Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

Proxy server 2.0 installation!

Posted on 2000-03-12
4
220 Views
Last Modified: 2013-12-19
I want to install proxy server 2.0 on NT Server 4.0. What is the detail procedure? How can I find this information in M$ web site?

Thanks!
0
Comment
Question by:kevinc29
4 Comments
 
LVL 23

Expert Comment

by:Tim Holman
ID: 2611564
0
 
LVL 5

Expert Comment

by:hiandras
ID: 2613485
Good link. :-)
0
 

Expert Comment

by:ntguru
ID: 2613835
Keep an eye on my question regarding decreased bandwidth from Proxy. It will be nice to know when you set up yours...
0
 
LVL 12

Accepted Solution

by:
Housenet earned 20 total points
ID: 2614334
http://support.microsoft.com/support
-Choose to search the KB then enter "Setup proxy".

-Basically dude you need 2 NICS.. one inside, one outside. Run proxy setup and build the LAT based on routes from inside NIC. Dont enable access control untill you test it out first.
0

Featured Post

Free Tool: IP Lookup

Get more info about an IP address or domain name, such as organization, abuse contacts and geolocation.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Massive network latency 1 66
Windows 10 nic replacing assing ip address 6 48
Setting up a VPN 60 177
Transfering files via a single Cat5 between two DOMAIN computers. 14 111
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
In an interesting question (https://www.experts-exchange.com/questions/29008360/) here at Experts Exchange, a member asked how to split a single image into multiple images. The primary usage for this is to place many photographs on a flatbed scanner…

789 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question