Solved

How would you demote a test bed 2000 server /AD

Posted on 2004-04-13
3
233 Views
Last Modified: 2010-04-13
Currently running to 2 networks.  One is a live network with 2000 server with Active Directory currently running 9 wrkstaions.  The second network is the same server setup used for testing installs.  How could I make the live network see the testbed server? Bascially wanting the test server to show up on the live network?  Thanks for the help - Vic
0
Comment
Question by:itsmevic
3 Comments
 
LVL 16

Accepted Solution

by:
JamesDS earned 300 total points
ID: 10820838
itsmevic

You can demote the testbed server using DCPROMO.EXE

To make it visible (I am assuming a a member of the domain)  to the live AD domain and assuming the network connectivity is present all you need to do is join it as a member server to the live domian - after which you can re-run DCPROMO and promote it to a DC in the live domain if you wish.

I'll cross post this to your other question, post responses in either place.

Cheers

JamesDS
0
 
LVL 10

Assisted Solution

by:anupnellip
anupnellip earned 100 total points
ID: 10821574
I think a better option will be to have a trust relatuon between your test server & the live server . This way you dont make any changes to your Active directory settings & the trust can be removed without affecting the AD.
check this on how to do it
http://support.microsoft.com/default.aspx?scid=kb;en-us;816301

http://support.microsoft.com/default.aspx?scid=kb;EN-US;q306733

check this if you face problem

http://support.microsoft.com/?kbid=312003
0
 
LVL 16

Assisted Solution

by:JammyPak
JammyPak earned 100 total points
ID: 10822946
you don't need trusts to see a server...you also don't need that server to be in your domain...you just need to be able to route to it using ip routing. then you can make peer-to-peer connections or whatever.
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Large Outlook files lead to various unwanted errors and corruption issues. Furthermore, large outlook files can also make Outlook take longer to start-up, search, navigate, and shut-down. So, In this article, i will discuss a method to make your Out…
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now