Why do you need a proxy for 1C, and how to configure it correctly

27.04.21 в 06:33 Interesting 1124

Companies that use 1C products often have to link the application to external resources, such as downloading current exchange rates or other data. It is better to use a personal proxy server to do everything safely, without the risk of receiving packages of malicious content in response to a request, and to cache the information from the Internet to use it inside 1C as needed.

This article explains how to choose a proxy for 1C and configure it so that everything works so that users or the administrator have no problems accessing the database and utilities.

How to choose a proxy for 1C

The most obvious advice for those who need a good proxy for 1C is to contact us at RSocks. But we will not limit ourselves and share the checklist to choose the best business proxy.

A high-quality proxy for 1C, which won't disappoint you at the crucial moment, meets the following set of requirements:

Private, shared and public options are not suitable for corporate needs because they are poorly protected against data leakage;

Suitable for geo, Therefore, before buying, make sure that the public IP proxy does not eligible for the blocking rules of the sites from which you will download data;

Has a good bandwidth, ping is a clear indicator of the speed of sending requests to the proxy and back again; the less it is — the better.

Choosing a proxy server and connecting it on your own, without understanding the operations of the technology, even if you have a small company and less than ten 1C users, is not the best idea. But after reading the article, everyone, even users who are very far from technology, will understand in general terms how and why to use proxies within workflows.

How to set up a proxy on 1C

Typically, in the package «1С: Enterprise» and other products of the line, proxy settings are installed in a browser by default on the workstation. Usually, it is not very convenient to approach the issue globally since this leads to the passage of all traffic from the browser through the proxy. It is not always necessary. But when you need it, it is easier and more convenient to use a VPN.

To use the proxy in 1C without affecting other applications, you will need more fine-tuning. To set up the proxy server version «1С: Enterprise» 8.3.16.1296 (31.03.20) and earlier ones:

1. Open the CONF directory in the Applications folder and find the inetcfg.xml file there. If it doesn't exist, create a new one.

2. Write the following code inside the file: <InternetProxy protocols="http=172.1.200.18:8080 172.1.200.19:8080" user="Admin" password="Qwerty10" bypassOnLocal="true" bypassOnAddresses="127.0.0.1 *. razd"/>

Instead of the addresses, username, and password given in the example, you, of course, write the ones that your proxy server provider gave you. For a better understanding of the code, let's look at what each of the parameters means:

● Protocols — type of the protocol used by the server (https, ftp);

● User и password — username and password of the

user for authorization on the server;

● bypassOnLocal — parameter that indicates for using the proxy server for

local addresses (true — not to apply, false — to apply);

● bypassOnAddresses — exception addresses by connecting to which traffic

will not be passing through the proxy server;

● Ntlm — authentication (true — not to apply, false — to apply).

Special offer from RSocks

We offer a proxy with geos of USA, India, United Kingdom, Russia for any tasks. Almost any service can be trialed and if something suddenly does not fit, order a refund.

You can find more instructions in the blog, and you can always contact our support service with specific questions about choosing and configuring proxies.

Comments

Sign in to comment
Popular

Together with wide opportunities the Internet carries a number of dangers. First of all, when it comes to anonymity and security.

Initially, the World Wide Web was conceived as a space without borders, where you can get absolutely any information on an anonymous basis.

In today's world, it becomes more difficult to keep personal and corporate data in secret, so the issue of information security is becoming more acute every day.

In the recent past by the standards of the development of information technologies, in 2015 Google created artificial intelligence based on neural networks, which was able to analyze the condition around itself and draw conclusions about its further education. The name of the new offspring from Google was given in abbreviated from the term "deep Q-network" - DQN. The DQN started training in common arcade games (Pakman, Tennis, Space Invaiders, Boksing and other classics).

Good afternoon! Now we are talking about such an important topic in our time, as an opportunity to bypass the blocking of sites. The problem is very relevant in our country

New

Proxy server: what is it? Main advantages of working via a virtual “mediator” – anonymity on the web, avoiding all bans, protection against attacks, intellectual property protection

Detailed and as simplified as possible instructions on how to choose and configure proxies on 1C for those who have never done anything like this before.

We will talk about the procedure for checking open ports, briefly describe the scanning procedure itself, and finally, list the main tools and scanners that are suitable for these tasks.

Many Internet users are complaining about annoying CAPTCHAs. You get kicked from a web-source for a second and suddenly, artificial intelligence asks you to type a set of symbols with numbers, or Russian & Latin letters, or click all the traffic lights and crosswalks in the pictures.

It is becoming increasingly difficult to maintain anonymity and privacy on the Internet: search engines, websites, and social networks collect information about users and use it for commercial purposes. Any visitor to the web leaves a digital trail, followed by numerous advertisers and target markets.

Have you got any question?

Click here and we’ll answer

Behind every review is an experience that matters