Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Perculiar port blocking

Posted on 2004-10-14
3
Medium Priority
?
225 Views
Last Modified: 2010-04-09
I have two computers networked. One has ICS (internet connection sharing) so that the other can access the internet. No worries so far as both can access the net ok. The problem occurs when I try to run a game (ravenshield), it uses a couple of perculiar ports to register the player for multiplayer games. Both computers have xp with sp2 and symantec client security. I have disabled windows and symantec firewalls to try and get this to work. The computer that is NOT running ICS connects fine everytime, the computer that IS running ics cannot login to the game service. The ICS machine is a newly built machine that really has no special setup. Ijust don't understand how any ports can be being blocked (or forwarded to other machine)?

Hope someone can help me, I spent a bit of money on a new machine and can't get my favourite game working properly.
0
Comment
Question by:jmylrea
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 16

Accepted Solution

by:
GUEEN earned 2000 total points
ID: 12344489
0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Do you have a windows based Checkpoint SmartCenter for centralized Checkpoint management?  Have you ever backed up the firewall policy residing on the SmartCenter?  If you have then you know the hassles of connecting to the server, doing an upgrade_…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question