Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Create forest- connect two networks

Posted on 2004-05-01
6
Medium Priority
?
191 Views
Last Modified: 2011-04-14
I have two TCP/IP networks: A & B.
Each has one DC and AD with their own domain a.com & b.com running W2K server.
One of the DC's has two nics with routing setup connecting the two networks.

How do I have users in network A use resources in network B? (there are Win98's and XP's)
How do I creat a forest out of these two networks?  Is this necesary?

Thanks
0
Comment
Question by:josh1111012098
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
6 Comments
 
LVL 7

Expert Comment

by:rhrowson
ID: 10968430
The advantage of a forest is you can manage them more easily. Do you need to this? Depends? Do you need to maintain seperate domain names for business purposes. AD does not have a  40000 object limit on its size.

My question would be can I consolidate the 2 domains to one?

I believe that you ned to run DCpromo on one of the DC's in the secondary network, but I will run up a test lab and confirm this.

0
 

Author Comment

by:josh1111012098
ID: 10970394
I need two separate domains, so I don't want to consolidate them into one.
How do you create a forest?
Let me know about the lab test.
Thanks
0
 
LVL 7

Accepted Solution

by:
rhrowson earned 1000 total points
ID: 10970634
The only way I have found is using DC Promo from a member server. On a DC this is a destructive change. Hopefully someone else may have an alternative method
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Instead of error trapping or hard-coding for non-updateable fields when using QODBC, let VBA automatically disable them when forms open. This way, users can view but not change the data. Part 1 explained how to use schema tables to do this. Part 2 h…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Suggested Courses

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question