Solved

Different TCP/IP configuration for different users

Posted on 2002-07-02
8
125 Views
Last Modified: 2010-04-13
I have a Windows 2000 PC on a network. Different users use this PC for different purposes. One user requires internet access, while the others are not allowed internet access. Is it possible to set up the one user to receive an IP address from the DHCP server (which allows internet access) while forcing the other users to have manually configured IP addresses (which do not allow internet access)? If so, how. Please provide detailed instructions.

Please note, there is no Windows 2000 or NT server in the network. User configuration is done at the individual PC level.
0
Comment
Question by:bhlang
8 Comments
 
LVL 32

Expert Comment

by:jhance
ID: 7125406
TCP/IP settings are set on a system level, not a user level.  So there is no simple switch you can use to do this.

Have you considered a proxy server at your location?  One that performs user-level authentication would do nicely.
0
 
LVL 5

Expert Comment

by:rajans
ID: 7125472
why don't you create two separate hardware profile?
0
 
LVL 3

Expert Comment

by:ITsheresomewhere
ID: 7125579
You know there is a tool used by folks with laptops that work at the office and away.

It is called netswitcher and it enables you to set up two easy connections, one being a static IP and the other can be a dhcp.  Kind of like static at office, dhcp at home or on the road.

You might want to take a look at this and see if this meets your needs. It is real cheap about 15 or 20 US per license.  And I do think they have a trial download even.

Netswitcher  wwww.netswitcher.com

Hope that helps.
ITsy
0
 

Expert Comment

by:yongli
ID: 7125723
You can install two Windows 2000 OS on one pc;
then one Windows 2000 OS for Internet access ;
other windows 2000 OS for ...

You can force the other users to have manually resetup the windows 2000.

Hope that helps.
0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 

Author Comment

by:bhlang
ID: 7127524
I was kind of hoping for a solution that required no intervention by the users. Most of them are barely computer literate.
0
 

Author Comment

by:bhlang
ID: 7186059
Would a Windows 2000 Server make a difference to this question?
0
 
LVL 6

Expert Comment

by:Mindphaser
ID: 7353209
bhlang didn't receive a satisfying answer for his question and requested it to bo deleted. If there aren't any objections I will refund his points and move the question to PAQ.

** Mindphaser - Community Support Moderator **
0
 
LVL 6

Accepted Solution

by:
Mindphaser earned 0 total points
ID: 7404264
Points refunded and moved to PAQ

** Mindphaser - Community Support Moderator **
0

Featured Post

Highfive + Dolby Voice = No More Audio Complaints!

Poor audio quality is one of the top reasons people don’t use video conferencing. Get the crispest, clearest audio powered by Dolby Voice in every meeting. Highfive and Dolby Voice deliver the best video conferencing and audio experience for every meeting and every room.

Join & Write a Comment

Suggested Solutions

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
Is your company's data protection keeping pace with virtualization? Here are 7 dynamic ways to adapt to rapid breakthroughs in technology.
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now