What is “LDAP no such user xxx” and “RADIUS IP attribute missing, packet dropped”

I need a solution

Hi

I just wonder what is the meaning of these logs because it is generated almost everyday and too many. I cannot find any KB or article about these logs. Is there a way to stop these logs?

Note: This is ProxyASG S400-30 Version 6.7.3.14

2019-07-26 15:29:13+07:00ICT  "LDAP: no such user xxx"  5 250023:1  realm_ldap.cpp:3688
2019-07-26 15:29:08+07:00ICT  "Session Monitor: RADIUS IP attribute missing, packet dropped."  0 32000A:96  radius_session_notification_monitor.cpp:582

Any help would be appreciated.

0

Related:

  • No Related Posts

Ghost multicast Server to client negotiation

I need a solution

Hi,

we are using ghost server to multi clients using multicast.

Just a question on bandwidth and communication.

When the image is being transferred my understanding is that the communication is via udp.

Does anyone know how the client server communication for setup works?

Also what determines the max transfer speed? I know this is the slowest client but how does this

client communicate the speed it is happy with to the server, is this again tcp?

Is there a tcp “management” stream between client and server checking for variations in speed capabilities?

Any help or if anyone knows where to find it much appreciated.

0

Related:

  • No Related Posts

SEP processes working but not communicating with server

I need a solution

Hello, 

      I have a problem with SEP installed on Linux. I installed it correctly , services are running , clinet can reach SEP server IP , also when doing telnet command to check connectivity from client to server over 443 port it is fine . But still the server still not seeing the client , and it mark it as offline 

I tried to restart the client services , it take sometime to stop but finally it stop and then work fine but still server see it as offline .

I use the following actions to stop/start the service :

/etc/init.d/symcfgd stop

Restart the daemons:

/etc/init.d/symcfgd start
/etc/init.d/rtvscand start
/etc/init.d/smcd start

Please advise 

0

Related:

  • No Related Posts

Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability

A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN.

The vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a malicious LLDP packet on the adjacent subnet to the Cisco Nexus 9000 Series Switch in ACI mode. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190703-n9kaci-bypass

Security Impact Rating: High

CVE: CVE-2019-1890

Related:

  • No Related Posts

Modification of pop-up / Alerting messaging

I need a solution

Has anyone had any success in modifying the alerting message being presented to end users when the policy calls for this as part of the response rule?

There are two aspects with this request…

  1. Support for bilingual messages (in my case I need French and English) but I can see this being needed with other languages such as Spanish and English
  2. Messaging on the pop-up must comply with our internal Branding and communication policies which the default does not.

Without this functionality, we cannot proceed in the next step of the strategy of communicating to our constituents that they are about to exfiltrate information that has been deemed not to exit the organization.   Executives have mandated that this must come first before we start actually blocking.

My thoughts are this should be a simple XML file in which the content can be modified to present our specific messages.  Am I wrong?

Thanks….

0

Related:

  • No Related Posts

Behavior of 'Preferred' Option when two NTP servers are added

The Prefer option is an NTP level setting. Not only the ADC, but all devices conform to the rules in the RFC : http://doc.ntp.org/3-5.93e/prefer.html

Case 1: When 2 NTP servers are added with preferred option as YES set for both servers.

-It uses mitigation rules defined in the RFC. http://doc.ntp.org/3-5.93e/prefer.html (Please refer to the Mitigation Rules section)

Case 2: When 2 NTP servers are added with preferred option as YES set for one server, and NO for the other server

-The appliance synchronizes with that particular server first which has preferred option as YES.

Related:

  • No Related Posts

URL is not working

I need a solution

One of the URL is not working , i done Packet capture i seen Client sending hello after server sending RST packet.

The same website working open internet.

Even i try to disable detect protocol no luck.

tcp.stream eq 76 — Client to Proxy

tcp.stream eq 77 — Proxy to ocs server

In Browser message:-

Can’t connect securely to this page

This might be because the site uses outdated or unsafe TLS security settings

0

Related:

  • No Related Posts

Citrix Hypervisor – Paravirtualized VM won't boot after upgrade to Hypervisor 7.0

Updated the following files that are used to boot the XS installer to match the current version being installed, on this particular case, files on the TFTP server were from previous Hypervisor version 6.x

mboot.c32

pxelinux.0

These files are needed on a TFTP server according to the Network Boot Installation process described here:

https://docs.citrix.com/en-us/xenserver/7-1/install/network-boot.html

Related:

  • No Related Posts