Manuals
/
Kerio Tech
/
Computer Equipment
/
Network Router
Kerio Tech
Firewall6
manual
136, Editing user password
Models:
Firewall6
1
136
398
398
Download
398 pages
11.9 Kb
133
134
135
136
137
138
139
140
Troubleshooting
Install
Password
Error Log
Login
Administrator’s Guide
Reset interface statistics
Remote Access
Connection Failover Setup
Port mapping timeout
Page 136
Image 136
Chapter 9
Web Interface
Figure 9.10 Editing user password
136
Page 135
Page 137
Page 136
Image 136
Page 135
Page 137
Contents
Administrator’s Guide
Kerio Technologies
Page
Contents
113
Remote Administration and Update Checks 209
Kerio Clientless SSL-VPN 355
393
Quick Checklist
Page
Introduction
Basic Features
Kerio WinRoute Firewall
Additional Features
Kerio WinRoute Firewall
Antivirus control
Transparent support for Active Directory
Email alerts
User quotas
Conflicting software
Clientless SSL-VPN
Collision of low-level drivers
Port collision
Antivirus applications
Installation
Installation
Steps to be taken before the installation
System requirements
Installation and Basic Configuration Guide
Custom installation selecting optional components
Protection of the installed product
Conflicting Applications and System Services
WinRoute Firewall Engine
WinRoute Components
WinRoute Engine Monitor
WinRoute Engine Monitor
Kerio Administration Console
WinRoute Engine Monitor
Upgrade and Uninstallation
Uninstallation
Upgrade and Uninstallation
Typically the path C\Program Files\Kerio\WinRoute Firewall
Upgrade from WinRoute Pro
Update Checker
Setting of administration username and password
Configuration Wizard
Enable remote access
Remote Access
Remote IP address
Initial configuration Allowing remote administration
WinRoute Administration
Administration Window
WinRoute Administration
Administration Window Main menu
File
Help menu
Status bar
Administration Window
Detection of WinRoute Firewall Engine connection drop-out
View Settings
Column customization in Interfaces
View Settings
License types and number of users
Product Registration and Licensing
License types optional components
License types and number of users
Deciding on a number of users licenses
License information
Product
Copyright
Homepage
License ID
Subscription expiration date
Product expiration date
Number of users
Registration of the product in the Administration Console
Registration of the trial version
Registration of the product in the Administration Console
Trial version registration security code
Trial version registration other information
Registration of the purchased product
Trial version registration Trial ID
Product Registration and Licensing
Registration of the product in the Administration Console
10 Product registration user information
Update of registration information
12 Product registration summary
Subscription / Update Expiration
Product registration at the website
Subscription / Update Expiration
Bubble alerts
User counter
15 The notice that the subscription has already expired
Start WinRoute
User counter
License counter
License release
Settings for Interfaces and Network Services
Network interfaces
Interface
IP Address and Mask
Dial or Hang Up /Enebale, Disable
Adapter info
Add
Modify
Refresh
Special interfaces
Dial-In
VPN server
Bind this interface
Interface type selection
Use login data from the RAS entry
Use the following login data
Interface name
RAS Entry
Connection
Dial-up demand dial
Hangup if idle
Advanced
Connection Failover
Edit Interface parameters
Connection Failover Setup
Enable automatic connection failover
Connection Failover
Current connection
Configuration of primary and secondary Internet connection
Secondary connection
Primary connection
Dial-up Use
DNS Forwarder
DNS Forwarder configuration
DNS Forwarder
Enable DNS forwarding
DNS forwarding
Enable cache for faster response of repeated queries
Enable DNS forwarding
Clear cache
Use custom forwarding
10 Specific settings of DNS forwarding
Simple DNS resolution
11 DNS forwarding a new rule
Before forwarding a query
Combine the name ... with DNS domain
Dhcp server
Dhcp Server Configuration
Dhcp server
Definition of Scopes and Reservations
Lease time
DNS server
Wins server
Domain
Description
15 Dhcp server IP scopes definition
Subnet mask
First address, Last address
Exclusions
Parameters
Lease Reservations
00bca5f21e50
Bc-a5-f2-1e-50
Leases
20 Dhcp server list of leased and reserved IP addresses
Dhcp server advanced options
Windows RAS
Proxy server
Declined options
Proxy server
Enable non-transparent proxy server
Proxy Server Configuration
Enable connection to any TCP port
22 Http proxy server settings
Forward to parent proxy server
Http//192.168.1.13128/pac/proxy.pac
Enable cache on transparent proxy
Enable cache on proxy server
Http cache
Http protocol TTL
Http cache
Cache size
Max Http object size
Memory cache size
Cache Options
URL Specific Settings
URL
Cache status and administration
TTL
26 Http cache administration dialog
Traffic Policy
Network Rules Wizard
Information
Network Rules Wizard
Selection of Internet connection type
Network adapter or dial-up selection
Network Policy Wizard selection of a connected adapter
Internet access limitations
Allow access to all services
Allow access to the following services only
Enabling Kerio VPN traffic
Service is running on
Service
NAT
Generating the rules
Rules Created by the Wizard
Icmp traffic
Local Traffic
Firewall Traffic
Definition of Custom Traffic Rules
How traffic rules work
Name
Source, Destination
12 Traffic rule name, color and rule description
IP range e.g
Definition of Custom Traffic Rules
Service
100
Action
101
Log
102
Translation
103
104
20 Traffic rule destination address translation
Protocol inspector
Valid on
105
Basic Traffic Rule Types
IP Translation NAT
Source
Destination
Translation
Placing the rule
Port mapping
107
108
Multihoming
Limiting Internet Access
109
110
Exclusions
111
112
How the bandwidth limiter works and how to use it
Speed limits for big data volumes transmissions
Bandwidth Limiter
Speed limits for users with their quota exceeded
Setting limit values
Bandwidth Limiter configuration
Bandwidth Limiter
114
Advanced Options
Services
115
IP Addresses and Time Interval
116
Bandwidth Limiter selection of network services
117
Detection of connections with large data volume transferred
118
Examples
Detection of connections with large data volume transferred
119
120
Firewall User Authentication
User Authentication
121
User authentication advanced options
User Authentication
122
Firewall User Authentication
Redirection to the authentication
Enable non-transparent proxy server authentication
Automatic authentication Ntlm
Automatically logout users when they are inactive
124
Enable Kerio SSL-VPN server
Enable Web Interface Http
Web Interface
Web Interface Parameters Configuration
Enable secured Web Interface Https
Allow access only from these IP addresses
Web Interface
WinRoute server name
Configuration of ports of the Web Interface
127
Generate or Import Certificate
SSL Certificate for the Web Interface
128
129
SSL certificate of WinRoute’s Web interface
Login/logout
Web Interface Language Preferences
Users logged
130
Drdolittle@usoffice.company.com
Login/logout
131
Log out
User password authentication
132
Status information and user statistics
Status information and user statistics
133
User preferences
134
User preferences
Save settings
135
10 Editing user password
136
FTP protocol
Http protocol
137
URL Rules
Conditions for Http and FTP filtering
138
URL Rules
139
URL Rules Definition
140
URL matches criteria
If user accessing the URL is
141
Allow access to the Web site
142
Valid at time interval
Valid for IP address group
Valid if Mime type is
Denial options
WWW content scanning options
Scan content for viruses according to scanning rules
Deny Web pages containing
144
Http Inspection Advanced Options
145
Global rules for Web elements
Allow Html ActiveX objects
Allow Script Html tags
146
Content Rating System ISS OrangeWeb Filter
Allow Html JavaScript pop-up windows
Allow applet Html tags
Allow cross-domain referrer
ISS OrangeWeb Filter configuration
148
Enable ISS OrangeWeb Filter
Categorize each page regardless of Http rules
Server
ISS OrangeWeb Filter Deployment
150
ISS OrangeWeb Filter rule
Web content filtering by word occurrence
151
Definition of rules filtering by word occurrence
152
Word groups
153
Definition of forbidden words
154
Weight
FTP Policy
Group
Keyword
If user accessing the FTP server is
FTP Rules Definition
FTP server is
156
15 FTP Rule basic parameters
Content
158
159
Conditions and limitations of antivirus scan
Antivirus control
160
Conditions and limitations of antivirus scan
161
How to choose and setup antiviruses
Antivirus control
Integrated McAfee
162
Check for update every ... hours
Last update check performed ... ago
Update now
Current virus database is
External antivirus
Antivirus settings
164
165
An example of a traffic rule for outgoing Smtp traffic check
Http and FTP scanning
Http and FTP scanning
167
Condition
Http and FTP scanning rules
168
Mime type
169
Email scanning
170
Email scanning
171
172
Creating and Editing IP Address Groups
IP Address Groups
173
Time Intervals
Definitions
Name
Type
Time range types
Absolute
Weekly
Daily
Time Interval Type
From, To
Valid at days
176
Services
Services
177
Protocol inspector
Protocol
178
Protocol Inspectors
Source Port and Destination Port
179
URL Groups
180
URL Groups
181
Definitions Group
182
User Accounts and Groups
Internal user database
Import of user accounts from Active Directory
183
User Accounts and Groups
Viewing and definitions of user accounts
184
Local user accounts
Local user accounts
Accounts mapped from the Active Directory domain
Edit User
186
Local user accounts
Creating a local user account
Basic information
Full Name
Authentication
Account is disabled
Email Address
Domain template
Groups
NT domain / Kerberos
189
Access rights
190
No access to administration
Read only access to administration
Full access to administration
User can override WWW content rules
Transfer quota
Data transmission quota
192
Quota exceed action
Content rules
193
User’s IP addresses
194
Editing User Account
195
NT domain
Active Directory
196
Automatic import of user accounts from Active Directory
197
Manual import of user accounts
198
Active Directory domains mapping
Active Directory domains mapping
Domain mapping requirements
199
Domain Access
Single domain mapping
Active Directory mapping
200
201
13 Active Directory domain mapping
Multiple domains mapping
NT authentication support
202
203
16 Conversion of user accounts
User groups Definitions
User groups
204
User groups
Creating a new local user group
Name and description of the group
205
Group access rights
Read only access
Group members
206
Users can connect using VPN
Users can override WWW content rules
207
Users are allowed to view statistics
Users are allowed to use P2P networks
208
Remote Administration and Update Checks
Setting Remote Administration
How to allow remote administration from the Internet
209
Remote Administration and Update Checks
Update Checking
210
Update Checking
Check for new versions
Check also for beta versions
Check now
212
Advanced security features
15.1 P2P Eliminator
P2P Eliminator Configuration
213
Advanced security features
214
Parameters for detection of P2P networks
15.1 P2P Eliminator
215
Special Security Settings
216
Special Security Settings
Anti-Spoofing
Connections Count Limit
217
VPN using IPSec Protocol
Enable
Enable pass-through only for hosts
IPSec preferences
VPN using IPSec Protocol
WinRoute’s IPSec configuration
IPSec client in local network
219
220
Traffic rule for one IPSec client in the local network
IPSec server in local network
221
Other settings
Routing table
Routing table
Route Types
Static routes
223
Definitions of Dynamic and Static Rules
Network, Network Mask
Gateway
Metric
Demand Dial
Demand Dial
Removing routes from the Routing Table
How demand dial works
226
Technical Peculiarities and Limitations
227
Setting Rules for Demand Dial
228
Dial of local DNS names
229
Enable UPnP
Port mapping timeout
Universal Plug-and-Play UPnP
Configuration of the UPnP support
Relay Smtp server
Relay Smtp server
Log packets
Log connections
Smtp requires authentication
Specify sender email address in From header
Test
232
233
Active hosts and connected users
Status Information
234
Login time
Login duration
Hostname
User
Active Hosts dialog options
Detailed information on a selected host and user
Traffic information
238
Connections
Activity Description
239
Source, Destination
240
Histogram
241
Show connections related to the selected process
242
Show connections related to the selected process
243
Kill connection
Options of the Connections Dialog
244
Color Settings
Font Color
Background Color
245
Alerts
Alerts Settings
246
Alert
Alerts
247
Alert Templates
248
Alerts overview in Administration Console
\Program Files\Kerio\WinRoute Firewall\templates by default
249
250
13 Details of a selected event
Interface statistics
Basic statistics
251
Reset interface statistics
Basic statistics
Interface Statistics menu
252
Interface statistics
Remove interface statistics
Graphical view of interface load
253
User Statistics data volumes and quotas
254
User Statistics dialog options
User Statistics data volumes and quotas
255
Reset user statistics
Remove user statistics
View host
256
Monitoring and storage of statistic data
Kerio StaR statistics and reporting
257
Settings for statistics and quota
Kerio StaR statistics and reporting
Requirements of the statistics
258
Settings for statistics and quota
Enable/disable gathering of statistic data
Advanced settings for statistics
259
Statistics and quota restrictions
260
Accessing the statistics from the WinRoute host
Remote access to the statistics
Connection to StaR and viewing statistics
Statistics and quota accounting periods
StaR page in the web interface
262
Accounting period
263
264
Custom accounting period
Overall View
Overall View
265
Top 5 users
Top Requested Web Categories
266
Used Protocol
267
268
User statistics
User statistics
269
Users by Traffic
13 The Users by Traffic table
Top Visited Websites
Top Visited Websites
Top Requested Web Categories
272
273
16 Top visited websites sorted by categories
274
Log settings
Logs
Filename.log
275
File Logging
276
Syslog Logging
Log settings
277
Logs Context Menu
Logs Context Menu
Find
Highlighting
Select font
Logs Encoding
Log debug
Clear log
Log highlighting
Log highlighting settings
Debug log advanced settings
282
Alert Log
Alert Log
Logs
20.4 Config Log
284
Connection Log
Connection Log
285
Dial Log
Debug Log
286
Page
15/Mar/2004 155912 Line Connection disconnected
288
Error Log
Error Log
289
Filter Log
’McAfee update’ rule name
290
Http log
Http log
291
1058444114.733 0 192.168.64.64 TCPMISS/304
292
Security Log
Security Log
293
Authentication service Client IP address reason
294
Sslvpn Log
Sslvpn Log
17/Dec/2004 121133 Engine Startup
17/Dec/2004 122243 Engine Shutdown
Web Log
24/Apr/2003 102951 192.168.44.128 james
Web Log 297
Kerio VPN
298
VPN Server Configuration
299
Enable VPN server
Kerio VPN
General
IP address assignment
SSL certificate
301
Listen on port
Advanced
302
Custom Routes
303
Basic configuration of traffic rules for VPN clients
21.2 Configuration of VPN clients
304
Setting up VPN servers
Definition of a tunnel to a remote server
Name of the tunnel
305
Configuration
306
Configuration of a remote end of the tunnel
307
Routing settings
DNS Settings
308
Connection establishment
309
Traffic Policy Settings for VPN
310
Exchange of routing information
Exchange of routing information
Routing configuration options
311
Routes provided automatically
Update of routing tables
312
Specification
Example of Kerio VPN configuration company with a filial office
313
Common method
314
315
Headquarters configuration
316
14 Headquarter creating default traffic rules for Kerio VPN
317
318
16 Headquarter DNS forwarder configuration
319
320
19 Headquarters VPN server configuration
LAN
321
Configuration of a filial office
322
24 Filial office default traffic rules for Kerio VPN
323
324
25 Filial office DNS forwarder configuration
325
326
28 Filial office VPN server configuration
327
29 Filial office definition of VPN tunnel for the headquarters
VPN test
Example of a more complex Kerio VPN configuration
328
Common method
329
330
331
33 Headquarter creating default traffic rules for Kerio VPN
332
333
35 Headquarter DNS forwarder configuration
Kerio VPN
335
38 Headquarters VPN server configuration
336
39 Headquarter definition of VPN tunnel for the London filial
337
338
339
43 Headquarter final traffic rules
Configuration of the London filial
340
46 The London filial office default traffic rules for Kerio VPN
341
48 The London filial office DNS forwarding settings
342
343
344
345
346
54 The London filial office final traffic rules
Configuration of the Paris filial
347
348
57 The Paris filial office DNS forwarder configuration
349
59 The Paris filial office VPN server configuration
350
351
352
353
64 The Paris filial office final traffic rules
354
Kerio Clientless SSL-VPN
22.1 Configuration of WinRoute’s SSL-VPN
SSL-VPN configuration
355
Kerio Clientless SSL-VPN
Allowing access from the Internet
356
Usage of the SSL-VPN interface
Usage of the SSL-VPN interface
Https//server
Https//server12345
Handling files and folders
Sidneywashington@usoffice.company.com
358
\\server\folder\subfolder
Antivirus control
Bookmarks
359
Detection of incorrect configuration of the default gateway
Troubleshooting
360
23.2 Configuration Backup and Transfer
Sslcert
License
Cache.CFS
Dnscache.cfg
Star
Handling configuration files Configuration backup recovery
363
List name=Interfaces
General conditions
Automatic user authentication using Ntlm
365
WinRoute Configuration
366
Automatic user authentication using Ntlm
Ntlm authentication process
Web browsers
Microsoft Internet Explorer
Firefox/Netscape/Mozilla/SeaMonkey configuration
Firefox/Netscape/Mozilla/SeaMonkey
368
Partial Retirement of Protocol Inspector
Partial Retirement of Protocol Inspector
369
User accounts and groups in traffic rules
How to enable certain users to access the Internet
370
Enabling automatic authentication
371
Example of a client configuration web browser
FTP on WinRoute’s proxy server
372
FTP on WinRoute’s proxy server
Example of a client configuration Total Commander
373
12 Setting proxy server for FTP in Total Commander
374
Network Load Balancing
Basic Information and System Requirements
Network Configuration
375
Network Load Balancing
376
NLB configuration for Server1
24.3 Configuration of the servers in the cluster
377
378
Server 1 cluster parameters
NLB configuration for Server2
379
Technical support
Essential Information
Description
380
Error Log Files
Tested in Beta version
Informational File
License type and license number
United Kingdom
Contacts
Czech Republic
Legal Presumption
Used open-source libraries
Libiconv
OpenSSL
384
Prototype
Copyright 2005 Sam Stephenson
Zlib
385
Default gateway
Glossary of terms
ActiveX
Cluster
Greylisting
Firewall
387
Glossary of terms IP address
IPSec
Kerberos
388
Network adapter
P2P network
Packet
Port
Glossary of terms
Proxy server
Routing table
Script
Spoofing
391
TCP/IP
392
Index
393
Index
394
Ntlm
395
VPN
396
133
397
Top
Page
Image
Contents