Event ID 1863 is logging  help???

Posted on 2007-03-28
Medium Priority
Last Modified: 2008-05-30
I am getting Event ID 1863 on two 2003 servers in same domain.  Server A is in location A.  Server B is in location B.  The VPN that connected these two was down for about one month.  Now the VPN is back up and I can't get them to sync.  Any suggestions?
Question by:bhgewilson
  • 2
LVL 13

Expert Comment

ID: 18813607
check in dssite.msc if the site link and connection object between A and B are still there. You can also delete the connection objects from both sides, then re-run KCC to discover the topology. (right click on dc, all tasks, check knowledge...something)

if KCC runs fine, everything should be back shortly
otherwise, post back the error message of KCC.
LVL 13

Accepted Solution

strongline earned 2000 total points
ID: 18813611
actually before you do above, you can try "repadmin /syncall" all both DCs, hopefully, if all connection objects still there and all needed ports are open, this should bring them in sync.

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

The Windows Firewall provides an important layer of protection and a rich interface to configure it. Unfortunately, it lacks item level filtering. This article details my process of implementing firewall-as-code to reduce GPO bloat.
One thing I've always found frustrating is no matter how many times one asks the end users to not save things on their local machines, they do it anyway.  Forget that we don't back up the desktops - only the servers.  Well, let's sneak their data on…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question