Learn about alternative methods that ensure internet traffic is directed to the Internet Access Gateway without installing the Secure Access Module.
NoteYou can use PAC files and proxy chaining concurrently.
|
Option
|
When to Use
|
Pros
|
Cons
|
Proxy auto-configuration (PAC) files
|
When your organization already has a proxy configured and you support users that often
work outside the network
|
|
|
Proxy chaining
|
When your organization already has a proxy configured and you do not need to support
users
that often work outside the network
|
|
|
Port forwarding
|
Not recommended due to the manual configuration involved
|
|
|