Solved

Trying to swap drives of Domain controller after crash - now get duplicate name exists

Posted on 2006-11-06
4
137 Views
Last Modified: 2010-04-13
I have a DC that crashed and I have an identical PowerEdge server that I can use so I moved drives to the new chasis and boot the box.  Boots fine but can't re enter the network, I get duplicate name exists.  (It has been about a week since this DC crashed and AD running on one DC, scary....)

I can't rename the DC so how do I get it back in domain and synching with other DC?  
0
Comment
Question by:Trigon
4 Comments
 
LVL 9

Expert Comment

by:robjeeves
Comment Utility
G'day mate

First thing I'd do is make an image of the DC that isn't broken.  I like imageforWindows.  It's supported on the server platform and will make a hot image of your DC while its running.

http://www.terabyteunlimited.com/imagew.html

You can get a 30 day trial. that will help you sleep at night until you get the other DC up and running. You can of course (and should) perform your System state backups with the C Drive but restoring this isn't as easy as reimaging should it fail.

Anyway, back to your problem. It is strange that a duplicate name exists . . . With the DC with the swapped drives turned off what happends when you ping the name of the Server (the name that is apparently a duplicate)  Does it reply or timeout?

Rob
0
 

Author Comment

by:Trigon
Comment Utility
Sorry, I have been buried.  I figured this out, it was simple when I just slowed down and looked at it.  The Poweredge I moved it to had a slightly different NIC (We had upgraded the other NIC to GB)so when I moved the drives the NIC got the IP through DHCP and not its assigned IP. I just had to assign the IP to the NIC and all started humming along.  AD was holding the name for the other NIC
0
 
LVL 1

Accepted Solution

by:
Computer101 earned 0 total points
Comment Utility
PAQed with points refunded (500)

Computer101
EE Admin
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
HOW TO: Upload an ISO image to a VMware datastore for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5) using the vSphere Host Client, and checking its MD5 checksum signature is correct.  It's a good idea to compare checksums, because many installat…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now