[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 211
  • Last Modified:

Miscommunication through CISCO routers after migration from Win NT to Win 2003

Dear Sirs,

After upgrading a domain from Win NT to Win 2003 all the client computers from the subnets are unable to log on to the domain. The clients on the same network segment as the Domain Controller have no problems. All the communication to/from the other segments passes through the following CISCO routers: 7200vxr and 2600.

TCP-IP is traffic is not affected.

Any idea what protocols and TCP/UDP ports should be allowed for proper communication and authentication?

1 Solution
Win2003 domain is 100% dependent on properly configured DNS and having the clients auto-register themselves in DNS just like they did with WINS. Clients must point to this internal DNS server as primary in order to find the server, and the SRV records must be there.

You might want to setup a WINS server at least temporarily if all of your client workstations are not up to XP..
Keith AlabasterCommented:
Has anything else changed in your setup?
By tcpip traffic, I assume that you can ping by ip address and name to the domain server(s).
Are any dhcp-set work stations on the associated subnets picking up the correct settings such as IP, mask, gateway, dns servers?
MenshenAuthor Commented:

We solved the problem thanks. DNS and WINS were always available.
We realized we had to change the MTU size on the router... I guess AD authentication in 2003 R2 is more sensitive to changes on the packets.
What kind of communications lines do you have, and what did you have to change the MTU size to ?

thanks for the update!
PAQed with points refunded (450)

Community Support Moderator

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now