• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 244
  • Last Modified:

Can I control the route my traffic takes without adding hardware?

I host my server at a multi-homed datacenter, but I want to be able to control what backbone and/or route it takes to get to another address. Is this possible? I assume it is possible if I add some sort of networking hardware, but is it possible with some kind of software running on the box?

This is really important to my business, and so any advice would really be appreciated.

Thanks in advance.
0
timdr
Asked:
timdr
  • 2
1 Solution
 
BrughCommented:
Yes.  You can do that by manipulating your routing tables on the sever.

If its windows and you say you have multiple "gateways" that the server can use.

So you could open a command prompt.
Type
route print  <enter>
This will show you all the "routes" you system knows about.
the Default route of 0.0.0.0 will be used for ALL traffic that isn't specifically mentioned in a routing statement.

What you want to do to manipulate this is;
1 - Find out the IP addresses of the Gateways that you have available to you.  (may have to get that from your Datacenter)
2 - Figure out which "gateway" you want to route through. (which backbone)
3 - Figure out the destination address that you are sending the packets too. (IP or subnet address of the destination)
3 - Open command prompt.
Type route add <Destination> MASK 255.255.255.255 <Gateway IP>

Microsoft Write up.
http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-us/sag_tcpip_pro_addstaticroute.mspx?mfr=true

HTH

 - Brugh
 
route add
0
 
BrughCommented:
Forgot to mention.
For the MASK you will need to match the mask with the Destination IP.  Meaning, if you are creating a route to reach a single address, you would use 255.255.255.255.  If you are creating a route to reach an entire subnet (grouping of common IPs) you wil lthen need to use the same mask as the destination subnet.  (ex, 255.255.255.0)

 - Brugh
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

  • 2
Tackle projects and never again get stuck behind a technical roadblock.
Join Now