Solved

adding a computer name from another domain at an aqcuired company

Posted on 2006-06-21
2
269 Views
Last Modified: 2010-03-19
Long story short.  We bought a company that has their own domain with Active Directory.  We have setup a computer in order for the other company's sites to login to our HR server to log their time for payroll.  Now, I need to add a computer on their domain into our DNS records so that we can talk to it.  

We don't have any DNS zones setup to them either.  I need to get this done ASAP and I'm running on fumes as it is. Please HELP!?!?!?!!!!!

example. our IP range is 10.2.x.x   theirs is: 192.168.30.x
0
Comment
Question by:cknoderer
2 Comments
 
LVL 13

Expert Comment

by:marine7275
Comment Utility
You can add a second nic into a machine, you can add another route in a switch/router, you can remote into the machine with pcanywhere or use RDP, you can migrate your machines onto the same network and create seperate ous for locations.

Anything sound like it may work for you?
0
 
LVL 44

Accepted Solution

by:
scrathcyboy earned 500 total points
Comment Utility
" Now, I need to add a computer on their domain into our DNS records so that we can talk to it. "

Simply give that computer a fixed IP address and enter it (and the IP of the AD server) into the AD records of your own system, and force a detect in AD -- and give it some time to update.  If theirs is 2003 and yours is 2000, you will find 2000 has trouble finding the 2003 AD, but not the other way around.  You also need to set the scope of both routers (assuming you have them, or the servers, if not) to take in the other subnet.  Perhaps a switch would be best, unless this is all remote connects.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This tutorial will walk an individual through the steps necessary to join and promote the first Windows Server 2012 domain controller into an Active Directory environment running on Windows Server 2008. Determine the location of the FSMO roles by lo…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now