the pre-login handshake

Posted on 2014-03-24
Last Modified: 2014-09-22
I have been getting this same error a few times. All my code does is calling a store procedure and have it returns somedata.  Any thoughts on this error?

System.Data.SqlClient.SqlException (0x80131904): Connection Timeout Expired.  The timeout period elapsed while attempting to consume the pre-login handshake acknowledgement.  This could be because the pre-login handshake failed or the server was unable to respond back in time.  The duration spent while attempting to connect to this server was - [Pre-Login] initialization=16360; handshake=6680;  ---> System.ComponentModel.Win32Exception (0x80004005): The wait operation timed out
   at System.Data.SqlClient.SqlInternalConnection.OnError(SqlException exception, Boolean breakConnection, Action`1 wrapCloseInAction)
Question by:VBdotnet2005
  • 3
  • 3
LVL 58

Expert Comment

ID: 39950776
Is it just sporadic or all the time?
Is port 1443 open on the servers firewall?
Is IPv6 enabled

Author Comment

ID: 39950788
Is it just sporadic or all the time?   -  this is sporadic
Is port 1443 open on the servers firewall?  - yes
Is IPv6 enabled   - How do I check this?
LVL 58

Accepted Solution

Gary earned 500 total points
ID: 39950822
Start > Control Panel > Network and Sharing Center.
Click Local Area Connection
In the new window click Properties
Check IPv6 is checked
6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.


Author Comment

ID: 39950863
Yes, it is checked.
LVL 58

Expert Comment

ID: 39950880
Is there anything else bogging the server down?
Are you running long queries?
Is the DB getting locked?

Author Comment

ID: 39995052
It is ok now. Our admin took care of it.
LVL 74

Expert Comment

by:käµfm³d 👽
ID: 40337829
Any chance you can share what the resolution was?

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Just a quick little trick I learned recently.  Now that I'm using jQuery with abandon in my applications, I have grown tired of the following syntax:      (CODE) I suppose it just offends my sense of decency to put inline VBScript on a…
Creating an analog clock UserControl seems fairly straight forward.  It is, after all, essentially just a circle with several lines in it!  Two common approaches for rendering an analog clock typically involve either manually calculating points with…
It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now