How about the gateway and the subnet mask? What happens if you traceroute to the switch?
-ASB: http://about.me/Andrew.S.Baker Sent from my Motorola Droid On Jul 7, 2011 7:41 AM, "Bob Hartung" <[email protected]> wrote: ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
