Quantcast
Viewing all articles
Browse latest Browse all 4945

Having trouble with Ontap 9.9.1 and DISA DC group policies

I'm testing out a hardened environment with our NetApp and part of that is going to be using the government DISA STIG guidelines for group policies. When I apply them, it breaks the ability to Ontap to join the domain. The error it gives is

 

**[ 87] FAILURE: Unable to SASL bind to LDAP server using GSSAPI:
** Local error
[ 87] Additional info: SASL(-1): generic failure: GSSAPI Error:
Unspecified GSS failure. Minor code may provide more

 

Not a complete surprise as these group policies harden a bunch of defaults. The issue is that I would like to avoid having to go through one at a time trying to figure out what is causing the problem.  So I was wondering if anyone knew which group policies cause issues for Ontap, particularly if you happen to know which out of the STIG list.

 

Thanks.

 

EDIT: Some of the problem seems to be related to encryption types. I removed the CIFS server and attempted to rejoin it and was told:

 

**[ 40] FAILURE: Could not authenticate as
** ': KDC has no support
** for encryption type (KRB5KDC_ERR_ETYPE_NOSUPP)

Error: command failed: Failed to create the Active Directory machine account "FURFARO01". Reason: Kerberos Error: KDC has no support for encryption type.

 

The Domain controllers are set to only use AES as per the group policy. Adding in RC4 as a permissible encryption made it able to join.

 

Is there a way to join to a domain set to only allow AES for Kerberos or is RC4 required?


Viewing all articles
Browse latest Browse all 4945

Trending Articles



<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>