Solved

netsh int ip reset

Posted on 2011-03-01
4
1,019 Views
Last Modified: 2012-05-11
I used RDP to a remote computer (W2k3)
I have run
netsh int ip reset c:\resetlog.txt
then rebooted the computer--- but the computer never came back up.
Now if I take a trip to the location where the computer is located then physically login to the console, would the IP address /subnet mask/ default gateway configuration still be there?
I know the IP address and hostname since they are in DNS and they show up when I ping the computer, but if I will have to re-configure the subnet mask or specially the default Gateway I will have no idea what was the previous DG?

Any idea on this?

Thanks


0
Comment
Question by:jskfan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 39

Accepted Solution

by:
Krzysztof Pytko earned 250 total points
ID: 35005544
Check any other computer in that location :) Run on it in command-line

ipconfig /all

and you will fing subnet mask, default gateway and DNS servers list :)

That's for staically configured machine. If you have DHCP, then it should pull IP lease automatically from DHCP server.

Regards,
Krzysztof
0
 
LVL 7

Assisted Solution

by:FemSteenkamp
FemSteenkamp earned 250 total points
ID: 35005951
look in the text file c:\resetlog.txt
that you piped the result to, this will contain the olde values  and if it was unable to change the existing values to tehse again.



0
 

Author Closing Comment

by:jskfan
ID: 35024497
thanks
0
 
LVL 39

Expert Comment

by:Krzysztof Pytko
ID: 35024530
You're welcome :)
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

by Batuhan Cetin Within the dynamic life of an IT administrator, we hold many information in our minds like user names, passwords, IDs, phone numbers, incomes, service tags, bills and the order from our wives to buy milk when coming back to home.…
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Attackers love to prey on accounts that have privileges. Reducing privileged accounts and protecting privileged accounts therefore is paramount. Users, groups, and service accounts need to be protected to help protect the entire Active Directory …

740 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question