Solved

Minimum ports required for NETDOM to move workstations

Posted on 2013-05-15
3
1,374 Views
Last Modified: 2013-05-16
Hello all-
I'm working in a very restrictive environment where I am to move workstations from one domain to another. Some important facts:
1. No migration tools can be used. Just a simple NETDOM script that will move the systems can be allowed
2. No trusts will be allowed. I am trying to get them to allow a 1-way (target forest will trust source) but that's a "maybe"
3. Source forest is 2008R2, target is Server 2012
4. Workstations are Win7 with just a few XP
5. Source and target environments will be separated by a firewall

So let's assume no trusts will be allowed. I'll use NETDOM in a script to move workstations from source to target that will contain the appropriate credentials in my script for both source and target forests. I'm thinking the ports that must be open between both environments are:
53 - DNS
135 - RPC Endpoint
389 - LDAP
445 - SMB
Obviously, DNS resolution between source and target must be in place. Am I missing anything here?
As always, thanks for the help.
Eric
0
Comment
Question by:Cymbaline65
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 26

Expert Comment

by:Tony Johncock
ID: 39170767
I'd suggest NetBIOS too.

There's a 'kind of list' here:

http://technet.microsoft.com/en-us/library/cc756944(v=WS.10).aspx

Not the most helpful, but I'd suggest you want the joining external domain ports.
0
 

Author Comment

by:Cymbaline65
ID: 39171485
Thanks for the response.
So include ports 137 and 139 too?
0
 
LVL 26

Accepted Solution

by:
Tony Johncock earned 350 total points
ID: 39171500
Yeah I would do.
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are many software programs on offer that will claim to magically speed up your computer. The best advice I can give you is to avoid them like the plague, because they will often cause far more problems than they solve. Try some of these "do it…
This article helps those who get the 0xc004d307 error when trying to rearm (reset the license) Office 2013 in a Virtual Desktop Infrastructure (VDI) and/or those trying to prep the master image for Microsoft Key Management (KMS) activation. (i.e.- C…
This video Micro Tutorial explains how to clone a hard drive using a commercial software product for Windows systems called Casper from Future Systems Solutions (FSS). Cloning makes an exact, complete copy of one hard disk drive (HDD) onto another d…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question