<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
<channel>
<title><![CDATA[Qbik New Zealand Limited]]></title>
<link><![CDATA[http://support.qbik.com/]]></link>
<description />
<generator><![CDATA[Kayako fusion v4.71.0]]></generator>
<item>
<title><![CDATA[ Kaspersky AV System Message after Upgrading]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/62]]></link>
<guid isPermaLink="false"><![CDATA[44f683a84163b3523afe57c2e008bc8c]]></guid>
<pubDate><![CDATA[Fri, 09 Dec 2005 15:38:19 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ After upgrading to 6.1 you receive a system message that "This plugin is not supported on WinGate 6.1.0" even though you don't have Kaspersky AntiVirus for WinGate installed.  For earlier versions of WinGate we had to include a DLL to support DKAV, an ol...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> After upgrading to 6.1 you receive a system message that "This plugin is not supported on WinGate 6.1.0" even though you don't have Kaspersky AntiVirus for WinGate installed.<br /> <br /> For earlier versions of WinGate we had to include a DLL to support DKAV, an older version of Kaspersky AntiVirus for WinGate. We discontinued support for this plug-in for version 6.1 and above so the DLL file is no longer part of the WinGate installation. This causes upgraded installations to report that the DLL file is missing.<br /> <br /> You can stop this system message from appearing by editing the registry. As always we recommend that you are familiar with backing up and restoring the registry before you make any changes.<br /> <br />
<ul>
<li>Open your registry editor</li>
<li>Find and delete the following key:<br /> HKEY_LOCAL_MACHINE\Software\Qbik Software\WinGate\Data Scanning Plugins\Installed\AntiVirus</li>
<li>Restart the WinGate engine</li>
</ul>
<br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_a=tickets&amp;_m=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Advanced time restriction policy]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/57]]></link>
<guid isPermaLink="false"><![CDATA[72b32a1f754ba1c09b3695e0cb6cde7f]]></guid>
<pubDate><![CDATA[Thu, 17 Nov 2005 15:58:20 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ You may want to allow users to browse the internet during lunch breaks or after hours, but restrict them to permitted sites during work hours.   Because WinGate uses the most permissive policy you would create your restrictions, then add a more permissiv...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> You may want to allow users to browse the internet during lunch breaks or after hours, but restrict them to permitted sites during work hours. <br /> <br /> Because WinGate uses the most permissive policy you would create your restrictions, then add a more permissive policy to allow access. When the permissive policy does not apply, ie outside the allowed hours, the more restrictive policy is the only policy available, and is applied. <br /> <br /> WinGate's policies make this quite straightforward:<br /> <br /> Open the <strong>WWW proxy service</strong><br /> <br /> Create a policy to restrict access to <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/32"><span style="color: #ff0000;">specific sites</span></a> only. This will be the policy that applies during work hours and these will be the only sites that are available. Alternatively, create a policy restricting access to <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/55"><span style="color: #ff0000;">certain sites</span></a>, users will then be able to browse to everything except the sites you specify.<br /> <br /> For example, create a policy to allow access to wingate.com. This is now the only site that is available.<br /> <br /> <img src="/kbimage/advanced-allow.gif" alt="image showing advanced policy allowing access" name="advanced policy" /><br /> <br /> Create a second policy which is a <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/9"><span style="color: #ff0000;">time policy</span></a> for the time that you don't want to restrict user access. This can be for the lunch hour, or after hours depending on your requirements.<br /> <br /> For example, create a time policy for the period 12:00pm to 1:00pm with no other restrictions. During this period browsing will not be restricted.<br /> <br /> <img src="/kbimage/time-policy.gif" alt="image showing time policy" name="time policy" /><br /> <br /> You should end up with your WWW proxy service policies looking like this:<br /> <br /> <img src="/kbimage/time-access-restriction.gif" alt="image showing time/access restriction policy" name="time/access restriction" /><br /> <br /> Please note that your clients must be connecting through the proxy, or you must have Transparent Proxy enabled to intercept their traffic to apply this policy. For more information on Transparent Proxy please see this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/57">article</a></div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Application Servers running behind WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/10]]></link>
<guid isPermaLink="false"><![CDATA[d3d9446802a44259755d38e6d163e820]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 15:42:25 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[When Application servers such as Web and FTP servers are setup to run on a machine behind WinGate the procedures to make them run seamlessly with WinGate are very similar to running them on the WinGate server itself, although there are notable differences...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">When Application servers such as Web and FTP servers are setup to run on a machine behind WinGate the procedures to make them run seamlessly with WinGate are very similar to running them on the WinGate server itself, although there are notable differences. <br /> <br /> To find out about configuring Application Servers to run on the same machine that WinGate is running on <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/11">click here</a>. <br /> <br /> There are several ways to configure WinGate to allow access by Internet users to Application servers that are running behind WinGate.<br /> <br /> This example uses an FTP server scenario:
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate Server.</li>
<li>Open the <strong>FTP Proxy Server</strong> under the <strong>Services</strong> tab.</li>
<li>Select the <strong>Bindings</strong> tab.</li>
<li>Select the <strong>Allow connections coming in on any interface</strong> radio button.</li>
<li>With the FTP Proxy Server config still open select the <strong>Non-proxy Requests</strong> tab.</li>
<li>Select the <strong>Pipe requests through to predetermined server</strong> radio button. Here you should enter the IP address of the computer, which the FTP server is running on behind WinGate, to which all FTP requests from the Internet will be directed.</li>
<li>Enter the port the FTP server has been configured to listen on.</li>
<li>Select <strong>OK</strong> as you exit out of the FTP proxy service</li>
<li>Save changes in <strong>GateKeeper</strong>.</li>
</ol>
<strong>Using WinGate Extended Networking service</strong>
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate server</li>
<li>Open <strong>Extended Network Services</strong> under the <strong>System tab</strong>.</li>
<li>Select the <strong>Port Security tab</strong>.</li>
<li>Click the <strong>Add</strong> button.</li>
<li>On the port configuration dialog select <strong>Connections from the Internet</strong> and <strong>TCP</strong> as the protocol.</li>
<li>Enter Port 21 or designated FTP port (as required) on the FTP server.</li>
<li>Select the <strong>Redirect packet to this IP address</strong> option, specifying the IP address of the machine running the FTP server. In this scenario if the FTP server is listening on a different port such as 2121 the <strong>Override port option</strong> should be used.</li>
<li>Click <strong>OK</strong> to exit the Extended Networking Services.</li>
<li>Save changes in GateKeeper.</li>
</ol>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Application Servers running on the same machine as WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/11]]></link>
<guid isPermaLink="false"><![CDATA[6512bd43d9caa6e02c990b0a82652dca]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 15:45:56 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Application Servers (such as IIS, Ftp Server etc) running on the same machine as WinGate can cause several problems if not configured properly. Mainly problems will occur if the application server causes port conflicts with the Proxy services in WinGate, ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">Application Servers (such as IIS, Ftp Server etc) running on the same machine as WinGate can cause several problems if not configured properly. Mainly problems will occur if the application server causes port conflicts with the Proxy services in WinGate, by attempting to use the same port at the same time.<br /> <br /> While there may be problems associated with the particular server application, the following are things to check to address and resolve common dilemmas. <br /> <br /> <strong>Port Conflicts</strong><br /> <br /> When a proxy service port is in conflict with an application server (i.e. WinGate and the application server both installed on the same machine and they are both listening on the same port) the appropriate Proxy service will show up in GateKeeper as being stopped.To rectify this either:<br />
<ul>
<li><strong>Configure them both to use the same Port but on separate Network interfaces:</strong><br /> (Requires the WinGate server to have two Network Interfaces). <br /> <br /> Port conflicts will only happen between two applications when they are listening on the same port on the <strong>SAME</strong> interface. <br /> <br /> In most common scenarios where Application servers are running on the same machine as WinGate, the machine will generally have two Network Interfaces, one with a private (internal) address and one with a public (external) address.<br /> <br /> When this is the case the Application server program can be configured to use its required port on the External interface, as it will usually only be accepting requests from the Internet and so only requires the use of the External IP address.<br /> <br /> The reverse is true for the corresponding WinGate proxy service, as it will usually only be accepting internal client Internet requests on this port through its Private interface.<br /> <br /> As long as the appropriate binding is set (external interface for the Application server program, and internal interfaces for the WinGate proxy service in question) then there should be no issues with port conflicts.<br /> </li>
<li><strong>Change the port for the Proxy service to run on.</strong> <br /> This is a problem for example if the WWW Proxy Server and a Web server are both running on the same machine using port 80. If you change the port on the WWW Proxy Server in WinGate to say 8088, this conflict will be resolved.<br /> <br /> The disadvantage to this is that clients using the Proxy connection method will have to connect specifying port 8088 in their web requests for WWW to work properly.<br /> <br /> An alternative and easier way to resolve this is to change the port the Application server is configured to receive requests on rather then altering the Port of the particular Proxy service in WinGate.<br /> <br /> For example configure the FTP server to listen on port 2121 instead of Port 21. You can then use the Proxy service to receive these Internet requests on behalf of the FTP server and (through the use of the Non proxy request setting) pipe them directly to the server concerned without having to alter the FTP proxy service configuration.<br /> </li>
</ul>
For example of configuring an FTP server running on the same machine as WinGate: <br />
<ol>
<li>Open GateKeeper on the WinGate Server.</li>
<li>Open the <strong>FTP Proxy Server</strong> under the <strong>Services</strong> tab.</li>
<li>Select the <strong>Bindings</strong> tab.</li>
<li>Select the <strong>Allow connections coming in on any interface</strong> radio button.</li>
<li>Open the <strong>Non-proxy Requests</strong> tab.</li>
<li>Select the <strong>Pipe requests through to predetermined server</strong> radio button. Here you should enter the IP address of the computer, which the FTP server is running on behind WinGate, to which all FTP requests from the Internet will be directed.</li>
<li>Enter the port as 2121(or the new port the FTP server has been configured to listen on).</li>
<li>Select <strong>OK</strong> as you exit out of the FTP Proxy Server</li>
<li>Save changes in GateKeeper.</li>
</ol>
<br /> If you are using the benefits of the WinGate's Extended Networking features then an alternative way is to allow users on the Internet to access an Application Server behind WinGate by creating a security filter to handle inbound packets on the appropriate port.<br /><br /> So with the Example of an FTP server running on the same machine as WinGate you would do the following:<br />
<ol>
<li>Open GateKeeper on the WinGate server.</li>
<li>Open <strong>Extended Network Services</strong> under the <strong>System </strong> tab.</li>
<li>Select the <strong>Port Security</strong> tab.</li>
<li>Click the <strong>Add</strong> button.</li>
<li>On the port configuration dialog select <strong>Connections from the Internet</strong> and <strong>TCP</strong> as the protocol.</li>
<li>Enter Port 21 or designated FTP port (as required) on the FTP server.</li>
<li>Select the <strong>Allow Packet</strong> option.</li>
<li>Click <strong>OK</strong> to exit the ENS configuration.</li>
<li>Save changes in Gatekeeper</li>
</ol>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Authentication - Changing Session Time-out Period when Client Log...]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/78]]></link>
<guid isPermaLink="false"><![CDATA[35f4a8d465e6e1edc05f3d8ab658c551]]></guid>
<pubDate><![CDATA[Wed, 24 Jan 2007 20:04:47 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Applies to version 6.1 and later
 In version 6.1 we added the ability to control the length of time that a user session stays active in WinGate. Previously an authenticated user session would drop to an assumed state for 30 seconds when the last applicat...]]></description>
<content:encoded><![CDATA[<p><span style="color: #ff0000;">Applies to version 6.1 and later</span></p>
<div style="margin-left: 15px;"><br /> In version 6.1 we added the ability to control the length of time that a user session stays active in WinGate. Previously an <strong>authenticated</strong> user session would drop to an <strong>assumed</strong> state for 30 seconds when the last application session closed, allowing the user to continue browsing (open a new application session) without the need to reauthenticate. After this time the session would drop and the client would no longer have access through WinGate without reauthenticating.<br /> <br /> By editing the WinGate registry file you can change the amount of time that the user session stays active in WinGate.<br />
<ul>
<li>On the WinGate server open the regsitry editor</li>
<li>Find the following registry key:<br /> HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software\WinGate\Settings<br /> </li>
<li>Right click and add a new <strong>DWord Value</strong> as follows:<br /> Value Name: MachineTimeout<br /> Value Data: 30 (or appropriate setting - this is the time in seconds that a session will stay connected after the user logs off)<br /> </li>
<li>Right click and add a second <strong>DWord Value</strong> as follows:<br /> Value Name: MachineTimeoutAuthAction<br /> Value Data: (choose the appropriate value as described below) <br /> <br /> 0 = leave user assumed for the <strong>MachineTimeout</strong> period after they log off.<br /> 1 = leave user authenticated for the <strong>MachineTimeout</strong> period after they log off.<br /> 2 = leave user as guest for the <strong>MachineTimeout</strong> period after they log off.</li>
</ul>
<br /> <br /> You will need to restart the WinGate engine after making these changes.<br /> <br /> <img src="/kbimage/registry-sessiontimeout.gif" alt="session time out" name="image showing session time out registry setting" /><br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_m=tickets&amp;_a=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Authentication Overview]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/67]]></link>
<guid isPermaLink="false"><![CDATA[735b90b4568125ed6c3f678819b6e058]]></guid>
<pubDate><![CDATA[Mon, 12 Jun 2006 19:53:07 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Authentication is used in WinGate to control user access to the WinGate services, and by extension the Internet. Policies can be created to control users on a user or group basis but if you want to differentiate between users you must use some form of aut...]]></description>
<content:encoded><![CDATA[<p>Authentication is used in WinGate to control user access to the WinGate services, and by extension the Internet. Policies can be created to control users on a user or group basis but if you want to differentiate between users you must use some form of authentication.<br /> <br /> For more information regarding creation of policies in WinGate please see <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/68">this</a> knowledge base article.<br /> <br /> If no authentication is used then the WinGate server has no way of discovering which user is connecting to it, so all user connections will show up as coming from the GUEST account.<br /> <br /> There are a few authentication options available in WinGate:</p>
<ul>
<ul>
<li>User Assumption - by IP address, or if you are using the WinGate DHCP service, by machine name.</li>
</ul>
</ul>
<p>&nbsp;</p>
<ul>
<ul>
<li>Basic Authentication</li>
</ul>
</ul>
<p>&nbsp;</p>
<ul>
<ul>
<li>Java Authentication</li>
</ul>
</ul>
<p>&nbsp;</p>
<ul>
<li>NTLM Authentication</li>
</ul>
<p><br /> <br /> There are three levels of Authentication in WinGate and the above Authentication options fit into these levels of Authentication.<br /> <br /> <strong>User may be Unknown:</strong><br /> This is the Unauthenticated level, all users will be seen to be GUEST and no Authentication is required to connect to the WinGate services. Policies can still be set to control access to the Internet, these policies will affect all users.<br /> <br /> <img src="/kbimage/user-guest.gif" alt="Guest User" name="User Guest Picture" /><br /> <br /> <strong>User may be Assumed:</strong><br /> An intermediate level of Authentication that does not provide a high level of security. Used with either Basic Authentication or Assumptions. It can be convenient to set up Assumptions by IP address, this allows you to create policies based on the machine that the user is connecting from and does not require any input from the user. Using Assumptions grants access rights on a per machine basis so any user accessing WinGate from a particular machine can be assumed to be a specified user.<br /> <br /> <img src="/kbimage/user-assumed.gif" alt="Assumed User" name="Assumed User Picture" /><br /> <br /> For more information regarding the Assumed level of Authentication in WinGate please see <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/12">this</a> knowledge base article.<br /> <br /> <strong>User must be Authenticated;</strong><br /> The highest level of security, uses either the Java login through the WWW proxy, NTLM authentication if using the Operating System database, or the GateKeeper login method to authenticate users.<br /> <br /> <img src="/kbimage/user-authenticated.gif" alt="Authenticated User" name="Authenticated User Picture" /><br /> <br /> For more information regarding the Authenticated level of Authentication in WinGate please see <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/13">this</a> knowledge base article.<br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?/Tickets/Submit"><span style="color: #ff0000;">Qbik Support</span></a>.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Backing up WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/43]]></link>
<guid isPermaLink="false"><![CDATA[17e62166fc8586dfa4d1bc0e1742c08b]]></guid>
<pubDate><![CDATA[Wed, 26 Jan 2005 10:31:12 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[All configuration changes(policies, user accounts, service mappings configurations, plugin configurations etc.) created/changed and then saved in Gatekeeper are written to the registry.  The best way to preserve your settings is by exporting the registry ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">All configuration changes(policies, user accounts, service mappings configurations, plugin configurations etc.) created/changed and then saved in Gatekeeper are written to the registry.<br /> <br /> The best way to preserve your settings is by exporting the registry file. If you ever make a change that you later regret, or if WinGate needs to be reinstalled for any reason you can simply import the registry file and all of your settings will be retained.
<p><strong>To export the registry file:</strong></p>
<p>If you can log in to GateKeeper-</p>
<p>&nbsp;</p>
<ul>
<li>go to the options&gt;advanced menu or START&gt;&gt; Programs &gt;&gt; WinGate &gt;&gt; WinGate advanced options &gt;&gt; Registry</li>
<li>click the button Save Registry Settings</li>
<li>save the registry file somewhere safe.
<p><img src="/kbimage/registry-export.gif" alt="Save Registry Settings" /></p>
<p>If you cannot log in to GateKeeper-</p>
</li>
<li>open the registry editor</li>
<li>find the following key</li>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software</li>
<li>go to the Registry menu and select export registry file save it somewhere safe. <br /> <br /> <strong>Importing WinGate settings </strong> <br /> Note. If you are importing to a 64bit OS then you need to follow the instructions <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/92"><span style="color: #ff0000;">here.</span></a>
<ul>
<li>Stop the WinGate Engine (either from the WinGate icon in the systray or from the Stop WinGate engine in Start menu/Programs/WinGate).</li>
<li>Open the registry editor (Start menu/Run/regedit).</li>
<li>Navigate to HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software.</li>
<li>Delete or rename the registry key called "WinGate".</li>
<li>Close the registry editor.</li>
<li>Double click on the saved WinGate registry file.</li>
<li>Start the WinGate engine ( either from the WinGate icon in the systray or Stop WinGate engine in Start menu/Programs/WinGate).</li>
</ul>
<br /> <strong>Please Note:</strong> Any configuration changes made in GateKeeper prior importing the registry file will be overwritten by the corresponding settings in the imported Reg file. <br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_a=tickets&amp;_m=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</li>
</ul>
<p>&nbsp;</p>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Blocking access to Messenger applications]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/70]]></link>
<guid isPermaLink="false"><![CDATA[7cbbc409ec990f19c78c75bd1e06f215]]></guid>
<pubDate><![CDATA[Tue, 10 Oct 2006 12:08:40 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[We have found that blocking access to Messenger applications can be problematic due to the multiple connection methods that they use. If you block access to a URL or port they can fail-over to a secondary or tertiary connection method.  The easiest way to...]]></description>
<content:encoded><![CDATA[<p>We have found that blocking access to Messenger applications can be problematic due to the multiple connection methods that they use. If you block access to a URL or port they can fail-over to a secondary or tertiary connection method.<br /> <br /> The easiest way to stop your users accessing Messenger applications is to use the WinGate Internet Client (WGIC) on the client machines and the Central Config in the WinSock Redirector Service in WinGate. This way you can add the Messenger.exe file to the list of controlled applications and stop it from running at all on the client machines. There is no need to create any port blocking rules or URL bans as the application can't run so it can't connect.<br /> <br /> To stop an application running on the client machines using the Central Config and the WGIC:<br /> <br /> Install the WGIC on the client machines and make sure it connects to the WinGate server - for more information see the following knowledge base articles:<br /> <br /> <a href="http://support.qbik.com/index.php?_a=knowledgebase&amp;_j=questiondetails&amp;_i=120"><span style="color: #ff0000;">Configuring LAN clients to make a WGIC connection</span></a> <br /> <br /> <a href="http://support.qbik.com/index.php?_a=knowledgebase&amp;_j=questiondetails&amp;_i=110"><span style="color: #ff0000;">Distributing the WGIC in an Active Directory environment</span></a><br /> <br /> In GateKeeper open the WinSock Redirector Service on the System tab<br /> Choose Central Config<br /> Click Add<br /> <br /> <img src="http://support.qbik.com/kbimage/wrs.gif" alt="WinSock Redirector Service." border="0" /><br /> <br /> Choose the user/group to apply the policy to<br /> <br /> <img src="http://support.qbik.com/kbimage/wrs-user-config.gif" alt="WRS User Configuration." border="0" /><br /> <br /> On the General settings tab set the default mode to MIXED<br /> Ensure that CHECK THE CENTRAL APPLICATION LIST is checked<br /> <br /> <img src="http://support.qbik.com/kbimage/wrs-gen-set.gif" alt="WRS General Settings." border="0" /><br /> <br /> On the Applications tab click Add and enter the name of the executable (messenger.exe)<br /> <br /> <img src="http://support.qbik.com/kbimage/wrs-app-list.gif" alt="WRS Application List." border="0" /><br /> <br /> Set the mode type to APPLICATION TERMINATED<br /> <br /> <img src="http://support.qbik.com/kbimage/wrs-app-edit.gif" alt="WRS Application Edit Screen." border="0" /><br /> <br /> Ok your way out<br /> <br /> The Messenger application will not be able to load on the client machines.<br /> <br /> Please note that the Central Config menu is only available with an Enterprise license, so if you purchase a Standard or Professional license you will need to rely on port blocking and URL restrictions.<br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_a=tickets&amp;_m=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Changing the KAV Database from Extended to Normal]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/75]]></link>
<guid isPermaLink="false"><![CDATA[d09bf41544a3365a46c9077ebb5e35c3]]></guid>
<pubDate><![CDATA[Wed, 24 Jan 2007 20:00:39 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ Kaspersky AntiVirus for WinGate now uses an Extended AntiVirus database. This is new for version 2.x. The Extended database still scans for viruses but now also scans for other programs which are potentially harmful, such as:

Adware.
Remote administr...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> Kaspersky AntiVirus for WinGate now uses an Extended AntiVirus database. This is new for version 2.x. The Extended database still scans for viruses but now also scans for other programs which are potentially harmful, such as:
<ul>
<li>Adware.</li>
<li>Remote administration programs.</li>
<li>Utilities which can be used by malicious programs or users such as trojans.</li>
<li>General Malware</li>
</ul>
<br /> If you do not wish to use the Extended Database you can revert to the Standard AntiVirus database as follows:<br /><br />
<ol>
<li>Stop the WinGate engine</li>
<li>Open <strong>regedit</strong>, navigate to the following location<br />
<ul>
<li>HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software\WinGate\Data Scanning Plugins\Installed\Kaspersky AntiVirus for WinGate\Update URL List</li>
</ul>
</li>
<li>For each <strong>UpdateServer</strong> folder delete the <strong>"_ext"</strong> from the end of the <strong>URL</strong> key:</li>
<li>Close <strong>regedit</strong></li>
<li>In <strong>Windows Explorer</strong> delete the following folders:<br />
<ul>
<li>C:\Program Files\WinGate\Plugins\Kaspersky AntiVirus\Bases</li>
<li>C:\Program Files\WinGate\Plugins\Kaspersky AntiVirus\Downloads</li>
</ul>
</li>
<li>Start the WinGate Engine</li>
<li>Start a manual update via the Start menu<br /> (Windows) Start menu --&gt; Programs --&gt; WinGate --&gt; Plugins --&gt; Kaspersky AntiVirus --&gt; Kaspersky AntiVirus Updater</li>
<li>Once the update is complete stop then start the WinGate Engine.</li>
</ol>
</div>
<p><br /><br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_a=tickets&amp;_m=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Checksum Errors]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/88]]></link>
<guid isPermaLink="false"><![CDATA[2a38a4a9316c49e5a833517c45d31070]]></guid>
<pubDate><![CDATA[Thu, 27 Aug 2009 17:05:03 +1200]]></pubDate>
<dc:creator><![CDATA[Logan Moore]]></dc:creator>
<description><![CDATA[Symptom
From time to time, you might see a checksum error reported in the Firewall tab of the GateKeeper (as shown in the image below). This message occurs when WinGate receives a packet but finds that the checksum value which the packet evaluates to doe...]]></description>
<content:encoded><![CDATA[<h4>Symptom</h4>
<p>From time to time, you might see a checksum error reported in the Firewall tab of the GateKeeper (as shown in the image below). This message occurs when WinGate receives a packet but finds that the checksum value which the packet evaluates to does not match up the checksum value which the packet reports it should evaluate to. In simpler terms, the packet has become corrupt during transmission.</p>
<h4>Solution</h4>
<p>It is normal to observe a checksum error from time to time, but if you are observing a large number of checksum errors regularly, then you may have a problem that needs to be addressed. We recommend starting the troubleshooting process by making the following change to your system which will stop Windows from offloading the checksumming tasks from the system CPU to the attached networking hardware. This change itself may not fix the problem, but it will let us know if the problem is with software or hardware.</p>
<ol>
<li>Click Start, click Run, type regedit, and then click OK.</li>
<li>Locate and then click the following registry subkey:</li>
<li>HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters</li>
<li>Click Edit, point to New, and then click DWORD Value.</li>
<li>Type DisableTaskOffload as the entry name, and then press ENTER.</li>
<li>Right-click DisableTaskOffload, and then click Modify.</li>
<li>In the Value data box, type a value of 1, and then click OK.</li>
<li>Quit Registry Editor.</li>
<li>Restart your computer.</li>
</ol>
<p>Monitor the firewall for a while after making this change. If checksum errors continue to occur, contact support@qbik.com for assistance with further troubleshooting.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Considerations for Online Gaming with WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/4]]></link>
<guid isPermaLink="false"><![CDATA[a87ff679a2f3e71d9181a67b7542122c]]></guid>
<pubDate><![CDATA[Mon, 24 Nov 2003 12:21:53 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[When attempting to play online gaming through WinGate there are a number of points that need to be understood to have it work correctly.  Due to the fact that WinGate is a proxy server, it only presents one IP address to the Internet. This can be an issue...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">When attempting to play online gaming through WinGate there are a number of points that need to be understood to have it work correctly.<br /> <br /> Due to the fact that WinGate is a proxy server, it only presents one IP address to the Internet. This can be an issue when more then one client behind WinGate wants to join the same game hosted by the same server on the Internet. <br /> <br /> Since a large number of games/games servers will only allow one connection or session for every IP that attempts to connect to join a game, complications will arise, as clients from behind WinGate will of course appear to use the same IP.<br /> <br /> As this is more of a universal problem with Proxy Server/Firewall scenarios, there has been several gaming standards created that allow multiple connections to the Game Server from one IP address. An example of this is Direct Play.<br /> <br /> WinGate currently has built in support for Direct Play, which means that multiple clients from behind WinGate are able to connect to the same Game server (hosting a DirectPlay supported game) on the Internet simultaneously.<br /> <br /> When planning to play online gaming users should be aware of what type of standards the game supports. There are also several other things that you will need to ensure to make sure your gaming experience is happier when working through WinGate.
<ol>
<li>Make sure the game you are using has all of the latest upgrades and patches from the official website of the game in question. Sometimes these fixes address networking and online gaming issues, which could stop the game connecting correctly.</li>
<li>Make sure all of the appropriate ports that the game requires have been configured correctly in the WinGate firewall. Sometimes the default medium setting in WinGates ENS configuration, does not correctly configure the ports that are particular to the game in question.</li>
<li>Make sure that you read the networking documentation of the game in question in case there are any special tweaks required when working with a proxy server/firewall scenario.</li>
</ol>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Creating WWW proxy policies]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/66]]></link>
<guid isPermaLink="false"><![CDATA[3295c76acbf4caaed33c36b1b5fc2cb1]]></guid>
<pubDate><![CDATA[Wed, 17 May 2006 16:45:02 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[When your users connect through the WWW proxy service, whether by a Transparently Proxied NAT/WGIC connection, or a direct proxy connection, you have the ability to apply polices to them.  To apply a policy by Username you must have some form of Authentic...]]></description>
<content:encoded><![CDATA[<p>When your users connect through the WWW proxy service, whether by a Transparently Proxied NAT/WGIC connection, or a direct proxy connection, you have the ability to apply polices to them.<br /> <br /> To apply a policy by Username you must have some form of Authentication so that WinGate can learn the Username. For more information about creating an authentication policy please read this article<br /> <br /> There are a number of policies that you can create in the WWW proxy service to control user access to the Internet. Some of the more common policy setups are listed in the following articles:<br /> <br /> <strong>Restricting client access to Specific URL's and Sites</strong><br /> click <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/32">here</a> to read the article<br /> <br /> <strong>Restricting client access to explicitly allowed sites only</strong><br /> click <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/54">here</a> to read the article<br /> <br /> <strong>Resticting Access times for clients using WinGate</strong><br /> click <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/9">here</a> to read the article<br /> <br /> <strong>Advanced time restriction policy</strong><br /> click <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/57">here</a> to read the article<br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?/Tickets/Submit"><span style="color: #ff0000;">Qbik Support</span></a>.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[DNS Servers]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/64]]></link>
<guid isPermaLink="false"><![CDATA[ea5d2f1c4608232e07d3aa3d998e5135]]></guid>
<pubDate><![CDATA[Tue, 13 Dec 2005 16:21:51 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ If you are running an Active Directory and your WinGate server is on a machine other than the Active Directory Domain Controller/DNS server, you'll need to edit this menu.  When your WinGate server is a member of an Active Directory domain you will need ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> If you are running an Active Directory and your WinGate server is on a machine other than the Active Directory Domain Controller/DNS server, you'll need to edit this menu.<br /> <br /> When your WinGate server is a member of an Active Directory domain you will need to enter the IP address of your DNS server in the LAN adapter on the WinGate machine. This allows the WinGate server to log on to the domain but can cause a problem when the WinGate server receives a DNS resolution request from the network. <br /> <br /> When the AD DNS server receives a DNS request it checks the upstream DNS server for resolution. If WinGate is the gateway server for the network then the AD DNS server will send WinGate the DNS request. When the WinGate server receives the DNS request it will check it's local adapter DNS settings and forward the request to the DNS server. Because the AD DNS server is listed in the DNS server settings on the local adapter you can end up with a DNS loop. Entering the IP address of the AD DNS server in the Advanced Options tells WinGate not to check that server and prevents the loop.<br /> <br /> You'll know this is happening if you see a large amount of DNS requests in the activity screen in GateKeeper. You'll also find that internet access slows down and eventually stops if the DNS is looping.<br /> <br /> <img src="/kbimage/advanced-DNSserver.gif" alt="DNS server menu" name="DNS server image" /><br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_m=tickets&amp;_a=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[I've Installed WinGate, Now What?]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/68]]></link>
<guid isPermaLink="false"><![CDATA[a3f390d88e4c41f2747bfa2f1b5f87db]]></guid>
<pubDate><![CDATA[Tue, 13 Jun 2006 21:28:38 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Great, you&rsquo;ve installed the best Windows proxy server software around, but now you need to know what to do with it? It&rsquo;s easy if you know how, but if you&rsquo;re not a Networking Wizard then it can be a little daunting at first. So read on to...]]></description>
<content:encoded><![CDATA[<p>Great, you&rsquo;ve installed the best Windows proxy server software around, but now you need to know what to do with it? It&rsquo;s easy if you know how, but if you&rsquo;re not a Networking Wizard then it can be a little daunting at first. So read on to find out what to do after you&rsquo;ve installed WinGate, and how to go about configuring your LAN to get your client machines connecting to the Internet.<br /> <br /> <br /> <strong>Logging in</strong><br /> <br /> The first time that you log in to WinGate you must log in as the Administrator. When you installed the software you were asked whether you wanted to use the WinGate user database or the Operating System (OS) user database. <br /> <br /> If you chose the WinGate user database then you&rsquo;ll need to log in as <br /> USERNAME: administrator<br /> PASSWORD: (blank &ndash; i.e. no password)<br /> You will then be asked to set a password for the user administrator<br /> <br /> If you chose the OS user database then you&rsquo;ll need to log in as the local machine Administrator with the appropriate password.<br /> <br /> <br /> <strong>Activating a License</strong><br /> <br /> WinGate v6 requires an activated license before it will work, you can either activate your purchased license or a 30 day free trial license. There is an Activation Wizard that will guide you through the Activation process, if you have any problems then you should contact Customer Support, either through the Reseller that you purchased your license from, or from Qbik Software.<br /> <br /> You can deactivate a license if you are moving WinGate to a different machine, this should be done before you uninstall the software. <br /> <br /> For more about activating your license please see the Activation guide or this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/60">knowledge base article</a>.<br /> <br /> <br /> <strong>Setting Up Your Network</strong><br /> <br /> Believe it or not, that&rsquo;s the hard part done. WinGate is designed so that it&rsquo;s ready to share and manage your Internet connection as soon as it&rsquo;s installed. As long as WinGate is installed on your Internet Gateway and your LAN adapter is marked as Internal and your Internet adapter is marked as External, then everything is set up and ready to go. <br /> <br /> Now all you have to do is set your LAN client machines so that their default gateway and DNS server settings point at the WinGate server. WinGate comes with a built-in DHCP server that will automatically assign IP addresses in the range of the WinGate LAN adapter and set the WinGate server as the default gateway and DNS server, so all you have to do now is reboot your LAN client machines. They should now get an IP address from the WinGate server and have their default gateway and DNS server listed as the WinGate server. Now open a web page on the LAN client machine and check the Activity pane in the GateKeeper User Interface. You should see a connection from that LAN machine to an IP address on the Internet. Woo-hoo, you&rsquo;re good to go! You&rsquo;re now making what we refer to as a NAT connection, basically all Internet traffic from your LAN machines must pass through the WinGate server, this gives you control over what your users are doing and allows you to see what they access.<br /> <br /> Proxy and WGIC connections can also be made when the WinGate server is the gateway machine.<br /> <br /> Now, there are a few exceptions to the above scenario, the most obvious being if you&rsquo;re running an Active Directory domain. In this case you may already have a DHCP server running on your network and you&rsquo;ll definitely need to set the LAN clients&rsquo; DNS server settings to point at the AD DNS server. If you&rsquo;re already running DHCP on your network then you can set the default gateway as the WinGate server, this will allow you to make a NAT connection as above. You should stop the WinGate DHCP server if you already have a DHCP server running. <br /> <br /> Another common, if not recommended scenario is to have WinGate installed on one of the LAN machines and have all machines connecting to a Router. This means that the LAN traffic cannot be forced through WinGate and will allow users to connect to the Internet without connecting through the WinGate server. While this is a potential security risk in that Internet traffic can not be definitely intercepted, NAT connections will still work and there are two other connection methods available. Clients can make a Proxy connection by entering the IP address of the WinGate server in an Application&rsquo;s proxy server settings, or they can make a WGIC (WinGate Internet Client) connection by installing the WGIC on the LAN machines. The WGIC hooks into the OS of the client machine and redirects all Network traffic to the WinGate server. This method of connection is very popular in Active Directory domains as it gives the Network Administrator an almost unprecedented level of control over the LAN machines. For more information on client connections methods please see the Install guide or this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/51">knowledge base article</a><br /> <br /> <br /> <strong>I need to see the URLs that my users are browsing to, not an IP address!</strong><br /> <br /> If you&rsquo;re seeing an IP address when your LAN clients are browsing the Internet then that&rsquo;s great, it means that they&rsquo;re making a NAT connection through WinGate. NAT connections happen at a low level in the WinGate driver, and they don&rsquo;t show URLs. You need to Transparently Redirect these NAT connections to the WWW Proxy service to view the URL, fortunately that&rsquo;s really easy. To read a knowledge base article on enabling the Transparent Proxy please <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/57">click here</a><br /> <br /> <strong>I need to make my users authenticate before they get access to the Internet</strong><br /> <br /> There are several authentication options available in WinGate, to read more about them please see this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/69">knowledge base article</a><br /> <br /> <br /> <strong>I need to stop certain users from browsing/allow certain users to browse</strong><br /> <br /> You can create all the Policies you require to control your Users&rsquo; Internet access, for more information on creating policies please see this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/68">knowledge base article</a><br /> <br /> <strong>I need to scan Internet traffic/emails for viruses before they reach my network</strong><br /> <br /> Sounds like you need Kaspersky Anti-Virus for WinGate, this is a plug-in for the WinGate server that will scan traffic for viruses/malware as it passes through the server. You can download a 30 day free trial from the Qbik website, or from your Reseller.<br /> <br /> <strong>I need to prohibit access to offensive content on the Internet</strong><br /> <br /> The easiest way to do this is by getting the PureSight for WinGate plug-in which is powered by ICognito. This will scan web traffic for prohibited content such as Pornography and Gambling, and can be set up to deny access to sites containing Webmail, HateSpeech, Stockmarket content and more. You can download a 30 day free trial from the Qbik website, or from your Reseller.<br /> <br /> <strong>I need to set up my WinGate Email server</strong><br /> <br /> Please see the following <a href="http://downloads.qbik.com/qbiknz2/downloads/Mail_Server_6_Scenarios_and_Configurations.pdf"> white paper</a> on the WinGate mail server<br /> <br /> <strong>I need to synchronise WinGate with my Active Directory User Database</strong><br /> <br /> Please see this <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/49">knowledge base article</a><br /> <br /> <br /> <br /> These have been some of the more common tasks that can help users new to WinGate. If you have further questions, or any problems, please contact your local Reseller or the <a href="http://support.qbik.com/index.php?/Tickets/Submit"><span style="color: #ff0000;">Qbik Software</span></a> Support Team.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Identifying your version of WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/25]]></link>
<guid isPermaLink="false"><![CDATA[8e296a067a37563370ded05f5a3bf3ec]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 17:18:15 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[You can identify which version of WinGate you are running in several places in Gatekeeper:

Open GateKeeper on the WinGate server
Select Help from the menu bar at the top of GateKeeper.
Click on the System Info menu item.
The WinGate version informat...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">You can identify which version of WinGate you are running in several places in Gatekeeper:
<ol>
<li>Open GateKeeper on the WinGate server</li>
<li>Select <strong>Help</strong> from the menu bar at the top of GateKeeper.</li>
<li>Click on the <strong>System Info</strong> menu item.</li>
<li>The WinGate version information will be displayed in the window that appears.</li>
</ol>
<img src="/kbimage/gatekeeper-version.gif" alt="GateKeeper Version Check" />
<p>Or alternatively:</p>
<ol>
<li>Open Gatekeeper.</li>
<li>Select <strong>Options</strong> from the menu bar at the top of GateKeeper.</li>
<li>Click on the <strong>Advanced</strong> menu item.</li>
<li>Click on the <strong>Troubleshooting</strong> tab and in the Configuration Report window it will have listed version details.</li>
</ol>
<p><img src="/kbimage/config-version.gif" alt="Configuration Version Check" /></p>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Minimum Requirements for Installation]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/55]]></link>
<guid isPermaLink="false"><![CDATA[b53b3a3d6ab90ce0268229151c9bde11]]></guid>
<pubDate><![CDATA[Fri, 11 Nov 2005 15:00:54 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ This is a guide to the minimum system requirements and recommended configurations for running WinGate server. The WinGate server can be installed on any computer on your network, so long as it has a direct connection to the Internet. 


1 GHz CPU (or ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> This is a guide to the minimum system requirements and recommended configurations for running WinGate server. The WinGate server can be installed on any computer on your network, so long as it has a direct connection to the Internet.<br /> <br /><br />
<ul>
<ul>
<li>1 GHz CPU (or higher)</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>256 Megabytes RAM (or higher)</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>500 Megabytes of hard disk drive space (although we recommend as much as possible to allow for logging operation and virtual disk space)</li>
</ul>
</ul>
<br /><br /> <br /> <br /> <strong>The following Windows Operating Systems:</strong><br /> <br /><br />
<ul>
<ul>
<li>2000</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>XP (32 or 64 bit)</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>2003 (32 or 64 bit)</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>Vista (32 or 64 bit)</li>
</ul>
</ul>
<br />
<ul>
<ul>
<li>Windows 2008 Server (32 or 64 bit)</li>
</ul>
</ul>
<br /><br /> <br /> <br /> </div>]]></content:encoded>
</item>
<item>
<title><![CDATA[More on WinGate Random Dialing]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/2]]></link>
<guid isPermaLink="false"><![CDATA[c81e728d9d4c2f636f067f89cc14862c]]></guid>
<pubDate><![CDATA[Sat, 27 Sep 2003 05:19:21 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[If you use a modem to connect your network to the Internet with WinGate, you may occasionally see WinGate dial your Internet Service Provider for no apparent reason. There are a number of reasons why you might encounter what may seem to be WinGate randoml...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">If you use a modem to connect your network to the Internet with WinGate, you may occasionally see WinGate dial your Internet Service Provider for no apparent reason. There are a number of reasons why you might encounter what may <strong>seem</strong> to be WinGate randomly dialing.<br /> <br /> <strong>Cause 1 - Local network client machines making DNS requests</strong><br /> <br /> WinGate will dial when a client machine on your network makes a <strong>DNS request</strong>. This happens where the client machine is using the WinGate machine as its DNS server, and the WinGate DNS server is configured to dial. You can verify whether this is the case or not by looking at the <strong>History tab</strong> using the control and configuration <strong>GateKeeper</strong> utility in WinGate.<br /> <br /> DNS requests could be caused by any of the following:<br /> <br />
<ul>
<li>Normal use of the Internet by users on your local network (LAN)</li>
<li>Internet applications which may poll the Internet on a regular basis looking for updates. Windows update itself can even do this on some operating systems.</li>
<li>Local machines making <strong>NetBIOS</strong> requests using DNS to look up other machines on your network. Some operating systems allow you to disable this.</li>
<li>Machines participating in an Active Directory. Active Directory makes extensive use of DNS to locate directory services.</li>
</ul>
<strong>Remedy</strong><br /> <br /> The simplest way to stop WinGate from dialing in these cases is to disallow the DNS server in WinGate from initiating the dialer.<br /> <br /> To do this:
<ol>
<li>Log in to <strong>GateKeeper</strong></li>
<li>Click on the <strong>DNS service</strong> on the <strong>System Tab</strong></li>
<li>On the <strong>General tab</strong> in the DNS service properties, uncheck the box marked "<strong>Allow Request to initiate dialer</strong>".</li>
</ol>
<strong>Note:</strong> This has a number of <strong>side effects</strong>, the main one being that dialing on demand may not work as you expect.The extent to which this may cause a problem is dependent on the method you use for your network client machines to connect to the Internet.<br /> <br /> WinGate has <strong>3 methods</strong> of allowing clients to connect to the Internet:
<ul>
<ul>
<li>Using WinGate's <strong>ENS</strong> driver to connect by means of Network Address Translation (<strong>NAT</strong>).<br /> <br /> Machines on your network will be using this if you have the ENS driver installed, and the local machines are configured to use WinGate as either their DHCP server (in which case their default gateway setting will be set to the IP address of the WinGate machine).<br /> <br /> In this case, the effect for these machines will be to effectively disable dial on demand completely, since these machines will need to be able to complete a DNS lookup before they will attempt to connect to anything on the Internet.</li>
</ul>
</ul>
<br /><br />
<ul>
<li>Using the <strong>WinGate Internet Client</strong> on your client computers.<br /> <br /> As with NAT above, the WinGate Internet Client requires that the client machines are able to complete a DNS lookup to resolve the name of the host they are connecting to before there will be any connection attempt.<br /> <br /> So similarly to the instructions above, if you choose to disallow WinGate's DNS server from dialing, then dial on demand will be effectively disabled for these users. <br /> </li>
<li>Using <strong>Proxies</strong> in WinGate, for example the WWW Proxy.<br /> <br /> In this case, the client does not need to resolve an Internet address, as it connects to the proxy, issues the proxy an instruction to fetch a URL, and WinGate itself resolves the host name with DNS. In this case however, WinGate controls dialing separately. Therefore if your client machines are using this method to connect to the Internet, there will be little side-effect to disabling the DNS server from dialing.</li>
</ul>
<br /> If you decide that you do not wish to disable WinGate's DNS server from initiating the dialer, you have several other remedies.<br /> <br /> You could:
<ul>
<li>Attempt to <strong>stop </strong>the client machines from making the <strong>DNS requests</strong>.</li>
<li>Look on your client machines for applications that run in the background, ticker-tape applications, instant messenger applications, etc.</li>
<li>Configure your client machines not to use DNS for windows name resolution.</li>
<li>Find out which names are being looked up by looking in the WinGate history database, and ban these lookups. The lookups will then fail in all cases, but will not cause WinGate to dial the Internet.</li>
</ul>
<strong>CAUSE 2 - Local network client machines initiating a connection to the Internet through WinGate.</strong><br /><br /> WinGate will dial when a client on your LAN initiates a connection, or tries to send a data packet(not necessarily a connection attempt) to the Internet, where WinGate ENS is installed, and WinGate is configured to dial on demand.<br /> <br /> This will show up in WinGate's history as a NAT connection.<br /> <br /> In general, clients do not attempt to connect to the Internet without first locating the address of where they wish to connect to, and this is achieved using a DNS lookup, so usually the reason that WinGate seems to dial unnecessarily is because of DNS lookups.<br /> <br /> However if your client machines have access to another DNS server on the network that can resolve Internet names, or where the client software is configured to use an IP address to connect to, it is sometimes possible to get packets sent without having had a preceding DNS lookup to resolve the name into an address.<br /> <br /> <strong>Remedy</strong><br /> <br /> You could:
<ul>
<li>Mark the site as local Found in the <strong>Dialer</strong> configuration in GateKeeper. You will likely need to enter the IP address in here. When a client tries to connect to that address, WinGate's dialer will deem it to be local, and will not dial the Internet.<br /> <br /> You can find information about what sites are being connected to in the WinGate History in GateKeeper. Further information may be found in the WinGate service <strong>log</strong> files, in the log directory in the WinGate install directory.</li>
</ul>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Overview of Assumed Users]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/12]]></link>
<guid isPermaLink="false"><![CDATA[c20ad4d76fe97759aa27a0c99bff6710]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 15:55:26 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[WinGate offers as its lowest form of security, a form protection for the network through an Assumed user option. Although this is effective when using features such as banning or restricting users through policy, tracking user accounts and history of comp...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">WinGate offers as its lowest form of security, a form protection for the network through an <strong>Assumed user</strong> option. Although this is effective when using features such as banning or restricting users through policy, tracking user accounts and history of computer activity, it does not require a physical form of authentication from the user themselves (such as a logon). Obviously the user who is being assumed must be in the WinGate database. <br /> There are two types of Assumptions when using this option:<br />
<ul>
<li>Assumptions based on IP addresses</li>
<li>Assumptions based on Computer names. <br /><br /> <strong>Configuring Assumed users based on IP address</strong> <br /> <br /> <strong>Please Note:</strong> In order to use this type of assumed user option, clients machines need to have statically set IP addresses.<br /> <br />
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate Server.</li>
<li>Open the <strong>Users</strong> tab.</li>
<li>Double click on <strong>Assumed Users</strong>.</li>
<li>Select the <strong>By IP address</strong> tab.</li>
<li>Click on the <strong>Add</strong> button.</li>
<li>In the Location dialog that appears, enter the IP address of the client machine.</li>
<li>In the <strong>Then Assume it is</strong> drop down box select the appropriate user.</li>
<li>Click <strong>OK</strong> back through till you have exited the assumed users dialog.</li>
<li>Save changes in GateKeeper.</li>
</ol>
<strong>Configuring Users based on Computer Name</strong><br /> <br /> <strong>Please Note:</strong> In order to use this type of assumed user option, the client needs to be using the WinGate DHCP service (i.e. receive its network details from WinGates DHCP) in order for it to work.
<ol>
<li>Open GateKeeper on the WinGate Server.</li>
<li>Open the <strong>Users</strong> tab.</li>
<li>Double click on <strong>Assumed Users</strong>.</li>
<li>Select the <strong>By Computer name</strong> tab.</li>
<li>Click on the <strong>Add</strong> button.</li>
<li>In the Location dialog that appears, enter the computer name of the client machine.</li>
<li>In the <strong>Then Assume it is</strong> drop down box select the appropriate user.</li>
<li>Click OK back through till you have exited the assumed users dialog.</li>
<li>Save changes in GateKeeper.</li>
</ol>
</li>
</ul>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Reading the Log Files]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/65]]></link>
<guid isPermaLink="false"><![CDATA[fc490ca45c00b1249bbe3554a4fdf6fb]]></guid>
<pubDate><![CDATA[Wed, 28 Dec 2005 16:18:40 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ WinGate&rsquo;s log files are located in C:\Program Files\WinGate\Logs and are ordered by service, for example you'll find the WWW proxy service log in C:\Program Files\WinGate\Logs\WWW Proxy Service.  The current log file is named after the service, any...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> WinGate&rsquo;s log files are located in C:\Program Files\WinGate\Logs and are ordered by service, for example you'll find the WWW proxy service log in C:\Program Files\WinGate\Logs\WWW Proxy Service.<br /> <br /> The current log file is named after the service, any older log files that have been rolled over are named for the date that they were rolled over.<br /> <br /> The data in the log files follows a fairly standard format, for example we've used a snippet from the WWW proxy service log:<br /> <br /> <strong>12/20/05 14:12:49 127.0.0.1 Guest 0000000003 Requested: http://www.wingate.com/<br /> 12/20/05 14:12:49 127.0.0.1 Guest 0000000003 Traffic 14515 469 409 14509 0s</strong><br /> <br /> The columns are as follows:<br /> <br /> Date 12/20/05<br /> Time 14:12:49<br /> IP Address 127.0.0.1<br /> Username Guest<br /> Session number 0000000003 <br /> Event Traffic<br /> Bytes sent to client 14515<br /> Bytes received from client 469 <br /> Bytes sent for client 409<br /> Bytes received for client 14509<br /> Duration of session 0s<br /> <br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_a=tickets&amp;_m=submit"><span style="color: #ff0000;">Qbik Support</span></a>.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Relocation of the logfile directory]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/84]]></link>
<guid isPermaLink="false"><![CDATA[68d30a9594728bc39aa24be94b319d21]]></guid>
<pubDate><![CDATA[Mon, 15 Oct 2007 14:50:34 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[&nbsp;

Stop the WinGate Engine.
Copy your current logfile directory to it&rsquo;s new location.
Open the registry editor (Start -&gt; Run -&gt; regedit) and navigate to &ldquo;HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software\WinGate\Settings&rdquo;.
Click ...]]></description>
<content:encoded><![CDATA[<p>&nbsp;</p>
<ol>
<li>Stop the WinGate Engine.</li>
<li>Copy your current logfile directory to it&rsquo;s new location.</li>
<li>Open the registry editor (Start -&gt; Run -&gt; regedit) and navigate to &ldquo;HKEY_LOCAL_MACHINE\SOFTWARE\Qbik Software\WinGate\Settings&rdquo;.</li>
<li>Click &ldquo;Drop-down menu -&gt; Edit -&gt; New -&gt; String Value&rdquo;.</li>
<li>Name the new value &ldquo;LogFileDirectory&rdquo;.</li>
<li>Double click on the new string value and set the value data to your new logfile directory.<br />e.g. &ldquo;C:\Program Files\WinGate\logs&rdquo;.</li>
<li>Start the WinGate Engine</li>
</ol>
<p><br /> WinGate will record all logfiles in the directory that you just specified. You can delete the original logfile directory from the WinGate directory after it has been moved to it's new location.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Resticting Access times for clients using WinGate ]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/9]]></link>
<guid isPermaLink="false"><![CDATA[45c48cce2e2d7fbdea1afc51c7c6ad26]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 15:35:22 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[One of the most common administration jobs is to monitor Internet usage by users on the LAN, and ensure that they are only using the Internet during certain times. Using WinGate, this can be easily achieved:  If your clients are using the WinGate Internet...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">One of the most common administration jobs is to monitor Internet usage by users on the LAN, and ensure that they are only using the Internet during certain times. Using WinGate, this can be easily achieved:<br /> <br /> If your clients are using the WinGate Internet Client (WGIC)<br />
<ol>
<li>Open <strong>GateKeeeper</strong> on the WinGate Server.</li>
<li>Open the <strong>Winsock redirector service</strong> (Which is listed under the <strong>System</strong> tab).</li>
<li>Select the <strong>Policies</strong> tab.</li>
<li>Ensure the <strong>Rights</strong> option at the top of the Policies tab, has <strong>User can access these services selected.</strong></li>
<li>Make sure the <strong>Default Rights (System Policies)</strong> are set to <strong>are ignored</strong></li>
<li>Click the <strong>add</strong> button below the Window.</li>
<li>Select the user(s)/groups to whom you want to restrict access by time.</li>
<li>Select the <strong>Time</strong> tab and select <strong>Specify times when this recipient has rights</strong>.</li>
<li>Click <strong>Add</strong> and you will be presented with the Time Slice dialog.</li>
<li>Choose/configure the appropriate times you need to choose.</li>
<li>Click <strong>OK</strong> back through each menu.</li>
<li>Save changes in GateKeeper.</li>
</ol>
<img src="/kbimage/wrp-time-policy.gif" alt="image showing the time policy restriction" name="WinSock Redirector Service time policy" /> <strong>Please Note:</strong><br /> <br /> For clients using the NAT, and manual proxies, the process of restricting based on time is similar, however you must ensure that <strong>Transparent Redirection</strong> has been switched on in the WWW Proxy Server(for an article on Transparent Proxy please click <a href="http://support.qbik.com/index.php?_a=knowledgebase&amp;_j=questiondetails&amp;_i=126"><span style="color: #ff0000;">here</span></a>)<br /> <br /> To configure clients using NAT and manual proxies: <br />
<ol>
<li>Open GateKeeeper on the WinGate Server.</li>
<li>Open the <strong>WWW Proxy Server</strong> (Which is listed under the <strong>Services</strong> tab)</li>
<li>Select the <strong>Policies</strong> tab.</li>
<li>Ensure the <strong>Rights</strong> window at the top of the Policies tab has <strong>User can access these services</strong> selected.</li>
<li>Make sure the <strong>Default Rights (System Policies)</strong> are set to <strong>Ignored</strong>.</li>
<li>Click the <strong>add</strong> button below the Window.</li>
<li>Select the user(s)/groups to whom you want to restrict access by time.</li>
<li>Select the time tab and select <strong>Specify times when this recipient has rights</strong>.</li>
<li>Click add and you will be presented with the Time Slice dialog.</li>
<li>Choose the appropriate times you need to configure.</li>
<li>Click <strong>OK</strong> through each menu.</li>
<li>Save changes in GateKeeper.</li>
</ol>
<img src="/kbimage/www-time-policy.gif" alt="image showing time policy restriction" name="WWW proxy time policy" /></div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Restricting client access to explicitly allowed sites only]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/54]]></link>
<guid isPermaLink="false"><![CDATA[a684eceee76fc522773286a895bc8436]]></guid>
<pubDate><![CDATA[Fri, 28 Oct 2005 14:14:14 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[This article takes you through the steps needed to restrict your LAN clients' internet browsing to sites that you explicitly allow. To do this: 

Open Gatekeeper on the WinGate server.
Double click the WWW Proxy Server from the Service tab.
Open the P...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">This article takes you through the steps needed to restrict your LAN clients' internet browsing to sites that you explicitly allow. To do this: <br />
<ol>
<li>Open Gatekeeper on the WinGate server.</li>
<li>Double click the <strong>WWW Proxy Server</strong> from the <strong>Service</strong> tab.</li>
<li>Open the <strong>Policies</strong> tab.</li>
<li>Select <strong>Default Rights (System Policies) are ignored</strong>,</li>
<li>Click <strong>Add</strong>. </li>
<li>In the <strong>Properties for new recipient</strong> dialogue select the <strong>Recipient tab</strong> and select the Users/groups to whom this policy will apply.</li>
<li>Select the <strong>Advanced</strong> tab and choose <strong>Specify which requests this recipient has rights for</strong></li>
<li>Click <strong>Add filter</strong>,<strong>Add criterion</strong>.</li>
<li>Choose <strong>This criterion is met if</strong></li>
<li><strong>HTTP URL</strong></li>
<li><strong>contains</strong></li>
<li><strong>wingate</strong></li>
<li>Ok your way out.</li>
</ol>
<br />This has created a policy that allows access ONLY to any URL that contains WinGate. If you wish to explicitly allow access to more sites repeat steps 7-12. We could have specified a complete URL, eg http://www.wingate.com but this is more restrictive.
<p><img src="/kbimage/explicit-policy.gif" alt="Policy to explicitly allow access to a site" name="explicit policy" /></p>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Restricting client access to Specific URL's and Sites]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/32]]></link>
<guid isPermaLink="false"><![CDATA[6364d3f0f495b6ab9dcf8d3b5c6e0b01]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 17:55:54 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[This article deals with how you can restrict access by clients to certain URL'S when they are connecting through WinGate. Because URL's are somewhat complex in what they can contain, WinGate provides policies to block specific sites and ban access to site...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">This article deals with how you can restrict access by clients to certain URL'S when they are connecting through WinGate. Because URL's are somewhat complex in what they can contain, WinGate provides policies to block specific sites and ban access to sites that have specific phrases in their URL's. <br /> To do this: <br />
<ol>
<li>Open Gatekeeper on the WinGate server.</li>
<li>Select the <strong>WWW Proxy Server</strong> from the <strong>Service</strong> tab.</li>
<li>Open the <strong>Policies</strong> tab.</li>
<li>Underneathe the <strong>Recipient/Rights</strong> window in the middle of the dialog, make sure that the <strong>Default Rights (System Policies)</strong> are set to <strong>&ldquo;Are Ignored&rdquo;</strong>, then click on the <strong>Add</strong> button below this. <br /> The new dialog &ldquo;Properties of new recipient&rdquo; will appear. </li>
<li>Open the <strong>Recipient tab</strong> and select the Users/groups to whom this will apply.</li>
<li>Open the <strong>Advanced</strong> tab and select the <strong>Specify which requests this recipient has rights for</strong> radio button then click on the <strong>Add filter</strong> button below this (which will now be highlighted). <br /> A Filter 1-icon will appear in this window. </li>
<li>With this highlighted, click the Add criterion button.</li>
</ol>
To block specific sites: <br />
<ol>
<li>On the criterion dialog that has appeared select, This criterion IS NOT met if radio button.</li>
<li>From the first dropdown menu select <strong>HTTP URL</strong></li>
<li>From the Second drop down menu select <strong>CONTAINS</strong></li>
<li>In the last test box input the words or phrases that might be in the URL that you would like to block (e.g. sex, or a phrase like porn.com etc)</li>
<li>Continue adding criterion for each URL word or phrase to what you wish to restrict access.</li>
<li>Click OK back through each dialog until you have exited the WWW Proxy Server.</li>
<li>Save changes in GateKeeper.</li>
</ol>
<br /> Now this policy has been set, whenever an affected user attempts to access a URL containing this word or phrase, access will be denied. <br /> <br /> <strong>Please Note:</strong> The words or phrases entered in the last box of the filter are entered as strings, and WinGate reads them as such.<br /> <br /> For example if the phrase &ldquo;money.net&rdquo; is entered in the criterion then the site would be blocked if the URL was business.money.net, BUT it would not block the site if the URL was business.money.org, as &ldquo;money.net&rdquo; is a different string then &ldquo;money.org&rdquo;)<br /> <br /> This is why using simple words in each filter can be very effective because if the word &ldquo;money&rdquo; was used in the criterion then both sites will be blocked as the string &ldquo;money&rdquo; appears in both URLS. <br /> <br /> PureSight for WinGate is a plug-in that allows you to control user access to sites that contain undesirable content. To find out more about the PureSight plug-in please visit our <a href="http://www.wingate.com/products.php"><span style="color: #ff0000;"><strong>web site</strong></span></a>. <br /><br /> If you have any questions about this article please contact <a href="http://support.qbik.com/index.php?_m=tickets&amp;_a=submit"><span style="color: #ff0000;"><strong>Qbik Support</strong></span></a>.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Sending email through a Gateway mail server via WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/30]]></link>
<guid isPermaLink="false"><![CDATA[34173cb38f07f89ddbebc2ac9128303f]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 17:52:10 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[  Since Version 5, WinGate has included an Email server to handle mail requirements in WinGate, for both the sending and receiving of mail. While it is possible to configure WinGate mail server to send mail on behalf of clients, in certain scenarios it ma...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> <br /> Since Version 5, WinGate has included an Email server to handle mail requirements in WinGate, for both the sending and receiving of mail. While it is possible to configure WinGate mail server to send mail on behalf of clients, in certain scenarios it may be more desirable and practical to have this delivery handled by an external server (such as an ISP). In this scenario WinGate should be configured as follows:<br /> <br />
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate Server.</li>
<li>Select the <strong>Email Server</strong> icon from the <strong>System</strong> tab.</li>
<li>Select the <strong>Delivery</strong> tab.</li>
<li>Under the <strong>Remote Delivery</strong> section, click on the <strong>How to Deliver</strong> menu, and select <strong>Use Gateway</strong> option.</li>
<li>In the <strong>Server</strong> text box enter the IP address of the SMTP server(the external mail server you are to use).</li>
<li>Click OK. </li>
<li>Save changes in GateKeeper.</li>
</ol>
<br /> <strong>Please Note:</strong> When setting up WinGate to use an External mail server for mail delivery, there is no requirement for Domains or Email user accounts to be configured in the WinGate Email Server. </div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Setting an alternative Email Password]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/31]]></link>
<guid isPermaLink="false"><![CDATA[c16a5320fa475530d9583c34fd356ef5]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 17:53:54 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[All accounts in WinGate will use a User and corresponding password, which is stored in either the WinGate or NT user database (to read about User Database options and configuration in WinGate click here.)   However it may be required to have an alternativ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">All accounts in WinGate will use a User and corresponding password, which is stored in either the WinGate or NT user database (to read about User Database options and configuration in WinGate <a href="http://support.qbik.com/index.php?/Knowledgebase/Article/View/34">click here</a>.) <br /> <br /> However it may be required to have an alternative password for the user in regards to the authenticating and access of email services. <br /> <br /> To set an alternative Email password for a User do the following:
<ol>
<li>Open GateKeeper on the WinGate server.</li>
<li>Select the <strong>User</strong> tab.</li>
<li>Double click on the user in question.</li>
<li>Select the <strong>Email tab</strong></li>
<li>Make sure the check box and current addresses information are correct at the top of this configuration.</li>
<li>Make sure the <strong>Override WinGate password for POP3</strong> is checked.</li>
<li>Enter the correct Pop3 Password in the box.</li>
<li>Click <strong>OK</strong>.</li>
<li>Save changes in GateKeeper.</li>
</ol>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Stopping spontaneous dialling by WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/15]]></link>
<guid isPermaLink="false"><![CDATA[9bf31c7ff062936a96d3c8bd1f8f2ff3]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 16:17:58 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Due to several factors the WinGate Server may initiate the dialup connection that is used for Internet access when there is no visible or noticeable client activity in GateKeeper.  There are several factors that can influence this type of behaviour:  The ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">Due to several factors the WinGate Server may initiate the dialup connection that is used for Internet access when there is no visible or noticeable client activity in GateKeeper.<br /> <br /> There are several factors that can influence this type of behaviour:<br /> <br /> The first is the way that Operating System features are configured on the WinGate server:<br /> <br /> <strong>File and Printer Sharing </strong><br /> <br /> Although not seen as often in the latest version of WinGate when it is running on Windows 9x machines, an issue can occur with File and Printer sharing when it has been configured to bind to the TCP/IP protocol. <br /> <br /> Because of the way the Windows handles the advertising of shared resources across a TCP/IP network this can cause spurious dialling requests on Win9x systems.<br /> <br /> <strong>Remedy</strong><br /> <br /> To fix this you need to access the properties of the Network Neighbourhood. This can be done by either right clicking on the Network Neighbourhood icon on the desktop, or via the Network Settings icon in the control panel.<br /> <br /> Once the Network properties dialog is open there will be a list of network properties services and protocols listed. Double click on the TCP/IP entry for the corresponding network card and this will bring up the TCP IP dialog for the card.<br /> <br /> Under the Bindings tab, highlight File and Printer sharing and make sure the tick is removed, which inturn unbinds the TCP/IP protocol from File and Printer Sharing service.<br /> <br /> This should correct the issue however if you wish to take advantage of File and Printer sharing service you will have to bind it to an alternative protocol such as IPX or Netbui.<br /> <br /> <strong>Netbios Broadcasts</strong><br /> <br /> Due to the way that Windows supplies information about computer names and their LAN, there is broadcast mechanism that computers will use to advertise themselves. In earlier versions of WinGate this has caused issues with the dialler in WinGate being initiated by these client broadcasts.<br /> <br /> <strong>Remedy</strong><br /> <br /> In the latest versions of WinGate, this has been remedied by several improvements, and the use of the DNS/Wins resolver (in particular to this scenario the WINS component) where you can set and configure the LM hosts file that WinGate will use to resolve computer names and their corresponding IP addresses on the Local Area Network.<br /> <br /> To do this open this file from the DNS/Wins resolver configuration in GateKeeper(found under the system tab) and enter the Computer name and corresponding IP address as per the example given in the file.<br /> <br /> Be sure to include details about the IP of the WinGate server and the loopback address for local host of 127.0.0.1.<br /> <br /> Once done save the file and this should help to alleviate any Netbois broadcast issues that may arise.<br /> <br /> <strong>Internet Application Scheduling</strong><br /> <br /> The last factor that may initiate spontaneous random dialling in WinGate from client machines, is whether client machines have applications that require Internet updates, such as OS updates, virus updates, scheduled synchronization of components files etc.<br /> <br /> Obviously these need to be either set to schedule at predetermined times in the application&rsquo;s configuration itself or switched of completely and never set to run.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[TCP/IP for WinGate running Windows2000, XP,2003 ]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/7]]></link>
<guid isPermaLink="false"><![CDATA[8f14e45fceea167a5a36dedd4bea2543]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 14:36:08 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[How to setup the correct TCP/IP configuration for WinGate running on a Windows 2000, XP, or 2003 Computer:

Select the &rdquo;My Network Places&rdquo; icon on the desktop and right click to open the context menu and select properties. An alternative to ...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><strong>How to setup the correct TCP/IP configuration for WinGate running on a Windows 2000, XP, or 2003 Computer:</strong>
<ol>
<li>Select the <strong>&rdquo;My Network Places&rdquo;</strong> icon on the desktop and right click to open the context menu and select properties. An alternative to this, is to enter the control panel (via the start menu) and select the <strong>Network and Dial-up Connections</strong>.</li>
<li>Once the <strong>Properties</strong> window appears, you will see listed the available network connections (usually marked <strong>Local Area Connection </strong>). If there is more then one Network connection listed, select the Interface that will connect the WinGate Server to the rest of your Local Network (not the Internet).</li>
<li>Right click on this Interface and from the menu select <strong>Properties</strong>.</li>
<li>A dialogue listing the Network adapter (NIC), its Protocols and Services will appear. Scroll down to the entry that says <strong>Internet protocol (TCP/IP)</strong> and click on the properties button at the bottom.</li>
<li>Under the general tab, select <strong>Specify an IP address</strong> in the IP address field. Enter a suitable IP address of a private class (in accordance with RFC , (such as 10.0.0.1, 192.168.x.x). This should be in the same range as what the rest of the network will be numbered with.</li>
<li>The <strong>subnet mask</strong> will be automatically set by Windows after you have entered the IP address, or you can specify a specific mask depending on your requirements.</li>
<li>The next thing to ensure is that the <strong>Gateway</strong> entry is left empty. This is most important when setting the internal IP interface, as the external interface that is used to connect out to the Internet is the only NIC on the machine that should require a Gateway setting, and this will usually be assigned by the ISP.</li>
<li>Leave the <strong>DNS</strong> option at the bottom blank as explained above there is no requirement for the Internal interface to have a DNS setting. <br /><br /> <strong>Note</strong> if there is a requirement for the DNS to be enabled, the only DNS servers that should be there are that of the ISP, or specified DNS server with an external IP address).<br /><br /></li>
<li>There is no need to adjust anything under the Advanced tab. When WinGate server is is set to run on the machine, you should avoid listing or entering a Wins server as WINS lookups can be configured via the lmhost file in WinGate itself.</li>
</ol>
To set the correct TCP/IP settings for the WinGate client computer, you will need to first determine the following: How are clients to receive their TCP/IP details, either entered statically or issued via WinGate&rsquo;s DHCP service.<br /><br /> If clients are to receive their IP details by WinGate&rsquo;s DHCP service, then the only required configuration they need, is to ensure that in the Internet Protocol (TCP/IP) properties of the clients Network Interface (accessed in the same way as described above) has all options set to <strong>Obtain IP Address automatically.</strong> <br /><br /> The DHCP scope in the DHCP service in Gatekeeper on the WinGate machine should be set to fully automatic, and this will give the client machines their DNS and Gateway settings when they are assigned an IP address.<br /><br /> If the clients are to be given statically assigned IP addresses then the following settings are required: <br />
<ol>
<li>Access the Network Interface properties as described in the server scenario above.</li>
<li>Under the general tab of the Internet Protocol (TCP/IP) properties, enter an Internal IP address that is in the same range as the WinGate server (e.g. 192.168.4.*)</li>
<li>After entering the IP the subnet mask field should be filled in automatically or set as specifically as required, and should be the same as the mask used on the Internal Interface of the server. (this ensures they share the same subnet range).</li>
<li>In the Default Gateway field, you should enter the Internal IP address of the WinGate Server</li>
<li>In the DNS field choose the <strong>Use this DNS server</strong> radio button and again enter the internal IP of the WinGate Server.</li>
</ol>
As with the WinGate server setup the Advanced tab does not require any configuration and can be left at the system defaults.<br /> <br /> This has now completed the correct TCP/IP configuration for your WinGate server and client computers. You will now need to determine what type of access your clients will use to connect thru WinGate to the Internet. (NAT,WGIC,proxy)<br /> <br /> Descriptions and example of these connection methods can be found in the WinGate help file.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[The history tab no longer shows history]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/89]]></link>
<guid isPermaLink="false"><![CDATA[7647966b7343c29048673252e490f736]]></guid>
<pubDate><![CDATA[Wed, 16 Sep 2009 20:59:04 +1200]]></pubDate>
<dc:creator><![CDATA[Logan Moore]]></dc:creator>
<description><![CDATA[There could be a couple of reasons why the history may not show in your GateKeeper.  1. If you are using the GateKeeper remotely, the gatekeeper.exe will not have access to the history database so will not be able to display the history. You will need to ...]]></description>
<content:encoded><![CDATA[<p>There could be a couple of reasons why the history may not show in your GateKeeper.<br /> <br /> 1. If you are using the GateKeeper remotely, the gatekeeper.exe will not have access to the history database so will not be able to display the history. You will need to run the GateKeeper.exe from a network share, or from the WinGate computer itself.<br /> <br /> 2. Make sure there are no display/recording filters enabled on your history.<br /> <br /> - GateKeeper &gt; Options (drop down menu) &gt; History Settings<br /> - Make sure the " Database filter settings" and the "View filter settings" are both set to "No filter"<br /> <br /> If neither of these apply then it could be a corrupt history file. To fix this simply stop the WinGate engine, navigate to C:\Program Files\WinGate and delete the following files: <br /> <br /> - HISTORY.CDX<br /> - HISTORY.DBF<br /> <br /> Next restart the WinGate engine, the History files should be rebuilt.</p>]]></content:encoded>
</item>
<item>
<title><![CDATA[Transparent Proxy - Applying Policies, Scanning etc.]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/56]]></link>
<guid isPermaLink="false"><![CDATA[9f61408e3afb633e50cdf1b20de6f466]]></guid>
<pubDate><![CDATA[Thu, 17 Nov 2005 13:30:34 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ Using the Proxy services in WinGate allows you to scan traffic for viruses or prohibited content, and control user access through the use of policies.  You can intercept NAT and WinGate Internet Client (WGIC) connections and redirect them to the proxy, w...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> Using the Proxy services in WinGate allows you to scan traffic for viruses or prohibited content, and control user access through the use of policies.<br /> <br /> You can intercept NAT and WinGate Internet Client (WGIC) connections and redirect them to the proxy, where they will be scanned or have policies applied to them. We call this Transparent Proxy or Transparent Redirection (TR) and it is enabled on the Sessions menu in the Proxy services.<br /> <br /> Transparent Proxy is very useful for web connections as this is where you commonly need to scan traffic or control user browsing. The image below shows TRs enabled on the WWW proxy service, intercepting connections on port 80.<br /> <br /> <img src="/kbimage/tr.gif" alt="screen-shot showing Transparent Proxy enabled" name="Transparent Proxy" /><br /> <br /> You must check the box to turn on Transparent Proxy and then you must select the port that you wish to intercept. In the case of web traffic you will normally want to intercept port 80. <br /> <br /> You should never try to intercept a secure port, ie port 443 as this will break the connection.<br /> <br /> </div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Users in WinGate]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/34]]></link>
<guid isPermaLink="false"><![CDATA[e369853df766fa44e1ed0ff613f563bd]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 18:09:56 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[Users in WinGate can be configured and stored in two ways in WinGate.Either using the WinGate User database, or the Windows NT user database (which requires WinGate to be running or have access to a Windows NT machine in order to utilize its user database...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">Users in WinGate can be configured and stored in two ways in WinGate.Either using the WinGate User database, or the Windows NT user database (which requires WinGate to be running or have access to a Windows NT machine in order to utilize its user database).<br /> <br /> <strong>WinGate Database</strong><br /> <br /> When first installed, WinGate creates two user accounts by default in its database, <strong>Administrator</strong> and <strong>Guest</strong>. It also creates two group accounts, <strong>Administrators</strong> and <strong>Users</strong>.<br /> <br /> All subsequent users that are added to the WinGate User database are included in the <strong>Users</strong> group. These users can be configured to not be part of this group, but this membership is set by default to allow functionality with minimal configuration.<br /> <br /> <strong>To add a user:</strong>
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate server</li>
<li>Select the <strong>Users</strong> tab and double click on the <strong>User</strong> icon or right click anywhere in the pane and select <strong>Add new user</strong>.</li>
<li>Under the Properties for new user dialog that appears, configure the appropriate details as required, selecting the groups that the user will belong to etc.</li>
</ol>
<strong>Please Note:</strong><br /> The WinGate user database is similar to the User and Group model used in NT, where permissions can be set against individuals or groups, and enforced according to a user&rsquo;s group membership.<br /> E.g. Nigel is a user who belongs to the Sales group. The Sales group through a particular policy is not allowed to access WWW proxy, and so, since Nigel a member of the Sales group he in turn will be denied access. <br /> <br /> <strong> NT database option</strong> <br /> <br /> WinGate can be set to use the NT user database if WinGate is running on an NT machine or by synchronising with a Primary Domain Controller. (Find out how to synchronise and use a Primary Domain Controller database <a href="http://support.qbik.com/index.php?_a=knowledgebase&amp;_j=questiondetails&amp;_i=91&amp;nav=+%26gt%3B+%3Ca+href%3D%27index.php%3F_a%3Dknowledgebase%26_j%3Dsubcat%26_i%3D2%27%3EWinGate%3C%2Fa%3E">click here</a>).<br /> By selecting this database option all users and groups will be authenticated using the information in the Windows NT database rather then WinGate&rsquo;s own database. This can be initiated by doing the following:
<ol>
<li>Open <strong>GateKeeper</strong> on the WinGate server.</li>
<li>Select the <strong>Users</strong> tab.</li>
<li>Double click the <strong>Database options</strong> icon.</li>
<li>Select the <strong>Windows NT/2000/Xp pro User Database</strong> option.</li>
<li>Click the <strong>Synchronize now</strong> button.</li>
<li>Click OK.</li>
</ol>
You should now see all of the users and groups from the NT user database appear in the <strong>Users</strong> tab.<br /> <br /> You can select whether WinGate will check passwords against WinGate accounts, or NT accounts (or both if there is the same &ldquo;User&rdquo; in each database) in the User Authentication at the bottom of the User database. Setting it to <strong>use either</strong> means for example that a user called Bill who has an NT Account/password and a WinGate Account/password can use either to authenticate through WinGate.<br /> <br /> <strong>Please Note</strong> <br /> As per the WinGate helpfile, the NT user database cannot be used to authenticate user via the Java logon authentication method.</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Using a Domain Controller User Database - Pre-version 6]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/27]]></link>
<guid isPermaLink="false"><![CDATA[02e74f10e0327ad868d138f2b4fdd6f0]]></guid>
<pubDate><![CDATA[Fri, 30 Jan 2004 17:34:47 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[As per the WinGate helpfile it is possible, when using the NT user database option in WinGate, to synchronise the NT User database on a Domain Controller in a Windows NT4/Active Directory Domain environment.   Please Note:  To do this requires editing the...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">As per the WinGate helpfile it is possible, when using the NT user database option in WinGate, to synchronise the NT User database on a Domain Controller in a Windows NT4/Active Directory Domain environment. <br /> <br /> <strong>Please Note:</strong> <br /> To do this requires editing the registry settings, you should only attempt this if you fully understand the consequences of editing the registry, and have taken the appropriate steps to backup the WinGate registry. <br /> <br /> Obviously the WinGate server needs to be part of the NT Domain to authenticate properly. <br /> <br /> To make WinGate synchronise with a Domain Controller on NT Domain :
<ol>
<li>From the Run command on the Start Menu type <strong>Regedit</strong>.</li>
<li>Expand to the key called HKEY_LOCAL_MACHINE\\Software\\QbikSoftware\\WinGate\\UserDatabase.</li>
<li>Create a string value called <strong>DomainServer</strong></li>
<li>Set the value in the form of a <strong>\\\\Servername </strong>, where Servername is the Computer name of the Primary Domain controller.</li>
</ol>
<strong>Please Note: For Active Directory Domain Controllers</strong><br /> When using an Active Directory Domain Controller for a database there is one futher step required for this work correctly:
<ol>
<li>Open the Computer Management MMC (found in Administrative tools in Windows) and open the Services and Applications configuration that lists all Services.</li>
<li>Select the <strong>Qbik WinGate Engine</strong> service.</li>
<li>Right click on this service and select <strong>Properties</strong>.</li>
<li>Select the <strong>Log On</strong> tab.</li>
<li>Where it says <strong>Log on as</strong>, select the <strong>This Account option</strong> and browse the Active directory for a suitable account with Domain Adminstration equivilent privilages. (It is recommended that administrators create a special account in Active Directory Users and Computers for this purpose.)</li>
<li>Stop and then Restart the WinGate engine for the changes to affect.</li>
<li>Re-synchronise the database from the User database configuration found under the <strong>Users</strong> tab in GateKeeper.<br /> <br /> If the setup is not followed exactly as outlined above then it will cause the inability for the administrator to log in to Gatekeeper, which may require uninstalling and reinstalling WinGate if necessary.</li>
</ol>
</div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Using a Domain Controller User Database - Version 6 and later]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/48]]></link>
<guid isPermaLink="false"><![CDATA[642e92efb79421734881b53e1e1b18b6]]></guid>
<pubDate><![CDATA[Mon, 30 May 2005 15:23:26 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[With WinGate version 6 the option to use a Domain Controller user database was presented in the GUI which greatly simplifies its use. Using a Domain Controller user database allows you to import your list of Domain users into WinGate. You can also use NTL...]]></description>
<content:encoded><![CDATA[<p>With WinGate version 6 the option to use a Domain Controller user database was presented in the GUI which greatly simplifies its use. Using a Domain Controller user database allows you to import your list of Domain users into WinGate. You can also use NTLM authentication which allows users to authenticate using their NT login information. <strong>To use a Domain Controller user database:</strong></p>
<ol>
<li>On the <strong>Users</strong> tab in GateKeeper double click <strong>Database options</strong></li>
<li>Check the option <strong>Use the Operating system user database</strong></li>
<li>If your Domain Controller is not the machine that WinGate is installed on you will need to tell WinGate where to find the user database. Select the option <strong>Use remote user database</strong> and enter the path to the server</li>
<li>Select your synchronisation options</li>
<li>When you're ready to import the user database click the button <strong>Synchronise now</strong>
<p><img src="/kbimage/user-database-config.gif" alt="User database" /></p>
<p><strong>Please Note: For Active Directory Domain Controllers</strong></p>
<p>When using an Active Directory Domain Controller for a database there is one futher step required for this work correctly:</p>
<ol>
<li>Open the Computer Management MMC (found in Administrative tools in Windows) and open the Services and Applications configuration that lists all Services.</li>
<li>Select the <strong>Qbik WinGate Engine</strong> service.</li>
<li>Right click on this service and select <strong>Properties</strong>.</li>
<li>Select the <strong>Log On</strong> tab.</li>
<li>Where it says <strong>Log on as</strong>, select the <strong>This Account option</strong> and browse the Active directory for a suitable account with Domain Adminstration equivilent privilages. (It is recommended that administrators create a special account in Active Directory Users and Computers for this purpose.)</li>
<li>Stop and then Restart the WinGate engine for the changes to affect.</li>
<li>Re-synchronise the database from the User database configuration found under the <strong>Users</strong> tab in GateKeeper.</li>
</ol>
</li>
</ol>]]></content:encoded>
</item>
<item>
<title><![CDATA[Viewing the history.dbf file in Excel]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/73]]></link>
<guid isPermaLink="false"><![CDATA[d2ddea18f00665ce8623e36bd4e3c7c5]]></guid>
<pubDate><![CDATA[Wed, 24 Jan 2007 19:58:22 +1300]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ When you view the history.dbf file in Microsoft Excel the time is shown in Unix time, being the number of seconds elapsed since midnight on the 1st of January 1970. Obviously most people are not going to be able to read this so it will need to be convert...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> When you view the history.dbf file in Microsoft Excel the time is shown in Unix time, being the number of seconds elapsed since midnight on the 1st of January 1970. Obviously most people are not going to be able to read this so it will need to be converted.<br /> <br /> <strong>To convert the STARTTIME value to a readable format:</strong><br /> <br /> 1. Online Conversion<br /> http://www.onlineconversion.com/unix_time.htm<br /> <br /> 2. Excel Conversion<br /> Use the formula:<br /> <strong>=(x/86400)+25569</strong> where x = the STARTTIME value, 86400 = no. of seconds per day and 25569 = the base for 1 Jan 1970.<br /> *If your calculation is an hour out, then you can adjust it similar to this: <strong>=((x+3600)/86400)+25569</strong><br /> <br /> When you apply the formula you will get another value, you will now need to format the cell to a date/time format.<br /> <br /> eg. STARTTIME = <strong>1124826307</strong><br /> applying the formula in Excel =(1124826307/86400)+25569<br /> gives the value <strong>38587.823</strong><br /> right click the cell and select format<br /> select date<br /> select 3/14/98 13:30 gives <strong>8/23/05 19:45</strong><br /> <br /> <strong>To change the format of the entire column:</strong><br /> <br /> Select a new (empty) column<br /> Click the formula button (=)<br /> Enter the formula =(I2/86400)+25569 where I2 is the first-value containing cell from the STARTTIME column<br /> Click ok, the value should change<br /> Click the lower right corner of the new cell and drag to the bottom of the column, the entire column should populate with the new format<br /> Click the top of the column to highlight the entire column<br /> Right click the column and select format<br /> Change the format to the required date format, the column should now show as date/time.<br /> <br /> <img src="/kbimage/excel.gif" alt="Excel example" name="Excel example" /><br /> <br /> <br /> <br /> <br /> </div>]]></content:encoded>
</item>
<item>
<title><![CDATA[Windows updates ]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/49]]></link>
<guid isPermaLink="false"><![CDATA[f457c545a9ded88f18ecee47145a72c0]]></guid>
<pubDate><![CDATA[Mon, 20 Jun 2005 11:32:43 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[ If Windows update is not working it is usually because the pages are being cached by the WinGate server, you can solve this problem by creating a policy in WinGate to not cache the update pages.  To create a caching policy to not cache MS Update pages:
...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;"><br /> If Windows update is not working it is usually because the pages are being cached by the WinGate server, you can solve this problem by creating a policy in WinGate to not cache the update pages.<br /> <br /> <strong>To create a caching policy to not cache MS Update pages:</strong><br />
<ol>
<li>Go to the system tab in GateKeeper and double click caching</li>
<li>Select <strong>What to cache</strong> and change the radio button to <strong>specify which requests will be cached</strong></li>
<li>Click <strong>Add Filter</strong>, click <strong>Add Criterion</strong></li>
<li>Choose <strong>This criterion is NOT met if</strong></li>
<li><strong>HTTP URL</strong></li>
<li><strong>contains</strong></li>
<li>windowsupdate</li>
<li>Click ok, ok</li>
</ol>
<br /> <br /> Now any pages with windowsupdate in the URL will not be cached and your Windows updates should work.<br /> <br /> <img src="/kbimage/caching-policy.gif" alt="caching policy picture" name="caching policy" /></div>
<p><br /> </p>]]></content:encoded>
</item>
<item>
<title><![CDATA[WinGate Dialer Disconnection Issues]]></title>
<link><![CDATA[http://support.qbik.com/index.php?/Knowledgebase/Article/View/38]]></link>
<guid isPermaLink="false"><![CDATA[a5771bce93e200c36f7cd9dfd0e5deaa]]></guid>
<pubDate><![CDATA[Tue, 11 May 2004 15:56:43 +1200]]></pubDate>
<dc:creator><![CDATA[Adrien de Croy (Import)]]></dc:creator>
<description><![CDATA[In the WinGate dialer configuration (found in System Services window in GateKeeper) there is a setting in the properties of each dialup profile which tells WinGate how long it should wait when there is no activity, before disconnecting.  This is set to 18...]]></description>
<content:encoded><![CDATA[<div style="margin-left: 15px;">In the WinGate dialer configuration (found in <strong>System Services</strong> window in <strong>GateKeeper</strong>) there is a setting in the properties of each dialup profile which tells WinGate how long it should wait when there is no activity, before disconnecting.<br /> <br /> This is set to 180 seconds by default but can be disabled or the time changed if required. (Referred to here as the <strong>Inactivity period</strong>).<br /> <br /> Sometimes even when the Inactivity Period has been reached the WinGate Dialer will not actually disconnect. This can be due to several reasons, such as keep alives sent down the line from the ISP and other miscellaneous traffic travelling through the dialup interface, which can make WinGate think there is activity even though none is showing up.<br /> <br /> The reason why this happens, is that the WinGate Dialer has a registry setting called <strong>IdleTrafficLevel</strong>. This value sets the amount of traffic that will be <strong>ignored</strong> by WinGate during the Inactivity period, when it is determining whether there is activity occurring through the dial up interface or not.<br /> <br /> So in actual fact, there can be a small amount of traffic that can actually travel through the dialer interface(modem etc) before it will show up as activity to the WinGate dialer. If the amount of this traffic passes the <strong>IdleTrafficLevel</strong> amount that has been set in the registry, then WinGate will think that this data <strong>is</strong> traffic activity and so keep the connection alive, even though there is no activity shown in WinGate, no clients connected etc.<br /> <br /> If you find that the WinGate Dialer is not disconnecting due to receiving too much keep alive or miscellanous data (passing the <strong>IdleTrafficLevel</strong> as described above) you can adjust this amount through the registry.<br /> <br /> <strong>Please Note:</strong><br /> To do this requires editing the registry settings. You should only attempt this if you fully understand the consequences of editing the registry, and have taken the appropriate steps to backup the registry before proceeding.<br />
<ol>
<li>From the Start menu select <strong>Run</strong> and type <strong>Regedit</strong>.</li>
<li>Navigate to the following key: HKEY_LOCAL_MACHINE\Software\Qbik Software\WinGate\Dialer.</li>
<li>Find the Dword setting called [b]IdleTrafficLevel[/b].</li>
<li>Tweak the level to the appropriate amount required.</li>
<li>Exit regedit.</li>
<li><strong>Stop</strong> and <strong>Restart</strong> the WinGate Engine for the setting to take effect.</li>
</ol>
<strong>Remember</strong><br /> Setting the level to a higher value will mean that the WinGate Dialer will ignore a greater amount of &ldquo;idle traffic&rdquo; when it is determining activity levels. As a result WinGate would have to receive a higher level of &ldquo;idle traffic&rdquo; to have it think that there is still activity on the connection and stay connected.</div>]]></content:encoded>
</item>
</channel>
</rss>