Hmm, maybe if you can script your way out of creating a connection with the client, but standard the client is not on-demand controlled, but is only activated thorugh user-interaction. Another far better way would be a small pix-501 for creating the vpn tunnel instead.
True a 501 would be better, but you can do this easily enough with someting as easy as batch files. I have a sales guy who is terrible at updating his schedule so I installed a batch file on his PC that opens the VPN tunnel, maps a shared drive, runs ACT!, allows for ACT! to sync up. Then at the end of the day another batch file un maps the drive, and disconnects the VPN. He has to turn off ACT on his own, but all in all it works great. Even he cannot mess it up. Plus it saved having to get a dedicated hardware alternative for simple stuff like this. You are better off in the long run with a 501 for more reasons than this problem, but you can get away without one if this is the only problem you have.
Look on Cisco's CCO site for the DOS commands for the VPN client. They are faily robust and easy to use. You can use this with Task Scheduler to make it happen at specific times, or many times within a set period, or whatever. You can use it as a call from another batch file and then call up the app that is driving this need too. However you like it, it can be done. Just find the right commnads, and use your creativity a bit to get past those tricky moments since batch files are not a perfect fit for everything.
Also you can tell me what you are trying to do, and I could tell what commands I used to do that. If you are just trying to get a VPN client to connect within a batch file, the command is
c:\Path\to\vpn\client\vpnclient connect profilename of your connection
I also use the switch that tells the program not to verify the logon info with the user, but I forget what that was. I could find out next time a user logs in.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.