Firewall and Proxy policy
A group of policies for firewall setup and configuration. IT admins can enforce these policies for fully managed devices with or without a Work profile. Availability: All Knox versions
  • Enable firewall controls
    Use this control to enable or disable the firewall controls for fully managed devices with or without a Work profile.
  • Name of firewall configuration to use
    Enter the name of the primary firewall configuration profile that apps can use for network connections. This profile name must match the value set in the Firewall profiles section.
  • Enable Proxy on device
    Use this control to enable or disable a global proxy on a device that routes all internet traffic through a proxy server of your choice. This works for both WiFi and data connections. You can use either a fixed proxy server address or a proxy auto-config (PAC) file. According to your selection here, the settings provided in either the "Manual proxy configuration" or "Proxy auto configuration" section below will be used.
Manual Proxy configuration
A group of policies to specify the global proxy setting using a specified server host and port. Contact your network administrator for this information.
  • Server
    Enter the proxy server information in this field. Contact your Network or IT Administrator for this information.
  • Port
    Enter the port number of the proxy server host in this field. Contact your Network or IT Administrator for this information.
  • Username
    If your proxy uses authentication, then use this field. If you want to use admin provided credentials, enter the username for use with the proxy server. Leave this field empty if you do not use authentication or if the proxy requires users corporate credentials to authenticate.
  • Password
    If your proxy uses authentication, then use this field. If you want to use admin provided credentials, enter the password for use with the proxy server. Leave this field empty if you do not use authentication or if the proxy requires users corporate credentials to authenticate.
  • Host IP addresses to exclude from Proxy
    Specify any IP addresses you want to bypass the proxy. Enter the values as a comma separated list of the IP addresses, for example, “123.123.55.0, 123.123.50.0”.
  • Domain to exclude from Proxy
    Specify the domains that can bypass the proxy you have set. For example, you can specify that “samsung.com” as a domain and any DNS query to that domain and resulting data traffic will bypass the proxy.