Oct 01 04 3:19 am
===========================================================================
Interface List
0x1 ........................... MS TCP Loopback interface
0x1000003 ...00 30 48 70 63 f3 ...... Intel(R) PRO/1000 MT Network Adapter
0x1000004 ...00 30 48 70 63 f2 ...... Intel(R) PRO/1000 MT Network Adapter
===========================================================================
===========================================================================
Active Routes:
Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 195.201.73.126 195.201.73.82 1
127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 1
192.168.1.0 255.255.255.0 192.168.1.1 192.168.1.1 1
192.168.1.1 255.255.255.255 127.0.0.1 127.0.0.1 1
192.168.1.255 255.255.255.255 192.168.1.1 192.168.1.1 1
195.201.73.0 255.255.255.0 195.201.73.82 195.201.73.82 1
195.201.73.82 255.255.255.255 127.0.0.1 127.0.0.1 1
195.201.73.255 255.255.255.255 195.201.73.82 195.201.73.82 1
224.0.0.0 224.0.0.0 192.168.1.1 192.168.1.1 1
224.0.0.0 224.0.0.0 195.201.73.82 195.201.73.82 1
255.255.255.255 255.255.255.255 192.168.1.1 192.168.1.1 1
Default Gateway: 195.201.73.126
===========================================================================
Persistent Routes:
None
Oct 01 04 1:18 pm
Oct 05 04 8:17 pm
Oct 05 04 9:46 pm
Vladimir wrote:Hi Adrien,
Thanks for the reply.
My aim is to limit _all_ connections from server to be visible and audible so that it would be easy to check ISP invoices. Any connections that go aside from Wingate are VERY undesirable. Unfortunately, we have to use the machine with WinGate for work so many INET applications produce hidden traffic. This is bad.
Some new questions:
1. Are the WinGate 6.0.3 and Windows 2000 Server network utilities enough tools to set up needed configuration?
2. What third party products (firewall) do we need in case of answer 'no' to the question #1?
3. Can we monitor wingate traffic on user-by-user basis on-line?
Oct 05 04 10:35 pm
Nev wrote:Vladimir what would happen if you configure all connection properties for the Wingate server to point at the localhost: 127.0.0.1:80 [if 80 is the WWW proxy port]?
Next set a group policy to deny access to the properties of network connections / RAS and proxy server configuration.
Oct 06 04 10:49 pm
Vladimir wrote:Nev wrote:Vladimir what would happen if you configure all connection properties for the Wingate server to point at the localhost: 127.0.0.1:80 [if 80 is the WWW proxy port]?
Next set a group policy to deny access to the properties of network connections / RAS and proxy server configuration.
Hm, my problem is not to set up proxy but to disable any applications to bind themself to external IP-address. Can you explain me how locahost IP in WWW proxy settings can help to do this?
And what about ping? Can I see pings made from Wingate's machine in Gatekeeper?
What policy do you mean, Windows' or WinGate's? Where to set up these prohibitions?