Solved

I COnnected to VPN...now what do i do

Posted on 2004-10-04
1
195 Views
Last Modified: 2010-03-18
I COnnected to VPN...now what do i do....it shows its connected and everything is fine. I tried to ping a computer at the office, it doesnt ping. I actually tried to ping the server its connected to ..no answer, i cant get into the comoputers at the office anymore than i could before and it shows its connected..how does it work? someonme please help!! I'm using windows 2003 server and xp as the client. I set up RAS and connected to it.
please help


a
0
Comment
Question by:mrperfect75000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 15

Accepted Solution

by:
adamdrayer earned 50 total points
ID: 12237572
you may need to configure a static route to your computers at the office if the following are both true:

a. your office computers use a internal network addressing scheme (192.168.x.x, 10.x.x.x, or 172.16-32.x.x)
b. your VPN does not issue this static route by default to VPN clients


after connecting to the VPN type the following at a command prompt:
ROUTE ADD w.w.w.w MASK x.x.x.x y.y.y.y

where
w.w.w.w = the IP address of the network portion of your office Segment (should end in at least one '0')
x.x.x.x =  the subnet mask of your office
y.y.y.y = the public IP address of the VPN you are connecting to

here's how it would look if your computer at work ranged from 192.168.1.1 to 192.168.1.254
route add 192.168.1.0 mask 255.255.25.0 y.y.y.y
(don't your your VPN device's IP address)
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
Do you want to know how to make a graph with Microsoft Access? First, create a query with the data for the chart. Then make a blank form and add a chart control. This video also shows how to change what data is displayed on the graph as well as form…

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question