Solved

New internet gateway problem

Posted on 2004-04-20
6
163 Views
Last Modified: 2010-03-18
Ok, this is a long one. Can't figure it out so far.
The company I work for has a network of about 160 pc's.
They all connect to a rack of switches and get internet access
from a redhat linux box that is used as a proxy server.
It's address is 192.168.1.1 port 8080
We recently purchased a hardware firewall that will also act as the new internet
gateway, it's address is 192.168.1.2
We go to each pc, disable the proxy settings, set the pc's ip to a static one, enter
192.168.1.2 as the gateway and add a dns server address.
In most cases, this works fine. The pc gets it's internet access from the new gateway.
But with about 20 of the pc's, it does not work. Most are 98se machines, but a couple XP pro machines do it too.
And what's even weirder is that on the machines that don't take the settings, I can't even ping the 192.168.1.2 address.
Now here are my thoughts, the guy that built this network (he is no longer here) has some pc's logging into a domain, and others just plain workgroups.
So this network has both, which as far as I know you should stick with one OR the other.
I don't know much about wins, but have a hunch that might play a part as well.
Any help at all is appreciated.
0
Comment
Question by:TuscolaCounty
  • 3
  • 3
6 Comments
 
LVL 16

Accepted Solution

by:
JammyPak earned 250 total points
Comment Utility
hmmm...sorry, but workgroup or domain membership shouldn't make a difference here - unless the proxy server address is being given out using GPO in the domain or something. Ditto for WINS...it won't affect something like pinging an ip address.

hate to say it, but the first thing I would do is re-check the 'static' ip settings you've used...sounds like there's a problem there
0
 

Author Comment

by:TuscolaCounty
Comment Utility
it's not a problem with the static ip's, they are fine. If i leave the static ip, i can ping any address on the network accept the .2, and if i turn the proxy settings back on, i get internet. No ip conflict is shown at startup either. That is not the problem.
0
 

Author Comment

by:TuscolaCounty
Comment Utility
I have fixed this problem so I will give the points to who tried to help.
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 16

Expert Comment

by:JammyPak
Comment Utility
glad it's working - what was the problem?
0
 

Author Comment

by:TuscolaCounty
Comment Utility
well there were a few problems, first of all any pc with an address between 20 and 40 would not work because i set those aside for vpn tunnels, so "duh" on that one.
the other I ended up uninstalling nics and windows networking and reinstalling it all. So it's all good now.
Thanks for the help.
0
 
LVL 16

Expert Comment

by:JammyPak
Comment Utility
glad to try...
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now