Question about Xincom XC-DPG602 Router (XCDPG602)

1 Answer

VPN, PROXY, TUNNELING

I have a big network , with 5-6000 computers, and i want to connect all of them to the internet. i have a server that is connectet to the network but is connected to the internet too. I want that server to be a server for all the network and give internet to all other computers! Tell me the best way to do that! Proxy server? VPN connection? SSH Tunneling? what is the best way and with the gratest speeds?

Posted by on

  • 4 more comments 
  • ironbutt134 Jul 24, 2009

    okey, but there are big limitations, for example ccproxy allows maximum 100 users and 1200 connections at the same time! do you now a proxy server with no limitations? linux? windows? please help!

  • ironbutt134 Jul 24, 2009

    squid is so powerfull because the main reason that everybody on my network wants internet connection is for torrents downloadins, so there will be a lot of connections at the same time? about the bandwith, no problem, i have 1 Gbps!

  • ironbutt134 Jul 24, 2009

    squid is so powerfull because the main reason that everybody on my network wants internet connection is for torrents downloadins, so there will be a lot of connections at the same time? about the bandwith, no problem, i have 1 Gbps!

  • ironbutt134 Jul 24, 2009

    1 server for how much computers ?

  • ironbutt134 Jul 24, 2009

    1 server for how much computers ?

  • ironbutt134 Jul 24, 2009

    1 server for how much computers ?

×

1 Answer

  • Level 3:

    An expert who has achieved level 3 by getting 1000 points

    All-Star:

    An expert that got 10 achievements.

    MVP:

    An expert that got 5 achievements.

    President:

    An expert whose answer got voted for 500 times.

  • Master
  • 627 Answers

For my oppinion the best way is proxy server, because you can control all 5-6000 computers
Every user can connect to internet with password and username.
Also you can restrict (if you want) some ports.

Posted on Jul 24, 2009

  • Robert Nyilas
    Robert Nyilas Jul 24, 2009

    linux, you can use squid

    there is no limitations

  • Robert Nyilas
    Robert Nyilas Jul 24, 2009

    the problem is that you have a lots of computers

    you can't do with 1 server

×

1 Suggested Answer

6ya6ya
  • 2 Answers

SOURCE: I have freestanding Series 8 dishwasher. Lately during the filling cycle water hammer is occurring. How can this be resolved

Hi,
a 6ya expert can help you resolve that issue over the phone in a minute or two.
best thing about this new service is that you are never placed on hold and get to talk to real repairmen in the US.
the service is completely free and covers almost anything you can think of (from cars to computers, handyman, and even drones).
click here to download the app (for users in the US for now) and get all the help you need.
goodluck!

Posted on Jan 02, 2017

Add Your Answer

Uploading: 0%

my-video-file.mp4

Complete. Click "Add" to insert your video. Add

×

Loading...
Loading...

Related Questions:

1 Answer

What is vpn server


Point-To-Point Tunneling Protocol (PPTP) is another tunneling protocol used to connect a remote client to a private server over the Internet. PPTP is one of the most widely used VPN protocols because of it's straightforward configuration and maintenance and also because it is included with the Windows operating system.
http://electronicshelponline.blogspot.com/ A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data.

Oct 25, 2016 | Computers & Internet

Tip

VPN in Microsoft Server 2003


The full form of VPN is Virtual Private Network. VPN gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network. Allows you to be at home and access your company's computers in the same way as if you were sitting at work.

Almost impossible for someone to tap or interfere with data in the VPN tunnel. If you have VPN client software on a laptop, you can connect to your company from anywhere in the world. VPN goes between a computer and a network (client-to-server), or a LAN and a network using two routers (server-to-server). Each end of the connection is a VPN "endpoint", the connection between them is a "VPN tunnel".

When one end is a client, it means that computer is running VPN client software. You can use a virtual private network (VPN) to connect components to one network by using another network. VPN do this by "tunneling" through the Internet or another public network. With a VPN, connections across the public network can transfer data by using the routing infrastructure of the Internet, but to the user, the data seems to travel over a dedicated private link.

A VPN gives you the benefit of a dial-up connection to a dial-up server, plus the flexibility of an Internet connection. Using an Internet connection you can connect to resources all over the world. If you have a high-speed Internet connection at your computer and at your office, you can communicate with your office at full Internet speed. This is much faster than any dial-up connection that uses an analog modem.

VPNs use authenticated links to make sure that only authorized users can connect to your network, and they use encryption to make sure that others cannot intercept and cannot use data over the Internet. A Tunneling Protocol is a technology that helps make the transfer of information over the Internet more secure from one computer to another.

VPN technology also permits a corporation to connect to its branch offices or to other companies over a public network, such as the Internet, while helping to maintain secure communications. The VPN connection across the Internet logically operates as a dedicated wide area network (WAN) link.

VPN in Windows 2003 Server: You need a high speed Internet connection to configure and run VPN server. Two individual lan card must be present in a single system where you want to configure a VPN Server. The lan cards should ping each other. Also need a User which's Dial in allow access should be enable. Microsoft 2003 server two tunnelling protocols for a secure VPN connection, one is PPTP (Point-to-Point Tunnelling Protocol) which Provides data encryption using Microsoft Point-to-Point Encryption. The other is L2TP (Layer Two Tunnelling Protocol) which Provides data encryption, authentication, and integrity using IPSec.

Steps to create VPN Server in 2003 Server: At first I go to Start and point to Administrative Tools, then click Routing and Remote Access. Then I click the server icon that matches the local server name in the left panel of the console. If the Routing and Remote Access service was previously turn on, you may want to reconfigure the server.

To reconfigure the server Right-click the server object, and then click Disable Routing and Remote Access. Click yes to continue when you are prompted with an informational message. Then Right-click the server icon and then click configure and Enable Routing and Remote Access to start the Routing and Remote Access Server Setup Wizard. After that click Remote access (dial-up or VPN) to turn on remote computers to dial in or connect to this network through the Internet. Then I have Click to select VPN. In the VPN Connection window I click the network interface (Lan) which is connected to the Internet and go the IP Address Assignment window, then I click Automatically because there was present a DHCP server in network. However, if DHCP is not available, you must specify a range of static addresses.

If you use from a specified range of addresses, open the Address Range Assignment dialog box and Type the first IP address in the range of addresses that you want to use in the Start IP address box. Type the last IP address in the range in the End IP address box. Windows calculates the number of addresses automatically. After that I have accept the default setting of No, use Routing and Remote Access to authenticate connection request and finally Click Finish to turn on the Routing and Remote Access service and to configure the server as a Remote Access server.
For the remote access server to forward traffic properly inside your network, you must configure it as a router with either static routes or routing protocols, so that all of the locations in the intranet are reachable from the remote access server. It also need for security purpose.<SPAN style="LINE-HEIGHT: 115%; FONT-FAMILY: 'Verdana','sans-serif

on Mar 22, 2011 | Microsoft Windows Server 2003 Enterprise...

1 Answer

Cannot connect to proxy server


You can try using vpn instead of proxy, this is more reliable. The main difference between VPNs and proxy sites in terms of reliability.
Proxy vs VPN Why VPN is More Reliable Sahrzad VPN Blog
25554710-0es2rhpd2fidyrsp4zbwei4v-4-0.jpg

Mar 11, 2015 | Computers & Internet

5 Answers

What is the difference between VPN-connection and Proxy websites?


While both a Proxy and VPN service will re-route your internet traffic and change your IP, they function slightly differently.
Think of a Proxy as a Web Filter. The proxy settings are applied to your internet browser whether you're using MSIE, Chrome, Safari, Firefox, Etc. When browsing the internet through a proxy server, all benefits with that server are used, for example, (Security, Speed, and Geographic Location). The proxy will only secure traffic via the internet browser using the proxy server settings.
Unlike a Proxy, a VPN service provider(Virtual Private Network) encrypts all of your traffic, replacing your ISP and routing ALL traffic through the VPN server, including all programs and applications. This also will use all benefits of the VPN server such as (Speed, Geopgraphic Location, and Security).
The VPN can be easily connected or disconnected with the click of a button.
In conclusion, a proxy server is completely browser based, and is not as compatible with certain web pages that use non-browser technology such as: Comedy Central,Zatoo, Fox OD, and Sky Player. However, a VPN will work with ALL internet based services, but will offer less choice on which applications will get run through your ISP, as with the VPN, everything is routed through that server when connected.
So, you can get VPN services from sources like HideMyAss, Super VPN, etc., Once you have enabled a VPN service, you can visit IP-Details.com and have an IP lookup to ensure the change in your IP address.

Jan 21, 2015 | Computers & Internet

1 Answer

Frequent VPN connection drop on my wifi


If you can't connect via the Internet to your workplace network from home (or another location), check the items in this list:

  • Make sure that you typed the virtual private network (VPN) server name exactly as provided by your network administrator.

  • You must have an active Internet connection for a VPN connection to work.

  • If your modem is external, make sure that the modem power is turned on.

  • Contact your network administrator to make sure that you have the appropriate connection and domain permissions on the remote access server.

  • This could be a certificate problem. For assistance, contact your network administrator.

  • A VPN connection won't work with an active Winsock proxy client. Contact your network administrator to make sure the Winsock proxy client is not enabled.

  • If you know the IP address (for example: 131.107.10.25) of a website, type that address in the address bar of your web browser and press Enter. If this works, there is probably a Domain Name System (DNS) resolution problem. For assistance, contact your network administrator.

  • If you have special software that's required or installed by your workplace, it could be part of the problem. For assistance, contact your network administrator.

  • If you know the IP address (for example: 131.107.10.25) of your VPN server, type that address for the VPN connection, and then press Enter. If this works, there is probably a DNS resolution problem. For assistance, contact your network administrator.

  • There could be a problem with the server you're trying to connect to. For assistance, contact your network administrator.

If you try to connect with a VPN connection and you see a message that says "The local computer does not support encryption" and has the error code 741, it's possible that the encryption that your computer uses doesn't match the encryption used by the VPN server. To change the encryption settings so that your computer uses the recommended setting of 3DES, follow these steps:

  1. Open Connect to a Network by clicking the network icon (eff2d36c-9e0d-4d1a-9859-3af14fa4ccfc_73.jpg or da12251d-1e9a-4032-afae-009876c6c5a3_80.jpg) in the notification area.

  2. Right-click the VPN connection, and then click Properties.

  3. Click the Security tab.

  4. Under Data encryption, select Maximum strength encryption (disconnect if server declines), and then click OK.

  5. Open Connect to a Network by clicking the network icon (eff2d36c-9e0d-4d1a-9859-3af14fa4ccfc_73.jpg or da12251d-1e9a-4032-afae-009876c6c5a3_80.jpg) in the notification area.

  6. Click the VPN connection, and then click Connect to try connecting again.

Apr 21, 2013 | Belkin Surf N300 Wireless N Router

1 Answer

I have an older Cisco PIX 506 with two VPN connections. One links two offices (PIX-PIX VPN) together, another is for staff to access email & files. The file server on the local LAN the PIX is on are...


It could be a missing route... are the file server and email server on the same subnet? If they are then it is possibly not a routing issue.

Also it would be worth checking the tunneling settings for the VPNs... if you have specifed either only the fileserver subnet or specifically the file server address, then this could be the reason they can get to nothing else.

Hope that this has helped a little :)

Apr 09, 2010 | Cisco PIX 506E 3DES/AES bundle (chassis,...

1 Answer

Hi Friend, When i am connecting one


increase your proxy time out or remove the proxy setting from your VPN.

Mar 25, 2010 | Cisco ASA 5505 Firewall

2 Answers

Un block blocked web sites my space facebook and any blocked web sites on a government computer


Total Internet Privacy and the TIP Tunnel offer complete Private Internet Browsing,Private Internet Service, Anonymous Surfing, Anonymous Internet, web surfing through the webs best most secure and private web tunnel, with free private internet browsing tools. TIP is a complete encrypted VPN solution for private internet communications.
Tiptunnel is designed for individuals accessing the Internet from insecure Internet connections, such as wireless, or from countries with restrictive Internet filtering systems.
Anonymous Internet surfing by default simply doesn't happen but it is possible. The most basic way of protecting your identity is to use an anonymous VPN to hide your IP address when you are surfing. Your communications can still be intercepted as the majority of that web traffic is in the clear but it's less likely unless someone is deliberately targeting you, the main benefit is that your IP address is not left in the logs of the web servers and your web browsing will remain more private.
provides a secure, obscured VPN tunnel between your computer and our secure servers located in Asia or the US and the Europe.
TIP Tunnel Enterprise package includes:

* Anonymous surfing
* IP Address Obscurity, your real IP address is hidden
* Bypass Internet filtering by your ISP
* All traffic is 100% encrypted with AES 256 bit encryption
* Immune to packet sniffing, attacks and popups
* Real-time virus protection
* Real-time spam filtering
* Guaranteed 100% privacy with no logs
* Supported platforms include Windows, Linux and Mac
* Multiple server access worldwide
* Professional 24/7 Technical Support
http://tiptunnel.com

Jan 06, 2010 | Computer Associates Full Version ...

1 Answer

Difference between proxy server firewall and something called a gateway firewall ....Just a homework question..need another angle other then the veryconfusing textbook


In computer networks, a proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.
A proxy server has many potential purposes, including:
  • To keep machines behind it anonymous (mainly for security).[1]
  • To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]
  • To apply access policy to network services or content, e.g. to block undesired sites.
  • To log / audit usage, i.e. to provide company employee Internet usage reporting.
  • To bypass security/ parental controls.
  • To scan transmitted content before delivery for malware.
  • To scan outbound content, e.g. for data leak protection.
  • To circumvent regional restrictions.
A proxy server that passes requests and replies unmodified is usually called a gateway or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at various points between the user and the destination servers on the Internet.
A reverse proxy is a (usually) Internet-facing proxy used as a front-end to control and protect access to a server on a private network, commonly also performing tasks such as load-balancing, authentication, decryption or caching

A firewall is a dedicated appliance, or software running on a computer, which inspects network traffic passing through it, and denies or permits passage based on a set of rules.
It is a software or hardware that is normally placed between a protected network and an unprotected network and acts like a gate to protect assets to ensure that nothing private goes out and nothing malicious comes in.
A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels. Typical examples are the Internet which is a zone with no trust and an internal network which is a zone of higher trust. A zone with an intermediate trust level, situated between the Internet and a trusted internal network, is often referred to as a "perimeter network" or Demilitarized zone (DMZ).
A firewall's function within a network is similar to physical firewalls with fire doors in building construction. In the former case, it is used to prevent network intrusion to the private network. In the latter case, it is intended to contain and delay structural fire from spreading to adjacent structures.
Without proper configuration, a firewall can often become worthless. Standard security practices dictate a "default-deny" firewall ruleset, in which the only network connections which are allowed are the ones that have been explicitly allowed. Unfortunately, such a configuration requires detailed understanding of the network applications and endpoints required for the organization's day-to-day operation. Many businesses lack such understanding, and therefore implement a "default-allow" ruleset, in which all traffic is allowed unless it has been specifically blocked. This configuration makes inadvertent network connections and system compromise much more likely.

Dec 11, 2009 | Office Equipment & Supplies

Not finding what you are looking for?
Xincom XC-DPG602 Router (XCDPG602) Logo

Related Topics:

267 people viewed this question

Ask a Question

Usually answered in minutes!

Top Xincom Computers & Internet Experts

Doctor PC
Doctor PC

Level 3 Expert

7733 Answers

kakima

Level 3 Expert

102366 Answers

David Payne
David Payne

Level 3 Expert

14161 Answers

Are you a Xincom Computer and Internet Expert? Answer questions, earn points and help others

Answer questions

Manuals & User Guides

Loading...