Страница 2 от 2 ПърваПърва 12
Резултати от 16 до 22 от общо 22

Проблем с мрежа защитена с парола win7-XP

Сподели във Facebook Сподели в Twitter Изпрати на Email Сподели в LinkedIn
  1. Senior Member Аватара на ru-boy
    Тук е от
    Jan 2000
    Мнения
    4,531
    #16

    Re:Проблем с мрежа защитена с парола win7-XP

    Мързи ме да пиша, но нещата са лесни и не са така страшни както ги описваш.
    Обратно на съвета на MitkoS може да минеш с:

    - само NETBIOS, или
    - само с IPX/SPX

    Вярно, че са "артефакти", но работят перфектно, за това са създадени и ги има като опция.
    Избираш само един от двата, това са надеждни и прекрасни протоколи, които не изискват познания за настройка.

    Може да сложиш и само TCP/IP v.4 но трябва да зададеш адреси.
    Препоръчително е да не слагаш отметки на всички протоколи съвсем не са нужни.
    Избираш с кой ще работиш и слагаш отметка само на него.
    Мисля, че съвършенния в-т е в комбинацията TCP/IP и IPX/SPX.
    Обаче на ХР-то слагаш TCP/IP и IPX/SPX а на 7-цата само IPX/SPX. Защо е друг въпрос.
    Така би трябвало да тръгне веднага. Никакви други отметки.
    Ясно е, че може и само с TCP/IP, но явно нямаш представа как да го направиш, въпреки, че е лесно.
    Вземи си и един мрежов скенер за по-лесно откриване на ресурсите на другия/те компютри.
    Ето този е перфектен (видно и от името му ;-) ) http://www.softperfect.com/products/networkscanner/
    Понякога (както при теб) става объркване с акаунтите и имената и с този скенер ще видиш веднага кое е видимо и с какви ресурси за секунди а не да се чудиш какво да правиш.
    Май го обясних много разхвърляно, ама ...

  2.  
     
  3. Moderator
    Тук е от
    Mar 2005
    Мнения
    7,189
    #17

    Re:Проблем с мрежа защитена с парола win7-XP

    Е да де, ама работата е там, че "проблеми с протокола няма".
    Ако имаше, то съобщението за грешка щеше да е :
    "Windows can not access \\adi".

    В момента грешката е "неизвестно потребителско име или парола", което е много "по-високо" от протокола.

    Най-вероятно, при конкретния Win 7, е допълнително някак си е включено някакво допълнително полиси за сигурност на връзката, което не се поддържа в XP. Но нямам идея кое и къде точно. Евентуален преглед в Event Viewer, може и да може да подскаже нещо.

    ПП.
    Компютрите актуализирани ли са по отношение на Windows Updates ?

    ПП2.
    Ей това е от WIn7Pro с дифолт настройки. Без проблеми от тази машина се осъществяват връзки към XP със съответните акаунти. Евентуално можеш набързо да свериш и провериш за разминавания с настройките при теб
    Local Security Policy/Local Policies/Secutity Options:
    Код:
    Policy	Security Setting
    Accounts: Administrator account status	Disabled
    Accounts: Guest account status	Disabled
    Accounts: Limit local account use of blank passwords to console logon only	Enabled
    Accounts: Rename administrator account	Administrator
    Accounts: Rename guest account	Guest
    Audit: Audit the access of global system objects	Disabled
    Audit: Audit the use of Backup and Restore privilege	Disabled
    Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings	Not Defined
    Audit: Shut down system immediately if unable to log security audits	Disabled
    DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax	Not Defined
    DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax	Not Defined
    Devices: Allow undock without having to log on	Enabled
    Devices: Allowed to format and eject removable media	Not Defined
    Devices: Prevent users from installing printer drivers	Disabled
    Devices: Restrict CD-ROM access to locally logged-on user only	Not Defined
    Devices: Restrict floppy access to locally logged-on user only	Not Defined
    Domain controller: Allow server operators to schedule tasks	Not Defined
    Domain controller: LDAP server signing requirements	Not Defined
    Domain controller: Refuse machine account password changes	Not Defined
    Domain member: Digitally encrypt or sign secure channel data (always)	Enabled
    Domain member: Digitally encrypt secure channel data (when possible)	Enabled
    Domain member: Digitally sign secure channel data (when possible)	Enabled
    Domain member: Disable machine account password changes	Disabled
    Domain member: Maximum machine account password age	30 days
    Domain member: Require strong (Windows 2000 or later) session key	Enabled
    Interactive logon: Display user information when the session is locked	Not Defined
    Interactive logon: Do not display last user name	Disabled
    Interactive logon: Do not require CTRL+ALT+DEL	Not Defined
    Interactive logon: Message text for users attempting to log on	
    Interactive logon: Message title for users attempting to log on	
    Interactive logon: Number of previous logons to cache (in case domain controller is not available)	10 logons
    Interactive logon: Prompt user to change password before expiration	5 days
    Interactive logon: Require Domain Controller authentication to unlock workstation	Disabled
    Interactive logon: Require smart card	Disabled
    Interactive logon: Smart card removal behavior	No Action
    Microsoft network client: Digitally sign communications (always)	Disabled
    Microsoft network client: Digitally sign communications (if server agrees)	Enabled
    Microsoft network client: Send unencrypted password to third-party SMB servers	Disabled
    Microsoft network server: Amount of idle time required before suspending session	15 minutes
    Microsoft network server: Digitally sign communications (always)	Disabled
    Microsoft network server: Digitally sign communications (if client agrees)	Disabled
    Microsoft network server: Disconnect clients when logon hours expire	Enabled
    Microsoft network server: Server SPN target name validation level	Not Defined
    Network access: Allow anonymous SID/Name translation	Disabled
    Network access: Do not allow anonymous enumeration of SAM accounts	Enabled
    Network access: Do not allow anonymous enumeration of SAM accounts and shares	Disabled
    Network access: Do not allow storage of passwords and credentials for network authentication	Disabled
    Network access: Let Everyone permissions apply to anonymous users	Disabled
    Network access: Named Pipes that can be accessed anonymously	
    Network access: Remotely accessible registry paths	System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Server Applications,Software\Microsoft\Windows NT\CurrentVersion
    Network access: Remotely accessible registry paths and sub-paths	System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion\Print,Software\Microsoft\Windows NT\CurrentVersion\Windows,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration,Software\Microsoft\Windows NT\CurrentVersion\Perflib,System\CurrentControlSet\Services\SysmonLog
    Network access: Restrict anonymous access to Named Pipes and Shares	Enabled
    Network access: Shares that can be accessed anonymously	Not Defined
    Network access: Sharing and security model for local accounts	Classic - local users authenticate as themselves
    Network security: Allow Local System to use computer identity for NTLM	Not Defined
    Network security: Allow LocalSystem NULL session fallback	Not Defined
    Network Security: Allow PKU2U authentication requests to this computer to use online identities	Not Defined
    Network security: Configure encryption types allowed for Kerberos	Not Defined
    Network security: Do not store LAN Manager hash value on next password change	Enabled
    Network security: Force logoff when logon hours expire	Disabled
    Network security: LAN Manager authentication level	Not Defined
    Network security: LDAP client signing requirements	Negotiate signing
    Network security: Minimum session security for NTLM SSP based (including secure RPC) clients	Require 128-bit encryption
    Network security: Minimum session security for NTLM SSP based (including secure RPC) servers	Require 128-bit encryption
    Network security: Restrict NTLM: Add remote server exceptions for NTLM authentication	Not Defined
    Network security: Restrict NTLM: Add server exceptions in this domain	Not Defined
    Network security: Restrict NTLM: Audit Incoming NTLM Traffic	Not Defined
    Network security: Restrict NTLM: Audit NTLM authentication in this domain	Not Defined
    Network security: Restrict NTLM: Incoming NTLM traffic	Not Defined
    Network security: Restrict NTLM: NTLM authentication in this domain	Not Defined
    Network security: Restrict NTLM: Outgoing NTLM traffic to remote servers	Not Defined
    Recovery console: Allow automatic administrative logon	Disabled
    Recovery console: Allow floppy copy and access to all drives and all folders	Disabled
    Shutdown: Allow system to be shut down without having to log on	Enabled
    Shutdown: Clear virtual memory pagefile	Disabled
    System cryptography: Force strong key protection for user keys stored on the computer	Not Defined
    System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing	Disabled
    System objects: Require case insensitivity for non-Windows subsystems	Enabled
    System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)	Enabled
    System settings: Optional subsystems	Posix
    System settings: Use Certificate Rules on Windows Executables for Software Restriction Policies	Disabled
    User Account Control: Admin Approval Mode for the Built-in Administrator account	Disabled
    User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop	Disabled
    User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode	Prompt for consent for non-Windows binaries
    User Account Control: Behavior of the elevation prompt for standard users	Prompt for credentials
    User Account Control: Detect application installations and prompt for elevation	Enabled
    User Account Control: Only elevate executables that are signed and validated	Disabled
    User Account Control: Only elevate UIAccess applications that are installed in secure locations	Enabled
    User Account Control: Run all administrators in Admin Approval Mode	Enabled
    User Account Control: Switch to the secure desktop when prompting for elevation	Enabled
    User Account Control: Virtualize file and registry write failures to per-user locations	Enabled
    ПП3.
    Сега трябва да изляза от форума и ще се върна утре някога

  4. Senior Member Аватара на ru-boy
    Тук е от
    Jan 2000
    Мнения
    4,531
    #18

    Re:Проблем с мрежа защитена с парола win7-XP

    "Event Viewer" не знам да е помогнал на някого за нещо, освен тема за упражняване на философия.
    Идеята с протоколите е друга, но явно е трудна за осъзнаване.
    Има си няколко принципа за мрежите и защитите и не е нужна магия, за да работи.
    Спазваш 2-3 правила. Само толкова.

  5. Moderator
    Тук е от
    Mar 2005
    Мнения
    7,189
    #19

    Re:Проблем с мрежа защитена с парола win7-XP

    А това е от XP
    Код:
    Policy	Security Setting
    Accounts: Administrator account status	Enabled
    Accounts: Guest account status	Disabled
    Accounts: Limit local account use of blank passwords to console logon only	Enabled
    Accounts: Rename administrator account	Administrator
    Accounts: Rename guest account	Guest
    Audit: Audit the access of global system objects	Disabled
    Audit: Audit the use of Backup and Restore privilege	Disabled
    Audit: Shut down system immediately if unable to log security audits	Disabled
    DCOM: Machine Access Restrictions in Security Descriptor Definition Language (SDDL) syntax	Not defined
    DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax	Not defined
    Devices: Allow undock without having to log on	Enabled
    Devices: Allowed to format and eject removable media	Administrators
    Devices: Prevent users from installing printer drivers	Disabled
    Devices: Restrict CD-ROM access to locally logged-on user only	Disabled
    Devices: Restrict floppy access to locally logged-on user only	Disabled
    Devices: Unsigned driver installation behavior	Warn but allow installation
    Domain controller: Allow server operators to schedule tasks	Not defined
    Domain controller: LDAP server signing requirements	Not defined
    Domain controller: Refuse machine account password changes	Not defined
    Domain member: Digitally encrypt or sign secure channel data (always)	Enabled
    Domain member: Digitally encrypt secure channel data (when possible)	Enabled
    Domain member: Digitally sign secure channel data (when possible)	Enabled
    Domain member: Disable machine account password changes	Disabled
    Domain member: Maximum machine account password age	30 days
    Domain member: Require strong (Windows 2000 or later) session key	Disabled
    Interactive logon: Display user information when the session is locked	Not defined
    Interactive logon: Do not display last user name	Disabled
    Interactive logon: Do not require CTRL+ALT+DEL	Not defined
    Interactive logon: Message text for users attempting to log on	
    Interactive logon: Message title for users attempting to log on	Not defined
    Interactive logon: Number of previous logons to cache (in case domain controller is not available)	10 logons
    Interactive logon: Prompt user to change password before expiration	14 days
    Interactive logon: Require Domain Controller authentication to unlock workstation	Disabled
    Interactive logon: Require smart card	Not defined
    Interactive logon: Smart card removal behavior	No Action
    Microsoft network client: Digitally sign communications (always)	Disabled
    Microsoft network client: Digitally sign communications (if server agrees)	Enabled
    Microsoft network client: Send unencrypted password to third-party SMB servers	Disabled
    Microsoft network server: Amount of idle time required before suspending session	15 minutes
    Microsoft network server: Digitally sign communications (always)	Disabled
    Microsoft network server: Digitally sign communications (if client agrees)	Disabled
    Microsoft network server: Disconnect clients when logon hours expire	Enabled
    Network access: Allow anonymous SID/Name translation	Disabled
    Network access: Do not allow anonymous enumeration of SAM accounts	Enabled
    Network access: Do not allow anonymous enumeration of SAM accounts and shares	Disabled
    Network access: Do not allow storage of credentials or .NET Passports for network authentication	Disabled
    Network access: Let Everyone permissions apply to anonymous users	Disabled
    Network access: Named Pipes that can be accessed anonymously	COMNAP,COMNODE,SQL\QUERY,SPOOLSS,LLSRPC,EPMAPPER,LOCATOR,TrkWks,TrkSvr
    Network access: Remotely accessible registry paths	System\CurrentControlSet\Control\ProductOptions,System\CurrentControlSet\Control\Print\Printers,System\CurrentControlSet\Control\Server Applications,System\CurrentControlSet\Services\Eventlog,Software\Microsoft\OLAP Server,Software\Microsoft\Windows NT\CurrentVersion,System\CurrentControlSet\Control\ContentIndex,System\CurrentControlSet\Control\Terminal Server,System\CurrentControlSet\Control\Terminal Server\UserConfig,System\CurrentControlSet\Control\Terminal Server\DefaultUserConfiguration
    Network access: Shares that can be accessed anonymously	COMCFG,DFS$
    Network access: Sharing and security model for local accounts	Classic - local users authenticate as themselves
    Network security: Do not store LAN Manager hash value on next password change	Disabled
    Network security: Force logoff when logon hours expire	Disabled
    Network security: LAN Manager authentication level	Send LM & NTLM responses
    Network security: LDAP client signing requirements	Negotiate signing
    Network security: Minimum session security for NTLM SSP based (including secure RPC) clients	No minimum
    Network security: Minimum session security for NTLM SSP based (including secure RPC) servers	No minimum
    Recovery console: Allow automatic administrative logon	Disabled
    Recovery console: Allow floppy copy and access to all drives and all folders	Disabled
    Shutdown: Allow system to be shut down without having to log on	Enabled
    Shutdown: Clear virtual memory pagefile	Disabled
    System cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing	Disabled
    System objects: Default owner for objects created by members of the Administrators group	Object creator
    System objects: Require case insensitivity for non-Windows subsystems	Enabled
    System objects: Strengthen default permissions of internal system objects (e.g. Symbolic Links)	Enabled

  6. Junior Member
    Тук е от
    Mar 2009
    Мнения
    47
    #20

    Re:Проблем с мрежа защитена с парола win7-XP

    Компютрите са актуализирани до последният ъпдейт.
    Относно Policy Security Setting настройките са така.
    MitkoS споделянето при теб с кроснат кабел и 2 лан карти ли е?

  7. Moderator
    Тук е от
    Mar 2005
    Мнения
    7,189
    #21

    Re:Проблем с мрежа защитена с парола win7-XP

    С най-обикновен суич съм, но това няма (според мен) значение, заради типа на грешката при теб.

    Ако имаш съмнения за лоши кабели и лоши физически връзки, то това най-лесно се проверява с командата ping:

    Accessories/Command Prompt
    >ping adi /t

    Не трябва да има никакви загуби (Request Timed Out), когато става въпрос за малка локална мрежа.


    ПП.
    След всичката изписана информация, най-много се съмнявам за защитна стена в антивирусната програма - в смисъл уж е спряна, ама продължава да работи и да пречи на връзката.
    Що не вземеш направо да я деинсталираш (времено поне) !?

  8.  
     
  9. Junior Member
    Тук е от
    Mar 2009
    Мнения
    47
    #22

    Re:Проблем с мрежа защитена с парола win7-XP

    След преинсталиране на антивируса на XP-то се оправи всичко. Благодаря за отделеното внимание на всички. MitkoS

Сподели във Facebook Сподели в Google Plus Сподели в Twitter Изпрати на Email Сподели в LinkedIn
Страница 2 от 2 ПърваПърва 12

Подобни теми

  1. Защитена флаш памет
    От alfonso във форум Общ - хардуер
    Отговори: 5
    Последно: 17-02-14, 22:25
  2. Отговори: 4
    Последно: 02-06-10, 16:15
  3. Отговори: 6
    Последно: 27-12-06, 14:42
  4. Firefox - проблем със забравена парола
    От Cko във форум Общ - софтуер
    Отговори: 3
    Последно: 09-11-05, 20:02

SetCombG.com
SetCombG.com е портален сайт и Форум за битова техника, телевизори, климатици, лаптопи и смартфони, създаден през 1999 година.
Заедно сме над 20 години!
Следвай ни
Горе