Solved

FAS270 Not Authenticating with Domain

Posted on 2010-11-16
3
2,849 Views
Last Modified: 2014-10-23
We have a FAS270 online here. It has been working fine for months. About a week ago it randomly started asking for username and password when you type \\xxx.xxx.xxx.xxx (its IP address) in run. It will not accept any username or password. No GPO has changed, settings or anything. When this happened a week ago it went on for about an hour or so and just stopped and started working correctly again. Then today it started again, but now it has gone on for hours and is still happening.
If I look in the CIFs-Session Report there are about 4 computers that can access it without user name and password.

For some background....Our users are running windows XP, servers are windows server 2003. The FAS270 is on the domain and DNS/AD look fine.
0
Comment
Question by:DEHLI
  • 2
3 Comments
 

Author Comment

by:DEHLI
ID: 34144027
Also I am getting this message on the Filer over and over-

AFT [Auth.dc.trace.DCConnection.errorMsg:error] : AUTH: Domain Controller error: NetLogon error 0xc0000022: - Filer's security information differs from domain controller.
0
 

Accepted Solution

by:
DEHLI earned 0 total points
ID: 34144213
I managed to figure out what the problem was. There was not PDC list created in my Filer. So it was finding all the DCs dinamicly. It apparently goes by subnet. Here in my office our DC died the other day and we had to rebuild it. The new DC is still replicating and not ready yet. But the Filer decided to put it on the top of its PDCs list. I added a new list and put a different (working) DC on the top PDC spot.
0
 

Expert Comment

by:iNc0g
ID: 40399304
can you please explain what commands on the filer did you issue in order to solve this ? i am facing the exact same problem.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
This video teaches viewers how to encrypt an external drive that requires a password to read and edit the drive. All tasks are done in Disk Utility. Plug in the external drive you wish to encrypt: Make sure all previous data on the drive has been …
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now