[image: Inline image 1]

- WJR
šŸ™ˆšŸ™‰šŸ™Š


On Wed, Feb 5, 2014 at 5:16 PM, Jonathan Link <[email protected]>wrote:

> Someone has to be plucky comic relief.
>
>
> On Wed, Feb 5, 2014 at 5:48 PM, Michael B. Smith <[email protected]>wrote:
>
>>  Funny guy. :P
>>
>>
>>
>> *From:* [email protected] [mailto:
>> [email protected]] *On Behalf Of *Crawford, Scott
>> *Sent:* Wednesday, February 5, 2014 3:29 PM
>>
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: windows advanced firewall
>>
>>
>>
>> Prolly best to start at the beginning. Is the network cable plugged in? ;)
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Michael B. Smith
>> *Sent:* Wednesday, February 5, 2014 2:17 PM
>>
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: windows advanced firewall
>>
>>
>>
>> Oh…. Not a bad idea. I checked. None present.
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Crawford, Scott
>> *Sent:* Wednesday, February 5, 2014 3:04 PM
>>
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: windows advanced firewall
>>
>>
>>
>> Nah, just brainstorming. Thought maybe an IPSec rule could be blocking it.
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Michael B. Smith
>> *Sent:* Wednesday, February 5, 2014 1:53 PM
>>
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: windows advanced firewall
>>
>>
>>
>> You are suggesting setting up an IPSec connection between the two
>> servers? While that may be a possible solution, it’s a cop-out. J This
>> works everywhere else in the world. J
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Crawford, Scott
>> *Sent:* Wednesday, February 5, 2014 2:42 PM
>>
>> *To:* [email protected]
>> *Subject:* [NTSysADM] RE: windows advanced firewall
>>
>>
>>
>> IPSec?
>>
>>
>>
>> http://technet.microsoft.com/en-us/library/cc730656.aspx
>>
>>
>>
>>
>>
>> *From:* [email protected] [
>> mailto:[email protected] <[email protected]>] *On
>> Behalf Of *Michael B. Smith
>> *Sent:* Wednesday, February 5, 2014 12:00 PM
>> *To:* [email protected]
>>
>> *Subject:* [NTSysADM] windows advanced firewall
>>
>>
>>
>> I’m stumped.
>>
>>
>>
>> Server 2008 R2. All current patches.
>>
>>
>>
>> We have DS1 and DS2. I built these servers a couple of years ago using my
>> handy-dandy deployment scripts. They are identical. They are physical. They
>> have exactly the same firewall rules (and yes, I have compared those rules
>> from a rules dump). They are on the same subnet. They have this subnet in
>> their Scope Ć  Allowed Remote IP Addresses. They are both DCs and GCs.
>> They point to themselves as primary DNS and each other as alternate DNS.
>> They are both running Endpoint Protection 2012 R2 using the standard DC
>> template provided by MSFT.  They plug into the same switch.
>>
>>
>>
>> DS2 dumps all AD-related RPC and DNS traffic from DS1.
>>
>>
>>
>> I turned on firewall logging on DS2. The firewall even says it’s dropping
>> the packets. For example:
>>
>>
>>
>> 2014-02-05 11:18:15 DROP TCP 10.0.59.36 10.0.59.37 54897 389 40 FA
>> 1470786861 397644096 253 - - - RECEIVE
>>
>> 2014-02-05 11:39:13 DROP UDP 10.0.59.36 10.0.59.37 53 58716 123 - - - - -
>> - - RECEIVE
>>
>>
>>
>> (DS1 is 10.0.59.36, DS2 is 10.0.59.37)
>>
>>
>>
>> But rules say that traffic should be allowed.
>>
>>
>>
>> So I created another rule on DS2 that allows ALL traffic from DS1 to DS2.
>> NO change. DS2 dumps all RPC and DNS traffic from DS1.
>>
>>
>>
>> So AD replication initiated on DS1 toward DS2 doesn’t work. DS2 has to
>> initiate replication.
>>
>>
>>
>> DNS requests from DS1 to DS2 don’t work. Etc. There are a variety of
>> problems.
>>
>>
>>
>> Some RPC related things do work (on DS1, I can ā€œtasklist /s ds2ā€, I can
>> open the ds2 services console, the ds2 event console, etc.).
>>
>>
>>
>> What have I missed? What next to check?
>>
>>
>>
>> Thanks for any assistance…
>>
>
>

Reply via email to