<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What authentication  method does CIFS server use for CIFS clients? in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158961#M36280</link>
    <description>&lt;P&gt;Kerberos is used if there is a valid SPN associated with the machine account that operates the CIFS server and a hostname is used to access the SMB share in older versions of Windows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/322979/kerberos-is-not-used-when-you-connect-to-smb-shares-by-using-ip-addres" target="_blank"&gt;https://support.microsoft.com/en-us/help/322979/kerberos-is-not-used-when-you-connect-to-smb-shares-by-using-ip-addres&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Newer versions of Windows can leverage the IP address for Kerberos:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip" target="_blank"&gt;https://docs.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basic process is this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- User accesses the share via hostname or IP - Windows client version decides what happens based on the connection method&lt;/P&gt;
&lt;P&gt;- If hostname, DNS is used to look up an IP address and the hostname is also used to search for a CIFS SPN (for example, if the hostname is cifs.domain.com, then the SPN is host/cifs.domain.com)&lt;/P&gt;
&lt;P&gt;- If an IP address is used, Windows clients prior to Windows 10 and servers/DCs prior to 2016 will fall back to NTLM; If newer clients are used, a reverse DNS lookup is used to find the hostname, which is then used to find the SPN.&lt;/P&gt;
&lt;P&gt;- If a valid SPN exists, then Kerberos authentication is used&lt;/P&gt;
&lt;P&gt;- If there is no valid SPN (SPN that matches the hostname used) then CIFS falls back to NTLM&lt;/P&gt;
&lt;P&gt;- If NTLM is not allowed in the domain, auth fails&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the same process used by any Windows client. ONTAP doesn't really have any configuration options to control this other than the initial machine account creation. That initial creation determines the CIFS SPN associated with the machine account. For example, if I create a CIFS server named CIFS, then the SPN is host/cifs.domain.com.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can see if your Windows client has a valid SPN to the CIFS server by running "klist" on the Windows client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;klist&lt;BR /&gt;&lt;BR /&gt;Current LogonId is 0:0x2e17492&lt;BR /&gt;&lt;BR /&gt;Cached Tickets: (2)&lt;BR /&gt;&lt;BR /&gt;#0&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;Server: krbtgt/NTAP.LOCAL @ NTAP.LOCAL&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40e10000 -&amp;gt; forwardable renewable initial pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:26:44 (local)&lt;BR /&gt;End Time: 8/25/2020 10:26:44 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:26:44 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0x1 -&amp;gt; PRIMARY&lt;BR /&gt;Kdc Called: ONEWAY&lt;BR /&gt;&lt;BR /&gt;#1&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;&lt;STRONG&gt;Server: cifs/demo.ntap.local @ NTAP.LOCAL&lt;/STRONG&gt;&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40a10000 -&amp;gt; forwardable renewable pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:26:44 (local)&lt;BR /&gt;End Time: 8/25/2020 10:26:44 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:26:44 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0&lt;BR /&gt;Kdc Called: ONEWAY&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to use an alias name, you either create a CNAME record in DNS that points back to the A record of the CIFS server or you create a new A record with that alias and a new SPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;1&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;&lt;STRONG&gt;Server: cifs/demoalias.ntap.local @ NTAP.LOCAL&lt;/STRONG&gt;&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40a10000 -&amp;gt; forwardable renewable pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:34:27 (local)&lt;BR /&gt;End Time: 8/25/2020 10:29:38 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:29:38 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0&lt;BR /&gt;Kdc Called: ONEWAY&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find if a valid SPN exists with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;setspn /Q cifs/demoalias.ntap.local&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;CN=DEMO,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;cifs/demoalias.ntap.local&lt;BR /&gt;cifs/demoalias&lt;BR /&gt;HOST/demo.ntap.local&lt;BR /&gt;HOST/DEMO&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the storage, you can see auth type with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -instance&lt;BR /&gt;&lt;BR /&gt;Vserver: DEMO&lt;BR /&gt;&lt;BR /&gt;Node: ontap9-tme-8040-01&lt;BR /&gt;Session ID: 15797783067885568098&lt;BR /&gt;Connection ID: 4128580272&lt;BR /&gt;Incoming Data LIF IP Address: 10.193.67.237&lt;BR /&gt;Workstation IP Address: 10.193.67.236&lt;BR /&gt;&lt;STRONG&gt;Authentication Mechanism: Kerberos&lt;/STRONG&gt;&lt;BR /&gt;User Authenticated as: domain-user&lt;BR /&gt;Windows User: NTAP\Administrator&lt;BR /&gt;UNIX User: administrator&lt;BR /&gt;Open Shares: 2&lt;BR /&gt;Open Files: 2&lt;BR /&gt;Open Other: 0&lt;BR /&gt;Connected Time: 7s&lt;BR /&gt;Idle Time: 6s&lt;BR /&gt;Protocol Version: SMB3&lt;BR /&gt;Continuously Available: No&lt;BR /&gt;Is Session Signed: false&lt;BR /&gt;NetBIOS Name: -&lt;BR /&gt;SMB Encryption Status: unencrypted&lt;BR /&gt;Large MTU Enabled: true&lt;BR /&gt;Connection Count: 4&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or display just the auth-mechanism with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -fields auth-mechanism&lt;BR /&gt;node vserver session-id connection-id auth-mechanism&lt;BR /&gt;------------------ ------- -------------------- ------------- --------------&lt;BR /&gt;ontap9-tme-8040-01 DEMO 15797783067885568098 4128580272 &lt;STRONG&gt;Kerberos&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can filter only Kerberos sessions with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -auth-mechanism Kerberos&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Aug 2020 13:41:12 GMT</pubDate>
    <dc:creator>parisi</dc:creator>
    <dc:date>2020-08-25T13:41:12Z</dc:date>
    <item>
      <title>What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158928#M36271</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am confused about what authentication method is being used by the vservers here. please see the following two command and outputs. Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1. Based on the outputs, is this vserver using "MS-DC" or "KERBEROS"? My understanding is Kerberos should be the default. &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;2. What exactly "MS-DC" type&amp;nbsp; really is versus Kerberos or MS-LDAP? Is this same as NTLM?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;*&amp;gt;cifs domain discovered-servers show -vserver vserver-name1&lt;/P&gt;
&lt;P&gt;.....&lt;/P&gt;
&lt;P&gt;Node: node-08&lt;BR /&gt;Vserver: vserver-name1&lt;/P&gt;
&lt;P&gt;Domain Name Type Preference DC-Name DC-Address Status&lt;BR /&gt;--------------- -------- ---------- --------------- --------------- ---------&lt;BR /&gt;abc.organizat.com KERBEROS preferred dcservername01 1.1.1.5 undetermined&lt;BR /&gt;abc.organizat.com KERBEROS preferred dcservername02 1.1.1.6 undetermined&lt;BR /&gt;abc.organizat.com MS-LDAP preferred dcservername01 1.1.1.5 undetermined&lt;BR /&gt;abc.organizat.com MS-LDAP preferred dcservername02 1.1.1.6 undetermined&lt;BR /&gt;abc.organizat.com MS-DC preferred dcservername01 1.1.1.5 OK&lt;BR /&gt;abc.organizat.com MS-DC preferred dcservername02 1.1.1.6 undetermined&lt;/P&gt;
&lt;P&gt;......&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;*&amp;gt;vserver cifs security show -vserver vserver-name1&lt;/P&gt;
&lt;P&gt;Vserver: vserver-name1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kerberos Clock Skew: 5 minutes&lt;BR /&gt;Kerberos Ticket Age: 10 hours&lt;BR /&gt;Kerberos Renewal Age: 7 days&lt;BR /&gt;Kerberos KDC Timeout: 3 seconds&lt;BR /&gt;Is Signing Required: false&lt;BR /&gt;Is Password Complexity Required: true&lt;BR /&gt;Use start_tls for AD LDAP connection: false&lt;BR /&gt;Is AES Encryption Enabled: false&lt;BR /&gt;LM Compatibility Level: lm-ntlm-ntlmv2-krb&lt;BR /&gt;Is SMB Encryption Required: false&lt;BR /&gt;Client Session Security: -&lt;BR /&gt;SMB1 Enabled for DC Connections: system-default&lt;BR /&gt;SMB2 Enabled for DC Connections: system-default&lt;BR /&gt;LDAP Referral Enabled For AD LDAP connections: false&lt;BR /&gt;Use LDAPS for AD LDAP connection: false&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 10:55:59 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158928#M36271</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2025-06-04T10:55:59Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158936#M36273</link>
      <description>&lt;P&gt;Cifs in Ontap use Kerberos as default authentication methods when it connect to and server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;VAR class="keyword varname"&gt;{KERBEROS|MS-LDAP|MS-DC|LDAP|NIS}&lt;/VAR&gt;&lt;SPAN&gt;] are&amp;nbsp; Server Types that the NetApp vserver can connect to.&amp;nbsp; NOTE All above services can be located on one DC.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That been said, the client is the one that decides what protocol to use for authentication. If you have everything set up correctly in your environment, the client will try Kerberos first as it is the default.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To monitor your dc connection, use the following command.&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;*&amp;gt;&amp;gt; diag secd connection show -vserver &amp;lt;vserver_name&amp;gt; -node &amp;lt;Node_name&amp;gt;&lt;/LI-CODE&gt;</description>
      <pubDate>Tue, 25 Aug 2020 04:48:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158936#M36273</guid>
      <dc:creator>Mjizzini</dc:creator>
      <dc:date>2020-08-25T04:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158957#M36278</link>
      <description>&lt;P&gt;Thanks for your message!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; &amp;nbsp; &amp;nbsp;What configurations on the client to&amp;nbsp; determine what authentication method the client decides to use? In another word, how&amp;nbsp; can I find out what method the client is using if as you said it is determined by the client?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2.&amp;nbsp; &amp;nbsp; What exactly MS-DC authentication is? Comparing to &lt;SPAN&gt;KERBEROS or MS-LDAP? As you see in outputs, all type are shown as MS-DC in all my vservers here. Does that mean we are using MS-DC on the vserver, not using KERBEROS or MS-LDAP?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;3.&amp;nbsp; &amp;nbsp; Following is the output of the command you suggested to run. Can you tell what authentication is it using from the output?&lt;/P&gt;
&lt;P&gt;*&amp;gt; diag secd connection show -vserver vserver-name1 -node node-08&lt;BR /&gt;[ Cache: NetLogon/abc.organiz.com ]&lt;BR /&gt;Queue&amp;gt; Waiting: 0, Max Waiting: 2, Wait Timeouts: 0, Avg Wait: 0.00ms&lt;BR /&gt;Performance&amp;gt; Hits: 106030, Misses: 171539, Failures: 94422, Avg Retrieval: 1522.32ms&lt;/P&gt;
&lt;P&gt;+ Rank: 01 - Server: 192.5.45.8 (robotron.abc.organiz.com)&lt;BR /&gt;Connected through the 10.192.26.17 interface, 0.5 mins ago&lt;BR /&gt;Version=SMB2, Credits Available=1, Signing=On&lt;BR /&gt;Used 1 time(s), and has been available for 30 secs&lt;BR /&gt;RTT in ms: mean=21.44, min=13, max=82, med=14, dev=15.86 (29.4 mins of data)&lt;/P&gt;
&lt;P&gt;[ Cache: LSA/ais.columbia.edu ]&lt;BR /&gt;Queue&amp;gt; Waiting: 0, Max Waiting: 1, Wait Timeouts: 0, Avg Wait: 0.00ms&lt;BR /&gt;Performance&amp;gt; Hits: 435, Misses: 3463, Failures: 2131, Avg Retrieval: 3936.59ms&lt;/P&gt;
&lt;P&gt;(No connections active or currently cached)&lt;/P&gt;
&lt;P&gt;[ Cache: LDAP (Active Directory)/abc.organiz.com ]&lt;BR /&gt;Queue&amp;gt; Waiting: 0, Max Waiting: 1, Wait Timeouts: 0, Avg Wait: 0.00ms&lt;BR /&gt;Performance&amp;gt; Hits: 1, Misses: 2497, Failures: 1664, Avg Retrieval: 8100.82ms&lt;/P&gt;
&lt;P&gt;(No connections active or currently cached)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 12:53:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158957#M36278</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2020-08-25T12:53:49Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158961#M36280</link>
      <description>&lt;P&gt;Kerberos is used if there is a valid SPN associated with the machine account that operates the CIFS server and a hostname is used to access the SMB share in older versions of Windows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.microsoft.com/en-us/help/322979/kerberos-is-not-used-when-you-connect-to-smb-shares-by-using-ip-addres" target="_blank"&gt;https://support.microsoft.com/en-us/help/322979/kerberos-is-not-used-when-you-connect-to-smb-shares-by-using-ip-addres&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Newer versions of Windows can leverage the IP address for Kerberos:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip" target="_blank"&gt;https://docs.microsoft.com/en-us/windows-server/security/kerberos/configuring-kerberos-over-ip&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Basic process is this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- User accesses the share via hostname or IP - Windows client version decides what happens based on the connection method&lt;/P&gt;
&lt;P&gt;- If hostname, DNS is used to look up an IP address and the hostname is also used to search for a CIFS SPN (for example, if the hostname is cifs.domain.com, then the SPN is host/cifs.domain.com)&lt;/P&gt;
&lt;P&gt;- If an IP address is used, Windows clients prior to Windows 10 and servers/DCs prior to 2016 will fall back to NTLM; If newer clients are used, a reverse DNS lookup is used to find the hostname, which is then used to find the SPN.&lt;/P&gt;
&lt;P&gt;- If a valid SPN exists, then Kerberos authentication is used&lt;/P&gt;
&lt;P&gt;- If there is no valid SPN (SPN that matches the hostname used) then CIFS falls back to NTLM&lt;/P&gt;
&lt;P&gt;- If NTLM is not allowed in the domain, auth fails&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is the same process used by any Windows client. ONTAP doesn't really have any configuration options to control this other than the initial machine account creation. That initial creation determines the CIFS SPN associated with the machine account. For example, if I create a CIFS server named CIFS, then the SPN is host/cifs.domain.com.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can see if your Windows client has a valid SPN to the CIFS server by running "klist" on the Windows client.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;klist&lt;BR /&gt;&lt;BR /&gt;Current LogonId is 0:0x2e17492&lt;BR /&gt;&lt;BR /&gt;Cached Tickets: (2)&lt;BR /&gt;&lt;BR /&gt;#0&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;Server: krbtgt/NTAP.LOCAL @ NTAP.LOCAL&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40e10000 -&amp;gt; forwardable renewable initial pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:26:44 (local)&lt;BR /&gt;End Time: 8/25/2020 10:26:44 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:26:44 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0x1 -&amp;gt; PRIMARY&lt;BR /&gt;Kdc Called: ONEWAY&lt;BR /&gt;&lt;BR /&gt;#1&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;&lt;STRONG&gt;Server: cifs/demo.ntap.local @ NTAP.LOCAL&lt;/STRONG&gt;&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40a10000 -&amp;gt; forwardable renewable pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:26:44 (local)&lt;BR /&gt;End Time: 8/25/2020 10:26:44 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:26:44 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0&lt;BR /&gt;Kdc Called: ONEWAY&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to use an alias name, you either create a CNAME record in DNS that points back to the A record of the CIFS server or you create a new A record with that alias and a new SPN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;1&amp;gt; Client: Administrator @ NTAP.LOCAL&lt;BR /&gt;&lt;STRONG&gt;Server: cifs/demoalias.ntap.local @ NTAP.LOCAL&lt;/STRONG&gt;&lt;BR /&gt;KerbTicket Encryption Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Ticket Flags 0x40a10000 -&amp;gt; forwardable renewable pre_authent name_canonicalize&lt;BR /&gt;Start Time: 8/25/2020 9:34:27 (local)&lt;BR /&gt;End Time: 8/25/2020 10:29:38 (local)&lt;BR /&gt;Renew Time: 9/17/2020 9:29:38 (local)&lt;BR /&gt;Session Key Type: AES-256-CTS-HMAC-SHA1-96&lt;BR /&gt;Cache Flags: 0&lt;BR /&gt;Kdc Called: ONEWAY&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can find if a valid SPN exists with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;setspn /Q cifs/demoalias.ntap.local&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;CN=DEMO,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;cifs/demoalias.ntap.local&lt;BR /&gt;cifs/demoalias&lt;BR /&gt;HOST/demo.ntap.local&lt;BR /&gt;HOST/DEMO&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the storage, you can see auth type with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -instance&lt;BR /&gt;&lt;BR /&gt;Vserver: DEMO&lt;BR /&gt;&lt;BR /&gt;Node: ontap9-tme-8040-01&lt;BR /&gt;Session ID: 15797783067885568098&lt;BR /&gt;Connection ID: 4128580272&lt;BR /&gt;Incoming Data LIF IP Address: 10.193.67.237&lt;BR /&gt;Workstation IP Address: 10.193.67.236&lt;BR /&gt;&lt;STRONG&gt;Authentication Mechanism: Kerberos&lt;/STRONG&gt;&lt;BR /&gt;User Authenticated as: domain-user&lt;BR /&gt;Windows User: NTAP\Administrator&lt;BR /&gt;UNIX User: administrator&lt;BR /&gt;Open Shares: 2&lt;BR /&gt;Open Files: 2&lt;BR /&gt;Open Other: 0&lt;BR /&gt;Connected Time: 7s&lt;BR /&gt;Idle Time: 6s&lt;BR /&gt;Protocol Version: SMB3&lt;BR /&gt;Continuously Available: No&lt;BR /&gt;Is Session Signed: false&lt;BR /&gt;NetBIOS Name: -&lt;BR /&gt;SMB Encryption Status: unencrypted&lt;BR /&gt;Large MTU Enabled: true&lt;BR /&gt;Connection Count: 4&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or display just the auth-mechanism with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -fields auth-mechanism&lt;BR /&gt;node vserver session-id connection-id auth-mechanism&lt;BR /&gt;------------------ ------- -------------------- ------------- --------------&lt;BR /&gt;ontap9-tme-8040-01 DEMO 15797783067885568098 4128580272 &lt;STRONG&gt;Kerberos&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or you can filter only Kerberos sessions with:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -vserver DEMO -auth-mechanism Kerberos&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Aug 2020 13:41:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/158961#M36280</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2020-08-25T13:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159003#M36294</link>
      <description>&lt;P&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621"&gt;@parisi&lt;/a&gt;&amp;nbsp; Thanks so much for your messages! They are very helpful to me.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;60-70% of total of 1,000 Windows(VMware) here are 2016 version. The rest is older. Based on my understanding to your messages, for 2016, we should be able to use Kerberos authentication, no matter of if DNS name or IP is used. However, after checked by running “cifs session show -auth-mechanism Kerberos”, there are absolutely no sessions are using Kerberos. All of them are NTLMv2. So, that turns to the possibility as for why,&amp;nbsp; SPN may not exist in AD.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I randomly picked several Windows, and run “klist”. As the result, there are no any CIFS SPN's. It tells me that there are no valid CIFS SPN, and therefore explained why there are no Kerberos authentication.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here are my follow-ups, if you can help me out:&lt;BR /&gt;1. Can you think of possible reasons why there are no CIFS SPN created?&lt;BR /&gt;2. To fix it, is manually creating SPN a solution?&lt;BR /&gt;3. What command to tell me if my initial creation of CIFS server on NetApp is using Kerberos or not, and to find out what SPN is?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 15:32:09 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159003#M36294</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2020-08-26T15:32:09Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159004#M36295</link>
      <description>&lt;P&gt;When the initial CIFS server is created, the SPNs are defined by the CIFS server name.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example, if I create a CIFS server named "CIFS" then my SPNs are host/cifs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs server create -vserver parisi -cifs-server CIFS -domain NTAP.LOCAL&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;PS C:\&amp;gt; setspn /L CIFS&lt;BR /&gt;Registered ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;HOST/cifs.ntap.local&lt;BR /&gt;HOST/CIFS&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If my DNS name is not "CIFS" (ie, if my users don't use \\cifs to access shares), then I won't use Kerberos. If I use an IP address and there's no corresponding PTR for the IP, then I won't use Kerberos.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CIFS server I created has no DNS entries; these don't get created by default unless you enable dynamic DNS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My SVM doesn't have that enabled:&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; dynamic-update show -vserver parisi&lt;BR /&gt;(vserver services name-service dns dynamic-update show)&lt;BR /&gt;&lt;BR /&gt;Vserver: parisi&lt;BR /&gt;Is Dynamic DNS Update Enabled?: false&lt;BR /&gt;Use Secure Dynamic Update?: false&lt;BR /&gt;Vserver FQDN to Be Used for DNS Updates: -&lt;BR /&gt;Time to Live for DNS Updates: 24h&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the DNS lookup for that new CIFS server:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;nslookup 10.193.67.230 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;*** oneway.ntap.local can't find 10.193.67.230: Non-existent domain&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;nslookup cifs 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;*** oneway.ntap.local can't find cifs: Non-existent domain&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a result, I use NTLM:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;::*&amp;gt; cifs session show -node * -vserver parisi -fields auth-mechanism&lt;BR /&gt;node vserver session-id connection-id auth-mechanism&lt;BR /&gt;------------------ ------- ------------------- ------------- --------------&lt;BR /&gt;node2 parisi 6974949922890059117 3649016229 &lt;STRONG&gt;NTLMv2&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To use Kerberos, I need DNS records (A/AAAA and PTR).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;nslookup cifs 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;Name: cifs.NTAP.local&lt;BR /&gt;Address: 10.193.67.230&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now when I access that name, I use Kerberos:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;net use * \\cifs\cifs&lt;BR /&gt;Drive Z: is now connected to \\cifs\cifs.&lt;BR /&gt;&lt;BR /&gt;The command completed successfully.&lt;BR /&gt;&lt;BR /&gt;::*&amp;gt; cifs session show -node * -vserver parisi -fields auth-mechanism&lt;BR /&gt;node vserver session-id connection-id auth-mechanism&lt;BR /&gt;------------------ ------- ------------------- ------------- --------------&lt;BR /&gt;node2 parisi 6974949922890059118 3649016230 &lt;STRONG&gt;Kerberos&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I want to use a *different* DNS name, I need A/AAAA and PTR records for the name I want to use (or a CNAME record that points to the original DNS record), and I need to create a new SPN for that account.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the CNAME:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;nslookup cifsalias 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;Name: cifs.NTAP.local&lt;BR /&gt;Address: 10.193.67.230&lt;BR /&gt;Aliases: cifsalias.NTAP.local&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's the new SPNs:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;setspn /a cifs/cifsalias CIFS&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;&lt;BR /&gt;Registering ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;cifs/cifsalias&lt;BR /&gt;Updated object&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;setspn /a cifs/cifsalias.ntap.local CIFS&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;&lt;BR /&gt;Registering ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;cifs/cifsalias.ntap.local&lt;BR /&gt;Updated object&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;setspn /L CIFS&lt;BR /&gt;Registered ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;&lt;STRONG&gt;cifs/cifsalias.ntap.local&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;cifs/cifsalias&lt;/STRONG&gt;&lt;BR /&gt;HOST/cifs.ntap.local&lt;BR /&gt;HOST/CIFS&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And when I access via that CNAME, I use Kerberos:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;net use * \\cifsalias\cifs&lt;BR /&gt;Drive Z: is now connected to \\cifsalias\cifs.&lt;BR /&gt;&lt;BR /&gt;The command completed successfully.&lt;BR /&gt;&lt;BR /&gt;::*&amp;gt; cifs session show -node * -vserver parisi -fields auth-mechanism&lt;BR /&gt;node vserver session-id connection-id auth-mechanism&lt;BR /&gt;------------------ ------- ------------------- ------------- --------------&lt;BR /&gt;node2 parisi 6974949922890059122 3649016234 &lt;STRONG&gt;Kerberos&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 16:04:57 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159004#M36295</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2020-08-26T16:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159006#M36296</link>
      <description>&lt;P&gt;We have about 700 Window clients with 2016 version. None of them are using Kerberos. As far as I can see, it is due to no valid SPNs’.&amp;nbsp;So, my main question was:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;What could be the reason can you think of for non-existing valid SPN’s?&lt;/P&gt;
&lt;P&gt;What is the fix to that?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 17:51:13 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159006#M36296</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2020-08-26T17:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159008#M36297</link>
      <description>&lt;P&gt;I explained in the previous post why you might not have valid SPNs, how to query SPNs, etc. as well as how to fix it.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Aug 2020 18:20:08 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159008#M36297</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2020-08-26T18:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159104#M36317</link>
      <description>&lt;P&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621"&gt;@parisi&lt;/a&gt;&amp;nbsp; Thanks again!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following is an example in our case here.&amp;nbsp; Based on my understanding to your message, it did not use Kerberos as expected. Why?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cluster::*&amp;gt; cifs server show -vserver vserver1 -fields cifs-server, domain&lt;BR /&gt;vserver cifs-server domain&lt;BR /&gt;------- ----------- -----------------&lt;BR /&gt;vserver1 VSERVER1 ABC.ORG.COM&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;G:\&amp;gt;setspn /L VSERVER1&lt;BR /&gt;Registered ServicePrincipalNames for CN=VSERVER1,OU=NetApp,OU=Servers,OU=ABCIT,OU=Resources,DC=abc,DC=org,DC=com:&lt;BR /&gt;HOST/vserver1.abc.org.com&lt;BR /&gt;HOST/VSERVER1&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;G:\&amp;gt;nslookup&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#FF0000"&gt;&amp;nbsp;&lt;STRONG&gt;# there is corresponding PTR for this IP "10.192.26.45". Right?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;Default Server: int-ns2.org.com&lt;BR /&gt;Address: 128.59.2.6&lt;/P&gt;
&lt;P&gt;&amp;gt; set type=ptr&lt;BR /&gt;&amp;gt; 10.192.26.45&lt;BR /&gt;Server: int-ns2.org.com&lt;BR /&gt;Address: 128.59.2.6&lt;/P&gt;
&lt;P&gt;Non-authoritative answer:&lt;BR /&gt;45.26.192.10.in-addr.arpa name = vserver1-cifs.abcit.org.com&lt;BR /&gt;45.26.192.10.in-addr.arpa name = vserver1-cifs-06.abcit.org.com&lt;BR /&gt;45.26.192.10.in-addr.arpa name = vserver1-cifs-05.abcit.org.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;# I accessed a share under this vserver using IP 10.192.26.45, but command below shows it is not using kerberos, but NTLMv2&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;cluster::*&amp;gt; cifs session show -vserver vserver1 -auth-mechanism kerberos&amp;nbsp; &amp;nbsp;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;There are no entries matching your query.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2020 14:28:23 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159104#M36317</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2020-08-30T14:28:23Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159105#M36318</link>
      <description>&lt;P&gt;Your SPN uses &lt;STRONG&gt;vserver1&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your DNS PTR points to &lt;STRONG&gt;vserver-cifs&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Those don’t match.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Add cifs/vserver1-cifs and cifs/vserver1-cifs.domain.org to the machine account, or have a DNS record vserver1.domain.org as the PTR for the IP.&lt;/P&gt;</description>
      <pubDate>Sun, 30 Aug 2020 16:41:59 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159105#M36318</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2020-08-30T16:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159117#M36322</link>
      <description>&lt;P&gt;By create the DNS name for CIFS server (in your example) as you suggested, I am able to use Kerberos authentication.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is one thing left. I don't quite understand what you said below. To me the command "C:\&amp;gt;nslookup 10.193.67.230 10.193.67.236" is not&amp;nbsp; valid, because nslookup can only take an IP as the argument, not two IP's. What does 10.193.67.230 and 10.193.67.236 represent respectively?&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;nslookup 10.193.67.230 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;*** oneway.ntap.local can't find 10.193.67.230: Non-existent domain&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;nslookup cifs 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;*** oneway.ntap.local can't find cifs: Non-existent domain&lt;/PRE&gt;
&lt;P&gt;also below is not valid to me neither:&lt;/P&gt;
&lt;PRE&gt;C:\&amp;gt;nslookup cifs 10.193.67.236&lt;BR /&gt;Server: oneway.ntap.local&lt;BR /&gt;Address: 10.193.67.236&lt;BR /&gt;&lt;BR /&gt;Name: cifs.NTAP.local&lt;BR /&gt;Address: 10.193.67.230&lt;/PRE&gt;
&lt;P&gt;When I use the IP with PRT record for that IP, Kerberos is not used.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Hopefully, this is going to be my last question for you. You have been extremely helpful to me.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2020 18:31:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159117#M36322</guid>
      <dc:creator>heightsnj</dc:creator>
      <dc:date>2020-08-31T18:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159118#M36323</link>
      <description>&lt;P&gt;&lt;A href="https://man.cx/nslookup(1)" target="_blank"&gt;https://man.cx/nslookup(1)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My command was:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;nslookup [A record or PTR] [DNS server]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Aug 2020 18:39:08 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/159118#M36323</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2020-08-31T18:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444160#M42177</link>
      <description>&lt;P&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621"&gt;@parisi&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for providing such useful information!&lt;/P&gt;&lt;P&gt;I have question according to your example for setting new SPN for the SVM account:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible for CNAME alias record - &lt;STRONG&gt;cifsalias&lt;/STRONG&gt; to be set this way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;C:\&amp;gt;setspn -S &lt;STRONG&gt;HOST&lt;/STRONG&gt;/cifsalias CIFS&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;&lt;BR /&gt;Registering ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;&lt;STRONG&gt;HOST&lt;/STRONG&gt;/cifsalias&lt;BR /&gt;Updated object&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;setspn -S &lt;STRONG&gt;HOST&lt;/STRONG&gt;/cifsalias.ntap.local CIFS&lt;BR /&gt;Checking domain DC=NTAP,DC=local&lt;BR /&gt;&lt;BR /&gt;Registering ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local&lt;BR /&gt;&lt;STRONG&gt;HOST&lt;/STRONG&gt;/cifsalias.ntap.local&lt;BR /&gt;Updated object&lt;BR /&gt;&lt;BR /&gt;C:\&amp;gt;setspn /L CIFS&lt;BR /&gt;Registered ServicePrincipalNames for CN=CIFS,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;&lt;STRONG&gt;HOST/cifsalias.ntap.local&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;HOST/cifsalias&lt;/STRONG&gt;&lt;BR /&gt;HOST/cifs.ntap.local&lt;BR /&gt;HOST/CIFS&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To configure not only&amp;nbsp; cifs service but entire HOST in SPN.&lt;/P&gt;&lt;P&gt;Because for example we have cifs&amp;nbsp; sessions connecting to SVM and SVM CNAME:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;cifsalias&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CIFS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 10:49:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444160#M42177</guid>
      <dc:creator>vladimir_im</dc:creator>
      <dc:date>2023-05-10T10:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444163#M42180</link>
      <description>&lt;P&gt;As far as I know, yes, that should work. But generally, if you have a CNAME, you won't need to add another SPN; DNS will resolve to the original SPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See TR-4616 for more info on page 41.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.netapp.com/pdf.html?item=/media/19384-tr-4616.pdf" target="_blank"&gt;https://www.netapp.com/pdf.html?item=/media/19384-tr-4616.pdf&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 14:03:19 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444163#M42180</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2023-05-10T14:03:19Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444165#M42181</link>
      <description>&lt;P&gt;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621"&gt;@parisi&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for provided information.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem what I am trying to fix is that cifs sessions to the CNAME alias of the SVM currently are connecting via NTLMv2 and not using Kerberos.&lt;/P&gt;&lt;P&gt;Cifs sessions to the SVM DNS already using Kerberos.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SVM\share - Kerberos&lt;/P&gt;&lt;P&gt;SVMalias\share - NTLMv2&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also DFS links are used in our environment to access SVM and SVMalias for different shares.&lt;/P&gt;&lt;P&gt;I think the problem is that I have only this for SPN record:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;C:\&amp;gt;setspn /L SVM&lt;BR /&gt;Registered ServicePrincipalNames for CN=SVM,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;/STRONG&gt;.ntap.local&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and modifying SPN by this way:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;C:\&amp;gt;setspn /L SVM&lt;BR /&gt;Registered ServicePrincipalNames for CN=SVM,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;/STRONG&gt;.ntap.local&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;BR /&gt;HOST/SVMalias.ntap.local&lt;BR /&gt;HOST/SVMalias&lt;BR /&gt;&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;should fix my problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to this requirements to have&amp;nbsp;CIFS Kerberos sessions you need to have valid SPN:&lt;/P&gt;&lt;P&gt;&lt;A href="https://kb.netapp.com/onprem/ontap/da/NAS/ONTAP_Requirements_for_CIFS_Kerberos" target="_blank"&gt;https://kb.netapp.com/onprem/ontap/da/NAS/ONTAP_Requirements_for_CIFS_Kerberos&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you think this will fix my problem?&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 15:06:26 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444165#M42181</guid>
      <dc:creator>vladimir_im</dc:creator>
      <dc:date>2023-05-10T15:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444166#M42182</link>
      <description>&lt;P&gt;It probably will, but it won't hurt anything to try it, unless you already have an SPN with that name in your environment.&lt;/P&gt;</description>
      <pubDate>Wed, 10 May 2023 15:19:39 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444166#M42182</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2023-05-10T15:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444373#M42227</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621"&gt;@parisi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you once again for your support!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I just want to provide update and confirm that configuring SPN this way for my case did fix my problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;C:\&amp;gt;setspn -l SVM&lt;BR /&gt;Registered ServicePrincipalNames for CN=SVM,CN=Computers,DC=NTAP,DC=local:&lt;BR /&gt;&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;/STRONG&gt;.ntap.local&lt;BR /&gt;HOST/&lt;STRONG&gt;SVM&lt;BR /&gt;HOST/SVMalias.ntap.local&lt;BR /&gt;HOST/SVMalias&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now CIFS sessions to both&amp;nbsp;&amp;nbsp;SVM and&amp;nbsp;SVMalias are using Kerberos authentication.&lt;/P&gt;&lt;P&gt;\\SVM\share - Kerberos&lt;/P&gt;&lt;P&gt;\\SVMalias\share -&amp;nbsp;Kerberos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have one more question regarding the&amp;nbsp; CIFS sessions to SVM and&amp;nbsp;SVMalias coming from different domain&amp;nbsp;&lt;STRONG&gt;ntap2.local&lt;/STRONG&gt;&amp;nbsp;is that these sessions still using NTLM authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;CIFS session from client from domain&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;ntap2.local&lt;/STRONG&gt; using NTLM authentication to&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;SVM&lt;/STRONG&gt;.ntap.local.&lt;/P&gt;&lt;P&gt;Domains&amp;nbsp;&lt;STRONG&gt;ntap.local&lt;/STRONG&gt; and&amp;nbsp;&lt;STRONG&gt;ntap2.local&lt;/STRONG&gt; are not trusted domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have some information from NetApp how this can be fixed and CIFS sessions for that case can use Kerberos authentication or this is strictly Active Directory topic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 10:21:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444373#M42227</guid>
      <dc:creator>vladimir_im</dc:creator>
      <dc:date>2023-05-17T10:21:11Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444387#M42229</link>
      <description>&lt;P&gt;A packet capture would likely tell you if it even tries Kerberos, but I suspect the issue may be that there is a missing DNS entry for the forward/reverse lookup in the domains.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you resolve the CIFS server name in DNS on both domains using nslookup?&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 14:21:28 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444387#M42229</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2023-05-17T14:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444396#M42232</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://community.netapp.com/t5/user/viewprofilepage/user-id/11621" target="_blank"&gt;@parisi&lt;/A&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes nslookup is resolving &lt;SPAN&gt;CIFS server name in&lt;/SPAN&gt; DNS from both domains.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible problem to be caused, because SPN of the SVM is valid only for&amp;nbsp;&lt;STRONG&gt;ntap.local &lt;/STRONG&gt;domain and to have working Kerberos authentication I need also valid SPN for SVM in&amp;nbsp;&lt;STRONG&gt;ntap2.local &lt;/STRONG&gt;domain.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 16:28:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444396#M42232</guid>
      <dc:creator>vladimir_im</dc:creator>
      <dc:date>2023-05-17T16:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: What authentication  method does CIFS server use for CIFS clients?</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444422#M42237</link>
      <description>&lt;P&gt;No 100% sure, but I think you can't have the same SPN added to both domains here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A packet trace would tell you more about why Kerberos might not be working in the other domain.&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 15:20:32 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/What-authentication-method-does-CIFS-server-use-for-CIFS-clients/m-p/444422#M42237</guid>
      <dc:creator>parisi</dc:creator>
      <dc:date>2023-05-18T15:20:32Z</dc:date>
    </item>
  </channel>
</rss>

