Troubleshooting

This section provides general troubleshooting instructions and discusses the troubleshooting tools available in the Aventail Management Console (AMC). Failure in core networking services (such as DHCP, DNS, or WINS) will cause unpredictable failures.

The User Sessions page in AMC can be used to monitor, troubleshoot or terminate sessions on your appliance or HA pair of appliances. You can sort through the summary of session details and, if needed, display details on how a device was classified, and why. About 24 hours worth of data is kept; even items that have been deleted or modified are displayed. See Viewing User Access and Policy Details on page 295.

: : General Networking Issues on page 695

: : Verify a Downloaded Upgrade File on page 697

: : Troubleshooting Agent Provisioning (Windows) on page 698

: : AMC Issues on page 700

: : Authentication Issues on page 701

: : Using Personal Firewalls with E-Class SRA Agents on page 701

: : E-Class SRA Services Issues on page 702

: : Tunnel Issues on page 703

: : OnDemand Issues on page 708

: : Client Troubleshooting on page 710

: : Troubleshooting Tools in AMC on page 715

General Networking Issues

These troubleshooting tips for networking issues are grouped by type of solution. Before using the ping utility, make sure that Enable ICMP pings is enabled on the Configure Basic Network Settings page.

Utility

Troubleshooting tip

Ping the external interface

Ping the external interface to verify the network connection. If you can ping a host's IPv4 or IPv6 address but not its fully qualified domain name, there is a problem with name resolution. You can issue the ping command from the command line or from within AMC (see Ping Command on page 719).

Capture network traffic on the external interface

To verify that traffic is reaching the appliance and being returned, use the network traffic utility in AMC, which is based on tcpdump. You can send this network traffic data to Technical Support, or review it using a network protocol analyser like Wireshark. See Capturing Network Traffic on page 717 for more information.

Ping the network gate­way(s)

Ping the external gateway and/or internal gateway. You can issue the ping command from the command line or from within AMC. For more information, see Ping Command on page 719.

Use ping to test DNS

If you experience DNS problems, first determine whether client DNS resolution is working:

1. Make sure that the client machine has Internet access.

2. At a DOS command prompt, type ping google.com. You should see a response like this:

Pinging google.com [nnn.nnn.nnn.nnn]

If basic DNS functionality is available, the IP address in square brackets is resolved by DNS lookup, demonstrating that basic DNS is functioning at the client. If DNS is not available, the ping program will pause for a few seconds and then indicate that it could not find the host google.com.

Try to use DNS to resolve the appliance host name

If you continue to experience DNS problems, determine whether DNS can resolve the appliance host name. Repeat the ping proce­dure described above but replace google.com with the host name of your appliance.

If ping finds no address for your host name, troubleshoot the DNS server that should be serving that host name. Try working around cli­ent connection issues by replacing the host name with the IP address of the appliance’s external interface.

If ping finds an address for your host name, but no replies appear (“Request timed out”), ICMP echoes may be blocked at any hop between the client and the appliance.

Clear the ARP

If you’ve recently assigned a new IP address to the appliance, be sure to clear the local Address Resolution Protocol (ARP) cache from network devices such as firewalls or routers. This ensures that these network devices are not using an old IP-to-MAC address mapping.

Hardware

Troubleshooting tip

Cables

Check all network cables to be sure you don't have a bad cable.

Bypass the firewall

If you're using network address translation (NAT), you might be blocked by a firewall. Temporarily bypass the firewall by connecting a laptop to the appliance on the physical interface using a crossover cable, and then verify network connectivity.

If this type of connection is impractical, try placing your laptop on the same network segment as the external interface of the appliance (to get as close to the appliance as possible).

Configure the switch port

If you experience network latency, such as slow SCP file copying or slow performance by the Web proxy or network tunnel service, the problem may be due to configuration differences between the appli­ance interface settings and the switch ports to which the appliance is connected. It’s possible for a switch to improperly detect duplex-mode settings (for example, the appliance is configured at full duplex but the switch detects half duplex). Cisco has documented such problems with its switches.

To resolve this problem, disable auto negotiation. Instead, configure the switch port to statically assign settings that match the appliance. You must check both switch ports and both appliance interface set­tings (internal and external, if applicable). If even one interface/switch port is mismatched, performance suffers.

If you are experiencing network latency but your appliance/switch ports are configured correctly, the problem lies somewhere else in the network. It could also be an application-level issue (such as slow name resolution on the DNS server being accessed by the Web proxy or network tunnel service).

Third-party solution

Troubleshooting tip

Verify that traffic is not being filtered out

Review the contents of the log file /var/log/kern.iptables while a connection attempt is failing. If packets are reaching the appliance but are being dropped or denied by iptables (a firewall running on the appliance), review the iptables ruleset by running the following command:

iptables -L -n -v

Traffic that is filtered by iptables is logged but not forwarded to an external syslog server.

Verify a Downloaded Upgrade File

You can use AMC to install version upgrades, as described in Upgrading, Rolling Back, or Resetting the System on page 322. To make sure that the update was successfully transferred to your local computer, compare its checksum against the one in the .md5 file you extracted from the .zip file.

To verify the MD5 checksum on your PC, use a Windows- or Java-based utility. Microsoft, for example, offers an unsupported command line utility on their site named File Checksum Integrity Verifier (FCIV):

To verify the downloaded file on a PC

1. At the DOS command prompt, type the following, which returns a checksum for the downloaded file:

fciv <upgrade_filename>.bin

2. Open the associated .md5 file (which you downloaded from the MySonicwall Web site) using Notepad or another text editor:

notepad <upgrade_filename>.bin.md5

3. Compare the two check sums. If they match, you can safely continue with your update. If they differ, try the download again and compare the resulting check sums. If they still don't match, contact Dell SonicWALL Technical Support.

To verify the downloaded file on the appliance

1. Type the following command, which returns a checksum for the downloaded file:

md5sum <upgrade_filename>.bin

2. Open the associated .md5 file:

cat <upgrade_filename>.md5

3. Compare the two checksums.

Troubleshooting Agent Provisioning (Windows)

E-Class SRA Access Manager (AAM) is a component that provisions Windows users with EPC and access agents when they log in to WorkPlace. If something goes wrong during provisioning, the error is recorded in a client installation log (identified by username) that you can view in AMC.

The 2.2 ODIS (Secure Virtual Desktop) log files are found in the VirtualDesktop folder in the App data folder. To get to the App data folder, click Start -> Run, type in %appdata% and press Enter.

Here’s a broad overview of the provisioning process. At steps (2) through (6), information is appended to a file named epiBoostrapper.log (stored in \Documents and Settings\<username>\Application Data\E-Class SRA\LogFiles\).

Provisioning_flowchart.gif

 

1. Micro-interrogation: JavaScript is used to get basic platform and browser information: Is this a Microsoft OS? Is ActiveX enabled? If not, is Java enabled? (If neither is available, the user sees an error message.)

2. Fetch epiBootstrapper.exe, a self-extracting executable in MSI (Microsoft Windows Installer) format; the executable also includes the macro-interrogator used in step (5).

3. Fetch the list of Advanced EPC agents and install it. At a minimum, OPSWAT.msi is installed.

4. Fetch additional Advanced EPC agents as required by the community.

5. Macro-interrogation: Search for both Advanced EPC and other device profile attributes, such as a particular file name, or a Windows registry key.

6. Provision agents (for example, data protection, or OnDemand Tunnel).

Related Topics

: : Client Installation Logs (Windows) on page 287

: : Client and Agent Provisioning (Windows) on page 435

AMC Issues

One of the most common errors in AMC is to make a configuration change and then forget to apply it. A Pending changes link appears in the top-right corner in AMC whenever changes have been made but not applied. Click the link and then click Apply Changes to automatically restart the services.

Issue

Solution

Can't access AMC

If you can't access AMC, connect a crossover cable to the internal network interface on the appliance and verify that you can access AMC without any network. If this type of connection is impractical, put the laptop on the same network segment as the internal interface (to get as close to the appliance as possible).

If you still can't access AMC, make sure your URL includes the https:// protocol identifier. Also verify that you’ve included the port number 8443 in the URL.

Can’t log in to AMC on the internal network

If your browser cannot log in to AMC on the internal network, ensure that traffic from the client to the IP address of the appliance’s internal interface actually arrives at the internal interface. Using the network traffic utility in AMC, which is based on tcpdump, you can capture traffic on the internal interface (eth0). Any client attempts to reach AMC should show traffic TCP SYN packets from the client’s IP address directed to port 8443. See Capturing Network Traffic on page 717 for more information.

Can’t log in

If AMC login fails with the error “Invalid Login Credentials,” verify the spelling of your username and password. Passwords are case-sensi­tive; ensure that Caps Lock and Num Lock are not enabled.

CPU utilization is spiking

If you are using nested group lookup on your LDAP or AD authentica­tion server, make sure that you are also caching the lookup results: searching the entire directory tree takes time and increases the CPU usage on both the appliance and your authentication server.

Authentication Issues

An authentication server is referenced in a realm.

Issue

Solution

Access to the external authentication server(s)

Verify that you can access the external authentication server by using the network traffic utility in AMC, which is based on tcpdump. You can send this network traffic data to Technical Support, or review it using a network protocol analyser like Wireshark. See Capturing Network Traffic on page 717 for more information.

Authentication server cre­dentials

Verify that AMC contains the proper credentials for access to your external server. For LDAP, check the Login DN and Password settings and click Test Connection. For RADIUS, check the Shared secret setting.

Authentication server logs

Review the authentication server logs. Make sure you're not entering invalid credentials or having connectivity problems.

User authentication using an LDAP or AD server takes too long or times out

If you are using nested group lookup on your LDAP or AD server, make sure that you are also caching the lookup results, because searching the entire directory tree takes time. To reduce the load on your directory and get better performance, cache the attribute group or static group search results by selecting the Cache group checking check box.

Using Personal Firewalls with E-Class SRA Agents

Some firewall products display a security alert during the provisioning of E-Class SRA agents or EPC components. This is because the firewalls are regulating outbound connections by process (in addition to port and protocol). In most cases, the user can simply “unblock” or “permit” the outbound connection.

Connect Tunnel users should configure their personal firewalls to allow the E-Class SRA VPN service (ngvpnmgr.exe) and E-Class SRA Access Manager (E-Class SRAComponents.exe) to access the Internet and to add the E-Class SRA appliance by host name or IP address as a trusted host or zone. In addition, Windows Vista users should make an exception for epiVista.exe.

There are a few firewalls, such as one supplied by Trend Micro, that do not permit a user with restricted rights to override the firewall settings. For corporate systems on which users have limited access rights, you may need to update the firewall settings before deploying the E-Class SRA VPN so that users won’t have to respond to security dialog prompts.

Consult the documentation for your corporate personal firewall to determine the firewall policy. If a firewall update proves necessary, a rule that allows all processes to communicate with the appliance over port 443 is recommended.

E-Class SRA Services Issues

To see a brief summary of which services are running, click Services on the main navigation menu.

Web Proxy Service Issues

: : Temporarily increase the server log level in AMC to Verbose. (Don’t forget to click Pending changes in the top-right corner of any AMC page, and then click Apply Changes to automatically restart the service.)

: : To see the Web proxy service log, click Logging in the main navigation menu, and then select Web proxy audit log from the Log file list. Verify that your connection request appears in the log.

: : Verify that your DNS server can resolve the Web proxy service Server name setting in AMC to the IP address of the Web proxy service interface. You can use the lookup tool within AMC (see Using DNS Lookup on page 716), or you can issue the nslookup or dig commands from a command prompt.

: : If your network uses NAT to translate IP addresses, make sure that the Web proxy service Server name setting contains the IP address of the outside (or public) IP address that is being substituted using NAT.

Web Proxy Agent Issues

The Web proxy agent provides access to URL resources on Windows systems with Internet Explorer 7.0 or later. Aventail WorkPlace indicates that Web proxy mode is active on a client by displaying “E-Class SRA Web proxy” in the Connection Status area.

To troubleshoot whether the Web proxy agent is running properly on a client machine, follow these steps:

1. On the client machine, press Ctrl+Alt+Delete and then click Task Manager.

2. Look in Windows Task Manager’s Processes list for the process ewpca.exe. If that file is present, the standard Web mode access agent is running, although it may not be receiving network traffic.

3. To confirm that the Web proxy agent is receiving traffic, start Internet Explorer and then select Tools > Internet Options. On the Connections tab, click LAN Settings or Settings for the dial-up/VPN connection you are using to connect to the appliance.

4. In the appropriate Settings dialog box for your connection type, verify that the Use automatic configuration script check box is selected and that the Address box contains the following address:

http://127.0.0.1:<portnumber>/redirect.pac

Internet Explorer uses the redirect.pac file to determine which connections to send to the Web proxy agent.

5. To view the resource addresses that are redirected by the redirect.pac file, open the file in a text editor. The file is located on the client machine in this folder:

\Documents and Settings\<username>\Application Data\E-Class SRA\ewpca

The //Redirection Rules// section of the redirect.pac file lists the addresses defined as destinations that are sent through the standard Web proxy agent. These addresses come from the list of network and URL resources defined in AMC.

Tunnel Issues

This section describes how to troubleshoot problems with the network tunnel service and the tunnel clients.

Installation

Issue

Troubleshooting tips

Connect Tunnel cli­ent does not install

The provisioned client is delivered to client computers as an installation package. If the installation procedure fails, the following may explain the issue or offer a solution:

• System is not supported: Ensure that the client computer’s system soft­ware is supported by the Connect Tunnel client.

• Client software doesn’t match system requirements: If users can access WorkPlace, install the client that is available in WorkPlace.

• User does not have local administrator rights: Users must have administra­tor rights to install the Connect Tunnel client.

• The Connect Tunnel client installation log file (ngsetup.log) may contain information that can help troubleshoot installation issues. On Windows XP, this file is located in the following folder on the user’s computer:

[drive:]\Documents and Settings\All Users\Application Data\E-Class SRA\ngsetup.log

On Windows Vista, the file is located in the ProgramData folder, which is hidden by default:

[drive:]\ProgramData\E-Class SRA\ngsetup.log

OnDemand Tunnel agent does not install

The OnDemand Tunnel client is automatically installed and activated when a user browses to WorkPlace after authenticating in an appropriately config­ured realm. Typically, the OnDemand Tunnel agent operates without user intervention, providing secure, tunneled access to configured resources as long as WorkPlace is running. If the OnDemand Tunnel agent fails to install or activate, the following may explain the issue or offer a solution:

• Installing OnDemand Tunnel requires administrator rights.

• OnDemand Tunnel not enabled for this Workplace realm: On the main navigation menu in AMC, click Realms. The Realms page displays a list of all realms defined for the appliance. To review the settings affecting the net­work tunnel service for a particular realm, click the realm name. On the Communities tab of the Configure Realm page, click Edit in the Access Methods area. Ensure that the Network tunnel client check box is selected.

• System is not supported: Ensure that the client computer’s system soft­ware is supported by the OnDemand Tunnel agent.

• Browser is not supported: Ensure that the user is running a Web browser that is supported by the OnDemand Tunnel agent. See Client Components on page 20 for system requirements.

Connectivity

Issue

Troubleshooting tips

Client does not con­nect

The OnDemand Tunnel agent starts automatically after users successfully authenticate to WorkPlace, if the community supports the OnDemand Tunnel agent.

The provisioned Connect Tunnel client requires you to activate it each time you want to begin a tunnel session. Tunnel sessions can remain active for many hours. Interrupting network connectivity for periods of more than a few seconds causes the tunnel session to end. Interruptions occur, for example, when a network cable is disconnected, a laptop is set to sleep, or the net­work link is so busy that it has high latencies and packet drop rates.

The following describes common failures that can prevent a Connect Tunnel client or OnDemand Tunnel agent connection from succeeding:

• Appliance is unreachable: In the E-Class SRA Connect login dialog box, click Properties. In the Properties dialog box, under Login group, click Change. If the appliance is reachable over the network, the Select or enter your login box will be populated with a list of available realms. If the appliance is not reachable, after a few moments you will see an error message that reads “The remote network connection has timed out.”

• Incorrect appliance address specified: In the E-Class SRA Connect login dialog box, click Properties. In the Properties dialog box, ensure that the Host name or IP address of your VPN is correct. If a host name is entered instead of an IP address, ensure that the client can resolve the host name, and that the host name corresponds to the IP address of the appli­ance’s external interface.

• Appliance is not running: Ensure that the appliance is running.

• Invalid realm for user name: Ensure that a valid realm is configured for the user.

• Authentication failure: Ensure that the user has specified the correct authentication credentials.

• Client service failure: Retrieve the client log (ngsetup.log), and send the log file to E-Class SRA for analysis along with a description of the situation.

• Personal firewall is not permitting tunnel traffic: Ensure that the user’s fire­wall is configured to allow connections to the appliance’s FQDN or IP address.

Client connects, but cannot access a resource

When a tunnel is established, an icon representing that tunnel appears in the taskbar notification area. At this point the client computer has access to all configured resources the appliance can reach and for which the user is authorized. If the client cannot reach a resource, the following may explain the issue or offer a solution:

• Resource not defined: Ensure that the correct resource is defined in AMC.

• User not authorized to access resource: In AMC, review access control rules, and realm and community assignments, to ensure that the user is allowed to access the resource.

• Appliance routing cannot reach resource: Ensure that there isn’t a general networking problem between the appliance and back-end resources.

• Server software failure: Note the time of the failure, determine whether the network tunnel service is functioning properly, and gather further trouble­shooting information if necessary.

Client connects, but disconnects unex­pectedly

Once connected, a Connect Tunnel or OnDemand Tunnel connection should remain active for many hours. However, the tunnel can end prematurely for several reasons. If a tunnel connection disconnects unexpectedly, the follow­ing may explain the issue or offer a solution:

• Tunnel that was left idle timed out: To conserve appliance resources, idle tunnels can disconnect after an extended period of time.

• Administrator stopped or restarted the network tunnel service: Normal con­figuration operations using AMC should not affect established tunnels; they continue to operate under the configuration that was in effect when they were established. However, configuration changes that affect basic appli­ance networking will cause existing tunnels to drop or hang, possibly requir­ing a disconnect at the client to recover.

• With the network tunnel service logs set to Info level or higher, the mes­sage “Reset Internal Interface and Addressing Information” appears in the log any time the network tunnel service is stopped; in addition, the message “Internal Interface eth0 Address n.n.n.n Netmask n.n.n.n BCastAddr n.n.n.n Subnet n.n.n.n” (with appropriate IP addressing values) appears any time the service is started from a stopped condition. In the ngutil log, the text “The server is shutting down” identifies this situation.

• Internetwork carrying tunnel became unresponsive or unreliable: When traffic fills the available bandwidth on any hop between the client and the appliance, packets wait on queues in the end-point TCP stack or in interme­diate routers. When queues fill, packets are dropped.

• The network tunnel service carries traffic over a TCP SSL connection. TCP is designed to accept network unreliability by delivering traffic only when it is in sequence, it can be verified, and it is available. TCP implementations can drop connections when ACK responses are not returned soon enough; this is true of the Windows TCP implementation. After the connection drops, the tunnel client’s normal behavior is to attempt to resume the connection trans­parently for 20 seconds. If congestion caused the drop, resumption is likely to fail, and the user sees the tunnel terminate.

• Cluster failover occurred, and client’s resumption failed: In a cluster config­uration, when an active node fails over to the standby node, client connec­tions are preserved by the client tunnel resumption mechanism. Clients will continue tunnel resumption attempts for 20 seconds, and then give up; if the failover is not complete within this time the tunnel connection is dropped. On orderly termination the client does not attempt resumption, so all tunnel con­nections are dropped.

• In addition, a new client connection initiated after failover, but during the period in which tunnel clients are attempting resumption, might be assigned an address that an existing client is trying to resume using. Several charac­teristics of address assignment make this case unlikely, but if it occurs the resuming client’s tunnel is dropped.

Client connects, but disconnects unex­pectedly (continued)

• Client service failure: Failure of the client service software can cause the tunnel to drop, and an error dialog box to appear. Retrieve the client log, send the log file to E-Class SRA for analysis along with a description of the situation, and then restart the service.

• Server software failure: Failure of the appliance tunnel software generally causes a spontaneous reboot of the appliance, or possibly an indefinite hang.

• In the reboot case, a crash dump appears in a numbered directory in /var/log/dump; retrieve and analyze this information.

: : If the appliance hangs without rebooting, the crash dump may have succeeded before the hang; reboot the appliance and check /var/log/dump for a new crash dump, and then retrieve and analyze this information. You may need to reproduce the circumstances that led to the crash.

General server prob­lems

Tunnel problems typically show up at the client first. Many possible problems can be identified only by an administrator in AMC or, sometimes, at an SSH console or the system serial console. For more information, see General Networking Issues on page 695.

Network tunnel ser­vice is not running

At the serial console or in an SSH session, type:

uscat /var/avt/vpn/status

If the network tunnel service is configured and running, client virtual address range information will appear. Otherwise, nothing will appear except another shell prompt. The following items can help you determine why the network tunnel service is not running.

• License invalid or expired: If your appliance license is invalid, AMC dis­plays a license warning at the top- right corner of every AMC page after login. You may need to contact E-Class SRA to resolve licensing issues.

• Stopped in AMC or from console prompt: In the Network Tunnel Service area of the AMC Services page, you can stop the network tunnel service indefinitely, and you can view information that indicates whether the service has been stopped.

• Service unconfigured, or incorrectly configured: The network tunnel ser­vice must be configured with virtual addresses and related information for assignment to clients. If tunnel service configuration is incomplete, the ser­vice will not run.

• Server software failure: A failure of a userspace network tunnel service component will generally cause the failed component to restart. There may be helpful information in the log or in a corefile in /var/log/core. Serious fail­ure of a kernel component will likely result in a crash dump.

• Cluster issues: Clustered appliances must be able to communicate over their cluster interfaces. If they cannot communicate reliably, both nodes in the pair may attempt to provide service, resulting in failures, or both nodes may be on standby, so that neither is providing service.

: : Windows Client Troubleshooting on page 711

: : Macintosh and Linux Tunnel Client Troubleshooting on page 713

OnDemand Issues

This section describes how to troubleshoot issues with OnDemand (port-mapped).

: : General OnDemand Issues on page 708

: : Specific OnDemand Issues on page 710

General OnDemand Issues

If OnDemand fails to work properly, perform the following diagnostics.

: : Testing OnDemand on page 708

: : Viewing OnDemand Log Files on page 708

: : Detecting the JRE Version on page 708

: : Enabling Java in the Browser on page 709

: : Viewing the Java Console on page 709

Testing OnDemand

Test OnDemand by connecting to the appropriate URLs to start the applet, and then running the supported applications.

When testing, make sure that:

: : OnDemand can communicate with required network access services.

: : Web proxy service authentication and access control are working.

: : OnDemand automatically redirects connections properly.

: : OnDemand creates connections for each configured application.

: : OnDemand starts any thin-client applications that are configured to start automatically.

Viewing OnDemand Log Files

For users running Windows, OnDemand creates a log file when it starts that contains troubleshooting messages. The log files are saved here:

%SystemRoot%\Documents and Settings\AllUsers\Application Data\E-Class SRA\Logfiles\

%SystemRoot%\Documents and Settings\<username>\Application Data\E-Class SRA\Logfiles\

Detecting the JRE Version

If OnDemand is not working properly, ensure that the user is running a version of the Java Runtime Environment (JRE) that is supported by OnDemand; see Client Components on page 20 for system requirements. In addition, make sure the user has enabled Java in the browser; see Enabling Java in the Browser on page 709.

To detect the JRE version running on a client computer

: : Internet Explorer for Windows: Open the browser’s Java Console to view information about your JRE; see Viewing the Java Console on page 709.

: : Browsers for Mac OS X: In the Applications folder, open the Utilities folder, and then open the Java folder. Run the Java Plugin Settings program, and then click About in the menu to see information about the version you are running.

Note: Some versions of Windows may not include a JRE; in this case, you see an error message (“jview.exe must exist in \path or you need to set JAVA_HOME”). If you see this message but you know that you have a JRE on your Windows computer, set the path to the JRE directory as JAVA_HOME in the Environment Variables dialog box; see Windows Help for information. Otherwise, you must either install a JRE on your Windows computer or use a different computer.

Enabling Java in the Browser

Java must be enabled in the user’s browser for the OnDemand applet to run. In Internet Explorer, Java is enabled by default. If OnDemand doesn’t run, and you suspect the defaults have been changed, enable them as described in the browser’s documentation.

Viewing the Java Console

If the OnDemand applet doesn’t start, the Java Console might offer an explanation. Have your user follow the steps appropriate for his or her machine:

Viewing the Java console: Windows—Sun JRE users

1. Users who are running the Sun Java Runtime Environment can access the Java Console by right-clicking the Sun Java icon in the taskbar notification area.

2. Click Open Console.

Viewing the Java console: Internet Explorer for Windows

1. Click Tools > Internet Options, and then click the Advanced tab.

2. Under Microsoft VM, select the Java Console enabled and Java logging enabled check boxes, and then click OK.

3. Close the browser and then reopen it.

4. Click Java Console on the View menu.

Viewing the Java console: Mac OS X

1. In the Applications folder, open the Utilities folder.

2. In the Java folder, run the Java Plugin Settings program.

3. In the Java Plug-in Control Panel, click Use Java console on the General page.

Specific OnDemand Issues

This section describes some troubleshooting tips for specific situations you may encounter when using OnDemand.

Issue

Troubleshooting tip

OnDemand does not start

On the computer you are trying to start OnDemand, verify that Java or JavaScript is enabled in the Web browser.

If Java is enabled in the browser, also verify that the browser is using a version of the Java Runtime Environment (JRE) that is sup­ported by OnDemand; see Client Components on page 20 for sys­tem requirements.

If both of these options are enabled, and OnDemand still doesn’t start, open the Java Console on the user’s computer to see Java messages. If the problem requires a call to Dell SonicWALL Techni­cal Support, you’ll be asked about these messages; see Viewing the Java Console on page 709.

An application does not run correctly over OnDemand

Have the user check the OnDemand Details page and verify whether the application name is active or inactive. Problems can occur when more than one application is configured to use the same local IP address and port. To see more details about the problem, ask the user to copy the log messages from the OnDe­mand Details page and email them to you.

OnDemand is installed but not activated

If both ActiveX and UAC (User Account Control) are disabled on a client computer running Vista SP1, OnDemand can be installed but fails to activate unless Java is configured to keep a cache of tem­porary files on the local computer. To select the cache setting, go to the Control Panel and open the Java Control panel. In the Tem­porary Internet Files area, click Settings, and then select Keep temporary files on my computer.

The server-certificate Accept button is unavailable

Under some circumstances, OnDemand may present the user with a server certificate that he or she cannot accept. If the Accept button on the certificate page is unavailable, OnDemand detects a problem with the server certificate. The most common causes of this problem are:

• Date/time mismatches between client computer and server. Ver­ify that the client computer and the Web proxy service have the cor­rect date and time.

• The certificate has expired or is not yet valid.

• The certificate information does not match the server information.

• The certificate chain is invalid.

Client Troubleshooting

This section provides client troubleshooting information for Windows, Mac, and Linux clients.

: : Windows Client Troubleshooting on page 711

: : Macintosh and Linux Tunnel Client Troubleshooting on page 713

Windows Client Troubleshooting

The E-Class SRA installer software can be loaded on a user's computer by Java or by ActiveX. If you want to remove this installer, as well as all the other E-Class SRA software components, follow these steps.

: : Resetting Browser and Java Settings on page 711

: : Uninstalling E-Class SRA Components on page 712

: : Logging Back In to WorkPlace on page 713

Resetting Browser and Java Settings

Follow these steps to reset browser and Java settings. Where applicable, the instructions for Internet Explorer, Google Chrome, and Firefox Mozilla are given.

Clear Cookies and Cache

To clear browser cookies and cache in Internet Explorer, follow these steps:

1. Click Tools > Internet Options.

2. Click Delete Files and Delete Cookies.

To clear browser cookies and cache in Mozilla Firefox, follow these steps:

1. Click Tools > Clear Private Data.

2. Select at least these three check boxes:

: : Cookies

: : Cache

: : Authenticated Sessions

3. Click Clear Private Data Now.

To clear browser cookies and cache in Google Chrome, follow these steps:

1. Click Tools > Clear browsing data.

2. Select at least these check boxes:

: : Delete cookies and other site and plug-in data

: : Empty the cache

3. Click Clear browsing data.

Reset Security Zones to Defaults

To reset the security level for all Web content zones in Internet Explorer, follow these steps:

1. Click Tools > Internet Options > Security tab.

2. Highlight a Web content zone (for example, Internet), and then click the Default Level button. Do this for each zone.

Reset Advanced Settings to Defaults

To reset advanced Internet Explorer settings, follow these steps:

1. Click Tools > Internet Options > Advanced tab.

2. Click the Restore Defaults button.

Reset Privacy Settings to Defaults

To reset Internet Explorer privacy settings, follow these steps:

1. Click Tools > Internet Options > Privacy tab.

2. Click the Default button.

Clear your Java Cache

To clear the Java Cache on your Windows system, follow these steps:

1. In the Control Panel, double-click Java.

2. Click the Delete Files button.

3. Make sure that all three types of temporary files are selected for deletion, and then click OK.

Enable your Java Cache

By default, Java is configured to keep a cache of temporary files on the local computer. If you are using Java for remote access through an E-Class SRA appliance, make sure that this cache is enabled:

1. In the Windows Control Panel, open Java.

2. In the Java control panel, click Settings in the Temporary Internet Files area.

3. Select Keep temporary files on my computer.

Uninstalling E-Class SRA Components

Follow these steps to uninstall all E-Class SRA files:

1. Reboot your computer. This ensures that no files are loaded in memory and makes the uninstall easier.

2. Remove all E-Class SRA components:

a.In Windows Explorer, browse to %WINDIR%\Downloaded Program Files\.

b.Right-click the E-Class SRA Installer file, and select Remove.

c.Uninstall the E-Class SRA VPN Software. You are prompted to reboot your computer, but you don’t need to do so until the final step in this procedure.

d.In the Control Panel, open Add/Remove Programs.

e.Remove each E-Class SRA component.

3. The E-Class SRA software may have been installed using either ActiveX or Java (if you’re not sure, follow both sets of instructions):

ActiveX

If you have already done step 2b above, you can skip to the steps for Java.

a.In Windows Explorer, browse to %WINDIR%\Downloaded Program Files\.

b.Right-click on the E-Class SRA Installer file, select Remove, and then click OK.

c.Uninstall the E-Class SRA VPN Software. You are prompted to reboot your computer, but you don’t need to do so until the final step in this procedure.

Java

a.In Windows Explorer, browse to %HOMEPATH%\Application Data\E-Class SRA\EP\.

b.Double-click uninstall_ep.exe.

c.Uninstall the E-Class SRA VPN Software. You are prompted to reboot your computer, but you don’t need to do so until the final step in this procedure.

4. In Windows Explorer, browse to %HOMEPATH%\Application Data\, right-click on the E-Class SRA folder, and then select Delete.

5. Reboot the computer.

Logging Back In to WorkPlace

Log back in to WorkPlace, install E-Class SRA Access Manager, and let the E-Class SRA components load.

If something goes wrong during client or agent installation, the error is recorded in a client installation log. This log is automatically uploaded to the appliance and listed in AMC if E-Class SRA Access Manager is installed. Users who do not have E-Class SRA Access Manager are prompted to upload the log file to the appliance when an installation error occurs.

Follow these steps to obtain additional log files:

1. Browse to %HOMEPATH%\Application Data\.

2. You should see a folder named E-Class SRA: zip the folder contents up, and email it to Dell SonicWALL Technical Support.

3. Browse to %ALLUSERSPROFILE%\Application Data\.

4. You should see a folder named E-Class SRA: zip the folder contents up, and email it to Dell SonicWALL Technical Support.

5. Open a DOS box (click Start > Run, type cmd, and then press Enter).

6. In the command prompt window, type ngutil -all > ngutil.txt.

7. Email the ngutil.txt file to Dell SonicWALL Technical Support.

8. Click Start > Run, type msinfo32, and then press Enter.

9. Highlight System Summary, and then select File > Export. Email the exported file to Dell SonicWALL Technical Support.

Macintosh and Linux Tunnel Client Troubleshooting

When troubleshooting Macintosh and Linux tunnel client problems, request the system and version information described in this section from your users. Before gathering this information, users should uninstall and re-install the software.

: : Macintosh System and Application Information on page 713

: : Linux System and Application Information on page 714

Macintosh System and Application Information

Have users specify the following information:

System information

How to find it

Operating system

Select About this Mac from the Apple menu.

Hostfino command

Open the Terminal application (in the Applications > Utilities folder) and type hostfino. This displays processor and kernel information, along with the amount of available memory.

OpenSSL

Open the Terminal application (in the Applications > Utilities folder) and type the following to display information about OpenSSL:

openssl version

Safari browser

Select About Safari from the Safari menu.

Java Virtual Machine (JVM)

1. In the Applications folder, open the Utilities folder.

2. In the Java folder, run the Java Plugin Settings program.

3. In the Java Plug-in Control Panel, click Use Java console on the General page.

System Profiler

1. Select About this Mac from the Apple menu.

2. Click More Info to open the System Profiler. The profiler displays detailed information about the computer’s hardware and installed software. The complete report (if you choose to print it) can easily be over 100 pages long.

When you start Connect Tunnel, make sure that the log files /var/log/AvConnect.log and /var/log/AvConnectUI.log are set to collect debugging information. You can enable debug mode in the E-Class SRA Connect client itself, or go to a command prompt and type the following:

/Applications/AventailConnect.app/Contents/MacOS/startct.sh -d

Linux System and Application Information

Have your users enable debug logging and clear the current set of logs before attempting to reproduce an issue. Once the issue is reproduced, export the logs to Dell SonicWALL Support.

Use the Enable Debug Logging check box, Clear Logs button, and Export Logs button on the General tab to perform these functions:

Linux_CT_Logging.png

 

Troubleshooting Tools in AMC

You can monitor, troubleshoot or terminate sessions on your appliance, filtering them by user name, realm (authentication server), community, access agent, traffic load, and so on—and then get a quick summary of particular sessions. Several basic network tools are also available, including ping, traceroute, DNS lookup, a routing table viewer, and a way to capture and filter network traces for backend connectivity troubleshooting.

: : Viewing User Sessions on page 290

: : Using DNS Lookup on page 716

: : Viewing the Current Routing Table on page 716

: : Capturing Network Traffic on page 717

: : Logging Tools for Network Tunnel Clients on page 718

: : Using CEM Extensions on page 719

: : Ping Command on page 719

: : Traceroute Command on page 720

: : Snapshot Tool on page 721

Using DNS Lookup

You can use AMC’s Lookup tool to determine how DNS is resolving an IP address or a host name. This tool is useful for troubleshooting various DNS problems (for example, it can determine whether your DNS server is running).

Use a fully qualified domain name or an IP address to specify a host in the Lookup tool. However, you can type a non-qualified host name as long as you have defined one or more default search domains on the Configure Name Resolution page (available from the Network Settings page in AMC). For details on name resolution, see Configuring Name Resolution on page 150.

To determine how DNS is resolving an IP address or host name

1. From the main navigation menu, click Troubleshooting.

2. Click the Lookup tab.

3. In the Address box, type the IP address or host name of the machine against which you want to issue the command.

4. Click Go.

Viewing the Current Routing Table

You can view the current routing table from within AMC.

To view the current routing table

1. From the main navigation menu, click Troubleshooting.

2. Click the Routes tab.

3. Click Go. The routing table is displayed.

Capturing Network Traffic

This network traffic utility, which is based on tcpdump, allows you to capture a packet-by-packet list of the data going in and out of the appliance. If you are new to troubleshooting, you can use this utility to generate a file of network traffic data that can be sent to Technical Support for troubleshooting network issues. If you are familiar with troubleshooting and reading trace files, you can analyze the traffic using a network protocol analyzer, such as Wireshark.

Capturing all network traffic on your appliance can quickly result in files that are too unwieldy to analyze. Where possible, use filters to restrict the traffic to issues you are troubleshooting.

The following sample procedure demonstrates how to filter by host and port (in this example, an Exchange server and Web traffic).

To filter and capture network traffic to a file on the appliance

1. From the main navigation menu, click Troubleshooting.

2. Click the Network Traffic tab.

3. To restrict the capture to traffic coming from or going to your Exchange server, enter the server’s full qualified domain name or IPv4 or IPv6 address in the These hosts text box. For example, exchange.mycompany.com.

4. To make sure that you are capturing only the HTTP traffic, select Web (HTTP or HTTP/S) from the Common ports list; only traffic to and from the HTTP and HTTPS ports (80, 443, 8080, and 8443) will be captured.

Click Start to begin capturing traffic. The size limit for a single capture is 500 MB of raw data; when the size of a capture file reaches 100 MB, it “rolls over” into a separate file (large files are difficult to process with packet analysis tools such as Wireshark). If the total size of a single capture reaches 500 MB (five files of 100 MB each), the capture automatically stops. During a capture, the Size column indicates how close you are to the limit.

6. Click Stop to stop capturing traffic. The capture file is a .zip file that is stored on the appliance and listed here. (The figure in the Size column indicates how much room the file is using on the appliance; this is the size of the compressed .zip file, not the raw data.) The maximum number of files you can store is ten; as more capture files are added, the oldest ones are dropped from the list.

7. To download captured data, click the button corresponding to the file you want to analyze or send to Technical Support, and then click Download. Each capture file is a .zip file containing the captured network traffic (for example, eth0.cap) and a readme text file outlining what filters were used, if any, and when the data was captured.

Comment: Internal interface, hosts: exchange.mycompany.com, selected ports

Internal interface (eth0): enabled
External interface (eth1): disabled
Protocol: <All>
Hosts: exchange.mycompany.com
Ports: 80,443, 8080, 8443

Start time: Wed Aug 15 2007 17:56:52 GMT
Stop time: Wed Aug 15 2007 17:58:31 GMT

Note: Captured network traffic is not encrypted and may contain passwords and other sensitive information. If you have security concerns about storing a downloaded capture or sending it over an unsecured Internet connection, use Snapshot Tool in AMC instead. You can make a partial snapshot that includes only network captures, and then choose to encrypt the results. See Snapshot Tool on page 721 for more information.

You can capture network traffic on either of the appliances in a high-availability pair (the master node or the slave node).

Logging Tools for Network Tunnel Clients

To capture a session during which a user is running either of the network tunnel clients, have users follow these steps and email you the results. The Windows procedure differs from the one for Macintosh and Linux users.

To run ngutil on a Windows client computer

1. Go to a command prompt: Click Start > Run, and then type cmd in the Open box; if you are using Windows Vista, Click Start, and then type cmd in the Start Search box.

2. At the command prompt, clear the event log and set the severity level by typing the following command:

ngutil -reset -severity=debug

3. Start the network tunnel client and perform any actions the system administrator wants captured in the log.

4. At the command prompt, type ngutil > log.txt to write the buffered log messages to a file named log.txt in the current directory.

5. Send the log.txt file to the administrator.

6. Alternatively, you can run ngutil -poll to see real-time logging on the client computer. (Press Ctrl-C to stop logging.)

Note: You can also have users type the ngutil -tail=1000>client-log.txt command; this sends the most recent 1000 lines in the client log to a file named client-log.txt in plain text.

For more information on the syntax for the ngutil command, type ngutil -help at the command prompt.

To save session information on a client computer (Macintosh or Linux)

1. Start the network tunnel client and perform any actions the system administrator wants captured in the log.

2. On the client device, locate the files AvConnect.log and AvConnectUI.log and send them to the administrator.

Using CEM Extensions

Dell SonicWALL Technical Support may ask you to use Aventail E-Class SRA Configuration Extension Mechanism (CEM) advanced URL extensions.

These CEM extensions are used to access advanced AMC pages and should only be used when instructed to do so by Technical Support. For additional information, see Knowledge Base article 10061 at:
http://www.sonicwall.com/us/en/support/2213.html

CEM Advanced Features

The Configuration Extension Mechanism (CEM) is a generic mechanism to allow simple configuration to be done for features that appear in maintenance releases or hotfixes. The CEM page allows the configuration of arbitrary key-value pairs for enabling advanced functionality. These key-value pairs are read from the extension config file by each service that has a patch generated for it (custom drop, hotfix, or maintenance release).

Advanced features should be used only under Dell SonicWALL Support supervision. Please contact Dell SonicWALL Support for additional instructions at:

Contact Support Page - http://www.sonicwall.com/us/support/contact.html

Contact Dell SonicWALL Page - http://www.sonicwall.com/us/company/286.html

Ping Command

Use the ping command to verify a network connection. When you issue the ping command, it sends an ICMP ECHO_REQUEST packet to a target host and waits to see if the host answers.

To issue a ping command

1. From the main navigation menu, click Troubleshooting.

2. In the Address box on the Ping page, type the IPv4 or IPv6 address or host name of the machine you want to ping.

3. Click Go. AMC issues the ping command. After about five seconds, the results appear in the large box at the bottom of the page. If the ping command cannot reach the host, it returns results resembling the following:

Traceroute Command

Use the traceroute command to see the sequence of gateways through which an IP packet travels to reach its destination. This can help you find a network failure point.

To issue a traceroute

1. From the main navigation menu, click Troubleshooting.

2. In the Address box on the Ping page, type the IP address or host name of the machine against which you want to issue the traceroute command.

3. Select the Use traceroute check box.

4. Click Go. Traceroute returns a list of hosts, starting with the first gateway and ending with the destination.

Snapshot Tool

A “snapshot” of your configuration can help Dell SonicWALL Technical Support or other IT professionals diagnose any problems you are having with the appliance. This file, especially if it includes core dump files, can be quite large (the File Download dialog box in the final step will tell you how large).

To save a configuration snapshot

1. From the main navigation menu, click Troubleshooting.

2. Click the Snapshot tab.

Select a full or partial snapshot.

4. Specify whether you will include all system logs, or just the four most recent ones.

5. Click Save snapshot. The files are saved in a zip archive named snapshot.tgz.

6. If you plan to send the file to Dell SonicWALL Technical Support, you should select Encrypt file to keep sensitive information secure. Technical Support will need the password you assigned to this archive so that they can decrypt the file. Make sure you send it in such a way that it meets your internal security requirements (over the phone or by secure email, for example).

7. Click the Download link to save the compressed file locally.