Solved

Windows 2000 Pro in peer-to-peer network will only communicate with two windows 98 computers with specific IP addresses.

Posted on 2004-08-22
3
543 Views
Last Modified: 2010-03-18
I have a peer-to-peer network with Windows 2000 pro and two windows 98SE computers using static IP addresses. When I add a third win98 to the network, it can see the other two Win98 computers but not the W2K. If I change the IP address to the one used by one of the two existing computers it can connect just fine. These two machines use the address 192.168.1.11 and 192.168.1.13.  I have tried several addresses including 192.168.1.12 and 10 and 14 and others. Pinging the W2K from a computer with any address but one of these two gets a "Request Timed out" reply.

I can only guess that there must be something in a policy or something. Other people have "mucked" around in the system and I understand last year they had trouble with a virus. I don't see anything virus related now and Norton does not report any.

Anybody have an idea of what might be going on?
0
Comment
Question by:billconrad
  • 2
3 Comments
 
LVL 12

Accepted Solution

by:
PCableGuy earned 125 total points
ID: 11867003
If the 2K Pro box has a firewall (Notron Internet Security), the symptoms you describe will occur. If it is Norton's firewall, temporarily disable it and try pinging again.

If that works, you might have to add the new IP address to Norton's trusted zone. Norton has a wizard to do this.
0
 

Author Comment

by:billconrad
ID: 11937796
You get the points !!

Sorry it took so long to get back to this, but I got so busy I did not have time to even look at this problem again until today.

I ended up turning off the "Personal Firewall" altogether as just adding the IP address did not seem to make any difference.

Thanks.

Bill
0
 
LVL 12

Expert Comment

by:PCableGuy
ID: 11948134
thnx Bill, glad to hear it's working.....

cheers
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Greetings, Experts! First let me state that this website is top notch. I thoroughly enjoy the community that is shared here; those seeking help and those willing to sacrifice their time to help. It is fantastic. I am writing this article at th…
This article is in response to a question (http://www.experts-exchange.com/Networking/Network_Management/Network_Analysis/Q_28230497.html) here at Experts Exchange. The Original Poster (OP) requires a utility that will accept a list of IP addresses …
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now