Solved

Where is the routing table stored Win 2K/XP?

Posted on 2002-03-13
12
369 Views
Last Modified: 2008-02-07
I wanted to know how to update the "raw" routing table for Windows XP Pro or Windows 2000 Pro. I do not want to use the "route" command.
0
Comment
Question by:parms
  • 4
  • 3
  • 3
  • +2
12 Comments
 
LVL 11

Expert Comment

by:geoffryn
ID: 6861136
Update this registry key.

 HKEY_LOCAL_MACHINE
    \SYSTEM
      \CurrentControlSet
        \Services
          \Tcpip
            \Parameters
              \PersistentRoutes
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6861142
One caveat, the routes will only be in effect after a reboot.  The active routing table is held in memory and can only be modified by the route.exe or another programatic means.
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6865878
I know you say you don't want to use the route command - but is there a particular reason why?  If you want to add a persistent route without modifying the registry, you can do so with the route command.  Just add the -p switch.
0
What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

 

Author Comment

by:parms
ID: 6865983
I'm trying to use Nortel's Contivity VPN software version 4.15 on Windows XP. On Windows 2000, I used a previous version and could use the route command to change the routing table, enabling me to use the Internet and E-mail on my local computer, as well as being connected to the VPN. With V 4.10 onwards of the VPN software (the only ones that run on XP), when the routing table changes (using the route command) the software drops the connection with a message complaining that the routing table had changed.
I was thinking that perhaps I could change the table "manually" to see if the VPN software picked that up.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6866182
Doesn't that violate your company security policy?  If you route around your VPN, you create a back door into your corporate network.
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6866191
This concept is called split-tunneling and many times you have to enable it in order to get around the fact that everything is forced over the VPN.  This is definitely more efficient.  

Many VPN clients, such as the new Cisco clients come with a built in firewall, to block intrusion attempts while the tunnel is up.  

I would check with Nortel to find out their support of split-tunnels and firewall protection for clients.
0
 
LVL 11

Expert Comment

by:geoffryn
ID: 6866200
I am aware of the concept.  Checkpoint has been using an encrypted topology verson of split tunneling for years.  My question was more one of policy.  
0
 

Author Comment

by:parms
ID: 6866229
Well... as far as company policy is concerned, the CEO mandated this route setup in the first place.
In any case, the PC's running the VPN software are actually behind firewalls, so our security guys don't seem too unhappy about "split-tunneling".
0
 
LVL 8

Expert Comment

by:scraig84
ID: 6867656
Geoffryn - so you know - the intended audience of my last post was not you, it was parms.  I was not trying to insult your knowledge - I was only clarifying for parms.

Parms - have you checked with Nortel then to see how they support split tunnels?  Often it is as simple as a checkbox.  It msy be more than that, but I would think it supports it at the very least.
0
 

Author Comment

by:parms
ID: 6867870
This is from the "Help" section of the VPN Software:

"The Contivity VPN Switch administrator can set up a default route on the Switch to forward traffic to the Internet. If this default route is not configured, you will need to disconnect the Contivity connection to web browse the Internet..."

Since the switch is on a Client's site, and they are not willing (or able) to perform the above task, it would appear that I'm stuck.
0
 

Expert Comment

by:CleanupPing
ID: 9155802
parms:
This old question needs to be finalized -- accept an answer, split points, or get a refund.  For information on your options, please click here-> http:/help/closing.jsp#1 
EXPERTS:
Post your closing recommendations!  No comment means you don't care.
0
 

Accepted Solution

by:
SpazMODic earned 0 total points
ID: 9534090
PAQ & No Refund

Experts: As there was a problem closing this question you may receive 2 EMail notif's please disregard)

SpazMODic
EE Moderator
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Short answer to this question: there is no effective WiFi manager in iOS devices as seen in Windows WiFi or Macbook OSx WiFi management, but this article will try and provide some amicable solutions to better suite your needs.
If your business is like most, chances are you still need to maintain a fax infrastructure for your staff. It’s hard to believe that a communication technology that was thriving in the mid-80s could still be an essential part of your team’s modern I…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question