Jump to content

Agent V7 connection to server ESMC error code 14


Recommended Posts

Please excuse my lack of understanding of this process.  Our company had many layoff due to the Covid 19 and my head security officer has been laid off.   I am looking for help in setting up agent on local PC's that are on the outside of our network.   All local domain computer are functioning as expected with tasks from Security Management Center.   I about 5 pc's that are at other locations that I would like to manage with SMC.   Only when the PC are logon onto the network through a VPN software does the SMC apply the tasks correctly.  Problem is, these computers really don't log in to the network very often, only to get rare files.   I have tried to set up the agent to connect to the server hosting SMC.  I have set up firewall ports 2221-2225 to point to this server using the same url that the VPN connects to successfully.   Could someone please help me with what this error means?  

Agent Log.PNG

Link to post
Share on other sites
  • Administrators

There is obviously a problem with the agent peer certificate which cannot be verified. Create a fresh agent live installer and re-deploy it on the client so that the current CA and peer certificates are installed and used.

Link to post
Share on other sites

Ok,  I redid the agent like you asked and connected via vpn to my local network with ESMC server and all is fine.  Once I disconnect the VPN the management center now can not see the client anymore.   Is there a way to configure the agent so It can connect to my server with being connected to a vpn software?

Agent Log without Extender VPN.PNG

Agent Log with Extender VPN.PNG

Link to post
Share on other sites
  • ESET Staff

From logs it seems that after reinstallation, AGENT is connecting (or attempting to do so) to different hostname, containing .local. Maybe problem is that it cannot use "local" hostname when connection from outside of internal network? In case it is required to use different hostname (as visible in original logs), I would recommend to explicitly set it in installer configuration, or maybe ESMC Agent configuration policy containing both internal and external hostname should be used.

Link to post
Share on other sites

So lets assume here

 

1) ESMC Server is behind corporate network say 10.10.0.10 (just go with it) - your server resolves to that IP address

2) When your endpoints are connected to VPN, their connection (say 10.10.1.121 is one of the IPs)

3) Lets assume 10.10.1.0/24 can route back and forth to 10.10.0.0/24 while on VPN

Everything is working A-OK!

 

When your endpoints are not part of the VPN, eg. they are on their own network, whether a home network, coffee shop, public wifi...regardless of the case, they are no longer attached to your 'local network' - they are part of that networks 'local network'

 

In order for those endpoints to reach your ESMC server, you must do three things:

 

1) The ESMC will need an outside IP address to reach with ports 2222 open (this can be accomplished by placing a public IP NAT that is bound to the internal IP address or port forwarding 2222 from that internal address, but traffic must be allowed in and out) -- obtain the public IP address of that device (typically will be firewall external address if going port forwarding, or NAT public internet address, save that for next step)

 

2) Create a new ESET Remote Administrator policy

Include the IP address on the inside, include the inside IP address as first on list, and add the external address (NAT or FW pub IP) as second and then assign that to (I usually would just say all, it wouldn't hurt) those devices; its best to use that red lightning bolt for admin enforcement, and just to make sure there isnt any other conflicts at hand --- test out one or two devices if possible, take a laptop home or something for a test

 

3) Have endpoints that have not received policy - VPN in or connect to corporate network as soon as possible once that step two is successful. When the endpoints check in, they should obtain the policy update for the ESMC/ERA agent

 

Link to post
Share on other sites
  • ESET Staff

@DMcCurtain

Following on from what @TonyK has said, the following KB shows you how to allow External Communications to ESET Security Management Center 7.x to allow manageability of remote Machines.
https://support.eset.com/en/kb6870-network-configuration-requirements-for-allowing-clients-to-connect-to-eset-security-management-center-remotely

 

Link to post
Share on other sites

Let me throw in another solution possible (Though it's hard to understand the security level of it) 
You can create a proxy in the cloud that will only be used for ESMC reports (and not mirror for AV Installation files\images to minimize the data usage costs)

that way whenever the agent fails to report the local server, it use a failover using the proxy to reach it the other way around. 

(I managed to perfect that method in my case, where we do not allow local servers access from the external network internally.)

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...