When Accessing VPN, Address Gets Stuck At URL: https://

Modify the f_ndisagent file under the /var/netscaler/gui/vpns folder.

From

window.location = “http://” + window.location.hostname + “:8080/vpns/services.html” ;

To

window.location = “https://” + window.location.hostname + “/vpns/services.html”;

After above change the plugin doesn’t try to handle services.html request, so request goes directly to Gateway server.

(changes do not survive a reboot)

Also Sometimes The file f_ndisagent is picked from different location /netscaler/gui/vpns

If you see that the file under location /var/netscaler/gui/vpns already edited and does not have 8080 anymore and still issue occurs then Go ahead and edit the file under/netscaler/gui/vpns

Related:

  • No Related Posts

endpoint server migration(15.0MP1)—> 15.1MP2

I need a solution

Folks,

I have a situation where, I need to move an existing endpoint servers(with reporting agents) from 15.0MP1 application server  to a 15.1MP2 app server. Is there any way I can preserve  the transfer of the configurations of the  endpoint server(15.0MP1)  during my ugrade to 15.1MP1 or MP2 to register it to the new Enforce server(15.1MP2)?

0

Related:

  • No Related Posts

Trend Micro Predicts Escalating Cloud and Supply Chain Risk

Dateline City:
DALLAS

Cyber risk increases at all layers of the corporate network as we enter a new decade

DALLAS–(BUSINESS WIRE)–Trend Micro Incorporated (TYO: 4704; TSE: 4704), a global leader in cybersecurity solutions, today announced its 2020 predictions report, which states that organizations will face a growing risk from their cloud and the supply chain. The growing popularity of cloud and DevOps environments will continue to drive business agility while exposing organizations, from enterprises to manufacturers, to third-party risk.

Language:
English

Contact:

Erin Johnson
817-522-7911
media_relations@trendmicro.com

Ticker Slug:
Ticker:
4704

Exchange:
TOKYO

ISIN:
JP3637300009

Ticker:
TMICY

Exchange:
OTC Pink

read more

Related:

  • No Related Posts

Unable to edit Application Firewall Profile. Error: “communication error with aslearn”.

The database learning limit is reached as mentioned in below link:

“The learning database is limited to 20 MB in size, which is reached after approximately 2,000 learned rules or relaxations are generated per security check for which learning is enabled​”

https://docs.citrix.com/en-us/netscaler/11-1/application-firewall/profiles/learning.html

Related:

  • No Related Posts

You receive an error: “No tenant identifying information found in either the request or implied by any provided credentials” when integrated with Intune and Secure Hub is in use.

When enrolling in to Citrix Endpoint Management for MDM, if the deployment is integrated with Intune for MAM, you may experience the following error and behaviour.

Without Secure Hub installed (using Intune MAM only), then no problems are seen.

When Secure Hub is installed and enrolled for MDM with CEM, then inbound connections from managed apps to the Gateway fail with the following error recorded: “No tenant identifying information found in either the request or implied by any provided credentials”

Related:

  • No Related Posts

Cisco NX-OS Software SNMP Access Control List Configuration Name Bypass Vulnerability

A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) Access Control List (ACL) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.

The vulnerability is due to an incorrect length check when the configured ACL name is the maximum length, which is 32 ASCII characters. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP polling that should have been denied. The attacker has no control of the configuration of the SNMP ACL name.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-snmp-bypass

Security Impact Rating: Medium

CVE: CVE-2019-1969

Related:

  • No Related Posts