{"id":43853,"date":"2024-03-28T07:54:23","date_gmt":"2024-03-28T06:54:23","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/vpn\/"},"modified":"2024-12-04T05:01:13","modified_gmt":"2024-12-04T04:01:13","slug":"vpn","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/pl\/knowledgebase\/macos-configuration\/connection-management\/vpn\/","title":{"rendered":"VPN"},"content":{"rendered":"\n<p>W zale\u017cno\u015bci od wybranego typu po\u0142\u0105czenia mog\u0105 by\u0107 widoczne r\u00f3\u017cne pola.<\/p>\n\n<table id=\"tablepress-352\" class=\"tablepress tablepress-id-352\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=352\" rel=\"nofollow\">Edytuj<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Nazwa po\u0142\u0105czenia<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nazwa profilu VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Typ VPN<\/p><br\/>\n      <\/td><td class=\"column-2\"><\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>VPN<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ca\u0142y ruch sieciowy urz\u0105dzenia b\u0119dzie kierowany przez po\u0142\u0105czenie VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Typ po\u0142\u0105czenia<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustanowienie typu po\u0142\u0105czenia VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>IPsec (cisco)<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protok\u00f3\u0142 IPsec firmy cisco<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>L2TP<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protok\u00f3\u0142 L2TP<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Niestandardowy SSL<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Po\u0142\u0105czenie przez niestandardowy protok\u00f3\u0142 SSL<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>IKEv2<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Protok\u00f3\u0142 IKEv2<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Konfiguracja proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Konfiguracja serwera proxy dla po\u0142\u0105czenia VPN<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Brak<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustanowienie braku proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Podr\u0119cznik<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>R\u0119czne ustanowienie serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres URL serwera proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adres dost\u0119pu do ustawie\u0144 proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-13 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Port<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ustalenie portu dla serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-14 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Uwierzytelnianie<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Nazwa u\u017cytkownika do uwierzytelniania na serwerze proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-15 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Has\u0142o<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Has\u0142o do uwierzytelniania na serwerze proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-16 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Automatyczny<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Automatyczne ustanowienie serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-17 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres URL serwera proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adres URL umo\u017cliwiaj\u0105cy dost\u0119p do ustawie\u0144 serwera proxy<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n<div class=\"pagebreak-after\"><\/div>\n","protected":false},"parent":43856,"menu_order":0,"template":"","class_list":["post-43853","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43853","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43853\/revisions"}],"predecessor-version":[{"id":47163,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43853\/revisions\/47163"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/43856"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/media?parent=43853"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}