Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

SATC - Mostly Not Working

Hello All,

My implementation of SATC is not working and I've run to the limit of my ability to diagnose the problem.

Any help in diagnosing this to a resolution would be appreciated!

Here's what data I have to offer.

Environment:

     Terminal Server: MS Server 2012R2

     SATC version: 2.0.6.0

     Firewall: XG virtual machine (VMware): SFOS 16.01.2

The logs copied below reflect the following scenario:

1) SATC Start - 10:28:41

2 SATC sends a UDP packet on port 6060 to the firewall

- tcpdump on the firewall shows the firewall receiving the packet

3) A user logs into this TS at 10:29:10

4) The user logs out of this TS at 10:31:40

5 STAC Stop - 10:33:14

******Logging Events Log File*******
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : -------------------------- Logging Events --------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
 
******SatcSvr Log File*******
MSG [0x17d8] 2017-01-31 10:28:41 : ------------BEGINING------------------------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : ----------- Sophos AUTHENTICED THIN CLIENT -----------------------
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : -------------------------- Logging Events --------------------------
MSG [0x17d8] 2017-01-31 10:28:41 : --------------------------------------------------------------------
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #1
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #2
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #3
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #4
DEBUG [0x17d8] 2017-01-31 10:28:41 : Ini file path: C:\\Program Files\\Sophos\\Sophos Authenticated Thin Client\\SATC.ini
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #5
DEBUG [0x17d8] 2017-01-31 10:28:41 :  SophosPort:6060
DEBUG [0x17d8] 2017-01-31 10:28:41 :  Log File Size:25 MB(s)
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #6
DEBUG [0x17d8] 2017-01-31 10:28:41 :  SophosIP:10.1.254.245
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #7
DEBUG [0x17d8] 2017-01-31 10:28:41 :  TimeInterval:180 sec
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #8
DEBUG [0x17d8] 2017-01-31 10:28:41 :  MaxUsers:8100
ERROR [0x17d8] 2017-01-31 10:28:41 : PLACE #9
DEBUG [0x17d8] 2017-01-31 10:28:41 : SATCService Name Ini file path: C:\\Program Files\\Sophos\\Sophos Authenticated Thin Client\\SATCName.ini
DEBUG [0x17d8] 2017-01-31 10:28:41 : Sending flush to CR.
DEBUG [0x17d8] 2017-01-31 10:28:41 : UDP Packet sent to Sophos. Bytes Sent: 1
DEBUG [0x1b80] 2017-01-31 10:31:41 : Enumerating Windows Session
DEBUG [0x1b80] 2017-01-31 10:31:41 : GetSessionData::THRDB[sessionID]=TRUE for 1
DEBUG [0x1b80] 2017-01-31 10:31:41 : GetSessionData::THRDB[sessionID]=TRUE for 2
DEBUG [0x1b80] 2017-01-31 10:31:41 : GetSessionData::THRDB[sessionID]=TRUE for 4
DEBUG [0x1b80] 2017-01-31 10:31:41 : GetSessionData::THRDB[sessionID]=TRUE for 10
DEBUG [0x1b80] 2017-01-31 10:31:41 : Checking for Sending LogOff
DEBUG [0x1b80] 2017-01-31 10:31:41 : Max Session ID: 0
ERROR [0x17d8] 2017-01-31 10:33:14 : Error: Not overlapped i/o or server stop signaled!
DEBUG [0x17d8] 2017-01-31 10:33:14 : At Cleanup: Clearing memory and closing pipe


This thread was automatically locked due to age.
  • Thanks for the suggestion Sachin. I've been exhaustively through the Forums and KB and unfortunately, you wont find anything in them that I have not already seen/used.

    Since my company is a Sophos reseller, I'm going to open a ticket with Sophos Support when I get some time to dedicate to this once again. I'll contribute back to this Forum once I get a resolution.

     

    Regards,

     

    Gary

  • Hi Gary,

    Provide me the case# so that I can take a look into it. 

    Thanks

  • Hello Gary,

    I had exactly the same problem, and "the problem" is that you are using Windows Server 2012 R2. This version of Windows Server as a basic form of authentication uses the Kerberos protocol. All previous versions of Windows Server as the basic form for authentication using NTLM protocol.

    The fix for this problem is very simple, please see to this link https://community.sophos.com/products/xg-firewall/f/authentication/83357/stas-problem-with-user-authentication-on-xg-v16 . I added my comment with the screen from the Group Policy Management Editor. This configuration for the Kerberos protocol auditing solved these problems.

    Do this configuration, and the problem it solves.

    alda

     

    P.S. Please write here if this configuration really helped to you. I asked Sophos to add this configuration to the KB, but until now they did not add this into the KB!

  • Hi Alda,

    Thanks for the response and the suggestion.


    Before I start making further changes to the security GPO's on my domain can you once  confirm that the problem you were having was with SATC rather than STAS?

    Part of what is described in the link you mentioned was done when STAS was configured. Specifically, within the Default Domain Controllers Policy. However, that particular policy remains un-configured for the Default Domain Policy. My STAS implementation is working just fine.

    Since the SATC is installed on a non-production Terminal Services server, I edited the local policy such that Logon/Logoff Audit for Success/Failure are now configured. It made no difference to my problem.

     

    Gary

  • Here you go!

    22357282

     

    Thanks!

  • Hello Gary,

    the configuration for the Kerberos protocol ( or Advanced Audit Policy Configuration  by Microsoft tongue ) that I did  ( and that I still use in our MS Active Directory domain ) is important for the STAS but for the SATC too. If you have in your MS Active Directory domain at least one Windows Server 2012 R2 or Windows Server 2016 you have to configure the Advanced Audit Policy Configuration ( or Kerberos protocol auditing ).  

    The STAS is needed for authorization all users who work directly on any desktop or notebook, directly at their console. But for any other users connected to a MS Terminal Server or any users connected by RDS protocol to any desktop you have to use the SATC authetnication agent. What is according to your description and configuration your case too, I think.

    In online manual for XG Single Sign-On clients you could read:

    Sophos Authentication for Thin Client (STAC) - Enables transparent authentication for users in Citrix or Terminal Services Environment whereby network credentials can be used to authenticate and the user has to login only once to access network resources.

    By this is meant a Windows Terminal Server or any connection to any desktop by RDS protocol. And, of course, you have to install into any Terminal Server client environment ( or any desktop with RDS access ) the Sophos Authentication For Thin Client (SATC) from XG Single Sign-On menu. 

    What is also equally important, is the activation of this configuration by command " gpupdate / force " on all domain controllers. 

     

    alda

  • Hi Alda,

    Thanks for all your efforts. However, this hasn't changed the behavior of SATC in any way.

    I've made the changes as suggested to the relevant GPO's on both of my DC's. Did 'gpupdate /force' on both DC's plus on the TS that I'm working on. I've even rebooted the TS just to be sure.

    The only thing I haven't done is to uninstall SATC then reinstall it. I'll try that later this day.

     

     

  • Hi Gary,

    The case# do not exists.

    Thanks

  • Sorry Sachin, that was the Activity ID that I sent you.

    Support ticket # is 7019323

  • I've uninstalled then re-installed SATC.

    No change to behavior. SATC is not able to enumerate logon/logoff incidents. If the logs are to be believed, it never sees a logon or logoff.