Users failed to login to TS agent and Terminal server network connection loss after installing TS agent?
I am using the ASA with Firepower service managed by FMC. I have integrated FMC with LDAP,
I have installed TS agent in the AD server for the user identification of RDP terminal server and can assign Access policy to the RDP users.
But the problem is that , our server administrator complaints that after installing the TS agent it enables the "internet connection sharing" on the server and that causes connection loss between users and RDP server. I also checked the TS agent settings there is no option of internet connection sharing.
Also users are getting failed to login to TS agent, So on Ts agent i am getting login failed for every users.
can anyone tell does this TS agent causes this type of issue.
Did you ever find out a resolution to your problem? I'm not sure if the problem I'm having is the exact same issue. When it is running, it runs good, but at least once a week, it does not allow a login to the Terminal Server. I also see DNS error event 13 happening. If I remove the agent, the thin clients, rds users, and no Event 13 issues.
I do have a few ports configured in the agent that are set for our AS/400 Server. I'm starting to think that this may be what is causing the issue. Maybe I don't need the AS400 ports listed since it's another server. We do run a few AS400 terminal server applications.
Does anyone know if this can cause DNS errors with the domain controller?
It seems like there is not too much forum support on this Terminal Server Agent. When it's working, it works great.
Once you've expanded Cisco Secure Endpoint connector deployment to about 50% of your licensed count (check out this article that shows you how to do that), it's time to put those connectors to action i.e. convert them to Protect from Audit mode for vari...
Hello! I’m Betsy, UX Researcher, on the Cisco+ Secure Connect Now team. Nice to meet you all .We have a short survey to learn about your Zero Trust Network Access (ZTNA) journey. Whether you have, plan to, or have not implemented a ...
A set of interface access rules can cause the Cisco Adaptive Security Appliance to permit or deny a designated host to access another particular host with a specific network application (service). When there is only one client, one host and one se...
How To: Cisco ISE Captive Portals with Aruba Wireless
Authors: Adam Hollifield, Brad Johnson
IntroductionPrerequisitesMinimum RequirementsComponents UsedConfigurationAruba Wireless ControllerWLAN CreationAuthentication ConfigurationRole & Policy Confi...
Ready to learn more about SecureX? Our Cisco security expert @Juan Ponce Dominguez reviews the features and benefits of SecureX, as well as a product demo covering:
Customising SecureX dashboards to create a single pane, unified visibility