Labels:text | screenshot | number | parallel OCR: Figure 6. Administrators can define redirection (proxy) rules that specify not only the host resource clients can access, but also through which specific ports hosts will be accessed; this iets administrators set up a proxy to an unusual port, instead of a well-known port for a given service (such as port 80 for HTTP, for example). Using nonstandard ports helps to disrupt poten- tial hacker attacks. (In the background is the client configuration tool main screen.)