Definition

Wingate

Wingate is a product that allows people on a small home network or a larger business network to share and control access to the Internet through a single computer connection. The Wingate program can be installed in a computer hooked up to the Internet with a dial-up, Integrated Services Digital Network (ISDN), Digital Subscriber Line (DSL), cable modem, or dedicated T-carrier system connection. The computer with Wingate acts as a proxy server and firewall for the computer users inside the home or business. All users share a common Internet connection through one computer, which does not have to be dedicated to its gateway role. Wingate requires that all computers use a Windows 95 or later operating system and include TCP/IP.

Wingate has a server component and a client component. The server component is installed on the computer that has the Internet connection capability. The client component is installed on the other computers in the network. The server component then routes all Internet requests from the other computers through the Internet connection. Wingate allows users to connect or disconnect to the Internet using their own computers.

The firewall component in Wingate prevents outsiders from accessing network computers. When Wingate receives a request for access into the local network, it compares the IP address of the computer requesting access with a list of those eligible. If the IP address is not recognized, the request is denied. Wingate also uses TCP port binding as a method of controlling access.

Network administrators can assign access rights to individuals or groups. For example, in a home network in which children use the Internet, a parent can prohibit access to sites that are not suitable. A history also keeps track of the Web sites visited, time spent online, and other information of each individual. This helps the administrator determine whether an individual is abusing his access rights. Wingate also provides Web page caching.

Contributor(s): Jeff Eddie
This was last updated in September 2005
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Enterprise desktop tutorials

    SearchEnterpriseDesktop.com’s tutorials provide IT professionals with the latest information on implementing, managing and securing Microsoft Windows desktops including Windows Vista, Windows XP, desktop security, desktop virtualization, terminal services, application streaming, software as a service and more.

  • What USMT will and won't do

    Microsoft's User State Migration Tool does have limitations. See what it can and can't do.

  • How to handle your Vista migration

    Now that Microsoft has stopped selling Windows XP, many companies are considering whether or not to upgrade to Windows Vista. While Vista is not without its problems, many of the operating system's migration horror stories are exaggerated. Several problems can be avoided simply by following a few best practices throughout the migration process.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: