Skip to Main Content
HCL Domino Ideas Portal

Welcome to the #dominoforever Product Ideas Forum! The place where you can submit product ideas and enhancement request. We encourage you to participate by voting on, commenting on, and creating new ideas. All new ideas will be evaluated by HCL Product Management & Engineering teams, and the next steps will be communicated. While not all submitted ideas will be executed upon, community feedback will play a key role in influencing which ideas are and when they will be implemented.

For more information and upcoming events around #dominoforever, please visit our Destination Domino Page

Status Assessment
Workspace Domino
Created by Guest
Created on Oct 8, 2019

Port80 access to domino for native Notes Client to server traffic (including Replication)

just came back from vacation on a cruise ship.  Ordered an Internet access package. Worked fine, but no 1352 Access (Native Notes Client to Server Protocoll)

 

Additionally, over the years, I had to work with networking  folks hard to convince to open up an addtional port all the time.

 

=> even if it will mean a way higher amount of traffic, please support natively for the server and client tunneling 1352 (Including Notes /Domino Encryption) via Port 80 / 443. If possible, please for the server even in cases with no http running, too.

 

Thanks.

 

 

  • Attach files
  • Guest
    Reply
    |
    Jan 9, 2020

    I have seen the 'likely to implement' note - so this might be obsolete.

    People her often have just one public IP address - so there can be
    allready a Website, this should be working in combination.

    Tia, Bernfried

  • Admin
    Thomas Hampel
    Reply
    |
    Jan 9, 2020

    True.

  • Guest
    Reply
    |
    Jan 7, 2020

    NRPC over Port 80 is useless when a web proxy is in between

  • Admin
    Thomas Hampel
    Reply
    |
    Jan 7, 2020

    You can configure your Domino server to run NRPC over port 80.

    Just change the Notes.ini variable for your TCP port and add the port number at the end TCPIP_TCPIPAddress=0,10.20.30.40:80

  • Guest
    Reply
    |
    Oct 9, 2019

    I think the best practice would be to use VPN since HTTP / HTTPS is a known target. Usually access to other servers (file server) are also needed so this make a good reason to use VPN. Most company I know use VPN for these kind of scenarios.

    BTW your Notes CAL also include a CAL License to IBM Mobile Connect (now HCL Safelynx) which is a reverse proxy / VPN / Load Balancer. So you only need to buy / deploy the server.

    Tinus Riyanto - Prisma Global Solusi