Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
I am writing again
dedisetiaji.wordpress.com
This is used when the part requires the user to not passed through a proxy
The steps are: 1. Create an address list first (ip - firewall - address list) ex: to xxx add list = "to xxx" address = 192.168.0.253 comment = "" disabled = no add list = "to xxx" address = 192.168.0.251 comment = "" disabled = no add list = "to xxx" address = 192.168.0.178 comment = "" disabled = no add list = "to xxx" address = 192.168.0.38 comment = "" disabled = no add list = "to xxx" address = 192.168.0.50 comment = "" disabled = no add list = "to xxx" address = 192.168.0.51 comment = "" disabled = no add list = "to xxx" address = 192.168.0.53 comment = "" disabled = no add list = "to xxx" address = 192.168.0.112 comment = "" disabled = no add list = "to xxx" address = 192.168.0.247 comment = "" disabled = no
After that the nat his (ip-firewall - nat) (assuming grout to pull to the proxy running smoothly), do not forget to put this rule above the drag proxy script
Good luck: D