Solved

Access Denied Error connecting to second host in NLB Manager

Posted on 2014-12-13
4
820 Views
Last Modified: 2015-01-05
Access Denied error while connecting to second node NLB manager in the First Node. The second node is working with out any trouble  and connecting to two nodes from NLB Manager.

Checked Firewall, UAC controll, IP configuration, Default gateway everything is fine.

Please help to find out a solution for this.

Thank you.
0
Comment
Question by:Maricel Lepana
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 37

Expert Comment

by:Mahesh
ID: 40499786
Is this machines are part of workgroup or domain?

If its part of workgroup, then ensure that you will keep admin user/password same on both nodes.

Also if this is unicast NLB, ensure that you have 2nd adapter installed on both nodes, otherwise the behavior is expected
Because in Unicast original MAC Addess is overlapped by virtual one, hence you need 2nd NIC to connectivity between NLB nodes
0
 

Author Comment

by:Maricel Lepana
ID: 40504590
Thank you for your comment,

The server is a part of Domain, and have two NIC cards.
0
 

Accepted Solution

by:
Maricel Lepana earned 0 total points
ID: 40526431
Issue resolved by following resolution step,

Give the Local Administrator Group on Second Host Remote Launch and Remote Activation permissions in dcomcnfg.

On Second Host  Open Elevated Command Prompt  Then type “dcomcnfg”  Expand Component Services  Click on Computers  Right-click My Computer  Properties Under COM Security  click "Edit Limits" for both sections.  Give remote access, remote launch, and remote activation for Local Administrator Group.

Thank you.
0
 

Author Closing Comment

by:Maricel Lepana
ID: 40531160
Issue resolved
0

Featured Post

Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

749 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question