Solved

TRUSTED AND TRUSTING RELATIONSHIP

Posted on 1997-11-03
1
353 Views
Last Modified: 2013-12-23
We have 2 server NT ver 4.0 on the LAN. The first one (named PDCA) make only autentication logon for the users of the LAN. The second one (named TRASPORTI) provides connection to internet with the proxi server 1.0. Both the server are setting in a "trusted and trusting domain relationship".
The problem is that the second server (TRASPORTI) do not permit the access to its resources from PDCA and from all workstations on LAN logged on PDCA.
Note that PDCA permit the access to its resources from TRASPORTI
So TRASPORTI can access to the resources of PDCA and of the workstations, but PDCA and the workstations cannot access to the resources of TRASPORTI.
 What's the resolution?
0
Comment
Question by:PAGURO
1 Comment
 
LVL 4

Accepted Solution

by:
vvk earned 100 total points
ID: 1567146
If you have 2 domain check equal user names in both they must have equal passwords.
If you don't have different domains you don't need install trust relationship. Simply try to remove server from domain and include again(from server you moving through network properties).
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now