The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Book Contents Book ContentsCisco Terminal Services (TS) Agent Guide, Version 1.1
The Cisco Terminal Services (TS) Agent allows the Firepower Management Center to uniquely identify user traffic monitored by a Microsoft Windows Terminal Server. Without the TS Agent , the systems recognize all traffic from a Microsoft Windows Terminal Server as one user session originating from one IP address.
To avoid potential issues and to make sure you're using the most up-to-date software, Cisco recommends using the latest released version of the TS Agent . To find the latest version, go to the Cisco Support site.
You can't upgrade the TS Agent ; you must uninstall the older version before you install the newer version. For more information, see Uninstalling the TS Agent.
When installed and configured on your Microsoft Windows Terminal Server, the TS Agent assigns a port range to individual user sessions, and ports in that range to the TCP and UDP connections in the user session. The systems use the unique ports to identify individual TCP and UDP connections by users on the network.
ICMP messages are passed without port mapping.
Traffic generated by a service running in the computer's System context is not tracked by the TS Agent . In particular, the TS Agent does not identify Server Message Block (SMB) traffic because SMB traffic runs in the System context.
The TS Agent supports up to 199 simultaneous user sessions per TS Agent host. If a single user runs several simultaneous user sessions, the TS Agent assigns a unique port range to each individual user session. When a user ends a session, the TS Agent can use that port range for another user session.
Each FMC supports up to 50 TS Agent s connecting to it at the same time.
There are three primary components to the TS Agent installed on your server:
The TS Agent can be used for the following:
To use TS Agent for user awareness and control, you must configure it to send data only to the FMC . For more information, see Configure the TS Agent .
You must meet the following requirements to install and run the TS Agent on your system.
To avoid potential issues and to make sure you're using the most up-to-date software, Cisco recommends using the latest released version of the TS Agent . To find the latest version, go to the Cisco Support site. You can't upgrade the TS Agent ; you must uninstall the older version before you install the newer version. For more information, see Uninstalling the TS Agent.
Install the TS Agent on one of the following 64-bit Microsoft Windows Terminal Server versions:
The TS Agent installation requires 614 KB of free space on your server.
If the TS Agent server uses anti-virus software that proxies web traffic, user traffic is typically assigned to the System user and the FMC sees those users as Unknown. To avoid the issue, disable web traffic proxying.
The TS Agent is compatible with any of the following terminal services solutions installed on your server:
This version of the TS Agent supports using a single network interface controller (NIC) for port translation and server-system communications. If two or more valid NICs are present on your server, the TS Agent performs port translation only on the address you specify during configuration. A valid NIC must have a single IPv4 or IPv6 address, or one of each type; a valid NIC cannot have multiple addresses of the same type.
If router advertisements are enabled on any devices connected to your server, the devices can assign multiple IPv6 addresses to NICs on your server and invalidate the NICs for use with the TS Agent .
This version of the TS Agent supports connecting to standalone or high availability FMC s running Version 6.2 or later of the System.
See the following sections for information about troubleshooting Firepower Management Center issues with the TS Agent.
For information about known and fixed issues in this release, see Known Issues and Resolved Issues .
Traffic generated by a service running in the System context is not tracked by the TS Agent . In particular, note the following:
You must synchronize the time on your server with the time on the FMC .
The TS Agent does not perform port translation in the following cases:
If you manually edit the IP address of the server, you must edit the Server NIC on the TS Agent . Then, save your TS Agent configuration and reboot your server.
If you update the TS Agent configuration to connect to a different FMC , you must end all current user sessions before saving the new configuration. For more information, see Ending a Current User Session.
If there is a client application installed on your server and the application is configured to bind to a socket that uses a port that falls outside of your System Ports , you must use the Exclude Port(s) field to exclude that port from translation. If you do not exclude the port and it falls within your User Ports , the TS Agent may report traffic on that port as unrelated user traffic.
To prevent this, configure your client application to bind to a socket that uses a port that falls within your System Ports .
If an application on the TS Agent server ends a TCP/UDP connection but incompletely closes the associated port, the TS Agent cannot use that port for translation. If the TS Agent attempts to use the port for translation before the server closes the port completely, the connection fails.
If you see this issue, increase the TS Agent port range affected by the issue:
If the TS Agent fails to establish a connection with the FMC when you click the Test button during configuration, check the following:
If a system process on your server is using or listening in on a port that is not within your System Ports range, you must manually exclude that port using the Exclude Port(s) field.
If an application on your server is using or listening in on your Citrix MA Client (2598) or Windows Terminal Server (3389) port, confirm that those ports are excluded in the Exclude Port(s) field.
The FMC shows Unknown users from the TS Agent in the following situations:
After the downtime, the Unknown users are reidentified and processed according to the rules in your identity policy.
You must disable router advertisement messages on any devices connected to your server. If router advertisements are enabled, the devices can assign multiple IPv6 addresses to NICs on your server and invalidate the NICs for use with the TS Agent .
A valid NIC must have a single IPv4 or IPv6 address, or one of each type; a valid NIC cannot have multiple addresses of the same type.
If other vendors' Terminal Services agents are running on the same server as the Cisco Terminal Services (TS) Agent, port numbers for user connections might not be in the assigned User Ports range. As a result, users can be identified as Unknown and therefore identity rules do not match for users.
To resolve this issue, disable or uninstall the other Terminal Services agents running on the same server as the Cisco TS Agent .
In rare circumstances, exceptions are displayed when you attempt to save the TS Agent configuration with an invalid IP address. An invalid IP address can be any of the following:
Exceptions include the following:
Workaround: Set the TS Agent server's IP address to a valid IP address, save the TS Agent configuration, and reboot the server.
If you use both the TS Agent and the user agent, you can avoid non-critical errors in the logs by excluding the TS Agent IP address from the user agent. If the same user is detected by both the TS Agent and the user agent, non-critical errors are written to logs.
To prevent this, exclude the TS Agent 's IP address from being logged by the user agent. For more information, see the Firepower User Agent Configuration Guide .
Fewer ports are available for connections when both IPv4 and IPv6 are configured on the monitored NIC.
In some cases, connections are not released when expected after a user logs out of the TS Agent server. Sometimes the TCP protocol allows a stale connection to persist longer than expected. This behavior can be confirmed by the following message in the Windows Event Log:
Event 4227: TCP/IP failed to establish an outgoing connection because the selected local endpoint was recently used to connect to the same remote endpoint.
Workarounds:
User IP bindings are not being sent to the Firepower Management Center, and both TS Agent event viewer log and the Status column on the TS Agent's Monitor tab page show: FMC_STATS_TO_BE_CONNECT .
Workaround: Wait until system has completed rebooting and is stable, then restart the TS Agent service. Data should then be reported to the Firepower Management Center.
Caveat ID Number | Description |
---|---|
CSCve54339 | UDP traffic is getting blocked, especially if the port is allocated in the operating system's ephemeral range (ports 49152 to 65535). |
Workaround: Either reboot the server or uninstall the TS Agent.
Connections to services or applications listening on ports are established successfully when the TS Agent is installed.
An example is the Windows Management Instrumentation (WMI) service, which depends on remote procedure calls (RPC), which binds to random ports.
Users can log in to the server using Remote Desktop and users authenticating to the xenapp server can authenticate.
These changes are all discussed in TS Agent Configuration Fields.
Feature introduced. The TS Agent enables administrators to track user activity using port mapping. The TS Agent , when installed on a Terminal Server, assigns a port range to individual user sessions, and ports in that range to the TCP and UDP connections in the user session. The systems use the unique ports to identify individual TCP and UDP connections by users on the network.