How to Resolve Server Monitoring Connection Failures Caused by Kerberos Errors
Objective
Resolve server monitoring connection failures caused by Kerberos Errors.
Environment
- NGFW
- User-ID
- Server monitoring
Procedure
-
Review the WinRM configuration over HTTP or HTTPS with Kerberos. Refer to Configure Server Monitoring Using WinRM.
- If needed, use the following command to test the authentication with the service account:
> test authentication authentication-profile <authentication-profile-name> username <username> password - Look for the krb5 error code in the useridd.log, use the CLI command:
and search for its meaning as listed below:less mp-log useridd.log- Error -1765328228: Cannot contact any KDC for realm '<>' indicates that the firewall or Panorama (the client) cannot reach the Key Distribution Center (KDC), which is typically the Active Directory Domain controller. This is usually a network connectivity or DNS resolution issue.
- Recommendation: Verify that the firewall or Panorama can resolve the domain controller's hostname and communicate over the appropriate ports, typically port 88 for Kerberos. Refer to Kerberos error "-1765328228" observed after configuring with WinRM-HTTP or WinRM-HTTPS for Agentless User-ID.
- Error -1765328366: Client's credentials have been revoked means the service account credentials used by the firewall or Panorama for User-ID have been revoked on the Active Directory server. This typically occurs if the account is disabled, locked out, or its Ticket-Granting Ticket (TGT) has been explicitly revoked.
- Recommendation: Refer to KDC_ERR_CLIENT_REVOKED in Error: KRB5KDC_ERR_CLIENT_REVOKED (-1765328366): Client's credentials have been revoked. How to identify from the client that a user account has been locked out.
- Error 11: Resource temporarily unavailable suggests a temporary issue on the firewall, Panorama, or the network that prevents the Kerberos client from getting the necessary resources to contact the KDC. It has been observed in situations where there's an abrupt interruption of the connection between the firewall or Panorama and the Domain Controller.
- Recommendation: Troubleshoot the network connection between the firewall or Panorama and the KDC. Restarting the userid process may resolve the issue. For that, you need to schedule a maintenance window, as this is disruptive. Additionally, refer to the recommendation for a similar problem where the error code is 0, Server Monitoring Status stuck in "Connection Refused (0)" when using WinRM-HTTP/WinRM-HTTPS.
- Error 145: Connection timed out indicates that the firewall's or Panorama's attempt to connect to the KDC timed out. This is typically a network connectivity issue where the firewall or Panorama sends a request to the Domain Controller but does not receive a response within the expected time frame. This could be due to network latency, packet loss, or a firewall or router between the PAN-OS device and the DC blocking the communication.
- Recommendation: Troubleshoot the network connection between the firewall or Panorama and the KDC. Refer to the recommendation for a similar issue where the error code is 0, Server Monitoring Status stuck in "Connection Refused (0)" when using WinRM-HTTP/WinRM-HTTPS.
- Error 16: Device or resource busy suggests that a required resource for the Kerberos authentication process was temporarily unavailable.
- Recommendation: This can be caused by the Kerberos client on the firewall or Panorama being unable to acquire a necessary lock to perform ticket-related operations. Since this could be related to configuration, review the configuration as mentioned in step 1 of this article.
- Error -1765328237: KDC reply did not match expectations means that the firewall received a reply from the KDC, but it was not in the expected format or was otherwise malformed. Because the firewall or Panorama cannot process the unexpected reply, it fails to acquire the TGT.
- Recommendation: Refer to Server Monitoring status shows "Kerberos error" when using WinRM-HTTP Transport Protocol.
- Error -1765328378: Client '<>' not found in Kerberos database indicates that the username of the service account configured on the firewall for User-ID does not exist in the Active Directory (Kerberos database).
- Recommendation: Ensure that the correct username is configured in the Server Monitoring settings on the firewall or Panorama. Refer to KDC_ERR_C_PRINCIPAL_UNKNOWN Returned in S4U2Self Request.
- Error -1765328370: KDC has no support for encryption type.
- Error -1765328360: Preauthentication failed.
- The authentication server (AS) in KDC states that the authentication has failed and closes the connection, so the authentication process is not completed. The problem is on the Authentication server side. Checking the box option of “do not require Kerberos preauthentication” in the AD may solve the issue.
- Recommendation: Validate your configuration on the AD side using: Configure Server Monitoring Using WinRM.
- Error -1765328316: Realm not local to KDC.
- Recommendation: Refer to Server monitoring connection status "Kerberos error" -1765328316: Realm not local to KDC.
- Error -1765328353: Decrypt integrity check failed.
- Recommendation:
- Set up User-ID with WinRM over HTTPS. Import the Domain Controller certificate, then check if the connection is established. Validate the configuration using Configure Server Monitoring Using WinRM.
- This may mean that there is a mismatch in the encryption types supported by the firewall or Panorama and the KDC. Ensure that both the service account and the KDC are configured to use matching encryption types.
- Recommendation:
- Error -1765328228: Cannot contact any KDC for realm '<>' indicates that the firewall or Panorama (the client) cannot reach the Key Distribution Center (KDC), which is typically the Active Directory Domain controller. This is usually a network connectivity or DNS resolution issue.
Additional Information
In Kerberos, KDC stands for Key Distribution Center. It’s a centralized authentication service that issues and manages the cryptographic keys used in the Kerberos authentication process. The KDC has two main components:
-
Authentication Service (AS):
-
Verifies a user’s identity (for example, using a username and password).
-
Issues a Ticket-Granting Ticket (TGT) if the credentials are valid.
-
-
Ticket Granting Service (TGS):
-
Uses the TGT to issue service tickets that allow access to specific network services without re-entering credentials.
-
The KDC is like a trusted authority that gives out “passes” (tickets) proving that a user or system is who they claim to be, so they can securely access other services within the network.