Ibf10-Setup-Guide - EN
Ibf10-Setup-Guide - EN
Also, please check with our sales partner or our representative regarding the
description of the contract, etc.
The specifications and product information contained in this manual are subject to change without notice. All representations, information, and
recommendations contained in this manual are believed to be accurate, but without warranties of any kind, express or implied. Use of the products described
in this manual is solely at the user's own risk.
Target product software The license and limited warranty are set forth in the Information Packet accompanying the product . If it is not attached, please contact
your agent.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain
version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENTATION AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED ``AS IS'' WITH ALL FAULTS. CISCO AND THE ABOVE-
NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING ALL WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. shall not be liable for any warranties provided.
In no event shall Cisco or its suppliers be liable for any indirect, consequential, incidental, or special damages, including but not limited to lost
profits or damage to data, arising out of the use of or inability to use this document. In no event shall Cisco or its suppliers be liable to you even if
Cisco or its suppliers have been advised of the possibility.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the US and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks . Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
The IP addresses used in this manual do not represent actual addresses. Examples, command output, and illustrations in the documentation are for illustrative
purposes only. Any use of actual addresses in illustrative content is unintentional and coincidental.
CONTENTS
Introduction iii
Target audience
iii
Manual organization iv
Notation iv
Latest information on the manual
Related materials
Manuals for this release v Other related manuals
v
Notice vi
How to obtain manuals and technical information supportvi _
Contents
Contents
Cisco Active Directory Agent /1.0
iv OL-25134-01-J
Installation Setup Guide, Release
Introduction
This document provides instructions for installing and configuring Cisco Active Directory Agent .
This document uses the term AD Agent to refer to Cisco Active Directory Agent .
This section describes:
• Target audience
• Manual organization
• notation
• Latest information on the manual
• Related Documents
• Notice
• How to obtain manuals and technical information support
Target audience
is intended for network administrators who use Active Directory Agent during deployment . This
manual aims to equip readers with a working knowledge of networking principles and applications,
and to It is assumed that you have experience as a system administrator.
Cisco Active Directory Agent /1.0
OL-25134-01-J iii
Installation Setup Guide, Release
Introduction
Manual organization
The topics in this manual are organized as follows:
• Introduction
• Cisco Active Directory Agent Overview
• Installing and configuring Active Directory Agent
• Active Directory Agent commands reference
• "customer log message"
• “ Windows Application event log"
注意 「要注意」の意味です。機器の損傷またはデータ損失を予防するための注意事項が記述されていま
す。
アドバイ 「時間節約
ワンポイン 」の意味です。ここに紹介している方法で作業を行うと、時間を短縮できます。
ト ス
Cisco Active Directory Agent /1.0
iv OL-25134-01-J
Installation Setup Guide, Release
はじめに
(注) 「注釈」です。次に進む前に検討する必要がある重要情報、役に立つ情報、このマニュアル以外の参照
資料などを紹介しています。
Reference URL
『 Installation and Setup Guide for the Cisco Active http://www.cisco.com/en/US/docs/security/ibf/set
Directory Agent, Release 1.0 ” up_guide/ad_agent_setup_guide.html
『
Release Notes for the Cisco Active Directory http://www.cisco.com/en/US/docs/security/ibf/rel
Agent, Release 1.0 ease_notes/ibf10_rn.html
Open Source Used in Cisco Active Directory http://www.cisco.com/en/US/docs/security/ibf/op
Agent 1.0 ” en_source_license_document/ipcentral.pdf
Introduction
Notice
All open files used in Active Directory Agent Release 1.0 sauce For license information,
http://www.cisco.com/en/US/docs/security/ibf/open_source_license_document/ipcentral.pdf Please refer to.
CHAPTER 1
Cisco Active Directory Agent Overview
Cisco Active Directory Agent ( AD Agent ) runs on a Windows machine and is an Active Directory
agent that runs on Windows machines and Controller ( DC ) monitors a collection of machines in
real time and typically Check for authentication-related events that indicate logins, recognize,
analyze, and cache IP address-to-user ID mappings in a database, and A component that makes the
latest mapping available to devices. client Device ( Cisco Adaptive Security Appliance ( ASA )
or Cisco IronPort Web Security Appliances ( such as WSA ) have up-to-date IP-to-user-identity
mapping Communicate with AD Agent using the RADIUS protocol to retrieve the set in one of the
following ways :
• On-demand: AD Agent can connect clients to specific mappings. from the device
Can respond to on-demand queries.
• bulk Download: AD Agent downloads the mappings currently in cache. Client asking for the
entire set Can respond to requests from devices.
On-demand method and bulk Both download method and client Requests from devices can be specially
tagged to indicate that they also include requests for notifications related to subsequent
updates.
For example, client When a device requests a basic on-demand query, the AD Agent responds with
the specific mapping it finds in its cache, but does not send any further updates about that
mapping. However, if the On-Demand query includes a notification request, the initial response
from the AD Agent is similar to the above, but if this particular mapping changes later, the AD
Agent will device (and any other clients that have registered for notifications) devices) to
proactively notify them of this particular mapping change.
Similarly, the client Device is basic bulk When requesting a download, the AD Agent currently
Session containing all mappings in cache Transfers a snapshot of the data, but does not send
subsequent updates. On the other hand, for replication registration requests, the initial
response from AD Agent is similar to the previous case, but later the mapping When any change is made
to the set (such as adding a new mapping or changing a particular mapping), the AD Agent device
(and any other clients that have registered for replication) devices) to proactively notify them
of changes compared to previously sent snapshots.
In addition to IPv4 addresses , the IP-to-user-identity mappings discovered, managed, and provided
by AD Agent include
Can include IPv6 addresses.
AD Agent can send logs to one or more Syslog servers.
any AD domain controller or client AD Agent continues to function even if a device fails . AD
Agent is another domain Get information from controller. However, A.D.
Agent failover will not occur. Cisco AD Agent 's built-in "watchdog" feature continuously
monitors Windows processes within AD Agent and automatically restarts them if it detects that a
process has crashed.
Figure 1-1 shows a sample Indicates the role of AD Agent in the scenario .
In this example, a user logs in from a computer and requests access to a server, which generates
web traffic. client The device intercepts web traffic and sends a RADIUS request to AD Agent asking
about the user logged into the computer . AD Agent has modern IP-to-user-identity mapping The client
manages the set and sends user information to the client. Send to device. client The device uses
the user ID information to Decide whether to grant access to the user.
AD Agent communicates with the following components in your network:
• client device
• Active Directory Domain controller machine
• Syslog server
Note: AD Agent supports up to 100 clients Devices and up to 30 domains controller machine and can internally
cache up to 64,000 IP-to-user-identity mappings.
client device
client The device actively obtains (and passively receives) the latest IP-to-user-identity mapping
from AD Agent .
client A device can obtain mappings from AD Agent in the following ways :
• Query AD Agent for each new IP
• Local across database of user IDs and IP addresses keep a copy
client The device has the latest IP-to-user-identity mapping Receives sets from the AD Agent and also
sends mapping updates learned through other mechanisms to the AD Agent . For example, an ASA device
updates AD Agent with:
• New mappings learned during web authentication fallback ( for IP addresses that AD Agent could not
map to user IDs )
OL-25134-01-J
Installation Setup Guide, Release
Cisco Active Directory Agent /1.0
1-2 OL-25134-01-J
Installation Setup Guide, Release
AD Agent runs on an Active Server running the supported Windows Server versions listed below.
Directory domain controller You can monitor up to 30 machines .
• Windows Server 2003
• Windows Server 2008
• Windows Server 2008 R2
Active Directory domain running Windows Server 2008 or Windows Server 2008 R2 controller It is
important to ensure that the appropriate Microsoft hotfixes are installed on your machine ( see “
Active Directory Requirements” on page 2-5 ) . AD Agent is a domain controller installed directly
on the machine or on the domain controller You must apply the hotfix regardless of whether you
are monitoring the machine remotely.
Similarly, each Active Directory domain controller It is important to ensure that the audit policy
on your machine allows auditing of successfully completed authentication attempt operations
(see " AD Domains in AD Agent" ). (See “Settings for acquiring information from the
controller” on P.2-9 ) .
AD Agent can monitor domains that have a trust relationship configured with the domain to which
the AD Agent machine is a member. AD Agent supports the following Active Directory structures:
• single forest, single domain
• single forest, multi domain
• multi forest
1-3
Chapter 1. Cisco Active Directory Agent Overview
Syslog server
AD Agent can forward logs containing management and troubleshooting information to one or more
Syslog servers. The contents of these logs are
Customers located in the C:\IBF\radiusServer\runtime\logs\localStore\ directory Same as log.
Syslog mechanism ensures that a target has a Syslog server running and can receive Syslog messages.
This information is delivered remotely to your machine.
OL-25134-01-J
Installation Setup Guide, Release
Cisco Active Directory Agent /1.0
1-4 OL-25134-01-J
Installation Setup Guide, Release
CHAPTER 2
Installing Active Directory Agent and
setting
Active Directory Agent is software that is packaged as a Windows installer. It's an application.
Installed on Windows machine and client You need to configure your device and AD domain
controller. This chapter consists of the following topics:
• requirements
• Installing Active Directory Agent
• Verify installed Active Directory Agent
• Uninstalling Active Directory Agent
• " Active Directory Agent Settings" ( P.2-8 )
– “ Configuring AD Agent to Send Logs to a Syslog Server” on page 2-9
– " AD Domain with AD Agent Settings for acquiring information from the controller” ( P.2-
9)
– " Client with AD Agent Settings to allow devices to obtain information from AD Agent
( P.2-12 )
requirements
This section describes the following items:
• “Hardware Requirements” ( P.2-2 )
• “Connection requirements” ( P.2-2 )
• "open Port list” ( P.2-4 )
• " Active Directory Requirements" ( P.2-5 )
Hardware requirements
To install Active Directory Agent , you need one of the following:
(注) 国際化はサポートされていません。
This AD Agent machine is the Active Directory domain you want to monitor. controller, or a separate
dedicated Windows machine.
your solution requires installing multiple AD Agent machines, please note the following:
• domain controller There is no limit to the number of AD Agent machines that are not machines .
• One domain for a given AD domain controller You can install AD Agent directly on a machine only .
In either case, the AD Agent machine is shown in Table 2-1 Must meet the minimum hardware
specification requirements listed below.
Connection requirements
For AD Agent to function properly, all client devices configured with this AD Agent , Active Directory
domain controller The machine must be able to freely communicate with the target Syslog server.
Windows Firewall (or other compatible third party) firewall software
a) is an AD Agent machine or an Active Directory domain controller Firewall on each endpoint, if
running on the machine Your software must set the necessary exceptions for free communication.
requirements
This section uses Windows Firewall as an example and details the exceptions that must be defined
on all endpoints running Windows Firewall .
• “ Windows Firewall Exceptions That Must Be Set on the AD Agent Machine ” on page 2-3
• "Separate Active Directory Domain controller Windows Firewall exceptions that must be configured
on the machine ” ( P.2-4 )
Other compatible third parties firewall For software, refer to the vendor's documentation for
instructions on how to set up the applicable exceptions.
the AD Agent machine is running Windows Server 2008 or Windows Server 2008 R2 , the following
Windows command Define these exceptions using lines ( type each command on one line).
– netsh advfirewall firewall add rule name="Cisco AD Agent (AD Observer)" dir=in
action=allow program="C:\IBF\adObserver\ADObserver.exe" enable=yes
– netsh advfirewall firewall add rule name="Cisco AD Agent (RADIUS Server)" dir=in
action=allow program="C:\IBF\radiusServer\runtime\win32\bin.build\rt_daemon.exe"
enable=yes
the AD Agent machine is running Windows Server 2003 ( with SP1 or higher installed), the
following Windows command Define these exceptions using lines ( type each command on one
line).
– netsh firewall add allowedprogram C:\IBF\adObserver\ADObserver.exe "Cisco AD Agent
(AD Observer)" ENABLE
Note: Windows Firewall is not supported in the original Windows Server 2003 . Windows Server 2003
SP1 now supports Windows Firewall , but Windows Firewall is disabled by default. Windows
Firewall is enabled by default in Windows Server 2003 SP2 .
1.adacfg dc create Active Directory domain separate from AD Agent machine using command
controller When configuring the machine, you must also define a Windows Firewall exception
on the AD Agent machine to allow the necessary WMI- related communication.
Note The AD Agent machine and a separate domain from this machine controller Windows Firewall is
enabled on the machine and AD Agent is configured for the AD domain. controller You must
set up WMI exceptions on each machine whenever you need to communicate with them . If
Windows Firewall is not running on either machine , WMI exceptions are not needed on
that machine. AD domain There is one controller and the AD Agent is connected to this
domain. WMI exceptions are also not required if running on the same machine as the
controller .
the AD Agent machine is running Windows Server 2008 or Windows Server 2008 R2 , the following
Windows command Define this WMI related exception using lines (each command is typed on one
line):
netsh advfirewall firewall set rule group="Windows Management Instrumentation (WMI)" new
enable=yes
AD Agent machine is running Windows Server 2003 ( with SP1 or higher installed), use the following
Windows commands : Define this WMI related exception using lines (each command is typed on one
line):
– netsh firewall add portopening protocol=tcp port=135 name="Cisco AD Agent
(WMI_DCOM_TCP135)"
Separate Active Directory domain controller Windows Firewall exceptions that need to
be configured on your machine
On the AD Agent machine adacfg client create Separate Active Directory domains configured using
commands controller If the machine has Windows Firewall enabled, its domain controller You will
this domain controller If your machine is running Windows Server 2003 ( SP1 or later installed), the
following Windows command You can configure this WMI- related exception using the line ( type the
command on one line).
netsh firewall set service RemoteAdmin enable
(注) 国際化はサポートされていません。
• Also, each domain running Windows Server 2008 or Windows Server 2008 R2 controller The
machine must have the applicable Microsoft hotfix installed. AD Agent is a domain controller
installed directly on the machine or on the domain controller You must install the hotfix
regardless of whether you are monitoring your machine remotely.
Domain running Windows Server 2008 The following two Microsoft hotfixes must be installed on
the controller :
a. http://support.microsoft.com/kb/958124
This patch installs memory in Microsoft 's WMI Fix the leak. this memory If you do not
fix the leak, the AD Agent will Unable to connect to controller and get "up" status.
b. http://support.microsoft.com/kb/973995
This patch installs memory in Microsoft 's WMI Fix the leak. this memory If you do not
fix the leak, Active Directory will block required authentication-related events from
entering your domain. There are sporadic situations where the controller security log
cannot be written to. In this case, the AD Agent will User authenticated via controller
Unable to learn mapping for part of login.
Domain running Windows Server 2008 R2 controller The following Microsoft hotfixes must be
installed on the machine ( if SP1 is not installed):
http://support.microsoft.com/kb/981314
This patch installs memory in Microsoft 's WMI Fix the leak. this memory If you do not
fix the leak, Active Directory will block required authentication-related events from
entering your domain. Controller security Occasional situations occur where the log cannot
be written to. In this case, the AD Agent will User authenticated via controller Unable to
learn mapping for part of login.
• Similarly, users can perform authentication during login and security Logs are monitored by AD Agent
separate AD domain On the controller, the "Audit Policy" ( part of the Group Policy Management
settings) allows a successful logon to log on to that AD domain . controller The machine's
Windows security log must be configured to generate the required events. " AD Domain with AD
Agent Refer to "Settings for acquiring information from the controller" ( P.2-9 ) .
• adacfg dc create Single domain using command controller Also before configuring the machine ( AD
Note: If this requirement is not met and the AD Agent machine is not joined to a domain that has the
required trust relationship configured with the domain associated with a particular DC machine, use
adacfg dc create When I perform an operation to configure that DC machine using commands , it appears to
complete successfully. However, that DC machine may start experiencing various issues such as very
high CPU load.
step 1 Copy the Active Directory Agent installer executable file to the Windows machine where you want
to install Active Directory Agent .
Step 2 AD_Agent-v1.0.0.32-build-539.Installer.exe Run the file.
The Cisco AD Agent Setup dialog box appears.
Step 3 [Yes] Click to continue with the installation.
The installer installs AD Agent to the C:\IBF\ directory on your Windows machine .
You can check the progress of the installation process. When the installation is completed
successfully, a [Completed] message is displayed.
step 1 Windows Command Line Prompt ( Start > All Programs > Accessories > Command Prompt ).
This output provides information about when AD Agent internal processes started running on this
machine.
• ASA device) that is configured to obtain an IP-to-user-identity mapping from the AD Agent machine
.
You can also configure AD Agent to send logs to a Syslog server.
(Note) AD domain controller and client If you first configure a Syslog server in AD Agent before configuring
devices , troubleshooting information is available on the Syslog server in addition to the localStore .
Keeping this troubleshooting information on your Syslog server can be helpful if you run into problems
during setup.
After installing AD Agent , wait a moment (approximately 30 seconds) for AD Agent to properly
initialize before running the adacfg command.
• adacfg commands when AD Agent is not running , you will receive the following message:
Error: HTTP request sending failed with error “Couldn't connect to server”! For
further syntax information, use adacfg help.
• adacfg commands before the AD Agent is fully initialized , you receive the following message:
Caught exception: Module PipConfigurator not initialized!
Note: This section only describes the settings you need to make on AD Agent . For the solution to work
properly, the client AD Agent and AD Domain on Device You also need to configure your
controller. For more information, see ASA End Users Please refer to the manual .
Step 1 AD domain controller Windows Server operating system running on the machine system's
Verify that the version is a supported version. ( " Active Directory Requirements"
( See P.2-5 ) .
Step 2 AD Domain controller If your machine is running Windows Server 2008 or Windows Server 2008 R2 ,
ensure that the applicable Microsoft hotfix is installed on your machine ( see Active Directory
Requirements, page 2-5 ) . ). AD domain running Windows Server 2008 or 2008 R2 without the
specified hotfix applied Do not use a controller.
Step 3 Firewall such as Windows Firewall Software is an AD domain controller AD domain , if enabled on your
machine controller Verify that the required firewall exceptions are defined on your machine (see
"Separate Active Directory Domain") controller Must be configured on the machine
Windows Firewall Exceptions” on page 2-4 ) .
OL-25134-01-J 2-9
第2章 Active Directory Agent
Active Directory Agent の設定
Installation and configuration
Step 4 domain controller Ensure that the domain associated with the machine has the appropriate trust
relationship configured with the domain that the AD Agent machine will join.
Step 5 Audit Policy ( part of the Group Policy Management settings) allows successful logon to controller
Machine Windows Security Make sure the log is configured to generate the events you want
(usually this is the Windows default setting, but you should explicitly confirm that this
setting is correct). To check this, go to Start > Programs > Administrative Tools > Group Policy
Management. Choose. Group Policy Management left navigation In the pane:
a. [Domains] Navigate to the appropriate domain under .
b. navigation Expand the tree.
c. [Default Domain Policy] Right-click.
d. [Edit] Select a menu item. This will open the Group Policy Management Editor .
e. In the left navigation pane of the Group Policy Management Editor :
f. Default Domain Policy > Computer Configuration > Policies > Windows Settings > Security
Settings] Choose.
– For Windows Server 2003 or Windows Server 2008 ( other than R2 ), select [Local Policies] >
[Audit Policy] Choose. Two policy items ( [Audit Account Logon Events] and [Audit Logon
Events] ) and the corresponding [Policy Setting] [Success ] Verify that the state is
directly or indirectly included. [Success] To include the status indirectly, set the
Policy Setting to Not Defined. Set. In this case, the valid values are inherited from the
higher-level domain, so [Success] You must set the Policy Setting for that higher domain to
explicitly include the state .
– For Windows Server 2008 R2 : Advanced Audit Policy Configuration > Audit Policies > Account
Logon Choose. Two policy items ( [Audit Kerberos Authentication Service] and [Policy
Setting] corresponding to [Audit Kerberos Service Ticket Operations] As mentioned above,
[Success] Verify that the state is directly or indirectly included.
g. [Audit Policy] If any field settings have been changed, you must run gpupdate /force to force
the new settings to take effect.
Step 6 Log in to the AD Agent Windows machine.
Step 7 command line At the prompt, cd C:\IBF\CLI Enter.
Step 8 Enter the following command:
adacfg dc create -name < DC-nickname > -host < DC-hostname-or-FQDN > -domain
< full-DNS-name-of-AD-domain > -user < username-member-of-Domain-Admins-group > -password
< password-of-user >
explanation:
• DC-nickname is the domain A friendly name to assign to the controller.
• DC-hostname-or-FQDN is the AD domain monitored by AD Agent controller The host name or
fully qualified domain name of the machine.
• full-DNS-name-of-AD-domain is the full DNS name of the AD domain .
• username-member-of-Domain-Admins-group is the domain controller machine security Username of
an existing account used to monitor logs.
This account has a domain controller machine security The necessary permissions must be granted
to read the log. AD group of the domain specified in the " -domain " option
You can easily and reliably perform this operation by specifying an account belonging to "
Domain Admins ."
Active Directory Agent settings
Domain Admins group can obtain the required permissions if they meet all of the
requirements below .
– The account belongs to the AD group " Distributed COM Users ".
– account, domain controller You have been granted access to the machine's WMI namespace
(specifically the " CIMV2 " namespace). To set this permission, use the wmimgmt.msc
snap-in or group Use policy (all domains controller (if reflected on the machine). For more
information,
http://blogs.msdn.com/b/spatdsg/archive/2007/11/21/set-wmi-namespace-security-via-gpo-scri
pt.aspx Please refer to.
– domain controller machine security event The account has permission to read logs. You can
set this permission using the CustomSD key in the registry or using Group Policy (all
domains controller (if reflected on the machine). For more information:
http://msdn.microsoft.com/en-us/library/aa363648%28v= vs.85%29.aspx Please refer to.
• password-of-user is the password associated with the specified username.
The following message is displayed:
Reply: Command completed successfully.
Currently configured AD domain controller Machine and its up or down To see a list of status,
use adacfg dc list Use the command: Run this command regularly and add the AD domain controller
You can double check the machine status.
specific AD domain Create a controller adacfg dc create After running the command, that AD
domain Please wait for a while (about 1 minute) until the controller status changes from the
initial setting of " down " to " up " or " down(no-retry) ".
• “ up ” state means that the AD domain Indicates that a connection to the controller has
been established. In some cases, specific AD domains controller From the first time a machine
is " up ", previous mappings are retrieved from that machine and adacfg cache list You will
have to wait a few more minutes (or longer) before you can see it with the command.
• " down(no-retry) " state means that a connection cannot be established (for example, due to
incorrect credentials), and
Indicates that the AD Agent does not retry establishing a connection.
• " down " state means that the AD Agent is currently running on that AD domain . controller
Indicates that you are not connected to the machine, but will periodically retry
establishing a connection.
Also, adacfg dc erase Any domain from AD Agent using command You can also delete controller
settings.
For more information about these commands, see `` adacfg dc list '' ( PA-8 ) , `` adacfg cache list
'' ( PA-9 ) , and
See " adacfg dc erase " ( PA-8 ) .
OL-25134-01-J 2-11
Active Directory Agent の設定
specific client To configure AD Agent to communicate with devices , follow these steps:
Note: Make sure you have entered the correct RADIUS-shared-secret . Otherwise, the client Requests
from the device are ignored.
To view a list of currently configured client devices adacfg client list From any client from AD
Agent using the command To delete device settings adacfg client erase Use the command: For more
information about these commands, see adacfg client list ( PA-5 ) and adacfg client erase ( PA-5 ) .
Step 4 Specific Client Follow the instructions for the device to make the client aware of this AD Agent
machine. Configure your device.
This appendix provides an alphabetical list of Active Directory Agent -specific commands. The
command has the following modes:
• adactrl : Used to start, stop, restart AD Agent and monitor AD Agent execution status.
• adacfg : Client with Active Directory Agent device, Active Directory domain Used to configure the
controller and Syslog server.
For each command, this appendix provides a brief description of its use, command syntax, usage
guidelines, and usage examples. This appendix is organized as follows:
• " AD Agent Control Commands" ( PA-1 )
• AD Agent configuration Command” ( PA-3 )
adactrl help
Displays a list of adactrl commands and their syntax.
例
C:¥IBF¥CLI>adactrl help
Cisco AD Agent adctrl -- version 1.0.0.32, build 539
Usage: adactrl COMMAND where COMMAND can be:
start - to start the AD Agent stop - to stop the AD
Agent restart - to restart the AD Agent show running - to show
the running status of the AD Agent version - to view info on AD
Agent version currently installed help - to view this help
adactrl restart
AD Agent を停止して再起動します。
構文
adactrl restart
例
C:¥IBF¥CLI>adactrl restart OK
syntax
adactrl show running
example
C:\IBF\CLI> adactrl show running
running C:\\IBF\\watchdog\\radiusServer.bat since 2011- 1- 5 T10:25:44 running
C:\\IBF\\watchdog\\adObserver.bat since 2011- 1- 5 T10:25:44
adactrl start
Start AD Agent .
syntax
adactrl start
example
C:\IBF\CLI> adactrl start
OK
adactrl stop
Stop AD Agent .
syntax
example
C:\IBF\CLI> adactrl stop
OK
adactrl version
Displays the version of AD Agent installed on a Windows machine.
syntax
adactrl version
example
C:\IBF\CLI> adactrl version
Cisco AD Agent adactrl -- version 1.0.0.32, build 539
(Built from sources last modified 2011-04-21 12:20:17 +0300)
adacfg help
adacfg Displays summary information about the command syntax.
syntax
adacfg help
example
C:\IBF\CLI> adacfg help
Cisco AD Agent adacfg -- version 1.0.0.32, build 539
Usage: adacfg [COMMAND] where COMMAND can be:
client - to manage client-devices of AD Agent dc - to manage AD domain-controller
machines monitored by AD Agent syslog - to manage syslog-targets of AD Agent
options - to manage configurable settings for AD Agent cache - to manage cache of
identity- mappings maintained by AD Agent version - to view info on AD Agent
version currently installed help - to view this help
help COMMAND - to view the help for specified COMMAND
syntax
adacfg help client
example
C:\IBF\CLI> adacfg help client
Cisco AD Agent adacfg -- version 1.0.0.32, build 539
Usage: adacfg client [SUBCOMMAND] [ARGS] where
SUBCOMMAND can be:
create - to configure a new client
list - to list all previously configured clients erase - to
erase a previously configured client status - to view status of
clients subscribed for notification help - to view this help
detailed syntax (write command on a single line!):
adacfg client create -name <client-nickname>
-ip <IP-address>[/<prefix-length-for-IP-range>]
-secret <RADIUS-shared-
secret> adacfg client list adacfg client erase
-name <client-nickname> adacfg client status
syntax
adacfg client create -name <client-nickname> -ip <IP-address>[/<prefix-length-for-IP-range>]
-secret <RADIUS-shared-secret>
Description:
• client-nickname : client A friendly name that can be assigned to the device.
• IP-address : Client Device IP address.
• prefix-length-for-IP-range : You can optionally define an IP subnet range.
• RADIUS-shared-secret : Client via RADIUS protocol RADIUS shared secret used to communicate
with the device . this secret is the client A key configured on the device. example
C:\IBF\CLI> adacfg client create -name asa1 -ip 10.77.202.1/32 -secret cisco123
Reply: Command completed successfully!
syntax
client erase -name <client-nickname>
client-nickname is the client The name of the device.
example
C:\IBF\CLI> adacfg client erase -name asa1
Reply: Command completed successfully!
syntax
adacfg client list
configuration command
example
C:\IBF\CLI> adacfg client list
Name IP/Range ----
--------asa1
10.77.204.2 asa2
10.77.101.3 asa3
10.77.101.4
syntax
adacfg client status
example
adacfg help dc
DC related adacfg Displays a detailed syntax summary of the command.
syntax
adacfg help dc
例
C:¥IBF¥CLI>adacfg help dc
Cisco AD Agent adacfg -- version 1.0.0.32, build 539
Usage: adacfg dc [SUBCOMMAND] [ARGS] where
SUBCOMMAND can be:
create - to configure a new AD domain-controller machine list -
to list all previously configured AD domain-controller machines erase
- to erase a previously configured AD domain-controller machine help
- to view this help
detailed syntax (write command on a single line!):
adacfg dc create -name <DC-nickname>
-host <DC-hostname-or-FQDN>
-domain <full-DNS-name-of-AD-domain>
-user <username-member-of-Domain-Admins-group>
-password <password-of-user> adacfg dc list
adacfg dc erase -name <DC-nickname>
adacfg dc create
new AD domain controller Configure the machine.
syntax
adacfg dc create -name < DC-nickname > -host < DC-hostname-or-FQDN > -domain
< full-DNS-name-of-AD-domain > -user < username-member-of-Domain-Admins-group > -password
<password-of-user>
Description : _
• DC-nickname : Active Directory domain Controller name.
• DC-hostname-or-FQDN : AD domain Controller hostname or Active Directory domain Fully
qualified domain name ( FQDN ) of the controller.
example
C:\IBF\CLI> adacfg dc create -name abc-dc1 -host amer.acs.com -domain acs.com -user xyz
-password axbycz
Warning: please make sure that this DC machine has:
[1] all necessary patches installed, and
[2] a properly configured Audit Policy.
For more details, visit:
http://www.cisco.com/en/US/docs/security/asa/asa84/release/notes/README_FIRST.html
adacfg dc erase
Previously configured AD domain controller Erase the machine.
syntax
dc erase -name <DC-nickname>
example
C:\IBF\CLI>adacfg dc erase -name abc-dc1 Reply: Command
completed successfully!
adacfg dc list
AD domains configured so far controller List machines.
syntax
adacfg dc list
example
C:\IBF\CLI>adacfg dc list
C:\IBF\CLI>adacfg dc list
Name Host/IP Username Domain-Name Latest Status ---- ------- --------
----------- ---------- --abc-dc1 amer.acs.com domainAdmin ACS up abc-dc2
amer2.acs.com domainAdmin down abc-dc3 amer3.acs.com domainAdmin down(no-
retry)
syntax
adacfg help cache
example
C:\IBF\CLI> adacfg help cache
Cisco AD Agent adacfg -- version 1.0.0.32, build 539 Usage: adacfg
cache [SUBCOMMAND] where SUBCOMMAND can be:
list - to view the currently cached mappings clear - to clear the
currently cached mappings help - to view this help
detailed syntax:
adacfg cache list adacfg cache clear
syntax
adacfg cache list
example
C:\IBF\CLI> adacfg cache list
IP User-Name Domain Response-to-Probe Mapping-Type Mapping-Origin Create-Time
------------ ------ ----------------- ------------ ---- ---------- -----------
10.77.100.1 User1 AD1 true DC AD1 2011-01-05T09:37:17Z
10.77.100.2 User2 AD1 true DC AD1 2011-01-05T09:37:21Z
syntax
adacfg cache clear
example
C:\IBF\CLI> adacfg cache clear
Removed 10 records.
(Note) Please wait until the cache is completely cleared. The time it takes to clear the cache depends
on the number of mappings currently cached.
it will take about a minute to completely clear it . Also, while performing this process,
adacfg cache list Invoking the command may indicate that the mapping still exists or may return
an SQL error indicating "database is locked", but such results can be safely ignored . cache After the
clear operation is completed internally adacfg cache list When I run the command, " Total
mappings count " is returned as 0 .
syntax
adacfg help options
example
C:\IBF\CLI> adacfg help options
Cisco AD Agent adacfg -- version 1.0.0.32, build
539 Usage: adacfg options [SUBCOMMAND] [ARGS]
where SUBCOMMAND can be:
list - to view the current settings of the configurable options set
- to configure one or more of the configurable options
help - to view this help
detailed syntax:
adacfg options list adacfg options set [-<optionName>
<optionValue>] [...] an <optionName>/<optionValue> pair can
be:
Cisco Active Directory Agent /1.0
OL-25134-01-J A- 9
Installation Setup Guide, Release
付録 A Active Directory Agentコマンド リファレンス
AD Agent コンフィギュレーションコマンド
[-userLogonTTL <number-of-minutes>]
Time duration after which logged-in user is marked as being logged-out.
[-dcStatusTime <number-of-seconds>]
Time span between consecutive monitorings of DC-machine up/down status.
[-dcHistoryTime <number-of-seconds>]
Amount of time before the present from which to start reading
the security logs of DC-machines that are configured (via
'adacfg dc create') for the first time ever.
[-notifyAttributes <text>]
Comma-separated list of attributes to be sent in notifications to
subscribed client-devices.
[-logLevel <level>]
Logging level for the customer logs (localStore and syslogs).
INFO
syntax
adacfg options list
example
C:\IBF\CLI> adacfg options list
Option Value ---------------
----userLogonTTL 1440
dcHistoryTime 86400
dcStatusTime 60
notifyAttributes * logLevel
INFO
syntax
adacfg options set [-<optionName> <optionValue>] [...] The optionName and
optionValue pair can be any or all of the following:
• [userLogonTTL <number-of-minutes> ] : Login Duration after which a user is marked as
logged out.
• [dcStatusTime <number-of-seconds> ] : DC machine up or down consecutively Status monitoring
interval.
• [dcHistoryTime <number-of-seconds> ] : DC machine security configured using ' adacfg dc
create ' The amount of time before starting to read the log for the first time.
Note AD Agent uses NOTICE logs. Some customers using levels (levels between " INFO " and "
WARN ") log Generates a message, but adacfg options set -logLevel You cannot explicitly
select NOTICE as the logLevel setting using the command . For more information, see
Appendix B, “Customer log See Message .
syntax
adacfg help syslog
example
C:\IBF\CLI> adacfg help syslog
Cisco AD Agent adacfg -- version 1.0.0.32, build
539 Usage: adacfg syslog [SUBCOMMAND] [ARGS]
where SUBCOMMAND can be:
create - to configure a new syslog-target list - to list all
previously configured syslog-targets erase - to erase a
previously configured syslog-target help - to view this help
detailed syntax (write command on a single line!):
adacfg syslog create -name <syslog-target-nickname>
-ip <IP-address>
[-facility <syslog-facility>] valid syslog facility
values: LOCAL0 - LOCAL7 default syslog facility
value: LOCAL6 adacfg syslog list adacfg syslog erase
-name <syslog-target-nickname>
syntax
adacfg syslog create -name < syslog-target-nickname > -ip < IP-address > [ -facility < syslog-facility
>] Description:
• syslog-target-nickname : Name of the Syslog server.
• IP-address : IP address of the Syslog server .
• syslog-facility : Facility value ( LOCAL0 to LOCAL7 ). Default is LOCAL6 .
example
C:\IBF\CLI> adacfg syslog create -name mysyslog -ip 10.77.202.1 -facility LOCAL6
Reply: Command completed successfully!
syntax
syslog erase -name <syslog-target-nickname>
syslog-target-nickname is the name of the Syslog target connected to AD Agent .
example
C:\IBF\CLI> adacfg syslog erase -name mysyslog
Reply: Command completed successfully.
syntax
adacfg syslog list
example
C:\IBF\CLI> adacfg syslog list
Name IP Facility ----- --- --------
mysyslog 10.77.202.4 LOCAL6
adacfg version
Displays the version of AD Agent installed on a Windows machine.
syntax
adacfg version
example
C:\IBF\CLI> adacfg version
Cisco AD Agent adacfg -- version 1.0.0.32, build 539
<Built from sources last modified 2011-04-21 12:20:17 +0300>
This appendix describes the different customers generated by AD Agent ( based on the current value of the
logLevel configuration option). log Shows messages by functional category.
To change the “ logLevel ” setting: adacfg options set –logLevel Use the command:
(Note) Some logs The message is in the " NOTICE " log level ( between " INFO " and " WARN "), but " NOTICE " cannot
be selected when setting " logLevel " using the above-mentioned adacfg command.
Logs to the following scales, starting with the least detailed: Indicates a range of levels. " NOTICE " shown
in italics is not an option that can be set in " logLevel ". shown in bold
" INFO " is the default setting for " logLevel ".
FATAL < ERROR < WARN < NOTICE < INFO < DEBUG
Note: When troubleshooting problems, use the default setting " INFO ", which has the highest level of detail.
It is often helpful to change it to " DEBUG ". However, this setting can have a negative impact on AD Agent
performance. We recommend that you revert the logLevel setting once the issue is resolved .
Similarly, changing the logLevel from its default setting of INFO to the least verbose WARN can have a
positive impact on AD Agent performance. However, this setting does not print INFO or NOTICE level messages
(messages that may be important for administrative or auditing purposes).
Past customers log Message local The archive is
It is kept in the " C:\IBF\radiusServer\runtime\logs\localStore " directory. These log messages can be found using
adacfg syslog create It will also be forwarded to any remote Syslog targets configured using the command .
Table B-1 to the customer Messages for logged AD Agent -specific messages code, log level, message
class, message Indicates text, description. This list contains all generated
It does not contain any messages. Other messages , such as generic RADIUS -related messages, are
not included.
Message logging
sage level message class message text explanation
code
Starting and stopping AD Agent
(A more extensive set of messages is logged in the Windows Application Event Log ). For more information, see
Appendix C
Windows application event Please refer to "Log" .
31502 INFO STARTUP-SHUTDOWN Started Runtime The AD Agent RADIUS Server
subcomponent has started .
"
setting change
68000 NOTICE IBF_CONFIG_CHANGE Created DC configuration AD Agent adacfg dc create domain using
command controller The machine is now
configured.
68001 NOTICE IBF_CONFIG_CHANGE Deleted DC configuration From AD Agent adacfg dc erase domain
using command controller Machine
configuration deleted.
68002 NOTICE IBF_CONFIG_CHANGE Created RADIUS-client AD Agent adacfg client create Top
configuration client using Device is configured.
68003 NOTICE IBF_CONFIG_CHANGE Deleted RADIUS-client adacfg client erase client using
configuration command Device configuration removed
from AD Agent .
Update mapping
12862 INFO IBF_RADIUS_SERVER Updated mapping in Identity In AD Agent 's internal cache
Cache Added or updated IP-address-to-user-
identity mapping.
12855 INFO IBF_RADIUS_SERVER Dropped Identity Cache the logon time was too long ago
mapping-update due to (relative to the " userLogonTTL "
userLogonTTL configuration option), the incoming call
IP-address-to-user-identity mapping
update ignored by AD Agent .
12868 ERROR IBF_RADIUS_SERVER Dropped Identity Cache Maximum capacity limit for AD Agent
mapping-updates: stress limit mappings
exceeded number ( 200,000 mappings), any new
incoming mapping updates will be
ignored.
12893 INFO IBF_RADIUS_SERVER Deleted mapping in Identity AD Agent 's internal cache
Cache IP-address-to-user-identity mapping has
been removed.
synchronous request
12869 INFO IBF_RADIUS_SERVER Detected Synch request with Session data for all mappings
registration for notifications currently in AD Agent 's cache Clients
that want to receive snapshots the
device requested.
The client is requesting to register
for replication with AD Agent .
12860 INFO IBF_RADIUS_SERVER Detected synch request with Session data for all mappings
no registration for currently in AD Agent 's cache Clients
notifications that want to receive snapshots the
device requested.
The client has not requested to
register for replication with AD
Agent .
Message
sage
code logging
level message class message te
12870 INFO IBF_RADIUS_SERVER Detected
without ch
state
CoA-Based traffic
Table B-1 AD Agent Logs Message (continued)
メッ
セージ ロギング
メッセージ テキスト 説明
co
de level message class session data Transfer snapshot
12878 INFO IBF_RADIUS_SERVER Stopping current transfer of Clients currently in progress Session
session data snapshot to device data Stopping snapshot
transfer.
12881 INFO IBF_RADIUS_SERVER Started transfer of session data client Session data to device A new
snapshot snapshot transfer has started.
(Note) This log item is
Used only for snapshot
transfers using RADIUS
packets. The first packet is
Marked with #12881 .
The last packet is #12883
will be marked. All packets
during this time will be
marked with #12882 .
12882 INFO IBF_RADIUS_SERVER Continued transfer of session Clients currently in progress Session
data snapshot to device data The snapshot transfer
continues.
(Note) This log item is for three or
more
Only large snapshot transfers
using RADIUS packets
used for. 1st pa
The packet is marked #12881
and the last packet is
Marked with #12883 .
All packets during this time
are
Marked with #12882 .
12883 INFO IBF_RADIUS_SERVER Finished transfer of session client Session data to device Snapshot
data snapshot transfer completed successfully.
that fit into one RADIUS packet are
marked with this log entry only
However, #12881 or #12882 log entries
are not marked.
Message
sage
code logging
level message class message t
12866 INFO IBF_RADIUS_SERVER Could no
Identity C
キープアライブ要求
12885 INFO IBF_RADIUS_SERVER Detected Kee
from PEP
ドメインステータスクエリー
12890 INFO IBF_RADIUS_SERVER Prepared Dom
Query-Respo
ドメインコントローラステータスのトラッキング
12892 INFO IBF_AD_MONITOR ActiveDirecto
controller stat
その他
11011 WARN RADIUS RADIUS listener failed One or more UDP ports used to receive
RADIUS requests could not be opened.
Ensure that no other processes are
using ports 1812 , 1813 , 1645 , or
1646 on the AD Agent machine.
Message
sage
code logging
level message class message te
11014 ERROR RADIUS RADIUS
invalid att
11036 ERROR RADIUS The Message-Authenticator RADIUS packet was received that
RADIUS attribute is invalid. contained an invalid [Message-
Authenticator] attribute. client to the
device
AD Agent , configured properly, and
functioning properly. Same for both
client device and AD Agent
the RADIUS shared secret is
configured properly.
11039 INFO RADIUS RADIUS authentication An internal log related error was
request rejected due to critical detected.
This may be caused by not having
logging error enough free disk space.
11040 INFO RADIUS RADIUS accounting request An internal log related error was
dropped due to critical logging detected.
This may be caused by not having
error. enough free disk space.
11050 WARN RADIUS RADIUS request dropped due An internal log related error was
to system overload detected.
This may be caused by not having
enough free disk space.
11052 ERROR RADIUS Authentication request A RADIUS request packet was
dropped due to unsupported received on an unsupported UDP port
port number number. client Make sure your device
is compatible with AD Agent ,
configured properly, and functioning
properly.
Message
sage
code logging
level message class message te
11213 WARN Dynamic-Authorization No respon
Network A
communic
notificatio
This appendix describes how AD Agent software (customer log (in addition to the message)
Windows application event Indicates a summary of events to log.
• AD Agent itself (actually an internal "watchdog" function) was started or stopped as the AD Agent software was
installed, uninstalled, and the AD Agent machine rebooted.
• AD Agent 's internal " AD Observer " and " RADIUS Server" components are adactrl Started or stopped manually using
commands.
• AD Agent 's internal AD Observer and RADIUS Server components automatically stop or restart after the AD Agent
software's watchdog feature detects a crash or critical error in one or more of these processes. It was done.
To see these events on Windows , use the " Event Viewer " tool located at:
Event Viewer (Local) > Applications and Services Log > Cisco AD Agent All these events have the following attributes and
values:
• Source : Cisco AD Agent
• Level : Information
• Task Category : None
Table C-1 lists the event ID , message, and message for these events. Indicates text, description.
11 Watchdog Service Was Shutdown AD Agent internal watchdog Service has stopped.
This message typically appears when uninstalling AD Agent . It may
also appear if you manually stop or restart Cisco AD Agent in the
Windows Services panel.
20 C:\\IBF\\watchdog\\radiusServer.bat AD Agent 's RADIUS Server subcomponent ( adactrl Either started
Was Started manually (using a command) or restarted automatically (after a
crash or failure).
twenty C:\\IBF\\watchdog\\adObserver.bat " AD Observer " subcomponent of AD Agent crashed or stopped after
one Was Shutdown detecting a failure.
twenty rt_daemon.exe Was Shutdown AD Agent 's RADIUS Server subcomponent ( adactrl was stopped
one manually (using the command).
twenty ADObserver.exe Was Shutdown " AD Observer " subcomponent of AD Agent ( adactrl was stopped
one manually (using the command).
This appendix contains information to help you identify and resolve problems that you may encounter
while using AD Agent . This appendix is organized as follows:
• “Obtaining troubleshooting information” ( PD-1 )
• " Internal Debugging in AD Agent "Enabling Logs" ( PD-2 )
• "Configuration issues" ( PD-4 )
Records start and stop events for the Agent software, internal processes ' AD Observer ' and '
RADIUS Server'. For more information, see Appendix C , Windows Applications event Please refer to
"Log" .
Internal debugging on the AD Agent machine when reporting a problem Whether to enable logging and
the customer You will be asked if you want to send these logs along with your logs. These logs are
useful when diagnosing and resolving issues. These internal debugs To enable logging, see Internal
Debugging in AD Agent See " Enabling Logs" ( PD-2 ) .
AD Observer log
C :\IBF\adObserver\logconfig.ini file contains internal debugging information for the AD Observer
subcomponent. log level is specified. By default LOG_LEVEL is set to LOG_NONE .
This configuration allows internal debugging of the AD Observer subcomponent. No logs are
generated.
LOG_LEVEL can have one of the following values:
• LOG_VERBOSE : Most detailed log.
• LOG_DEBUG : Contains troubleshooting and debugging information.
• LOG_INFO : Contains informational messages.
• LOG_WARN : Contains warning messages.
• LOG_ERROR : Error Contains message.
• LOG_FATAL : Critical error Contains only messages.
log The levels range from LOG_VERBOSE (most informative) to LOG_FATAL (least informative),
with decreasing levels in this order. We recommend selecting LOG_DEBUG for troubleshooting
information .
AD Observer internal debugging To enable logging, follow these steps:
Note Internal debugging of AD Observer subcomponent The mechanism's " LOG_LEVEL " setting is set using
adacfg options set It has nothing to do with the command's -logLevel configuration option.
RADIUS server by AD Agent configuration File changes are automatically detected and detected on
the RADIUS server debug Logging will be enabled. These logs are located at:
C:\IBF \ radiusServer\runtime\logs\radiusServer_debug.log
Configuration issues
This section describes common configuration issues. This section describes the following items:
• "client "Requests from the device are ignored" ( PD-4 )
• The adacfg client status command "Device reports ' Out-of-Sync ' for unknown reason" ( PD-5 )
• " IP-to-user-identity mappings are cleared from AD Agent cache after a short period of time" ( PD-5 )
• User authenticated by a specific DC machine "Logons are not detected (and processed) by AD
Agent " ( PD-6 )
• " When you run the adacfg dc list command, the domain controller Indicates that the machine has not
reached the ' up ' state" ( PD-7 )
• " AD Agent doesn't work at all" ( PD-8 )
• "The ' adacfg dc list ' command displays the domain controller Indicates that the machine has
reached the ' down(no-retry) ' state" ( PD-8 )
• " Logons fail when you reboot the AD Agent machine" ( PD-9 )
client Requests from the device may not be reaching the AD Agent machine
Symptom or problem or may be being ignored.
A user Please set a longer logon TTL period. For more information,
solution
See adacfg options set ( PA-11 ) .
However, the cause is unknown.
the AD Agent machine sends the notification update to the client device
Symptom or problem via RADIUS CoA-Request , the client No CoA-ACK received from device .
1. Your particular DC machine may not have been properly patched. This
causes authentication events to become security It may not be written
to the log.
2. that DC machine may not be set properly.
3. AD Agent detected a mapping update, but (customer It may have dropped
Possible cause this update for some reason (logged). One possible cause is that the
mapping update contains a timestamp in the future. This means that the
DC machine's clock is AD
Occurs when the Agent machine's clock is more than 10 minutes ahead.
When you run the adacfg dc list command, the domain controller Indicates that the machine has not reached
the ' up ' state
adacfg dc list When you run the command, the domain controller It shows that
Symptom or problem
the machine is not in the " up " state.
1. domain controller version supported by your machine.
Windows Server may not be running.
2. domain The controller may not have been properly patched.
3. Windows Firewall or similar firewall software
The domain controller WMI traffic between your machine and the AD
Agent machine may be blocked.
4. AD Agent machine is not joined to an AD domain or Conte
Possible cause roller There may not be a proper trust relationship set up between the
machine's AD domain and the AD domain that the AD Agent machine joins
.
5. The values entered in the adacfg dc create command may be incorrect.
In particular, the full DNS name of the domain is not entered or the
account Incorrect credentials or domain controller The account may not
have sufficient privileges to read the machine's security log.
solution 1. domain controller Ensure that the version of Windows Server running on
your machine is a supported version and that Windows Server is
properly patched.
2. Windows Firewall or similar firewall If the software is running,
ensure that the required WMI exceptions are properly configured.
3. domain controller Ensure that the AD Agent machine is joined to an
AD domain that has the appropriate trust relationship configured with
the machine's AD domain.
4. Verify that the values you entered in the adacfg dc create command are
correct. Specifically, you are specifying the full DNS name of the
domain, and the domain controller machine security Ensure that you
specify credentials for an account that has sufficient privileges to
read the logs.
AD Agent does not work at all and when I enter various CLI commands I
Symptom or problem get an error The message " Couldn't connect to server! " is always
displayed.
some antivirus software The program has found that cygwin1.dll is blocked as
a virtualization-related threat. However, this report should be treated as a
Possible cause
false positive. AD Agent does not contain malware.
1. After running the AD Agent installer executable, install the antivirus Check
the software logs and find C:\IBF\radiusServer\cygwin\bin\cygwin1.dll
(or any other item in the C:\IBF folder) is blocked as a potential
solution threat.
2. such an AD Agent subcomponent is blocked, your antivirus should
explicitly allow the subcomponent to run without blocking it.
Configure the software.
When you run the “ adacfg dc list ” command, the domain controller Indicates that the machine has reached
the " down(no-retry) " state
adacfg dc list When you run the command, the domain controller The machine
Symptom or problem
Indicates that the " down(no-retry) " state has been reached.
domain controller This happens because the machine is not properly
Possible cause patched.
domain controller The WMI service on your machine may be unresponsive.
AD Agent has multiple domains (of the same AD domain) controller It may
be installed directly on your machine.
In this case, a dialog box appears with the following message during AD
Agent installation:
Possible cause 'IBF_SERVICE_USER' account already exists. OK to recreate? (Pressing
'No' will abort the installation.)