{"id":832,"date":"2012-07-25T23:46:42","date_gmt":"2012-07-25T23:46:42","guid":{"rendered":"http:\/\/microsoftgeek.com\/?p=832"},"modified":"2012-07-25T23:46:42","modified_gmt":"2012-07-25T23:46:42","slug":"active-directory-troubleshooting-basics","status":"publish","type":"post","link":"https:\/\/microsoftgeek.com\/?p=832","title":{"rendered":"Active Directory Troubleshooting Basics"},"content":{"rendered":"<p>In this article we will cover ways to monitor and troubleshoot  common problems with Active Directory. Although listing ways to  troubleshoot Active Directory could easily span into a 3 volume book  set, we will cover the most common issues and solutions here within  these articles. Whether you are already a pro, or just a beginner \u2013  these tips should serve you well. In this article we  will cover replication traffic and how to monitor and troubleshoot it  with tips and tools.<\/p>\n<h2>Monitoring and Troubleshooting Active Directory Replication<\/h2>\n<p>Replication  may be defined as a duplicate copy of similar data on the same or a  different platform or system. When using a directory service such as  Active Directory, the directory database is carried by all domain  controllers so that when you want to contact a domain controller for  use, there is always a local copy local for use so that requests do not  have to be sent over the wide area network (WAN). Replication for Active  Directory operates within the directory service component of the  security subsystem. This component is called Ntdsa.dll and is accessed  through the Lightweight Directory Access Protocol (LDAP). Ntdsa.dll runs  as a part of the local security authority (LSA), which runs as  Lsass.exe. Updates are transported over Internet Protocol (IP) by the  remote procedure call (RPC) protocol. \u00a0The Simple Mail Transfer Protocol  (SMTP) is also available for use as well, although it\u2019s more common to  see RPC over IP used.<\/p>\n<p>When considering Active Directory, replication takes place and a copy  of the Active Directory database is stored and updated on all other  participating domain controllers on your network and in a perfect world,  each copy of the database is the same and all domain controllers are  synchronized. If this happens, then all your domain controllers are  synchronized with an exact duplicate copy of the Active Directory  database. When you install Active Directory, for the most part even if  all the default settings are chosen, the replication process from domain  controller to domain controller is automatic and practically  transparent. For the most part, domain controllers handle the  replication processes without advanced configuration and most times,  without a problem.<\/p>\n<p>In figure 1, you can see a common network (2 sites connected via a  WAN link) with a domain controller in each location. Again, the  benefit\u00a0of having a domain controller local to your PC\u2019s at each network  segment is to have requests made of the domain controller kept local to  the PC\u2019s in need of its services to speed up requests (by keeping them  local) or in case of disaster recovery, which could happen if the WAN  link drops, the local PCs can still find a local domain controller to  use. Keeping traffic off the wide area network (WAN) and containing it  to the local area network (LAN) is the best design practice you can  implement.<\/p>\n<blockquote dir=\"ltr\"><p><img decoding=\"async\" src=\"http:\/\/www.windowsnetworking.com\/img\/upl\/image0021135008938343.JPG\" border=\"0\" alt=\"\" hspace=\"0\" align=\"bottom\" \/><br \/>\n<strong>Figure 1:<\/strong> A Common Wide Area Network (WAN)<\/p><\/blockquote>\n<p>As a systems administrator, you should still consider that Active  Directory performance still needs to be monitored and analyzed. The  health and maximized performance of Active Directory depends on a smooth  replication process. If you are having problems with replication, you  will know not only from blatant logging in your Event Viewer, but from  poor performance as well. Many times, you cannot stop every problem from  occurring, but hopefully after reading this article, you will be better  equipped to handle issues and keep your network as optimized as  possible to handle the traffic traversing it.<\/p>\n<p>Consider a common problem such as a failed network link. In figure 2,  you see that the main wide area network link has been broken.<\/p>\n<blockquote dir=\"ltr\"><p><img decoding=\"async\" src=\"http:\/\/www.windowsnetworking.com\/img\/upl\/image0031135008938343.JPG\" border=\"0\" alt=\"\" hspace=\"0\" align=\"bottom\" \/><br \/>\n<strong>Figure 2:<\/strong> A Failed Network Link<\/p><\/blockquote>\n<p>ISP\u2019s and telecom service providers occasionally have problems and  service can be interrupted. This of course stops the communication  between domain controllers, therefore also severing the replication  process. This can prevent the synchronization of information between  domain controllers and possibly cause corruption and\/or other problems.<\/p>\n<p>A good way to make sure that this doesn\u2019t happen is to set up a  backup link (such as ISDN as seen in figure 2). ISDN (Integrated  Services Digital Networks) is a digital WAN technology used to  facilitate connections between sites. More commonly used today for  disaster recovery, ISDN still has a place in today\u2019s marketplace.  Although still used, you don\u2019t have to limit yourself to any technology  when it comes to backup links, you can use a fractional or full T1, a  DSL line, or any other technology that allows you to have redundancy in  your links. The goal is to have redundant links to keep your domain  controllers in constant communication with each other so that the Active  Directory database stays synchronized and healthy. A common symptom of  replication problems is that information is not updated on some or all  domain controllers. For example, a systems administrator creates a user  account on one domain controller, but the changes are not propagated to  other domain controllers. In most environments, this is a potentially  serious problem because it affects network security and can prevent  authorized users from accessing the resources they require. You can take  several steps to troubleshoot Active Directory replication; each of  these is discussed in the following sections.<\/p>\n<h2>Verifying Network Connectivity<\/h2>\n<p>In order for replication to  work properly in distributed environments, you must have network  connectivity. Although ideally all domain controllers would be connected  by high-speed and redundant LAN or WAN links, this is rarely the case  for larger deployments and for most companies that utilize slow WAN  links that aren\u2019t recoverable from a disaster. Always make sure your  network topology is documented and tested to ensure that it\u2019s connected.  There are many tools you can use to verify connectivity such as Ping  and Tracert which come with just about every operating system ever  created that runs TCP\/IP.<\/p>\n<p>In real world deployments, analog\/dial-up connections and slow  connections are common. If you have verified that your replication  topology is set up properly, you should confirm that your servers are  able to communicate over the network. Problems such as a failed dial-up  connection attempt can prevent important Active Directory information  from being replicated. Learn how to use ping and other ICMP based  protocol troubleshooting tools in the links section at the end of this  article.<\/p>\n<h2>Verifying Router and Firewall Configurations<\/h2>\n<p>When building a  secure network, most times controls are placed on network devices to  filter the traffic going from place to place. The most commonly used  tool to control traffic is a Firewall. A router or any other device that  utilizes a firewall feature set, or some other form of Access Control  that stops access to and from other hosts connected can also be used. A  firewall is usually dedicated to only protecting the perimeter so its  been designed to do that, do not assume that the use of a firewall stops  any risk of you being attacked, it only minimizes that risk.<\/p>\n<p>Firewalls are used to restrict the types of traffic that can be  transferred between networks. Their main use is to increase security by  preventing unauthorized users from transferring information. In some  cases, company firewalls may block the types of network access that must  be available in order for Active Directory replication to occur. For  example, if a specific router or firewall prevents data from being  transferred using SMTP, replication that uses this protocol will fail.<\/p>\n<h2>Network Ports Used by Active Directory Replication<\/h2>\n<p>RPC  replication uses dynamic port mapping as per the default setting. When  you need to connect to an RPC endpoint during Active Directory  replication, RPC uses TCP port 135.\u00a0 \u00a0RPC on the client contacts the RPC  endpoint mapper on the server at a well-known port and RPC randomly  allocates high TCP ports from port 1024 to 65536. Because of this  configuration, a client will never need to know what port to use for  Active Directory replication; it will just take place seamlessly. There  are also other ports assigned for Active Directory replication. There  are as follows:<\/p>\n<blockquote dir=\"ltr\">\n<table border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td width=\"211\" valign=\"top\">Protocol<\/td>\n<td width=\"379\" valign=\"top\">Port<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">LDAP<\/td>\n<td width=\"379\" valign=\"top\">udp 389<br \/>\ntcp 389<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">LDAP (SSL)<\/td>\n<td width=\"379\" valign=\"top\">udp 636<br \/>\ntcp 636<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">Kerberos<\/td>\n<td width=\"379\" valign=\"top\">udp 88<br \/>\ntcp 88<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">DNS<\/td>\n<td width=\"379\" valign=\"top\">udp 53<br \/>\ntcp 53<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">SMB over IP<\/td>\n<td width=\"379\" valign=\"top\">udp 445<br \/>\ntcp 445<\/td>\n<\/tr>\n<tr>\n<td width=\"211\" valign=\"top\">Global Catalog Server<\/td>\n<td width=\"379\" valign=\"top\">tcp 3269<br \/>\ntcp 3268<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/blockquote>\n<h2>Examining the Event Logs:<\/h2>\n<p>Errors, if they occur, will show up  in the Event Viewer logs. At the end of this article, I have placed a  link to the Microsoft Website so that you can learn how to use the Event  Viewer. The Event Viewer can be very helpful when trying to locate and  resolve a replication problem. Many errors are reported to the Event  Viewer for your review.<\/p>\n<p>Whenever an error in the replication configuration occurs, the  computer writes events to the Directory Service and File Replication  Service (FRS) event logs. By using the Event Viewer administrative tool,  you can quickly and easily view the details associated with any  problems in replication. For example, if one domain controller is not  able to communicate with another to transfer changes, a log entry is  created.<\/p>\n<p>You may receive events such as:<\/p>\n<ul type=\"disc\">\n<li>Event ID 1311 in the directory service log<\/li>\n<li>Event ID 1265 with error &#8220;DNS Lookup Failure&#8221; or &#8220;RPC server is  unavailable&#8221; in the directory service log. Or, received &#8220;DNS Lookup  Failure&#8221; or &#8220;Target account name is incorrect&#8221; from the repadmin command<\/li>\n<li>Event ID 1265 &#8220;Access denied,&#8221; in directory service log. Or, received &#8220;Access denied&#8221; from the repadmin command<\/li>\n<\/ul>\n<blockquote dir=\"ltr\"><p><strong>Note:<\/strong><br \/>\nThe link at the end of the article covers the explanation of these specific errors and more.<\/p><\/blockquote>\n<h2>Verifying Site Links<\/h2>\n<p>Before domain controllers in different  sites can communicate with each other, the sites must be connected by  site links. If replication between sites is not occurring properly,  verify that the proper site links are in place. Verify your site links  by using the Replication diagnostics utility (Repadmin.exe). Use this  tool to verify correct site links and to display inbound and outbound  connections. You can also use it to display the replication queue. You  can get the tool by using the link at the end of this article.<\/p>\n<h2>Verifying That Information Is Synchronized<\/h2>\n<p>It\u2019s often easy to  forget to perform manual checks regarding the replication of Active  Directory information. One of the reasons for this is that Active  Directory domain controllers have their own read\/write copies of the  Active Directory database. Therefore, if connectivity does not exist,  you will not encounter failures while creating new objects.<\/p>\n<p>It is important to periodically verify that objects have been  synchronized between domain controllers. This process might be as simple  as logging on to a different domain controller and looking at the  objects within a specific OU. This manual check, although it might be  tedious, can prevent inconsistencies in the information stored on domain  controllers, which, over time, can become an administration and  security nightmare.<\/p>\n<h2>Verifying Authentication Scenarios<\/h2>\n<p>A common replication  configuration issue occurs when clients are forced to authenticate  across slow network connections. The primary symptom of the problem is  that users complain about the amount of time it takes them to log on to  the Active Directory (especially during times of high volume of  authentications, such as at the beginning of the workday). Usually, you  can alleviate this problem by using additional domain controllers or  reconfiguring the site topology. A good way to test this is to consider  the possible scenarios for the various clients that you support. Often,  walking through a configuration, such as \u201cA client in Domain A is trying  to authenticate using a domain controller in Domain B, which is located  across a very slow WAN connection,\u201d can be helpful in pinpointing  potential problem areas.<\/p>\n<h2>Verifying the Replication Topology<\/h2>\n<p>The Active Directory Sites  and Services tool allows you to verify that a replication topology is  logically consistent. You can quickly and easily perform this task by  right-clicking the NTDS Settings within a Server object and choosing All  Tasks =&gt; Check Replication Topology. If any errors are present, a  dialog box alerts you to the problem.<\/p>\n<p>You can verify the Active Directory topology using the Active Directory Sites and Services tool.<\/p>\n<p>Besides for ensuring that replication always continues, you can also  learn how to monitor it as well. There are several ways in which you can  monitor the behavior of Active Directory replication and troubleshoot  the process if problems occur. In our next article we will look at the  replication monitor and part III of this article will cover the system  monitor.<\/p>\n<h2>Summary<\/h2>\n<p>In this article we covered the basics of replication,  how it works, how to verify and troubleshoot it and what you can do to  ensure that you Active Directory topology is healthy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article we will cover ways to monitor and troubleshoot common problems with Active Directory. Although listing ways to troubleshoot Active Directory could easily span into a 3 volume book set, we will cover the most common issues and solutions here within these articles. Whether you are already a pro, or just a beginner [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[42],"tags":[],"class_list":["post-832","post","type-post","status-publish","format-standard","hentry","category-ad"],"_links":{"self":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=832"}],"version-history":[{"count":1,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/832\/revisions"}],"predecessor-version":[{"id":833,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=\/wp\/v2\/posts\/832\/revisions\/833"}],"wp:attachment":[{"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/microsoftgeek.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}