Problems Joining Active Directory (DRAFT) |
What should I do if I get an error message that says the DXi has not joined a Windows domain?
Note: Windows AD uses Policy-based management. Security settings in Policy-based management could prevent DXi from successfully joining the AD Domain
Reasons to Enable This Setting
Unsigned network traffic is susceptible to man-in-the-middle attacks where an intruder captures packets between the client and the server, modifies the packets, and then forwards them to the server. When this behavior occurs on an LDAP server, an attacker could cause a server to make decisions that are based on false queries from the LDAP client. You can lower this risk in a corporate network by implementing strong physical security measures to help protect the network infrastructure. Internet Protocol security (IPSec) authentication header mode can make man-in-the-middle attacks extremely difficult. Authentication header mode performs mutual authentication and packet integrity for IP traffic.
Reasons to Disable this Setting
Clients that do not support LDAP signing will not be able to carry out LDAP queries against domain controllers and against global catalogs if NTLM authentication is negotiated and if the correct service packs are not installed on Windows 2000 domain controllers.
Network traces of LDAP traffic between clients and servers will be encrypted, making it difficult to examine LDAP conversations
View/Modify the Security Policy settings from Group Policy Management console (perform following steps to access console):
For more information, review the Active Directory Hot Topic.
This page was generated by the BrainKeeper Enterprise Wiki, © 2018 |