Solved

event id 5719 rpc server unavailable

Posted on 2011-02-11
1
1,398 Views
Last Modified: 2012-05-11
I have a client who is experiencing network issue.  One of the WinXP machines takes a very long time to scan to a desktop shortcut and the error's I see are:

event id 5719 rpc server unavailable

Also, there are also other network related issues...for example:

One of the machines drops a network connection at or around 3pm every other day.

0
Comment
Question by:vulture714
1 Comment
 
LVL 38

Accepted Solution

by:
ChiefIT earned 500 total points
ID: 34893607
First off, Check windows firewall. Older versions block RPC ports 135..

Then, if you are seeing intermittent connectivity on your network access ports, (NOT YOUR TRUNK PORTS), enable portfast...

Spanning tree algorithm is a protocol that goes out the switch using a BDU message to determine if you have Layer 2 loops. If enabled on a computer access port on the switch, with XP or newer the spanning tree hold down timers will time out the connection and you will see intermittent network connecivity.

Most network engineers will tell you this is NOT the problem. I disagree. Spanning Tree blocks for 20 seconds, listens for 15 seconds and learns for another 15 seconds to determine if you have L2 loops. Then, if everything is good, it’s placed in a forwarding state. PORTFAST, goes right to the forwarding state of the packet.

During the previous 50 seconds, an XP machine or newer will time out the network connection. This means many things like DHCP discovery, Windows logins, etc. may not work for workstation devices.

Your network engineer should log onto the switches and consider portfast on all ACCESS PORTS. However, ALL TRUNK ports should be left using spanning tree protocol. The reason for trunks to have spanning tree is to prevent loops in the network and causing BROADCAST FLOODS, (hence knocking down your network)...

A great article on this is right here: (obviously, this network engineer has seen the hold timers of spanning tree knocking down client access ports. He's one of the few.)...

http://tcpmag.com/qanda/article.asp?EditorialsID=277

0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
Email signature management is something that is often overlooked in many organizations or is simply not implemented effectively. Let's take a look at what methods are available for managing this important piece of corporate branding.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now