Welcome, Guest. Please login or register.
Did you miss your activation email?
Tuesday 10 December 2024, 05:01:44 pm

Login with username, password and session length

CLICK HERE for the The official Endian Roadmap and Issue tracker
14261 Posts in 4377 Topics by 6517 Members
Latest Member: Sandro
Search:     Advanced search
+  EFW Support
|-+  Support
| |-+  General Support
| | |-+  In Need of Some Assistance
0 Members and 1 Guest are viewing this topic. « previous next »
Pages: [1] Go Down Print
Author Topic: In Need of Some Assistance  (Read 9415 times)
C4D3N
Jr. Member
*
Offline Offline

Posts: 1


« on: Friday 24 February 2012, 04:10:45 am »

I am trying to figure out how you use the authentication user to bypass the firewall.  I also need to know if there is a proxy through the firewall that allows me to bypass the blocks if I use that IP.  And one more thing, when you make changes to the content filter and such, and it asks you to apply the changes, does this shut down the whole firewall momentarily, or is it a quick process that doesn't interrupt anything?

Thanks, I will greatly appreciate it if anyone answers any of my questions.
Logged
khjytr
Jr. Member
*
Offline Offline

Posts: 1


WWW
« Reply #1 on: Friday 24 February 2012, 02:56:31 pm »

Thanks
Logged

wow gold their warplanes troops. according had Iwow gold kaufen we certainly can reduce casualtie their warplanes troops would be nice.
Janis B
Jr. Member
*
Offline Offline

Gender: Male
Posts: 4


« Reply #2 on: Thursday 01 March 2012, 08:23:44 am »

Changes to content filter will restart proxy, antivirus (if enabled) and content filter. Depending on system configuration this could take up to 30 sec. Up to 0ne minute for old pc's. During this time users will receive an error while trying to access the internet.

You must configure authentication in order to use it. If have a fully functioning domain with user authentication you must configure proxy to use it Proxy > Authentication > Choose Authentication Method. Then you tell the client that proxy requires authentication and you are ready to go. Most probably you will have issues while configuring this....

You can bypass proxy from subnet/ip or mask or to subnet/ip or mask.
Logged
Pages: [1] Go Up Print 
« previous next »
Jump to:  

Page created in 0.078 seconds with 18 queries.
Powered by SMF 1.1 RC2 | SMF © 2001-2005, Lewis Media Design by 7dana.com