Oh.... Not a bad idea. I checked. None present. From: [email protected] [mailto:[email protected]] On Behalf Of Crawford, Scott Sent: Wednesday, February 5, 2014 3:04 PM To: [email protected] Subject: [NTSysADM] RE: windows advanced firewall
Nah, just brainstorming. Thought maybe an IPSec rule could be blocking it. From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Wednesday, February 5, 2014 1:53 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: windows advanced firewall You are suggesting setting up an IPSec connection between the two servers? While that may be a possible solution, it's a cop-out. :) This works everywhere else in the world. :) From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Crawford, Scott Sent: Wednesday, February 5, 2014 2:42 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] RE: windows advanced firewall IPSec? http://technet.microsoft.com/en-us/library/cc730656.aspx From: [email protected]<mailto:[email protected]> [mailto:[email protected]] On Behalf Of Michael B. Smith Sent: Wednesday, February 5, 2014 12:00 PM To: [email protected]<mailto:[email protected]> Subject: [NTSysADM] windows advanced firewall I'm stumped. Server 2008 R2. All current patches. We have DS1 and DS2. I built these servers a couple of years ago using my handy-dandy deployment scripts. They are identical. They are physical. They have exactly the same firewall rules (and yes, I have compared those rules from a rules dump). They are on the same subnet. They have this subnet in their Scope --> Allowed Remote IP Addresses. They are both DCs and GCs. They point to themselves as primary DNS and each other as alternate DNS. They are both running Endpoint Protection 2012 R2 using the standard DC template provided by MSFT. They plug into the same switch. DS2 dumps all AD-related RPC and DNS traffic from DS1. I turned on firewall logging on DS2. The firewall even says it's dropping the packets. For example: 2014-02-05 11:18:15 DROP TCP 10.0.59.36 10.0.59.37 54897 389 40 FA 1470786861 397644096 253 - - - RECEIVE 2014-02-05 11:39:13 DROP UDP 10.0.59.36 10.0.59.37 53 58716 123 - - - - - - - RECEIVE (DS1 is 10.0.59.36, DS2 is 10.0.59.37) But rules say that traffic should be allowed. So I created another rule on DS2 that allows ALL traffic from DS1 to DS2. NO change. DS2 dumps all RPC and DNS traffic from DS1. So AD replication initiated on DS1 toward DS2 doesn't work. DS2 has to initiate replication. DNS requests from DS1 to DS2 don't work. Etc. There are a variety of problems. Some RPC related things do work (on DS1, I can "tasklist /s ds2", I can open the ds2 services console, the ds2 event console, etc.). What have I missed? What next to check? Thanks for any assistance...

