4
7.5 Policy routing ........................................................... 95
7.6 User accounts and groups in traffic rules ................................. 98
7.7 Partial Retirement of Protocol Inspector .................................. 99
7.8 Use of Full cone NAT .................................................. 101
7.9 Media hairpinning ..................................................... 102
8 Configuration of network services ........................................... 104
8.1 DNS module ........................................................... 104
8.2 DHCP server ........................................................... 110
8.3 Dynamic DNS for public IP address of the firewall ....................... 119
8.4 Proxy server ........................................................... 121
8.5 HTTP cache ............................................................ 124
9 Bandwidth Limiter ........................................................... 130
9.1 How the bandwidth limiter works and how to use it ..................... 130
9.2 Bandwidth Limiter configuration ....................................... 130
9.3 Detection of connections with large data volume transferred ............ 135
10 User Authentication .......................................................... 137
10.1 Firewall User Authentication ........................................... 137
11 Web Interface ................................................................ 141
11.1 Web interface preferences .............................................. 141
11.2 User authentication at the web interface ................................ 146
12 HTTP and FTP filtering ....................................................... 147
12.1 Conditions for HTTP and FTP filtering .................................. 147
12.2 URL Rules ............................................................. 148
12.3 Content Rating System (Kerio Web Filter) ............................... 154
12.4 Web content filtering by word occurrence ............................... 158
12.5 FTP Policy ............................................................. 162
13 Antivirus control ............................................................ 167
13.1 Conditions and limitations of antivirus scan ............................ 167
13.2 How to choose and setup antiviruses ................................... 168
13.3 HTTP and FTP scanning ................................................ 172
13.4 Email scanning ........................................................ 176
13.5 Scanning of files transferred via Clientless SSL-VPN (Windows) ........... 178
14 Definitions ................................................................... 180
14.1 IP Address Groups ..................................................... 180
14.2 Time Ranges .......................................................... 181
14.3 Services ............................................................... 183
14.4 URL Groups ........................................................... 187