A Proxy is used for integrations that need information from outside the network or DMZ and want the security of a proxy.
In this section you can configure the proxy address, whether or not it should use authentication – as well as a valid user name and password.
You can add URLs or IP addresses that can be accessed without needing a proxy. Make sure to save all entered settings.