Announcements

News about the SCC offer: Service News
Report malfunction: via ITB or the SCC ticketing system.
 In case of failure of this website: scc.fail
Stand: 19.09.2025 04:12:59

Incidents

 2025-08-11 20:00

Performance Issues Firewall Stufe-2 and Extranet


DescriptionPerformance issues have been observed since the firewall software upgrade on August 11, 2025.

Individual connections require too many resources, which disadvantages other users.
These users experience higher latencies, which can lead to slow websites, file transfers, etc.

We are currently trying to avoid downgrading to the old software version, as the manufacturer's support will expire soon.
We are working with the manufacturer to find a solution.
Affected usersUsers of Firewall Stufe 2 (Area D) und Extranet (Area B)
Exists since2025-08-11 20:00
 2025-09-12 08:30 - 2025-09-12 10:00

Problem sending emails via smarthost.kit.edu - FIXED


DescriptionToday, September 12, 2025, from 8:30 a.m. to 10:00 a.m., a misconfiguration caused a malfunction on the mail system “smarthost.kit.edu.”
As a result, the sending of emails via this system was rejected with a temporary error.
This error has been fixed since 10 a.m.

We apologize for this malfunction.
Affected usersAll users sending emails via smarthost.kit.edu.
Existed since2025-09-12 08:30
Fixed since2025-09-12 10:00

Maintenance

  2025-06-24 10:00 - 2025-09-30 10:00

KIT-AD: Migration of DC to Windows Server 2025 - Note the switch-off of old DC in 09.2025!


The domain controllers of the Active Directory at KIT (KIT-AD) will be successively converted to Windows Server 2025. The migration will take place gradually and is expected to be completed by the end of September 2025:

1. Installation of additional domain controllers (kit-dc-24.kit.edu, kit-dc-25.kit.edu, kit-dc-26.kit.edu und kit-dc-27.kit.edu)

2. Switching the BigIP F5 (kit-ad.scc.kit.edu) to new DCs

3. Switching off the old domain controllers (kit-dc-20.kit.edu, kit-dc-21.kit.edu, kit-dc-22.kit.edu, kit-dc-23.kit.edu)



P L A N N I N G
_ _ _ _ _ _ _ _ _ _
Step 1:
Monday, 24.06.2025, 10:00-13:00
Starting up new domain controllers
_ _ _ _ _ _ _ _ _ _

DESCRIPTION
Initially, three new domain controllers will be put into operation:

IMPACT
No interruptions to the ongoing operation of the KIT-AD are expected.
No changes or adjustments by service providers or users are required.

_ _ _ _ _ _ _ _ _ _
Step 2:
Monday, 01.07.2025, 10:00-13:00
Switching the BigIP F5 (kit-ad.scc.kit.edu) to new DCs
_ _ _ _ _ _ _ _ _ _

DESCRIPTION
The new domain controllers are addressed for LDAP access to kit-ad.scc.kit.edu.

IMPACT
No interruptions to the ongoing operation of the KIT-AD are expected.
No changes or adjustments by service providers or users are required.

_ _ _ _ _ _ _ _ _ _
Step 3:
Monday, 30.09.2025, 10:00-13:00
Switching off old domain controllers
_ _ _ _ _ _ _ _ _ _

DESCRIPTION
The domain controllers kit-dc-20, kit-dc-21, kit-dc-22 and kit-dc-23 are no longer in operation.

IMPACT
If you address one of these DCs directly by name, you must adapt your configuration!

NOTE
To use the KIT-AD via LDAP, we recommend the dedicated LDAP access, see https://www.scc.kit.edu/dienste/9224.php.
Stand: 19.09.2025 04:12:59

Announcements

 2025-01-07 11:14

Note: Misbehavior between Windows 11 Update 22H2 in conjunction with specific network switch type


UPDATE, 07.01.25
In 2024, some components could be replaced, but there are still components in use where the malfunction could occur.
_ _ _

A misbehavior has been detected between a network switch type used at KIT South Campus and a Windows 11 update (version 22H2). Due to this misbehavior, the network port on the switch is automatically switched off.
As a result, the network connection or network access for the connected device is no longer available.
To enable network access, the data socket used must be communicated to the IT representative / IT admin of the OU so that he can apply for enabling via the SCC network team.

WORKAROUND
To prevent the network port from being switched off, the LLDP service can be disabled under Windows. This can be done manually (computer-specific) under "Network adapter properties". Furthermore, the SCC provides the group policy "SCC-FMC-LLDP_disable", which can be linked to the computer accounts and automatically disables LLDP under Windows. Unlocking of already blocked ports can be requested from the network team via the IT representative/IT admin of the OU.

AFFECTED
Windows 11 Nutzer mit Updatestand 22H2 (und voraussichtlich höher) in Verbindung mit spezifischem Netzwerk-Switchtyp

TECHNICAL DETAILS
As of Windows 11 update level 22H2, sending Link Layer Discovery Protocol (LLDP for short) packets on a specific type of switching causes a network loop detection service to trigger on the switch, automatically blocking the network port.

(translated with DeepL.com)