There is tight security calls on communication and if those are modified by any SSL intercept of any kind, DLP will reject those calls and cause communication failures between Enforce and the Detection server.
Resolution is to make sure no traffic is being SSL intercepted between the Enforce server and the Detection server. This will cause a disconnect to occur.
On a unsuccessful connection you will see something like the following:
MonitorController0.log from Enforce server. In the below section you can see it first goes to create a handshake for the connection and then it see's a disconnect right away.
com.vontu.monitor.controller.replicatorcommlayer.applications.connection.GatewayConnector initiateConnect
INFO: Creating a new connection for ConnectionIdentifierId [hostName=<ip or hostname>, port=8100]
3:58:47 PM com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
INFO: Creating handshaker for dataconnection C-1
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
FINER: Creating Handshaker for the data connection with connection number: 1
com.symantec.dlp.services.csgconnection.ConnectionStateManager onDisconnected
INFO: Connection to ConnectionIdentifierId [hostName=<ip or hostname>, port=8100] is terminated.
com.vontu.monitor.controller.replicatorcommlayer.applications.connection.LegacyConnectionStatusObserver hasSuccessfulLegacyConnection
INFO: Successful Legacy connection does NOT exist for <ip or hostname>:8100
com.vontu.monitor.controller.replicatorcommlayer.applications.connection.LegacyConnectionStatusObserver onConnectionDown
WARNING: Unable to retrieve Information monitor by hostname: <ip or hostname>. Gateway connector will not connect to UDS.
SymantecDLPEnforceConnector0.log: Here we see the same thing regarding the handshaker and then a disconnect right away.
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
INFO: Creating handshaker for dataconnection C-10
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
FINER: Creating Handshaker for the data connection with connection number: 10
Feb 18, 2025 3:58:47 PM com.symantec.dlp.enforceconnector.applications.connection.EnforceConnectorConnectionStatusWriter onDisconnected
INFO: EnforceConnector disconnected from MonitorController
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
INFO: Creating handshaker for dataconnection C-100
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
FINER: Creating Handshaker for the data connection with connection number: 100
com.symantec.dlp.enforceconnector.applications.connection.EnforceConnectorConnectionStatusWriter onDisconnected
INFO: EnforceConnector disconnected from MonitorController
This is an indication that communication is failing right away and is a cause of SSL Interception or traffic modification while it was in transit.
Working Example:
MonitorController0.log - On Enforce.
com.vontu.monitor.controller.replicatorcommlayer.applications.connection.GatewayConnector initiateConnect
INFO: Creating a new connection for ConnectionIdentifierId [hostName= <ipaddress or dns name>, port=8100]
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
INFO: Creating handshaker for dataconnection C-1
com.vontu.monitor.controller.replicatorcommlayer.applicationcommunicatorlayer.ApplicationCommunicatorsForEnforceToUDSConnections versionValid
INFO: Comparing version compatibility current Enforce version 16.1.00000.60313 and Peer Software version 16.1.0.60313
com.vontu.monitor.controller.replicatorcommlayer.applicationcommunicatorlayer.ApplicationCommunicatorsForEnforceToUDSConnections versionValid
INFO: Comparing Major and Minor Peer version 16.1.0.60313 is equal or greater than Enforce version. Allow connection.
Above we can see right after the handshaker we see it comparing versions of Enforce and Detection Server. This is very important as it shows traffic was not modified and DLP is accepting the traffic.
SymantecDLPEnforceConnector0.log - On Detection Server
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
INFO: Creating handshaker for dataconnection C-10
com.symantec.dlp.communications.applicationcommunicatorlayer.ApplicationCommunicatorActivityNotifiableImpl onCreateHandshaker
FINER: Creating Handshaker for the data connection with connection number: 10
com.symantec.dlp.communications.aclayer.impl.TwoWayHandshaker onReceivedHandshakeMessage
FINE: Handshaker received a message from the remote peer for the connection with connection number : 10
com.symantec.dlp.communications.aclayer.impl.TwoWayHandshaker readRemotePeerAttributes
FINER: peer attributes received = [com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.GuidEnforceIdPeerAttribute@2a9c169d, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.ReplicationCapabilityIdSetPeerAttribute@641e8ab5, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.ReplicationCapabilityIdSetPeerAttribute@1ea47fa0, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.UDSCurrentTimePeerAttribute@2bcba4c] for the connection with connection number : 10
com.symantec.dlp.communications.aclayer.impl.TwoWayHandshaker getPeerAttributesToBeSent
FINER: peerAttributes to be sent = [com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.ReplicationCapabilityIdSetPeerAttribute@30b2c622, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.GuidDetectionServerIdPeerAttribute@58851ce4, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.ReplicationCapabilityIdSetPeerAttribute@6876da32, com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.DetectionServerSoftwareVersionIdPeerAttribute@485e6c78] for the connection with connection number : 10
com.symantec.dlp.communications.aclayer.impl.TwoWayHandshaker getPeerAttributesToBeSent
FINER: peerAttributes to be sent = [com.symantec.dlp.communications.aclayer.impl.peerattributes.specificattributes.HandshakeResultPeerAttribute@68c50e27] for the connection with connection number : 10
com.symantec.dlp.enforceconnector.applicationcommunicator.ApplicationCommunicatorsForUDSToEnforceConnections versionValid
INFO: Comparing version compatibility current Enforce version 16.1.0.60313 and UDS version 16.1.00000.60313
com.symantec.dlp.enforceconnector.applicationcommunicator.ApplicationCommunicatorsForUDSToEnforceConnections versionValid
INFO: Comparing Major and Minor - Enforce version 16.1.0.60313 is equal or lesser than this UDS version. Allow connection.
Again above we can see it getting details right after the handshaker and then we see the versions being matched. This is what we expect should happen. Again any network security software that is modifying this communication in any way will cause a disconnection to happen. Communication should be whitelisted between Enforce and all Detection Servers.
To see the above logging, enable the following logging levels to help diagnose the issue:
Enforce
File: MonitorControllerLogging.properties
Add the following line at the bottom of the file.
com.symantec.dlp.level = FINEST
com.vontu.monitor.controller.replicatorcommlayer.level = FINEST
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_PROCESS_DISCONNECTED.logAtLevel= INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_HANDSHAKE_FAILED.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_HANDSHAKE_COMPLETED_SUCCESSFULLY.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_TC_SSL_HANDSHAKE_SUCCESSFUL.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_TC_SSL_HANDSHAKE_FAILED.logAtLevel = INFO
modify the following values:
java.util.logging.FileHandler.level = FINEST
java.util.logging.FileHandler.count = 20
Detection
File: UDSEnforceConnectorLogging.properties
Add the following line at the bottom of the file.
com.symantec.dlp.level = FINEST
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_PROCESS_DISCONNECTED.logAtLevel= INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_HANDSHAKE_FAILED.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_HANDSHAKE_COMPLETED_SUCCESSFULLY.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_TC_SSL_HANDSHAKE_SUCCESSFUL.logAtLevel = INFO
com.symantec.dlp.communications.common.activitylogging.ConnectionLogger.ON_TC_SSL_HANDSHAKE_FAILED.logAtLevel = INFO
modify the following values:
java.util.logging.FileHandler.level = FINEST
java.util.logging.FileHandler.count = 20
Save all files and restart the services on the detection server and then restart the Symantec DLP Detection Server Controller Service on Enforce. After this you should be able to match the log lines seen above.