Help to read this trace    
   I'm trying to synchronize our BPX with LDAP active directory all the configuration is correct but no result in search. Please help me to read this trace PBX IP is 10.253.4.3 LDAP IP is 10.140.8.233
No.     Time           Source                Destination           Protocol Length Info
   9183 19.048491      10.253.4.3            10.140.8.233          TCP      66     10131 → 636 [SYN] Seq=0 Win=5840 Len=0 MSS=1460 SACK_PERM=1 WS=1
Frame 9183: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: HewlettP_97:7c:84 (00:9c:02:97:7c:84), Dst: Cisco_ff:fc:88 (00:08:e3:ff:fc:88)
Internet Protocol Version 4, Src: 10.253.4.3, Dst: 10.140.8.233
Transmission Control Protocol, Src Port: 10131, Dst Port: 636, Seq: 0, Len: 0
    Source Port: 10131
    Destination Port: 636
    [Stream index: 4]
    [TCP Segment Len: 0]
    Sequence number: 0    (relative sequence number)
    Acknowledgment number: 0
    Header Length: 32 bytes
    Flags: 0x002 (SYN)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...0 .... = Acknowledgment: Not set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ··········S·]
    Window size value: 5840
    [Calculated window size: 5840]
    Checksum: 0x0068 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), No-Operation (NOP), SACK permitted, No-Operation (NOP), Window scale
        Maximum segment size: 1460 bytes
        No-Operation (NOP)
        No-Operation (NOP)
        TCP SACK Permitted Option: True
        No-Operation (NOP)
        Window scale: 0 (multiply by 1)
No.     Time           Source                Destination           Protocol Length Info
   9184 19.048923      10.140.8.233          10.253.4.3            TCP      66     636 → 10131 [SYN, ACK] Seq=0 Ack=1 Win=8192 
Len=0 MSS=1380 WS=256 SACK_PERM=1
Frame 9184: 66 bytes on wire (528 bits), 66 bytes captured (528 bits)
Ethernet II, Src: Cisco_ff:fc:88 (00:08:e3:ff:fc:88), Dst: HewlettP_97:7c:84 (00:9c:02:97:7c:84)
Internet Protocol Version 4, Src: 10.140.8.233, Dst: 10.253.4.3
Transmission Control Protocol, Src Port: 636, Dst Port: 10131, Seq: 0, Ack: 1, Len: 0
    Source Port: 636
    Destination Port: 10131
    [Stream index: 4]
    [TCP Segment Len: 0]
    Sequence number: 0    (relative sequence number)
    Acknowledgment number: 1    (relative ack number)
    Header Length: 32 bytes
    Flags: 0x012 (SYN, ACK)
        000. .... .... = Reserved: Not set
        ...0 .... .... = Nonce: Not set
        .... 0... .... = Congestion Window Reduced (CWR): Not set
        .... .0.. .... = ECN-Echo: Not set
        .... ..0. .... = Urgent: Not set
        .... ...1 .... = Acknowledgment: Set
        .... .... 0... = Push: Not set
        .... .... .0.. = Reset: Not set
        .... .... ..1. = Syn: Set
        .... .... ...0 = Fin: Not set
        [TCP Flags: ·······A··S·]
    Window size value: 8192
    [Calculated window size: 8192]
    Checksum: 0xcdf1 [unverified]
    [Checksum Status: Unverified]
    Urgent pointer: 0
    Options: (12 bytes), Maximum segment size, No-Operation (NOP), Window scale, No-Operation (NOP), No-Operation (NOP), SACK permitted
        Maximum segment size: 1380 bytes
        No-Operation (NOP)
        Window scale: 8 (multiply by 256)
        No-Operation (NOP)
        No-Operation (NOP)
        TCP SACK ...
 
 
It's a little bit hard as you've only posted the text output and not a pcap file.
For me it looks like the LDAP server is resetting the connection after receiving the first 14 bytes from the client.
As the connection is using 636/tcp I guess you want to use LDAPS. The first data should therefore be as SSL ClientHello. However this record should be bigger than 14 bytes.
Maybe your client is trying to use plaintext ldap (starting with a bindRequest) over port 636/tcp. If so the server would reset the connection.
=> Have a look at the payload of frame 9186.
Hi Uli, please see this pcap file. if u can help me, please https://drive.google.com/file/d/1IWse...
port 636 is LDAP over SSL i cant post the whole document as i don't have privileges to do so, i hope this is of some help at least.