Network Discovery of Citrix Netscaler

I am unable to discover a Citrix Netscaler as a network device.
I've enabled tracing on the discovery and can see that the initial queries to the device are responding but then ther are timeouts attempting to access interface types.  The OID does timeout in a third party tool as well as there is no interface index
but a query to OID  .1.3.6.1.2.1.2.2.1.3.1 (index 1 of the interface list) would return a value but I don't know if there's a way to work around this in the discovery.
SNMP Message:
    0:  packet ->
        SEQUENCE (0x30), 203 bytes:
    3:    version ->
          INTEGER-32 (0x02), 1 byte == 1 <v2c>
    6:    community ->
          OCTET-STRING (0x04), 5 bytes == "*****"
   13:    Response ->  (0xa2), 190 bytes:
   16:      request-id ->
            INTEGER-32 (0x02), 2 bytes == 5003
   20:      error-status ->
            INTEGER-32 (0x02), 1 byte == 0 <noError>
   23:      error-index ->
            INTEGER-32 (0x02), 1 byte == 0
   26:      VarBindList ->
            SEQUENCE (0x30), 177 bytes:
   29:        VarBind -> SEQUENCE (0x30), 75 bytes:
   31:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.2.1.1.1.0"
   41:          OCTET-STRING (0x04), 63 bytes == "NetScaler NS10.1: Build 119.7.nc, Date: Jul 29 2013, 23:30:51  "
  106:        VarBind -> SEQUENCE (0x30), 20 bytes:
  108:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.2.1.1.2.0"
  118:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.4.1.5951.1"
  128:        VarBind -> SEQUENCE (0x30), 24 bytes:
  130:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.2.1.1.4.0"
  140:          OCTET-STRING (0x04), 12 bytes == "OpsMgr Admin"
  154:        VarBind -> SEQUENCE (0x30), 21 bytes:
  156:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.2.1.1.5.0"
  166:          OCTET-STRING (0x04), 9 bytes == "NetScaler"
  177:        VarBind -> SEQUENCE (0x30), 27 bytes:
  179:          OBJ-ID (0x06), 8 bytes == ".1.3.6.1.2.1.1.6.0"
  189:          OCTET-STRING (0x04), 15 bytes == "xxxx"
[31/01/2014 13:10:05] t@15812 Discovery #20
SWFE-W-ETIMEOUT-GET_NEXT request timed out for Agent : xx.xx.xx.xx, OID:
    .1.3.6.1.2.1.2.2.1.3
 SNMP-ERESPONSE-No response from xx.xx.xx.xx, port 161
 SNMP-ETIMEOUT-Timed out
Regards,

For Configure SCOM to monitor Citrix NetScaler, you can refer below link
http://msandbu.wordpress.com/2013/04/02/monitoring-netscaler-with-operations-manager-2012/
Also check below link
http://social.technet.microsoft.com/Forums/systemcenter/en-US/0ff29697-87d2-4a75-90fd-2d4bb73867fb/citrix-netscaler-mp-for-scom-2012-wrong-oids?forum=operationsmanagermgmtpacks
Please remember, if you see a post that helped you please click "Vote As Helpful" and if it answered your question, please click "Mark As Answer".

Similar Messages

  • Discovery of Citrix Netscaler devices fails

    I have two older Citrix Netscaler devices that is discovered fine, but 4 new'er devices (Netscaler NS10.5) is not discovered.
    We can see that SCOM connects to the devices but SCOM says "No Response SNMP". Using a MIB browser I can connect to the newer Netscalers  and do a SNMP GET to read data from the MIB, however if I use a SNMP GET NEXT, the request time out so
    now I get no data.
    If do the same with the older Netscaler devices i.e. a GET and then a GET NEXT then I get data in both cases.
    This actually corresponds to the Netscaler documentation that says that GET NEXT is no longer support on the newer Netscalers.
    This leads me to think that SCOM might uses a GET NEXT in the discovery process. I haven't used a sniffer yet to check this.
    If anyone has had the same problem and knows a workaround I'd be very happy to hear about it :)
    br
    Lars

    Hi Ivan,
    thanks for your reply.
    The problem I have is the discovery via the SCOM 2012 network device discovery rule, which has to work before the Netscaler MP will see the device.  As I understand your reply it was the Commtrade Netscaler MP that didn't see the NS 10.5 devices right?
    But I have not even tested the Netscaler yet.
    I'm don't have access the the NS 10.5 device so I can't see how it's configured but I have found this information on the Citrix web site
    http://support.citrix.com/proddocs/topic/ns-system-10-5-map/ns-ag-config-ns-snmp-vo-vt-query-con.html. I think the problem is that the new NS 10.5
    by default does not accept Get-Next request and that this has to be configured first by configuring a community string and associate this string with both Get AND Get-Next, before the device will accept the Get-Next request that the SCOM discovery
    rule sends after the initial Get request. Am I on the right track ?
    Configuring the NetScaler for SNMP v1 and v2 Queries
    You can query the NetScaler SNMP agent for system-specific information from a remote device called SNMP managers. The agent then searches the management information base (MIB) for the data requested and sends the data to the SNMP manager.
    The following types of SNMP v1 and v2 queries are supported by the SNMP agent:
    GET
    GET NEXT
    ALL
    GET BULK
    You can create strings called <var class="keyword varname">community strings</var> and associate each of these to query types. You can associate one or more community strings to each query type. Community string
    are passwords and used to authenticate SNMP queries from SNMP managers.
    For example, if you associate two community strings, such as abc and
    bcd, to the query type GET NEXT, the SNMP agent on the NetScaler appliance considers only those GET NEXT SNMP query packets that contain
    abc or bcd as the community string.
    thanks again
    br
    Lars

  • Enabling network discovery on Windows Server 2012 R2

    Good afternoon.
    As per the title, I have set-up a new server at work. The server is running no problem but none of the other computers connected to the network can 'see' the new server. I've gone into the control panel and tried to turn on the network discovery, but it just
    defaults back to 'off'.
    I did so a search on here first before troubling anyone and I did find this answer :
    Thanks for the post.
    I did some research and found this issue may occur if the dependency services are disabled. Please make sure the following services are enabled and running.
    - SSDP Discovery
    - UPnP Device Host
    Disabling Network Discovery/Network Resources"
    That may well be the answer, but unfortunately that means absolutely nothing to me.
    Is someone able to help me try and switch this on, but by offering an explanation an 'idiot' would understand.
    Thanks in advance.

    Hi,
    This issue occurs for one of the following reasons:
    •The dependency services for Network Discovery are not running. 
    •The Windows firewall or other firewalls do not allow Network Discovery. 
    To resolve the issue, follow these steps:
    1.Make sure that the following dependency services are started:
    DNS Client
    Function Discovery Resource Publication
    SSDP Discovery
    UPnP Device Host
    2.Configure the Windows firewall to allow Network Discovery. To do this, follow these steps:
    Open Control Panel, click System and Security, and then click Windows Firewall.
    In the left pane, click Allow an app or feature through Windows Firewall if you are running Windows Server 2012. Or, click Allow a program or feature through Windows Firewall if you are running Windows Server 2008 or Windows Server 2008 R2.
    Click Change settings. If you are prompted for an administrator password or confirmation, type the password or provide confirmation.
    Select Network discovery, and then click OK.
    3.Configure other firewalls in the network to allow Network Discovery.
    4.Turn on Network Discovery in Network and Sharing Center
    Quote from http://support.microsoft.com/kb/2722035
    Steven Lee
    TechNet Community Support

  • GPO For Disable Network Discovery

    Hi s
    I have DC Windows Server 2008 R2 and clients with Windows 7, 8 and 8.1
    I want disable users Access to computers from Network Discovery.
    I apply GPO to remove Icon Network from Navigation Pane and it works perfect, but when users access to computer on network from RUN they see Network on Address bar. For example user access to Server from RUN
    \\Server\ if user do Click on Network on address bar see all computers on network.
    My Question is, How to prevent users see computers on network, how disable network discovery completely?
    Thanks.

    Hi,
    >>How to prevent users see computers on network, how disable network discovery completely?
    We can try the following solution to see if it helps. 
    In a new or existing GPO:
    1. On Computer configuration, choose Policies, choose Security Settings, choose Windows Firewall with Advanced Security.
    2. On Windows Firewall with Advance Settings, choose Inbound Rules, right click and choose New Rule
    3. On Rule Type, select Predefined and choose Network Discovery, choose Next
    4. Choose only the following rules:
    a. Network Discovery (LLMNR-UDP-In)
    b. Network Discovery (NP-Name-In)
    c. Network Discovery (Pub-WSD-In)
    d. Network Discovery (SSDP-In)
    5. On Action choose Block the connection
    6. Press Finish
    7. On Inbound Rules, right click and choose New Rule, select Next
    8. Choose only the following Rule:
    a. Network Discovery (NB-Datagram-In)
    9. On Action choose Allow the connection
    10. Press Finish
    11. On Windows Firewall with Advance Settings, choose Outbound Rules, right click and choose New Rule
    12. On Rule Type, select Predefined and choose Network Discovery, choose Next
    13. Choose only the following rules:
    a. Network Discovery (LLMNR-UDP Out)
    b. Network Discovery (NB-Name Out)
    c. Network Discovery (Pub-WSD Out)
    d. Network Discovery (SSDP Out)
    14. On Action choose Block the connection
    15. Press Finish
    16. On Outbound Rules, right click and choose New Rule, select Next
    17. Choose only the following Rule:
    a. Network Discovery (NB-Datagram Out
    18. On Action choose Allow the connection
    19. Press Finish
    20. On Computer configuration, choose Policies, choose Security Settings, choose System Services
    21. Choose Computer Browser Service
    22. Select Define this policy setting
    23. Choose Disabled, choose Apply and Ok.
    24. Repeat steps (21-23) for the following services:
    a. SSDP Discovery
    b. UPnP Device Host
    c. Function Discovery Resource Publication
    d. Function Discovery Provider host
    e. Link-Layer Topology Discovery Mapper
    After configuring the GPO, link this GPO to our target OU, and we can run gpupdate/force to immediately update group policy.
    Best regards,
    Frank Shen
    Please remember to mark the replies as answers if they help and unmark them if they provide no help. If you have feedback for TechNet Subscriber Support, contact [email protected].

  • Creating a Report of Network Discovery

    In SCCM 2012 R2 after we have enabled Network Discovery, could someone help with a query to list the devices discovered as a report?

    http://technet.microsoft.com/en-us/library/6a0e2b40-672f-45e1-a12d-6d403ab39780#BKMK_NetworkDisc 
    Ok, I will bit, How does this Doc section help with the question above?
    http://www.enhansoft.com/

  • 2008 R2 GPO - Turn network discovery on not working

    Hi
    I'm migrating several computers into a new domain with ADMT but all computer migrated (XP,7 and 8) could not enable network discovery.
    I've made a GPO (found on technet) that should work but users still are unable to browse network. Gpo is applied (checked with rsop) and sincerly i've no ideas on what to check to understand why the GPO is not working. Any idea on something to check or change?
    I copy the gpo here to check it.. thanks in advance
    Computer Configuration (Enabled)hide
    Policieshide
    Windows Settingshide
    Security Settingshide
    Windows Firewall with Advanced Securityhide
    Global Settingshide
    Policy
    Setting
    Policy version
    2.10
    Disable stateful FTP
    Not Configured
    Disable stateful PPTP
    Not Configured
    IPsec exempt
    Not Configured
    IPsec through NAT
    Not Configured
    Preshared key encoding
    Not Configured
    SA idle time
    Not Configured
    Strong CRL check
    Not Configured
    Inbound Ruleshide
    Name
    Description
    Network Discovery (Pub-WSD-In)
    Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    3702
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    fdrespub
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (LLMNR-UDP-In)
    Inbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    5355
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    dnscache
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (WSD-In)
    Inbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    3702
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    fdphost
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (SSDP-In)
    Inbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    1900
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    Ssdpsrv
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (WSD Events-In)
    Inbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    6
    Local port
    5357
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (WSD EventsSecure-In)
    Inbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    6
    Local port
    5358
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (NB-Datagram-In)
    Inbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    138
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (NB-Name-In)
    Inbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    17
    Local port
    137
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Allow edge traversal
    False
    Group
    Network Discovery
    Network Discovery (UPnP-In)
    Inbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP 2869]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Authorized users
    Protocol
    6
    Local port
    2869
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Allow edge traversal
    False
    Group
    Network Discovery
    Outbound Ruleshide
    Name
    Description
    Network Discovery (Pub WSD-Out)
    Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    3702
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    fdrespub
    Group
    Network Discovery
    Network Discovery (LLMNR-UDP-Out)
    Outbound rule for Network Discovery to allow Link Local Multicast Name Resolution. [UDP 5355]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    5355
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    dnscache
    Group
    Network Discovery
    Network Discovery (WSD-Out)
    Outbound rule for Network Discovery to discover devices via Function Discovery. [UDP 3702]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    3702
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    fdphost
    Group
    Network Discovery
    Network Discovery (UPnPHost-Out)
    Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    6
    Local port
    Any
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    upnphost
    Group
    Network Discovery
    Network Discovery (SSDP-Out)
    Outbound rule for Network Discovery to allow use of the Simple Service Discovery Protocol. [UDP 1900]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    %SystemRoot%\system32\svchost.exe
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    1900
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Local subnet
    Profile
    All
    Network interface type
    All
    Service
    Ssdpsrv
    Group
    Network Discovery
    Network Discovery (WSD Events-Out)
    Outbound rule for Network Discovery to allow WSDAPI Events via Function Discovery. [TCP 5357]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    6
    Local port
    Any
    Remote port
    5357
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Group
    Network Discovery
    Network Discovery (WSD EventsSecure-Out)
    Outbound rule for Network Discovery to allow Secure WSDAPI Events via Function Discovery. [TCP 5358]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    6
    Local port
    Any
    Remote port
    5358
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Group
    Network Discovery
    Network Discovery (NB-Datagram-Out)
    Outbound rule for Network Discovery to allow NetBIOS Datagram transmission and reception. [UDP 138]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    138
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Group
    Network Discovery
    Network Discovery (NB-Name-Out)
    Outbound rule for Network Discovery to allow NetBIOS Name Resolution. [UDP 137]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    17
    Local port
    Any
    Remote port
    137
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Group
    Network Discovery
    Network Discovery (UPnP-Out)
    Outbound rule for Network Discovery to allow use of Universal Plug and Play. [TCP]
    This rule may contain some elements that cannot be interpreted by current version of GPMC reporting module
    Enabled
    True
    Program
    System
    Action
    Allow
    Security
    Require authentication
    Authorized computers
    Protocol
    6
    Local port
    Any
    Remote port
    Any
    ICMP settings
    Any
    Local scope
    Any
    Remote scope
    Any
    Profile
    All
    Network interface type
    All
    Service
    All programs and services
    Group
    Network Discovery
    Connection Security Settingshide
    Administrative Templateshide
    Policy definitions (ADMX files) retrieved from the local machine.
    Network/Link-Layer Topology Discoveryhide
    Policy
    Setting
    Comment
    Turn on Mapper I/O (LLTDIO) driver
    Enabled
    Allow operation while in domain
    Enabled
    Allow operation while in public network
    Enabled
    Prohibit operation while in private network
    Enabled
    Policy
    Setting
    Comment
    Turn on Responder (RSPNDR) driver
    Enabled
    Allow operation while in domain
    Enabled
    Allow operation while in public network
    Enabled
    Prohibit operation while in private network
    Enabled
    User Configuration (Enabled)hide
    No settings defined.

    Hi,
    To enable Network Discovery, we need to make sure that the following dependency services are started on clients:
    DNS Client
    Function Discovery Resource Publication
    SSDP Discovery
    UPnP Device Host
    Regarding this point, the following article can be referred to for more information.
    You cannot turn on Network Discovery in Network and Sharing Center in Windows Server 2008, Windows Server 2008 R2, or Windows Server 2012
    http://support.microsoft.com/kb/2722035
    We can use group policy to control these services.
    Regarding this point, the following article can be referred to for more information.
    How to use Group Policy to control Services
    http://www.grouppolicy.biz/2010/08/how-to-use-group-policy-to-control-services/
    Best regards,
    Frank Shen

  • Citrix NetScaler Management Pack Account

    Hello,
    I read the documentation and noticed this:
    The Citrix NetScaler Management Pack requires log on credentials of the NetScaler systems it is managing to be able to take corrective actions when the virtual servers become unhealthy.
    I created the account in SCOM 2007, and associated it with the Profiles Citrix NetScaler PRO Authentication Account.
    1. What are the permissions needed in Active Directory for this account? Domain Users is enough or it needs specific privilege(s)?
    2. What are the permissions needed on the NetScaler Server needed? Local Administrators? Users? In the Application?
    Thanks,
    DOm
    System Center Operations Manager 2007 / System Center Configuration Manager 2007 R2 / Forefront Client Security / Forefront Identity Manager

    Permissions needed in Active Directory for this account is domain user. permissions needed on the NetScaler Server is local administrator for this application to can monitor it.
    for configure monitoring Netscaler, you can refer below link
    http://msandbu.wordpress.com/2013/04/02/monitoring-netscaler-with-operations-manager-2012/
    Please remember, if you see a post that helped you please click "Vote As Helpful" and if it answered your question, please click "Mark As Answer"
    Mai Ali | My blog: Technical

  • Citrix Netscaler AppXpert with Sharepoint 2010 Page Edit Issue

    Posting this as a questions and discussion point.
    The issue is in using Citrix Netscaler with AppXpert with SharePoint 2010. I've seen this issue for two customers.
    Configurations:
    - Citrix Netscaler as the load Balancer
    - Netscaler AppXpert for SharePoint deployed on Netscaler (using either AppXpert version 1.1 or 2.0)
    - SharePoint 2010 Standard or Enterprise editions
    Issue:
    A SharePoint user with appropriate rights go to a SharePoint page. They choose Edit page, make changes and want to save changes. At this point all SharePoint ribbon options on the top are greyed out. End result, users are not able to make changes to their
    site pages. Issue happens for everyone including Farm Admins.
    Cases:
    a. The users are able to edit and save SharePoint wiki pages if I point user's PC to the SharePoint web server WFE by changing their local host file.
    b. On Citrix Netscaler, if I use the traditional load balancing i.e. without Citrix AppXpert, then the users are able to edit and save the pages. That is an option if the customer is using SharePoint 2010 Standard. That is not an option if a customer is
    using InfoPath forms. InfoPath is a feature of SharePoint 2010 Enterprise edition. Citrix AppXpert for SharePoint is needed to make the InfoPath work. Else the users get session errors when they use InfoPath Web forms.
    c. The issue happens on almost all combination of OS and browser. XP, vista, Win 7, Win8, Win8.1, IE8, 9, 10, 11 and other browsers like chrome etc as well.
    Please share your ideas and suggestions.

    Hi Faisal,
    As I understand, the issue will be solved when end users directly connect to SharePoint WFE servers. Since the issue is related to third party products, I'd recommend you contact their support engineer for sufficient resource and assistance. For your convenience:
    http://discussions.citrix.com/forum/150-support-forums/
    Should you need more assistance, let me know. Thanks for the understanding.
    Regards,
    Rebecca Tu
    TechNet Community Support

  • Network Discovery not displaying Computers for Directaccess clients

    Hi I have working Directaccess connected client but cannot see computers in Network Discovery though after lag can connect to network shares if manually entered in windows explorer. I ran the Directaccess troubleshooting tool in debug mode. And see only
    this alert from results:
    Warning - default gateway :: for Teredo Tunneling Pseudo-Interface does not reply on ICMP Echo requests.
    ipconfig /all shows this for teredo:
    Tunnel adapter Teredo Tunneling Pseudo-Interface:
       Connection-specific DNS Suffix  . :
       Description . . . . . . . . . . . : Teredo Tunneling Pseudo-Interface
       Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
       DHCP Enabled. . . . . . . . . . . : No
       Autoconfiguration Enabled . . . . : Yes
       IPv6 Address. . . . . . . . . . . : 2001:0:4800:e1da:1c66:1912:94f1:c9fd(Preferred)
       Link-local IPv6 Address . . . . . : fe80::1c66:1912:94f1:c9fd%12(Preferred)
       Default Gateway . . . . . . . . . : ::
       DHCPv6 IAID . . . . . . . . . . . : 117440512
       DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-1A-6F-F3-2E-04-0C-CE-D8-05-D2
       NetBIOS over Tcpip. . . . . . . . : Disabled
    Any help appreciated. I see computers in Network Discovery when I'm on Domain Profile though Network Discovery is enabled for Public as well.

    Yes, I know this is an old post, I’m trying to clean them up. Did you figure this out, if so how?
    Did you add the SERVER into the DHCP administrators group?
    Keep in mind that without DCHP, the server will only discovery itself and whatever is listed within the ARP cache.
    BTW, Network Discovery is not all the useful as it does NOT perform a sing sweep.
    http://www.enhansoft.com/

  • Page cannot be found when accessing Web Dypro on Citrix Netscaler.

    Hi Everyone,
    Has anyone tried using Web Dypro Web Application on Netscaler?
    We have a Web Dynpro application on SAP Enterprise portal that are being hosted by our SSL-VPN (Citrix Netscaler) but when we try accessing our Web Dynpro to our Safari Ipod it pop-up page cannot be displayed. But when accessing it to a normal browser all the pop-ups are accessible and working.
    Regards,
    Michael Mondelo.

    Hi,
    I've tried to update the firmware but when connecting to Netgear it replies 'there is no firmware update available' so I guess it's up to date.  Just wondered if I should change any of the router settings from auto to manual?
    Although I'm not sure what I should change.
    It's a netgear n150 with adsl2+

  • Enable Network Discovery GPO not taking effect

    Hi
    I've created a GPO to turn on Network Discovery on our company laptops as our AV server isn't able to discovery a number of clients for an update roll out. I've enabled the both "Turn on Mapper I/O (LLTDIO) driver" and "Turn on Responder (RSPNDR)
    driver" in Computer Configuration > Policies > Administrative Templates > Network > Link-Layer Topology Discovery. I've set it to only apply to the Domain network. I then applied the policy to the OU containing the laptops and scoped it to
    the default Authenticated Users group.
    Group Policy Modeling shows that the policy is applying. However, Network Discovery is still turned off on laptops that should be applying it.
    David

    Hi David,
    Please try the following steps to solve this issue:
    You must also enable the LLTD Responder component on any computers that you want to appear on your Network Map.
    Please add the following policy to this GPO:
    Expand "Computer Configuration", "Windows Settings", "Security Settings", "Windows Firewall with Advanced Security", and then "Windows Firewall with Advanced Security - {policy you have open}".
    Right-click on "Inbound Rules", and then click "New Rule".
    In the Rule Wizard, on the Rule Type page, select "Predefined", and then select Network Discovery from the list. 
    Click Next.
    On the Predefined Rules page, ensure that the check box is on each rule that is part of the Network Discovery group, and then click Next.
    On the Action page, select "Allow the Connection", and then click Finish.
    Regards,
    Lany Zhang

  • WIndows 7 and Server2008 machines will not remember network discovery preferences, requires setting every start up or wake up.

    hello
    I wondered if anybody here could be so kind as to help me solve this situation
    i have two Windows 7 machines and Server2008 machines will not remember network discovery preferences,
    i am running software on the windows server machine that collects data and serves information to two windows 7 machines, and network discovery is required for this purpose
    these machines are configured in a local stand alone network configured as a workgroup the only other items on network are none PC based equipment that the server happily communicates with and reads data from
    once the network discovery is set for the network the system runs as expected but on every start-up (or wake up) the network discovery is lost and need to be re allowed. this is the case in both windows server 20008 r2 and windows 7
    how do i make these preferences permanent. so that it will restart and re establish communication its self without intervention
    am i missing a setting or if not  is there a way i can script the the selection of preference on each start(/wake)up.
    the final user need to be able to turn system on/restart and use it with out having to have any IT/networking knowledge to get system running.
    thank you for taking the time to read my query

    You can use group policy to enable network discovery so that it is always configured
    1. In the Group Policy editor on a Win7 or Windows Server 2008 R2 computer, open the GPO that you want
    to use in the Group Policy Editor.
    2. Expand "Computer Configuration", "Windows Settings", "Security Settings", "Windows Firewall with Advanced
    Security", and then "Windows Firewall with Advanced Security - {policy you have open}".
    3 Right-click "Inbound Rules", and then click "New Rule".
    4 In the Rule Wizard, on the Rule Type page, select"Predefined", and then select Network Discovery from
    the list.  Click Next.
    5 On the Predefined Rules page, ensure that the check box is on each rule that is part of the Network
    Discovery group, and then click Next.
    6 On the Action page, select "Allow the Connection", and then click Finish.

  • SCCM 2012 Network Discovery Issue

    Dear Team,
    I want to discover my client less devices (routers, switches, & printers) in SCCM 2012 R2 via SNMP or Subnet Mask, we don't have DHCP in environment. How do I discover this client less devices what are the settings require on SCCM server & on
    client less devices (routers, switches, & printers)

    The subnet information can be retrieved from a device specified on the SNMP Devices tab or you need to configure the subnet manually in Subnet tab, then Network Discovery will query the network devices.
    Juke Chou
    TechNet Community Support

  • SCOM network discovery & port stitching with Cisco UCS & Hyper-V and/or VMware

    Before we have our network engineers reconfigure their infrastructure to allow network discovery from SCOM, does anyone know whether or not SCOM will include the virtual switches (Hyper-V or VMware), the UCS fabric interconnects, and the hosted virtual machines in the network vicinity dashboard if you enable network monitoring in SCOM? We're hoping to have monitoring visibility of all network components end-to-end in SCOM, but I've not been able to find any useful information online as to how SCOM network discovery/monitoring handles infrastructure like UCS.

    The PF Vnic within UCS Manager has one vlan attached and is tagged native. The Fabric Network Set has a matching network segment with the same vlan ID. I removed the pin group. The port profile according to the SCVMM documentation needs to be set to "Sla only" which removes the options for vlans within the port profile. I've tried adjusting Host Network IO Performance as well with no luck. System Center Virtual Machine Manager 2012R2 still throws the same two errors. One thing to note is we are trying to do this thru SCVMM and not Hyper-V on the host itself.
    I opened a TAC case and there is one known bug for
    Symptom:
    Everytime I assign a Logical Switch to a network adapter or during migration, SCVMM generate an error 25262, "Cannot set a bandwidth setting on the virtual network adapter for the SR-IOV switc
    Conditions:
    [ From SCVMM, right click VM and assign logical switch to a network adapter.
    OR
    Migrate a client to a different host.
    https://tools.cisco.com/bugsearch/bug/CSCum75054
    There is no workaround for the issue currently.
    My other issue of
    Failed while applying switch port settings 'Ethernet Switch Port VLAN Settings' on switch 'UCS-SCVMM': The request is not supported. (0x80070032).
    Unknown error (0x8000) has no fix or information.

  • Installing LV 2013, Network Discovery Error

    I've installed LabVIEW 2013 on several PCs, and at least three time, I have received the message "Network Discovery Service 5.5 could not be installed".  I (now) know how to "fix" this, and am posting this here in case someone else sees the same thing.
    What I did was to abort the installation, reboot the PC (even if I had just booted it before the installation), and tried again.  This worked three times (including just now) ...
    Bob Schor
    P.S. -- I have no idea why I get this error in the first place.  I was trying to install LabVIEW 2013 "by itself" from a 4-DVD distribution kit, but the first time I encountered this error, I was installing from the LabVIEW 2013 Download from NI.

    I've installed LabVIEW 2013 on several PCs, and at least three time, I have received the message "Network Discovery Service 5.5 could not be installed".  I (now) know how to "fix" this, and am posting this here in case someone else sees the same thing.
    What I did was to abort the installation, reboot the PC (even if I had just booted it before the installation), and tried again.  This worked three times (including just now) ...
    Bob Schor
    P.S. -- I have no idea why I get this error in the first place.  I was trying to install LabVIEW 2013 "by itself" from a 4-DVD distribution kit, but the first time I encountered this error, I was installing from the LabVIEW 2013 Download from NI.

Maybe you are looking for

  • File Attributes from App Server by RFC (GET_FILE_ATTRIBUTES does not work )

    Hello, We have an Objects application that is started through an RFC BAPI call from a Java app. The Java app. passes a file to the BAPI. We want to test, as efficiently as possible, if the file is 0 bytes long. We have tried /epsf/get_file_attributes

  • Condition type not appearing in Pricing report

    Hello all, There are 2 condition types ZR00 - condclass B, calc type C, item condition, with acc seq Sales Area/Material and ZQA2 - condclass A, calc type C, item condition, with acc seq Sales Area/Customer/Material. I have maintained condition recor

  • HH5 and Xbox One - randomly open and moderate NAT

    Having this annoying problem where the NAT keeps showing as randomly open and moderate. I have set a static I.p for it with no luck so far. I can switch it on and off a dozen times and it can show open, then be turned on the next dozen times and be m

  • How to set the font size on only one object!

    I wonder how i could programmatically set the font size on only one object? Igor Stojčević

  • Production server JDBC configuration

    Anybody knows what is the way to configure the JDBC pooling parameters such as init & max capacity for production server? Any references for this? Thanks