Why do you need a proxy for 1C, and how to configure it correctly

27.04.21 в 06:33 Interesting 272

Companies that use 1C products often have to link the application to external resources, such as downloading current exchange rates or other data. It is better to use a personal proxy server to do everything safely, without the risk of receiving packages of malicious content in response to a request, and to cache the information from the Internet to use it inside 1C as needed.

This article explains how to choose a proxy for 1C and configure it so that everything works so that users or the administrator have no problems accessing the database and utilities.

How to choose a proxy for 1C

The most obvious advice for those who need a good proxy for 1C is to contact us at RSocks. But we will not limit ourselves and share the checklist to choose the best business proxy.

A high-quality proxy for 1C, which won't disappoint you at the crucial moment, meets the following set of requirements:

Private, shared and public options are not suitable for corporate needs because they are poorly protected against data leakage;

Suitable for geo, Therefore, before buying, make sure that the public IP proxy does not eligible for the blocking rules of the sites from which you will download data;

Has a good bandwidth, ping is a clear indicator of the speed of sending requests to the proxy and back again; the less it is — the better.

Choosing a proxy server and connecting it on your own, without understanding the operations of the technology, even if you have a small company and less than ten 1C users, is not the best idea. But after reading the article, everyone, even users who are very far from technology, will understand in general terms how and why to use proxies within workflows.

How to set up a proxy on 1C

Typically, in the package «1С: Enterprise» and other products of the line, proxy settings are installed in a browser by default on the workstation. Usually, it is not very convenient to approach the issue globally since this leads to the passage of all traffic from the browser through the proxy. It is not always necessary. But when you need it, it is easier and more convenient to use a VPN.

To use the proxy in 1C without affecting other applications, you will need more fine-tuning. To set up the proxy server version «1С: Enterprise» (31.03.20) and earlier ones:

1. Open the CONF directory in the Applications folder and find the inetcfg.xml file there. If it doesn't exist, create a new one.

2. Write the following code inside the file: <InternetProxy protocols="http=" user="Admin" password="Qwerty10" bypassOnLocal="true" bypassOnAddresses=" *. razd"/>

Instead of the addresses, username, and password given in the example, you, of course, write the ones that your proxy server provider gave you. For a better understanding of the code, let's look at what each of the parameters means:

● Protocols — type of the protocol used by the server (https, ftp);

● User и password — username and password of the

user for authorization on the server;

● bypassOnLocal — parameter that indicates for using the proxy server for

local addresses (true — not to apply, false — to apply);

● bypassOnAddresses — exception addresses by connecting to which traffic

will not be passing through the proxy server;

● Ntlm — authentication (true — not to apply, false — to apply).

Special offer from RSocks

We offer a proxy with geos of USA, India, United Kingdom, Russia for any tasks. Almost any service can be trialed and if something suddenly does not fit, order a refund.

You can find more instructions in the blog, and you can always contact our support service with specific questions about choosing and configuring proxies.



伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

12月 2017


In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country


Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection

Detailed and as simplified as possible instructions on how to choose and configure proxies on 1C for those who have never done anything like this before.

We will talk about the procedure for checking open ports, briefly describe the scanning procedure itself, and finally, list the main tools and scanners that are suitable for these tasks.

Many Internet users are complaining about annoying CAPTCHAs. You get kicked from a web-source for a second and suddenly, artificial intelligence asks you to type a set of symbols with numbers, or Russian & Latin letters, or click all the traffic lights and crosswalks in the pictures.

It is becoming increasingly difficult to maintain anonymity and privacy on the Internet: search engines, websites, and social networks collect information about users and use it for commercial purposes. Any visitor to the web leaves a digital trail, followed by numerous advertisers and target markets.