Monthly Archives: March 2022

031522 2258 Howtofixupg1 240x180 - How to fix upgrade Veeam backup & Replication failed --Error 1327.Invalid Drive

How to fix upgrade Veeam backup & Replication failed –Error 1327.Invalid Drive

If it happened Error 1327.Invalid Drive when you tried to upgrade Veeam Bavkup & Replication to 11a, don’t panic, this is likely caused by a stale registry entry for the Veeam server. In my case, the Veeam server had a F drive but removed it long time ago. My error message is Error 1327.Invalid Drive F: and upgrade failed.

031422 2212 Howtodeploy1 240x180 - How to deploy Cisco Duo for Citrix (NetScaler) Gateway (Citrix ADC) - nFactor

How to deploy Cisco Duo for Citrix (NetScaler) Gateway (Citrix ADC) – nFactor

To add Duo two-factor authentication to your Citrix Gateway with nFactor you’ll configure the Duo Authentication Proxy as a secondary RADIUS authentication server. Primary authentication happens directly between the Citrix Gateway and your Active Directory, LDAP, or other identity store, which enables additional features such as AD password resets.

Before starting, make sure that Duo is compatible with your Citrix Gateway device. Log on to your Citrix Gateway via the web interface and verify that your Citrix Gateway firmware is version 12.1-51.16 or later and your Citrix Receiver or Citrix Workspace clients support 12.1 or later.

Also verify that your Citrix Gateway is licensed for Advanced Authentication Policy. As of Citrix Gateway release 13.0-67.x, the “Standard” license also includes nFactor for Gateway/VPN, while Citrix ADC requires an “Advanced” or “Premium” license to use nFactor.

031422 1949 Howtoinstal12 240x180 - How to install cumulative patches 11.0.1.1261 P20220302 for Veeam Backup & Replication 11a

How to install cumulative patches 11.0.1.1261 P20220302 for Veeam Backup & Replication 11a

Veeam released patches for Veeam Backup & Replication on March 12, 2022. Multiple vulnerabilities (CVE-2022-26500, CVE-2022-26501) in Veeam Backup & Replication allow executing malicious code remotely without authentication. This may lead to gaining control over the target system.