That would do it. Almost certainly enforced by GPO in that case so at least
it's easy to change if you need to.

On Thu, Sep 3, 2015 at 10:25 AM, Robert Webb <rw...@ropeguru.com> wrote:

> Yes, we are looking at this now.
>
> Thanks for everyone's help. I think we are heading in the right direction
> tracking this down. This just showed up in our monitoring and makes sense
> as we just brought up a new locked down domain.
>
> Robert
>
>
>
> On Thu, 3 Sep 2015 10:19:53 -0400
>  "Oliver O'Boyle" <oliver.obo...@gmail.com> wrote:
>
>> You can configure Windows to encrypt traffic based on protocol
>> definitions.
>> E.g., Use IPSEC to encrypt all traffic on port 80 between hosts X and
>> hosts
>> Y.
>>
>> It's possible that such a policy is in place locally on the workstations
>> and/or servers and it's also possible that it's being enforced using GPOs.
>>
>> On Thu, Sep 3, 2015 at 9:53 AM, Robert Webb <rw...@ropeguru.com> wrote:
>>
>> There is no VPN in the picture here. These are straight workstations on
>>> the network that the packets are coming from.
>>>
>>> According to a pcaket capture in wireshark, these are isakmp packets
>>> reaching out to host names of web sites that are being browsed. So
>>> destinations are sites like twitter, facebook, amazon, cnn, etc..
>>>
>>> We have further discovered that they seem to be initiated from the
>>> Windows
>>> 7 svchost, but we have not been able to find documentation as to how or
>>> why
>>> this is ocurring.
>>>
>>> Robert
>>>
>>>
>>> On Thu, 3 Sep 2015 13:42:21 +0000
>>>  "Bjoern A. Zeeb" <bzeeb-li...@lists.zabbadoz.net> wrote:
>>>
>>>
>>>> On 03 Sep 2015, at 13:35 , Robert Webb <rw...@ropeguru.com> wrote:
>>>>
>>>>>
>>>>> We are seeing udp 500 packets being dropped at our firewall from user's
>>>>> browsing sessions. These are users on a 2008 R2 AD setup with Windows
>>>>> 7.
>>>>>
>>>>> Source and destination ports are udp 500 and the the pattern of drops
>>>>> directly correlate to the web browsing activity. We have confirmed this
>>>>> with tcpdump of port 500 and a single host and watching the pattern of
>>>>> traffic as they browse. This also occurs no matter what browser is
>>>>> used.
>>>>>
>>>>> Can anyone shine some light on what may be using udp 500 when web
>>>>> browsing?
>>>>>
>>>>>
>>>> The VPN using IPsec UDP-Encap connection that supposedly gets through
>>>> NAT?   Have you checked the content with tcpdump?   Do you have
>>>> fragments
>>>> by any chance?
>>>>
>>>>
>>>> --
>> :o@>
>>
>
>
>


-- 
:o@>

Reply via email to