I am not very sure of this particular filtering model; could you please briefly enumerate the chain of boxes the traffic should traverse to get monitorized with this schema?By using the antivirus software in HTTP proxy mode.
Thank you in advance,
--
V�ctor (CIC - UPO.es)
