Configuring Routing in W2K Pro/XP Pro

Routing is configured on a W2K Server / Windows Server 2003 machine by use of the RRAS snap-in. However, this console is NOT available on a W2K Pro or XP Pro machine.

If you have 2 small network segments populated with no more than a handful of computers per segment, you CAN use a W2K Pro / XP Pro machine as a router between these segments.

First, you need to install at least 2 NICs on the machine.

Sponsored Content

Maximize Value from Microsoft Defender

In this ebook, you’ll learn why Red Canary’s platform and expertise bring you the highest possible value from your Microsoft Defender for Endpoint investment, deployment, or migration.

Now you need to configure each NIC with the appropriate IP address for the segments that it’s connected to.

Next, you need to configure that IP as the Default Gateway for all the computers on that NIC.

For example, if you have 2 segments (we’ll call them Segment A and Segment B respectively) with the following Network IDs:

  • Segment A –

  • Segment B –

(/24 means – see my What’s CIDR? page for more info)

and on your computer you have 2 NICs (we’ll call them NIC A and NIC B respectively) with the following IP addresses:

  • NIC A –

  • NIC B –

Then the IP addresses of NIC A and NIC B will be the Default Gateways for segment A and B respectively.

Next, you need to configure IP Routing between the segments. As I said, this feature is not configurable via any GUI in W2K Pro and XP Pro, so you’ll need to edit the registry:

  1. In the Run command type Regedit.exe and press Enter.

  2. In the registry navigate to

  1. Select the "IPEnableRouter" entry (by default the value is 0) and change it’s value to 1.

  2. Close Regedit.

  3. Reboot.


Related Topics:

External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by: