what are proxy avoidance applications

what are proxy avoidance applications

What are proxy avoidance applications
This term is used particularly for a World-Wide Web server which accepts URLs with a special prefix. When it receives a request for such a URL, it strips off the prefix and looks for the resulting URL in its local cache. If found, it returns the document immediately, otherwise it fetches it from the remote server, saves a copy in the cache and returns it to the requester. The cache will usually have an expiry algorithm which flushes documents according to their age, size and access history.
The word proxy means “to act on behalf of another,” and a proxy server acts on behalf of the user. All requests to the Internet go to the proxy server first, which evaluates the request and forwards it to the Internet. Likewise, responses come back to the proxy server and then to the user.

Use the instructions below to stop users from bypassing the proxy in an explicit proxy deployment:
If you do not configure the firewall or routing device to direct the traffic to the proxy, users can bypass the proxy and reach the Internet.

Want to thank TFD for its existence? Tell a friend about us, add a link to this page, or visit the webmaster’s page for free fun content.
Link to this page:

What are proxy avoidance applications
You should first create these as fqdn object like below
thanks for your support, but it’s not allowed to use FQDN in the destination IP.

What are proxy avoidance applications
If your computer is connected to a local network that’s protected from the internet by a firewall, you may need to specify proxy servers or use the FTP passive mode (PASV) to access some internet sites. A proxy server is a computer on a local network that acts as an intermediary between a single computer user and the internet, so that the network can ensure security, administrative control and caching service.
Select the “Proxy server requires password” tickbox if the proxy server is protected by a password. Enter your account name and password in the Username and Password fields.

References:

http://knowledge.broadcom.com/external/article/166461/how-to-prevent-proxy-avoidance-applicati.html
http://www.thefreedictionary.com/Proxy+Avoidance
http://live.paloaltonetworks.com/t5/General-Topics/Proxy-avoidance-Issue/td-p/47425
http://support.apple.com/en-za/guide/mac-help/mchlp2591/mac
http://forum.nofap.com/index.php?threads/tips-when-k9-and-opendns-are-not-enough-to-stop-you.37284/