![]() Try vised it can bypass k9 Guest7280 Go to control pannel go to device manager click show hiden device find non-Plug and play divers. I used K9 Web Protection 3.2.36 which you can download from the following link. Xlate per-session deny udp any6 any6 eq domain Xlate per-session deny udp any6 any4 eq domain Xlate per-session deny udp any4 any6 eq domain Xlate per-session deny udp any4 any4 eq domain Type help or '?' for a list of available commands. Provided that the ACL is attached to the interface in the direction "in" It should only control traffic leaving from the network(s) behind the "inside" interface. Dont configure any ACL rules for VPN to the "inside" interface ACL. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |