Windows OS Hub
  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2012
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu
  • Home
  • About

Windows OS Hub

  • Windows Server
    • Windows Server 2022
    • Windows Server 2019
    • Windows Server 2016
    • Windows Server 2012 R2
    • Windows Server 2012
    • Windows Server 2008 R2
    • SCCM
  • Active Directory
    • Active Directory Domain Services (AD DS)
    • Group Policies
  • Windows Clients
    • Windows 11
    • Windows 10
    • Windows 8
    • Windows 7
    • Windows XP
    • MS Office
    • Outlook
  • Virtualization
    • VMWare
    • Hyper-V
    • KVM
  • PowerShell
  • Exchange
  • Cloud
    • Azure
    • Microsoft 365
    • Office 365
  • Linux
    • CentOS
    • RHEL
    • Ubuntu

 Windows OS Hub / Windows Server 2012 / KB3161949 Breaks SMB over NETBIOS Access Outside the Local Subnet

September 30, 2016 Windows Server 2012

KB3161949 Breaks SMB over NETBIOS Access Outside the Local Subnet

We have just learned what to do with MS16-072 update breaking the familiar GPO mechanism, and there appeared new problems with another security bulletin released in June — MS16-077 and KB3161949 update. After this update is installed on server systems, clients from other subnets are not able to connect to shares using Netbios over TCP/IP.

First of all, the problem appeared with network scanners, which scan documents and save the copies to the network share (SMB) on a server. Documents are no longer saved, and the scanner returns the error: Cannot connect to server. There also appeared some problems with connection of Samba clients to the domain controllers (errors Access Denied or No Logon Server Available). The most interesting thing is that the issues of access to Windows shares appeared only on clients located in subnets other than the server.

After the KB3165191 update has been deleted, there have been no access problems.

Let’s see what the KB3161949 update does. According to its description, the update restricts NETBIOS connections outside local subnet. Thus, network features depending on NETBIOS (like SMB over NETBIOS, ports 137-139) will not work for the clients of other subnets. Common SMB protocol (port 445) is available in both directions.

To change this behavior, you will have to do one of the following:

  • Uninstall security update KB3161949 (not the best way out)
  • Create a Dword parameter with the name AllowNBToInternet and value 1 (after installation of the update it is set to 0) in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\NetBT\Parameters branch of the registry on your server AllowNBToInternetAlso you can perfom this action via cmdreg add "HKLM\System\CurrentControlSet\Services\NetBT\Parameters" /v "AllowNBToInternet" /t REG_DWORD /d 1 /f

    or PowerShell

    Set-ItemProperty -Path HKLM:\SYSTEM\CurrentControlSet\Services\NetBT\Parameters -Name AllowNBToInternet -Type DWord -Value 1

  • After the parameter is created, restart the server.

As a result, the server will get available to NETBIOS clients from other subnets.

1 comment
0
Facebook Twitter Google + Pinterest
previous post
Unable to Connect Windows 10 Shared Printer to Windows XP
next post
Unable to Install Print Driver after KB3170455

Related Reading

How to Filter Event Logs by Username in...

November 17, 2016

Process Priority Management in Windows

June 21, 2016

AutoRedial for VPN Connections in Windows 8/10/2012

May 5, 2016

1 comment

chris October 1, 2019 - 6:29 pm

For a 1 year now I have been searching for the answer to NT can’t map 2016 server share. The registry change works.

Reply

Leave a Comment Cancel Reply

Categories

  • Active Directory
  • Group Policies
  • Exchange Server
  • Microsoft 365
  • Azure
  • Windows 11
  • Windows 10
  • Windows Server 2022
  • Windows Server 2019
  • Windows Server 2016
  • PowerShell
  • VMWare
  • Hyper-V
  • Linux
  • MS Office

Recent Posts

  • Configure User’s Folder Redirection with Group Policy

    February 3, 2023
  • Using Previous Command History in PowerShell Console

    January 31, 2023
  • How to Install the PowerShell Active Directory Module and Manage AD?

    January 31, 2023
  • Finding Duplicate E-mail (SMTP) Addresses in Exchange

    January 27, 2023
  • How to Delete Old User Profiles in Windows?

    January 25, 2023
  • How to Install Free VMware Hypervisor (ESXi)?

    January 24, 2023
  • How to Enable TLS 1.2 on Windows?

    January 18, 2023
  • Allow or Prevent Non-Admin Users from Reboot/Shutdown Windows

    January 17, 2023
  • Fix: Can’t Extend Volume in Windows

    January 12, 2023
  • Wi-Fi (Internet) Disconnects After Sleep or Hibernation on Windows 10/11

    January 11, 2023

Follow us

woshub.com
  • Facebook
  • Twitter
  • RSS
Popular Posts
  • Process Priority Management in Windows
  • How to Filter Event Logs by Username in Windows 2008 and higher
  • AutoRedial for VPN Connections in Windows 8/10/2012
Footer Logo

@2014 - 2023 - Windows OS Hub. All about operating systems for sysadmins


Back To Top