Solved

How to add routes to all domain computers to use 2 routers

Posted on 2003-11-10
2
265 Views
Last Modified: 2010-04-13
HI,

setup:

Win2K domain, 35WinXP PC's, 4 Win2/3k servers.
1 Leased line router,  1 ADSL router

- Leased line router to china used for Citrix and Term. Serv app,
- ADSL router for specific web traffic.
- A Symantec Proxy takes care of policy enforced web traffic through the ADSL.
- THe DHCP gives a default router (leased line) option to the computers so even if they disable the proxy use for surfing they can't get on the web (they'll try to resolve on the intranet leased line).

I need to give access to one IP address on the net trough the ADSL line

I can do this by manualy adding a route to every PC like

Route Add 213.156.0.0 MASK 255.255.255.48 10.0.0.1 METRIC 1

Can't I do this programaticly or any other easy way?

thanks


ez
0
Comment
Question by:ezjurgen
2 Comments
 
LVL 6

Accepted Solution

by:
rj-smith earned 125 total points
ID: 9714463

Well if it's only one user then not much need to do it programmatically but you could use a logon script I guess. However unless you built some logic into the script then it would be applied to all workstations.

If you use something like kixtart (www.kixtart.org) in your logon scripts then you can get quite sophisticated and have the script detect the client IP address and then add the route if necessary (or remove the route if necessary).

If you want to avoid scripting and your leased line router is managed by yourself then you could simply add a route to it (since it's your default gateway) and add an acl or filter on your ADSL router to only allow traffic from certain IP addresses, i.e. your proxy server and other allowed IP addresses.

Just a comment on your route statement above, if you want the route to be presistent then you need to use the -p flag.

Hope that helps.
0
 
LVL 1

Author Comment

by:ezjurgen
ID: 9897000
any idea how to do this via vbscripts? Logon script is in vb....


jurgen
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Windows 2000 and 2008 Servers Network Stopping 7 916
kerberos errors 7 544
VSS on host & VM 10 391
Running Baan iV on VMware 3 72
NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
We have come a long way with backup and data protection — from backing up to floppies, external drives, CDs, Blu-ray, flash drives, SSD drives, and now to the cloud.
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now