Skip to content

Commit b0255b9

Browse files
authored
AB#5389 status-code-0x6bf-0xc002001c
1 parent 18bfc0b commit b0255b9

2 files changed

Lines changed: 107 additions & 0 deletions

File tree

Lines changed: 105 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,105 @@
1+
---
2+
title: Status Code 0x6bf or 0xc002001c
3+
description: Helps resolve an issue in which you can't join a domain with status code 0x32. This issue is related to the failure to establish an SMB session to a DC.
4+
ms.date: 04/18/2025
5+
manager: dcscontentpm
6+
audience: itpro
7+
ms.topic: troubleshooting
8+
ms.reviewer: kaushika, raviks, herbertm, dennhu, eriw, v-lianna
9+
ms.custom:
10+
- sap:active directory\on-premises active directory domain join
11+
- pcy:WinComm Directory Services
12+
---
13+
# Status code 0x6bf or 0xc002001c: The remote procedure call failed and did not execute
14+
15+
This article provides troubleshooting steps for resolving the remote procedure call (RPC) status code 0x6bf or 0xc002001c when you join a workgroup computer to a domain.
16+
17+
When you join a workgroup computer to a domain, you receive the following error message:
18+
19+
> The remote procedure call failed and did not execute.
20+
21+
When you check the **NetSetup.log** file, you see the following entries. For example:
22+
23+
```output
24+
NetpGetLsaHandle: LsaOpenPolicy on \\<DC name>.<domain>.<tld> failed: 0xc002001c
25+
NetpGetLsaPrimaryDomain: status: 0xc002001c
26+
NetpJoinDomain: initiaing a rollback due to earlier errors
27+
NetpJoinDomain: status of disconnecting from ‘\\<DC name>.<domain>.<tld>’: 0x0
28+
NetpDoDomainJoin: status: 0x6bf
29+
```
30+
31+
## Network device rejects network packets
32+
33+
This error occurs when a network device (router, firewall, or virtual private network (VPN) device) rejects network packets between the client being joined and the domain controller (DC).
34+
35+
## Verify and test the connection
36+
37+
To troubleshoot this issue, use the following steps:
38+
39+
1. Verify the connectivity between the client being joined and the target DC over the required ports and protocols.
40+
41+
|Server port |Service/Protocol |
42+
|---------|---------|
43+
|Transmission Control Protocol (TCP) 135 |RPC Endpoint Mapper |
44+
|TCP 49152 - 65535 |RPC (dynamic ports allocation) |
45+
|TCP 445 |Server Message Block (SMB) |
46+
|User Datagram Protocol (UDP)/TCP 389 |Lightweight Directory Access Protocol (LDAP) |
47+
48+
Refer to the list of required ports in [How to configure a firewall for Active Directory domains and trusts](config-firewall-for-ad-domains-and-trusts.md).
49+
50+
2. Test the connection between the client and the DC by running the following cmdlet:
51+
52+
```powershell
53+
Test-NetConnection <IP_address_of_the_DC> -Port 389
54+
```
55+
56+
The expected output is:
57+
58+
```output
59+
ComputerName : <ComputerName>
60+
RemoteAddress : <RemoteAddress>
61+
RemotePort : 389
62+
InterfaceAlias : Ethernet 2
63+
SourceAddress : <SourceAddress>
64+
TcpTestSucceeded : True
65+
```
66+
67+
The output indicates that the LDAP port TCP 389 is open between the client and the DC.
68+
69+
3. Identify if a port (TCP/UDP) is blocked on a DC by using the [PortQry](https://www.microsoft.com/download/details.aspx?id=17148) command-line tool. For more information, see [Using the PortQry command-line tool](../networking/portqry-command-line-port-scanner-v2.md).
70+
71+
Here are some example syntaxes:
72+
73+
- `portqry -n <problem_server> -e 135`
74+
- `portqry -n <problem_server> -e 445`
75+
- `portqry -n <problem_server> -e 389`
76+
- `portqry -n <problem_server> -p UDP -e 389`
77+
- `portqry -n <problem_server> -r 49152:65535`
78+
79+
Here are some example outputs:
80+
81+
If the connection to TCP 135 port on the DC is blocked, you see the following output:
82+
83+
```output
84+
C:\PortQryV2>portqry -n dc2 -e 135
85+
Querying target system called:
86+
Dc2
87+
Attempting to resolve name to IP address…
88+
Name resolved to 192.168.1.2
89+
querying...
90+
TCP port 135 <epmap service>: FILTERED
91+
```
92+
93+
If the connection to TCP 389 port on the DC is successful, you see the following output:
94+
95+
```output
96+
C:\PortQryV2>portqry -n dc2 -e 389
97+
Querying target system called:
98+
Dc2
99+
Attempting to resolve name to IP address…
100+
Name resolved to 192.168.1.2
101+
querying...
102+
TCP port 389 <ldap service>: LISTENING
103+
```
104+
105+
To determine if there're any further network connectivity problems, collect a network monitor trace if necessary when reproducing the issue.

support/windows-server/toc.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -363,6 +363,8 @@ items:
363363
href: ./active-directory/netlogon-service-not-start-automatically.md
364364
- name: Status code 0x32 and you can't join a domain
365365
href: ./active-directory/status-code-0x32-cannot-join-domain.md
366+
- name: Status code 0x6bf or 0xc002001c
367+
href: ./active-directory/status-code-0x6bf-0xc002001c.md
366368
- name: Support boundaries for Active Directory over NAT
367369
href: ./active-directory/support-for-active-directory-over-nat.md
368370
- name: '"The account is not authorized to login from this station" error'

0 commit comments

Comments
 (0)