Solved

Widnows DCs Firewalled

Posted on 2004-09-18
2
278 Views
Last Modified: 2010-04-19
Hey All,

   I have a secure subnet (behind a firewall) in my network and both my DCs are in the outside portion.   We're having trouble authenticating shares (you might not have permission to access this network share), and I'm sure there will be other issues with AD....   The network setup is this:

Internet
  |
Firewall
192.168.1.xxx
  |
AD Controllers & some XP Clients 192.168.1.x
  |
192.168.1.xxx
Inside Firewall running RHEL 3 & iptables firewall\
192.168.210.x
  |
some XP Clients & some windows servers 192.168.210.x

   How can I use windows services without access to the DCs & my AD?
0
Comment
Question by:smithware
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 51

Accepted Solution

by:
Netman66 earned 500 total points
ID: 12093775
Place one DC inside the second firewall.  Create rules through the second firewall so that the other DC can connect to it point-to-point.

You'll need to understand what ports should be opened between these servers.

Here is a start at determining what is used:  http://support.microsoft.com/default.aspx?scid=kb;en-us;832017&Product=winsvr2003

The idea is to use the inside server to connect to and mount shares from the .1.xxx subnet as volumes in empty NTFS folders.  This will allow internal clients to only map to their local server for resources.

How to mount: http://support.microsoft.com/default.aspx?scid=kb;en-us;323424&Product=winsvr2003

0
 

Author Comment

by:smithware
ID: 12108198
Although I accepted this answer, it should be noted that the answer to the question was actually create an lmhosts file on the clients to point to the domain controllre.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A quick step-by-step overview of installing and configuring Carbonite Server Backup.
Learn about cloud computing and its benefits for small business owners.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question