Solved

Authenticating OS2 systems to windows 2003 domain

Posted on 2004-09-21
1
348 Views
Last Modified: 2010-04-19
Hi,

I have a windows 2003 domain. A new project requires that the client systems should have OS2 operating installed on them. I would like to know how will these OS2 systems authenticate to my windows 2003 domain.

0
Comment
Question by:pereira_allwyn
1 Comment
 
LVL 6

Accepted Solution

by:
Casca1 earned 125 total points
ID: 12119293
You will have to enable certain elements of the GPO to allow the server to talk that way. I for one, however, if at possible, recommend against using OS/2, based on the fact that the protocols needed to support it on a network are not installed by default. There is NetBIOS over TCP, but you will have to ensure you have TCP stack support on the OS/2, the protocols used are inherently insecure, and the OS, to the best of my knowledge, is no longer under active development.
For that reason alone, since there is no official support options, you should advise against it. On the other hand, you may have no choice.
Create a completely different sub-net for the OS/2 machines, unless that's unfeasible, as well; You really want to keep these machines off your regular network, as they wil be chatty as magpies. Installing WINS will help, and with a little routing wizardry, you can browse across the various networks, in a more or less secure manner; As long as the OS/2 is seperated from the internet, and your servers handle NAT, and preferably some packet filtering and inspection, should keep your risk to a manageable level.
A note of caution. That's a manageable level, if you have the equipment and services in place. Other wise, you are opening helpless systems to the net that are easily compromisable becuase of the exploits on the stack. Are there any current vulnerabilities  that the OS has? Can you risk it?
One machine, with an (Unintentionally) exposed vulnerability can end up with an SMTP server sending spam, and getting your IP blacklisted in the process. THAT is a headache you do not want.
So while you may have no choice but to support these machines, you must take active steps to protect the systems and your network.
Good Luck!
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Scenerio: You have a server running Server 2003 and have applied a retail pack of Terminal Server Licenses.  You want to change servers or your server has crashed and you need to reapply the Terminal Server Licenses. When you enter the 16-digit lic…
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This Micro Tutorial will teach you how to censor certain areas of your screen. The example in this video will show a little boy's face being blurred. This will be demonstrated using Adobe Premiere Pro CS6.
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question