Skip to main content
NetApp Knowledge Base

Access denied by FPolicy server synchronous response

Last Updated:

Applies to

  • CIFS
  • FPolicy


  • During multiple file operations, e.g. copying the directory from CIFS share to local disk when every single file has to be recalled by the Fpolicy archiving solution, files get copied successfully until an "access denied" error is returned for one file. If the operation is retried, it succeeds until the next error is returned some files further.
  • A vserver security trace show access denied by Fpolicy server


vserver security trace trace-result show 

Vserver: svm1 
Node            Index Filter Details             Reason

--------------- ----- -------------------------- ------------------------------ 
node01            1     Security Style:  -
                                                 Access is denied by the 
                                                 FPolicy server or due to 

                                                 mandatory attribute of the 
                                                 FPolicy policy. 

 Protocol: cifs 
                      Volume: - 
                      Share: share1 
                      Path: - 

           Win-User: Domain\user1 
                      UNIX-User: root 
                      Session-ID: xxxxxxxxxxxxxxxxxxx 

  • Fpolicy  logs in ONTAP may contain DENY response:
[kern_fpolicy:nfo:6553] [enum clnt_stat FSMNbladeRespTask::shmSendRespToNblade(std::list<nbladeRespQueueElement_t> &, int, char *, CLIENT *)] reqId = XXXXXXXXXX respCode 2 : DENY 
  • A network trace capturing the traffic between the Fpolicy external-server  would show that the file open is denied by the FPolicy external-engine:
Screen Request (18226441) SMB_OPEN: \path\to\file.ext
Screen Response (18226441) SMB_OPEN: Denied

Sign in to view the entire content of this KB article.

New to NetApp?

Learn more about our award-winning Support

NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.