Configuration Failed For Active Directory Domain Services

0 views
Skip to first unread message

Giancarlo Stewart

unread,
Aug 4, 2024, 2:20:48 PM8/4/24
to deczaversoi
Thereis insufficient site connectivity information in Active Directory

Sites and Services for the KCC to create a spanning tree replication topology.

Or, one or more domain controllers with this directory partition are unable

to replicate the directory partition information. This is probably due to

inaccessible domain controllers.


User Action

Use Active Directory Sites and Services to perform one of the following

actions:

- Publish sufficient site connectivity information so that the KCC can

determine a route by which this directory partition can reach this site. This is

the preferred option.

- Add a Connection object to a domain controller that contains the directory

partition in this site from a domain controller that contains the same

directory partition in another site.


If you encounter this issue it could be the DC logging the errors is hosting the Intersite Topology Generator (ISTG) role for its site. This role is responsible for maintaining all of the Inter-site connection objects for the site. This role polls each DC in its site for connection objects that have failed and if failures are reported by the peer DCs the ISTG logs these events indicating something is not right with connectivity.


For those wondering what these events mean here is a quick rundown:





NOTE: Determine from the output if the DC logging these events (DC1X) is the ISTG or not.


2) If the DC logging the events is the ISTG any one of the DCs in the same site as this ISTG could have connectivity issues to the site identified in the 1566 event. You can identify which DC(s) are failing to replicate from the site identified in the 1566 event by running this command which targets all DCs in the site that the ISTG logging the errors resides in. For example, DC1X is logging the events and it is the ISTG for siteX. To identify which DCs in siteX are failing to replicate from siteY run this command:





4) If these events occur at specific periods of the day or week and then they resolve on their own, verify DNS Scavenging is not set too aggressively. It could be DNS Scavenging is so aggressive that SRV, A, CNAME and other valid records are purged from DNS causing name resolution between DCs to fail. If this is the behavior you are seeing, verify scavenging settings on these DNS zones:





To correct this change the Refresh and Non-refresh periods to 1 day each and set scavenging to 3 days. See Managing the aging and scavenging of server data on Technet to configure these settings for the DNS Server and/or zones.


Hopefully this clears up the mysterious KCC errors on that one DC.





Error testing domain controller connectivity through PowerShell. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond xx.xx.xx.xx:5986


"details":["code":"InternalError","message":"Error testing domain controller connectivity through PowerShell. A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond 20.190.251.173:5986"]Other people who have experienced this issue typically had something to do with VPNs, ExpressRoutes, or other special network setups.


Also I want to share with you the documentation for prerequisites, tutorial, network, notifications.Prerequisites: -us/azure/active-directory/fundamentals/active-directory-how-subscriptions-associated-directory


As far as I can tell, the LDAP configuration is correct - the firewall connects to the agent, and gets a list of users from the groups I have configured to be allowed - but every time I try to login to the portal, it fails, and I get the following log entries


Can anyone suggest where I might be going wrong? I've tried every possible combination/form of username, and I know I'm using the correct password - is there any way from the CLI to try and verify what is going wrong?


In the Authentication profile group list, you need to enter your group in domain\group format, not in DN string format (which the firewall defaults to) - so instead of cn=,dc=,dc= format you need to put domain\group - you will likely need to manually enter this in the correct format.


There's a whole bunch of CLI troubleshooting you can do - if you can't get it working, do a search on discussions started by me with the title "LDAP Authentication not matching user groups", and you should find more hints.


Did you actually create an authentication profile and use this in the gp configuration ? I believe your authentication profile settings might not be correct. You can create an authentication profile as shown for the users like in the below pic and can use the same in the gp config.


What path are these authentication requests passed through? The management interface, or the actual dataplane interface? I have the management interface connected and able to talk to the domain controller, but the dataplane interfaces are only connected to dummy ports on a stand-alone switch (to bring them up), they're not actually connected to the live network.


The authentication requests to domain controller are passed through the mgmt interface. Just curious, you said you have the data plane interfaces connected to dummy interfaces ? then how are the gp clients connecting to the firewall ?


There are no "clients" - there is one "client" - me. I've plugged my laptop direct into the "outside" interface and assigned it my Internet router's IP address, so it's "pretending" to be the Internet.


1) One the LDAP server you can go to security events of the server and look out for the login auth tickets and see if the server is actually getting the LDAP queries from the firewall, if so the reason for the denial of the user.


When I use rules from the globalprotect zone to the network using domain\group names they do not work. If i add user they work. In other zones adding user does not work because I have to add domain\user.


I'm also facing same issue. When I have call specific user group in authentication profile and after that called in global protect portal and gateway but at time of login in gp then showing invalid user name and password showing logs login failed,But If i called all user in authentication profile then login successful showing.


Active Directory (AD) is a component that is used by administrators to grant access to resources and also enforce group policies to a set of members in the Active Directory domain. Cisco Meraki devices can integrate with an AD server in multiple ways. This article will outline AD integration configuration steps and troubleshooting techniques that you can adapt to resolve an issue related to AD.


Most issues can be resolved by verifying that the configurations match on the AD server and/or Meraki dashboard. Following the configuration steps again for integrating AD can be the best way to ensure configurations are correct on both sides. Listed below are the ways which AD can be integrated with Meraki devices and a comprehensive configuration guide for the same.


MR access points support the use of sign-on splash page for authenticating clients. This splash page can be integrated with an AD server to ensure that only clients with valid user credentials are allowed to access network resources.


Meraki policies for bandwidth limits, traffic shaping and firewall rules, security filtering and content filtering settings can be applied to certain AD groups when the server is integrated with an MX security appliance.


When using AD authentication, your MR/MX needs to perform a secure LDAP bind using SSL\TLS via the starttls command. The LDAP bind authenticates the user logging into the splash page as illustrated below:


Where X.X.X.X is the IP address of the AP. If the AD server replies to TCP SYN packet on port 3268 with a TCP RST, it is likely the AD server is not a Global Catalog. In this instance enable the Global Catalog role on the AD server.


Before applying a group policy to a particular client using AD integration, you need to check whether the AD server has a successful connection with the MX security appliance. You can check the status of the AD integration connection on the Security & SD-WAN > Configure > Active Directory page. If AD has connected with the MX without any issue then you should be able to see a green check mark on the status. If the server has failed to integrate with the MX, the following are the most common errors.


Error Description: This error indicates the MX can connect to the WMI service on the domain controller but cannot connect to the LDAP service. Note that this is different from the Could not reach domain controller error (described above) which indicates that both the WMI and LDAP services are unreachable.


Error Description: The MX uses TLS to secure the LDAP connection to the domain controller. This error indicates the MX received an Error initializing TLS response from the domain controller when attempting to establish TLS.


Error Description: This error means the WMI service on the domain controller is returning an NT error code when the MX tries to pull security logs. These events are necessary for the MX to learn which user accounts are logged into which computers.

3a8082e126
Reply all
Reply to author
Forward
0 new messages