Packets dropped with "Enforced firewall rule" or "Policy drop".
Packet capture shows the following:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX5.png)
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Be sure to configure NetExtender as shown in the following guide:
How to Test:
Setup packet capture for a specific service, setting the Destination IP to the WAN IP and internal system IP - all packets should show up as forwarded or consumed.
Below an example:
 --packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX6.png)
If the interface is in bridge mode check if is configured an access rule that allow the traffic also from the SSL-VPN Zone to the Zone/Interface that is bridged; SSL-VPN to WLAN in this example.
Here how to configure:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX3.png)
Following the previous example should be allowed the traffic between the SSL-VPN Zone and the WLAN zone, or in general between the SSL-VPN zone and the Zone/Interface Bridged:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX7.png)
The same access rule should be create to allow the traffic from the WLAN Zone to SSL-VPN Zone.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Be sure to configure NetExtender as shown in the following guide:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX4.png)
How to Test:
Setup packet capture for a specific service, setting the Destination IP to the WAN IP and internal system IP - all packets should show up as forwarded or consumed.
Below an example:
 --packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogXA.png)
If the interface is in bridge mode check if is configured an access rule that allow the traffic also from the SSL-VPN Zone to the Zone/Interface that is bridged; SSL-VPN to WLAN in this example.
Here how to configure:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX8.png)
Following the previous example should be allowed the traffic between the SSL-VPN Zone and the WLAN zone, or in general between the SSL-VPN zone and the Zone/Interface Bridged:
--packets-dropped-with--Enforced-firewall-rule--or--Policy-drop--kA1VN0000000P1e0AE-0EMVN00000EogX9.png)
The same access rule should be create to allow the traffic from the WLAN Zone to SSL-VPN Zone.