On 06/26/2011 06:21 AM, Karmi Simonov wrote:
> Guys, Any ideas?

The situation you present is curious and not something we can replicate.
 If you can capture a full network log of the sequence you outline below
(Before, after, after submitting credentials), we might be able to debug it.

Thomas

--------
2011 Training: http://bestpractical.com/services/training.html

Reply via email to