Using Proxy Selection and Proxy Bypass Lists

Using a proxy server can allow the administrator to limit access to the Internet. The proxy server can be specified in the IEAK wizard, the IEAK Profile Manager (formerly the INS Editor), and through the browser. Restricting the ability of the user to change the proxy settings is also available via the Restrictions page in the IEAK wizard and IEAK Profile Manager.

Note
The proxy bypass feature may eliminate the need for the use of JavaScript or JScript to select a proxy.

To configure the proxy selection and proxy bypass settings

  1. Click the View menu in the browser, and then click Internet Options.
  2. Click the Connection tab.
  3. In the Corporate proxy server area, select the Connect using a proxy server check box.
  4. Click Advanced, and then fill in the proxy location and port number for each Internet protocol that is supported.
  5. Note
    In most cases, only a single proxy is used for all protocols. In those cases, enter the proxy location and port number for the HTTP setting, and then select the Use the same proxy server for all protocols check box.

    The proxy locations that do not begin with a protocol (such as "http://" or "ftp://") are assumed to be a CERN-type HTTP proxy. For example, the entry "proxy" would be treated the same as the entry "http://proxy." For FTP gateways, such as the TIS FTP gateway and the WinGate Win95 Modem FTP proxy, the proxy should be listed with the protocol "ftp://" in front of the proxy name. For example, an FTP gateway "ftpproxy" should be entered as "ftp://ftpproxy."

  6. To bypass more complex addresses, type the addresses in the box labeled Do not use proxy server for addresses beginning with:.

    A proxy bypass entry can begin with a protocol type, such as http://, https://, ftp://, or gopher://. If a protocol type is used, the exception entry applies only to requests for that protocol. Note that the protocol value is not case sensitive. Multiple entries should be separated by a semicolon (;).

    Next, an Internet address, an IP address, or domain name must be entered. If no protocol is specified, any request using the address will be bypassed. If a protocol is specified, requests with the address will be bypassed only if they are of the indicated protocol type. As with the protocol type, address entries are not case sensitive.

    Finally, a port number can be added. If it is used, the request is processed only if all previous requirements are met and the request uses the specified port number.

    The exception dialog box allows a wildcard character ( * ) to be used in the place of zero or more characters.