Starting with Hitachi NAS code version 13.9.6918.02, HNAS Engineering introduced a new feature called smb-auto-barring, along with some other SMB barring commands (which are used for manual SMB client barring):
smb-barred-client-add
smb-barred-client-remove
smb-barred-client-clear
smb-barred-client-list
SMB Client Barring
SMB Auto-Barring
You should expect NTLM usage under the following circumstances:
No initial configuration of the feature is required.
Managing the barred clients' list is done using the following commands; check the man pages for more details on each command.
smb-barred-client-add (add a client to the SMB barred client list)
smb-barred-client-remove (remove a client from the SMB barred client list)
smb-barred-clients-list (display the SMB barred clients list)
smb-barred-clients-clear (clear the SMB barred client list)
A workaround (where SMB Barring does not apply) is for a client to use Kerberos. It will communicate directly to the DC(s) for authentication, not through the HNAS.
Use the following commands to view the current setting values
4080:$ for-each-evs set-smb-auto-barring-mean-interval-threshold-in-seconds
EVS 1 (4080-EVS01):
smb-auto-barring-mean-interval-threshold-in-seconds = '0x2'(2)
EVS 2 (4080-EVS02):
smb-auto-barring-mean-interval-threshold-in-seconds = '0x2'(2)
EVS 3 (4080-EVS03):
smb-auto-barring-mean-interval-threshold-in-seconds = '0x2'(2)
EVS 4 (4080-EVS04):
smb-auto-barring-mean-interval-threshold-in-seconds = '0x2'(2)
4080:$ for-each-evs set-smb-auto-barring-sample-size
EVS 1 (4080-EVS01):
smb-auto-barring-sample-size = '0x15'(21)
EVS 2 (4080-EVS02):
smb-auto-barring-sample-size = '0x15'(21)
EVS 3 (4080-EVS03):
smb-auto-barring-sample-size = '0x15'(21)
EVS 4 (4080-EVS04):
Before disabling auto-barring, the customer may choose to tune the command parameters.
• set-smb-auto-barring-mean-interval-threshold-in-seconds - This commands sets the SMB
client auto-barring mean interval threshold - a given client attempting connections with an
incorrect password more frequently than this will be barred.
Default value: 2 (seconds)
Configurable range: 1 to 120 seconds in 1 second intervals
• set-smb-auto-barring-sample-size - This command sets the SMB client auto- barring
sample size - i.e., the number of instances a client can fail to connect with an
incorrect password before being evaluated against the above interval for banning.
Default value: 21
Configurable range 21 to 512
How do these parameters affect auto-barring?
At the default values, if a client IP address attempts to connect with an incorrect password 21 times it will then be considered a candidate for auto-barring. If the mean rate that it is attempting to login in is faster than once per 2 second interval it will be added to the barred clients list.
Varying set-smb-auto-barring-sample-size allows you to change how many bad connection attempts can be made before a client is considered for auto-barring. For example,
$ set-smb-auto-barring-sample-size 42
would allow 42 connection attempts before the client was considered for auto-barring.
Varying set-smb-auto-barring-mean-interval-threshold-in-seconds allows you to change the frequency at which a client can attempt to connect before being barred. For example,
$ set-smb-auto-barring-mean-interval-threshold-in-seconds 4
would not add a client to the barred list unless it was attempting to connect more frequently than once every 4 seconds (on average).
The default values were carefully selected to avoid clients being auto-barred unnecessarily. If you choose to vary them, it is suggested starting with small adjustments and observing the results. Setting too large a threshold or sample size can reduce the auto-barring feature's effectiveness.
This procedure allows disabling SMB auto-barring on the Hitachi NAS platforms.
Use the following procedure to enable SMB Barring on an Individual EVS Context if Multi-Tenancy is enabled.
<evs-security list for admin vnode>
EVS id Per EVS security status
------ ------'----------'-----
1 global
2 global
3 global
4 global
5 global
6 global
8 global
10 ' global
11 global
12 global
13 individual <---Global disable will not turn off this 'individual' EVS Security Context
15 global
In a Citrix environment and Multi-Tenancy is Enabled, instead of disabling auto-barring for the entire environment, the EVS(s) serving the Citrix Servers could be placed into Individual Security Groups and then use the above command to disable auto-barring only the EVS(s) that is serving data to the Citrix Servers.
The process would be, from a high level:
The two sections below, one manual and one automated, help to identify which client IP address is repeatedly using the wrong login credentials, thus invoking the "smb-auto-barring" feature OR in the case where smb-auto-barring is disabled may cause the EVS to be denied access to the DC.
This client/user, if not barred, can cause a performance impact on the HNAS and a denial of access to the DC(s). This behavior can impact all users on a particular node, not just the client using an incorrect password or user name. It takes many failed attempts before the NAS gets temporarily barred from the DC(s), and that exact number is unknown.
Available servers:
==================
1) 10.0.2.210 HNASDEMO
Please choose a server, or type 'q' to exit to a bash Shell.
There are several words and phrases to key on when grepping the dblog and paced-event-logger - here are a few more common ones:
$failed_login=@('NT_STATUS_WRONG_PASSWORD','NT_STATUS_PASSWORD_EXPIRED','NT_STATUS_ACCOUNT_LOCKED_OUT','NT_STATUS_NO_SUCH_USER')
try{$failed_login.foreach({"Checking files for $_"})
Get-Content *current_dblog* | Out-String -Stream | Select-String -Pattern $failed_login -SimpleMatch
}catch{$_.Exception.Message
}finally {"End of program"
}
Release_Notes (13.9.6918.02)
Hitachi_NAS_Platform_13.9.6918.02_Release_Notes
For more, visit the Hitachi Vantara Product Documentation Portal.
Attachment: 7374_20240807162421_240417000248988.ps1
Tags: hnas,SMB,Domain Controller,automatic,Citrix,NTLM,auto-barring,smb-auto-barring,Barred,SMB client,Banned,Blacklist,DC
PageID: 156251