?
Solved

HTTP NetworkPlace through a proxy

Posted on 2001-07-26
6
Medium Priority
?
140 Views
Last Modified: 2010-04-13
HTTP NetworkPlace through a proxy

I am attempting to establish a HTTP NetworkPlace connection to an external  MS Internet Server  with Front Page 2000 extensions installed ? I understand this can be done..

This is through  my companies proxy which requires a password - the connection wizard prompts for the proxy password  - however does not accept it, and the connection is refused.

Using the Front Page 2000 publish HTTP function works fine, the process first requests the proxy password, then the password for the URL and the files a transferred.

Can anyone suggest why the Win2000 ?networkplace? isn?t accepting the proxy password?

AJ
0
Comment
Question by:ajosephson
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 63

Expert Comment

by:SysExpert
ID: 6325415
Make sure the password encryption is set to be compatible between all machines. In can be plain text, NTLM or the newer win2k security.

What proxy is your company running ? If it is an NT4 server, you will need to change the win2k machines to be NT 4 compatible fro passwords.

I hope this helps !
0
 

Author Comment

by:ajosephson
ID: 6325550
A correction to the above ? The connection wizard prompts for and accepts the Proxy Password, then prompts for and accepts the password to the URL.

The  URL is then listed in ?networkplaces? (under ?my computer?). Only when I attempt to access the the URL does the proxy password  prompt appear, and the password is not accepted.

So I would be suprised if it was the way the password was being sent ? eg plain-text?

I appreciate your help..

AJ
0
 
LVL 63

Expert Comment

by:SysExpert
ID: 6326854
1( Check the event and any other logs ( including proxy server  and HTTP server) for the errors. This should give you info regarding the error type and point you in the right direction.
Also see if there is a debugging option available to get more info in these logs.

I hope this helps !
0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 1

Accepted Solution

by:
Moondancer earned 0 total points
ID: 6762508
ajosphson stated in another open/old question that satisfactory results weren't obtained in all of the above questions and would like to receive a refund and PAQ/close it.  Any objections, or anything further you'd like to add to try and complete this collaboration effort?

Thanks,

Moondancer
Community Support Moderator @ Experts Exchange
0
 
LVL 5

Expert Comment

by:Netminder
ID: 6775203
Points refunded and question closed.

Netminder
Community Support Moderator
Experts Exchange
0

Featured Post

How Blockchain Is Impacting Every Industry

Blockchain expert Alex Tapscott talks to Acronis VP Frank Jablonski about this revolutionary technology and how it's making inroads into other industries and facets of everyday life.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
"Any files you do not have backed up in at least two [other] places are files you do not care about."
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question