I enabled option to show Denial Page when blocking and it works fine for regular users on local PC but it wont works at terminal server. Contents are blocked but no Denial page displayed.
Please advise.
Denial Page and terminal server W8K
Moderators: imfirewall, gengw2000
Denial Page and terminal server W8K
We're never been reported of this issue before.
Can you describe your network topology for us to reproduce this issue in our lab?
IMFirewall Software provides solutions for web content filtering software, business internet filtering software, business internet usage monitoring software.
Denial Page and terminal server W8K
Internet -> Cisco Asa 5505 -> Cisco router 3650g -> ESX 5.1 hp servers. 6 of them. All ESX hosts connected to this router thru 2 NIC (loading balance). On those ESX servers running few Windows 2008 server standard edition (terminal servers).
WFilter running on separate windows XP machine with two network cards. One with Assigned IP address to access and other is for traffic capture and both connected to that Cisco 3650 router. Router configured to mirror port (connected to firewall ASA 5505) to that sniffer interface on windows XP computer.
All local PCs connected to that router works fine and I can block contents. But on terminal servers just got "Internet Explorer cannot display thus page."
Also, I found that if some we page contain blocked content on local PC it will shows without that content or will show denied page on blocked space. On terminal server if page contain blocked content such YouTube this page Will. NOT show at all...
Magic...
WFilter running on separate windows XP machine with two network cards. One with Assigned IP address to access and other is for traffic capture and both connected to that Cisco 3650 router. Router configured to mirror port (connected to firewall ASA 5505) to that sniffer interface on windows XP computer.
All local PCs connected to that router works fine and I can block contents. But on terminal servers just got "Internet Explorer cannot display thus page."
Also, I found that if some we page contain blocked content on local PC it will shows without that content or will show denied page on blocked space. On terminal server if page contain blocked content such YouTube this page Will. NOT show at all...
Magic...
Denial Page and terminal server W8K
Posted my phone so some typo present...
Denial Page and terminal server W8K
We will setup such an environment to check. Reply you later.
IMFirewall Software provides solutions for web content filtering software, business internet filtering software, business internet usage monitoring software.
Denial Page and terminal server W8K
The denial page can display in our lab. (Also a 2008 R2 terminal server)
Which browser are you using?
Which browser are you using?
IMFirewall Software provides solutions for web content filtering software, business internet filtering software, business internet usage monitoring software.
Denial Page and terminal server W8K
regular IE last version
same result on google chrome
----------error page-----------
This webpage is not available
Google Chrome could not load the webpage because mail.google.com took too long to respond. The website may be down, or you may be experiencing issues with your Internet connection.
Here are some suggestions:
Reload this webpage later.
Check your Internet connection. Restart any router, modem, or other network devices you may be using.
Add Google Chrome as a permitted program in your firewall's or antivirus software's settings. If it is already a permitted program, try deleting it from the list of permitted programs and adding it again.
If you use a proxy server, check your proxy settings or contact your network administrator to make sure the proxy server is working. If you don't believe you should be using a proxy server, adjust your proxy settings: Go to the Chrome menu > Settings > Show advanced settings... > Change proxy settings... > LAN Settings and deselect the "Use a proxy server for your LAN" checkbox.
Error 7 (net::ERR_TIMED_OUT): The operation timed out.
same result on google chrome
----------error page-----------
This webpage is not available
Google Chrome could not load the webpage because mail.google.com took too long to respond. The website may be down, or you may be experiencing issues with your Internet connection.
Here are some suggestions:
Reload this webpage later.
Check your Internet connection. Restart any router, modem, or other network devices you may be using.
Add Google Chrome as a permitted program in your firewall's or antivirus software's settings. If it is already a permitted program, try deleting it from the list of permitted programs and adding it again.
If you use a proxy server, check your proxy settings or contact your network administrator to make sure the proxy server is working. If you don't believe you should be using a proxy server, adjust your proxy settings: Go to the Chrome menu > Settings > Show advanced settings... > Change proxy settings... > LAN Settings and deselect the "Use a proxy server for your LAN" checkbox.
Error 7 (net::ERR_TIMED_OUT): The operation timed out.
Denial Page and terminal server W8K
Looks like I founf the problem. It's a windows server version. Both TSs use Windows Server 2008 R2 edition.
Also, tried on Windows 2008 Standard - works fine. All computers on Windows Server 2008 R2 edition wont work, even it is not TS.
Also, tried on Windows 2008 Standard - works fine. All computers on Windows Server 2008 R2 edition wont work, even it is not TS.
Denial Page and terminal server W8K
-----------------------event log-------------------------------------
An account failed to log on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: NULL SID
Account Name: __wfilterd_user
Account Domain: BJWEBFILTER
Failure Information:
Failure Reason: Unknown user name or bad password.
Status: 0xc000006d
Sub Status: 0xc0000064
Process Information:
Caller Process ID: 0x0
Caller Process Name: -
Network Information:
Workstation Name: BJWEBFILTER
Source Network Address: 192.168.3.35
Source Port: 4648
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
An account failed to log on.
Subject:
Security ID: NULL SID
Account Name: -
Account Domain: -
Logon ID: 0x0
Logon Type: 3
Account For Which Logon Failed:
Security ID: NULL SID
Account Name: __wfilterd_user
Account Domain: BJWEBFILTER
Failure Information:
Failure Reason: Unknown user name or bad password.
Status: 0xc000006d
Sub Status: 0xc0000064
Process Information:
Caller Process ID: 0x0
Caller Process Name: -
Network Information:
Workstation Name: BJWEBFILTER
Source Network Address: 192.168.3.35
Source Port: 4648
Detailed Authentication Information:
Logon Process: NtLmSsp
Authentication Package: NTLM
Transited Services: -
Package Name (NTLM only): -
Key Length: 0
This event is generated when a logon request fails. It is generated on the computer where access was attempted.
The Subject fields indicate the account on the local system which requested the logon. This is most commonly a service such as the Server service, or a local process such as Winlogon.exe or Services.exe.
The Logon Type field indicates the kind of logon that was requested. The most common types are 2 (interactive) and 3 (network).
The Process Information fields indicate which account and process on the system requested the logon.
The Network Information fields indicate where a remote logon request originated. Workstation name is not always available and may be left blank in some cases.
The authentication information fields provide detailed information about this specific logon request.
- Transited services indicate which intermediate services have participated in this logon request.
- Package name indicates which sub-protocol was used among the NTLM protocols.
- Key length indicates the length of the generated session key. This will be 0 if no session key was requested.
Denial Page and terminal server W8K
Is any updates here? This is really important. Sine we bought this product it should works properly.
Who is online
Users browsing this forum: No registered users and 40 guests