Category Archives : Access Control lists


Как отключить аутентификацию. 1

This post explain how to disable authentication for certain proxy objects while enabled for others. For example, I want machineA to pass the proxy without authentication and machineB is still being authenticated. To perform this rule you need to know how to define your whitelisted internal computer. Your computer can be recognized by IP address […]

19-07-2014 23-10-59