Manuals
/
Brands
/
Computer Equipment
/
Network Router
/
Kerio Tech
/
Computer Equipment
/
Network Router
Kerio Tech
Firewall6 manual
1
1
398
398
Download
398 pages, 3.33 Mb
Administrator’s Guide
Kerio Technologies
Contents
Main
Page
Contents
Page
Page
Page
Page
Chapter 1
Quick Checklist
Page
Chapter 2
Introduction
2.1 Kerio WinRoute Firewall
Page
Page
2.2 Conicting software
Page
2.3 Installation
Page
Page
Page
Page
2.4 WinRoute Components
2.5 WinRoute Engine Monitor
2.6 Upgrade and Uninstallation
Page
2.7 Conguration Wizard
Page
Page
Chapter 3
WinRoute Administration
3.1 Administration Window
Page
Page
3.2 View Settings
Page
Chapter 4
Product Registration and Licensing
4.1 License types and number of users
Page
4.2 License information
Page
4.3 Registration of the product in the Administration Console
Page
Page
Page
Page
Page
Page
Page
4.4 Product registration at the website
4.5 Subscription / Update Expiration
Page
4.6 User counter
Page
Page
Chapter 5
Settings for Interfaces and Network Services
5.1 Network interfaces
Page
Page
Page
Page
Page
Page
5.2 Connection Failover
Page
Page
Page
5.3 DNS Forwarder
Page
Page
Page
Page
Page
5.4 DHCP server
Page
Page
Page
Page
Page
Page
Page
Page
Page
5.5 Proxy server
Page
Page
Page
5.6 HTTP cache
Page
Page
Page
Page
Page
Chapter 6
Trac Policy
6.1 Network Rules Wizard
Page
Page
Page
Page
Page
Page
Page
Page
Page
6.2 How trac rules work
6.3 Denition of Custom Trac Rules
Page
Page
Page
Page
Page
Page
Page
Page
Page
6.4 Basic Trac Rule Types
Page
Page
Page
Page
Page
Page
Chapter 7
Bandwidth Limiter
7.1 How the bandwidth limiter works and how to use it
7.2 Bandwidth Limiter conguration
Page
Page
Page
7.3 Detection of connections with large data volume transferred
Page
Page
Chapter 8
User Authentication
8.1 Firewall User Authentication
Page
Page
Page
Chapter 9
Web Interface
9.1 Web Interface Parameters Conguration
Page
Page
Page
Page
9.2 Login/logout page
Page
Page
9.3 Status information and user statistics
9.4 User preferences
Page
Page
Chapter 10
HTTP and FTP ltering
10.1 Conditions for HTTP and FTP ltering
10.2 URL Rules
Page
Page
Page
Page
Page
Page
Page
10.3 Global rules for Web elements
10.4 Content Rating System (ISS OrangeWeb Filter)
Page
Page
Page
10.5 Web content ltering by word occurrence
Page
Page
Page
10.6 FTP Policy
Page
Page
Page
Page
Chapter 11
Antivirus control
11.1 Conditions and limitations of antivirus scan
Page
11.2 How to choose and setup antiviruses
Page
Page
Page
11.3 HTTP and FTP scanning
Page
Page
Page
11.4 Email scanning
Page
Page
Chapter 12
Denitions
12.1 IP Address Groups
12.2 Time Intervals
Page
Page
12.3 Services
Page
Page
12.4 URL Groups
Page
Page
Chapter 13
User Accounts and Groups
13.1 Viewing and denitions of user accounts
Page
13.2 Local user accounts
Page
Page
Page
Page
Page
Page
Page
Page
13.3 Local user database: external authentication and import of ac- counts
Page
Page
Page
13.4 Active Directory domains mapping
Page
Page
Page
Page
13.5 User groups
Page
Page
Page
Page
Chapter 14
Remote Administration and Update Checks
14.1 Setting Remote Administration
14.2 Update Checking
Page
Page
Chapter 15
Advanced security features
15.1 P2P Eliminator
Page
Page
15.2 Special Security Settings
Page
15.3 VPN using IPSec Protocol
Page
Page
Page
Chapter 16
Other settings
16.1 Routing table
Page
Page
16.2 Demand Dial
Page
Page
Page
Page
16.3 Universal Plug-and-Play (UPnP)
16.4 Relay SMTP server
Page
Page
Chapter 17
Status Information
17.1 Active hosts and connected users
Page
Page
Page
Page
Page
Page
Page
17.2 Show connections related to the selected process
Page
Page
Page
17.3 Alerts
Page
Page
Page
Page
Chapter 18
Basic statistics
18.1 Interface statistics
Page
Page
18.2 User Statistics data volumes and quotas
Page
Page
Chapter 19
Kerio StaR statistics and reporting
19.1 Monitoring and storage of statistic data
19.2 Settings for statistics and quota
Page
Page
19.3 Connection to StaR and viewing statistics
Page
19.4 Accounting period
Page
19.5 Overall View
Page
Page
Page
19.6 User statistics
19.7 Users by Trac
19.8 Top Visited Websites
19.9 Top Requested Web Categories
Page
Page
Chapter 20
Logs
20.1 Log settings
Page
Page
20.2 Logs Context Menu
Page
Page
Page
Page
20.3 Alert Log
20.4 Cong Log
20.5 Connection Log
20.6 Debug Log
20.7 Dial Log
Page
Page
20.8 Error Log
20.9 Filter Log
20.10 Http log
Page
20.11 Security Log
Page
20.12 Sslvpn Log
20.13 Warning Log
20.14 Web Log
Page
Chapter 21
Kerio VPN
21.1 VPN Server Conguration
Page
Page
Page
Page
21.2 Conguration of VPN clients
21.3 Interconnection of two private networks via the Internet (VPN tunnel)
Page
Page
Page
Page
Page
21.4 Exchange of routing information
Page
21.5 Example of Kerio VPN conguration: company with a lial oce
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
21.6 Example of a more complex Kerio VPN conguration
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Page
Chapter 22
Kerio Clientless SSL-VPN
22.1 Conguration of WinRoutes SSL-VPN
Page
22.2 Usage of the SSL-VPN interface
Page
Page
Chapter 23
Troubleshooting
23.1 Detection of incorrect conguration of the default gateway
23.2 Conguration Backup and Transfer
Page
Page
Page
23.3 Automatic user authentication using NTLM
Page
Page
Page
23.4 Partial Retirement of Protocol Inspector
23.5 User accounts and groups in trac rules
Page
23.6 FTP on WinRoutes proxy server
Page
Page
Chapter 24
Network Load Balancing
24.1 Basic Information and System Requirements
24.2 Network Conguration
Page
24.3 Conguration of the servers in the cluster
Page
Page
Chapter 25
Technical support
25.1 Essential Information
25.2 Tested in Beta version
25.3 Contacts
Appendix A
Legal Presumption
Appendix B
Used open-source libraries
Page
Glossary of terms
Page
Page
Page
Page
Page
Page
Index
A
B
C
D
F
G
H
I
K
M
N
P
Q
R
T
U
V
W