I don't understand your answer. Even if you configure the PC to use the proxy, you stll need a profile or path through it. What you are saying is that the is a security hole which users can exploit?
If they don't have a profile entry at the time they can bypass the proxy.
I would hope not, I think you are mistaken.
What you are saying defeats the purpose of having profiles and access rules.
my fault, i confused this thread with another one, where we had the transparent mode skiplist as part of the discussion. sorry. just forget what i wrote.
my fault, i confused this thread with another one, where we had the transparent mode skiplist as part of the discussion. sorry. just forget what i wrote.