTM to my home network, and so far it's been really easy to setup and use.
The problem I am having right now however is when trying to do updates, they are very, very slow. I've also noticed that while I am trying to do updates, there are many connection attempts from outside to my desktop.
Being fairly new to Suse Linux, I did what I had done for my the Ubuntu systems I have on my network, and that was to allow them full access to the internet. Outbound that is. When doing the same for the Suse box, it is now able to connect to the repos, but it is incredibly slow.
Do the Suse repos make some form of connection back to the requesting system, or should it act more like Ubuntu.. makes the request and downloads the files.
Is there anyway to get the IP's for the Suse repo's so I can check them against my firewall log and create a rule if needed? Here is a snippet of the firewall log while I was attempting to do updates:
Thanks in advance!
I recently added a Sophos UTM to my home network, and so far it's been really easy to setup and use.
The problem I am having right now however is when trying to do updates, they are very, very slow. I've also noticed that while I am trying to do updates, there are many connection attempts from outside to my desktop.
Being fairly new to Suse Linux, I did what I had done for my the Ubuntu systems I have on my network, and that was to allow them full access to the internet. Outbound that is. When doing the same for the Suse box, it is now able to connect to the repos, but it is incredibly slow.
Do the Suse repos make some form of connection back to the requesting system, or should it act more like Ubuntu.. makes the request and downloads the files.
Is there anyway to get the IP's for the Suse repo's so I can check them against my firewall log and create a rule if needed? Here is a snippet of the firewall log while I was attempting to do updates:
Code:
Filter:
Autoscroll
Reload
18:23:23
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:25
Default DROP
TCP
195.135.221.134
:
80
→
192.168.1.108
:
41212
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:25
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:26
Default DROP
TCP
195.135.221.134
:
80
→
192.168.1.108
:
41212
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:26
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:29
Default DROP
TCP
195.135.221.134
:
80
→
192.168.1.108
:
41212
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:29
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:36
Default DROP
TCP
195.135.221.134
:
80
→
192.168.1.108
:
41212
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:36
Default DROP
ICMP
192.168.100.2
→
192.168.100.1
len=60
ttl=255
tos=0x00
srcmac=6c:33:a9:33:b7:25
dstmac=f8:1a:67:1:cf:59
18:23:37
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:49
Default DROP
TCP
195.135.221.134
:
80
→
192.168.1.108
:
41212
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:49
18:23:51
Default DROP
TCP
129.97.134.71
:
80
→
192.168.1.108
:
34157
[RST]
len=40
ttl=64
tos=0x00
srcmac=94:de:80:6e:5b:4