[Webinar] Streamline your web hosting managementRegister Today


Map Network Drive

Posted on 2008-01-30
Medium Priority
Last Modified: 2013-12-02
I have foodservice machines that operate on a seperate VLAN.  I need to install a program that hosts a database on a file server that is on a different VLAN than the foodservice computer.  I need to map a network drive to the share on the file server.  I attempted to map the drive but it couldn't find it.  I have full domain admin rights.  Any suggestions?
Question by:yankeegirl

Accepted Solution

cammj earned 1500 total points
ID: 20776932
You will need a router in between the separate vlans as VLANs are infact: seperate networks.
LVL 40

Expert Comment

ID: 20777619
If the server is reachable over IP, you may use the server IP address while specifying the share location, if the server name and IP address is not in hosts file or DNS.



Author Comment

ID: 20777726
okay, I'll give it a try

Featured Post

Creating Active Directory Users from a Text File

If your organization has a need to mass-create AD user accounts, watch this video to see how its done without the need for scripting or other unnecessary complexities.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to deal with a specific error when using the Enable-RemoteMailbox cmdlet to create a mailbox in the cloud-based service, for an existing user in an on-premises Active Directory.
Media Temple is thrilled to announce the launch of our new Partner Program, specifically designed to empower digital agencies and adtech platforms by offering white-glove support and exclusive hosting enhancements to optimize their sites and their c…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

591 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question