Skip to main content
NetApp Response to Russia-Ukraine Cyber Threat
In response to the recent rise in cyber threat due to the Russian-Ukraine crisis, NetApp is actively monitoring the global security intelligence and updating our cybersecurity measures. We follow U.S. Federal Government guidance and remain on high alert. Customers are encouraged to monitor the Cybersecurity and Infrastructure Security (CISA) website for new information as it develops and remain on high alert.

NetApp KCS Award

NetApp Knowledge Base

CIFS access delay occurs after removing old DC server from AD environment

Views:
163
Visibility:
Public
Votes:
0
Category:
ontap-9
Specialty:
cifs
Last Updated:

Applies to

  • ONTAP 9.1
  • CIFS
  • Domain Controller (DC) was removed from Active Directory (AD) environment

Issue

  • CIFS access delays
  • secd.conn.auth.failure:error in EMS log:

Tue Mar 16 15:45:17 JST [xxx-xxx: secd: secd.conn.auth.failure:error]: Vserver (xxyyyy) could not make a connection over the network to server (ip 10.xx.xx.151, port 88) via interface xx.xx.xx.x. Error: Operation timed out.

  • vserver cifs domain discovered-servers show and CIFS-DOMAIN-DISCOVERED-SERVER.XML does not show an entry of which Type is KERBEROS for SVM
  • secd.log indicates that many secd authentication entries remained in queue for more than 10 seconds:

Tue Mar 16 2021 09:05:33 +09:00 [kern_secd:info:7051] | [000.000.015]  debug:  Worker Thread 34638722560 processing RPC 151:secd_rpc_auth_extended with request ID:23652 which sat in the queue for 18 seconds.  { in run() at src/server/secd_rpc_server.cpp:2067 }

 

Scan to view the article on your device
CUSTOMER EXCLUSIVE CONTENT

Registered NetApp customers get unlimited access to our dynamic Knowledge Base.

New authoritative content is published and updated each day by our team of experts.

Current Customer or Partner?

Sign In for unlimited access

New to NetApp?

Learn more about our award-winning Support