PowerScale: How to disable/enable SMB encryption along with other information in SMB2/SMB3 versions

Summary: PowerScale OneFS supports SMB3 since OneFS 7.1.1, which is an expansion of the SMB2 dialect. SMB3 is by default enabled and is supported since Windows 8/Windows Server 2012. Server Message Block (SMB) Clients negotiate the SMB dialect to use in the SMB connection with SMB Server (PowerScale). The highest dialect supported by both sides is selected and used, unless the customer is using Windows 7 or earlier. The likelihood is that they are already using SMB3 given that this has become the standard for Windows clients ever since Windows 8. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

We can run the command below from a node, and it shows what version of the SMB protocol the clients are using. This is while they are connected to that node.

# isi smb sessions list --verbose --format=table

How to Enable SMB3 encryption in a cluster:


By default, SMB3 encryption is disabled. To enable SMB3 encryption, and permit both encrypted and unencrypted clients access to the server:

1. Go to Protocols > Windows Sharing (SMB) > Server Settings.
2. In the Encryption section, under Enable encryption on encryption-capable SMB clients, select Use Custom.
3. Check Enable encryption on encryption-capable SMB clients.

Both encrypted and unencrypted clients are allowed access.

There are no settings in PowerScale OneFS to allow only an SMB3 clients and deny SMB2 client connections. However, with 'Reject Unencrypted Access' SMB2 does not connect as explained below.
As we can see the below example, by default the 'Reject Unencrypted Access' is enabled. This means that if there is any unencrypted traffic seen (ONLY when SMB3 encryption is enabled) it rejects both the SMB2 and SMB1 traffic.

Command to check SMB settings globally:

# isi smb settings global view
    Access Based Share Enum: No
  Dot Snap Accessible Child: No
   Dot Snap Accessible Root: Yes
     Dot Snap Visible Child: No
      Dot Snap Visible Root: Yes
Enable Security Signatures: No
                 Guest User: nobody
                 Ignore Eas: No
       OneFS CPU Multiplier: 4
          OneFS Num Workers: 0
  Reject Unencrypted Access: Yes <<<<<<<<<<<<<<
Require Security Signatures: No
           Server Side Copy: Yes
              Server String: PowerScale Server
       Support Multichannel: Yes
            Support NetBIOS: No
               Support SMB2: Yes
    Support Smb3 Encryption: No   <<<<<<<<<<<<<


Since SMB3 Encryption is disabled by default, the option ' Reject Unencrypted Access: Yes ' is not effective. Once the SMB3 encryption is enabled, that is effective.
The detailed explanation on encryption is available in the 'PowerScale Design and Considerations for SMB' document as attached. 

If administrators want to avoid SMB2 connections being rejected when SMB3 encryption is enabled, they can modify the attribute 'Reject Unencrypted Access' to "no" (disabled). This allows SMB2 connections while SMB3 connections are encrypted as per the settings. This setting can also be set globally or at a specific zone level or for a particular share.

If we "require" encryption by setting (globally or on an access zone) both settings to ' Yes ' like below:

Support Smb3 Encryption: Yes
  Reject Unencrypted Access: Yes


The share setting ' Smb3 Encryption Enabled ' is implicitly set to ' Yes ', that is encryption is enabled on all shares, regardless of that share-level setting. In short, "if we require encryption, we also implicitly enable it."

It is recommended that this be tested on a designated test share prior to implementing it globally or at a specific zone level.

Additional Information

Affected Products

Isilon, PowerScale OneFS
Article Properties
Article Number: 000206558
Article Type: How To
Last Modified: 07 Jul 2025
Version:  6
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.