On Windows 2008R2, here are the steps. This needs done on each DC I
believe.

As administrator in CMD on a DC:

ntdsutil
ldap policies
connections
connect to server DCNAME
q
set MaxConnIdleTime to TIMEVALUE (we used 3600 seconds)
commit changes
q
q

Hope that helps!

-Kyle

On Tue, Dec 11, 2012 at 9:10 AM, Matthew M. DeLoera <[email protected]>wrote:

> AD has an inactivity/idle default timeout of 900 seconds. I suspect you
> can google to find the setting name, and where it's stored, in your AD
> server(s).
>
> Hope that helps.
>
> - Matthew
>
>
> On Dec 10, 2012, at 8:35 PM, Bryce Powell wrote:
>
> Having done some more research, it appears that Active Directory also has
> some settings that could result in disconnected connections. I experimented
> with idle-timeout set to 30 seconds for the LDAP databases, but this seemed
> to exacerbate the frequency of the errors. The behaviour exhibits as ‘dead’
> connections, and LDAP does not appear to attempt to re-establish these
> connections. Using the CentOS distro of OpenLDAP 2.4.23
>
> Here are the slapd.conf settings:
>
> database                ldap
> readonly                on
> suffix                  "dc=xyz,dc=local"
> #noundeffilter           yes
> #use-temporary-conn      yes
> uri                     "ldap://IP1/ ldap://IP2/ ldap://3/ ldap://IPn/";
>
>
> database                ldap
> readonly                on
> suffix                  "dc=abc,dc=adroot,dc=abc,dc=bc,dc=ca"
> #noundeffilter           yes
> #use-temporary-conn      yes
> uri                     "ldap://IP11/ ldap://IP12/ ldap://13/ ldap://IP1n/
> "
>
>
> I have some rewrite rules for bindDN, searchEntryDN, searchAttrDN,
> matchedDN, but I don’t believe these settings are relevant to the issue at
> hand.
>
> Essentially I want the connections to be re-established without generating
> errors.
>
> Thanks
> ____________________________________________
>
>

Reply via email to