Manuals
/
Kerio Tech
/
Computer Equipment
/
Network Router
Kerio Tech
Firewall6
manual
327, Filial office definition of VPN tunnel for the headquarters
Models:
Firewall6
1
327
398
398
Download
398 pages
11.9 Kb
324
325
326
327
328
329
330
331
Troubleshooting
Install
Password
Error Log
Login
Administrator’s Guide
Reset interface statistics
Remote Access
Connection Failover Setup
Port mapping timeout
Page 327
Image 327
21.5 Example of Kerio VPN configuration: company with a filial office
Figure 21.29
Filial office — definition of VPN tunnel for the headquarters
Figure 21.30
Filial office — final traffic rules
327
Page 326
Page 328
Page 327
Image 327
Page 326
Page 328
Contents
Kerio Technologies
Administrator’s Guide
Page
Contents
113
Remote Administration and Update Checks 209
Kerio Clientless SSL-VPN 355
393
Quick Checklist
Page
Basic Features
Introduction
Kerio WinRoute Firewall
Kerio WinRoute Firewall
Additional Features
User quotas
Antivirus control
Transparent support for Active Directory
Email alerts
Port collision
Conflicting software
Clientless SSL-VPN
Collision of low-level drivers
Antivirus applications
System requirements
Installation
Installation
Steps to be taken before the installation
Installation and Basic Configuration Guide
Custom installation selecting optional components
Protection of the installed product
Conflicting Applications and System Services
WinRoute Components
WinRoute Firewall Engine
WinRoute Engine Monitor
Kerio Administration Console
WinRoute Engine Monitor
WinRoute Engine Monitor
Upgrade and Uninstallation
Upgrade and Uninstallation
Uninstallation
Typically the path C\Program Files\Kerio\WinRoute Firewall
Configuration Wizard
Upgrade from WinRoute Pro
Update Checker
Setting of administration username and password
Remote Access
Enable remote access
Remote IP address
Initial configuration Allowing remote administration
Administration Window
WinRoute Administration
Help menu
WinRoute Administration
Administration Window Main menu
File
Administration Window
Status bar
Detection of WinRoute Firewall Engine connection drop-out
Column customization in Interfaces
View Settings
View Settings
Product Registration and Licensing
License types and number of users
License types optional components
Deciding on a number of users licenses
License types and number of users
Homepage
License information
Product
Copyright
Number of users
License ID
Subscription expiration date
Product expiration date
Registration of the trial version
Registration of the product in the Administration Console
Trial version registration security code
Registration of the product in the Administration Console
Trial version registration other information
Trial version registration Trial ID
Registration of the purchased product
Product Registration and Licensing
Registration of the product in the Administration Console
10 Product registration user information
12 Product registration summary
Update of registration information
Product registration at the website
Subscription / Update Expiration
Bubble alerts
Subscription / Update Expiration
15 The notice that the subscription has already expired
User counter
User counter
Start WinRoute
License counter
License release
IP Address and Mask
Settings for Interfaces and Network Services
Network interfaces
Interface
Modify
Dial or Hang Up /Enebale, Disable
Adapter info
Add
VPN server
Refresh
Special interfaces
Dial-In
Interface type selection
Bind this interface
RAS Entry
Use login data from the RAS entry
Use the following login data
Interface name
Dial-up demand dial
Connection
Advanced
Hangup if idle
Edit Interface parameters
Connection Failover
Current connection
Connection Failover Setup
Enable automatic connection failover
Connection Failover
Configuration of primary and secondary Internet connection
Primary connection
Secondary connection
Dial-up Use
DNS Forwarder configuration
DNS Forwarder
Enable DNS forwarding
DNS Forwarder
DNS forwarding
Use custom forwarding
Enable cache for faster response of repeated queries
Enable DNS forwarding
Clear cache
10 Specific settings of DNS forwarding
11 DNS forwarding a new rule
Simple DNS resolution
Combine the name ... with DNS domain
Before forwarding a query
Dhcp server
Dhcp server
Dhcp Server Configuration
Definition of Scopes and Reservations
Domain
Lease time
DNS server
Wins server
15 Dhcp server IP scopes definition
Description
First address, Last address
Subnet mask
Exclusions
Parameters
00bca5f21e50
Lease Reservations
Leases
Bc-a5-f2-1e-50
20 Dhcp server list of leased and reserved IP addresses
Windows RAS
Dhcp server advanced options
Declined options
Proxy server
Enable non-transparent proxy server
Proxy server
Proxy Server Configuration
22 Http proxy server settings
Enable connection to any TCP port
Http//192.168.1.13128/pac/proxy.pac
Forward to parent proxy server
Http protocol TTL
Enable cache on transparent proxy
Enable cache on proxy server
Http cache
Cache size
Http cache
Memory cache size
Max Http object size
Cache Options
URL
URL Specific Settings
TTL
Cache status and administration
26 Http cache administration dialog
Network Rules Wizard
Traffic Policy
Network Rules Wizard
Information
Selection of Internet connection type
Network Policy Wizard selection of a connected adapter
Network adapter or dial-up selection
Allow access to all services
Internet access limitations
Enabling Kerio VPN traffic
Allow access to the following services only
Service
Service is running on
Generating the rules
NAT
Icmp traffic
Rules Created by the Wizard
Local Traffic
Firewall Traffic
How traffic rules work
Definition of Custom Traffic Rules
Name
12 Traffic rule name, color and rule description
Source, Destination
IP range e.g
Definition of Custom Traffic Rules
100
Service
101
Action
102
Log
103
Translation
20 Traffic rule destination address translation
104
Valid on
Protocol inspector
105
Destination
Basic Traffic Rule Types
IP Translation NAT
Source
107
Translation
Placing the rule
Port mapping
108
Limiting Internet Access
Multihoming
109
110
111
Exclusions
112
Speed limits for users with their quota exceeded
How the bandwidth limiter works and how to use it
Speed limits for big data volumes transmissions
Bandwidth Limiter
114
Setting limit values
Bandwidth Limiter configuration
Bandwidth Limiter
Services
Advanced Options
115
116
IP Addresses and Time Interval
117
Bandwidth Limiter selection of network services
118
Detection of connections with large data volume transferred
Detection of connections with large data volume transferred
Examples
119
120
User Authentication
Firewall User Authentication
121
User Authentication
User authentication advanced options
122
Automatic authentication Ntlm
Firewall User Authentication
Redirection to the authentication
Enable non-transparent proxy server authentication
124
Automatically logout users when they are inactive
Web Interface Parameters Configuration
Enable Kerio SSL-VPN server
Enable Web Interface Http
Web Interface
WinRoute server name
Enable secured Web Interface Https
Allow access only from these IP addresses
Web Interface
127
Configuration of ports of the Web Interface
SSL Certificate for the Web Interface
Generate or Import Certificate
128
SSL certificate of WinRoute’s Web interface
129
130
Login/logout
Web Interface Language Preferences
Users logged
Login/logout
Drdolittle@usoffice.company.com
131
User password authentication
Log out
132
Status information and user statistics
Status information and user statistics
133
134
User preferences
Save settings
User preferences
135
136
10 Editing user password
Http protocol
FTP protocol
137
Conditions for Http and FTP filtering
URL Rules
138
139
URL Rules
140
URL Rules Definition
If user accessing the URL is
URL matches criteria
141
142
Allow access to the Web site
Denial options
Valid at time interval
Valid for IP address group
Valid if Mime type is
144
WWW content scanning options
Scan content for viruses according to scanning rules
Deny Web pages containing
145
Http Inspection Advanced Options
146
Global rules for Web elements
Allow Html ActiveX objects
Allow Script Html tags
Allow cross-domain referrer
Content Rating System ISS OrangeWeb Filter
Allow Html JavaScript pop-up windows
Allow applet Html tags
148
ISS OrangeWeb Filter configuration
ISS OrangeWeb Filter Deployment
Enable ISS OrangeWeb Filter
Categorize each page regardless of Http rules
Server
ISS OrangeWeb Filter rule
150
151
Web content filtering by word occurrence
152
Definition of rules filtering by word occurrence
153
Word groups
154
Definition of forbidden words
Keyword
Weight
FTP Policy
Group
156
If user accessing the FTP server is
FTP Rules Definition
FTP server is
15 FTP Rule basic parameters
158
Content
159
Antivirus control
Conditions and limitations of antivirus scan
160
161
Conditions and limitations of antivirus scan
162
How to choose and setup antiviruses
Antivirus control
Integrated McAfee
Current virus database is
Check for update every ... hours
Last update check performed ... ago
Update now
Antivirus settings
External antivirus
164
An example of a traffic rule for outgoing Smtp traffic check
165
Http and FTP scanning
167
Http and FTP scanning
Http and FTP scanning rules
Condition
168
169
Mime type
170
Email scanning
171
Email scanning
172
IP Address Groups
Creating and Editing IP Address Groups
173
Type
Time Intervals
Definitions
Name
Daily
Time range types
Absolute
Weekly
176
Time Interval Type
From, To
Valid at days
Services
Services
177
Protocol
Protocol inspector
178
Source Port and Destination Port
Protocol Inspectors
179
180
URL Groups
181
URL Groups
182
Definitions Group
183
User Accounts and Groups
Internal user database
Import of user accounts from Active Directory
Viewing and definitions of user accounts
User Accounts and Groups
184
Local user accounts
186
Local user accounts
Accounts mapped from the Active Directory domain
Edit User
Full Name
Local user accounts
Creating a local user account
Basic information
Domain template
Authentication
Account is disabled
Email Address
NT domain / Kerberos
Groups
189
190
Access rights
User can override WWW content rules
No access to administration
Read only access to administration
Full access to administration
Data transmission quota
Transfer quota
192
Content rules
Quota exceed action
193
194
User’s IP addresses
195
Editing User Account
Active Directory
NT domain
196
197
Automatic import of user accounts from Active Directory
198
Manual import of user accounts
199
Active Directory domains mapping
Active Directory domains mapping
Domain mapping requirements
200
Domain Access
Single domain mapping
Active Directory mapping
13 Active Directory domain mapping
201
NT authentication support
Multiple domains mapping
202
16 Conversion of user accounts
203
User groups
User groups Definitions
204
205
User groups
Creating a new local user group
Name and description of the group
206
Group access rights
Read only access
Group members
Users can override WWW content rules
Users can connect using VPN
207
Users are allowed to use P2P networks
Users are allowed to view statistics
208
209
Remote Administration and Update Checks
Setting Remote Administration
How to allow remote administration from the Internet
Update Checking
Remote Administration and Update Checks
210
Check now
Update Checking
Check for new versions
Check also for beta versions
212
213
Advanced security features
15.1 P2P Eliminator
P2P Eliminator Configuration
214
Advanced security features
15.1 P2P Eliminator
Parameters for detection of P2P networks
215
216
Special Security Settings
217
Special Security Settings
Anti-Spoofing
Connections Count Limit
IPSec preferences
VPN using IPSec Protocol
Enable
Enable pass-through only for hosts
219
VPN using IPSec Protocol
WinRoute’s IPSec configuration
IPSec client in local network
Traffic rule for one IPSec client in the local network
220
221
IPSec server in local network
Routing table
Other settings
223
Routing table
Route Types
Static routes
Metric
Definitions of Dynamic and Static Rules
Network, Network Mask
Gateway
How demand dial works
Demand Dial
Demand Dial
Removing routes from the Routing Table
226
227
Technical Peculiarities and Limitations
228
Setting Rules for Demand Dial
229
Dial of local DNS names
Configuration of the UPnP support
Enable UPnP
Port mapping timeout
Universal Plug-and-Play UPnP
Log connections
Relay Smtp server
Relay Smtp server
Log packets
232
Smtp requires authentication
Specify sender email address in From header
Test
233
Status Information
Active hosts and connected users
234
User
Login time
Login duration
Hostname
Active Hosts dialog options
Detailed information on a selected host and user
238
Traffic information
Activity Description
Connections
239
240
Source, Destination
241
Histogram
242
Show connections related to the selected process
243
Show connections related to the selected process
Options of the Connections Dialog
Kill connection
244
245
Color Settings
Font Color
Background Color
Alerts Settings
Alerts
246
Alerts
Alert
247
248
Alert Templates
\Program Files\Kerio\WinRoute Firewall\templates by default
Alerts overview in Administration Console
249
13 Details of a selected event
250
Basic statistics
Interface statistics
251
252
Reset interface statistics
Basic statistics
Interface Statistics menu
253
Interface statistics
Remove interface statistics
Graphical view of interface load
254
User Statistics data volumes and quotas
User Statistics data volumes and quotas
User Statistics dialog options
255
256
Reset user statistics
Remove user statistics
View host
Kerio StaR statistics and reporting
Monitoring and storage of statistic data
257
258
Settings for statistics and quota
Kerio StaR statistics and reporting
Requirements of the statistics
259
Settings for statistics and quota
Enable/disable gathering of statistic data
Advanced settings for statistics
260
Statistics and quota restrictions
Statistics and quota accounting periods
Accessing the statistics from the WinRoute host
Remote access to the statistics
Connection to StaR and viewing statistics
262
StaR page in the web interface
263
Accounting period
Custom accounting period
264
Overall View
Overall View
265
Top Requested Web Categories
Top 5 users
266
267
Used Protocol
268
User statistics
User statistics
269
13 The Users by Traffic table
Users by Traffic
Top Visited Websites
Top Visited Websites
272
Top Requested Web Categories
16 Top visited websites sorted by categories
273
274
275
Log settings
Logs
Filename.log
276
File Logging
Log settings
Syslog Logging
277
Logs Context Menu
Select font
Logs Context Menu
Find
Highlighting
Log highlighting
Logs Encoding
Log debug
Clear log
Log highlighting settings
282
Debug log advanced settings
Alert Log
Alert Log
20.4 Config Log
Logs
284
Connection Log
Connection Log
285
Debug Log
Dial Log
286
Page
288
15/Mar/2004 155912 Line Connection disconnected
Error Log
Error Log
289
’McAfee update’ rule name
Filter Log
290
Http log
Http log
291
292
1058444114.733 0 192.168.64.64 TCPMISS/304
Security Log
Security Log
293
294
Authentication service Client IP address reason
17/Dec/2004 122243 Engine Shutdown
Sslvpn Log
Sslvpn Log
17/Dec/2004 121133 Engine Startup
24/Apr/2003 102951 192.168.44.128 james
Web Log
Web Log 297
298
Kerio VPN
299
VPN Server Configuration
IP address assignment
Enable VPN server
Kerio VPN
General
301
SSL certificate
Advanced
Listen on port
302
303
Custom Routes
21.2 Configuration of VPN clients
Basic configuration of traffic rules for VPN clients
304
305
Setting up VPN servers
Definition of a tunnel to a remote server
Name of the tunnel
306
Configuration
307
Configuration of a remote end of the tunnel
DNS Settings
Routing settings
308
309
Connection establishment
310
Traffic Policy Settings for VPN
311
Exchange of routing information
Exchange of routing information
Routing configuration options
Update of routing tables
Routes provided automatically
312
Example of Kerio VPN configuration company with a filial office
Specification
313
314
Common method
315
316
Headquarters configuration
317
14 Headquarter creating default traffic rules for Kerio VPN
16 Headquarter DNS forwarder configuration
318
319
19 Headquarters VPN server configuration
320
321
LAN
322
Configuration of a filial office
323
24 Filial office default traffic rules for Kerio VPN
25 Filial office DNS forwarder configuration
324
325
28 Filial office VPN server configuration
326
29 Filial office definition of VPN tunnel for the headquarters
327
Example of a more complex Kerio VPN configuration
VPN test
328
329
Common method
330
331
332
33 Headquarter creating default traffic rules for Kerio VPN
35 Headquarter DNS forwarder configuration
333
Kerio VPN
38 Headquarters VPN server configuration
335
39 Headquarter definition of VPN tunnel for the London filial
336
337
338
43 Headquarter final traffic rules
339
340
Configuration of the London filial
341
46 The London filial office default traffic rules for Kerio VPN
342
48 The London filial office DNS forwarding settings
343
344
345
54 The London filial office final traffic rules
346
347
Configuration of the Paris filial
57 The Paris filial office DNS forwarder configuration
348
59 The Paris filial office VPN server configuration
349
350
351
352
64 The Paris filial office final traffic rules
353
354
355
Kerio Clientless SSL-VPN
22.1 Configuration of WinRoute’s SSL-VPN
SSL-VPN configuration
Allowing access from the Internet
Kerio Clientless SSL-VPN
356
Https//server12345
Usage of the SSL-VPN interface
Usage of the SSL-VPN interface
Https//server
Sidneywashington@usoffice.company.com
Handling files and folders
358
359
\\server\folder\subfolder
Antivirus control
Bookmarks
Troubleshooting
Detection of incorrect configuration of the default gateway
360
23.2 Configuration Backup and Transfer
Dnscache.cfg
Sslcert
License
Cache.CFS
Handling configuration files Configuration backup recovery
Star
363
List name=Interfaces
Automatic user authentication using Ntlm
General conditions
365
366
WinRoute Configuration
Microsoft Internet Explorer
Automatic user authentication using Ntlm
Ntlm authentication process
Web browsers
Firefox/Netscape/Mozilla/SeaMonkey
Firefox/Netscape/Mozilla/SeaMonkey configuration
368
Partial Retirement of Protocol Inspector
Partial Retirement of Protocol Inspector
369
How to enable certain users to access the Internet
User accounts and groups in traffic rules
370
371
Enabling automatic authentication
FTP on WinRoute’s proxy server
Example of a client configuration web browser
372
Example of a client configuration Total Commander
FTP on WinRoute’s proxy server
373
374
12 Setting proxy server for FTP in Total Commander
375
Network Load Balancing
Basic Information and System Requirements
Network Configuration
376
Network Load Balancing
24.3 Configuration of the servers in the cluster
NLB configuration for Server1
377
Server 1 cluster parameters
378
379
NLB configuration for Server2
380
Technical support
Essential Information
Description
License type and license number
Error Log Files
Tested in Beta version
Informational File
Contacts
United Kingdom
Czech Republic
Legal Presumption
384
Used open-source libraries
Libiconv
OpenSSL
385
Prototype
Copyright 2005 Sam Stephenson
Zlib
Cluster
Default gateway
Glossary of terms
ActiveX
Firewall
Greylisting
387
388
Glossary of terms IP address
IPSec
Kerberos
Port
Network adapter
P2P network
Packet
Script
Glossary of terms
Proxy server
Routing table
391
Spoofing
392
TCP/IP
393
Index
394
Index
395
Ntlm
396
VPN
397
133
Top
Page
Image
Contents