Event Details – Failed to get commands from the server. error code 3, Application category

I need a solution

I’m currently doing some testing on the SEP Cloud Testpad domain

I’ve successfully setup Endpoint and the policies however when trying to push commands from the cloud console to the device I never get an update.

Looking in the Event page I can see that the device keeps reporting the following error:

Failed to get commands from the server. error code 3, Application category

Any ideas on how I can troubleshoot this?



  • No Related Posts

could not block to write registry by application control

I need a solution


I made a application control policy.

I want block to write this registry value.

registry key : HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesTcpipParameters

value : NV HostName

It is registry about Computer Name.

When it blocked to write if I change the value manually.

But, When I change it on My Computer > Property 

the registry value is change.




  • No Related Posts

URL Slowness

I need a solution

One Particular URL responding very slow when traffic going through proxy.

Client configured PAC file to reach proxy. When bypass proxy it’s working well.

Website http://x.x.x.x:8080/UIUX93/ 

Ceckpoint timings:
      new-connection: start 1 elapsed 0 ms
      client-in: start 18 elapsed 69177 ms
      scan-request-completed: start 69195 elapsed 0 ms
      server-out: start 69199 elapsed 0 ms
      server-in: start 69279 elapsed 0 ms
      client-out: start 69280 elapsed 0 ms
      access-logging: start 69316 elapsed 0 ms
      stop-transaction: start 69316 elapsed 0 ms
      Total Policy evaluation time: 69177 ms
    url_categorization complete time: 69316
    ICAP Response Scan: start 69195 delay 0 finish 0
    server connection: start 69199
    server connection: connected 69200 first-byte 69279 last_byte 69316
    client connection: first-response-byte 69280 last-response-byte 69316
  Total time added: 69181 ms
  Total latency to first byte: 69183 ms
     Request latency: 69181 ms
    OCS connect time: 1 ms
    Response latency (first byte): 1 ms
     Response latency (last byte): 0 ms
stop transaction ——————–



  • No Related Posts


2. What type of traffic is allocated by default to different Classes?

In the SD-WAN environment, we think of applications as falling into one of the following three classes:

Real-time –VoIP or VoIP like applications, such as Skype or ICA audio. In general, we refer to voice only applications that use small UDP packets that are business critical

Interactive – This is the broadest category, and refers to any application that has a high degree of user interaction. Some of these applications, for example video conferencing, is sensitive to latency, and requires high bandwidth. Other applications like HTTPS, may need less bandwidth, but are critical to the business. Interactive applications are typically transactional is nature.

Bulk – This is any application that does not need rich user experience but is more about moving data (i.e. FTP or backup/replication)

3. How real-time class works vs interactive:

Real-time (RT) classes are given the highest priority and gets up to 50% of the overall scheduler time. Each class can be weighted with respect to the other RT classes, for example, we could have two RT classes one that weighted to 70% and the other to 30%.

Interactive (INT) classes take the next priority and can consume the rest of the scheduler time as the traffic demands. Individual INT classes can be weighted and by default we have 4 weights (high, medium, low and very low) defined.

4. Will bulk suffer if interactive and real-time flows are there?

Yes, Bulk traffic is serviced after real-time and interactive traffic are serviced. Typically, a bulk class gets a lower sustained share % than an interactive class.

5. How QoS classes are prioritized?

Real-time (RT) classes are given the highest priority and gets up to 50% of the overall scheduler time. Each class can be weighted with respect to the other RT classes, for example, we could have two RT classes one that weighted to 70% and the other to 30%.

Interactive (INT) classes take the next priority and can consume the rest of the scheduler time as the traffic demands. Individual INT classes can be weighted and by default we have 4 weights (high, medium, low and very low) defined.

Bulk (BLK) classes takes the lowest priority and can be considered scavenge classes. They can be weighted but they can be completely starved of bandwidth if the INT/RT traffic is consuming all of the scheduler time.

6. What is the purpose of “Retransmit Lost Packets” option under WAN General, IP Rules?

If the receiving SD-WAN appliance detects a missing packet it can request that packet to be resent by the sending SD-WAN appliance.

7. What is the Criteria for the QoS calculation?

QoS is always calculated on the Send Side.

The Fair Share calculation for the services is based on Per Wan Link.

8. What is Duel Ended QoS?

The Receive side sends the Control Packets to advertise the available bandwidth before the actual Data transfer is initiated.

9. How is share provided during contention?

Please refer this article: https://support.citrix.com/article/CTX256716

10. Difference between the Drop Limit and Drop Depth:

Drop Limit: If the Estimated exceeds the threshold, the packet will be discarded. Not valid for Bulk Classes

Drop Depth (Send Buffer): The Max amount of estimated time that packets smaller than the large packet size will have to wait in the class scheduler. If the queue depth exceeds the threshold, the packet will be discarded and the statistics will be counted.

11. How Drop Limit is calculated (MS)?

Number of bytes Queued divided by Bandwidth available for the class.

12. What are transmit modes based on?

•Persistent path – Based on the latency. If there’s a latency >50mS then there will be a penalty on that path and a new path will be chosen.

•Load Balanced Path– Based on the packet Loss.

•Duplicate paths: Packets will be duplicated over the WAN links.

13. What is MOS (Mean opinion Score) under rule groups?

This Feature gathers application statistics from WAN to LAN side of the Virtual path. It Measure of the quality of the experience that an application delivers to end users. It is primarily used for VoIP applications. In SD-WAN, MOS is also used to assess the quality of non-VoIP applications.

14. What is Application QoS and how to implement it?

By default on the SD-WAN, we have pre-defined Application Family based on the type of the application in the incoming Traffic. For Example: Anti-Virus, Microsoft Office, etc…

It is also possible to create Custom application object.

15. QoS Fairness (RED):

Please refer to this Document:


16. Do we have an option to enable Auto Bandwidth provisioning?

Yes, from SD-WAN Version 10.2.x we have an option under Site —> Wan Links —> Provisioning to enable Auto-Bandwidth Provisioning.

17. What is Auto-Bandwidth Provisioning?

When enabled, the shares for all services defined in the Provisioning section will be auto calculated and applied according to the size of Bandwidth that may be required for the remote sites.

18. How to diagnose if an issue is with SD-WAN or not with respect to QoS?

Based on Multiple factors:


  • No Related Posts

Global and Taiwanese ICT Application Industry and Market, 2018 and Beyond: Airbnb, Alibaba …

Market Analysis Research Report on “Global and Taiwanese ICT Application Industry” has been added to orbis research database.

Global and Taiwanese ICT Application Industry and Market

This report encompasses six major applications in the ICT (Information and Communications Technology) industry, including cloud services, AI (Artificial Intelligence), Blockchain, information security/cybersecurity, mobile payment, and sharing economy. MIC (Market Intelligence & Consulting Institute) explores the development of these six applications both worldwide and in Taiwan, and highlights the key issues facing the ICT application industry and market.

Quarterly shipment volume and value performance of the Taiwanese DSL CPE industry for the period 1Q 2016 – 3Q 2019

The Taiwanese DSL CPE industry with breakdowns by product mix, assembly location, and shipment destination

Airbnb, Alibaba, Amazon, Apple, Baidu, CA, Check Point, Cisco, DearChef, Emc, Ethereum, Face++, Flashback, Fortinet, Google, Hyperledger, IBM, International Data Corporation, IOTA Foundation, JKOPay, Juniper, Kaspersky, Line, Longage, MAC, Market Intelligence & Consulting Institute, MasterCard, McAfee, Microsoft, PayPal, R3, SenseTime, Symantec, Tencent, Trend Micro, Websense, WeMo Scooter, World Economic Forum

Request a Sample Copy of this report @ https://www.orbisresearch.com/contacts/request-sample/2392663

Table of Content:

1. Cloud Service

1.1 Global Cloud Service Development

1.2 Taiwan’s Cloud Service Development

1.3 Important Issues

2. AI (Artificial Intelligence)

2.1 Development and Important Issues of Global Artificial Intelligence Industry

2.2 Development and Important Issues of Taiwan’s Artificial Intelligence Industry


3.1 Development and Important Issues of Global Blockchain

3.2 Development and Important Issues of Taiwan’s Blockchain

4.Information Security

4.1 Development of Global Information Security Industry

4.2 Development of Taiwan’s Information Security Industry

4.3 Important Issues

4.3.1 Malicious Software Grows Rapidly

4.3.2 Ransomware Become the Mainstream of Crime

4.3.3 New Vulnerabilities Affect New IoT Devices:

4.3.4 The Use of AI Helps Strengthen Information Security Protection:

5. Mobile Payment

5.1 Global Mobile Payment Development

5.2 Taiwan’s Mobile Payment Development

5.3 Important Issues

6. Sharing Economy

6.1 Global Shared Economy Development

6.2 Taiwan’s Sharing Economy Development

6.3 Important Issues


Glossary of Terms

List of Companies

Get the DISCOUNT on this report @ https://www.orbisresearch.com/contacts/discount/2392663

About Us:

Orbis Research (orbisresearch.com) is a single point aid for all your market research requirements. We have vast database of reports from the leading publishers and authors across the globe. We specialize in delivering customized reports as per the requirements of our clients. We have complete information about our publishers and hence are sure about the accuracy of the industries and verticals of their specialization. This helps our clients to map their needs and we produce the perfect required market research study for our clients.

Contact Us:

Hector Costello

Senior Manager – Client Engagements

4144N Central Expressway,

Suite 600, Dallas,

Texas – 75204, U.S.A.

Phone No.: +1 (214) 884-6817; +912064101019

Email ID: sales@orbisresearch.com

Post Views: 63


  • No Related Posts

Security requirement prototyping with hyperledger composer for drug supply chain

ACM DL404 Error – File Not Found

… but the URL you have requested was not found.

To find what your are looking for please browse or search the ACM Digital Library.

We apologize for this inconvenience.

Please contact us with any questions or concerns regarding this matter:[email protected]

The ACM Digital Library is published by the Association for Computing Machinery. Copyright 2010 ACM, Inc.

Terms of UsagePrivacy PolicyCode of EthicsContact Us


  • No Related Posts

Trend Micro Research Finds Serious Business Risks Due to Smart Buildings

Dateline City:

As buildings and homes are more connected, enterprise businesses face new physical and data security threats

Micro Incorporated
; TSE:
), a global leader in cybersecurity solutions, today announced
new research revealing that IoT automation platforms in smart buildings
are presenting attackers with new opportunities for both physical and
data compromise. The findings have serious implications for
organizations operating inside smart buildings, including spying on
users, unlocking doors and stealing data, as well as employees working
from smart home environments.



Erin Johnson

Ticker Slug:





read more


  • No Related Posts

Warning: “Disk usage for the Active OS partition is at 70%” on Citrix SD-WAN

Recommendation is to upgrade to latest 10.x versions which have latest bug fixes for this issue.

In the meantime, you can delete data that is no longer required such as:

1. Old Configuration files

Configuration files present in the Configuration Editor (not applied through Change Management process) can be deleted.

You can go to Configuration >> Virtual WAN >> Configuration Editor >> Open >> Select a configuration file >> Click on Trash can icon

User-added image

2. Archived configuration files that were applied to the network

You can go to Configuration >> System Maintenance >> Delete Files >> Delete Archived Configuration File

Important! The above changes delete the configuration files but keep the running config/software/user configured data (radius/tacacs settings, web timeout, events/alarms settings etc.) intact and keeps the service running

3. Archived Database files

You can go to Configuration > System Maintenance > Delete Files > Delete Archived Database

User-added image

4. Old Diagnostics files and Memory Dumps

You can go to Configuration >> System Maintenance >> Diagnostics >> Diagnostics Data

User-added image

5. Additional files can be removed by our Citrix Technical Support while the software version is upgraded.


  • No Related Posts