Solved

IPSTAG and transfering - enom

Posted on 2004-09-12
3
577 Views
Last Modified: 2013-12-24
HI,

I have an enom reseller account and I run a small hosting company. I want to be able to transfer domain names to my enom reseller account.

My questions are:

1) how do I create an IPSTAG for .co.uk names

2) has anyone done domain name transfers with .com names with enom? what should I have my customers say to there domain name supplier to start the process (I know I can start the process in enom too, but not sure of the order)

Regards

Ben
0
Comment
Question by:bhermer
  • 2
3 Comments
 
LVL 33

Accepted Solution

by:
humeniuk earned 500 total points
ID: 12043745
(1) You should be able to make this change with your registrar (as shown here this: http://www.britishnic.com/handbook/change-ipstag.html).  If they don't have this feature as part of their configuration tools, you will have to contact them and request the change.  However, remember that you will likely not be able to access your domain controls until the transfer is complete.

(2) Generally, the process is started at the destination end of the transfer, primarily because registrars are more eager to facilitate incoming transfers than outgoing transfers.  If you initiate the transfer with enom, your customer (whoever is listed as the admin contact) will receive a confirmation email.  They have to follow the instructions in the email to allow the transfer.  Some registrars also allow clients to 'lock' a domain, which means it can't be transferred.  The configuration has to be changed (and the domain 'unlocked' before the process can begin).  As you have noted, in some cases they may have to change the ISPTAG first (as above) as well.
0
 
LVL 4

Author Comment

by:bhermer
ID: 12237244
Sorry for the delay in answering. I forgot about the question after I transfered
0
 
LVL 33

Expert Comment

by:humeniuk
ID: 12238228
Glad to hear it's all worked out.  Thanks for the A.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Monitor bandwidth 3 83
What's the problem with my DSL? 4 56
Cisco Firewall setup within a managed office 8 74
Failing ALG SIP test for new VoIP phone system 4 49
#Citrix #Citrix Netscaler #HTTP Compression #Load Balance
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now