DPC:DD SSO 连接因连接或套接字超时而失败
Summary: 本文介绍如何解决 DD 与 Data Protection Central (DPC) 之间用于 SSO 注册的连接问题。
This article applies to
This article does not apply to
This article is not tied to any specific product.
Not all product versions are identified in this article.
Symptoms
将 Data Protection Central (DPC) 注册到 Data Domain (DD) 单点登录 (SSO) 时,出现连接或套接字超时错误。
这些问题通常是 DPC 和 DD 服务器之间的网络连接问题。
这些问题通常是 DPC 和 DD 服务器之间的网络连接问题。
Cause
这可能是由各种网络连接问题引起的。
Resolution
检查 DPC 与 DD 之间的基本网络连接:
使用以下命令检查是否启用了从 DPC 到 DD 的出站端口 3009:
- 使用 SSH 以管理员身份登录到 DPC CLI,然后
su -以 root 用户身份登录,然后运行以下命令: - 取代
<DD_FQDN_OR_IP>替换为 DD 服务器的 FQDN 和<SYSADMIN_PASSWORD>替换为 sysadmin 密码。
curl -k -X POST https://<DD_FQDN_OR_IP>:3009/rest/v1.0/auth -H "Content-Type: application/json" -d '{"username":"sysadmin","password":"<SYSADMIN_PASSWORD>"}'
如果此连接正常工作并且端口 3009 可以访问,则会收到如下所示的输出:
{"details": "success", "code": 0, "link": [{"rel": "related", "href": "/rest/v1.0/system"}]}
如果返回的“details”未显示“success”,则这是网络连接问题,需要打开网络开机自检。
检查是否启用了从 DD 到 DPC 的出站端口 443。要执行此作,请以用户 sysadmin 身份使用 SSH 登录 DD CLI。然后,进入 SE 模式:
system show serialno #To get the serialno of the system, which will be used to enter SE mode
#When prompting for security officer authorization, enter SO username&password.
#When prompting for system password, enter system serialno.
提醒:SE 命令在 DDOS 版本 7.7.5.25、7.10.1.15、7.13.0.15、6.2.1.110 及更高版本中已弃用,并且只能由戴尔员工访问。
然后运行以下命令,将 DD FQDN> 替换为 < DPC 服务器的 FQDN:
se telnet <DPC FQDN> 443
如果连接正常,您会看到一行”Connected to <DPC FQDN>.“
如果 elg.log 显示握手错误运行以下命令以检查密码。
openssl s_client -tls1_2 -connect <DD_HOSTNAME>:3009 -cipher ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:AES256-GCM-SHA384:AES256-SHA256:AES128-SHA256:AES128-SHA:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-SHA256 2>/dev/null >dd_communication.txt
取代 <DD_HOSTNAME> 在上述命令中使用 DD 服务器的 FQDN。
检查“dd_communication.txt”文件,它应类似于以下输出。
CONNECTED(00000003)
---
Certificate chain
0 s:/C=US/ST=CA/OU=Host Certificate/O=Valued DataDomain customer/CN=<DD_HOSTNAME>
i:/C=US/ST=CA/L=Santa Clara/O=Valued Datadomain Customer/OU=Root CA/CN=<DD_HOSTNAME>
1 s:/C=US/ST=CA/L=Santa Clara/O=Valued Datadomain Customer/OU=Root CA/CN=<DD_HOSTNAME>
i:/C=US/ST=CA/L=Santa Clara/O=Valued Datadomain Customer/OU=Root CA/CN=<DD_HOSTNAME>
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=/C=US/ST=CA/OU=Host Certificate/O=Valued DataDomain customer/CN=<DD_HOSTNAME>
issuer=/C=US/ST=CA/L=Santa Clara/O=Valued Datadomain Customer/OU=Root CA/CN=<DD_HOSTNAME>
---
No client certificate CA names sent
Client Certificate Types: RSA sign, DSA sign, ECDSA sign
Requested Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1
Shared Requested Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA 1
---
SSL handshake has read 2247 bytes and written 479 bytes
---
New, TLSv1/SSLv3, Cipher is AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
Protocol : TLSv1.2
Cipher : AES256-GCM-SHA384
Session-ID:
Session-ID-ctx:
Master-Key: 60D098B90CD2B06A410F64A70B4FC6285D42C4FBBE568FEF37D56AD9B414E39D2EA408B8ED120B0BDF4DF21F347E0211
Key-Arg : None
PSK identity: None
PSK identity hint: None
SRP username: None
Start Time: 1689168122
Timeout : 7200 (sec)
Verify return code: 19 (self signed certificate in certificate chain)
---
如果“Shared Requested Signature Algorithms”行为空,则这是密码问题,我们必须与 DD 团队联系,以添加 DPC 使用的密码才能正常工作。
检查 短信。信息 日志位于 /ddr/var/log/debug 目录中的目录。
如果 SMS.信息 日志显示“无法获取 SSO 端点”,跟随 Data Domain 拒绝与 Data Protection Central 的单点登录连接,必须从 Data Domain 检查此问题 ,以解决此问题。
如有其他问题,请联系戴尔支持。
Affected Products
Data Protection CentralProducts
Data DomainArticle Properties
Article Number: 000215743
Article Type: Solution
Last Modified: 31 Mar 2025
Version: 4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.