Solved

A duplicate name has been detected on the TCP network.  The IP address of the computer that sent the message is in the data. Use nbtstat -n in a command window to see which name is in the Conflict sta

Posted on 2016-07-18
4
131 Views
Last Modified: 2016-07-25
Dear All,
All our network drives are this particular server its a virtual server with seven VM on it! however we lost connection & this is the message that we found in the windows log events? Its windows server r2 2008
thank you for your help
Mark
0
Comment
Question by:MarK PercY
  • 2
  • 2
4 Comments
 
LVL 21

Expert Comment

by:CompProbSolv
ID: 41717495
Have you identified the IP address in the Event data and then checked it with nbstat -n?  That will identify the name that is duplicated.

Once you've found that, you'll have to identify what is using that name.

Did you image any computers or copy any VMs without changing their names?
0
 

Author Comment

by:MarK PercY
ID: 41718963
Hi CompProbSolv,

Thank you for your response & yes we did notice two machines with two identical pc names why would this happen?
Many thank again
0
 
LVL 21

Accepted Solution

by:
CompProbSolv earned 500 total points
ID: 41719583
How were the computers named originally?
What sort of names did they have?  Were they fairly random names or did they make sense?  Do they follow a similar naming scheme as your other computers?

Were the two computers VMs or physical machines?
0
 

Author Closing Comment

by:MarK PercY
ID: 41727117
Correct answer to my question
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Trying to figure out group policy inheritance and which settings apply where can be a chore.  Here's a very simple summary I've written which might help.  Keep in mind, this is just a high-level conceptual overview where I try to avoid getting bogge…
Why should I virtualize?  It’s a question that’s asked often enough.  My response is usually “Why SHOULDN’T you virtualize?”
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question