Solved

Kerberos UDP to TCP reg switch?

Posted on 2008-10-17
2
914 Views
Last Modified: 2008-11-23
I have a Domain Controller in another country that is connected to our Forest through a VPN Tunnel.

According to the Net guys their is lots of fragmentation due to going through multiple switches, TAC's exc.
I was told to change the Kerberos from UDP to TCP in the registry of our Domain Controllers

I understand basic concepts of UDP and TCP however, I don't know what unforseen issues Kerberos will have through the switch.

Can someone send me a link explaining the best practice for this change or at least a good site explaining how TCP/Kerberos works?
0
Comment
Question by:snyderkv
2 Comments
 

Author Comment

by:snyderkv
ID: 22747443
A more important question is if we do end up needing this will I have to enable it via a GPolicy template on DC's only or all member servers? What if a DC does not have it will it still communicate?
0
 
LVL 38

Accepted Solution

by:
ChiefIT earned 500 total points
ID: 22756166
Well, what do you think of this article?
http://support.microsoft.com/kb/244474
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Learn about cloud computing and its benefits for small business owners.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question