Troubleshoot web service access problems
Configuration errors cause web service access problems to occur. You can address the errors by ensuring that the LIF, firewall policy, web protocol engine, web services, digital certificates, and user access authorization are all configured correctly.
The following table helps you identify and address web service configuration errors:
This access problem… | Occurs because of this configuration error… | To address the error… | ||
---|---|---|---|---|
Your web browser returns an |
Your LIF might be configured incorrectly. |
Ensure that you can ping the LIF that provides the web service.
|
||
Your firewall might be configured incorrectly. |
Ensure that a firewall policy is set up to support HTTP or HTTPS and that the policy is assigned to the LIF that provides the web service.
|
|||
Your web protocol engine might be disabled. |
Ensure that the web protocol engine is enabled so that web services are accessible.
|
|||
Your web browser returns a |
The web service might be disabled. |
Ensure that each web service that you want to allow access to is enabled individually.
|
||
The web browser fails to log in to a web service with a user's account name and password. |
The user cannot be authenticated, the access method is not correct, or the user is not authorized to access the web service. |
Ensure that the user account exists and is configured with the correct access method and authentication method. Also, ensure that the user's role is authorized to access the web service.
|
||
You connect to your web service with HTTPS, and your web browser indicates that your connection is interrupted. |
You might not have SSL enabled on the cluster or storage virtual machine (SVM) that provides the web service. |
Ensure that the cluster or SVM has SSL enabled and that the digital certificate is valid.
|
||
You connect to your web service with HTTPS, and your web browser indicates that the connection is untrusted. |
You might be using a self-signed digital certificate. |
Ensure that the digital certificate associated with the cluster or SVM is signed by a trusted CA.
|