Solved

Different TCP/IP configuration for different users

Posted on 2002-07-02
8
127 Views
Last Modified: 2010-04-13
I have a Windows 2000 PC on a network. Different users use this PC for different purposes. One user requires internet access, while the others are not allowed internet access. Is it possible to set up the one user to receive an IP address from the DHCP server (which allows internet access) while forcing the other users to have manually configured IP addresses (which do not allow internet access)? If so, how. Please provide detailed instructions.

Please note, there is no Windows 2000 or NT server in the network. User configuration is done at the individual PC level.
0
Comment
Question by:bhlang
8 Comments
 
LVL 32

Expert Comment

by:jhance
ID: 7125406
TCP/IP settings are set on a system level, not a user level.  So there is no simple switch you can use to do this.

Have you considered a proxy server at your location?  One that performs user-level authentication would do nicely.
0
 
LVL 5

Expert Comment

by:rajans
ID: 7125472
why don't you create two separate hardware profile?
0
 
LVL 3

Expert Comment

by:ITsheresomewhere
ID: 7125579
You know there is a tool used by folks with laptops that work at the office and away.

It is called netswitcher and it enables you to set up two easy connections, one being a static IP and the other can be a dhcp.  Kind of like static at office, dhcp at home or on the road.

You might want to take a look at this and see if this meets your needs. It is real cheap about 15 or 20 US per license.  And I do think they have a trial download even.

Netswitcher  wwww.netswitcher.com

Hope that helps.
ITsy
0
 

Expert Comment

by:yongli
ID: 7125723
You can install two Windows 2000 OS on one pc;
then one Windows 2000 OS for Internet access ;
other windows 2000 OS for ...

You can force the other users to have manually resetup the windows 2000.

Hope that helps.
0
NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

 

Author Comment

by:bhlang
ID: 7127524
I was kind of hoping for a solution that required no intervention by the users. Most of them are barely computer literate.
0
 

Author Comment

by:bhlang
ID: 7186059
Would a Windows 2000 Server make a difference to this question?
0
 
LVL 6

Expert Comment

by:Mindphaser
ID: 7353209
bhlang didn't receive a satisfying answer for his question and requested it to bo deleted. If there aren't any objections I will refund his points and move the question to PAQ.

** Mindphaser - Community Support Moderator **
0
 
LVL 6

Accepted Solution

by:
Mindphaser earned 0 total points
ID: 7404264
Points refunded and moved to PAQ

** Mindphaser - Community Support Moderator **
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Scenario: Your operations manager has discovered an anomaly in your security system. The business will start to suffer within 15 minutes if it is a major IT incident. What should she do? We have 6 recommendations for managing major incidents (https:…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now