banner graphic
Corporate
Administrator

Using Proxy Selection and Proxy Bypass Lists

Using a proxy server can allow the administrator to limit access to the Internet. You can specify the proxy server in the Internet Explorer Customization wizard, in the IEAK Profile Manager (formerly the INS Editor), and through the browser. You can also restrict the ability of the user to change the proxy settings via the Restrictions page in the Customization wizard and the Profile Manager.

Note

To configure the proxy selection and proxy bypass settings

  1. Click the Tools menu in Internet Explorer, and then click Internet Options.
  2. Click the Connections tab, and then click LAN Settings.
  3. In the Proxy Server area, select the Use a proxy server check box.
  4. Click Advanced, and then fill in the proxy location and port number for each Internet protocol that is supported.

    Note
    In most cases, only a single proxy is used for all protocols. In those cases, enter the proxy location and port number for the HTTP setting, and then select the Use the same proxy server for all protocols check box.

    The proxy locations that do not begin with a protocol (such as "http://" or "ftp://") are assumed to be a CERN-type HTTP proxy. For example, the entry "proxy" would be treated the same as the entry "http://proxy." For FTP gateways, such as the TIS FTP gateway and the WinGate Win95 Modem FTP proxy, the proxy should be listed with the protocol "ftp://" in front of the proxy name. For example, you would enter an FTP gateway "ftpproxy" as "ftp://ftpproxy."

  5. To bypass more complex addresses, type the addresses in the box labeled Do not use proxy server for addresses beginning with:.

    A proxy bypass entry can begin with a protocol type, such as http://, https://, ftp://, or gopher://. If a protocol type is used, the exception entry applies only to requests for that protocol. Note that the protocol value is not case sensitive. Multiple entries should be separated by a semicolon (;).

    Next, an Internet address, an IP address, or domain name must be entered. If no protocol is specified, any request using the address will be bypassed. If a protocol is specified, requests with the address will be bypassed only if they are of the indicated protocol type. As with the protocol type, address entries are not case sensitive.

    Finally, a port number can be added. If it is used, the request is processed only if all previous requirements are met and the request uses the specified port number.

    The exception dialog box allows a wildcard character ( * ) to be used in the place of zero or more characters.