VPN connection breaks my route to a server

Posted on 2009-04-21
Last Modified: 2012-05-06
I need to make a static path to fix my problem i believe.
I try to add the route but it give me a 'requires elevation'
Question by:mphillip85
    LVL 77

    Expert Comment

    by:Rob Williams
    I assume you are running Vista or server 2008?
    You need to be logged in as a member of the local administrators group, but you also have to elevate your privlages. To do so:
    Right click on the command icon and choose "run as administrator", or enter cmd in the search box and press ctrl+shift+enter simultaneously. You will note "administrator' on the title bar of the command window. This will allow you to add the route.

    Author Comment

    I did go to administrator mode, but did not work.

    I need to get to IP server.  So can you give me the syntax of what the command should be like just in case I messed it up.

    Thank You
    LVL 77

    Accepted Solution

    I am afraid you have not provided enough information to provide the specific route.
    Normally a packet destined for an IP that is not accesible on the local LAN is sent to the default gateway. If that is not the correct next hop you need to add a route. If for example there is an additioanal routing device conneced to the network segment with a local IP of then you would use a route like:
    route add mask
    or to add the remote subnet:
    route add mask
    adding -p makes it permanent
    route -p add mask
    to delete the route:
    route delete
    LVL 77

    Expert Comment

    by:Rob Williams
    Thanks mphillip85

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    What Is Threat Intelligence?

    Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

    Suggested Solutions

    Some of you may have heard that SonicWALL has finally released an app for iOS devices giving us long awaited connectivity for our iPhone's, iPod's, and iPad's. This guide is just a quick rundown on how to get up and running quickly using the app. …
    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Here's a very brief overview of the methods PRTG Network Monitor ( offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now