By using the antivirus software in HTTP proxy mode.
I am not very sure of this particular filtering model; could you please briefly enumerate the chain of boxes the traffic should traverse to get monitorized with this schema?

Thank you in advance,
--
V�ctor (CIC - UPO.es)



Reply via email to