This overview applies to both GoodSync for Windows and GoodSync for Mac unless noted otherwise.
- Do not use Proxy server
- Use Proxy server used by Internet Explorer for remote connections
- Use this Proxy server for remote connections
- Proxy Server and Port
- Proxy UserID and Password
- FTP Proxy Server and Port
- Trust System Root Certification Authorities (requires restart)
The "Tools" >> "Program Options" (on Mac, "GoodSync" >> "Preferences") menu item allows you to view and modify the global GoodSync options.
The "Proxy" section outlines settings employed by GoodSync for establishing connections via a proxy server.
Proxy mode
-
Do not use Proxy server. Do not use a proxy in GoodSync.
-
Use Proxy server used by Internet Explorer for remote connections (selected by default). If this option is selected, GoodSync will use the system proxy settings.
On Windows, it is the proxy server that Internet Explorer and WinINET use. It is configured through the Control Panel >> "Network and Internet" >> "Internet Options" >> "Connections" >> "LAN settings."
On Mac, it is the proxy server configured through the "System Settings" >> "Network" >> "[Choose network service]" >> "Details…" >> "Proxies."
- Use this Proxy server for remote connections. Use the proxy server defined by the settings specified below in the "Proxy" section.
Proxy
Proxy Server and Port (empty by default)
Server: The IP address or name of the Proxy server.
NOTE: If using a SOCKS5 proxy server, prepend the server address or name with "socks5://".
Port: The port on the Proxy server.
Proxy UserID and Password (empty by default)
If your Proxy server requires authentication, specify your credentials here.
FTP Proxy
FTP Proxy Server and Port (empty by default)
To use a proxy for FTP connections, specify the Proxy server address or name and Proxy port here.
Secure Connection
Trust System Root Certification Authorities (requires restart) (checked by default)
This option allows third-party programs (such as anti-virus programs) to listen in on GoodSync communications over TLS if they add their certificate to systems storage.