Attempt to disable connection security failed

Microsoft.Windows.2008.R2.Cluster.Attempt.to.disable.connection.security.failed (Rule)

Knowledge Base article:

Summary

Each node in a failover cluster requires network connectivity with the other nodes. Problems with a network adapter or other network device (either physical problems or configuration problems) can interfere with connectivity.

Event Details

Event ID:

1583

Source:

Microsoft-Windows-FailoverClustering

Symbolic Name:

CLUSSVC_NETFT_DISABLE_CONNECTIONSECURITY_FAILED

Message: Cluster service failed to disable Internet Protocol security (IPsec) on the Failover cluster virtual adapter '%1'. This could have a negative impact on cluster communication performance. If this problem persists, please verify your local and domain connection security policies applying to IPSec and the Windows Firewall. Additionally, please check for events related to the Base Filtering Engine service.

Resolutions

Check policies related to IPSec and Windows Firewall with Advanced Security

Local and domain security policies can prevent the Cluster service from disabling IPSec on a network adapter used by a failover cluster. If IPSec cannot be disabled, the performance of the cluster can be negatively impacted. Review the policies, or work with a network administrator to review the policies related to IPSec and Windows Firewall with Advanced Security. Also confirm that the Base Filtering Engine service (which manages firewall and IPSec policies) is started on the node. For more information, see "Opening Services and viewing or restarting the Base Filtering Engine service."

If you do not currently have Event Viewer open, see "Opening Event Viewer and viewing events related to failover clustering or the firewall."

Opening Services and viewing or restarting the Base Filtering Engine service

To open Services and view or restart the Base Filtering Engine service:

Opening Event Viewer and viewing events related to failover clustering or the firewall

To open Event Viewer and view events related to failover clustering or the firewall:

Verify

Restart the Cluster service, confirm that the nodes come up successfully and that the clustered networks are functioning.

To perform the following procedure, you must be a member of the local Administrators group on each clustered server, and the account you use must be a domain account, or you must have been delegated the equivalent authority.

To restart the Cluster service on a node and confirm the status of the nodes and networks:

Element properties:

TargetMicrosoft.Windows.2008.R2.Cluster.Monitoring.Service
CategoryAlert
EnabledTrue
Alert GenerateTrue
Alert SeverityWarning
Alert PriorityNormal
RemotableTrue
Alert Message
Attempt to disable connection security failed
{0}

Member Modules:

ID Module Type TypeId RunAs 
DS DataSource Microsoft.Windows.2008.Cluster.EventProvider Default
WA WriteAction Microsoft.Windows.Cluster.GenerateAlertAction.SuppressedByDescription Default

Source Code:

<Rule ID="Microsoft.Windows.2008.R2.Cluster.Attempt.to.disable.connection.security.failed" Enabled="true" Target="Clus2008Library!Microsoft.Windows.2008.R2.Cluster.Monitoring.Service" ConfirmDelivery="true" Remotable="true" Priority="Normal" DiscardLevel="100">
<Category>Alert</Category>
<DataSources>
<DataSource ID="DS" TypeID="Microsoft.Windows.2008.Cluster.EventProvider">
<Criteria>
<SimpleExpression>
<ValueExpression>
<XPathQuery>EventDisplayNumber</XPathQuery>
</ValueExpression>
<Operator>Equal</Operator>
<ValueExpression>
<Value>1583</Value>
</ValueExpression>
</SimpleExpression>
</Criteria>
<LogName>System</LogName>
<PublisherName>Microsoft-Windows-FailoverClustering</PublisherName>
</DataSource>
</DataSources>
<WriteActions>
<WriteAction ID="WA" TypeID="ClusLibrary!Microsoft.Windows.Cluster.GenerateAlertAction.SuppressedByDescription">
<Priority>1</Priority>
<Severity>1</Severity>
<AlertMessageId>$MPElement[Name="Microsoft.Windows.2008.R2.Cluster.Attempt.to.disable.connection.security.failed.AlertMessage"]$</AlertMessageId>
</WriteAction>
</WriteActions>
</Rule>