Worklog: 2026-03-02
Incident
Symptom: SSH to chlxsbg (Ubuntu) hung for ~45 seconds before login succeeded.
Environment:
-
Endpoint:
chlxsbg(10.238.179.128) -
Switch: SRT-9_9300, Gi1/0/36
-
Auth: MAB →
DACL_Research_Onboard_V2 -
Domain: LA.AD.CHLA.ORG
Root Cause Analysis
Initial Finding: TCP 53 Missing
First dACL (DACL_Research_Onboard) only had UDP 53 for DNS. Added TCP 53 - improved but still delayed.
Final Finding: Global Catalog Port 3268 Missing
Packet capture revealed SYN packets to port 3268 (Global Catalog) with no response:
10.238.179.128.51914 > 10.100.11.32.3268: Flags [S]
10.238.179.128.46110 > 10.100.11.27.3268: Flags [S]
SSSD queries Global Catalog for AD user attribute lookups. Without 3268, these SYN packets timed out → SSH delay.
Fix Applied
Added to dACL for ALL domain controllers:
permit tcp any host <dc-ip> eq 3268
DCs requiring update:
-
10.112.118.141
-
10.112.118.143
-
10.100.11.27
-
10.100.11.28
-
10.100.11.32 (was completely missing)
Validation
After dACL update and CoA:
-
SSH login: Immediate (no delay)
-
Researcher able to authenticate with AD credentials
Lessons Learned
-
TCP 53 is not enough - Global Catalog (3268) is required for SSSD AD user lookups
-
Discover ALL DCs before creating dACLs - AD clients use site-aware DC selection
-
tcpdump is the source of truth - showed exactly which ports were being blocked
-
dACL deny statements with
logare invaluable - but tcpdump on endpoint is faster for diagnosis
Documentation Updates Required
-
enterprise-linux-8021x: Add port 3268 to SSH troubleshooting runbook dACL table -
domus-ise-linux: Already has port 3268 documented in linux-ad-auth-dacl.adoc
Commands Used
sudo tcpdump -i any -n 'host 10.238.179.128' -c 100
MAC="B4-E9-B8-F6-C8-17"
netapi ise mnt coa "$MAC"
show access-sess interface GigabitEthernet1/0/36 d
show access-l xACSACLx-IP-DACL_Research_Onboard_V2-*