( freeoli | 2014. 08. 13., sze – 09:37 )

Csak olvasni kell.

"
Authentication: Using the access lists, the web proxy can also be configured to allow access only after a user has been authenticated. At this point you have the choice between LDAP, identd, Windows, Radius or local authentication methods. The web proxy can connect, for example to a Microsoft Windows domain controller and only the users of that Windows domain can be granted access to the Internet. "