Solved

2 Network cards in the same machine/trust relationships

Posted on 1997-10-15
3
349 Views
Last Modified: 2013-12-23
I have an OS/2 Server.  Our network is laid out with an OS/2-based token-ring segment and an NT 4.0(SP3)-based Ethernet segment.  I am trying to get a token-ring card and an Ethernet card running in this machine.  I have the token-ring card set up (so far) as Adapter 1, and the Ethernet card as Adapter 0.  However, only one card will function--that card being the Ethernet card.  Any ideas?

That failing--is there a way to set up a trust relationship between the OS/2 domain and the NT domain?  If so, how is it done?
0
Comment
Question by:godmom
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Accepted Solution

by:
sbufton earned 150 total points
ID: 1558554
Have you checked whether there is an IRQ
or I/O address conflict between the cards?

How have you determined that only one card
is working? Are you sure that you have the
required protocols bound to both cards?

As far as I am aware, there is no way to
set up a trust relationship between OS/2
and NT domains. You could try putting one
of the computers in the other's domain as
either a backup domain controller or
additional server, in which case the user
definitions should be taken from the
domain controller - but I have never tried
this, so it may not work.
0
 

Author Comment

by:godmom
ID: 1558555
I'd made sure there was no conflict in the I/O port or IRQ settings, and I checked the protocols.  It seems to work okay now, but of course there's still the problem with the trust relationship.  I think it's something in Microsoft's code: "When encountering OS/2 = barf".
0
 

Expert Comment

by:CTROSE
ID: 10371245
NT must be at sp 6a to work with OS/2
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Cisco Edge Routers for BGP 6 95
Personal Secured Home Networking 2 48
Ping general failure windows 7 5 82
Datacenter Upgrade - Design Question 5 25
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question