How about the gateway and the subnet mask?       What happens if you
traceroute to the switch?

-ASB: http://about.me/Andrew.S.Baker

Sent from my Motorola Droid
 On Jul 7, 2011 7:41 AM, "Bob Hartung" <[email protected]> wrote:

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to