Windows 2003 Share acting weird

Posted on 2011-03-07
Last Modified: 2012-05-11
We have a server using Teamed NICs' that has a strange problem.  When opening a file share from a client computer and then drilling down to a folder, you can watch the file share back out, one folder at a time until you get a message that the server is no longer available.  The funny thing is, if you wait a second, you can get right back in.  

I've tried removing the Teamed adapters and using a single NIC, I've tried reloading the latest drivers for the NIC's and turned off things such as flow control and TCP offloading.  I cannot make this go away.  Even more peculiar is that I have another server with the exact configuration that does not exhibit these problems.

HELP...  I have no more hair to pull out!
Question by:Frank McCourry
  • 4

Expert Comment

ID: 35061133
does it happen on all client machines or just one?
does it happen locally on the console?
LVL 10

Expert Comment

ID: 35061141
let's start from basics , have you noticed any errors in log files?

Assisted Solution

by:Frank McCourry
Frank McCourry earned 0 total points
ID: 35061239
Not a single one.
New My Cloud Pro Series - organize everything!

With space to keep virtually everything, the My Cloud Pro Series offers your team the network storage to edit, save and share production files from anywhere with an internet connection. Compatible with both Mac and PC, you're able to protect your content regardless of OS.


Assisted Solution

by:Frank McCourry
Frank McCourry earned 0 total points
ID: 35061534
Just unloaded Anti-virus and no change...

Accepted Solution

Frank McCourry earned 0 total points
ID: 35061985
Problem resolved.  I found a setting in the advanced properties of the Intel Proset called Interuption Moderation rate.  After setting this to "off" on both NIC's the problem went away.  Network access to this server is a little slower now, but stable.

Author Closing Comment

by:Frank McCourry
ID: 35115391
I'm accepting my own solution because I found the problem through trial and error.  This question had not been posted more than an hour when the problem was resolved.  Thanks to all that took the time to respond.

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Restoring deleted objects in Active Directory has been a standard feature in Active Directory for many years, yet some admins may not know what is available.
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now