Slow link detect is implemented with ICMP, so if you allow ICMP through
you will be able to get gpo's/profiles faster.
Jeremy

-----Original Message-----
From: Cisco Clean Access Users and Administrators
[mailto:[EMAIL PROTECTED] On Behalf Of Ryan Nobrega
Sent: Tuesday, July 22, 2008 7:52 PM
To: [email protected]
Subject: Re: AD SSO - required open ports?

I have been setting up AD SSO and have been running into the same exact
problem.  I found that by using a GPO to disable the slow link detection
feature for both the user and the computer seems to fix this problem and
speed up the login times dramatically.

-Ryan Nobrega
-Data Network Manager
-Southern CT State University

 -----Original Message-----
From: Cisco Clean Access Users and Administrators
[mailto:[EMAIL PROTECTED] On Behalf Of Stempien, Dave
Sent: Tuesday, May 20, 2008 12:29 PM
To: [email protected]
Subject: AD SSO - required open ports?

Does anyone have a definitive list of the ports required to be open in
the
unauthenticated role for AD SSO to work?  I've opened the following
ports to
our DCs per the suggestion of the Cisco documentation:

TCP 88 - Kerberos
TCP 135 - RPC
TCP 389 - LDAP
TCP 1025 - RPC
TCP 1026 - RPC

After doing some sniffing, I discovered that our DCs are also using UDP
for
kerberos and LDAP, so I opened the following:

UDP 88 - UDP-Kerberos
UDP 389 - UDP-LDAP

Also, per a previous suggestion by Cisco TAC, I also opened:

TCP 445 - SMB

Finally, ICMP and DNS is also allowed.

Currently, my test machine won't even completely log into the domain let
alone perform SSO.  It's stuck at "Applying computer settings..."  If I
completely disable my unauthenticated policy (except for ICMP and DNS),
I
can log into my test machine using cached credentials.

Has anyone else beaten this beast and care to share your experiences?

Thanks!

--
Dave Stempien, Network Security Engineer
University of Rochester Medical Center
Information Systems Division
(585) 784-2427

Reply via email to