This website uses cookies. By clicking Accept, you consent to the use of cookies. Click Here to learn more about how we use cookies.
Accept
Reject
  • RSA.com
  • Home
  • Advisories
    • SecurID
    • SecurID Governance & Lifecycle
  • Documentation
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID App
      • SecurID Authenticator for macOS
      • SecurID SDK
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
    • Technology Partners
  • Downloads
    • SecurID
      • Authentication Agents
        • API / SDK
        • Apache Web Server
        • Citrix StoreFront
        • IIS Web Server
        • MFA Agent for macOS
        • MFA Agent for Windows
        • Microsoft AD FS
        • Microsoft Windows
        • PAM
      • Authentication Engine
      • Authentication Manager
      • Cloud Authentication Service
      • Hardware Appliance
        Component Updates
      • Hardware Tokens
      • Integrations
      • SecurID Authenticator for macOS
      • Software Tokens
        • Android
        • iOS
        • macOS
        • Token Converter
        • Windows
    • SecurID Governance & Lifecycle
  • Community
    • SecurID
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
    • SecurID Governance & Lifecycle
      • Blog
      • Discussions
      • Events
      • Idea Exchange
      • Knowledge Base
  • Support
    • Case Portal
      • Create New Case
      • View My Cases
      • View My Team's Cases
    • Community Support
      • Getting Started
      • News & Announcements
      • Ideas & Suggestions
      • Community Support Articles
      • Community Support Forum
    • Product Life Cycle
    • Support Information
    • General Security Advisories
  • Education
    • Blog
    • Browse Courses
      • SecurID
      • SecurID Governance & Lifecycle
    • Certification Program
    • New Product Readiness
    • Student Resources
Sign In Register Now
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Search instead for 
Did you mean: 
Announcements

SecurID® Knowledge Base

Find answers to your questions and identify resolutions for known issues with knowledge base articles written by SecurID experts.
  • SecurID Community
  • :
  • Products
  • :
  • SecurID
  • :
  • Knowledge Base
  • :
  • "No configured interfaces were detected" error after finishing Quick Setup on a new RSA Authenticati...
  • Options
    • Subscribe to RSS Feed
    • Bookmark
    • Subscribe
    • Email to a Friend
    • Printer Friendly Page
    • Report Inappropriate Content

"No configured interfaces were detected" error after finishing Quick Setup on a new RSA Authentication Manager 8.4 server

Article Number

000037165

Applies To

RSA Product Set: SecurID
RSA Product/Service Type: Authentication Manager
RSA Version/Condition: 8.4

Issue

  • After configuring a new RSA Authentication Manager 8.4 server, then finishing Quick Setup and rebooting, the following error message is received
No configured interfaces were detected. Please enter the settings for the first interface.
  • After re-entering the configuration, the system continues to boot, but the Authentication Manager services are all down. 

Cause

RSA Authentication Manager 8.4 is based on SUSE Linux Enterprise Server 12 Service Pack 3 which uses a service named wicked to control the network interfaces.  As of SLES 12, wicked-controlled network interfaces are started with their IP address only if a carrier signal was detected. Therefore, if a signal is not detected during boot, the interfaces will not be assigned IP addresses and RSA Authentication Manager services fail to start if there are no active and configured network interfaces. 

Resolution

Resolve the network issue causing the signal to not be detected during boot. Then restart the Authentication Manager services. 

Workaround

Force wicked to assign IP addresses to network interfaces even if no signal is detected by adding LINK_REQUIRED='no' to the respective /etc/sysconfig/network/ifcfg-* file. To do so, follow these steps:
  1. Enter the network configuration for the system to continue the booting process.
  2. Access the system from the console.
  3. Change to root using the following command:
rsaadmin@am84p:~> sudo su -
rsaadmin's password: <enter operating system password>
  1. Add LINK_REQUIRED='no' to the configuration file of the first network interface eth0:
am84p:~ # echo "LINK_REQUIRED='no'" >> /etc/sysconfig/network/ifcfg-eth0
  1. If using multiple interfaces, add the same line to their respective configuration files. The configuration files are all in the same directory named ifcfg-eth0, ifcfg-eth1, ifcfg-eth2, etc.
  2. Restart the network service for the changed to take effect using the following command:
am84p:~ # service network restart
Shutting down network interface    
    eth0      device: Intel Corporation 82545EM Gigabit Ethernet Co           done
Shutting down service network . . . . . . . . . . . . . .                     done
Hint: you may set mandatory devices in /etc/sysconfig/network/config
Setting up network interfaces
   eth0    device: Intel Corporation 82545EM Gigabit Ethernet Co
   eth0    IP address 192.168.2.50/23                                         done
Setting up service network . . . . . . . . . . . . . .                        done
  1. Verify that the network interfaces are up and assigned an IP:
am84p:~ # ip address
1:  lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 gdisc noqueue state UNKNOWN
     link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
     inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
     inet 127.0.0.1/8 brd 127.255.255.255 scope host secondary lo
     inet6 ::1/128 scope host
        valid_lft forever preferred_lft forever
2: eth0 <BROADCAST,MULTICAST,UP,LOWER_UP> ntu 1500 qdisc pfifo_fast state UP qlen 1000
    link/ether 00:50:56:01:0c:38 brd ff:ff:ff:ff:ff:ff
    inet 192.168.2.50/23 brd 102.168.3.255 scope global eth0
    inet6 fe80::250:56ff:fe01:c38/64 scope link
       valid_lft forever preferred_lft forever
  1. Restart Authentication Manager services to bring them back up:
am84p:~ # /opt/rsa/am/server/rsaserv restart all
Tags (45)
  • 8
  • 8.4
  • 8.4.x
  • 8.x
  • AM
  • Appliance
  • Auth Manager
  • Authentication Manager
  • Break Fix
  • Break Fix Issue
  • Broken
  • Customer Support Article
  • Error
  • Error Message
  • Failed Install
  • Failed Installation
  • Failed Login
  • Failure
  • Install
  • Install Error
  • Install Issue
  • Installation
  • Installation Error
  • Installation Failure
  • Installation Issue
  • Issue
  • Issues
  • KB Article
  • Knowledge Article
  • Knowledge Base
  • Problem
  • RSA AM
  • RSA Auth Manager
  • RSA Authentication Manager
  • RSA SecurID
  • RSA SecurID Access
  • RSA SecurID Suite
  • SecurID
  • SecurID Access
  • SecurID Appliance
  • SecurID Suite
  • Version 8
  • Version 8.4
  • Version 8.4.x
  • Version 8.x
0 Likes
Was this article helpful? Yes No
Share
No ratings

In this article

Version history
Last update:
‎2020-12-12 01:49 PM
Updated by:
Administrator RSA-KB-Sync Administrator

Related Content

Powered by Khoros
  • Blog
  • Events
  • Discussions
  • Idea Exchange
  • Knowledge Base
  • Case Portal
  • Community Support
  • Product Life Cycle
  • Support Information
  • Customer Success
  • About the Community
  • Terms & Conditions
  • Privacy Statement
  • Provide Feedback
  • Employee Login
© 2022 RSA Security LLC or its affiliates. All rights reserved.