We had this problem and, after some digging, I realized that the A2MC controller appears to be using an old authentication protocol (LAN Manager) that newer operating systems don't support, by default, as it is outdated and insecure.
To allow Windows 8.1 (or 7) machines to see the A2MC\hdd1 file share, you must turn on LM and NTLM Lan Manager authentication by setting the Local Security policy.
- Run secpol.msc on the desired Windows machine (press the "Windows" key on the keyboard, type "secpol.msc", right click and choose "Run as Administrator")
- Navigate to "Local Policies" -> "Security Options" -> "Network Security: LAN Manager authentication level"
- Change to "Send LM & NTLM - user NTLMv2 session security if negotiated". Apply the setting
- Test the setting by opening Windows Explorer and typing \\a2mc-XXXXX in the address bar (XXXX being your specific to your a2mc config*). You should see the HDD1 and WINDOWS folders appear.
*You can find your \\a2mc-XXXXX by entering FUNCTION, 1 on the machine's hand console and pressing ENTER until you see the "IP: A2MC-XXXX" setting
We hope this saves someone the frustration we had trying to upgrade our operating systems to something that isn't antiquated.
Text from the Local Security Policy entry:
Code:
Network security: LAN Manager authentication level
This security setting determines which challenge/response authentication protocol is used for network logons. This choice affects the level of authentication protocol used by clients, the level of session security negotiated, and the level of authentication accepted by servers as follows:
Send LM & NTLM responses: Clients use LM and NTLM authentication and never use NTLMv2 session security; domain controllers accept LM, NTLM, and NTLMv2 authentication.
Send LM & NTLM - use NTLMv2 session security if negotiated: Clients use LM and NTLM authentication and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication.
Send NTLM response only: Clients use NTLM authentication only and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication.
Send NTLMv2 response only: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers accept LM, NTLM, and NTLMv2 authentication.
Send NTLMv2 response only\refuse LM: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers refuse LM (accept only NTLM and NTLMv2 authentication).
Send NTLMv2 response only\refuse LM & NTLM: Clients use NTLMv2 authentication only and use NTLMv2 session security if the server supports it; domain controllers refuse LM and NTLM (accept only NTLMv2 authentication).
Important
This setting can affect the ability of computers running Windows 2000 Server, Windows 2000 Professional, Windows XP Professional, and the Windows Server 2003 family to communicate with computers running Windows NT 4.0 and earlier over the network. For example, at the time of this writing, computers running Windows NT 4.0 SP4 and earlier did not support NTLMv2. Computers running Windows 95 and Windows 98 did not support NTLM.
Default:
Windows 2000 and windows XP: send LM & NTLM responses
Windows Server 2003: Send NTLM response only
Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2: Send NTLMv2 response only