Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Configuring CC Proxy to accept incoming requests

Posted on 2011-03-01
2
Medium Priority
?
532 Views
Last Modified: 2012-05-11
Hi all,

I have cc proxy and was sucessfully able to set it up on a cable broadband with a direct connection to the internet to accept INCOMING proxy requests.
However I now have a router in the way rather than a direct cable connection and I don't know how to set this up to still allow incoming requests.

Any advice would be greatly appreciated.

Thanks
0
Comment
Question by:oconnork00
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
FemSteenkamp earned 2000 total points
ID: 35005751
you need to allow the specific ports that CCproxy use thru the ports.
http://www.youngzsoft.net/ccproxy/advanced.htm

if you make changes to any of teh defualts then obviulsy these will have to be opned / mapped on the router

then google, how to open ports on router (put your model number and make here) and you will find step by step instructions to do so.  hopefully you have admin rights on the router to do this

0
 
LVL 2

Author Closing Comment

by:oconnork00
ID: 35069463
Thanks - I got it working through the use of your help.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question