Help Server port security...

I have install a VMware View virtual security server in our environment.  I install a second vSwitch use DMZ on the host computer and it gave a new group of ports for use of the DMZ.  Security Server VM uses the new DMZ port group.  I have that a dedicated server will switch to DMZ, then back to the DMZ port on our firewall.

Our firewall is managed by our ISP (I'm a one man IT Department in a large (for a computer scientist, in any case) environment so it helps me to deal with other tasks).  After talking with them several times, they assure me that everything is configured correctly so that there must be a problem with my VMware setup which I don't see.

I have an external IP address dedicated to security server I've had linking an internal IP on a DMZ subnet dedicated by the first paragraph.  I open ports UDP and TCP 80, 553-4172 for security server and also to pass these same ports on our view connection server that is located on our private network.  (I've changed port 443 by default to 553 as my original thought was that something must be blocking 443 on the side of VMware)

I am with them in that port rules are simple to set up-side firewall so I do not know there is no problem, especially after talking with four different technicians who all looked Setup and confirm that it was accurate.

If I do a scan of port of the outer harbour, 4172 appear as being open, but when I scan port 553 it is closed.  This drives me batty as it doesn't seem to be much to screw - up in terms of setting this up.

I'm also curious how to require the use of RSA devices only for the customers who connect throug Security Server.  If I place a replica of connection to the server, will not be the same configuration be used on both servers, which means that I couldn't activate RSA on the other without having to be on the other?

Thank you!

Hi dyeltonDC,

I guess you did a lot of configuration errors including an ExternalURL.

Please go through this doc and video http://communities.vmware.com/docs/DOC-14974

Clearly, this article explains how to configure PCoIP Secure Gateway and desktop access other components using Protocol PCoIP external network.

Have alook at www.vmware.com/pdf/view-46-architecture-planning. PDF page 60 for detailed deployment sight firewall rules all using DMZ

Everything should work properly once you configure the display according to these guidelines.

-Noble

Tags: VMware

Similar Questions

  • With the help of port security with Failover PIX

    Hello

    I want to configure port security on a switch in which a pair of PIX failover are configured. However, after

    http://www.Cisco.com/univercd/CC/TD/doc/product/LAN/cat6000/12_1e/swconfig/port_sec.htm

    It seems that this is not possible due to the PIX swapping MAC addresses: "If a workstation with a secure MAC which is configured or learned about a secure port address tries to access another secure port, a violation is marked."

    Does anyone know of a way around this?

    Many thanks in advance,

    Matt

    Hello Matt,

    Unfortunately it not there no work around to your problem.

    Thank you

    Renault

  • Need help to reset/compensation port security on a PowerConnect 35XX

    I implement port security on our network, and I've never worked with these before switches. I'm used to the Cisco CLI, who was the command exec "int sticky clear dry port", but it doesn't seem to be anything of the sort on the CLI of Dell.

    Here is the config, I have in place on the switchport in question.

    dot1x multiple-host

    safe standing of port security mode

    port security throw

    For the moment, that the port has done what is supposed to to, but remove the configuration of the interface completely that I am unable to find how the CLI reference or online at how 'quickly' to reset the port.

    Any help would be appreciated.

    Do not take into account. I found buried in the CLI reference command.

    There are actually two commands necessary to reactivate the interface

    "dot1x to re-authenticate ethernet [port]".

    'set interface active ethernet [port] ".

    Thank you

  • With the help of v31.4.0, anyway I can designate the server ports as 110 and 25 instead of 110 and 587 for Bitdefender anti-spam?

    Thunderbird server ports won't allow to 110 and 25, only 110 and 587. Any suggestions?

    Go to the account settings-> settings for outgoing (SMTP) server and highlight the name of the server; then click on change. You should be able to change the port there. 25, 465, 587 and 2525 ports are all possibilities.

  • What should be the port/security settings for Windows Mail with Vista - I think they changed?

    I had to reinstall Vista when my hard drive crashed, and Windows Mail does not work completely correctly. I think remember me an email from Microsoft told me to change the ports/security settings. Could someone tell me what they should be?

    A "error message indicating", what exactly? No error code or the relevant text?
     
    Make sure these settings match exactly.
     
     

    Leave messages on the server and it clutter?
     
     
  • switchport port-security problem

    Hi all

    I wanted to test using the switchport port-security with mac address fixed for voip and sticky for the vlan access.
    to do this, I created the following configuration:

    switchport port-security maximum 2
    switchport port-security
    aging of the switchport port security 5
    switchport port-security-address mac sticky
    voice of vlan switchport port-security-address mac e8ba.7006.59a4

    the problem is the mac address that switch learns to access vlan, never goes away even if the device is no longer connected.

    switchport port-security maximum 2
    switchport port-security
    aging of the switchport port security 5
    switchport port-security-address mac sticky
    switchport port-security-address mac c434.6b24.5db9 sticky vlan access
    voice of vlan switchport port-security-address mac e8ba.7006.59a4

    Can you help me?

    This should make them disappear without having to use any statement when the switchport learns a new mac again if his manual, you have to bounce the port as well

    Disable them sticky interface port-security

  • Laboratory of port security exercise - do not behave as expected.

    Hello

    I'm working on a CCENT training lab to demonstrate the configuration of port security.

    I have a Catalyst 3550 switch software Cisco's IOS, software of C3550 (C3550-IPSERVICESK9-M), SE Version 12.2 (52), VERSION of the SOFTWARE (fc3). I have two computers connected on ports fa0/1 and fa0/2 with IP addresses of 10.0.0.20/24 and 10.0.0.12/24 respectively. Without active port security, each computer can ping successfully the other.

    As soon as I change the configuration to add port security on fa0/1 I am not able to ping between the two computers, nor can I ping 10.0.0.20 from the console of the switch, but I don't know why! If I delete it again the pings succeed again.

    I expect that the switch must learn the computer connected to fa0/1 MAC and stop if there is subsequently any traffic from another Mac.

    Interestingly, the 'show mac address-table' command shows that the MAC connected to fa0/1 when port security is not enabled. I don't know if this is relevant.

    Can someone help me diagnose what is happening?

    Thank you.

    Configuration before change:

    interface FastEthernet0/1

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    interface FastEthernet0/2

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    Configuration after modification:

    interface FastEthernet0/1

    switchport mode access

    switchport port-security

    Speed 100

    full duplex

    spanning tree portfast

    !

    interface FastEthernet0/2

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    Other diagnoses (after change):

    S1 # show ip interface brief

    Interface IP-Address OK? Method State Protocol

    Vlan1 10.0.0.5 YES NVRAM up up

    FastEthernet0/1 no YES unset upward, upward

    FastEthernet0/2 not assigned YES unset upward, upward

    #show S1 port-security

    Secure the security Port MaxSecureAddr CurrentAddr SecurityViolation Action

    (County)       (County)          (County)

    ---------------------------------------------------------------------------

    FA0/1 1 0 0 stop

    ---------------------------------------------------------------------------

    Total addresses in the system (with the exception of a mac per port): 0

    Limit Max addresses in the system (with the exception of a mac per port): 5120

    S1 #show - interface fa0/1 port security

    Port security: enabled

    Port State: Secure-up

    Mode of violation: stop

    Aging time: 0 mins

    Type of aging: absolute

    Aging of SecureStatic address: disabled

    Maximum MAC addresses: 1

    MAC addresses total: 0

    Configured MAC addresses: 0

    Sticky MAC addresses: 0

    Last Source address: Vlan: 0000.0000.0000:0

    Security Violation count: 0

    S1 #show interfaces fa0/1

    FastEthernet0/1 is up, line protocol is up (connected)

    Material is Fast Ethernet, the address is 000f.f796.d781 (bia 000f.f796.d781)

    MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,

    reliability 255/255, txload 1/255, rxload 1/255

    Encapsulation ARPA, loopback not set

    KeepAlive set (10 sec)

    Full-duplex, 100 MB/s, media type is 10/100BaseTX

    input stream control is turned off, output flow control is not supported

    Type of the ARP: ARPA, ARP Timeout 04:00

    Last entry exit ever, 00:00:01, blocking exit ever

    Final cleaning of "show interface" counters never

    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0

    Strategy of queues: fifo

    Output queue: 0/0 (size/max)

    5 minute input rate 0 bps, 0 packets/s

    5 minute output rate 0 bps, 0 packets/s

    3494 packets input, 587250 bytes, 0 no buffer

    Received 1593 broadcasts (0 multicasts)

    0 Runts, 0 giants, 0 shifters

    entry 0, 0 CRC errors, frame 0, saturation 0, 0 ignored

    0 watchdog, 1254 multicast, break 0 comments

    entry packets 0 with condition of dribble detected

    39631 packets output, 3311977 bytes, 0 underruns

    0 output errors, 0 collisions, 1 interface resets

    0 babbles, collision end 0, 0 deferred

    carrier, 0 no carrier, lost 0 0 output BREAK

    output buffer, the output buffers 0 permuted 0 failures

    #show mac address table S1 | include DYN

    1 b827.ebed.e2d9 DYNAMICS Fa0/2

    S1 #show ip arp

    Protocol of age (min) address Addr Type Interface equipment

    Internet 10.0.0.12 5 b827.ebed.e2d9 ARPA Vlan1

    Internet 10.0.0.5 - 000f.f796.d780 ARPA Vlan1

    Internet 10.0.0.20 32 10dd.b1f1.0c64 ARPA Vlan1

    Do you have any other platform to configure your lab? because it should work ideally and the configuration is fine. However, to complete your lab, you already have workaround...

    I suspect that this question is something related to the hardware you use or due to a BUG.

    Please note the useful comment

  • Configuration of a port as 'server port' in UCS FI 6120

    Hi all

    It is a fundamental question. If any user of UCS can kidly help me by providing a checklist for setting up a server in the UCS port, I will be grateful.

    What I've been running a port as the port of the server using the UCS Manager and nothing more. Then I connected the ANC of 10G from the server to this UCS FI. FCoE login never happened. My setup is slightly different from that of a regular system of UCS as I am trying to connect a stand-alone server to the UCS IF instead of use the chassis. Please visit https://supportforums.cisco.com/thread/2117756?tstart=0 to learn more about this topic.

    Looks like these server ports are the ports of junction and can carry any traffic VLAN? So why not FCoE VLAN? Why no "announcement of the discovery? I hung a finisar and don't see something specific protocol FCoE from port of the server.

    Any help is appreciated.

    Thank you

    Niranjan,

    It might help to take the steps that need to occur when you connect a 10G ANC to Nexus one N5K.

    In order to get a CF on a N5K virtual connection, the following steps of the manuals must be made:

    (1) create a vfc and bind it to the physical interface where the ANC is attached

    (2) create a vlan and vsan and associate the vlan for the vsan fcoe

    (3) place the vfc in the vsan created in step 2 above

    Once these steps are completed, and a couple of closing/No.-stops, you will get a vfc on the N5K flogi.

    When you create a Service in UCSM profile and associate with a blade with an ANC, UCSM performs all these tasks for you. If you dig into the system, you will see the vfc and veth that were created for your SPs.

    Without a SP and UCSM to manage the port of the server, any of these steps occur, and you will not get a flogi. There is no method to manipulate UCSM to perform what you're trying to do. It is not in the current design of the product.

    The only supported method to attach a rack CSeries server to a cluster UCSM is using the integration of the C-series features and the necessary equipment (FEX)

    I hope this helps.

  • Port security and DHCP

    Hi all.

    I have configured the port security in some ports, and I don't think it handles images as it should. the following settings are

    -max: adds the correct number of MAC

    -permanent safe mode

    -throw

    I connect the legitimate devices to determine the maximum number of MACs, the port must learn and then I connect a device with Mac unsafe. I can get an IP address from the DHCP server, but no traffic is being so forward. I think that no legitimate unit should not be able to get an IP address as port security ignores all frames with an unknown source Mac

    Hi Stelios,

    Your configuration seems to be fine. Mine was connected only with the safety of ports and addresses max I put at 1. I see only 1 MAC address sends bootp all other devices connect via the switch on this port send no bootp.

    You could also make the capture of packets using the capabilities mirror port switch and application of wireshark. Devices are perhaps using old known IP addresses...

    Kind regards

    Aleksandra

  • Cisco SG300 - 28 p - Port security issue.

    Hi, I would like to activate the port security on a Cisco SG300 PoE 28 p Switch. I would like to know how this can be done in cases where port is more connected to desktop switches 8 ports and in cases where computers are connected directly to the switch.

    Thanking you in advance,

    Parth.

    This is described in detail in the section 'Configuration of Port Security' on page 326 to 329 of the document Cisco Small Business 300 Series Managed Switch Administration Guide.

    The difference between a port serving a desktop switch and the other directly serving endpoint is just the number of MAC addresses that you want to leave.

    You have any specific questions?

  • Can I configure some ports on FI-6200UP GEM as server ports?

    Hello

    I need your help!

    I know that FI-6100 can't be configured its some port on GEM as the server ports.

    Is it possible to configure ports on FI-6200UP GEM server ports?

    And I wonder too, some ports(1/9-16) on a (Second) group of port can be configured as a server port(1/9-10) port(1/11-12) ethernet uplink, FCoE port(1/13-14) and FC port(1/15-16).

    Thanks in advance.

    Paul

    Hello Paul,

    Yes, you can configure the server ports on expansion on FI 6200 series modules.

    http://www.Cisco.com/en/us/docs/unified_computing/UCS/SW/GUI/config/Guide/2.1/b_UCSM_GUI_Configuration_Guide_2_1_chapter_0110.html#concept_A552AD7757A549FB82D16A07D0EDA1E4

    --------- snip ------------

    All port types shown are configurable on both the module fixed and expansion, including the server ports that are not configurable on the fabric of the 6100 Series expansion module for interconnection, but can be configured on the fabric of the 6200 series expansion module interconnection.

    ----------------------

    HTH

    Padma

  • Port security

    Dear all,

    someone has deploy the SMB switch (SRW series) port security?

    What should I do if I want to deploy this secanario?

    -a single port just for 1 mac address

    -If another mac address appears on this port, the port must be stopped

    Please help me.

    Thank you

    Is the SRW you reference, the new switch SRWxxx-K9 (300 series), or the older version of switch pre - 300 series?

    If the switch is a current product of the 300 series, the action on the switch port security violation might be, as taken from the guide of the administrator of the 300 series, highlighted in the red box. ;

  • Disable the protocols and encryption algorithms in VMware View connection server and security

    Hello

    In my recent deployment, I had a customer request to disable some protocols and encryption at the Server VMware View connection and security. I read some articles and found that this has been achieved by editing the locked.properties file. But when we have edited and replaced the file, users could not connect to the virtual desktop, so came back to us backwards and desktop computers worked fine.

    I found a few articles that we don't need to edit the locked.properties file in VMware view Horizon 6. If someone has done this please guide me through. Here are the details of the protocols and encryption algorithms that should be disabled

    Diffie-Hellman key

    Enable SSL v2/V3 and TLS 1.1 and 1.2

    Disable the RC4 encryption algorithm

    Select the secret of transfer (if possible)


    VMware view 6 is the connection to the server and security server.


    Thank you.

    Hello

    I implemented the following steps (from the manual):

    1. update the JCE policy files to take in charge the high-strength Cipher Suites

    You can add some cipher suites of high resistance for greater assurance, but first you must update the local_policy.jar and US_export_policy.jar files to each server instance and the security strategy for JRE 7 see connection to the server. You update these policy files by downloading the files to extend JCE (Java Cryptography) unlimited strength political jurisdiction from the Oracle Java SE download site 7.

    If you include some high-strength cipher suites in the list and you do not replace the policy files, you cannot restart the VMware view Horizon connection to the Server service.

    Policy files are located in the directory C:\Program View\Server\jre\lib\security from VMware.

    For more information on the download of the JCE unlimited strength jurisdiction policy 7 files, see the Oracle Java SE download site: http://www.oracle.com/technetwork/java/javase/downloads/index.html.

    After you update the policy files, you need to create backups of the files. If you upgrade the instance of the view connection server or security server, any changes you have made to these files can be replaced, and you may need to restore the backup files.

    2. the changes that policies of global acceptance with ADSI Edit

    • Start the ADSI utility on your computer see connection to the server.
    • In the console tree, select Connect to
    • In the selection or type a unique name text box or a naming context, type the unique name
      DC, DC = vdi is vmware, DC = int.
    • In the type or select a text field or the server box, select or type localhost: 389 or the name of a fully qualified domain (FQDN) of the server computer to connect to port 389 followed view.

    For example: localhost: 389 or mycomputer.mydomain.com:389

    • Expand the tree of the ADSI Editor, OU = properties, select OU = Global, then select OU = common in the right pane.
    • On the object CN = common, Global = UO, UO = properties, select each attribute that you want to change and enter the new list of security protocols or cipher suites.
      I used the following settings:

    EAP-ServerSSLCipherSuites: \LIST:TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA256

    EAP-ServerSSLSecureProtocols_ \LIST:TLSv1.1,TLSv1.2

    It is not the highest possible, but they work with all the features of our customers.

    • Restart the service of VMware view Horizon connection server (server connection and security).

    This is not Activate secret transfer (if possible) , but other points are covered.

    If anyone can give a tip to activate the transfer secret, I would be grateful.

  • Cannot find the .inf to install HP 5600 print server port

    I try to add a server port to print to my printer HP 5600 on Win 7.

    Go to "Properties of the print server" select port and get message 'new port type' print server ' food printer inf to install the port monitor intilation information. »

    Cannot find the INFs on any CD progrm supplied with the printer.

    How can I add a 'print server port' to the printer if my USB Linksys printserver. This print server works fine on my other computers on my home network.

    Finally found how to manage the Linksys. You must set up a TCP/IP port not a port of the print server.

    Link http://kb.linksys.com/Linksys/ukp.aspx?pid=80&vw=1&articleid=22034

    complete set upward for win 7

    Bob

  • Password reset the role on the same server as Secure Access?

    It is safe to add the role of reset of password on the same server as Secure Access? We have our server configuration to secure access for the Web and AppPortal access.

    After you install the role of reset of password on the access to the Web server, I discovered they don't work together. Password service would not start and installing beat all the Web site on the server.

Maybe you are looking for