search for: kigm

Displaying 14 results from an estimated 14 matches for "kigm".

2015 Oct 28
2
NTLM_AUTH failing?
...th --helper-protocol=ntlm-server-1" Now, that allows ALL domain users to connect. We only want users in the "PPTP" domain group to use the VPN, so we do this instead. plugin winbind.so ntlm_auth-helper "/usr/bin/ntlm_auth --helper-protocol=ntlm-server-1 --require-membership-of=KIGM\\PPTP" The issue is that ntlm_auth does not see that as a string and it won't work. I cannot use quotes because the parameters are quoted, so I am stuck. Lead IT/IS Specialist Reach Technology FP, Inc On 10/28/2015 10:06 AM, Rowland Penny wrote: > On 28/10/15 13:45, Ryan Ashley wrote...
2015 Oct 27
2
NTLM_AUTH failing?
...r, if I run it with my PPTP server, it denies access to every >> user. MY setup is that I have a few AD users in an AD group named >> "PPTP". I have the following in my pptp-options file. The server is >> Debian Squeeze 64bit. >> >> name vpn01 >> domain kigm.local >> refuse-pap >> refuse-chap >> refuse-mschap >> require-mschap-v2 >> require-mppe-128 >> ms-dns 192.168.0.1 >> ms-dns 192.168.0.2 >> proxyarp >> nodefaultroute >> lock >> nobsdcomp >> plugin winbind.so >> ntlm_auth...
2015 Oct 28
2
NTLM_AUTH failing?
...cess to every >>>> user. MY setup is that I have a few AD users in an AD group named >>>> "PPTP". I have the following in my pptp-options file. The server is >>>> Debian Squeeze 64bit. >>>> >>>> name vpn01 >>>> domain kigm.local >>>> refuse-pap >>>> refuse-chap >>>> refuse-mschap >>>> require-mschap-v2 >>>> require-mppe-128 >>>> ms-dns 192.168.0.1 >>>> ms-dns 192.168.0.2 >>>> proxyarp >>>> nodefaultroute >&g...
2015 Oct 28
0
NTLM_AUTH failing?
...1" > > Now, that allows ALL domain users to connect. We only want users in the > "PPTP" domain group to use the VPN, so we do this instead. > > plugin winbind.so > ntlm_auth-helper "/usr/bin/ntlm_auth --helper-protocol=ntlm-server-1 > --require-membership-of=KIGM\\PPTP" > > The issue is that ntlm_auth does not see that as a string and it won't > work. I cannot use quotes because the parameters are quoted, so I am stuck. > > Lead IT/IS Specialist > Reach Technology FP, Inc > > On 10/28/2015 10:06 AM, Rowland Penny wrote: >...
2014 Nov 01
1
DNS information, again...
...DHCP. However, on a virtual domain using Server 2008 R2 and WIndows 7 clients, DNS gets updated. The following was done from a domain controller on the domain in question. I also ran "samba_dnsupdate --verbose" and it claims that no updates are required. root at dc02:~# host balcony.kigm.local balcony.kigm.local has address 192.168.2.32 root at dc02:~# nbtscan 192.168.2.0/24 Doing NBT name scan for addresses from 192.168.2.0/24 IP address NetBIOS Name Server User MAC address ------------------------------------------------------------------------------ 192...
2015 Jul 03
2
Clients unable to get group policy...
On 03/07/15 15:58, Ryan Ashley wrote: > They left a PC on, so I got the info. The info pissed me off, but not > because of the issue. This time it worked flawlessly, but I got the > error from the event log from prior attempts. First, today's results. > > C:\Users\reachfp.KIGM>gpupdate > Updating Policy... > > User Policy update has completed successfully. > Computer Policy update has completed successfully. > > > C:\Users\reachfp.KIGM>gpupdate /force > Updating Policy... > > User Policy update has completed successfully. > Computer...
2015 Jul 03
3
Clients unable to get group policy...
On 03/07/15 15:18, Ryan Ashley wrote: > The only Unix client I can think of would be the Buffalo NAS. It runs > Samba3 and hosts various shares via SMB. DNS is handled by BIND9 on the > Samba4 DC. DNS does work and the domain name resolves to the IP address > of the server. DHCP is also handled on the DC. As for the GPO's, they're > in the correct place as far as I can tell.
2015 Oct 27
0
NTLM_AUTH failing?
...uth on the command-line, it works as expected. However, if I run it with my PPTP server, it denies access to every user. MY setup is that I have a few AD users in an AD group named "PPTP". I have the following in my pptp-options file. The server is Debian Squeeze 64bit. name vpn01 domain kigm.local refuse-pap refuse-chap refuse-mschap require-mschap-v2 require-mppe-128 ms-dns 192.168.0.1 ms-dns 192.168.0.2 proxyarp nodefaultroute lock nobsdcomp plugin winbind.so ntlm_auth-helper "/usr/bin/ntlm_auth --helper-protocol=ntlm-server-1 --require-membership-of=KIGM+PPTP" This domain...
2015 Oct 27
0
NTLM_AUTH failing?
...PTP server, it denies access to every >>> user. MY setup is that I have a few AD users in an AD group named >>> "PPTP". I have the following in my pptp-options file. The server is >>> Debian Squeeze 64bit. >>> >>> name vpn01 >>> domain kigm.local >>> refuse-pap >>> refuse-chap >>> refuse-mschap >>> require-mschap-v2 >>> require-mppe-128 >>> ms-dns 192.168.0.1 >>> ms-dns 192.168.0.2 >>> proxyarp >>> nodefaultroute >>> lock >>> nobsdcomp &...
2015 Oct 28
0
NTLM_AUTH failing?
...t;>> user. MY setup is that I have a few AD users in an AD group named >>>>> "PPTP". I have the following in my pptp-options file. The server is >>>>> Debian Squeeze 64bit. >>>>> >>>>> name vpn01 >>>>> domain kigm.local >>>>> refuse-pap >>>>> refuse-chap >>>>> refuse-mschap >>>>> require-mschap-v2 >>>>> require-mppe-128 >>>>> ms-dns 192.168.0.1 >>>>> ms-dns 192.168.0.2 >>>>> proxyarp >&g...
2015 Jul 03
0
Clients unable to get group policy...
They left a PC on, so I got the info. The info pissed me off, but not because of the issue. This time it worked flawlessly, but I got the error from the event log from prior attempts. First, today's results. C:\Users\reachfp.KIGM>gpupdate Updating Policy... User Policy update has completed successfully. Computer Policy update has completed successfully. C:\Users\reachfp.KIGM>gpupdate /force Updating Policy... User Policy update has completed successfully. Computer Policy update has completed successfully. C:\Use...
2015 Jul 03
0
Clients unable to get group policy...
...15:58, Ryan Ashley wrote: >> They left a PC on, so I got the info. The info pissed me off, but not >> because of the issue. This time it worked flawlessly, but I got the >> error from the event log from prior attempts. First, today's results. >> >> C:\Users\reachfp.KIGM>gpupdate >> Updating Policy... >> >> User Policy update has completed successfully. >> Computer Policy update has completed successfully. >> >> >> C:\Users\reachfp.KIGM>gpupdate /force >> Updating Policy... >> >> User Policy update h...
2015 Jun 04
4
Clients unable to get group policy...
On 6/3/2015 11:43 AM, Ryan Ashley wrote: > James, I cloned it using git. I installed it to a private partition > (/samba) back when I was first testing Samba4. It is in the path and > this worked for ages, but recently just stopped. No errors, no warnings, > nothing. Just dead. > > The GP in question is the default domain policy. I already tried > unlinking it and it fails on
2015 Oct 30
2
NTLM_AUTH failing?
...w, that allows ALL domain users to connect. We only want users in the >> "PPTP" domain group to use the VPN, so we do this instead. >> >> plugin winbind.so >> ntlm_auth-helper "/usr/bin/ntlm_auth --helper-protocol=ntlm-server-1 >> --require-membership-of=KIGM\\PPTP" >> >> The issue is that ntlm_auth does not see that as a string and it won't >> work. I cannot use quotes because the parameters are quoted, so I am >> stuck. >> >> Lead IT/IS Specialist >> Reach Technology FP, Inc >> >> On 10/28...