Edit

Share via


Issues when AD replication and Netlogon RPCs request backlog values are exceeded

This article describes how to configure Active Directory (AD) replication and Netlogon remote procedure calls (RPCs) request backlog values in Windows Server.

You encounter one of the following issues:

  • Transmission Control Protocol (TCP) resets occur frequently, but a network trace analysis doesn't provide the root cause.
  • Microsoft Exchange servers receive 401 errors intermittently when authenticating to domain controllers.
  • Exchange servers fail to connect to domain controllers and report "The server is unavailable."
  • Microsoft Outlook repeatedly prompts for user credentials when authenticating to a domain controller.
  • You receive this error message when you sign in:

    "The trust relationship between this workstation and the primary domain failed."

You might also see the following events in Windows Server:

  • Event ID 3210

    Event Log: System
    Event Type: Error
    Event Source: Netlogon
    Event ID: 3210
    Event Text: 
    This computer could not authenticate with [file://%3cDomain]\\<Domain Controller Name>.<Domain Name>, a Windows domain controller for domain <Domain Name>, and therefore this computer might deny logon requests.
    
    This inability to authenticate might be caused by another computer on the same network using the same name or the password for this computer account is not recognized. If this message appears again, contact your system administrator.
    
  • Event ID 5719

    Event Log: System
    Event Type: Error
    Event Source: Netlogon
    Event ID: 5719
    Event Text:
    This computer was not able to set up a secure session with a domain controller in domain <Domain Name> due to the following:
    
    The remote procedure call failed and did not execute.
    
    This may lead to authentication problems. Make sure that this computer is connected to the network. If the problem persists, please contact your domain administrator.
    
  • Event ID 7

    Event Log: System
    Event Type: Error
    Event Source: Microsoft-Windows-Security-Kerberos
    Event ID: 7
    Event Text:
    The digitally signed Privilege Attribute Certificate (PAC) that contains the authorization information for client <Hostname>$ in realm <Domain Name> could not be validated.
    

Events after installing Windows preview updates June 2022

Windows Server 2019 June 23, 2022—KB5014669 (OS Build 17763.3113) Preview update and Windows Server 2022 June 23, 2022—KB5014665 (OS Build 20348.803) Preview update report the problem and adjust settings for the RPC request backlog. After installing these updates, you might receive the following events.

  • The Netlogon service starts successfully with the given RPC backlog size.

    Event Log: System
    Event Type: Info
    Event Source: Netlogon
    Event ID: 5836
    Event Text:
    The Netlogon service was able to bind to a TCP/IP port with the configured backlog size of <Configured Backlog Size>
    
  • The Netlogon service related backlog size failure.

    Event Log: System
    Event Type: Warning
    Event Source: Netlogon
    Event ID: 5837
    Event Text:
    The Netlogon service tried to bind to a TCP/IP port with the configured backlog size of <Configured RPC Backlog Size> but failed.
    
    More information can be found in the following log file '%SystemRoot%\debug\netlogon.log' and, potentially, in the log file '%SystemRoot%\debug\netlogon.bak' created if the former log becomes full. For steps in enabling the log, please visit https://go.microsoft.com/fwlink/?linkid=2163327.
    
  • Active Directory replication related backlog limit failure.

    Event Log: Active Directory Domain Services
    Event Type: Warning
    Event Source: ActiveDirectory_DomainService
    Event ID: 3042
    Event Text:
    Active Directory Domain Services could not configure the TCP port with the backlog limit as specified in registry.
    
    Additional Data
    
    TCP Port:
    
    <Configured Port>
    
    Configured backlog limit:
    
    <Backlog Limit Configured on Port>
    
    Registry backlog limit:
    
    <Backlog Limit Specified in Registry>
    
    User Action:
    
    Make sure the same TCP port is not being used by other services such as Netlogon and the Active Directory Domain Controller has been rebooted after configuring the backlog limit value in registry.
    

Backlog limit value is exceeded

The Transmission Control Protocol/Internet Protocol (TCP/IP) ports registered for AD replication and RPCs for the Netlogon service are configured with a backlog limit value. The default value is 10. This value represents the maximum number of requests that can be queued on the registered TCP/IP port. When the backlog limit value is exceeded, the TCP SYN packets are immediately reset by the RPC layer on the server. This behavior will affect authentication on the systems.

Increase RPC backlog limit value for DRSUAPI and Netlogon

Important

This section contains instructions to modify the registry. Serious problems might occur if the registry is modified incorrectly. As a precaution, back up the registry before you modify it. For more information about how to back up, restore, and modify the registry, see How to back up and restore the registry in Windows.

You can use Registry Editor to increase the RPC backlog limit values for DRSUAPI and the Netlogon service as follows:

Note

We recommend that administrators configure proper values in the registry keys. Large values on your Windows servers can cause large amounts of non-paged pool memory usage. Administrators should balance memory footprint versus scalability requirements.

  • Registry key for DRSUAPI

    Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NTDS\Parameters
    Registry value: TCP/IP Backlog Limit
    Value type: REG_DWORD
    Value data: Any value between 10 and 100

    Restart the system for the setting to take effect.

  • Registry key for Netlogon

    Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters
    Registry value: DcTcpipBacklogLimit
    Value type: REG_DWORD
    Value data: Any value between 10 and 100

    Restart the Netlogon service for the setting to take effect. You may also need to restart the domain controller.