<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;A secondary session request was received from the same IP&amp;quot; from a Terminal Servers Id in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220551#M42198</link>
    <description>&lt;P&gt;Did you check:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk131792" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk131792&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jul 2024 13:54:07 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-07-12T13:54:07Z</dc:date>
    <item>
      <title>"A secondary session request was received from the same IP" from a Terminal Servers Identity Agent</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220501#M42194</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we use the IA collector and Terminal Servers Identity Agents. Recently we see problems with "A secondary session request was received from the same IP" from Citrix TS servers and as Indentity Source "Terminal Servers Identity Agent" (see attachted screenshot). I know this error logs for identities from the IA collector, but the exculsion for the TS network within the IA collector seems to work, no logs for this network with Identity Source "Identity Collector (Active Directory)". And no other error logs of the blade Identity Awareness.&lt;BR /&gt;I don't know since when the error occurs, it's sporadic and already in the oldest available logs. But now we have problems with several firewall rules that don't match because the identity is "lost".&lt;BR /&gt;&lt;BR /&gt;I'm still trying to verify if there is always another session on the problematic TS without any log of the IA. In the last case there was one, but without any obvious difference to the other TS sessions (it's a Citrix farm).&lt;BR /&gt;&lt;BR /&gt;We see it on both gateways with terminal server agent connections.&lt;BR /&gt;It comes from several TS instances, mostly only one at the same time, it stops and some hours later from another TS.&lt;BR /&gt;It occurs on two gateways, from two Citrix farms, it might be a general problem.&lt;BR /&gt;&lt;BR /&gt;Did anybody see the secondary login error from a MUH agent?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Gateways: R81.10 Take 150; R81.20 Take 65 (recently updated to R81.20, no change of the error)&lt;BR /&gt;TS Agent: R81.070.0000&lt;BR /&gt;Number of sessions per TS: 3 - 5&lt;BR /&gt;TS: Win 2019&lt;BR /&gt;Number of connected Terminal Servers Identity Agents on the R81.20 gateway: ~35&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Claudia&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 09:52:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220501#M42194</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2024-07-12T09:52:47Z</dc:date>
    </item>
    <item>
      <title>Re: "A secondary session request was received from the same IP" from a Terminal Servers Id</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220551#M42198</link>
      <description>&lt;P&gt;Did you check:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk131792" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk131792&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 13:54:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220551#M42198</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-12T13:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: "A secondary session request was received from the same IP" from a Terminal Servers Id</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220555#M42199</link>
      <description>&lt;P&gt;Yes, but this network is in the network exclusion filter of the Identity Collector (and there is no log in logged for the Identity Collector for this IP address), and we don't use AD query.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 14:00:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220555#M42199</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2024-07-12T14:00:46Z</dc:date>
    </item>
    <item>
      <title>Re: "A secondary session request was received from the same IP" from a Terminal Servers Id</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220597#M42202</link>
      <description>&lt;P&gt;This is relevant for all methods except ADQuery, actually.&lt;BR /&gt;Your best bet is probably a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jul 2024 19:04:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/220597#M42202</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-12T19:04:48Z</dc:date>
    </item>
    <item>
      <title>Re: "A secondary session request was received from the same IP" from a Terminal Servers Id</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/221823#M42500</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I did some additional debugging to get more error details before opening a TAC case, and found that just one user causes this error, but this user has no log entry in SmartConsole (a ghost it's rather hard to find). The login/logout timestamps and hostname of the TS from Citrix match the begin and end of the error logs on Check Point side at several days.&lt;/P&gt;&lt;P&gt;I checked the ia_client.log on the TS and there is a eye-cathing difference to the other users: the problematic users seems to have 140 group SIDs, all other users have significantly less group SIDs.The logs for this users ends up with&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [PDP Connection Manager (TD::Events)] NAC::CLIENT::PDPCOMM::PDPConnectionManager::sendRequest: callerHandleFailure 0 from type SubSession&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [PDP Connection Manager (TD::Events)] NAC::CLIENT::PDPCOMM::PDPConnectionManager::sendRequest: not sending request since there is a queue. waiting for previous calls to wait&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::User::addWindowsSessionID: Adding windows session 4 for user: xyz\xyz&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: session id: 0, username: , logon domain: (connect state: 6)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: Failed to obtain session's handle&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: session id: 0, username: , logon domain: (connect state: 6)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: Failed to obtain session's handle&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: session id: 0, username: , logon domain: (connect state: 6)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::addCurrentlyLoggedInUsers: Failed to obtain session's handle&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [MUH2UserManager (NAC::IS::TD::Events)] NAC::CLIENT::MANAGER::MUH2UserManager::MUH2UserManager: Succeeded loading MUH driver service library&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [AuthenticationManager (NAC::IS::TD::Events)] NAC::CLIENT::AUTH::AuthenticationManager::finishedLastAuthentication: scheduling re-authentication in 180000 ms for group MachineAuthMethods&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [PDP Connection Manager (TD::Events)] NAC::CLIENT::PDPCOMM::PDPConnectionManager::Notify: firing connection notifiction trigger finished&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[ 3548 5552]@hostname[24 Jul 14:35:28] [PDP Connection Manager (TD::Events)] NAC::CLIENT::PDPCOMM::PDPConnectionManager::eraseFromRequestNotificationMap: deleting request 2 connection notification&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I cannot find a documented limit for the Terminal Server Identity Agent for group memberships. Are 140 groups really too many?&lt;/P&gt;&lt;P&gt;Best regards&lt;BR /&gt;Claudia&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 14:13:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/221823#M42500</guid>
      <dc:creator>ClaudiaPeter</dc:creator>
      <dc:date>2024-07-24T14:13:44Z</dc:date>
    </item>
    <item>
      <title>Re: "A secondary session request was received from the same IP" from a Terminal Servers Id</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/221838#M42507</link>
      <description>&lt;P&gt;It could very well be that you've run into some sort of limit.&lt;BR /&gt;Definitely open a TAC case if you haven't already.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 15:27:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-A-secondary-session-request-was-received-from-the-same-IP/m-p/221838#M42507</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-24T15:27:06Z</dc:date>
    </item>
  </channel>
</rss>

