menreeq
asked on
User does not have rsop data at remote location?
We are running into a problem with a remote location that we are joining to a domain that is connected via a Sonicwall VPN. We have another site connected that does not have this issue. When adding to the domain we noticed that it took a very long time and logging in also takes a long time. It seems as though computer GPO is applying fine but user gpo is not. DNS is configured correctly but when running rsop we get 'Invalid Namespace' and when running GPResult we get user does not have RSOP data (this is for any user). When trying to browse to the \\domainname.local we get a username/password prompt. This is happening for all workstations at this site, yet the other site yields perfect RSOP and Gpresult.
These computers were previously part of another domain. Any help would be greatly appreciated. Thanks.
These computers were previously part of another domain. Any help would be greatly appreciated. Thanks.
ASKER
It took a while but Ive identified what is going on. Its a pretty complex issue:
Problem 1: The Sonicwall VPN is fragmenting the Kerberos UDP packets so the workstation is not able to authenticate successfully with the DC
FIX: Force Kerberos to only use TCP. This is a simple registry change on the workstation: http://support.microsoft.com/kb/244474
Problem 2: Workstations use ICMP (ping) packets to check if a DC is alive before it start communicating w/ it. With the initial ping it also includes a bit more data to test the quality of the connection. This places the size of the ICMP packet over a threshold and makes the Sonicwall think that it is a ping of death resulting in the packet being dropped.
FIX: One registry change that is applied to the HKLM and one that is applied to the HKCU the problem is that this last one has to be applied for every user and that user has to be a local admin while the registry change is applied definitely doable because we already have everyones credentials but not ideal.
https://www.experts-exchange.com/questions/21304901/Windows-cannot-obtain-the-domain-controller-name-for-your-computer-network-return-value-59.html
Problem 1: The Sonicwall VPN is fragmenting the Kerberos UDP packets so the workstation is not able to authenticate successfully with the DC
FIX: Force Kerberos to only use TCP. This is a simple registry change on the workstation: http://support.microsoft.com/kb/244474
Problem 2: Workstations use ICMP (ping) packets to check if a DC is alive before it start communicating w/ it. With the initial ping it also includes a bit more data to test the quality of the connection. This places the size of the ICMP packet over a threshold and makes the Sonicwall think that it is a ping of death resulting in the packet being dropped.
FIX: One registry change that is applied to the HKLM and one that is applied to the HKCU the problem is that this last one has to be applied for every user and that user has to be a local admin while the registry change is applied definitely doable because we already have everyones credentials but not ideal.
https://www.experts-exchange.com/questions/21304901/Windows-cannot-obtain-the-domain-controller-name-for-your-computer-network-return-value-59.html
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Glad to hear you were able to "resolve" menreeq, and thank you for posting your findings.
Cheers !
--Rob
Cheers !
--Rob
http://www.lan-2-wan.com/Added%20Images/Blog/DNS.jpg