Solved

vpn connections in a batch file

Posted on 2006-06-15
3
477 Views
Last Modified: 2012-05-12
Hi

I have set up several vpn connections to different companies. These can be seen in the network connections area inside the control panel.
I have put the username and passwords in so when you double click on the icon and then press return it will connect automatically.
Once i have done this i then run a batch file which connects certain drive letters to  remove shares on a server. I then do a remote backup for disaster recovery purposes.

I would likle to do all of this automaticaly, ie.
connect to company 1, run the first remote backup batch job.
disconnect from company 1
connect to company 2, run second backup batch job.

is there anyway of doing this in one big batch job. I do not know how to start the vpn connections atuomatically.

sed
0
Comment
Question by:thomasmore
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 77

Accepted Solution

by:
Rob Williams earned 250 total points
ID: 16914027
You may be able to create a single batch file in which RASDial creates the connection, and then the rest of the same batch file would have your mapping and batch file commands. I haven't used RASDial but it is often used to automate dial up or VPN connections, often as a scheduled event. (l\thanks to prueconsulting for the link)
http://technet2.microsoft.com/WindowsServer/en/Library/c3f953ab-2af4-4811-9c70-9a67e5237e121033.mspx?mfr=true
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question