Article ID: 955102 - View products that this article applies to.
Important This article contains information that shows you how to help lower security settings or how to turn off security features on a computer. You can make these changes to work around a specific problem. Before you make these changes, we recommend that you evaluate the risks that are associated with implementing this workaround in your particular environment. If you implement this workaround, take any appropriate additional steps to help protect the computer.
Consider the following scenario:
If you click Details on the error message box, you receive the following error message:
The Component Manager detected a conflict between the Whale SSL VPN Socket Forwarding and other networking components installed on your computer. The Whale SSL VPN Socket Forwarding component will be removed from your computer.
Note Third-party security applications may install their own LSPs on a client computer.
The following Winsock Layered Service Provider (LSPs) are installed over TCP:
- Third-party layered provider (C:\DriverPathAndFileName)
- Whale SSL VPN (C:\PROGRA~1\WHALEC~1\CLIENT~1\31265D~1.0\WhlLSP.dll
Encountered Winsock error 10091
This problem occurs because of a conflict between the third-party LSP and the LSP that is included in the SSL VPN components of IAG.
Warning This workaround may make a computer or a network more vulnerable to attack by malicious users or by malicious software such as viruses. We do not recommend this workaround but are providing this information so that you can implement this workaround at your own discretion. Use this workaround at your own risk.
To work around this problem, find the feature that installs the conflicting LSP on the client computer. Then, disable or uninstall the corresponding program feature that installs the LSP.
Note To use this workaround, you must make sure that the Windows Firewall is enabled. An antivirus program helps protect your computer from viruses. You must not download or open files from sources that you do not trust, visit Web sites that you do not trust, or open e-mail attachments when your antivirus program is disabled.
For more information about computer viruses, click the following article number to view the article in the Microsoft Knowledge Base:
(http://support.microsoft.com/kb/129972/ )Computer viruses: description, prevention, and recovery