Manuals
/
Kerio Tech
/
Computer Equipment
/
Network Router
Kerio Tech
Firewall6
manual
Access rights, 190
Models:
Firewall6
1
190
398
398
Download
398 pages
11.9 Kb
187
188
189
190
191
192
193
194
Troubleshooting
Install
Password
Error Log
Login
Administrator’s Guide
Reset interface statistics
Remote Access
Connection Failover Setup
Port mapping timeout
Page 190
Image 190
Chapter 13
User Accounts and Groups
Figure 13.4 Creating a new user account — groups
Step 3 — access rights
Figure 13.5 Creating a new user account — user rights
190
Page 189
Page 191
Page 190
Image 190
Page 189
Page 191
Contents
Administrator’s Guide
Kerio Technologies
Page
Contents
113
Remote Administration and Update Checks 209
Kerio Clientless SSL-VPN 355
393
Quick Checklist
Page
Introduction
Basic Features
Kerio WinRoute Firewall
Additional Features
Kerio WinRoute Firewall
Email alerts
Antivirus control
Transparent support for Active Directory
User quotas
Collision of low-level drivers
Conflicting software
Clientless SSL-VPN
Port collision
Antivirus applications
Steps to be taken before the installation
Installation
Installation
System requirements
Installation and Basic Configuration Guide
Custom installation selecting optional components
Protection of the installed product
Conflicting Applications and System Services
WinRoute Firewall Engine
WinRoute Components
WinRoute Engine Monitor
WinRoute Engine Monitor
Kerio Administration Console
WinRoute Engine Monitor
Upgrade and Uninstallation
Uninstallation
Upgrade and Uninstallation
Typically the path C\Program Files\Kerio\WinRoute Firewall
Setting of administration username and password
Upgrade from WinRoute Pro
Update Checker
Configuration Wizard
Enable remote access
Remote Access
Remote IP address
Initial configuration Allowing remote administration
WinRoute Administration
Administration Window
File
WinRoute Administration
Administration Window Main menu
Help menu
Status bar
Administration Window
Detection of WinRoute Firewall Engine connection drop-out
View Settings
Column customization in Interfaces
View Settings
License types and number of users
Product Registration and Licensing
License types optional components
License types and number of users
Deciding on a number of users licenses
Copyright
License information
Product
Homepage
Product expiration date
License ID
Subscription expiration date
Number of users
Registration of the product in the Administration Console
Registration of the trial version
Registration of the product in the Administration Console
Trial version registration security code
Trial version registration other information
Registration of the purchased product
Trial version registration Trial ID
Product Registration and Licensing
Registration of the product in the Administration Console
10 Product registration user information
Update of registration information
12 Product registration summary
Subscription / Update Expiration
Product registration at the website
Subscription / Update Expiration
Bubble alerts
User counter
15 The notice that the subscription has already expired
Start WinRoute
User counter
License counter
License release
Interface
Settings for Interfaces and Network Services
Network interfaces
IP Address and Mask
Add
Dial or Hang Up /Enebale, Disable
Adapter info
Modify
Dial-In
Refresh
Special interfaces
VPN server
Bind this interface
Interface type selection
Interface name
Use login data from the RAS entry
Use the following login data
RAS Entry
Connection
Dial-up demand dial
Hangup if idle
Advanced
Connection Failover
Edit Interface parameters
Connection Failover
Connection Failover Setup
Enable automatic connection failover
Current connection
Configuration of primary and secondary Internet connection
Secondary connection
Primary connection
Dial-up Use
DNS Forwarder
DNS Forwarder configuration
DNS Forwarder
Enable DNS forwarding
DNS forwarding
Clear cache
Enable cache for faster response of repeated queries
Enable DNS forwarding
Use custom forwarding
10 Specific settings of DNS forwarding
Simple DNS resolution
11 DNS forwarding a new rule
Before forwarding a query
Combine the name ... with DNS domain
Dhcp server
Dhcp Server Configuration
Dhcp server
Definition of Scopes and Reservations
Wins server
Lease time
DNS server
Domain
Description
15 Dhcp server IP scopes definition
Subnet mask
First address, Last address
Exclusions
Parameters
Lease Reservations
00bca5f21e50
Bc-a5-f2-1e-50
Leases
20 Dhcp server list of leased and reserved IP addresses
Dhcp server advanced options
Windows RAS
Proxy server
Declined options
Proxy server
Enable non-transparent proxy server
Proxy Server Configuration
Enable connection to any TCP port
22 Http proxy server settings
Forward to parent proxy server
Http//192.168.1.13128/pac/proxy.pac
Http cache
Enable cache on transparent proxy
Enable cache on proxy server
Http protocol TTL
Http cache
Cache size
Max Http object size
Memory cache size
Cache Options
URL Specific Settings
URL
Cache status and administration
TTL
26 Http cache administration dialog
Traffic Policy
Network Rules Wizard
Information
Network Rules Wizard
Selection of Internet connection type
Network adapter or dial-up selection
Network Policy Wizard selection of a connected adapter
Internet access limitations
Allow access to all services
Allow access to the following services only
Enabling Kerio VPN traffic
Service is running on
Service
NAT
Generating the rules
Rules Created by the Wizard
Icmp traffic
Local Traffic
Firewall Traffic
Definition of Custom Traffic Rules
How traffic rules work
Name
Source, Destination
12 Traffic rule name, color and rule description
IP range e.g
Definition of Custom Traffic Rules
Service
100
Action
101
Log
102
Translation
103
104
20 Traffic rule destination address translation
Protocol inspector
Valid on
105
Source
Basic Traffic Rule Types
IP Translation NAT
Destination
Port mapping
Translation
Placing the rule
107
108
Multihoming
Limiting Internet Access
109
110
Exclusions
111
112
Bandwidth Limiter
How the bandwidth limiter works and how to use it
Speed limits for big data volumes transmissions
Speed limits for users with their quota exceeded
Bandwidth Limiter
Setting limit values
Bandwidth Limiter configuration
114
Advanced Options
Services
115
IP Addresses and Time Interval
116
Bandwidth Limiter selection of network services
117
Detection of connections with large data volume transferred
118
Examples
Detection of connections with large data volume transferred
119
120
Firewall User Authentication
User Authentication
121
User authentication advanced options
User Authentication
122
Enable non-transparent proxy server authentication
Firewall User Authentication
Redirection to the authentication
Automatic authentication Ntlm
Automatically logout users when they are inactive
124
Web Interface
Enable Kerio SSL-VPN server
Enable Web Interface Http
Web Interface Parameters Configuration
Web Interface
Enable secured Web Interface Https
Allow access only from these IP addresses
WinRoute server name
Configuration of ports of the Web Interface
127
Generate or Import Certificate
SSL Certificate for the Web Interface
128
129
SSL certificate of WinRoute’s Web interface
Users logged
Login/logout
Web Interface Language Preferences
130
Drdolittle@usoffice.company.com
Login/logout
131
Log out
User password authentication
132
Status information and user statistics
Status information and user statistics
133
User preferences
134
User preferences
Save settings
135
10 Editing user password
136
FTP protocol
Http protocol
137
URL Rules
Conditions for Http and FTP filtering
138
URL Rules
139
URL Rules Definition
140
URL matches criteria
If user accessing the URL is
141
Allow access to the Web site
142
Valid if Mime type is
Valid at time interval
Valid for IP address group
Denial options
Deny Web pages containing
WWW content scanning options
Scan content for viruses according to scanning rules
144
Http Inspection Advanced Options
145
Allow Script Html tags
Global rules for Web elements
Allow Html ActiveX objects
146
Allow applet Html tags
Content Rating System ISS OrangeWeb Filter
Allow Html JavaScript pop-up windows
Allow cross-domain referrer
ISS OrangeWeb Filter configuration
148
Server
Enable ISS OrangeWeb Filter
Categorize each page regardless of Http rules
ISS OrangeWeb Filter Deployment
150
ISS OrangeWeb Filter rule
Web content filtering by word occurrence
151
Definition of rules filtering by word occurrence
152
Word groups
153
Definition of forbidden words
154
Group
Weight
FTP Policy
Keyword
FTP server is
If user accessing the FTP server is
FTP Rules Definition
156
15 FTP Rule basic parameters
Content
158
159
Conditions and limitations of antivirus scan
Antivirus control
160
Conditions and limitations of antivirus scan
161
Integrated McAfee
How to choose and setup antiviruses
Antivirus control
162
Update now
Check for update every ... hours
Last update check performed ... ago
Current virus database is
External antivirus
Antivirus settings
164
165
An example of a traffic rule for outgoing Smtp traffic check
Http and FTP scanning
Http and FTP scanning
167
Condition
Http and FTP scanning rules
168
Mime type
169
Email scanning
170
Email scanning
171
172
Creating and Editing IP Address Groups
IP Address Groups
173
Name
Time Intervals
Definitions
Type
Weekly
Time range types
Absolute
Daily
Valid at days
Time Interval Type
From, To
176
Services
Services
177
Protocol inspector
Protocol
178
Protocol Inspectors
Source Port and Destination Port
179
URL Groups
180
URL Groups
181
Definitions Group
182
Import of user accounts from Active Directory
User Accounts and Groups
Internal user database
183
User Accounts and Groups
Viewing and definitions of user accounts
184
Local user accounts
Edit User
Local user accounts
Accounts mapped from the Active Directory domain
186
Basic information
Local user accounts
Creating a local user account
Full Name
Email Address
Authentication
Account is disabled
Domain template
Groups
NT domain / Kerberos
189
Access rights
190
Full access to administration
No access to administration
Read only access to administration
User can override WWW content rules
Transfer quota
Data transmission quota
192
Quota exceed action
Content rules
193
User’s IP addresses
194
Editing User Account
195
NT domain
Active Directory
196
Automatic import of user accounts from Active Directory
197
Manual import of user accounts
198
Domain mapping requirements
Active Directory domains mapping
Active Directory domains mapping
199
Active Directory mapping
Domain Access
Single domain mapping
200
201
13 Active Directory domain mapping
Multiple domains mapping
NT authentication support
202
203
16 Conversion of user accounts
User groups Definitions
User groups
204
Name and description of the group
User groups
Creating a new local user group
205
Group members
Group access rights
Read only access
206
Users can connect using VPN
Users can override WWW content rules
207
Users are allowed to view statistics
Users are allowed to use P2P networks
208
How to allow remote administration from the Internet
Remote Administration and Update Checks
Setting Remote Administration
209
Remote Administration and Update Checks
Update Checking
210
Check also for beta versions
Update Checking
Check for new versions
Check now
212
P2P Eliminator Configuration
Advanced security features
15.1 P2P Eliminator
213
Advanced security features
214
Parameters for detection of P2P networks
15.1 P2P Eliminator
215
Special Security Settings
216
Connections Count Limit
Special Security Settings
Anti-Spoofing
217
Enable pass-through only for hosts
VPN using IPSec Protocol
Enable
IPSec preferences
IPSec client in local network
VPN using IPSec Protocol
WinRoute’s IPSec configuration
219
220
Traffic rule for one IPSec client in the local network
IPSec server in local network
221
Other settings
Routing table
Static routes
Routing table
Route Types
223
Gateway
Definitions of Dynamic and Static Rules
Network, Network Mask
Metric
Removing routes from the Routing Table
Demand Dial
Demand Dial
How demand dial works
226
Technical Peculiarities and Limitations
227
Setting Rules for Demand Dial
228
Dial of local DNS names
229
Universal Plug-and-Play UPnP
Enable UPnP
Port mapping timeout
Configuration of the UPnP support
Log packets
Relay Smtp server
Relay Smtp server
Log connections
Test
Smtp requires authentication
Specify sender email address in From header
232
233
Active hosts and connected users
Status Information
234
Hostname
Login time
Login duration
User
Active Hosts dialog options
Detailed information on a selected host and user
Traffic information
238
Connections
Activity Description
239
Source, Destination
240
Histogram
241
Show connections related to the selected process
242
Show connections related to the selected process
243
Kill connection
Options of the Connections Dialog
244
Background Color
Color Settings
Font Color
245
Alerts
Alerts Settings
246
Alert
Alerts
247
Alert Templates
248
Alerts overview in Administration Console
\Program Files\Kerio\WinRoute Firewall\templates by default
249
250
13 Details of a selected event
Interface statistics
Basic statistics
251
Interface Statistics menu
Reset interface statistics
Basic statistics
252
Graphical view of interface load
Interface statistics
Remove interface statistics
253
User Statistics data volumes and quotas
254
User Statistics dialog options
User Statistics data volumes and quotas
255
View host
Reset user statistics
Remove user statistics
256
Monitoring and storage of statistic data
Kerio StaR statistics and reporting
257
Requirements of the statistics
Settings for statistics and quota
Kerio StaR statistics and reporting
258
Advanced settings for statistics
Settings for statistics and quota
Enable/disable gathering of statistic data
259
Statistics and quota restrictions
260
Connection to StaR and viewing statistics
Accessing the statistics from the WinRoute host
Remote access to the statistics
Statistics and quota accounting periods
StaR page in the web interface
262
Accounting period
263
264
Custom accounting period
Overall View
Overall View
265
Top 5 users
Top Requested Web Categories
266
Used Protocol
267
268
User statistics
User statistics
269
Users by Traffic
13 The Users by Traffic table
Top Visited Websites
Top Visited Websites
Top Requested Web Categories
272
273
16 Top visited websites sorted by categories
274
Filename.log
Log settings
Logs
275
File Logging
276
Syslog Logging
Log settings
277
Logs Context Menu
Highlighting
Logs Context Menu
Find
Select font
Clear log
Logs Encoding
Log debug
Log highlighting
Log highlighting settings
Debug log advanced settings
282
Alert Log
Alert Log
Logs
20.4 Config Log
284
Connection Log
Connection Log
285
Dial Log
Debug Log
286
Page
15/Mar/2004 155912 Line Connection disconnected
288
Error Log
Error Log
289
Filter Log
’McAfee update’ rule name
290
Http log
Http log
291
1058444114.733 0 192.168.64.64 TCPMISS/304
292
Security Log
Security Log
293
Authentication service Client IP address reason
294
17/Dec/2004 121133 Engine Startup
Sslvpn Log
Sslvpn Log
17/Dec/2004 122243 Engine Shutdown
Web Log
24/Apr/2003 102951 192.168.44.128 james
Web Log 297
Kerio VPN
298
VPN Server Configuration
299
General
Enable VPN server
Kerio VPN
IP address assignment
SSL certificate
301
Listen on port
Advanced
302
Custom Routes
303
Basic configuration of traffic rules for VPN clients
21.2 Configuration of VPN clients
304
Name of the tunnel
Setting up VPN servers
Definition of a tunnel to a remote server
305
Configuration
306
Configuration of a remote end of the tunnel
307
Routing settings
DNS Settings
308
Connection establishment
309
Traffic Policy Settings for VPN
310
Routing configuration options
Exchange of routing information
Exchange of routing information
311
Routes provided automatically
Update of routing tables
312
Specification
Example of Kerio VPN configuration company with a filial office
313
Common method
314
315
Headquarters configuration
316
14 Headquarter creating default traffic rules for Kerio VPN
317
318
16 Headquarter DNS forwarder configuration
319
320
19 Headquarters VPN server configuration
LAN
321
Configuration of a filial office
322
24 Filial office default traffic rules for Kerio VPN
323
324
25 Filial office DNS forwarder configuration
325
326
28 Filial office VPN server configuration
327
29 Filial office definition of VPN tunnel for the headquarters
VPN test
Example of a more complex Kerio VPN configuration
328
Common method
329
330
331
33 Headquarter creating default traffic rules for Kerio VPN
332
333
35 Headquarter DNS forwarder configuration
Kerio VPN
335
38 Headquarters VPN server configuration
336
39 Headquarter definition of VPN tunnel for the London filial
337
338
339
43 Headquarter final traffic rules
Configuration of the London filial
340
46 The London filial office default traffic rules for Kerio VPN
341
48 The London filial office DNS forwarding settings
342
343
344
345
346
54 The London filial office final traffic rules
Configuration of the Paris filial
347
348
57 The Paris filial office DNS forwarder configuration
349
59 The Paris filial office VPN server configuration
350
351
352
353
64 The Paris filial office final traffic rules
354
SSL-VPN configuration
Kerio Clientless SSL-VPN
22.1 Configuration of WinRoute’s SSL-VPN
355
Kerio Clientless SSL-VPN
Allowing access from the Internet
356
Https//server
Usage of the SSL-VPN interface
Usage of the SSL-VPN interface
Https//server12345
Handling files and folders
Sidneywashington@usoffice.company.com
358
Bookmarks
\\server\folder\subfolder
Antivirus control
359
Detection of incorrect configuration of the default gateway
Troubleshooting
360
23.2 Configuration Backup and Transfer
Cache.CFS
Sslcert
License
Dnscache.cfg
Star
Handling configuration files Configuration backup recovery
363
List name=Interfaces
General conditions
Automatic user authentication using Ntlm
365
WinRoute Configuration
366
Web browsers
Automatic user authentication using Ntlm
Ntlm authentication process
Microsoft Internet Explorer
Firefox/Netscape/Mozilla/SeaMonkey configuration
Firefox/Netscape/Mozilla/SeaMonkey
368
Partial Retirement of Protocol Inspector
Partial Retirement of Protocol Inspector
369
User accounts and groups in traffic rules
How to enable certain users to access the Internet
370
Enabling automatic authentication
371
Example of a client configuration web browser
FTP on WinRoute’s proxy server
372
FTP on WinRoute’s proxy server
Example of a client configuration Total Commander
373
12 Setting proxy server for FTP in Total Commander
374
Network Configuration
Network Load Balancing
Basic Information and System Requirements
375
Network Load Balancing
376
NLB configuration for Server1
24.3 Configuration of the servers in the cluster
377
378
Server 1 cluster parameters
NLB configuration for Server2
379
Description
Technical support
Essential Information
380
Informational File
Error Log Files
Tested in Beta version
License type and license number
United Kingdom
Contacts
Czech Republic
Legal Presumption
OpenSSL
Used open-source libraries
Libiconv
384
Zlib
Prototype
Copyright 2005 Sam Stephenson
385
ActiveX
Default gateway
Glossary of terms
Cluster
Greylisting
Firewall
387
Kerberos
Glossary of terms IP address
IPSec
388
Packet
Network adapter
P2P network
Port
Routing table
Glossary of terms
Proxy server
Script
Spoofing
391
TCP/IP
392
Index
393
Index
394
Ntlm
395
VPN
396
133
397
Top
Page
Image
Contents