No domain server was able to validate your password.

Posted on 2006-03-27
Last Modified: 2010-03-18
Hi Experts,

We currently have 4 Windows 2000 Servers
1 2k AD Server
1 NT App Server
3 2k App Servers
2 Switches 100  / 1gb

On Friday, I enabled the secondary NIC card within each server.  I did this so that the backup process can run on a f 1gb switch.  The secondary NIC card of each server was configured and plugged in on a seperate switch.

On Saturday, I received calls from end users who are using Windows 95 that they are receiving:
No domain server was able to validate your password.." when trying to log in via Windows 95 workstation.

Assuming that I may have done something wrong on Friday, I disabled the secondary NIC of the AD Server this moring.  Now the users appear that they can log in again.

I had no calls relating to Windows XP workstations.  Can anyone offer assistance on why Windows 95 workstations have this issue?  I think having the secondary NIC card enabled caused my problems.  Did I not setup the secondary NIC card correctly.  

Primary Network

Secondary Network

Thanks for any assistance you can offer.
Question by:byd2k
    LVL 26

    Accepted Solution

    My first guess would be because 95 doesnt use DNS for name uses netbios/WINS. So when you enabled the second nic it registered that nic with WINS for the name the other nic was using. Try enabing the second nic but disabling netbios on it.

    Perhaps it is time to upgrade your 95 machines. Not only because it is 10 years old...but because MS doesn't support it anymore and you can't get security fixes.

    Author Comment

    Hi Jar,

    I hope to have all thw workstations upgraded by next month.  It's been a battle with these older wolrkstations...

    Thanks for the advice.  I'll give this a try and let you know what happens.


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    A brief overview to explain gateways, default gateways and static routes OR NO - you CANNOT have two default gateways on the same server, PC or other Windows-based network device. In simple terms a gateway is formed when a computer such as a serv…
    Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
    This video is in connection to the article "The case of a missing mobile phone (". It will help one to understand clearly the steps to track a lost android phone.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    12 Experts available now in Live!

    Get 1:1 Help Now