Pseudo Proxy Authentication¶
Pseudo proxy authentication allows the administrator to transparently map a given IP address to the User Name or MAC address without requiring browser to login. This type of pseudo authentication is typically used in transparent deployments or in small networks where administrator manages IP or MAC addresses manually.
It is possible to manually assign user names to IP addresses or MAC addresses of the devices connecting to proxy. This scenario is only usable in small (home) networks where IPs and MAC addresses are known to the the administrator and proxy users do not roam among devices.