Solved

How Can I use my comcast static IP addresses as Proxys?

Posted on 2009-07-10
9
426 Views
Last Modified: 2013-11-16
I have 5 static ip addresses assigned to me from comcast.  I would like to be able to connect to the internet using all 5 of the ip addresses, from the same computer. I would like to use my ip's as proxys, so I would have the ip address and port number.   Is there a way to set up my comcast static ip's to act as proxys? I use Windows XP home and pro.
0
Comment
Question by:rutherfordthebrave
  • 5
  • 2
9 Comments
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 24827726
Hi,

Will you please tell me what excatly you want to accomplish and what is your router ?

Cheers,
K.
0
 

Author Comment

by:rutherfordthebrave
ID: 24827755
I am using an SMC Networks SMC8014 router, assigned to me from comcast business class.  I have 5 ip's and I want to be able to use all 5 of them at the same time from a single computer.  I would like for them to work like proxys, where I would use the ip address and a port number.
0
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 24827832
to accomplish this you'd need your Router to proxy the connections for your. But you router is not capable of doing this. It could only allow you to use reverse NAT.

In thet say that you have 5 different instances of your web servers on yo1r computer. You can run them assigned to:

8080
8081
8082
8083
8084

of your IP of say 10.10.0.2.

In thah case you can define NAT rules to to assign each of these to different IP's 80 port so that

x.y.z.IP1:80 will map to 10.10.0.2:8080
x.y.z.IP2:80 will map to 10.10.0.2:8081
x.y.z.IP3:80 will map to 10.10.0.2:8082
x.y.z.IP4:80 will map to 10.10.0.2:8083
x.y.z.IP5:80 will map to 10.10.0.2:8084

But instead of this you can use only one IP address mapping and you can use VirtualHost based on incoming web request and you can serve different pages if it comes with:

www.example.com
www.otherexample.com.

Then the extra IP's will only be needed if you need to assign SSL to each virtualhost.

Are you just experimenting or is there really something that you want to implement with this method?

0
Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 24827842
Another solution would be to use this single server as a Reverse Proxy and serve them form different intranet hosts. But it would require you to route all five addresses to your single server and the server have some secondary IP's assigned to it and serve requests over the reverse proxy that you will set-up.
0
 

Author Comment

by:rutherfordthebrave
ID: 24827895
I am very novice on this subject, so I apologize if I am not fully understanding your answer.

I may not have been fully clear on what I would like to accomplish.  I am not operating a server or hosting any websites.  

I want to be able to use all 5 of my ip's from 1 computer, so to the site I am connecting to it would look like I am 5 different computers.  My idea was to somehow turn my ip's into proxys.

If my router isn't capable of something like this, I can buy other equipment if I can find out what I need.
0
 
LVL 30

Accepted Solution

by:
Kerem ERSOY earned 500 total points
ID: 24828179
But I don't think there's a proxy to do that.. Because it is not load balancing. I don't thinkl you can assign yourself different IPs based on your client ports..
0
 
LVL 30

Expert Comment

by:Kerem ERSOY
ID: 25917878
I've given my professional opinion and told him that there is no s1uch proxy as the user expects it to be. Sometimes experts should say that something is not possible. I believe my comments are appropriate and qualified  to be considered as an answer
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now