Solved

setting up winxp for internet connection sharing

Posted on 2009-05-06
2
318 Views
Last Modified: 2012-05-06
I am trying to set up a copy of linux ubuntu on my winxp box using sun virtualbox. I have everything installed for the copy of linux.
This is being installed behind a proxy server that I cannot get access to.
The winxp box does have access to the internet through the proxy server.
I am having a problem getting the internet on the linux install to work.
I have set up internet connection sharing on my winxp box
this has 2 addresses for each network adapter
on is the physical adapter and the other is the virtaul host only network created by sun virtual box.
after setting up internet connection sharing on winxp
setting home network connection to VirtualBox Host-Only Network
ip adress on the VirtualBox Host-Only Network is 192.168.0.1
I maunually setup the virtual linux box with the ipaddress 192.168.0.2
and set the gateway to 192.168.0.1
the dns server is set to 192.168.0.1
I can ping google with no problems but when I try to browse to google I get blocked by the proxy server.
Can I not set this up so that all the traffic appears to be coming from the winxp installation which does have access through the proxy server?
0
Comment
Question by:funkimunky
2 Comments
 
LVL 87

Accepted Solution

by:
rindi earned 500 total points
ID: 24323392
You'd also have to setup the web browser you are using in your Linux VM to go through the proxy. In firefox this is done via "Edit", "Preferences", "Advanced", "Network", "Settings".
0
 

Author Closing Comment

by:funkimunky
ID: 31578423
yeah I think i was getting confused i was settin the proxy server as the winxp box (thinking that this would forward the request to the actual proxy server doh...) after setting the proxy server in the proxy settings in ubuntu it worked and the winxp NAT masks my web request and the proxy lets it through. finally. thanks for your help
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
Read about achieving the basic levels of HRIS security in the workplace.
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now