You are most welcome.  I have fallen down that same rabbit hole before and know 
how frustrating it is to eliminate every known variable but still have no clear 
cause.  The true thanks go to this wonderful technical community.  Without the 
open discourse on Technet ,MSDN, MyITForum,  Petri, and my personal favorite, 
this list, our jobs for the last decade or so would have been much harder.  So, 
thank you all!  Glad to return some back to the collective!

From: [email protected] [mailto:[email protected]] On 
Behalf Of Michael B. Smith
Sent: Thursday, February 06, 2014 8:51 AM
To: [email protected]
Subject: RE: [NTSysADM] RE: windows advanced firewall

Well, I express my appreciation again. Without your input I never would've gone 
down that path. Thanks!

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Woody Blackman
Sent: Thursday, February 6, 2014 10:42 AM
To: '[email protected]'
Subject: RE: [NTSysADM] RE: windows advanced firewall

"One is glad to be of service"

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Andrew S. Baker
Sent: Thursday, February 06, 2014 7:04 AM
To: ntsysadm
Subject: Re: [NTSysADM] RE: windows advanced firewall

Awesome!
Thanks for that info, Woody.






ASB
http://XeeMe.com/AndrewBaker<http://xeeme.com/AndrewBaker>
Providing Virtual CIO Services (IT Operations & Information Security) for the 
SMB market...




On Wed, Feb 5, 2014 at 5:14 PM, Michael B. Smith 
<[email protected]<mailto:[email protected]>> wrote:
And the winner is.... Thanks!

That was ridiculously complicated (but probably because I had never used those 
tools before).

Windows Server has decided that DS1 is doing a port scan on DS2 (which it 
isn't, but I know why it thinks that). And DS2 is using the "Port Scanning 
Prevention Filter" to drop RPC and UDP packets from DS1.

This is an inbuilt rule. In the over-arching wisdom of the Windows architects, 
they know best and there is not any supported way to disable this filter.

Nonetheless, there are unsupported ways to make this change and I will give 
them a go.

From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Woody Blackman
Sent: Wednesday, February 5, 2014 3:46 PM

To: '[email protected]<mailto:[email protected]>'
Subject: [NTSysADM] RE: windows advanced firewall

The below approach has been hit or miss for me in trying to debug Windows 
Firewall weirdness:

If you are getting "Filtering Platform Packet Drop" Event 5152

Could be something from Stealth Mode is blocking and not logging

http://social.technet.microsoft.com/Forums/windowsserver/en-US/b627fbdf-e51b-4671-911e-3308271e3a0e/windows-adv-firewall-drops-allowed-traffic-to-closed-ports?forum=winserversecurity


You can try running at an elevated command prompt "Netsh.exe WFP Capture Start"

Reproduce the event

Execute "NetSh.exe WFP Capture Stop"

In the output, there will be a section for NetEvents which indicate whether the 
drop was due to a filter or the stack.  stack drops can occur because no 
endpoint is listening, invalid headers, etc.

You can use "NetSh.exe WFP Show State" to show you the list of filters on the 
machine.   In the event, you should see the filterId for the filter that caused 
the drop.

http://social.msdn.microsoft.com/Forums/en-US/f623bffb-4ff1-496b-9dc4-65136bc6e88b/loads-of-filtering-platform-packet-drop-event-5152-with-firewall-configured-to-allow-all?forum=wfp


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Michael B. Smith
Sent: Wednesday, February 05, 2014 10:00 AM
To: [email protected]<mailto:[email protected]>
Subject: [NTSysADM] windows advanced firewall

I'm stumped.

Server 2008 R2. All current patches.

We have DS1 and DS2. I built these servers a couple of years ago using my 
handy-dandy deployment scripts. They are identical. They are physical. They 
have exactly the same firewall rules (and yes, I have compared those rules from 
a rules dump). They are on the same subnet. They have this subnet in their 
Scope --> Allowed Remote IP Addresses. They are both DCs and GCs. They point to 
themselves as primary DNS and each other as alternate DNS. They are both 
running Endpoint Protection 2012 R2 using the standard DC template provided by 
MSFT.  They plug into the same switch.

DS2 dumps all AD-related RPC and DNS traffic from DS1.

I turned on firewall logging on DS2. The firewall even says it's dropping the 
packets. For example:

2014-02-05 11:18:15 DROP TCP 10.0.59.36 10.0.59.37 54897 389 40 FA 1470786861 
397644096 253 - - - RECEIVE
2014-02-05 11:39:13 DROP UDP 10.0.59.36 10.0.59.37 53 58716 123 - - - - - - - 
RECEIVE

(DS1 is 10.0.59.36, DS2 is 10.0.59.37)

But rules say that traffic should be allowed.

So I created another rule on DS2 that allows ALL traffic from DS1 to DS2. NO 
change. DS2 dumps all RPC and DNS traffic from DS1.

So AD replication initiated on DS1 toward DS2 doesn't work. DS2 has to initiate 
replication.

DNS requests from DS1 to DS2 don't work. Etc. There are a variety of problems.

Some RPC related things do work (on DS1, I can "tasklist /s ds2", I can open 
the ds2 services console, the ds2 event console, etc.).

What have I missed? What next to check?

Thanks for any assistance...


Reply via email to