Solved

Where is the routing table stored Win 2K/XP?

Posted on 2002-03-13
12
372 Views
Last Modified: 2008-02-07
I wanted to know how to update the "raw" routing table for Windows XP Pro or Windows 2000 Pro. I do not want to use the "route" command.
0
Comment
Question by:parms
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 3
  • +2
12 Comments
 
LVL 11

Expert Comment

by:geoffryn
ID: 6861136
Update this registry key.

 HKEY_LOCAL_MACHINE
    \SYSTEM
      \CurrentControlSet
        \Services
          \Tcpip
            \Parameters
              \PersistentRoutes
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6861142
One caveat, the routes will only be in effect after a reboot.  The active routing table is held in memory and can only be modified by the route.exe or another programatic means.
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6865878
I know you say you don't want to use the route command - but is there a particular reason why?  If you want to add a persistent route without modifying the registry, you can do so with the route command.  Just add the -p switch.
0
Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

 

Author Comment

by:parms
ID: 6865983
I'm trying to use Nortel's Contivity VPN software version 4.15 on Windows XP. On Windows 2000, I used a previous version and could use the route command to change the routing table, enabling me to use the Internet and E-mail on my local computer, as well as being connected to the VPN. With V 4.10 onwards of the VPN software (the only ones that run on XP), when the routing table changes (using the route command) the software drops the connection with a message complaining that the routing table had changed.
I was thinking that perhaps I could change the table "manually" to see if the VPN software picked that up.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6866182
Doesn't that violate your company security policy?  If you route around your VPN, you create a back door into your corporate network.
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6866191
This concept is called split-tunneling and many times you have to enable it in order to get around the fact that everything is forced over the VPN.  This is definitely more efficient.  

Many VPN clients, such as the new Cisco clients come with a built in firewall, to block intrusion attempts while the tunnel is up.  

I would check with Nortel to find out their support of split-tunnels and firewall protection for clients.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6866200
I am aware of the concept.  Checkpoint has been using an encrypted topology verson of split tunneling for years.  My question was more one of policy.  
0
 

Author Comment

by:parms
ID: 6866229
Well... as far as company policy is concerned, the CEO mandated this route setup in the first place.
In any case, the PC's running the VPN software are actually behind firewalls, so our security guys don't seem too unhappy about "split-tunneling".
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6867656
Geoffryn - so you know - the intended audience of my last post was not you, it was parms.  I was not trying to insult your knowledge - I was only clarifying for parms.

Parms - have you checked with Nortel then to see how they support split tunnels?  Often it is as simple as a checkbox.  It msy be more than that, but I would think it supports it at the very least.
0
 

Author Comment

by:parms
ID: 6867870
This is from the "Help" section of the VPN Software:

"The Contivity VPN Switch administrator can set up a default route on the Switch to forward traffic to the Internet. If this default route is not configured, you will need to disconnect the Contivity connection to web browse the Internet..."

Since the switch is on a Client's site, and they are not willing (or able) to perform the above task, it would appear that I'm stuck.
0
 

Expert Comment

by:CleanupPing
ID: 9155802
parms:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 

Accepted Solution

by:
SpazMODic earned 0 total points
ID: 9534090
PAQ & No Refund

Experts: As there was a problem closing this question you may receive 2 EMail notif's please disregard)

SpazMODic
EE Moderator
0

Featured Post

Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question