Solved

Peer to Peer with W2K and XP 64

Posted on 2006-06-21
6
185 Views
Last Modified: 2010-03-18
I have tried multiple configurations, Workgroup and TCP/IP and cannot get this to work.  I read the questions/answers on here but still I cannot get either workstation to recognize the other.  I am running Norton Firewall on the W2K system and the native firewall on the XP side and I've tried disabling both and still does not work.  Could this be 32B v 64B issue?

Thanks
0
Comment
Question by:eegpt
  • 2
6 Comments
 
LVL 48

Accepted Solution

by:
Jay_Jay70 earned 250 total points
ID: 16955757
nuh 32 and 64 can coexist just fine, lets look at the basics first.

disable any firewalls, uninstall norton as it hangs around

lets get the machines pinging first

assign them static addresses within the same range and see if they can talk
0
 

Author Comment

by:eegpt
ID: 16955846
Actually the culprit was Norton (I wish I could get rid of this firewall), I disabled the firewall and then was able to establish peer-to-peer communication.  I then went into Norton Firewall under networks and configured the IP on the other system in my network and it worked fine with the firewall running.  Thanks for your help!
0
 
LVL 48

Expert Comment

by:Jay_Jay70
ID: 16956111
would have put my house on it that it was norton! dirty software! lol!
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Along with being a a promotional video for my three-day Annielytics Dashboard Seminor, this Micro Tutorial is an intro to Google Analytics API data.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question