Proxy Bypass Security Considerations
When a proxy is configured and enabled in the Archer Control Panel (ACP), Archer components interacting with 1 another via proxy may cause undue system load. However, an IP/DNS exception—available in the proxy settings of the ACP—allows for communication between components without using a proxy.
When configuring this feature to bypass your existing, configured ACP proxy, there are some security recommendations to be considered:
- Carefully consider the additions and removals of the IP/DNS entries, as the bypass is a list of trusted sites.
- Only bypass external systems which have SSL/TLS protection enabled to allow communication with internal systems.
- Only bypass external systems with strong authentication systems in place.
- Only bypass URLs/IPs approved by your IT department.