Solved

Bypass IP TMG

Posted on 2013-01-31
3
733 Views
Last Modified: 2013-06-27
Hi guys
i want to configure my proxy tmg to permit a specific ip to not use a proxy.
Any Help?
0
Comment
Question by:godinhadas
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 37

Accepted Solution

by:
bbao earned 500 total points
ID: 38842561
FYI

Bypassing Forefront TMG for Web proxy client requests
http://technet.microsoft.com/en-us/library/cc441482.aspx
0
 
LVL 51

Expert Comment

by:Keith Alabaster
ID: 38842618
It would be useful to have a brief context to the question as we would not want to be seen to be circumventing security. Your question title is bypass TMG which is very much different to not use the proxy service on the TMG.

Keith
0
 

Author Comment

by:godinhadas
ID: 38843022
Hi Keith
I get your explanation my really problem is that we have machine that we need to active windows and the internet is by proxy.
so it no active
0

Featured Post

On Demand Webinar: Networking for the Cloud Era

Did you know SD-WANs can improve network connectivity? Check out this webinar to learn how an SD-WAN simplified, one-click tool can help you migrate and manage data in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are three types of ISA client that can be configured - these can be individual clients or multiples of a client on each PC or server SecureNAT. A SecureNAT client for ISA server is a client machine, work station or server, that has its defa…
Forefront is the brand name for Microsoft's major security product. Forefront covers a number of specific security areas and has 'swallowed' a number of applications under this umbrella including Antigen, ISA Server, the Integrated Access Gateway (t…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question