There is a solution for this on the Tivoli Database:
Bottom line, order of installation is significant - ie, the Tivoli product should be installed first. The problem is that Aventail intercepts the packets that Tivoli sends to its Gateways, and it's incompatible with us. Aventail claims all the ports, unless you modify Aventail to exclude the "lcfd.exe" process. So,
*if* you're running Aventail, install Tivoli products first, then install Aventail, and modify Aventail to exclude the Tivoli processes (leaving the ports free for us). It would probably be a good idea to exclude all files that open TCP/IP connections.
To get lcfd and Aventail to work together:
1. Upgrade Aventail Connect from 3.01s (or whatever it is) to 3.21s
2. Change the "Modify List" of the Aventail configuration file to add
"lcfd.exe" to the list of apps to EXCLUDE from interception.
Then they should be able to coexist.
One more tip to get it to work.
IBM SecureWay Firewall: How to setup SOCKS in debug level logging.
Problem Desc: How to setup SOCKS in debug level logging.
The socks implementation on Firewall version 4.1 (both platforms) drastically changes the debug logging behavior.
Aventail natively provides logging at a fairly useful debug level, so one easy thing to do is to enable the debug logging that they provide as a documented part of their product. To enable this logging, edit the "s5.conf" file in the "<firewall root>/config" directory on Windows NT or in the "/etc/security" directory on AIX.
Find a stanza which starts like following:
installation "Converted"
{
<lots of indented directives>
}
Any place inside of those two braces, add the following six directives:
secout = LOGFILE;
sysout = LOGFILE;
miscout = LOGFILE;
seclevel = DEBUG3;
syslevel = DEBUG3;
misclevel = DEBUG3;
These directives will redirect all of Aventail's log facilities ("security", "system", "miscellaneous"

to their respective hardcoded files, at the highest debug priorities. The files are "security.log", "system.log", and "misc.log". These files will show up in "c:\" on Windows NT and in "/etc/security/socks" directory on AIX. In addition, ask for verbose output to the screen, but only if running in a console window (as opposed to as a Windows NT Service).
On Windows NT, use the following command:
fwsocks5 -d -c "c:\program files\ibm\firewall\config\s5.conf" -V
On AIX, use the following command:
/usr/sbin/fwSocks5 -d -V3
Thanks,
Jim Simmons
Technical User