Category Archives : Access Control lists

Как отключить аутентификацию. 1

This post explain how to disable authentication for certain proxy objects while enabled for others. For example, I want machineA to pass the proxy without authentication and machineB is still being authenticated. To perform this rule you need to know how to define your whitelisted internal computer. Your computer can be recognized by IP address […]

19-07-2014 23-10-59