Hi All,We are looking at using Cut Through Proxy authentication, but I have a question about shared computers, ie Citrix. How does the firewall open up access once the user is authenticated? Is it by host MAC address, in which case would open up the ...