Manuals
/
Brands
/
Computer Equipment
/
Computer Accessories
/
Kerio Tech
/
Computer Equipment
/
Computer Accessories
Kerio Tech
6 manual
1
1
368
368
Download
368 pages, 2.64 Mb
Ker
io
WinR
o
ut
e
Fi
r
ew
al
l
6
Administrator’s Guide
Kerio Technologies s.r.o.
Contents
Main
Page
Contents
Page
Page
Page
Chapter 1
Quick Checklist
Page
Chapter 2
Introduction
2.1 Whats new in 6.7.1
2.2 Conicting software
2.3 System requirements
2.4 Installation - Windows
Page
Page
Page
Page
2.5 Initialconguration wizard (Windows)
Page
2.6 Upgrade and Uninstallation - Windows
2.7 Installation- Software Appliance and VMware Virtual Appliance
Page
Page
2.8 Upgrade - Software Appliance / VMware Virtual Appliance
2.9 WinRoute Components
2.10 WinRoute Engine Monitor (Windows)
2.11 The rewalls console (Software Appliance / VMware Virtual Appli- ance)
Page
Chapter 3
WinRoute Administration
3.1 Administration Console - the main window
Page
Page
3.2 Administration Console - view preferences
Chapter 4
Product Registration and Licensing
4.1 License types and number of users
4.2 License information
Page
4.3 Registrationof the product in the Administration Console
Page
Page
Page
Page
Page
Page
Page
4.4 Product registration at the website
4.5 Subscription / Update Expiration
Page
4.6 User counter
Page
Chapter 5
Network interfaces
Page
Page
Page
Page
Page
Chapter 6
Internet Connection
6.1 Persistent connection with a single link
Page
Page
6.2 Connection with a single leased link - dial on demand
Page
Page
Page
Page
6.3 Connection Failover
Page
Page
Page
6.4 NetworkLoad Balancing
Page
Page
Page
Page
Chapter 7
Trac Policy
7.1 Network Rules Wizard
Page
Page
Page
Page
Page
Page
7.2 How trac rules work
7.3 Denition of Custom Trac Rules
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
7.4 Basic Trac Rule Types
Page
Page
Page
Page
7.5 Policy routing
Page
Page
7.6 Useraccounts and groups in trac rules
7.7 PartialRetirement of Protocol Inspector
Page
7.8 Use of Full cone NAT
7.9 Mediahairpinning
Page
Chapter 8
Conguration of network services
8.1 DNS module
Page
Page
Page
Page
Page
8.2 DHCP server
Page
Page
Page
Page
Page
Page
Page
Page
8.3 DynamicDNS for public IP address of the rewall
Page
8.4 Proxyserver
Page
Page
8.5 HTTP cache
Page
Page
Page
Page
Page
Chapter 9
Bandwidth Limiter
9.1 How the bandwidth limiter works and how to use it
9.2 Bandwidth Limiter conguration
Page
Page
Page
Page
9.3 Detectionof connections with large data volume transferred
Page
Chapter 10
User Authentication
10.1 Firewall User Authentication
Page
Page
Page
Chapter 11
Web Interface
11.1 Web interface preferences
Page
Page
Page
Page
11.2 User authentication at the web interface
Chapter 12
HTTP and FTP ltering
12.1 Conditions for HTTP and FTP ltering
12.2 URLRules
Page
Page
Page
Page
Page
12.3 ContentRating System (Kerio Web Filter)
Page
Page
Page
12.4 Webcontent ltering by word occurrence
Page
Page
Page
12.5 FTP Policy
Page
Page
Page
Page
Chapter 13
Antivirus control
13.1 Conditions and limitations of antivirus scan
13.2 Howto choose and setup antiviruses
Page
Page
Page
13.3 HTTPand FTP scanning
Page
Page
Page
13.4 Email scanning
Page
13.5 Scanning of les transferred via Clientless SSL-VPN (Windows)
Page
Chapter 14
Denitions
14.1 IP Address Groups
14.2 TimeRanges
Page
14.3 Services
Page
Page
Page
14.4 URLGroups
Page
Page
Chapter 15
User Accounts and Groups
15.1 Viewing and denitions of user accounts
Page
15.2 Local user accounts
Page
Page
Page
Page
Page
Page
Page
Page
Page
15.3 Local user database: external authentication and import of accounts
15.4 Useraccounts in Active Directory domain mapping
Page
Page
Page
Page
Page
15.5 User groups
Page
Page
Page
Chapter 16
Administrative settings
16.1 System conguration (Software Appliance / VMware Virtual Appli- ance)
16.2 Setting Remote Administration
16.3 Update Checking
Page
Chapter 17
Advanced security features
17.1 P2P Eliminator
Page
Page
17.2 Special Security Settings
Page
Page
Chapter 18
Other settings
18.1 Routing table
Page
Page
18.2 Universal Plug-and-Play (UPnP)
Page
18.3 Relay SMTP server
Page
Chapter 19
Status Information
19.1 Active hosts and connected users
Page
Page
Page
Page
Page
Page
19.2 Networkconnections overview
Page
Page
Page
19.3 List of connected VPN clients
19.4 Alerts
Page
Page
Page
Page
Chapter 20
Basic statistics
20.1 Volume of transferred data and quota usage
Page
20.2 Interface statistics
Page
Page
Page
Chapter 21
Kerio StaR - statistics and reporting
21.1 Monitoringand storage of statistic data
Page
21.2 Settings for statistics and quota
Page
Page
21.3 Connection to StaR and viewing statistics
Page
Page
Chapter 22
Logs
22.1 Log settings
Page
Page
22.2 Logs Context Menu
Page
Page
Page
22.3 Alert Log
22.4 Cong Log
22.5 Connection Log
22.6 Debug Log
Page
22.7 Dial Log
Page
22.8 ErrorLog
22.9 Filter Log
22.10 Http log
22.11 Security Log
Page
22.12 SslvpnLog
22.13 WarningLog
22.14 Web Log
Page
Chapter 23
Kerio VPN
23.1 VPN Server Conguration
Page
Page
Page
Page
23.2 Congurationof VPN clients
Page
23.3 Interconnection of two private networks via the Internet (VPN tunnel)
Page
Page
Page
Page
23.4 Exchangeof routing information
23.5 Example of Kerio VPN conguration: company with a lial oce
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
23.6 Example of a more complex Kerio VPN conguration
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Chapter 24
Kerio Clientless SSL-VPN (Windows)
24.1 Conguration of WinRoutes SSL-VPN
Page
24.2 Usageof the SSL-VPN interface
Chapter 25
Specic settings and troubleshooting
25.1 Conguration Backup and Transfer
25.2 Conguration les
25.3 Automatic user authentication using NTLM
Page
Page
25.4 FTPon WinRoutes proxy server
Page
Page
25.5 Internetlinks dialed on demand
Page
Page
Page
Page
Chapter 26
Technical support
26.1 Essential Information
26.2 Tested in Beta version
Appendix A
Legal Notices
Appendix B
Used open source items
Page
Page
Glossary of terms
Page
Page
Page
Page
Page
Page
Index