Why do you need a proxy for 1C, and how to configure it correctly

27.04.21 в 06:33 Interesting 5150

Companies that use 1C products often have to link the application to external resources, such as downloading current exchange rates or other data. It is better to use a personal proxy server to do everything safely, without the risk of receiving packages of malicious content in response to a request, and to cache the information from the Internet to use it inside 1C as needed.

This article explains how to choose a proxy for 1C and configure it so that everything works so that users or the administrator have no problems accessing the database and utilities.

How to choose a proxy for 1C

The most obvious advice for those who need a good proxy for 1C is to contact us at RSocks. But we will not limit ourselves and share the checklist to choose the best business proxy.

A high-quality proxy for 1C, which won't disappoint you at the crucial moment, meets the following set of requirements:

Private, shared and public options are not suitable for corporate needs because they are poorly protected against data leakage;

Suitable for geo, Therefore, before buying, make sure that the public IP proxy does not eligible for the blocking rules of the sites from which you will download data;

Has a good bandwidth, ping is a clear indicator of the speed of sending requests to the proxy and back again; the less it is — the better.

Choosing a proxy server and connecting it on your own, without understanding the operations of the technology, even if you have a small company and less than ten 1C users, is not the best idea. But after reading the article, everyone, even users who are very far from technology, will understand in general terms how and why to use proxies within workflows.

How to set up a proxy on 1C

Typically, in the package «1С: Enterprise» and other products of the line, proxy settings are installed in a browser by default on the workstation. Usually, it is not very convenient to approach the issue globally since this leads to the passage of all traffic from the browser through the proxy. It is not always necessary. But when you need it, it is easier and more convenient to use a VPN.

To use the proxy in 1C without affecting other applications, you will need more fine-tuning. To set up the proxy server version «1С: Enterprise» (31.03.20) and earlier ones:

1. Open the CONF directory in the Applications folder and find the inetcfg.xml file there. If it doesn't exist, create a new one.

2. Write the following code inside the file: <InternetProxy protocols="http=" user="Admin" password="Qwerty10" bypassOnLocal="true" bypassOnAddresses=" *. razd"/>

Instead of the addresses, username, and password given in the example, you, of course, write the ones that your proxy server provider gave you. For a better understanding of the code, let's look at what each of the parameters means:

● Protocols — type of the protocol used by the server (https, ftp);

● User и password — username and password of the

user for authorization on the server;

● bypassOnLocal — parameter that indicates for using the proxy server for

local addresses (true — not to apply, false — to apply);

● bypassOnAddresses — exception addresses by connecting to which traffic

will not be passing through the proxy server;

● Ntlm — authentication (true — not to apply, false — to apply).

Special offer from RSocks

We offer a proxy with geos of USA, India, United Kingdom, Russia for any tasks. Almost any service can be trialed and if something suddenly does not fit, order a refund.

You can find more instructions in the blog, and you can always contact our support service with specific questions about choosing and configuring proxies.



伴随着会联网的广泛使用,随之带来一系列的危险。首先涉及到匿名和安全性。如果信息不设防范手段,您的数据很可能被入侵 — 这里举个例子,关于在公用网络中的私人的信件。

最初的互联网预想让空间没有国界化,无论在在那里都可以绝对匿名地获取任何信息。现在很多国家都出现了禁止访问某些资源的情况 。

12月 2017


In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

​The most common methods for organizing network anonymity are the Tor browser and the VPN technology. With their help, a real IP address is hidden, Internet censorship is circumvented and international restrictions are overcome.


Receiving big volumes of data from websites for its following analysis plays a key role for plenty of projects. Target resource structure analysis and scraping of the relevant information are often connected to blocks or access restriction issues from website administration.

If you’re looking for a package of residential or mobile proxies with the ability to work with a particular country or ISP, the best option is definitely Exclusive Mix. With it you will be able to download the list which consists of proxies from preliminarily chosen countries and carriers, flexibly filtering it for your needs.

7月 2021

How to web scrape with python? It's a question that many beginners have. At the entry level, the process is quite simple, and anyone can quickly get their project off the ground. However, to successfully work on such a task, you should not forget about many aspects, which are not easy to understand at once.


Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection



Trustpilot 4.5