Manuals
/
Kerio Tech
/
Computer Equipment
/
Network Router
Kerio Tech
Firewall6
manual
Administrator’s Guide, Kerio Technologies
Models:
Firewall6
1
1
398
398
Download
398 pages
11.9 Kb
1
2
3
4
5
6
7
8
Troubleshooting
Install
Password
Error Log
Login
Administrator’s Guide
Reset interface statistics
Remote Access
Connection Failover Setup
Port mapping timeout
Page 1
Image 1
Administrator’s Guide
Kerio Technologies
Page 1
Page 2
Page 1
Image 1
Page 1
Page 2
Contents
Kerio Technologies
Administrator’s Guide
Page
Contents
113
Remote Administration and Update Checks 209
Kerio Clientless SSL-VPN 355
393
Quick Checklist
Page
Introduction
Basic Features
Kerio WinRoute Firewall
Kerio WinRoute Firewall
Additional Features
Transparent support for Active Directory
Antivirus control
Email alerts
User quotas
Clientless SSL-VPN
Conflicting software
Collision of low-level drivers
Port collision
Antivirus applications
Installation
Installation
Steps to be taken before the installation
System requirements
Installation and Basic Configuration Guide
Custom installation selecting optional components
Protection of the installed product
Conflicting Applications and System Services
WinRoute Firewall Engine
WinRoute Components
WinRoute Engine Monitor
WinRoute Engine Monitor
Kerio Administration Console
WinRoute Engine Monitor
Upgrade and Uninstallation
Uninstallation
Upgrade and Uninstallation
Typically the path C\Program Files\Kerio\WinRoute Firewall
Update Checker
Upgrade from WinRoute Pro
Setting of administration username and password
Configuration Wizard
Enable remote access
Remote Access
Remote IP address
Initial configuration Allowing remote administration
Administration Window
WinRoute Administration
Administration Window Main menu
WinRoute Administration
File
Help menu
Status bar
Administration Window
Detection of WinRoute Firewall Engine connection drop-out
Column customization in Interfaces
View Settings
View Settings
License types and number of users
Product Registration and Licensing
License types optional components
Deciding on a number of users licenses
License types and number of users
Product
License information
Copyright
Homepage
Subscription expiration date
License ID
Product expiration date
Number of users
Registration of the trial version
Registration of the product in the Administration Console
Trial version registration security code
Registration of the product in the Administration Console
Trial version registration other information
Trial version registration Trial ID
Registration of the purchased product
Product Registration and Licensing
Registration of the product in the Administration Console
10 Product registration user information
12 Product registration summary
Update of registration information
Product registration at the website
Subscription / Update Expiration
Bubble alerts
Subscription / Update Expiration
15 The notice that the subscription has already expired
User counter
Start WinRoute
User counter
License counter
License release
Network interfaces
Settings for Interfaces and Network Services
Interface
IP Address and Mask
Adapter info
Dial or Hang Up /Enebale, Disable
Add
Modify
Special interfaces
Refresh
Dial-In
VPN server
Interface type selection
Bind this interface
Use the following login data
Use login data from the RAS entry
Interface name
RAS Entry
Dial-up demand dial
Connection
Advanced
Hangup if idle
Edit Interface parameters
Connection Failover
Enable automatic connection failover
Connection Failover Setup
Connection Failover
Current connection
Configuration of primary and secondary Internet connection
Secondary connection
Primary connection
Dial-up Use
DNS Forwarder configuration
DNS Forwarder
DNS Forwarder
Enable DNS forwarding
DNS forwarding
Enable DNS forwarding
Enable cache for faster response of repeated queries
Clear cache
Use custom forwarding
10 Specific settings of DNS forwarding
11 DNS forwarding a new rule
Simple DNS resolution
Combine the name ... with DNS domain
Before forwarding a query
Dhcp server
Dhcp Server Configuration
Dhcp server
Definition of Scopes and Reservations
DNS server
Lease time
Wins server
Domain
15 Dhcp server IP scopes definition
Description
Subnet mask
First address, Last address
Exclusions
Parameters
00bca5f21e50
Lease Reservations
Leases
Bc-a5-f2-1e-50
20 Dhcp server list of leased and reserved IP addresses
Windows RAS
Dhcp server advanced options
Declined options
Proxy server
Proxy server
Enable non-transparent proxy server
Proxy Server Configuration
22 Http proxy server settings
Enable connection to any TCP port
Http//192.168.1.13128/pac/proxy.pac
Forward to parent proxy server
Enable cache on proxy server
Enable cache on transparent proxy
Http cache
Http protocol TTL
Cache size
Http cache
Max Http object size
Memory cache size
Cache Options
URL
URL Specific Settings
TTL
Cache status and administration
26 Http cache administration dialog
Network Rules Wizard
Traffic Policy
Information
Network Rules Wizard
Selection of Internet connection type
Network Policy Wizard selection of a connected adapter
Network adapter or dial-up selection
Allow access to all services
Internet access limitations
Enabling Kerio VPN traffic
Allow access to the following services only
Service
Service is running on
Generating the rules
NAT
Icmp traffic
Rules Created by the Wizard
Local Traffic
Firewall Traffic
Definition of Custom Traffic Rules
How traffic rules work
Name
12 Traffic rule name, color and rule description
Source, Destination
IP range e.g
Definition of Custom Traffic Rules
100
Service
101
Action
102
Log
103
Translation
20 Traffic rule destination address translation
104
Protocol inspector
Valid on
105
IP Translation NAT
Basic Traffic Rule Types
Source
Destination
Placing the rule
Translation
Port mapping
107
108
Multihoming
Limiting Internet Access
109
110
111
Exclusions
112
Speed limits for big data volumes transmissions
How the bandwidth limiter works and how to use it
Bandwidth Limiter
Speed limits for users with their quota exceeded
Bandwidth Limiter configuration
Setting limit values
Bandwidth Limiter
114
Advanced Options
Services
115
116
IP Addresses and Time Interval
117
Bandwidth Limiter selection of network services
118
Detection of connections with large data volume transferred
Examples
Detection of connections with large data volume transferred
119
120
Firewall User Authentication
User Authentication
121
User authentication advanced options
User Authentication
122
Redirection to the authentication
Firewall User Authentication
Enable non-transparent proxy server authentication
Automatic authentication Ntlm
124
Automatically logout users when they are inactive
Enable Web Interface Http
Enable Kerio SSL-VPN server
Web Interface
Web Interface Parameters Configuration
Allow access only from these IP addresses
Enable secured Web Interface Https
Web Interface
WinRoute server name
127
Configuration of ports of the Web Interface
Generate or Import Certificate
SSL Certificate for the Web Interface
128
SSL certificate of WinRoute’s Web interface
129
Web Interface Language Preferences
Login/logout
Users logged
130
Drdolittle@usoffice.company.com
Login/logout
131
Log out
User password authentication
132
Status information and user statistics
Status information and user statistics
133
134
User preferences
User preferences
Save settings
135
136
10 Editing user password
FTP protocol
Http protocol
137
URL Rules
Conditions for Http and FTP filtering
138
139
URL Rules
140
URL Rules Definition
URL matches criteria
If user accessing the URL is
141
142
Allow access to the Web site
Valid for IP address group
Valid at time interval
Valid if Mime type is
Denial options
Scan content for viruses according to scanning rules
WWW content scanning options
Deny Web pages containing
144
145
Http Inspection Advanced Options
Allow Html ActiveX objects
Global rules for Web elements
Allow Script Html tags
146
Allow Html JavaScript pop-up windows
Content Rating System ISS OrangeWeb Filter
Allow applet Html tags
Allow cross-domain referrer
148
ISS OrangeWeb Filter configuration
Categorize each page regardless of Http rules
Enable ISS OrangeWeb Filter
Server
ISS OrangeWeb Filter Deployment
ISS OrangeWeb Filter rule
150
151
Web content filtering by word occurrence
152
Definition of rules filtering by word occurrence
153
Word groups
154
Definition of forbidden words
FTP Policy
Weight
Group
Keyword
FTP Rules Definition
If user accessing the FTP server is
FTP server is
156
15 FTP Rule basic parameters
158
Content
159
Conditions and limitations of antivirus scan
Antivirus control
160
161
Conditions and limitations of antivirus scan
Antivirus control
How to choose and setup antiviruses
Integrated McAfee
162
Last update check performed ... ago
Check for update every ... hours
Update now
Current virus database is
External antivirus
Antivirus settings
164
An example of a traffic rule for outgoing Smtp traffic check
165
Http and FTP scanning
167
Http and FTP scanning
Condition
Http and FTP scanning rules
168
169
Mime type
170
Email scanning
171
Email scanning
172
Creating and Editing IP Address Groups
IP Address Groups
173
Definitions
Time Intervals
Name
Type
Absolute
Time range types
Weekly
Daily
From, To
Time Interval Type
Valid at days
176
Services
Services
177
Protocol inspector
Protocol
178
Protocol Inspectors
Source Port and Destination Port
179
180
URL Groups
181
URL Groups
182
Definitions Group
Internal user database
User Accounts and Groups
Import of user accounts from Active Directory
183
User Accounts and Groups
Viewing and definitions of user accounts
184
Local user accounts
Accounts mapped from the Active Directory domain
Local user accounts
Edit User
186
Creating a local user account
Local user accounts
Basic information
Full Name
Account is disabled
Authentication
Email Address
Domain template
Groups
NT domain / Kerberos
189
190
Access rights
Read only access to administration
No access to administration
Full access to administration
User can override WWW content rules
Transfer quota
Data transmission quota
192
Quota exceed action
Content rules
193
194
User’s IP addresses
195
Editing User Account
NT domain
Active Directory
196
197
Automatic import of user accounts from Active Directory
198
Manual import of user accounts
Active Directory domains mapping
Active Directory domains mapping
Domain mapping requirements
199
Single domain mapping
Domain Access
Active Directory mapping
200
13 Active Directory domain mapping
201
Multiple domains mapping
NT authentication support
202
16 Conversion of user accounts
203
User groups Definitions
User groups
204
Creating a new local user group
User groups
Name and description of the group
205
Read only access
Group access rights
Group members
206
Users can connect using VPN
Users can override WWW content rules
207
Users are allowed to view statistics
Users are allowed to use P2P networks
208
Setting Remote Administration
Remote Administration and Update Checks
How to allow remote administration from the Internet
209
Remote Administration and Update Checks
Update Checking
210
Check for new versions
Update Checking
Check also for beta versions
Check now
212
15.1 P2P Eliminator
Advanced security features
P2P Eliminator Configuration
213
214
Advanced security features
Parameters for detection of P2P networks
15.1 P2P Eliminator
215
216
Special Security Settings
Anti-Spoofing
Special Security Settings
Connections Count Limit
217
Enable
VPN using IPSec Protocol
Enable pass-through only for hosts
IPSec preferences
WinRoute’s IPSec configuration
VPN using IPSec Protocol
IPSec client in local network
219
Traffic rule for one IPSec client in the local network
220
221
IPSec server in local network
Routing table
Other settings
Route Types
Routing table
Static routes
223
Network, Network Mask
Definitions of Dynamic and Static Rules
Gateway
Metric
Demand Dial
Demand Dial
Removing routes from the Routing Table
How demand dial works
226
227
Technical Peculiarities and Limitations
228
Setting Rules for Demand Dial
229
Dial of local DNS names
Port mapping timeout
Enable UPnP
Universal Plug-and-Play UPnP
Configuration of the UPnP support
Relay Smtp server
Relay Smtp server
Log packets
Log connections
Specify sender email address in From header
Smtp requires authentication
Test
232
233
Active hosts and connected users
Status Information
234
Login duration
Login time
Hostname
User
Active Hosts dialog options
Detailed information on a selected host and user
238
Traffic information
Connections
Activity Description
239
240
Source, Destination
241
Histogram
242
Show connections related to the selected process
243
Show connections related to the selected process
Kill connection
Options of the Connections Dialog
244
Font Color
Color Settings
Background Color
245
Alerts
Alerts Settings
246
Alert
Alerts
247
248
Alert Templates
Alerts overview in Administration Console
\Program Files\Kerio\WinRoute Firewall\templates by default
249
13 Details of a selected event
250
Interface statistics
Basic statistics
251
Basic statistics
Reset interface statistics
Interface Statistics menu
252
Remove interface statistics
Interface statistics
Graphical view of interface load
253
254
User Statistics data volumes and quotas
User Statistics dialog options
User Statistics data volumes and quotas
255
Remove user statistics
Reset user statistics
View host
256
Monitoring and storage of statistic data
Kerio StaR statistics and reporting
257
Kerio StaR statistics and reporting
Settings for statistics and quota
Requirements of the statistics
258
Enable/disable gathering of statistic data
Settings for statistics and quota
Advanced settings for statistics
259
260
Statistics and quota restrictions
Remote access to the statistics
Accessing the statistics from the WinRoute host
Connection to StaR and viewing statistics
Statistics and quota accounting periods
262
StaR page in the web interface
263
Accounting period
Custom accounting period
264
Overall View
Overall View
265
Top 5 users
Top Requested Web Categories
266
267
Used Protocol
268
User statistics
User statistics
269
13 The Users by Traffic table
Users by Traffic
Top Visited Websites
Top Visited Websites
272
Top Requested Web Categories
16 Top visited websites sorted by categories
273
274
Logs
Log settings
Filename.log
275
276
File Logging
Syslog Logging
Log settings
277
Logs Context Menu
Find
Logs Context Menu
Highlighting
Select font
Log debug
Logs Encoding
Clear log
Log highlighting
Log highlighting settings
282
Debug log advanced settings
Alert Log
Alert Log
Logs
20.4 Config Log
284
Connection Log
Connection Log
285
Dial Log
Debug Log
286
Page
288
15/Mar/2004 155912 Line Connection disconnected
Error Log
Error Log
289
Filter Log
’McAfee update’ rule name
290
Http log
Http log
291
292
1058444114.733 0 192.168.64.64 TCPMISS/304
Security Log
Security Log
293
294
Authentication service Client IP address reason
Sslvpn Log
Sslvpn Log
17/Dec/2004 121133 Engine Startup
17/Dec/2004 122243 Engine Shutdown
24/Apr/2003 102951 192.168.44.128 james
Web Log
Web Log 297
298
Kerio VPN
299
VPN Server Configuration
Kerio VPN
Enable VPN server
General
IP address assignment
301
SSL certificate
Listen on port
Advanced
302
303
Custom Routes
Basic configuration of traffic rules for VPN clients
21.2 Configuration of VPN clients
304
Definition of a tunnel to a remote server
Setting up VPN servers
Name of the tunnel
305
306
Configuration
307
Configuration of a remote end of the tunnel
Routing settings
DNS Settings
308
309
Connection establishment
310
Traffic Policy Settings for VPN
Exchange of routing information
Exchange of routing information
Routing configuration options
311
Routes provided automatically
Update of routing tables
312
Specification
Example of Kerio VPN configuration company with a filial office
313
314
Common method
315
316
Headquarters configuration
317
14 Headquarter creating default traffic rules for Kerio VPN
16 Headquarter DNS forwarder configuration
318
319
19 Headquarters VPN server configuration
320
321
LAN
322
Configuration of a filial office
323
24 Filial office default traffic rules for Kerio VPN
25 Filial office DNS forwarder configuration
324
325
28 Filial office VPN server configuration
326
29 Filial office definition of VPN tunnel for the headquarters
327
VPN test
Example of a more complex Kerio VPN configuration
328
329
Common method
330
331
332
33 Headquarter creating default traffic rules for Kerio VPN
35 Headquarter DNS forwarder configuration
333
Kerio VPN
38 Headquarters VPN server configuration
335
39 Headquarter definition of VPN tunnel for the London filial
336
337
338
43 Headquarter final traffic rules
339
340
Configuration of the London filial
341
46 The London filial office default traffic rules for Kerio VPN
342
48 The London filial office DNS forwarding settings
343
344
345
54 The London filial office final traffic rules
346
347
Configuration of the Paris filial
57 The Paris filial office DNS forwarder configuration
348
59 The Paris filial office VPN server configuration
349
350
351
352
64 The Paris filial office final traffic rules
353
354
22.1 Configuration of WinRoute’s SSL-VPN
Kerio Clientless SSL-VPN
SSL-VPN configuration
355
Kerio Clientless SSL-VPN
Allowing access from the Internet
356
Usage of the SSL-VPN interface
Usage of the SSL-VPN interface
Https//server
Https//server12345
Handling files and folders
Sidneywashington@usoffice.company.com
358
Antivirus control
\\server\folder\subfolder
Bookmarks
359
Detection of incorrect configuration of the default gateway
Troubleshooting
360
23.2 Configuration Backup and Transfer
License
Sslcert
Cache.CFS
Dnscache.cfg
Star
Handling configuration files Configuration backup recovery
363
List name=Interfaces
General conditions
Automatic user authentication using Ntlm
365
366
WinRoute Configuration
Ntlm authentication process
Automatic user authentication using Ntlm
Web browsers
Microsoft Internet Explorer
Firefox/Netscape/Mozilla/SeaMonkey configuration
Firefox/Netscape/Mozilla/SeaMonkey
368
Partial Retirement of Protocol Inspector
Partial Retirement of Protocol Inspector
369
User accounts and groups in traffic rules
How to enable certain users to access the Internet
370
371
Enabling automatic authentication
Example of a client configuration web browser
FTP on WinRoute’s proxy server
372
FTP on WinRoute’s proxy server
Example of a client configuration Total Commander
373
374
12 Setting proxy server for FTP in Total Commander
Basic Information and System Requirements
Network Load Balancing
Network Configuration
375
376
Network Load Balancing
NLB configuration for Server1
24.3 Configuration of the servers in the cluster
377
Server 1 cluster parameters
378
379
NLB configuration for Server2
Essential Information
Technical support
Description
380
Tested in Beta version
Error Log Files
Informational File
License type and license number
United Kingdom
Contacts
Czech Republic
Legal Presumption
Libiconv
Used open-source libraries
OpenSSL
384
Copyright 2005 Sam Stephenson
Prototype
Zlib
385
Glossary of terms
Default gateway
ActiveX
Cluster
Greylisting
Firewall
387
IPSec
Glossary of terms IP address
Kerberos
388
P2P network
Network adapter
Packet
Port
Proxy server
Glossary of terms
Routing table
Script
391
Spoofing
392
TCP/IP
393
Index
394
Index
395
Ntlm
396
VPN
397
133
Top
Page
Image
Contents