A customer of ours has run into an issue with their BBSM setup and Windows XP.
When the wireless is enabled and they try to logon (to the domain) it can take up to 30mins to logon. (It eventually uses the cached credentials.) If the wireless is switched off then XP quickly logs on using the cached credentials.
The users are trying to logon to the domain, however no domain servers are available as this is the Guest VLAN. However the BBSMs default behaviour is to respond to DNS requests with its IP address, constantly telling the XP client that its the AD server.
If the wireless is active then because the laptops have GPOs that say they cant logon until the AD has authenticated them, (http://support.microsoft.com/kb/305293/en-us) they go through a long process of trying to query all the cached AD servers. (And in this case there are many. many AD servers.)
However none of these options are acceptable to the customer. They contest that when the same user tries to logon at Starbucks they dont have an issue so the BBSM is at fault?
Has anyone seen this before? Can anyone offer any advice? I see reference on CCO to this being a common issue with XP and the solution being disable the MS Client however this would mean having non-technical users disabling the MS client on some WLANs and re-enabling on others. Not an option.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...