<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us in Cloud Security</title>
    <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330415#M12</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kush,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, Scansafe, in "theory", is working. But in&amp;nbsp; "practicality", it is not. A twist here, is that when it was first&amp;nbsp; implemented in October of 2012, it worked just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the information you requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- This ISR is running Version 15.2(4)M1&lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp; Scansafe LDAP code (with confidential content omitted in (bold)). I&amp;nbsp; have also underlined some code and show outputs to emphasize the&amp;nbsp; problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server ldap BarraAD&lt;/P&gt;&lt;P&gt; server &lt;STRONG&gt;(fqdn omitted)&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group BarraAD&lt;/P&gt;&lt;P&gt;aaa authentication login local_auth local&lt;/P&gt;&lt;P&gt; aaa authentication login ss-aaa group BarraAD&lt;/P&gt;&lt;P&gt;aaa authorization network default group BarraAD&lt;/P&gt;&lt;P&gt;aaa authorization network ss-aaa group BarraAD&lt;/P&gt;&lt;P&gt;aaa accounting network ss-aaa none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip admission virtual-ip 1.1.1.1 virtual-host webproxy&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission ntlm list authlist&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission order&amp;nbsp;&amp;nbsp; ntlm&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission method-list authentication ss-aaa authorization ss-aaa accounting ss-aaa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map ldap-username-map&lt;/P&gt;&lt;P&gt; map type sAMAccountName username&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ldap server&lt;STRONG&gt; (fqdn omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ipv4 &lt;STRONG&gt;(IP omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; attribute map ldap-username-map&lt;/P&gt;&lt;P&gt; transport port 3268&lt;/P&gt;&lt;P&gt; bind authenticate root-dn CN=&lt;STRONG&gt;(omitted)&lt;/STRONG&gt;,CN=Users,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt; password 7 &lt;STRONG&gt;(password omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="text-decoration: underline;"&gt;base-dn CN=Users,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; search-filter user-object-type top&lt;/P&gt;&lt;P&gt; authentication bind-first&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am adding the following Scansafe parameter map and the output of the following show command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sh content-scan session active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; believe it may provide some clues, especially the output of the show&amp;nbsp; command as it shows that Scansafe defaults to the username/user-group created in the parameter-map type content-scan global.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Scansafe parameter-map, with tower and license omitted)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type content-scan global&lt;/P&gt;&lt;P&gt; server scansafe primary ipv4 &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; port http 8080 https 8080&lt;/P&gt;&lt;P&gt; server scansafe secondary ipv4 &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; port http 8080 https 8080&lt;/P&gt;&lt;P&gt; license &lt;STRONG&gt;(omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; source interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; timeout session-inactivity 60&lt;/P&gt;&lt;P&gt; user-group &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; username &lt;STRONG&gt;(omitted)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;-- Default user-group and username&lt;/P&gt;&lt;P&gt; server scansafe on-failure allow-all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The output of #sh content-scan session active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username/usergroup(s): &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;(default username/user-group)&lt;/STRONG&gt;&lt;/SPAN&gt; &amp;lt;&amp;lt; -- This should be any user and its group&lt;/P&gt;&lt;P&gt;HTTP 10.3.1.124:64262 199.168.174.140:80 (7361:240452) 00:01:29&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URI: www.chelseaclock.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username/usergroup(s): &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;(default username/user-group)&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp; &amp;lt;&amp;lt; --This should be any user and its group&lt;/P&gt;&lt;P&gt;HTTP 10.3.1.90:51787 201.20.43.170:80 (871:15255) 1w0d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URI: box.zap.com.br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: The output of this show command should be showing&amp;nbsp; usernames and usergroups of our AD server, not the default. Therefore,&amp;nbsp; filters can not be applied per user/group, and default to the default&amp;nbsp; filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate help in this issue. I need to get Scansafe working in order to justify its purpose, its investment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 30 Aug 2013 18:14:41 GMT</pubDate>
    <dc:creator>Joe Lourenco</dc:creator>
    <dc:date>2013-08-30T18:14:41Z</dc:date>
    <item>
      <title>Cloud Web Security (formerly Scansafe) ldap resultCode: 49 Invalid Credentials. Default usergroup applied after user's sAMAccount authentication fails after BINDING</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330413#M10</link>
      <description>&lt;DIV&gt;&lt;P&gt;I have a serious problem&amp;nbsp; with LDAP, for the purpose of Scansafe, on a 3945 ISR with IOS 15 (C3900-UNIVERSALK9-M). LDAP&amp;nbsp; binding to the LDAP Server (Active Directory on Win Srv 2008 R2) when authenticating any domain user, except&amp;nbsp; for the default Scansafe Bind Root-DN user, is failing.&lt;/P&gt;&amp;nbsp;&lt;P&gt;The testing of any user's sAMAccount name, is failing, and it defaults to the default Scansafe usergroup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# test aaa group &amp;lt;ldap group name&amp;gt; &amp;lt;userid&amp;gt; &amp;lt;pwd&amp;gt; new-code&lt;/P&gt;&lt;P&gt;User Rejected&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# sh ldap server all&amp;nbsp;&amp;nbsp; (the output is correct when checking to see if any LDAP server exists)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My config is exactly as Scansafe's configuration guide:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/web_security/ISR_SS/ISR_ScanSafe_SolutionGuide.pdf" rel="nofollow" target="_blank"&gt;http://www.cisco.com/en/US/docs/security/web_security/ISR_SS/ISR_ScanSafe_SolutionGuide.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using NTLM ACTIVE AUTHENTICATION and I have the LDAP&amp;nbsp; attribute map for mapping the sAMAccount name to the user's username.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In that PDF, on the bottom of page 12, there is this paragraph that describes exactly what is happening to my Scansafe.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P dir="ltr" style="font-size: 23.94px; font-family: sans-serif; left: 228.547px; top: 950.471px; transform: scale(0.860866, 1); transform-origin: 0% 0% 0px;"&gt;"Configuring a Default User Group&lt;/P&gt;&lt;P dir="ltr" style="font-size: 17.6624px; font-family: serif; left: 229.824px; top: 996.117px; transform: scale(1.03322, 1); transform-origin: 0% 0% 0px;"&gt;You can configure a default user group to assign to each client when the ISR cannot determine the&lt;/P&gt;&lt;P dir="ltr" style="font-size: 17.6624px; font-family: serif; left: 229.824px; top: 1017.4px; transform: scale(1.03986, 1); transform-origin: 0% 0% 0px;"&gt;credentials for a user. Define a default user group using the following CLI command:&lt;/P&gt;&lt;P dir="ltr" style="font-size: 14.1512px; font-family: monospace; left: 229.824px; top: 1051.02px; transform: scale(1.09904, 1); transform-origin: 0% 0% 0px;"&gt;[no] user-group default &amp;lt;name&amp;gt;&lt;/P&gt;&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;&lt;P dir="ltr" style="font-size: 17.6624px; font-family: serif; left: 229.824px; top: 1162.84px; transform: scale(1.03209, 1); transform-origin: 0% 0% 0px;"&gt;The ISR uses the default user group name here to identify all clients connected to a specific interface on&amp;nbsp; the ISR when it cannot determine the user’s credentials. You might want to define a default user group&amp;nbsp; so that all traffic redirected to the ScanSafe proxy servers are assigned a user group so particular&amp;nbsp; ScanSafe policies can be applied appropriately. For example, you might want to create a default user&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; group for guest users on the wireless network.Only one user group can be defined per interface."&lt;/P&gt;&lt;P dir="ltr"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Now,&amp;nbsp; what does this problem affect? I cannot enforce the&amp;nbsp; application of&amp;nbsp; filters from the Scansafe site to specific user groups.&amp;nbsp; Users can use&amp;nbsp; the internet under the default usergroup. Everyone&amp;nbsp; defaults to the&amp;nbsp; default filter. I have a filter established for say&amp;nbsp; Purchasing, allowing&amp;nbsp; them extra leeway on what they can access, but the&amp;nbsp; members of that group&amp;nbsp; cannot authenticate, and thus their filter is not&amp;nbsp; applied.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;STRONG&gt;Application of filters is essential to Scansafe, without, it defeats the purpose&lt;/STRONG&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate all the help I can get on this.&lt;/P&gt;&amp;nbsp;&lt;P style="min-height: 8pt; height: 8pt;"&gt;Here is what my logs show regarding LDAP BINDING OPERATION, from # debug ldap all:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-- &lt;SPAN style="color: #3366ff;"&gt;Testing with jltestuser (this is just any random user, as all users are failing anyway)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;barra-gate#&lt;/P&gt;&lt;P&gt;051646: Aug 23 23:10:34.983 BRST: LDAP: LDAP: Queuing AAA request 0 for processing&lt;/P&gt;&lt;P&gt;051647: Aug 23 23:10:34.983 BRST: LDAP: Received queue event, new AAA request&lt;/P&gt;&lt;P&gt;051648: Aug 23 23:10:34.983 BRST: LDAP: LDAP authentication request&lt;/P&gt;&lt;P&gt;051649: Aug 23 23:10:34.983 BRST: LDAP: Invalid hash index 512, nothing to remove&lt;/P&gt;&lt;P&gt;051650: Aug 23 23:10:34.983 BRST: LDAP: New LDAP request&lt;/P&gt;&lt;P&gt;051651: Aug 23 23:10:34.983 BRST: LDAP: Attempting first&amp;nbsp; next available LDAP server&lt;/P&gt;&lt;P&gt;051652: Aug 23 23:10:34.983 BRST: LDAP: Got next LDAP server :&amp;lt;Removed server name...&amp;gt;&lt;/P&gt;&lt;P&gt;051653: Aug 23 23:10:34.983 BRST: LDAP: First Task: Send bind req&lt;/P&gt;&lt;P&gt;051654: Aug 23 23:10:34.983 BRST: LDAP: Authentication policy: bind-first&lt;/P&gt;&lt;P&gt;051655:&amp;nbsp; Aug 23 23:10:34.983 BRST: LDAP: Bind:&amp;nbsp; User-DN=cn=jltestuser,CN=Users,DC=&amp;lt;removed&amp;gt;,DC=&amp;lt;removed&amp;gt;,DC=com&amp;nbsp; ldap_req_encode&lt;/P&gt;&lt;P&gt;Doing socket write&lt;/P&gt;&lt;P&gt;051656: Aug 23 23:10:34.983 BRST: LDAP:&amp;nbsp; LDAP bind request sent successfully (reqid=92)&lt;/P&gt;&lt;P&gt;051657: Aug 23 23:10:34.983 BRST: LDAP: Sent transit request to server&lt;/P&gt;&lt;P&gt;051658: Aug 23 23:10:34.983 BRST: LDAP: LDAP request successfully processed&lt;/P&gt;&lt;P&gt;051659: Aug 23 23:10:35.539 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;051660: Aug 23 23:10:35.539 BRST: LDAP: Process socket event for socket = 0&lt;/P&gt;&lt;P&gt;051661: Aug 23 23:10:35.539 BRST: LDAP: Conn Status = 4&lt;/P&gt;&lt;P&gt;051662: Aug 23 23:10:35.539 BRST: LDAP: Non-TLS read event on socket 0&lt;/P&gt;&lt;P&gt;051663: Aug 23 23:10:35.539 BRST: LDAP: Found socket ctx&lt;/P&gt;&lt;P&gt;051664: Aug 23 23:10:35.539 BRST: LDAP: Receive event: read=1, errno=11 (Resource temporarily unavailable)&lt;/P&gt;&lt;P&gt;051665: Aug 23 23:10:35.539 BRST: LDAP: Passing the client ctx=1855243Cldap_result&lt;/P&gt;&lt;P&gt;wait4msg (timeout 0 sec, 1 usec)&lt;/P&gt;&lt;P&gt;ldap_select_fd_wait (select)&lt;/P&gt;&lt;P&gt;ldap_read_activity lc 0x1AADABD8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doing socket read&lt;/P&gt;&lt;P&gt;LDAP-TCP:Bytes read = 110&lt;/P&gt;&lt;P&gt;ldap_match_request succeeded for msgid 7 h 0&lt;/P&gt;&lt;P&gt;changing lr 0x11A14BFC to COMPLETE as no continuations&lt;/P&gt;&lt;P&gt;removing request 0x11A14BFC from list as lm 0x1AAB8494 all 0&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;051666: Aug 23 23:10:35.539 BRST: LDAP: LDAP Messages to be processed: 1&lt;/P&gt;&lt;P&gt;051667: Aug 23 23:10:35.539 BRST: LDAP: LDAP Message type: 97&lt;/P&gt;&lt;P&gt;051668: Aug 23 23:10:35.539 BRST: LDAP: Got ldap transaction context from reqid 92ldap_parse_result&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051669: Aug 23 23:10:35.539 BRST: LDAP: resultCode:&amp;nbsp;&amp;nbsp;&amp;nbsp; 49&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Invalid credentials)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051670: Aug 23 23:10:35.539 BRST: LDAP: Received Bind Responseldap_parse_result&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;ldap_err2string&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051671: Aug 23 23:10:35.539 BRST: LDAP: Ldap Result Msg: FAILED:Invalid credentials, Result code =49&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051672:&amp;nbsp; Aug 23 23:10:35.539 BRST: LDAP: LDAP Bind operation result : failed&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;-----------------------LOOK!!!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051673: Aug 23 23:10:35.539 BRST: LDAP: Connection &amp;lt;REMOVED...&amp;gt;0 already exist for reuseldap_msgfree&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051674: Aug 23 23:10:35.539 BRST: LDAP: Closing transaction and reporting error to AAA&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051675: Aug 23 23:10:35.539 BRST: LDAP: Transaction context removed from list [ldap reqid=92]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;051676: Aug 23 23:10:35.539 BRST: LDAP: Notifying AAA: REQUEST FAILED&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;051677: Aug 23 23:10:35.539 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;--- &lt;SPAN style="color: #3366ff;"&gt;Testing with the scansafe assigned user that binds to the Bind DN. This is the only user that succeeds authentication!!!!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&amp;nbsp;&lt;P&gt;barra-gate#&lt;/P&gt;&lt;P&gt;051684: Aug 23 23:13:57.664 BRST: LDAP: LDAP: Queuing AAA request 0 for processing&lt;/P&gt;&lt;P&gt;051685: Aug 23 23:13:57.664 BRST: LDAP: Received queue event, new AAA request&lt;/P&gt;&lt;P&gt;051686: Aug 23 23:13:57.664 BRST: LDAP: LDAP authentication request&lt;/P&gt;&lt;P&gt;051687: Aug 23 23:13:57.664 BRST: LDAP: Invalid hash index 512, nothing to remove&lt;/P&gt;&lt;P&gt;051688: Aug 23 23:13:57.664 BRST: LDAP: New LDAP request&lt;/P&gt;&lt;P&gt;051689: Aug 23 23:13:57.664 BRST: LDAP: Attempting first&amp;nbsp; next available LDAP server&lt;/P&gt;&lt;P&gt;051690: Aug 23 23:13:57.664 BRST: LDAP: Got next LDAP server :&amp;lt;Removed server name...&amp;gt;&lt;/P&gt;&lt;P&gt;051691: Aug 23 23:13:57.664 BRST: LDAP: First Task: Send bind req&lt;/P&gt;&lt;P&gt;051692: Aug 23 23:13:57.664 BRST: LDAP: Authentication policy: bind-first&lt;/P&gt;&lt;P&gt;051693:&amp;nbsp; Aug 23 23:13:57.664 BRST: LDAP: Bind: User-DN=cn=&amp;lt;Userid&amp;nbsp; removed&amp;gt;,CN=Users,DC=&amp;lt;removed&amp;gt;,&amp;lt;removed&amp;gt;,DC=comldap_req_encode&lt;/P&gt;&lt;P&gt;Doing socket write&lt;/P&gt;&lt;P&gt;051694: Aug 23 23:13:57.664 BRST: LDAP:&amp;nbsp; LDAP bind request sent successfully (reqid=93)&lt;/P&gt;&lt;P&gt;051695: Aug 23 23:13:57.664 BRST: LDAP: Sent transit request to server&lt;/P&gt;&lt;P&gt;051696: Aug 23 23:13:57.664 BRST: LDAP: LDAP request successfully processed&lt;/P&gt;&lt;P&gt;051697: Aug 23 23:13:58.164 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;051698: Aug 23 23:13:58.164 BRST: LDAP: Process socket event for socket = 0&lt;/P&gt;&lt;P&gt;051699: Aug 23 23:13:58.164 BRST: LDAP: Conn Status = 4&lt;/P&gt;&lt;P&gt;051700: Aug 23 23:13:58.164 BRST: LDAP: Non-TLS read event on socket 0&lt;/P&gt;&lt;P&gt;051701: Aug 23 23:13:58.164 BRST: LDAP: Found socket ctx&lt;/P&gt;&lt;P&gt;051702: Aug 23 23:13:58.164 BRST: LDAP: Receive event: read=1, errno=11 (Resource temporarily unavailable)&lt;/P&gt;&lt;P&gt;051703: Aug 23 23:13:58.164 BRST: LDAP: Passing the client ctx=1855243Cldap_result&lt;/P&gt;&lt;P&gt;wait4msg (timeout 0 sec, 1 usec)&lt;/P&gt;&lt;P&gt;ldap_select_fd_wait (select)&lt;/P&gt;&lt;P&gt;ldap_read_activity lc 0x1AADABD8&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Doing socket read&lt;/P&gt;&lt;P&gt;LDAP-TCP:Bytes read = 22&lt;/P&gt;&lt;P&gt;ldap_match_request succeeded for msgid 8 h 0&lt;/P&gt;&lt;P&gt;changing lr 0x11A14BFC to COMPLETE as no continuations&lt;/P&gt;&lt;P&gt;removing request 0x11A14BFC from list as lm 0x1AAB9D14 all 0&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;051704: Aug 23 23:13:58.164 BRST: LDAP: LDAP Messages to be processed: 1&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051705: Aug 23 23:13:58.164 BRST: LDAP: LDAP Message type: 97&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051706: Aug 23 23:13:58.164 BRST: LDAP: Got ldap transaction context from reqid 93ldap_parse_result&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051707: Aug 23 23:13:58.164 BRST: LDAP: resultCode:&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Success)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051708: Aug 23 23:13:58.168 BRST: LDAP: Received Bind Responseldap_parse_result&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051709: Aug 23 23:13:58.168 BRST: LDAP: Ldap Result Msg: SUCCESS, Result code =0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #339966;"&gt;051710:&amp;nbsp; Aug 23 23:13:58.168 BRST: LDAP: LDAP Bind successful for&amp;nbsp; DN:cn=&amp;lt;removed&amp;gt;CN=Users,DC=&amp;lt;removed&amp;gt;,DC=&amp;lt;removed&amp;gt;,DC=com &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BR /&gt;Thank You!&lt;/DIV&gt;</description>
      <pubDate>Sat, 09 Mar 2019 01:35:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330413#M10</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2019-03-09T01:35:24Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330414#M11</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to point out few things regarding the configuration:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Please make sure you are running code: 15.3(3)M as that is the current stable release for ISR Connector.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Could you please provide the relevant LDAP config as well for verification?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I had seen this issue once when in the LDAP configuration. In that case, the base-dn was configured as the domain and it was not working. We changed the configuration and specified the OU in which the users resided in the base-dn and it started to work fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kush&lt;/P&gt;&lt;P&gt;Cisco PDI Help Desk&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/go/pdihelpdesk"&gt;http://www.cisco.com/go/pdihelpdesk&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 12:49:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330414#M11</guid>
      <dc:creator>kussriva</dc:creator>
      <dc:date>2013-08-30T12:49:51Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330415#M12</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kush,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, Scansafe, in "theory", is working. But in&amp;nbsp; "practicality", it is not. A twist here, is that when it was first&amp;nbsp; implemented in October of 2012, it worked just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the information you requested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- This ISR is running Version 15.2(4)M1&lt;/P&gt;&lt;P&gt;. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp; Scansafe LDAP code (with confidential content omitted in (bold)). I&amp;nbsp; have also underlined some code and show outputs to emphasize the&amp;nbsp; problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa group server ldap BarraAD&lt;/P&gt;&lt;P&gt; server &lt;STRONG&gt;(fqdn omitted)&lt;/STRONG&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;aaa authentication login default group BarraAD&lt;/P&gt;&lt;P&gt;aaa authentication login local_auth local&lt;/P&gt;&lt;P&gt; aaa authentication login ss-aaa group BarraAD&lt;/P&gt;&lt;P&gt;aaa authorization network default group BarraAD&lt;/P&gt;&lt;P&gt;aaa authorization network ss-aaa group BarraAD&lt;/P&gt;&lt;P&gt;aaa accounting network ss-aaa none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip admission virtual-ip 1.1.1.1 virtual-host webproxy&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission ntlm list authlist&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission order&amp;nbsp;&amp;nbsp; ntlm&lt;/P&gt;&lt;P&gt;ip admission name NTLM-Active-Admission method-list authentication ss-aaa authorization ss-aaa accounting ss-aaa&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map ldap-username-map&lt;/P&gt;&lt;P&gt; map type sAMAccountName username&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;ldap server&lt;STRONG&gt; (fqdn omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; ipv4 &lt;STRONG&gt;(IP omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; attribute map ldap-username-map&lt;/P&gt;&lt;P&gt; transport port 3268&lt;/P&gt;&lt;P&gt; bind authenticate root-dn CN=&lt;STRONG&gt;(omitted)&lt;/STRONG&gt;,CN=Users,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt; password 7 &lt;STRONG&gt;(password omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="text-decoration: underline;"&gt;base-dn CN=Users,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;,DC=&lt;STRONG&gt;(x)&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt; search-filter user-object-type top&lt;/P&gt;&lt;P&gt; authentication bind-first&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am adding the following Scansafe parameter map and the output of the following show command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# sh content-scan session active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;nbsp; believe it may provide some clues, especially the output of the show&amp;nbsp; command as it shows that Scansafe defaults to the username/user-group created in the parameter-map type content-scan global.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(Scansafe parameter-map, with tower and license omitted)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type content-scan global&lt;/P&gt;&lt;P&gt; server scansafe primary ipv4 &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; port http 8080 https 8080&lt;/P&gt;&lt;P&gt; server scansafe secondary ipv4 &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; port http 8080 https 8080&lt;/P&gt;&lt;P&gt; license &lt;STRONG&gt;(omitted)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; source interface GigabitEthernet0/1&lt;/P&gt;&lt;P&gt; timeout session-inactivity 60&lt;/P&gt;&lt;P&gt; user-group &lt;STRONG&gt;(omitted)&lt;/STRONG&gt; username &lt;STRONG&gt;(omitted)&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; &amp;lt;&amp;lt;-- Default user-group and username&lt;/P&gt;&lt;P&gt; server scansafe on-failure allow-all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; The output of #sh content-scan session active&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username/usergroup(s): &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;(default username/user-group)&lt;/STRONG&gt;&lt;/SPAN&gt; &amp;lt;&amp;lt; -- This should be any user and its group&lt;/P&gt;&lt;P&gt;HTTP 10.3.1.124:64262 199.168.174.140:80 (7361:240452) 00:01:29&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URI: www.chelseaclock.com&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Username/usergroup(s): &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;(default username/user-group)&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp; &amp;lt;&amp;lt; --This should be any user and its group&lt;/P&gt;&lt;P&gt;HTTP 10.3.1.90:51787 201.20.43.170:80 (871:15255) 1w0d&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URI: box.zap.com.br&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: The output of this show command should be showing&amp;nbsp; usernames and usergroups of our AD server, not the default. Therefore,&amp;nbsp; filters can not be applied per user/group, and default to the default&amp;nbsp; filter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I really appreciate help in this issue. I need to get Scansafe working in order to justify its purpose, its investment. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Aug 2013 18:14:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330415#M12</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-08-30T18:14:41Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330416#M13</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kush,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Wanted to point out a couple of more things.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on what you said "We changed the configuration and specified the OU in which the users resided in the base-dn and it started to work fine", as you can see in the config,the base-dn has CN=Users, where our users do reside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In #sh ldap attributes, I saw an alternative option as cn == username to try but that did not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our AD, running &amp;gt; dsquery, yields:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS C:\&amp;gt; dsquery user -samid &lt;USERID&gt;&lt;/USERID&gt;&lt;/P&gt;&lt;P&gt;"CN=userid,CN=Users,DC=x,DC=x,DC=com"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our Linux systems, kinit and wbinfo for our users, returns just fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have read about a possible caveats regarding ldap authentication in which if both the ISR and AD are running NTLMv2, and therefore a workaround is to use NTLM ACTIVE, which I am.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have tried a monitor capture with ACLs to capture traffic just from the ISR to the AD to see what what the LDAP protocol is sending to authenticate as the DN, but I get 0 packets. In the capture I only get traffic from the AD. Anyway, the debug ldap above shows it anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;After picking through debug ldap, I can assume that depending on the&amp;nbsp; user's DN, wether its DN is two words, like "John Smith", or one word like "test", it will dictate wether it will fail or succeed bind. After going through a number of userids, the one's with one word DN successfuly binds and returns groups. Userids who have two words, like "john smith", even though their sAMAcountname is jsmith, fails.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I may be wrong, but its the only difference that I could find between users that do bind and those that do not. &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;It seems that the root-dn to bind to Active Directory is not being used accordingly to the ldap config and its attribute map for Scansafe.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Please read this thread:&lt;/STRONG&gt; thread/2076997. &lt;/P&gt;&lt;H2&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;A _jive_internal="true" href="https://community.cisco.com/message/3329508#3329508" rel="nofollow"&gt;IOS LDAP authenication against sAMAccountName&lt;/A&gt;&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The reply by&amp;nbsp; Peter Koltl&amp;nbsp; to 2044418Puts post, at the bottom, states a probable cause to what may be happening.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt; &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Here is the output of #sh ldap server (omitted) summary&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;barra-gate#sh ldap server (omitted) summary&lt;/P&gt;&lt;P&gt;Server Information for (omitted)&lt;/P&gt;&lt;P&gt;================================&lt;/P&gt;&lt;P&gt;Server name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : (omitted)&lt;/P&gt;&lt;P&gt;Server IP&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : (omitted)&lt;/P&gt;&lt;P&gt;Server listening Port&amp;nbsp;&amp;nbsp; :3268&lt;/P&gt;&lt;P&gt;Bind Root-dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :CN=(omitted),CN=Users,DC=(omitted),DC=(omitted),DC=com&lt;/P&gt;&lt;P&gt;Server mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Non-Secure&lt;/P&gt;&lt;P&gt;Cipher Suite&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :0x00&lt;/P&gt;&lt;P&gt;Authentication Seq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Bind/Compare password first. Search next&lt;/P&gt;&lt;P&gt;Authentication Procedure:Bind with user password&lt;/P&gt;&lt;P&gt;Base-Dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :CN=Users,DC=(omitted),DC=(omitted),DC=com&lt;/P&gt;&lt;P&gt;Object Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :top&lt;/P&gt;&lt;P&gt;Attribute map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :ldap-username-map&lt;/P&gt;&lt;P&gt;Request timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :30&lt;/P&gt;&lt;P&gt;No. of active connections&amp;nbsp;&amp;nbsp; :10&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate the help in resolving this. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 31 Aug 2013 19:44:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330416#M13</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-08-31T19:44:20Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330417#M14</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I can see above you are using an older code of the ISR ScanSafe connector 15.0 however our engineering team recommends using the code 15.15.3(3)M as it is the current stable release for ISR/ScanSafe Connector. Could you please upgrade to this code and check the behavior. If it's still the same, I would recommend you contact TAC for further analysis.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kush&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 10:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330417#M14</guid>
      <dc:creator>kussriva</dc:creator>
      <dc:date>2013-09-02T10:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330418#M15</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kushagra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please take a look into this TAC document 113689, titled:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H2&gt;&lt;SPAN style="font-size: 12pt;"&gt;LDAP on IOS Devices Using Dynamic Attribute Maps Configuration Example&lt;/SPAN&gt;&lt;/H2&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 17:32:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330418#M15</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-09-02T17:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330419#M16</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kushagra,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I upgraded the image, still the same behavior.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will contact TAC again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Sep 2013 23:50:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330419#M16</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-09-02T23:50:13Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330420#M17</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Joe,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm delighted that you've dug up such an old story of mine. (-: As I went through the logs I noticed the difference between your and my config. You use &lt;STRONG&gt;authentication bind-first&lt;/STRONG&gt; command which results in:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;051653: Aug 23 23:10:34.983 BRST: LDAP: First Task: Send bind req&lt;/P&gt;&lt;P&gt;051654: Aug 23 23:10:34.983 BRST: LDAP: Authentication policy: bind-first&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;while my log is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;*Oct 28 09:40:25.903: LDAP: First Task: Send search req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you should try to remove that setting as described in &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/partner/tech/tk367/technologies_configuration_example09186a0080becd1a.shtml"&gt;http://www.cisco.com/en/US/partner/tech/tk367/technologies_configuration_example09186a0080becd1a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will you please edit your post to correct my name spelling? (To help web search engines)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 07 Sep 2013 20:03:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330420#M17</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-09-07T20:03:37Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330421#M18</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My apologies for the mispelling, it has been corrected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I came across that very same document and jumped with joy "I found a solution!"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After upgrading the IOS and removing authentication bind-first, it still failed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could possibly be happening? I have gone through your document in your site, Cisco documents, tons of captures, and still cannot get it to work. The strange thing is, it used to work. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate any help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 22:46:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330421#M18</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-09-10T22:46:20Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330422#M19</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then please copy here the new debugs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may also want to contact Scansafe center to check the account permissions and their logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you tried to connect with a graphical LDAP browser?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Sep 2013 13:13:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330422#M19</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-09-11T13:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330423#M20</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Output of sh ldap server summary and debug outpout of ldap debug all with authentication bind-first removed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Content removed in bold face.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh ldap server &lt;STRONG&gt;fqdn&lt;/STRONG&gt; summary&lt;/P&gt;&lt;P&gt;Server Information for &lt;STRONG&gt;fqdn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;================================&lt;/P&gt;&lt;P&gt;Server name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&lt;STRONG&gt;fqdn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Server Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : &lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Server listening Port&amp;nbsp;&amp;nbsp; :3268&lt;/P&gt;&lt;P&gt;Bind Root-dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :CN=&lt;STRONG&gt;x&lt;/STRONG&gt;,CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com&lt;/P&gt;&lt;P&gt;Server mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Non-Secure&lt;/P&gt;&lt;P&gt;Cipher Suite&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :0x00&lt;/P&gt;&lt;P&gt;Authentication Seq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Search first. Then Bind/Compare password next&lt;/P&gt;&lt;P&gt;Authentication Procedure:Bind with user password&lt;/P&gt;&lt;P&gt;Base-Dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com&lt;/P&gt;&lt;P&gt;Object Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :top&lt;/P&gt;&lt;P&gt;Attribute map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :ldap-username-map&lt;/P&gt;&lt;P&gt;Request timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :30&lt;/P&gt;&lt;P&gt;No. of active connections&amp;nbsp;&amp;nbsp; :2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debug output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;resultCode 1 (Operations Error) underlined.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107934: Oct 25 10:30:18.586 BRST: LDAP: LDAP: Queuing AAA request 0 for processing&lt;/P&gt;&lt;P&gt;107935: Oct 25 10:30:18.586 BRST: LDAP: Received queue event, new AAA request&lt;/P&gt;&lt;P&gt;107936: Oct 25 10:30:18.586 BRST: LDAP: LDAP authentication request&lt;/P&gt;&lt;P&gt;107937: Oct 25 10:30:18.586 BRST: LDAP: Invalid hash index 512, nothing to remove&lt;/P&gt;&lt;P&gt;107938: Oct 25 10:30:18.586 BRST: LDAP: New LDAP request&lt;/P&gt;&lt;P&gt;107939: Oct 25 10:30:18.586 BRST: LDAP: Attempting first&amp;nbsp; next available LDAP server&lt;/P&gt;&lt;P&gt;107940: Oct 25 10:30:18.586 BRST: LDAP: Got next LDAP server: &lt;STRONG&gt;fqdn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;107941: Oct 25 10:30:18.586 BRST: LDAP: Free connection not available. Open a new one.&lt;/P&gt;&lt;P&gt;107942: Oct 25 10:30:18.586 BRST: LDAP: Opening ldap connection ( &lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;, 3268 )ldap_open&lt;/P&gt;&lt;P&gt;ldap_init libldap 4.5 18-FEB-2000&lt;/P&gt;&lt;P&gt;open_ldap_connection&lt;/P&gt;&lt;P&gt;ldap_connect_to_host: &lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;:3268&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107943: Oct 25 10:30:18.586 BRST: LDAP: socket open success 3&lt;/P&gt;&lt;P&gt;107944: Oct 25 10:30:18.586 BRST: LDAP: socket 3 - connecting to &lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt; (3268)&lt;/P&gt;&lt;P&gt;107945: Oct 25 10:30:18.586 BRST: LDAP: socket 3 - connection in progress&lt;/P&gt;&lt;P&gt;107946: Oct 25 10:30:18.586 BRST: LDAP: socket 3 - got local address&lt;STRONG&gt; x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;107947: Oct 25 10:30:18.586 BRST: LDAP: Connection on socket 3&lt;/P&gt;&lt;P&gt;107948: Oct 25 10:30:18.586 BRST: LDAP: Connection to LDAP server &lt;STRONG&gt;(fqdn , x.x.x.x)&lt;/STRONG&gt; attempted&lt;/P&gt;&lt;P&gt;107949: Oct 25 10:30:18.586 BRST: LDAP: Connection state: DOWN =&amp;gt; CONNECTING&lt;/P&gt;&lt;P&gt;107950: Oct 25 10:30:18.586 BRST: LDAP: LDAP request saved. Will be served after Root Bind is done.&lt;/P&gt;&lt;P&gt;107951: Oct 25 10:30:18.586 BRST: LDAP: LDAP request successfully processed&lt;/P&gt;&lt;P&gt;107952: Oct 25 10:30:18.586 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;107953: Oct 25 10:30:18.586 BRST: LDAP: Process socket event for socket = 3&lt;/P&gt;&lt;P&gt;107954: Oct 25 10:30:18.586 BRST: LDAP: Conn Status = 1&lt;/P&gt;&lt;P&gt;107955: Oct 25 10:30:18.586 BRST: LDAP: Non-TLS read event on socket 3&lt;/P&gt;&lt;P&gt;107956: Oct 25 10:30:18.586 BRST: LDAP: Found socket ctx&lt;/P&gt;&lt;P&gt;107957: Oct 25 10:30:18.586 BRST: LDAP: Making socket conn up&lt;/P&gt;&lt;P&gt;107958: Oct 25 10:30:18.586 BRST: LDAP: Notify the protocol codeldap_open successful&lt;/P&gt;&lt;P&gt;Notify LDAP main if it has to initiate any bind requests&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107959: Oct 25 10:30:18.586 BRST: LDAP: Protocol received transport up notication&lt;/P&gt;&lt;P&gt;107960: Oct 25 10:30:18.586 BRST: LDAP: Transport UP notification for &lt;STRONG&gt;fqdn&lt;/STRONG&gt;/3&lt;/P&gt;&lt;P&gt;107961: Oct 25 10:30:18.586 BRST: LDAP: Connection state: CONNECTING =&amp;gt; UP&lt;/P&gt;&lt;P&gt;107962: Oct 25 10:30:18.586 BRST: LDAP: Set socket=3 to non blocking mode&lt;/P&gt;&lt;P&gt;107963: Oct 25 10:30:18.586 BRST: LDAP: Performing Root-Dn bind operationldap_req_encode&lt;/P&gt;&lt;P&gt;Doing socket write&lt;/P&gt;&lt;P&gt;107964: Oct 25 10:30:18.586 BRST: LDAP: Root Bind on CN=&lt;STRONG&gt;x&lt;/STRONG&gt;,CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com initiated.&lt;/P&gt;&lt;P&gt;107965: Oct 25 10:30:18.586 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;107966: Oct 25 10:30:19.130 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;107967: Oct 25 10:30:19.130 BRST: LDAP: Process socket event for socket = 3&lt;/P&gt;&lt;P&gt;107968: Oct 25 10:30:19.130 BRST: LDAP: Conn Status = 4&lt;/P&gt;&lt;P&gt;107969: Oct 25 10:30:19.130 BRST: LDAP: Non-TLS read event on socket 3&lt;/P&gt;&lt;P&gt;107970: Oct 25 10:30:19.130 BRST: LDAP: Found socket ctx&lt;/P&gt;&lt;P&gt;107971: Oct 25 10:30:19.130 BRST: LDAP: Receive event: read=1, errno=11 (Resource temporarily unavailable)&lt;/P&gt;&lt;P&gt;107972: Oct 25 10:30:19.130 BRST: LDAP: Passing the client ctx=18646C08ldap_result&lt;/P&gt;&lt;P&gt;wait4msg (timeout 0 sec, 1 usec)&lt;/P&gt;&lt;P&gt;ldap_select_fd_wait (select)&lt;/P&gt;&lt;P&gt;ldap_read_activity lc 0x186CE1B8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing socket read&lt;/P&gt;&lt;P&gt;LDAP-TCP:Bytes read = 110&lt;/P&gt;&lt;P&gt;ldap_match_request succeeded for msgid 1 h 0&lt;/P&gt;&lt;P&gt;changing lr 0x112281A0 to COMPLETE as no continuations&lt;/P&gt;&lt;P&gt;removing request 0x112281A0 from list as lm 0x18638280 all 0&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107973: Oct 25 10:30:19.130 BRST: LDAP: LDAP Messages to be processed: 1&lt;/P&gt;&lt;P&gt;107974: Oct 25 10:30:19.130 BRST: LDAP: LDAP Message type: 97&lt;/P&gt;&lt;P&gt;107975: Oct 25 10:30:19.130 BRST: LDAP: Got ldap transaction context from reqid 32ldap_parse_result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107976: Oct 25 10:30:19.130 BRST: LDAP: resultCode:&amp;nbsp;&amp;nbsp;&amp;nbsp; 49&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Invalid credentials)&lt;/P&gt;&lt;P&gt;107977: Oct 25 10:30:19.130 BRST: LDAP: Received Bind Response&lt;/P&gt;&lt;P&gt;107978: Oct 25 10:30:19.130 BRST: LDAP: Received Root Bind Response ldap_parse_result&lt;/P&gt;&lt;P&gt;ldap_err2string&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107979: Oct 25 10:30:19.130 BRST: LDAP: Ldap Result Msg: FAILED:Invalid credentials, Result code =49&lt;/P&gt;&lt;P&gt;107980: Oct 25 10:30:19.130 BRST: LDAP: Failed to do Root Bind on CN=&lt;STRONG&gt;x&lt;/STRONG&gt;,CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com. Bind anonymous&lt;/P&gt;&lt;P&gt;107981: Oct 25 10:30:19.130 BRST: LDAP: Transaction context removed from list [ldap reqid=32]&lt;/P&gt;&lt;P&gt;107982: Oct 25 10:30:19.130 BRST: LDAP: LDAP authentication request in ldap_transitQ&lt;/P&gt;&lt;P&gt;107983: Oct 25 10:30:19.130 BRST: LDAP: First Task: Send search req&lt;/P&gt;&lt;P&gt;107984: Oct 25 10:30:19.130 BRST: LDAP: Dynamic map configured&lt;/P&gt;&lt;P&gt;107985: Oct 25 10:30:19.130 BRST: LDAP: Dynamic map found for aaa type=username&lt;/P&gt;&lt;P&gt;107986: Oct 25 10:30:19.130 BRST: LDAP: Ldap Search Req sent&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ld&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 409234440&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; base dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; scope&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; filter&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (&amp;amp;(objectclass=top)(sAMAccountName=&lt;STRONG&gt;userid&lt;/STRONG&gt;))ldap_req_encode&lt;/P&gt;&lt;P&gt;put_filter "(&amp;amp;(objectclass=top)(sAMAccountName=&lt;STRONG&gt;userid)&lt;/STRONG&gt;)"&lt;/P&gt;&lt;P&gt;put_filter: AND&lt;/P&gt;&lt;P&gt;put_filter_list "(objectclass=top)(sAMAccountName=&lt;STRONG&gt;userid&lt;/STRONG&gt;)"&lt;/P&gt;&lt;P&gt;put_filter "(objectclass=top)"&lt;/P&gt;&lt;P&gt;put_filter: simple&lt;/P&gt;&lt;P&gt;put_filter "(sAMAccountName=&lt;STRONG&gt;userid&lt;/STRONG&gt;)"&lt;/P&gt;&lt;P&gt;put_filter: simple&lt;/P&gt;&lt;P&gt;Doing socket write&lt;/P&gt;&lt;P&gt;107987: Oct 25 10:30:19.130 BRST: LDAP: lctx conn index = 3&lt;/P&gt;&lt;P&gt;107988: Oct 25 10:30:19.130 BRST: LDAP:&amp;nbsp; LDAP search request sent successfully (reqid:33)&lt;/P&gt;&lt;P&gt;107989: Oct 25 10:30:19.130 BRST: LDAP: Sent transit request to serverldap_msgfree&lt;/P&gt;&lt;P&gt;ldap_result&lt;/P&gt;&lt;P&gt;wait4msg (timeout 0 sec, 1 usec)&lt;/P&gt;&lt;P&gt;ldap_select_fd_wait (select)&lt;/P&gt;&lt;P&gt;ldap_err2string&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107990: Oct 25 10:30:19.130 BRST: LDAP: Finished processing ldap msg, Result:Success&lt;/P&gt;&lt;P&gt;107991: Oct 25 10:30:19.130 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;107992: Oct 25 10:30:19.634 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;107993: Oct 25 10:30:19.634 BRST: LDAP: Process socket event for socket = 3&lt;/P&gt;&lt;P&gt;107994: Oct 25 10:30:19.634 BRST: LDAP: Conn Status = 4&lt;/P&gt;&lt;P&gt;107995: Oct 25 10:30:19.634 BRST: LDAP: Non-TLS read event on socket 3&lt;/P&gt;&lt;P&gt;107996: Oct 25 10:30:19.634 BRST: LDAP: Found socket ctx&lt;/P&gt;&lt;P&gt;107997: Oct 25 10:30:19.634 BRST: LDAP: Receive event: read=1, errno=11 (Resource temporarily unavailable)&lt;/P&gt;&lt;P&gt;107998: Oct 25 10:30:19.634 BRST: LDAP: Passing the client ctx=18646C08ldap_result&lt;/P&gt;&lt;P&gt;wait4msg (timeout 0 sec, 1 usec)&lt;/P&gt;&lt;P&gt;ldap_select_fd_wait (select)&lt;/P&gt;&lt;P&gt;ldap_read_activity lc 0x186CE1B8&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Doing socket read&lt;/P&gt;&lt;P&gt;LDAP-TCP:Bytes read = 174&lt;/P&gt;&lt;P&gt;ldap_match_request succeeded for msgid 2 h 0&lt;/P&gt;&lt;P&gt;changing lr 0x11619AE8 to COMPLETE as no continuations&lt;/P&gt;&lt;P&gt;removing request 0x11619AE8 from list as lm 0x18638280 all 0&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;ldap_msgfree&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;107999: Oct 25 10:30:19.634 BRST: LDAP: LDAP Messages to be processed: 1&lt;/P&gt;&lt;P&gt;108000: Oct 25 10:30:19.634 BRST: LDAP: LDAP Message type: 101&lt;/P&gt;&lt;P&gt;108001: Oct 25 10:30:19.634 BRST: LDAP: Got ldap transaction context from reqid 33ldap_parse_result&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;108002: Oct 25 10:30:19.634 BRST: LDAP: &lt;SPAN style="text-decoration: underline;"&gt;resultCode:&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (Operations error)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;108003: Oct 25 10:30:19.634 BRST: LDAP: Received Search Response resultldap_parse_result&lt;/P&gt;&lt;P&gt;ldap_err2string&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;108004: Oct 25 10:30:19.634 BRST: LDAP: Ldap Result Msg: FAILED:Operations error, Result code =1&lt;/P&gt;&lt;P&gt;108005: Oct 25 10:30:19.634 BRST: LDAP: LDAP Search operation result : failedldap_msgfree&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;108006: Oct 25 10:30:19.634 BRST: LDAP: Closing transaction and reporting error to AAA&lt;/P&gt;&lt;P&gt;108007: Oct 25 10:30:19.634 BRST: LDAP: Transaction context removed from list [ldap reqid=33]&lt;/P&gt;&lt;P&gt;108008: Oct 25 10:30:19.634 BRST: LDAP: Notifying AAA: REQUEST FAILED&lt;/P&gt;&lt;P&gt;108009: Oct 25 10:30:19.634 BRST: LDAP: Received socket event&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; Thank You!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 14:52:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330423#M20</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-10-25T14:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330424#M21</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peter,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had updated the IOS to the latest version, and removed the bind authenticate root-dn and authenticate bind-first, now my test userid is not being rejected and yielding all the groups my test userid belongs to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As you can see from the debug log above, it was first yielding a bind error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, according to SS Solution Guide, it goes against what should be configured. Even though there is no rejection, still it is incorrect, right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ldap server for SS summary:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#sh ldap server &lt;STRONG&gt;fqdn&lt;/STRONG&gt; summary&lt;/P&gt;&lt;P&gt;Server Information for &lt;STRONG&gt;fqdn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;================================&lt;/P&gt;&lt;P&gt;Server name&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&lt;STRONG&gt;fqdn&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Server Address&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :&lt;STRONG&gt;x.x.x.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Server listening Port&amp;nbsp;&amp;nbsp; :3268&lt;/P&gt;&lt;P&gt;Server mode&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Non-Secure&lt;/P&gt;&lt;P&gt;Cipher Suite&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :0x00&lt;/P&gt;&lt;P&gt;Authentication Seq&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :Search first. Then Bind/Compare password next&lt;/P&gt;&lt;P&gt;Authentication Procedure:Bind with user password&lt;/P&gt;&lt;P&gt;Base-Dn&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :CN=Users,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=&lt;STRONG&gt;x&lt;/STRONG&gt;,DC=com&lt;/P&gt;&lt;P&gt;Object Class&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :top&lt;/P&gt;&lt;P&gt;Attribute map&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :ldap-username-map&lt;/P&gt;&lt;P&gt;Request timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; :30&lt;/P&gt;&lt;P&gt;No. of active connections&amp;nbsp;&amp;nbsp; : 0 &lt;/P&gt;&lt;P&gt;---------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The debug log is too big to add here, but it is not doing the root binding. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Oct 2013 15:49:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330424#M21</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-10-25T15:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330425#M22</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok, and what does Scansafe center say? This seems to be a bind/auth error due to bad credentials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you connect with a graphical LDAP browser?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 27 Oct 2013 21:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330425#M22</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2013-10-27T21:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Scansafe ldap resultCode: 49 Invalid Credentials. Default us</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330426#M23</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have used ldapadmin and phpldapadmin successfully. I connected with the scansafe specific user created just for scansafe purposes and successfully ran queries.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, I noticed an odd behavior in the ISR. Today, the "test aaa group ...userid..." is failing, but I made an observation and conclusion.&lt;/P&gt;&lt;P&gt;I added back the bind authenticate root-dn and authenticate bind-first code back into the ldap server. Bringing the SS code back to the default config. I concluded that userids that have a CN in AD that consists of First Name Last Name (such as "John Doe") , fail. Those that consist of only 1 word (such as "test"), succeed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, then I removed them again, like I did on the Oct. 25th, and the tests return successfully. And that is even for those with 2 names in their CN. But, after running several successful tests, it begans to reject! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And note, the attribute map is there. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ldap attribute-map ldap-username-map&lt;/P&gt;&lt;P&gt; map type sAMAccountName username&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a case open with TAC LDAP but my work travel schedule this year was very demanding and kept elongating the open status of the case. Plus, simulating the problem was rather perplexing because the code itself is nearly identical to the SS recommended config. The engineer was excellent and helpful, but me being overseas took a toll on time.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2013 19:17:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330426#M23</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2013-10-28T19:17:56Z</dc:date>
    </item>
    <item>
      <title>Scansafe ldap resultCode: 49 Invalid Credentials. Default usergr</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330427#M24</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had this issue but managed to resolve it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue was with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;bind authenticate root-dn &lt;SPAN style="font-size: 10pt;"&gt;CN=&lt;LDAP_ACCESS_USERNAME&gt;,CN=Users,DC=mydomain,DC=com password &lt;LDAP_ACCESS_PASSWORD&gt;&lt;/LDAP_ACCESS_PASSWORD&gt;&lt;/LDAP_ACCESS_USERNAME&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;SPAN style="font-size: 10pt;"&gt;&lt;LDAP_ACCESS_USERNAME&gt; is the &lt;STRONG&gt;Display Name&lt;/STRONG&gt; i.e. (FirstName and Last Name) of the user in AD, and this has to have &lt;STRONG&gt;NO SPACES&lt;/STRONG&gt;.&amp;nbsp; For example I created a user with a &lt;STRONG&gt;Display Name &lt;/STRONG&gt;called &lt;STRONG&gt;ScansafeAdmin&lt;/STRONG&gt;.&lt;/LDAP_ACCESS_USERNAME&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Oncre the binding takes place, you can use the following test:for any other user in your LDAP/AD.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test aaa group &lt;LDAP group="" name=""&gt; &lt;USERID&gt; &lt;PWD&gt; new-code&lt;/PWD&gt;&lt;/USERID&gt;&lt;/LDAP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;where &lt;SPAN style="font-size: 10pt;"&gt;&lt;USERID&gt; is the User &lt;STRONG&gt;Login Name&lt;/STRONG&gt; in AD not the &lt;STRONG&gt;Display Name i.e. in my case the Login Name was scansafe&lt;/STRONG&gt;&lt;/USERID&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I also removed the following command &lt;STRONG style="background-color: #f7fafb; border-collapse: collapse; font-size: 12px; list-style: none; font-family: Arial, verdana, sans-serif;"&gt;authentication bind-first&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Dec 2013 11:53:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330427#M24</guid>
      <dc:creator>inderpalsogi</dc:creator>
      <dc:date>2013-12-17T11:53:24Z</dc:date>
    </item>
    <item>
      <title>Never got this fixed.</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330428#M25</link>
      <description>&lt;P&gt;Never got this fixed. Management pulled the plug on this service. This issue goes back to when Cisco acquired Scansafe, possibly there is better documentation and assistance today. Hopefully someone can post a solution after going through a similiar issue.&lt;/P&gt;</description>
      <pubDate>Sun, 31 May 2015 19:12:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330428#M25</guid>
      <dc:creator>Joe Lourenco</dc:creator>
      <dc:date>2015-05-31T19:12:24Z</dc:date>
    </item>
    <item>
      <title>get it solved.</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330429#M26</link>
      <description>&lt;P&gt;get it solved.&lt;/P&gt;
&lt;P&gt;my env:&lt;/P&gt;
&lt;P&gt;3925 with ios 154-3.M1&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;my config:&lt;/P&gt;
&lt;P&gt;XXX1#sh run | se ldap&lt;BR /&gt;aaa group server ldap AAA-LDAP&lt;BR /&gt;&amp;nbsp;server DC1&lt;BR /&gt;ldap attribute-map MAP-LDAP&lt;BR /&gt;&amp;nbsp;map type sAMAccountName username&lt;BR /&gt;ldap server DC1&lt;BR /&gt;&amp;nbsp;ipv4 192.168.17.3&lt;BR /&gt;&amp;nbsp;attribute map MAP-LDAP&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;bind authenticate root-dn administrator password XXX&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;base-dn DC=XXX,DC=com,DC=cn&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;my test:&lt;/P&gt;
&lt;P&gt;XXX1# test aaa group AAA-LDAP USERNAME PASSWORD&amp;nbsp;new-code &lt;BR /&gt;User successfully authenticated&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;2 years ago i had deployed ASA with IPSEC VPN against LDAP, that grammar on ASA was&lt;/P&gt;
&lt;P&gt;&amp;nbsp;ldap-login-dn administrator&lt;/P&gt;
&lt;P&gt;it worked well. but unlike any examples on the forums, there was no CN nor&amp;nbsp;DC, not at all....&lt;/P&gt;
&lt;P&gt;THIS&amp;nbsp;IS A SAD STORY.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2016 16:24:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330429#M26</guid>
      <dc:creator>liling8888</dc:creator>
      <dc:date>2016-01-01T16:24:52Z</dc:date>
    </item>
    <item>
      <title>Hi Joe,</title>
      <link>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330430#M27</link>
      <description>&lt;P&gt;Hi Joe,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;If you are still experiencing this issue, I think it would be very beneficial if you would open up a TAC case on the issue so that it can be properly investigated in depth. Please do so, and our engineers will be more than happy to assist you.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Sincerely,&lt;/P&gt;
&lt;P&gt;Edan Mudachi&lt;/P&gt;</description>
      <pubDate>Fri, 01 Jan 2016 21:38:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/cloud-security/cloud-web-security-formerly-scansafe-ldap-resultcode-49-invalid/m-p/2330430#M27</guid>
      <dc:creator>Edan Mudachi</dc:creator>
      <dc:date>2016-01-01T21:38:44Z</dc:date>
    </item>
  </channel>
</rss>

