Connectivity Issues w/ Symantec Endpoint Protection on host
Posted: 17. Jul 2013, 02:04
We recently swapped to using Symantec Endpoint Protection after a recent evaluation period, during which there were no problems. This particular host was actually the first test subject, as it's my development machine and I'm the system admin who pushed for the deployment.
Everything was working fine for me last week, but as of today I'm experiencing this absolutely bizarre issue:
Host: Windows 7 Professional x64. Virtualbox 4-2-14 and 4-2-16 (tested with both versions)
Host Antivirus/Firewall/Etc: Symantec Endpoint Protection 12-1 (SEP)
Guest: Debian Linux 6-0-6 amd64 (squeeze/stable)
Guest Antivirus/Firewall/Etc: None, and no iptables rules either.
Network Configuration: Guest has 3 interfaces: #1 is bridged to the host's Ethernet interface (192-x), #2 is a host-only network (172-x) and #3 is NAT.
I'm unable to SSH from the host to the guest on any interface, but H-T-T-P traffic (why do these forums think this abbreviation by itself is a link?) on port 8888 from the host to the guest works fine. I can SSH from the host to another PC and then from there to the guest just fine, and outbound connections from the guest work just fine.
There is no firewall rule in SEP that would be blocking this level of SSH -- in fact, disabling all firewall rules does not solve the problem, nor does creating a "catch all" rule that allows all traffic as the first rule. Completely disabling the firewall (aka "Network Threat Protection", to use Symantec terminology) resolves the problem (but this is not a satisfactory fix.) Furthermore, this was working last week with all of this enabled.
A catch-all "block all remaining traffic and log it" rule fails to log anything relevant, either.
Any idea what might be going on here and what else to consider? I'm running out of ideas.
Everything was working fine for me last week, but as of today I'm experiencing this absolutely bizarre issue:
Host: Windows 7 Professional x64. Virtualbox 4-2-14 and 4-2-16 (tested with both versions)
Host Antivirus/Firewall/Etc: Symantec Endpoint Protection 12-1 (SEP)
Guest: Debian Linux 6-0-6 amd64 (squeeze/stable)
Guest Antivirus/Firewall/Etc: None, and no iptables rules either.
Network Configuration: Guest has 3 interfaces: #1 is bridged to the host's Ethernet interface (192-x), #2 is a host-only network (172-x) and #3 is NAT.
I'm unable to SSH from the host to the guest on any interface, but H-T-T-P traffic (why do these forums think this abbreviation by itself is a link?) on port 8888 from the host to the guest works fine. I can SSH from the host to another PC and then from there to the guest just fine, and outbound connections from the guest work just fine.
There is no firewall rule in SEP that would be blocking this level of SSH -- in fact, disabling all firewall rules does not solve the problem, nor does creating a "catch all" rule that allows all traffic as the first rule. Completely disabling the firewall (aka "Network Threat Protection", to use Symantec terminology) resolves the problem (but this is not a satisfactory fix.) Furthermore, this was working last week with all of this enabled.
A catch-all "block all remaining traffic and log it" rule fails to log anything relevant, either.
Any idea what might be going on here and what else to consider? I'm running out of ideas.