?
Solved

Enable IP address restriction in IIS

Posted on 2003-03-31
11
Medium Priority
?
244 Views
Last Modified: 2013-12-04
The Edit tab under directory security is not active. Appears dimmed. How do I go around this to set up IP address restriction. I am running  IIS 5.0 in windows 2000 professional. Have the .Net framework installed.

Girish
0
Comment
Question by:girishpi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 6
  • 4
11 Comments
 
LVL 9

Expert Comment

by:MSGeek
ID: 8240266
I believe that only applies to domains.
0
 

Author Comment

by:girishpi
ID: 8240488
I am not sure I understand. May be I am not clear myself. Can you explain in detail

Let me put my question again. I have IIS 5.0 running on my machine. I want to allow users from specific machines only within my office to access the pages I intend to host from my machine. I am building a MS access database with ASP.Net as the interface.

Girish
0
 
LVL 9

Expert Comment

by:MSGeek
ID: 8240590
Edit Button under directory secuirty tab only applies to domain controllers, you are running this on a win2k pro, thus it is grayed out(not an available option.)
0
When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

 

Author Comment

by:girishpi
ID: 8240677
So it means that either I should have win 2k server on my machine or incorporate it in the code.  

 Is that right?
0
 
LVL 9

Accepted Solution

by:
MSGeek earned 80 total points
ID: 8240746
The prrof is in the pudding (so to they say): http://support.microsoft.com/default.aspx?scid=kb;en-us;263857

Sorry I don't have better news.  So, your answer is yes.  Let Access do your authentication.
0
 

Author Comment

by:girishpi
ID: 8241005
Alright.  

In Access you mean create a table for ipaddress and then use it for authentication.

Is there some way I can do it in code. like a web.config or something.
0
 
LVL 9

Expert Comment

by:MSGeek
ID: 8241102
With a grade of B, you want more help?

A: The Expert(s) either provided you with a thorough answer or they provided you with a link to information that thoroughly answered your question. An "A" can also be given to any answer that you found informative or enlightening beyond the direct question that you asked.

B: The Expert(s) provided an acceptable solution, or a link to an acceptable solution, that you were able to use, although you may have needed a bit more information to complete the task.
0
 

Author Comment

by:girishpi
ID: 8241373
Is there a way I can change the grade.
0
 
LVL 9

Expert Comment

by:MSGeek
ID: 8241488
Yes, post a request in community support with a url to the question.
0
 

Expert Comment

by:SpideyMod
ID: 8242384
Grade changed from B to A per:
http://www.experts-exchange.com/Community_Support/Q_20569303.html

SpideyMod
Community Support Moderator @Experts Exchange


0
 
LVL 9

Expert Comment

by:MSGeek
ID: 8245319
Thanks Spidey & qirishpi.

qirishpi...  This should get you started:
http://support.microsoft.com/default.aspx?scid=kb;en-us;207793
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solutions Engineer Barrett Chambers discusses some of the basic syntax differences between MySQL and MongoDB. To learn more check out our webinar on MongoDB administration for MySQL DBA: https://www.percona.com/resources/we…
Suggested Courses
Course of the Month10 days, 10 hours left to enroll

765 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question