Common Connection Issues
User-Agent strings are often used for content negotiation, where the origin server selects suitable content or operating parameters for the response. For example, the User-Agent string might be used by a web server to choose variants based on the known capabilities of a particular version of client software.
If this does not work – try Local Area Network Settings
Ignore Certificate Verification will disable verification of the PEER and HOST certificate authorities. With this box ticked it’s possible to intercept the messages sent from udStream to the server, sensitive data in the messages are still encrypted but not the entire message. This setting should *ONLY* be used when instructed by your system administrator and only when errors are occurring during the login process. It will weaken the security between your computer and the udStream Server.
Ignore Certificate Verification will disable verification of the PEER and HOST certificate authorities. With this box ticked it’s possible to intercept the messages sent from udStream to the server, sensitive data in the messages are still encrypted but not the entire message. This setting should *ONLY* be used when instructed by your system administrator and only when errors are occurring during the login process. It will weaken the security between your computer and the udStream Server.
Ignore Certificate Verification will disable verification of the PEER and HOST certificate authorities. With this box ticked it’s possible to intercept the messages sent from udStream to the server, sensitive data in the messages are still encrypted but not the entire message. This setting should *ONLY* be used when instructed by your system administrator and only when errors are occurring during the login process. It will weaken the security between your computer and the udStream Server.