Thanks, well, yeah it's kinda weird. I had a fully working DA setup, single nic behind firewall with kerberos proxy. Then I changed IP:s on my internal servers, including the DC. Everything internally was working but DA wouldn't connect. Checked the remote
server and I had forgotten to change the DNS entry on the DA-servers nic, changed to the new IP, updated the config and everything is fine and dandy on the server side (everything is green in the dashboard and operation status).
Connected the client to the LAN to update the GPO to get the new dnsaddress, can't connect to the DC. I check "netsh dns show state" which says I'm "Outside corporate network". I try resolve som host names (not fqdn), responds with link
local addresses. Try pinging fqdn, ping request could not find host. I try pinging the registered nls url, responds with the correct ipv4 address, ie dns resolved.
So I'm in the situation where nsl is working, the computer still have the NRPT active and redirects all non exempt dns resolutions to the not working ipv6 dns-server address.
Now I checked the selfsigned cert on the nls-server (same as the DA-server) which has the DA-servers external fqdn as subject (ie not the nls url), and isn't in the clients trusted root cert store. This doesn't seem correct. But since I'm using kerberos
authentication instead of certificates maybe the nls cert subject/trust is not important?
And, I haven't touched the cert on the DA/NLS server so it ought to be the same cert from when everything worked.
-
Edited by
Molotch
Tuesday, October 29, 2013 9:34 PM