Solved

configuring port 6789/6321 on wingate 3.0.5 on win89 machine

Posted on 2004-08-16
5
269 Views
Last Modified: 2008-03-04
Hi....
I am using windows 98 SE. And wingate 3.0.5 as a proxy server.
I want to run a stock-exchange software....over LAN using a cable modem. For that i am told to enable any port like 6789 / 6321 / 6998 on my LAN Running TCP/IP.
TCP/IP is the protocol i am using..... but i dont know how to configure or enable the ports using wingate proxy server.

Can any one please guide me throught this.

Regards...
0
Comment
Question by:khankejan
  • 2
5 Comments
 
LVL 7

Accepted Solution

by:
gnegrota earned 50 total points
ID: 11809139
WinGate can do ONLY proxy functions, not port-forward. Anyway, to enable some special services, you can add a general proxy service and bind the specific port(s) ,or by using Socks 4/5 service (port 1080 TO Any).
What are you intend with "i am told to enable any port like 6789 / 6321 / 6998 on my LAN Running TCP/IP" ? To permit FROM your LAN or to permit TO your LAN across WinGate ?
0
 

Author Comment

by:khankejan
ID: 11819319
My problem is that my boss wants to have a stock exchange program at his computer. So that he can monitor the stock market. For this he had contacted  a broker who installed a front end application on my boss machine. This application works well on dial up... but we want to run it on LAN through cable modem.
For this i have created new service with the ports and permitted the user.
Is that all or enough settings at wingate.?
0
 
LVL 7

Expert Comment

by:gnegrota
ID: 11820484
Should be. Set the permissions for your boss PC ,eventualy based on MAC/IP and not ByUser.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question