Network Errors with streamers

Hello I have 3 Naim streamers that are having some networking issues.
1 - Unity Nova IP:172.17.3.1
2 - Mu-so Qb 2nd Generation IP:172.17.3.2
3 - Mu-so Qb 2nd Generation IP: 172.17.3.3

Here are some of my firewall logs from yesterday concerning these three devices.
There are a lot of invalid packets coming from each of the devices and lots of spurious reset packets coming from Google.

Any thoughts on the cause?

2024:02:05-00:00:38 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“36173” tcpflags=“RST”
2024:02:05-00:01:09 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“36173” tcpflags=“RST”
2024:02:05-00:04:06 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“35508” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:04:06 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“35508” dstport=“9243” tcpflags=“RST”
2024:02:05-00:04:06 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“35508” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:04:07 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“35508” dstport=“9243” tcpflags=“RST”
2024:02:05-00:09:30 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“40468” tcpflags=“RST”
2024:02:05-00:10:10 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“40468” tcpflags=“RST”
2024:02:05-00:20:16 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“36112” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:20:16 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“36112” dstport=“9243” tcpflags=“RST”
2024:02:05-00:20:16 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“36112” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:20:17 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“36112” dstport=“9243” tcpflags=“RST”
2024:02:05-00:20:17 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“38023” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:20:17 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“38023” dstport=“9243” tcpflags=“RST”
2024:02:05-00:20:17 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“38023” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-00:20:18 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“38023” dstport=“9243” tcpflags=“RST”
2024:02:05-00:36:41 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“36967” tcpflags=“RST”
2024:02:05-00:37:11 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“36967” tcpflags=“RST”
2024:02:05-00:37:22 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“60668” tcpflags=“RST”
2024:02:05-00:37:49 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“60668” tcpflags=“RST”
2024:02:05-00:44:21 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.211.227” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“51560” tcpflags=“RST”
2024:02:05-00:44:46 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.211.227” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“51560” tcpflags=“RST”
2024:02:05-00:45:36 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.211.227” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“51560” tcpflags=“RST”
2024:02:05-00:46:42 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.99” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“34935” tcpflags=“RST”
2024:02:05-00:47:12 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.99” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“34935” tcpflags=“RST”
2024:02:05-00:55:44 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.33.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“40097” tcpflags=“RST”
2024:02:05-00:56:13 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.33.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“40097” tcpflags=“RST”
2024:02:05-01:11:47 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.32.35” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“59912” tcpflags=“RST”
2024:02:05-01:12:18 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.32.35” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“59912” tcpflags=“RST”
2024:02:05-01:20:48 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.3” dstip=“3.9.213.57” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“35241” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-01:20:48 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:30:fb:3e” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.3” dstip=“3.9.213.57” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“35241” dstport=“9243” tcpflags=“RST”
2024:02:05-01:20:48 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.3” dstip=“3.9.213.57” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“35241” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-01:20:49 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:30:fb:3e” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.3” dstip=“3.9.213.57” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“35241” dstport=“9243” tcpflags=“RST”
2024:02:05-01:21:39 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.33.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“33221” tcpflags=“RST”
2024:02:05-01:22:03 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.1” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“36858” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-01:22:03 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“e8:e8:b7:a0:9a:21” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.1” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“36858” dstport=“9243” tcpflags=“RST”
2024:02:05-01:22:03 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.1” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“36858” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-01:22:04 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“e8:e8:b7:a0:9a:21” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.1” dstip=“18.130.131.118” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“36858” dstport=“9243” tcpflags=“RST”
2024:02:05-01:22:18 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.33.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“33221” tcpflags=“RST”
2024:02:05-01:22:47 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“41719” tcpflags=“RST”
2024:02:05-01:23:16 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“41719” tcpflags=“RST”
2024:02:05-02:04:07 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“40020” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-02:04:07 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“40020” dstport=“9243” tcpflags=“RST”
2024:02:05-02:04:07 wahine ulogd[5409]: id=“2000” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet logged” action=“log” fwrule=“0” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“40020” dstport=“9243” tcpflags=“RST” info="nf_ct_tcp: invalid RST "
2024:02:05-02:04:08 wahine ulogd[5409]: id=“2004” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Invalid packet” action=“invalid packet” fwrule=“60007” initf=“eth1” outitf=“ppp0” srcmac=“50:1e:2d:39:5d:ba” dstmac=“00:30:18:0d:de:17” srcip=“172.17.3.2” dstip=“35.178.252.250” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“63” srcport=“40020” dstport=“9243” tcpflags=“RST”
2024:02:05-02:06:34 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“35457” tcpflags=“RST”
2024:02:05-02:07:04 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“35457” tcpflags=“RST”
2024:02:05-02:13:53 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.215.227” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“56339” tcpflags=“RST”
2024:02:05-02:14:23 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.215.227” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“56339” tcpflags=“RST”
2024:02:05-02:24:53 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“39466” tcpflags=“RST”
2024:02:05-02:25:21 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.191.67” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“39466” tcpflags=“RST”
2024:02:05-02:31:57 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“43431” tcpflags=“RST”
2024:02:05-02:32:28 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.72.195” dstip=“172.17.3.1” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“43431” tcpflags=“RST”
2024:02:05-02:44:37 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.215.227” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“55782” tcpflags=“RST”
2024:02:05-02:45:06 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.251.215.227” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“55782” tcpflags=“RST”
2024:02:05-02:57:41 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“46527” tcpflags=“RST”
2024:02:05-02:58:13 wahine ulogd[5409]: id=“2001” severity=“info” sys=“SecureNet” sub=“packetfilter” name=“Packet dropped” action=“drop” fwrule=“60003” outitf=“eth1” srcmac=“00:30:18:0d:de:17” srcip=“142.250.217.67” dstip=“172.17.3.3” proto=“6” length=“40” tos=“0x00” prec=“0x00” ttl=“64” srcport=“80” dstport=“46527” tcpflags=“RST”

What issues are you experiencing?

Read above :grin:

8 Likes

Would need some more information… what firewall/firmware/software version, ethernet or wifi connected devices? What are your firewall rules?

I can see no network errors… you have shared a firewall log. It appears to be following the rules that have been set for it. Firewall rule 6003 and 6007 seem to be triggered a lot… what are they doing and why do you have them there? Your firewall seems to be dropping packets sourced from Google on port 80 amongst other things but not on 443… are you Chrome browser by any chance?

Where is this firewall with respect to your network topology - it looks like its on your router ? - assume your home network is 172.17.3.0/24?

I take it something is not working which is why you are posting here? If everything is working I would not worry - it looks possibly HTTP to HTTPS redirect related when contacting Google search engine (possibly other sites as well such as AWS) that is tripping up with one or more firewall rules but if you have no issue I wouldn’t worry.

Ha ha :crazy_face:

1 Like

Hi, thanks for the reply.
The firewall is integrated with the router. This is an enterprise-class system from Sophos.
60003 is simply the default output rule for the firewall.
60007 is a bit more interesting. This is the ‘invalid packet rule’ suggesting a programming error.
These are a function of the firewall and are not optional.

You ask about a Chrome browser. These packets do not involve any of my machines other than the firewall and the Naim product. No browsers involved - I don’t have Chrome installed anywhere in my environment.

The firewall in the network topology: It’s directly connected to the WAN on one port and the home wifi network via a wireless access point on another port.

Issues I’m having concern synced streaming with all three Naim products.
The invalid packets suggest there are errors in the Naim network stack. I’m wondering if this is related to the problems with interconnectivity with each other.
Naim programmers would need to comment.

I will not give you all of that information.
That’s absurd.

Primarily the Naim products are not synching the streams between each other. This is my primary use case.

Well they won’t. Indeed they won’t even read your post.

If you want Naim staff to look at this then you need to contact Naim Technical Support. But basically you have a problem that no-one else is reporting so it’s likely to be something not working properly on your network. With no further information to go on, there is not much that other Naim users here can do to help you.

Why is that absurd? If you know about how this stuff works you would know its not absurd at all.

If he asked you for MAC addresses fair enough, but he didn’t, his questions are perfectly reasonable and safe.

2 Likes

Thanks… the reason I asked about Chrome browser is because they are known to use caches in a way that exhibit what you are seeing.
Most of the issues are return/incoming packets with rule 6003 from the Google search engine sight on port 80… so they look http to https redirection related… I don’t see any drops on 443. So yes if the destination is your streamer… then I would look at a WireShark trace to see what is issued to Google to trigger the return that your firewall drops.

The invalid outgoing packet can be because of TCP sequencing handshake … you need to see a trace… it might be a timing issue with the peer… and totally valid in the TCP flow… as TCP operates in a way that certain packets can be invalid in the timing exchange and TCP manages that and you have opted to let your firewall the handshake discard rather than the peer.… so you can’t assume an error in a network stack… it might be doing what it’s supposed to be doing.

For errors in a network stack detection you need other tools such as WireShark, you can’t use a firewall on its own.

If you were seeing RST packets all over the place or invalid TCP exchange that would point to stack issues for example.

You mention synchronisation … I assume you are talking about syncing products on your home network. That traffic would not appear on your router or WAN firewall, and again you would need to use WireShark to see what is happening between devices on your local network.

So if you can get a WireShark trace from a mirror port… you can investigate if there is a network issue or it’s all valid. Its probably best to brush up on the TCP three way handshake process if not already when looking for possible network stack errors.

I have looked at this with Naim in some detail several years back… didn’t see any network stack issues with regard to media flows, but in a previous product build did see latency issues which were addressed as much as they could be with lossless streaming from Tidal. The issue here caused dropouts from Tidal.

Also when you get WireShark, you will see two TCP flow windowing mechanisms in use by Naim, depending on the peer to peer latency and bandwidth. The newer products spool the data into memory as fast as possible… and then play out from that spooled memory.

So in summary I see nothing untoward in your firewall logs on their own.

Share an external WireShark flow with your streamer, and a flow between Naim devices on your local network, then we can see what if any issues are.

Hi,
I’m seeing errors on my network from my Naim Unity Nova & Mu-So QB Gen 2.
I’m getting “invalid packet” on traffic heading to 3.9.213.57 & 18.130.131.118, both port 9243 which I believe is AWS Elastic Cloud.

I assume this is a coding error in the devices.
I can’t be the only one with this issue, though it would probably just be identified as a “glitch”.

What to do?
Other thoughts?

Thanks,
Doug
Seattle

How is this error manifesting itself?

I’m guessing that 99.99% of us don’t look for “errors on our networks” and if we’re not getting dropouts or other issues, these are trees falling in the woods that no one is there to hear . . .

The 3 Naim streamers are not synching their streams with each other so the three may play the same stream, but the streams are out of synch, which is head-ache inducing.

@Richard.Dane

Should this post be merged with the “Network errors with Steamers” post, as they are about the same issue and subject.

DG…

1 Like

Are you saying that the multiroom is not working properly ie the streams on the three boxes are not in sync? Are you starting from one and then adding the others? Sorry if that’s a banal question?

Packet errors don’t necessarily imply that there is anything wrong with the network stack on the Naim devices. It could also mean that there are issues with your network and packets have been dropped, which in turn could result in “invalid packets” being mentioned (because the other parts of the packets (that make up the full message) were not seen). Anyway, I’d assume that Naim haven’t written their own network stack and instead using a 3rd party stack (their OS is probably linux based?) and will therefore be used on millions of things worldwide.

Hi I thought we established you can’t confirm you are seeing any network errors at all…

Your firewall is not necessarily seeing a network error - it may be seeing an invalid packet as part of timing in the TCP three way handshake - which is totally normal with communications across the internet, as it is evidence of TCP managing the reliable stateful communication between two peers that are asynchronous. You can’t use a regular firewall alone to detect actual network errors. Sure it can be a prompt to investigate further using a packet sniffer like Wirewhark - but it can be a manifestation of timing of packets across the internet.

A firewall between your network and the internet won’t be triggered by events occurring within your internal network.

To identify network errors you need to use WireShark or similar on your LAN and see if there are queries such as in opportune sequence numbers or TCP header flags say to or from a cloud streaming provider. I think you’ll find this is all normal. The client synchronisation bug you will need to align internal network logs from say WireShark with product logs - and see why they are not synchronising with each other - this is best done with Naim support directly - as they will advise what information to capture from the Naim products.

Sorry I thought I had advised you already on this - perhaps not.

FWIW I have had many many many WireShark traces with the NDX2 and earlier streamers - and saw no actual network errors at all - but you can see all sorts of interesting timing situations with flows across the internet.

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.