{"id":44367,"date":"2024-03-28T05:51:06","date_gmt":"2024-03-28T04:51:06","guid":{"rendered":"https:\/\/kb.apptec360.com\/manual\/knowledgebase\/generic-vpn-configurations\/"},"modified":"2024-12-04T05:03:27","modified_gmt":"2024-12-04T04:03:27","slug":"generic-vpn-configurations","status":"publish","type":"knowledgebase","link":"https:\/\/kb.apptec360.com\/manual\/pl\/knowledgebase\/configuration-windows-10-pc\/general\/connection-management\/vpn\/generic-vpn-configurations\/","title":{"rendered":"Og\u00f3lne konfiguracje VPN"},"content":{"rendered":"\n<table id=\"tablepress-329\" class=\"tablepress tablepress-id-329\">\n<caption style=\"caption-side:bottom;text-align:left;border:none;background:none;margin:0;padding:0;\"><a href=\"https:\/\/kb.apptec360.com\/manual\/wp-admin\/admin.php?page=tablepress&#038;action=edit&#038;table_id=329\" rel=\"nofollow\">Edytuj<\/a><\/caption>\n<tbody class=\"row-hover\">\n<tr class=\"row-1 odd\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Zapami\u0119tywanie po\u015bwiadcze\u0144 przy ka\u017cdym logowaniu<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-2 even\">\n\t<td colspan=\"2\" class=\"column-1\"><br\/>\n        <p>Rejestrowanie adres\u00f3w IP w wewn\u0119trznym systemie DNS<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-3 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Regu\u0142y filtrowania ruchu sieciowego<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Ograniczenie po\u0142\u0105czenia VPN do zdefiniowanego zestawu regu\u0142.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-4 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Lista wyszukiwania sufiks\u00f3w DNS<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Sufiksy DNS do dodania do listy wyszukiwania DNS dla routingu nazw skr\u00f3conych.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-5 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Regu\u0142y tabeli zasad rozpoznawania nazw (NRPT)<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Regu\u0142y tabeli zasad rozpoznawania nazw (NRPT) definiuj\u0105 spos\u00f3b, w jaki DNS rozpoznaje nazwy po po\u0142\u0105czeniu z VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-6 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Wykrywanie zaufanej sieci<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Lista sufiks\u00f3w DNS do identyfikacji zaufanej sieci.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-7 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Dzielone tunelowanie<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Dzielone tunelowanie oznacza, \u017ce ruch mo\u017ce przechodzi\u0107 przez dowolny interfejs okre\u015blony przez stos sieciowy.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-8 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Podzielone trasy tunelowania<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Lista tras, kt\u00f3re maj\u0105 zosta\u0107 dodane do tablicy routingu dla interfejsu VPN.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-9 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Konfiguracja proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Konfiguruje serwer proxy u\u017cywany w tej sieci<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-10 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres pe\u0142nomocnika<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Adres serwera proxy jako w pe\u0142ni kwalifikowana nazwa hosta lub adres IP.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-11 odd\">\n\t<td class=\"column-1\"><br\/>\n        <p>Port<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>Port serwera proxy.<\/p><br\/>\n      <\/td>\n<\/tr>\n<tr class=\"row-12 even\">\n\t<td class=\"column-1\"><br\/>\n        <p>Adres URL autokonfiguracji serwera proxy<\/p><br\/>\n      <\/td><td class=\"column-2\"><br\/>\n        <p>URL, aby automatycznie pobra\u0107 ustawienia proxy.<\/p><br\/>\n      <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"parent":44372,"menu_order":0,"template":"","class_list":["post-44367","knowledgebase","type-knowledgebase","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/44367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase"}],"about":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/types\/knowledgebase"}],"version-history":[{"count":2,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/44367\/revisions"}],"predecessor-version":[{"id":46398,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/44367\/revisions\/46398"}],"up":[{"embeddable":true,"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/knowledgebase\/44372"}],"wp:attachment":[{"href":"https:\/\/kb.apptec360.com\/manual\/pl\/wp-json\/wp\/v2\/media?parent=44367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}