Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Apple Web Server behind firewall

Posted on 1997-11-12
2
Medium Priority
?
296 Views
Last Modified: 2013-11-13
I'm not sure this question belongs to this section.  Nevertheless:

How can I access Apple Personal Web Server running in System 8 behind firewall?  The same question for MS Personal Web Server for Mac.  I've heard that if you explicitly indicate port number after the server name (like http://128.224.28.12:138/, you can get to the server despite firewall.  As I recall, by default the port number was 138, or 148, or something, but I forgot, and could not find the source where I've read this.  Does anybody know?  Or is there a way to set the port number that Personal Web Server will use?
0
Comment
Question by:chumakov
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 5

Accepted Solution

by:
n0thing earned 150 total points
ID: 1581630
Technicaly, you can't access a Web page behind a firewall. It
will simply defeat the purpose of the firewall itself. Web pages
are on the DMZ zone, please read the firewall FAQ for more info.
on it. Web/ftp/telnet are passing thru a proxy, but it's one way,
intertal traffic could pass ... but the firewall will block any
incoming request for any machine on the internal network.
If your admin are opening "holes" in your firewall to let Web traffic pass thru the firewall to access an internal machine, they're simply clueless. By the way, the port could be anything.
The default port for HTTP protocol is 80.

Minh Lai
0
 

Author Comment

by:chumakov
ID: 1581631
Thanks for your answer.  I may have mixed up something, perhaps what I've read was not about web server, but about AppleTalk IP behind firewall.  The purpose of firewalls is pretty clear to me, but unfortunately too many system administrators abuse the concept, being paranoid about unauthorized access.  Which in my view isn't big deal in 99% of cases.

Anyway, thank you for your time.

0

Featured Post

Tech or Treat! - Giveaway

Submit an article about your scariest tech experience—and the solution—and you’ll be automatically entered to win one of 4 fantastic tech gadgets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article we will discuss some EI Capitan Mail app issues and provide some manual process to resolve them.
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question