Solved

AD auth & Wireshark

Posted on 2010-11-18
8
978 Views
Last Modified: 2012-05-10
Hi

My domain is kamuk.com and is AD 2008. I have a Windows 2008 server that runs ApplicationA... to log onto it, it's supposed to carry out a query against AD so that I can use my AD username and password.

This doesn't seem to be working. I would like to check whether ApplicationA is even querying AD.

I guess the best way to do this would be to run Wireshark whilst attempting to log on? We have several DC's in our site, so I can't filter by all their IP addresses, so I think destination port would be easiest. Should I check for either 386 or 3268?

If so, which one is used for authentication?

Any help appreciated
0
Comment
Question by:kam_uk
  • 4
  • 4
8 Comments
 
LVL 57

Accepted Solution

by:
Mike Kline earned 500 total points
ID: 34169917
You can install it on the application server and filter for ports 389 (LDAP) and 3268 (GC) to look for lookups against a DC.  You can also filter on the DC IP address

ip.dst==192.168.0.0/16 (just an example) or ip.dst==ipaddresshere

Thanks

Mike
0
 
LVL 3

Author Comment

by:kam_uk
ID: 34171952
Thanks Mike.

So if there is no traffic to port 389/3268, then there is no AD lookup taking place?

And which particular port does it use (or does it use both) for authentication for an application?
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 34173270
Authentication uses kerberos, (port 88).  Yeah so no ports 389 and 3268s at all from the server?
0
 
LVL 3

Author Comment

by:kam_uk
ID: 34173332
Hi

Nope, nothing on 389 or 3268..I guess a prob with the app then?

Out of interest -

1. Should I also be checking for port 88 (which isn't there anyway)?

2. Should it be port 389 OR 3268, or port 386 AND 3268? I mean, does the app use both or one of them?

3. If one of the two ports, then what defines which?

Thanks again!
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 57

Expert Comment

by:Mike Kline
ID: 34173414
389 is just the LDAP lookup where 3268 will search the GC.  It depends on the application, odd you ar not seeing any traffic on any ports.
0
 
LVL 3

Author Comment

by:kam_uk
ID: 34173680
Thanks again, I'm still a little confused on whether the app would use 389 or 3268 to be honest. All the app needs to do is verify someone's AD credentials to allow them access to the app.....in a multidomain forest...so would it use both, or just one?

I think there's a problem with the app where it's not querying AD for whatever reason?
0
 
LVL 3

Author Comment

by:kam_uk
ID: 34347017
Any idea, Mike?
0
 
LVL 57

Expert Comment

by:Mike Kline
ID: 34351617
Not sure, I would have expected the app to use one of the ports (LDAP or the GC).  What does the capture show.

Thanks

Mike

0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A procedure for exporting installed hotfix details of remote computers using powershell
A safe way to clean winsxs folder from your windows server 2008 R2 editions
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will walk an individual through the steps necessary to configure their installation of BackupExec 2012 to use network shared disk space. Verify that the path to the shared storage is valid and that data can be written to that location:…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now