Skip to content

Commit f05ca43

Browse files
committed
Update status-code-0x6bf-0xc002001c.md
1 parent ec32022 commit f05ca43

1 file changed

Lines changed: 54 additions & 54 deletions

File tree

support/windows-server/active-directory/status-code-0x6bf-0xc002001c.md

Lines changed: 54 additions & 54 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ When you check the **NetSetup.log** file, you see the following entries. For exa
2424
NetpGetLsaHandle: LsaOpenPolicy on \\<DC name>.<domain>.<tld> failed: 0xc002001c
2525
NetpGetLsaPrimaryDomain: status: 0xc002001c
2626
NetpJoinDomain: initiaing a rollback due to earlier errors
27-
NetpJoinDomain: status of disconnecting from \\<DC name>.<domain>.<tld>: 0x0
27+
NetpJoinDomain: status of disconnecting from '\\<DC name>.<domain>.<tld>': 0x0
2828
NetpDoDomainJoin: status: 0x6bf
2929
```
3030

@@ -38,68 +38,68 @@ To troubleshoot this issue, use the following steps:
3838

3939
1. Verify the connectivity between the client being joined and the target DC over the required ports and protocols.
4040

41-
|Server port |Service/Protocol |
42-
|---------|---------|
43-
|Transmission Control Protocol (TCP) 135 |RPC Endpoint Mapper |
44-
|TCP 49152 - 65535 |RPC (dynamic ports allocation) |
45-
|TCP 445 |Server Message Block (SMB) |
46-
|User Datagram Protocol (UDP)/TCP 389 |Lightweight Directory Access Protocol (LDAP) |
41+
|Server port |Service/Protocol |
42+
|---------|---------|
43+
|Transmission Control Protocol (TCP) 135 |RPC Endpoint Mapper |
44+
|TCP 49152 - 65535 |RPC (dynamic ports allocation) |
45+
|TCP 445 |Server Message Block (SMB) |
46+
|User Datagram Protocol (UDP)/TCP 389 |Lightweight Directory Access Protocol (LDAP) |
4747

48-
Refer to the list of required ports in [How to configure a firewall for Active Directory domains and trusts](config-firewall-for-ad-domains-and-trusts.md).
48+
Refer to the list of required ports in [How to configure a firewall for Active Directory domains and trusts](config-firewall-for-ad-domains-and-trusts.md).
4949

5050
2. Test the connection between the client and the DC by running the following cmdlet:
5151

52-
```powershell
53-
Test-NetConnection <IP_address_of_the_DC> -Port 389
54-
```
52+
```powershell
53+
Test-NetConnection <IP_address_of_the_DC> -Port 389
54+
```
5555
56-
The expected output is:
56+
The expected output is:
5757
58-
```output
59-
ComputerName : <ComputerName>
60-
RemoteAddress : <RemoteAddress>
61-
RemotePort : 389
62-
InterfaceAlias : Ethernet 2
63-
SourceAddress : <SourceAddress>
64-
TcpTestSucceeded : True
65-
```
58+
```output
59+
ComputerName : <ComputerName>
60+
RemoteAddress : <RemoteAddress>
61+
RemotePort : 389
62+
InterfaceAlias : Ethernet 2
63+
SourceAddress : <SourceAddress>
64+
TcpTestSucceeded : True
65+
```
6666
67-
The output indicates that the LDAP port TCP 389 is open between the client and the DC.
67+
The output indicates that the LDAP port TCP 389 is open between the client and the DC.
6868
6969
3. Identify if a port (TCP/UDP) is blocked on a DC by using the [PortQry](https://www.microsoft.com/download/details.aspx?id=17148) command-line tool. For more information, see [Using the PortQry command-line tool](../networking/portqry-command-line-port-scanner-v2.md).
7070
71-
Here are some example syntaxes:
72-
73-
- `portqry -n <problem_server> -e 135`
74-
- `portqry -n <problem_server> -e 445`
75-
- `portqry -n <problem_server> -e 389`
76-
- `portqry -n <problem_server> -p UDP -e 389`
77-
- `portqry -n <problem_server> -r 49152:65535`
78-
79-
Here are some example outputs:
80-
81-
If the connection to TCP 135 port on the DC is blocked, you see the following output:
82-
83-
```output
84-
C:\PortQryV2>portqry -n dc2 -e 135
85-
Querying target system called:
86-
Dc2
87-
Attempting to resolve name to IP address…
88-
Name resolved to 192.168.1.2
89-
querying...
90-
TCP port 135 <epmap service>: FILTERED
91-
```
92-
93-
If the connection to TCP 389 port on the DC is successful, you see the following output:
94-
95-
```output
96-
C:\PortQryV2>portqry -n dc2 -e 389
97-
Querying target system called:
98-
Dc2
99-
Attempting to resolve name to IP address…
100-
Name resolved to 192.168.1.2
101-
querying...
102-
TCP port 389 <ldap service>: LISTENING
103-
```
71+
Here are some example syntaxes:
72+
73+
- `portqry -n <problem_server> -e 135`
74+
- `portqry -n <problem_server> -e 445`
75+
- `portqry -n <problem_server> -e 389`
76+
- `portqry -n <problem_server> -p UDP -e 389`
77+
- `portqry -n <problem_server> -r 49152:65535`
78+
79+
Here are some example outputs:
80+
81+
If the connection to TCP 135 port on the DC is blocked, you see the following output:
82+
83+
```output
84+
C:\PortQryV2>portqry -n dc2 -e 135
85+
Querying target system called:
86+
Dc2
87+
Attempting to resolve name to IP address…
88+
Name resolved to 192.168.1.2
89+
querying...
90+
TCP port 135 <epmap service>: FILTERED
91+
```
92+
93+
If the connection to TCP 389 port on the DC is successful, you see the following output:
94+
95+
```output
96+
C:\PortQryV2>portqry -n dc2 -e 389
97+
Querying target system called:
98+
Dc2
99+
Attempting to resolve name to IP address…
100+
Name resolved to 192.168.1.2
101+
querying...
102+
TCP port 389 <ldap service>: LISTENING
103+
```
104104
105105
To determine if there're any further network connectivity problems, collect a network monitor trace if necessary when reproducing the issue.

0 commit comments

Comments
 (0)