Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Web filtering not picking up user

Authentication logs show the user is authenticated correctly

However when browsing, the web filter doesn't pick up the user, so therefore doesn't apply the right policies

Any ideas where to look?



This thread was automatically locked due to age.
Parents Reply
  • STAS? If you have a terminal server, STAS should exclude this terminal server. Essentially the best way is always to have one mechanism per client. So exclude in STAS your terminal servers. 

    __________________________________________________________________________________________________________________

Children
  • Excluded terminal server from STAS but still not picking up logged in user

  • Do you see any AD SSO authentication requests in authentication log? 

    __________________________________________________________________________________________________________________

  • I can't see anything at all in the authentication log - it just sits there with the wheel spinning forever and nothing loads

  • So likely there is no entry? Could the NASM be dead in your scenario? You should check access_server.log and nasm.log if you see any problems there. 

    __________________________________________________________________________________________________________________

  • Don't really know what I'm looking at, but here they are

    nasm.log:

    SFV1C4_AZ01_SFOS 19.0.0 GA-Build317# tail nasm.log                              
    Jun 04 13:57:47.107957Z  [ntlmserver]  fasm_processor(): AD channel is UP so inf
    orming client now                                                               
    Jun 04 13:57:47.107994Z  [ntlmserver]  inform_channel_status(): sumit DATA to pr
    oxy='0 0 0 0 0 0 0 0 5 8 0 0 '                                                  
    Jun 04 13:57:47.108000Z  [ntlmserver]  inform_channel_status(): informing channe
    l status to http proxy, channel status=1                                        
    Jun 04 13:57:47.108003Z  [ntlmserver]  fasm_processor(): AD channel is UP so inf
    orming client now                                                               
    Jun 04 13:57:47.108438Z  [ntlmserver]  inform_channel_status(): sumit DATA to pr
    oxy='0 0 0 0 0 0 0 0 5 8 0 0 '                                                  
    Jun 04 13:57:47.108450Z  [ntlmserver]  inform_channel_status(): informing channe
    l status to http proxy, channel status=1                                        
    Jun 04 13:57:47.108454Z  [ntlmserver]  fasm_processor(): AD channel is UP so inf
    orming client now                                                               
    Jun 04 13:57:47.108488Z  [ntlmserver]  inform_channel_status(): sumit DATA to pr
    oxy='0 0 0 0 0 0 0 0 5 8 0 0 '                                                  
    Jun 04 13:57:47.108494Z  [ntlmserver]  inform_channel_status(): informing channe
    l status to http proxy, channel status=1                                        
    Jun 04 13:57:47.108501Z  [ntlmserver]  fasm_processor(): domain informed by nasm
     is 'xxxx'                                          

    access_server.log

    SFV1C4_AZ01_SFOS 19.0.0 GA-Build317# tail access_server.log                     
    MESSAGE   Jun 05 10:09:51.572706Z [CAA]: (CA_keep_alive): Next CA batch in 45 se
    conds                                                                           
    MESSAGE   Jun 05 10:10:03.115783Z [access_server]: tlvserver_process_request: GO
    T ALERT.EXECUTE_HEARTBEAT                                                       
    MESSAGE   Jun 05 10:10:36.616862Z [CAA]: (CA_keep_alive): access_server heartbea
    t                                                                               
    MESSAGE   Jun 05 10:10:36.616883Z [CAA]: (CA_keep_alive): Next CA batch in 45 se
    conds                                                                           
    MESSAGE   Jun 05 10:11:03.396166Z [access_server]: tlvserver_process_request: GO
    T ALERT.EXECUTE_HEARTBEAT                                                       
    MESSAGE   Jun 05 10:11:21.660407Z [CAA]: (CA_keep_alive): access_server heartbea
    t                                                                               
    MESSAGE   Jun 05 10:11:21.660441Z [CAA]: (CA_keep_alive): Next CA batch in 45 se
    conds                                                                           
    MESSAGE   Jun 05 10:12:03.611785Z [access_server]: tlvserver_process_request: GO
    T ALERT.EXECUTE_HEARTBEAT                                                       
    MESSAGE   Jun 05 10:12:06.704338Z [CAA]: (CA_keep_alive): access_server heartbea
    t                                                                               
    MESSAGE   Jun 05 10:12:06.704360Z [CAA]: (CA_keep_alive): Next CA batch in 45 se
    conds                                                                 

  • Check the nasm log for anything, which looks like an error. Basically the nasm should be joining. 

    Potentially this could be an error: https://community.sophos.com/sophos-xg-firewall/sfos-v18-early-access-program/f/feedback-and-issues/117669/adsso-ntlm-bug-in-v18-eap3/426421

    __________________________________________________________________________________________________________________

  • Have run these commands but authentication log still not loading

    service -ds nosync nasm:stop
    rm -rf /content/nasm
    service -ds nosync nasm:start

  • You should not run some random comments without verifying the issue first. 

    The reporting issue seems to be a database issue with logviewer (Garner). 

    Would recommend to create a support case, so this can be verified. 

    __________________________________________________________________________________________________________________

  • According to support I have to reconfigure all my servers and set them up to use a proxy server.

    Surely this isn't required and Sophos is able to identify users just as it used to do?

  • Actually it is? 

    So to recap: 

    You can do two different things to authenticate a terminal server: 

    You can use Intercept X for Server, which uses a component like SATC. So no changes in behavior there.

    You can use no software on the server and resolve this with the explicit proxy + kerberos. This is the new feature of V19.0. See: https://docs.sophos.com/nsg/sophos-firewall/19.0/Help/en-us/webhelp/onlinehelp/AdministratorHelp/Authentication/HowToArticles/AuthenticationConfigurePerConnectionAuth/index.html#create-firewall-rules-for-multi-user-host-traffic  You can use per-connection AD SSO authentication for multi-user hosts configured to use the Firewall as a direct proxy.

    __________________________________________________________________________________________________________________

Share Feedback
×

Submitted a Tech Support Case lately from the Support Portal?