Solved

Any Third-Party Solution and Changing DHCP IP and Applications

Posted on 2014-04-01
3
200 Views
Last Modified: 2014-04-10
In my company, desktop computers get their IP address every 8 days via DHCP.  We are trying to push a client software that requires an IP address from the desktop computers in order for it to work.  When their computers gets a new IP address, and the end-users go to use the client application, it is going to give an error message stating 'selected network interface is invalid, please select network interface (IP) to connect to application'.  This is will be troublesome because the users (800-users) will have to be shown how to chose the IP in the client software's interface.

Are their any methods to manage this scenario and that can be scripted or third=party application, etc.

Thanks
0
Comment
Question by:ninpo23
  • 2
3 Comments
 
LVL 9

Expert Comment

by:stu29
Comment Utility
Have you thought about turning the leases in to reservations?  This way the IP's would never change?
0
 

Author Comment

by:ninpo23
Comment Utility
Stu29...thanks for the suggestion and this would work but we have 800 computers and laptops and then many more are added or removed from the domain (new computers, reimages, etc) and then I was under the impression that there would be a scope with a range of IP with in that scope and that it simply a matter of picking that scope in DHCP and right-clicking the scope to put the scope in reservation but I was told it was creating a new scope and manually adding in those 800 IP and MAC addresses, etc...
0
 
LVL 9

Accepted Solution

by:
stu29 earned 500 total points
Comment Utility
You can select all active leases and right click .. add to reservation.  This will add the existing lease to a reservation for you.  From there you would just need to delete old computers and add new.  You can sort in the Leases window in DHCP snapin by lease expiration and you will easily see reservations from leases with expiring times (non reservations).
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Are you one of those front-line IT Service Desk staff fielding calls, replying to emails, all-the-while working to resolve end-user technological nightmares? I am! That's why I have put together this brief overview of tools and techniques I use in o…
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

7 Experts available now in Live!

Get 1:1 Help Now