Solved

I have two computer. One is in a LAN,and another is outside the LAN.

Posted on 2003-10-21
3
202 Views
Last Modified: 2013-12-04
I have two computer. One is in a LAN,and another is outside the LAN.
I setup the IIS in the LAN computer . HOw can I Let the IIS user Can access Outside computer.
I have Let the adminitrator as the IIS user,but it did't work. ( I user adminitrator user can access Internet.)
0
Comment
Question by:sup99
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 

Accepted Solution

by:
asanmiguel earned 50 total points
ID: 9592385
IIS is a pain to work with if you've never worked with it before. You'll save yourself a lot of aggrivation if you just put it on the a router. If there's something that you don't anyone on the other computer to see on the computer currently not the LAN, change the subnet, workgroup, and disable all shares, and that should do it.
0
 

Author Comment

by:sup99
ID: 9595190
Sorry .My Eng is poor.

I Have a page :



 <%

 getHTTPPage(http://www.experts-exchange.com)

      function getHTTPPage(url)
            on error resume next
            dim http
            set http=Server.createobject("Microsoft.XMLHTTP")
            Http.open "GET",url,false ,"jbcase\ligongyuan","finefine"
            Http.send()
            if Http.readystate<>4 then
                  exit function
            end if
            getHTTPPage=bytes2BSTR(Http.responseBody)
            set http=nothing
            if err.number<>0 then err.Clear  
      end function
%>



It can't get the page . if I  getHTTPPage(http://loclhost/),it can get the page .
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Exchange organizations may use the Journaling Agent of the Transport Service to archive messages going through Exchange. However, if the Transport Service is integrated with some email content management application (such as an antispam), the admini…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question