G
Guest
I'm getting a warning on one of my 2003 DCs which is as follows:
----
Event ID 5807
Source: Netlogon
Details:
During the past 4.22 hours there have been 8 connections to this Domain
Controller from client machines whose IP addresses don't map to any of the
existing sites in the enterprise. Those clients, therefore, have undefined
sites and may connect to any Domain Controller including those that are in
far distant locations from the clients. A client's site is determined by the
mapping of its subnet to one of the existing sites. To move the above
clients to one of the sites, please consider creating subnet object(s)
covering the above IP addresses with mapping to one of the
existing sites. The names and IP addresses of the clients in question have
been logged on this computer in the following log file
'<SystemRoot>\debug\netlogon.log' and, potentially, in the log file
'<SystemRoot>\debug\netlogon.bak' created if the former log becomes full.
The log(s) may contain additional unrelated debugging information. To filter
out the needed information, please search for lines which contain text
'NO_CLIENT_SITE:'. The first word after this string is the client name and
the second word is the client IP address. The maximum size of the log(s) is
controlled by the following registry DWORD valu
'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\LogFileMaxSize';
the default is <number> bytes. The current maximum size is <number> bytes.
To set a
different maximum size, create the above registry value and set the desired
maximum size in bytes.
----
What these rogue IPs belong to are the VPN clients coming into our network
via our hardware VPN. Of course their remote IPs are not on any subnets as
I have no idea what their ISP will assign them or how their local home
router is setup. Just in an attempt to keep the event log clean, is it
possible to suppress these events being logged to the event viewer and to
the \debug\netlogon.log file?
Thx.
----
Event ID 5807
Source: Netlogon
Details:
During the past 4.22 hours there have been 8 connections to this Domain
Controller from client machines whose IP addresses don't map to any of the
existing sites in the enterprise. Those clients, therefore, have undefined
sites and may connect to any Domain Controller including those that are in
far distant locations from the clients. A client's site is determined by the
mapping of its subnet to one of the existing sites. To move the above
clients to one of the sites, please consider creating subnet object(s)
covering the above IP addresses with mapping to one of the
existing sites. The names and IP addresses of the clients in question have
been logged on this computer in the following log file
'<SystemRoot>\debug\netlogon.log' and, potentially, in the log file
'<SystemRoot>\debug\netlogon.bak' created if the former log becomes full.
The log(s) may contain additional unrelated debugging information. To filter
out the needed information, please search for lines which contain text
'NO_CLIENT_SITE:'. The first word after this string is the client name and
the second word is the client IP address. The maximum size of the log(s) is
controlled by the following registry DWORD valu
'HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Netlogon\Parameters\LogFileMaxSize';
the default is <number> bytes. The current maximum size is <number> bytes.
To set a
different maximum size, create the above registry value and set the desired
maximum size in bytes.
----
What these rogue IPs belong to are the VPN clients coming into our network
via our hardware VPN. Of course their remote IPs are not on any subnets as
I have no idea what their ISP will assign them or how their local home
router is setup. Just in an attempt to keep the event log clean, is it
possible to suppress these events being logged to the event viewer and to
the \debug\netlogon.log file?
Thx.