Monitor unlimited number of servers
Filter log events
Create email and web-based reports

Direct access to Microsoft articles
Customized keywords for major search engines
Access to premium content

Error code 930

Error code
The authentication server did not respond to authentication requests in a timely fashion.


This error appears when the authentication server, namely the Routing and Remote Access Services (RRAS) server fails to respond to the requests that the client made to the server. The failure in response can be caused among other things by network connectivity issues and incorrect RRAS server configuration. The first things to check is whether the RRAS server is online and that it can be reached from the computer that receives the error. Other things to check out include:

- Verify whether the computer account that RRAS is using has permissions to write to the Active Directory directory service record.
- Verify whether the default path to the Routing and Remote Access log file is valid.
- Verify whether the Routing and Remote Access server has been set up as a Remote Authentication Dial-In User Service (RADIUS) client in the IAS Microsoft Management Console (MMC).
- Make sure that you registered the RRAS server in Active Directory using an account that has domain administrator permissions.

Troubleshooting information about this error can be found in M227747, M299684, and M826899.


Keywords: error code 930 and Network: Google - Bing - Microsoft - Yahoo

Keywords: The authentication server did not respond to authentication requests in a timely fashion.: Google - Bing - Microsoft - Yahoo

If you have additional details about this error code, please send it to us

Windows Event Log Analysis Splunk App

Build a great reporting interface using Splunk, one of the leaders in the Security Information and Event Management (SIEM) field, linking the collected Windows events to



Cisco ASA Log Analyzer Splunk App

Obtain enhanced visibility into Cisco ASA firewall logs using the free Firegen for Cisco ASA Splunk App. Take advantage of dashboards built to optimize the threat analysis process.