Solved

Use a proxy with applications, not only with a browser

Posted on 2013-05-14
2
498 Views
Last Modified: 2013-05-14
I need InDesign connects to Internet (for a plugin) through a corporate proxy.
I'm using windows 7, I change my proxy configuration in "Internet Options", that works for Internet browsers but InDesign skips configuration and try to go directly to the server.

How can I  force the application to use the proxy? Any Idea?, Will be better option use a VPN instead proxy?

Regards
0
Comment
Question by:CEGE
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 1

Accepted Solution

by:
amaexchange earned 400 total points
ID: 39163830
You can set a global, machine level proxy. In command promt enter

netsh winhttp import proxy source=ie

Open in new window


to set your IE proxy settings as machine proxy.
0
 
LVL 1

Assisted Solution

by:dmitrij75
dmitrij75 earned 100 total points
ID: 39163881
VPN is a good decision if you are planning to connect to the remote PC's, shared resources in the remote organization, or just the Internet within your corporate network. All the applications and browsers will be passing their traffic via the VPN, if your are not directly indicated reverse in the proxy setting of course :) This is the most cheap and reliable solution You just need to configure VPN on a server side to allow remote connections. .
0

Featured Post

Transaction Monitoring Vs. Real User Monitoring

Synthetic Transaction Monitoring Vs. Real User Monitoring: When To Use Each Approach? In this article, we will discuss two major monitoring approaches: Synthetic Transaction and Real User Monitoring.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question