IPX/SPX network issue on W2000 server

Posted on 2004-11-19
Last Modified: 2010-03-18
Im trying to set up IPX protocol on a home network of 3 PCs. One has W2Kserver the other 2 have W2Kpro.
I have installed the protocol via My network places/properties on all 3 machines, and I have defined the frame type of 802.3. I have further defined the internal and the external network numbers. All to 00000000 for the time being. I found that the 2 workstations can communicate correctly (Using dxdiag to test the connection) but the server will not. I then found after reading the MS documentation that the W2K server will not accept an all zero internal network number, so I changed it to 00000001 and the workstations, as I read that the network numbers must all be the same (although its not clear if that should be the internal network number or the external or both)
The server still does not connect with the others.  

Any ideas? I must have missed some parameter, and after reading Im still not clear where the fault lies. For W2K server to communicate with W2K pro using this protocol, an active directory setting was mentioned?

Is this a WINS issue? or NetBIOS?
Thanks in advance for any assistance

BTW..all machines communicate fine via TCP/IP and normal file and print sharing is achieved. One bog standard ethernet NIC on each machine. They are linked via a 3com router, which also gives adsl internet access. The server has DHCP and DNS forwarding activated (standard Active Directory installation I think!)

Ive put this as very difficult, because I have been trying to solve it in several other forums, so if you do a google search, most of the hits will be my posts!
Question by:dtaverner

    Author Comment

    In case you're interested, the answer was to DISable Routing and remote Access Service in Active Directory
    Works like a charm!


    Accepted Solution

    PAQed with points refunded (50)

    Community Support Moderator

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Preface There are many applications where some computing systems need have their system clocks running synchronized within a small margin and eventually need to be in sync with the global time. There are different solutions for this, i.e. the W3…
    This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
    In this sixth video of the Xpdf series, we discuss and demonstrate the PDFtoPNG utility, which converts a multi-page PDF file to separate color, grayscale, or monochrome PNG files, creating one PNG file for each page in the PDF. It does this via a c…
    Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    15 Experts available now in Live!

    Get 1:1 Help Now