Why do you need a proxy for 1C, and how to configure it correctly

27.04.21 в 06:33 Interesting 2888

Companies that use 1C products often have to link the application to external resources, such as downloading current exchange rates or other data. It is better to use a personal proxy server to do everything safely, without the risk of receiving packages of malicious content in response to a request, and to cache the information from the Internet to use it inside 1C as needed.

This article explains how to choose a proxy for 1C and configure it so that everything works so that users or the administrator have no problems accessing the database and utilities.

How to choose a proxy for 1C

The most obvious advice for those who need a good proxy for 1C is to contact us at RSocks. But we will not limit ourselves and share the checklist to choose the best business proxy.

A high-quality proxy for 1C, which won't disappoint you at the crucial moment, meets the following set of requirements:

Private, shared and public options are not suitable for corporate needs because they are poorly protected against data leakage;

Suitable for geo, Therefore, before buying, make sure that the public IP proxy does not eligible for the blocking rules of the sites from which you will download data;

Has a good bandwidth, ping is a clear indicator of the speed of sending requests to the proxy and back again; the less it is — the better.

Choosing a proxy server and connecting it on your own, without understanding the operations of the technology, even if you have a small company and less than ten 1C users, is not the best idea. But after reading the article, everyone, even users who are very far from technology, will understand in general terms how and why to use proxies within workflows.

How to set up a proxy on 1C

Typically, in the package «1С: Enterprise» and other products of the line, proxy settings are installed in a browser by default on the workstation. Usually, it is not very convenient to approach the issue globally since this leads to the passage of all traffic from the browser through the proxy. It is not always necessary. But when you need it, it is easier and more convenient to use a VPN.

To use the proxy in 1C without affecting other applications, you will need more fine-tuning. To set up the proxy server version «1С: Enterprise» 8.3.16.1296 (31.03.20) and earlier ones:

1. Open the CONF directory in the Applications folder and find the inetcfg.xml file there. If it doesn't exist, create a new one.

2. Write the following code inside the file: <InternetProxy protocols="http=172.1.200.18:8080 172.1.200.19:8080" user="Admin" password="Qwerty10" bypassOnLocal="true" bypassOnAddresses="127.0.0.1 *. razd"/>

Instead of the addresses, username, and password given in the example, you, of course, write the ones that your proxy server provider gave you. For a better understanding of the code, let's look at what each of the parameters means:

● Protocols — type of the protocol used by the server (https, ftp);

● User и password — username and password of the

user for authorization on the server;

● bypassOnLocal — parameter that indicates for using the proxy server for

local addresses (true — not to apply, false — to apply);

● bypassOnAddresses — exception addresses by connecting to which traffic

will not be passing through the proxy server;

● Ntlm — authentication (true — not to apply, false — to apply).

Special offer from RSocks

We offer a proxy with geos of USA, India, United Kingdom, Russia for any tasks. Almost any service can be trialed and if something suddenly does not fit, order a refund.

You can find more instructions in the blog, and you can always contact our support service with specific questions about choosing and configuring proxies.

评论

登录来发表评论
热门

伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

25日
12月 2017

当今世界保证私人和企业的秘密数据变得越来越困难,所以信息安全的问题变得的越演越烈。每个人都拥有生存、自由和人身安全的权力。保护自己的数据免受入侵,和第三方的调查是没有任何原因的。如果您想在网络上安全地保存自己的信息,就不得不去遵守那些规则。本文就来介绍下基本的方法、手段和常用的程序,当然最主要的是互联网的安全使用。

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

最新

If you’re looking for a package of residential or mobile proxies with the ability to work with a particular country or ISP, the best option is definitely Exclusive Mix. With it you will be able to download the list which consists of proxies from preliminarily chosen countries and carriers, flexibly filtering it for your needs.

9日
7月 2021

How to web scrape with python? It's a question that many beginners have. At the entry level, the process is quite simple, and anyone can quickly get their project off the ground. However, to successfully work on such a task, you should not forget about many aspects, which are not easy to understand at once.

大家知道吗?大部分电子商务和网络营销的专家使用专业浏览器。该浏览器提高匿名率所以很流行。

Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection

Detailed and as simplified as possible instructions on how to choose and configure proxies on 1C for those who have never done anything like this before.

有问题吗?

在这儿点击,我们就回答

我们很重视用户评价,和大家分享你的经验