Do you have any static routes on that PC that you may not be aware of? Or entries in your hosts file? If no to either then you may want to run WireShark on Win7-1 then try to RDP to it and see if the request is reaching it and if it is what's happening to it.
R0bR --
Before I begin, I need to say that I really appreciate the efforts you have put into this, but I fully recognize that you have a life, and, as we say here in the South, "You didn't take me to raise." If you have had enough of this tar-baby, just disengage. I will fully understand and still be appreciative of what you have taught me already.
So, having said that:
1. Static routes -- To my knowledge at present, I know of none. Neither do I know how to find one that I didn't know about.
2. "entries in your hosts file" -- I do not have a "hosts" file other than a sample file that is lurking down in the \winsxs\amd64 . . .\ folder. This is also true of my other 64-bit machine, Win7-2.
3. WireShark:
Wow, that is like trying to get a drink of water from a fire hose! I ran it a couple of times for practice, then disconnected the modem from DSL to cut down unrelated traffic and ran it again. I tried three times to RDP from Surface, without success. Some observations: [Note: .73 = Win7-1; .126 = Surface; .254 = Router]
* There were nine instances of a Source .126 with a Destination .73. They looked like this:
Code:
19 6.099731000 192.168.1.126 192.168.1.73 TCP 66 53599 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
20 6.999555000 Spanning-tree-(for-bridges)_01 Broadcast 0x8874 60 Ethernet II
26 9.468112000 192.168.1.126 192.168.1.73 TCP 66 53599 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
140 18.985001000 192.168.1.126 192.168.1.73 TCP 62 53599 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1
215 37.552677000 192.168.1.126 192.168.1.73 TCP 66 53602 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
224 40.562836000 192.168.1.126 192.168.1.73 TCP 66 53602 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
252 46.563165000 192.168.1.126 192.168.1.73 TCP 62 53602 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1
387 66.323444000 192.168.1.126 192.168.1.73 TCP 66 53604 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
399 69.344286000 192.168.1.126 192.168.1.73 TCP 66 53604 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=256 SACK_PERM=1
429 75.344792000 192.168.1.126 192.168.1.73 TCP 62 53604 > ms-wbt-server [SYN] Seq=0 Win=8192 Len=0 MSS=1460 SACK_PERM=1
430 75.995551000 Spanning-tree-(for-bridges)_01 Broadcast 0x8874 60 Ethernet II
In no instance did the next event appear to resemble a response. Mostly they were "Spanning-tree, etc." or other unrelated business by the router, such as "Who has ... ?
* Many, if not most, of the instances involving .73 have red letters on a black background (most) or yellow letters on a red background. A pop-up window tells me that this indicates something invalid, but I know not what. The recited events above were all black letters on gray background.
* Almost all (maybe one exception) events with .73 as a Source were red letters (majority) or yellow letters (a few). Events with .73 as a Destination were a mixed bag of mostly green and blue, with a smattering of the other colors. Most of the .73 Source events have a .254 Destination.
* Here are the initial exchanges between .73 and .254, as it appears that they didn't get off to a good start:
Code:
32 11.729055000 192.168.1.73 192.168.1.254 DNS 84 Standard query 0x3594 A cn1.redswoosh.akadns.net
33 11.754539000 192.168.1.254 192.168.1.73 DNS 207 Standard query response 0x3594 A 192.168.1.254
34 11.755048000 192.168.1.73 192.168.1.254 TCP 66 49722 > https [SYN] Seq=0 Win=8192 Len=0 MSS=1460 WS=4 SACK_PERM=1
35 11.756235000 192.168.1.254 192.168.1.73 TCP 66 https > 49722 [SYN, ACK] Seq=0 Ack=1 Win=32768 Len=0 MSS=1460 SACK_PERM=1 WS=1
36 11.756266000 192.168.1.73 192.168.1.254 TCP 54 49722 > https [ACK] Seq=1 Ack=1 Win=65700 Len=0
37 11.756347000 192.168.1.73 192.168.1.254 TLSv1 182 Client Hello
38 11.770113000 192.168.1.254 192.168.1.73 TLSv1 184 Server Hello, Change Cipher Spec, Encrypted Handshake Message
39 11.770254000 192.168.1.73 192.168.1.254 TLSv1 105 Change Cipher Spec, Encrypted Handshake Message
40 11.770434000 192.168.1.73 192.168.1.254 TLSv1 83 Encrypted Alert
41 11.771743000 192.168.1.254 192.168.1.73 TCP 60 https > 49722 [ACK] Seq=131 Ack=210 Win=32768 Len=0
42 11.776145000 192.168.1.254 192.168.1.73 TLSv1 83 [TCP ZeroWindow] Encrypted Alert
43 11.776170000 192.168.1.73 192.168.1.254 TCP 54 49722 > https [RST, ACK] Seq=210 Ack=160 Win=0 Len=0
44 11.999260000 Spanning-tree-(for-bridges)_01 Broadcast 0x8874 60 Ethernet II
I saved the output file (544 events), if there is something specific I should look for, just let me know.
Thanks for everything and take care,
Russ