Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Apply proxy tick box and IP information on and off using scripts

Posted on 2007-11-29
1
311 Views
Last Modified: 2012-06-27
Hi all,

Anyone know of a script that will be able to turn the proxy tick box on and off and auto IP?
I have a user that is not so confident about using the laptop. They have two connections, one at work and then we have setup a home network using router.

At work they are assigned a static IP address in Class A. At home they get an IP in the c class automatically by the router.

I have found a VBS script that will allow me to fix this, but what I want to do is have two batch files, one for work, one for home on their desktop.

They click work batch file and the following happens,

sets IP address info for IP, subnet, no gateway, DNS
Ensures proxy tick box is on (proxy details are already stored- just grey out when off)

and then the reverse for home

sets IP address to obtain automatically,
removes proxy tick box and automatically detect settings.

The static IP is not too bad as I have a VBS code that will do this, but stuck on the proxy settings and also how to set back to automatic IP.

Any ideas?
0
Comment
Question by:SeventhZen
1 Comment
 
LVL 6

Accepted Solution

by:
kamleshgwalani earned 500 total points
ID: 20372706
Why dont you use Altenative Connection, please read more here
http://support.microsoft.com/kb/283676

It works for us and hope for you too..
0

Featured Post

How our DevOps Teams Maximize Uptime

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us. Read the use case whitepaper.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
2 Subnets, 2 routes, failover routing ? 3 55
Internet Service Provider 3 55
How to simulate latency? 5 40
Performance monitors 6 18
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question