20.7

Dial Log

286

 

20.8

Error Log

289

 

20.9

Filter Log

290

 

20.10

Http log

291

 

20.11

Security Log

293

 

20.12

Sslvpn Log

295

 

20.13

Warning Log

295

 

20.14

Web Log

296

21

Kerio VPN

298

 

21.1

VPN Server Configuration

299

 

21.2

Configuration of VPN clients

304

21.3Interconnection of two private networks via the Internet (VPN

tunnel)

305

21.4 Exchange of routing information

311

21.5Example of Kerio VPN configuration: company with a filial office . . . . 313

 

21.6

Example of a more complex Kerio VPN configuration

328

22

Kerio Clientless SSL-VPN

355

 

22.1

Configuration of WinRoute’s SSL-VPN

355

 

22.2

Usage of the SSL-VPN interface

357

23

Troubleshooting

360

 

23.1

Detection of incorrect configuration of the default gateway

360

 

23.2

Configuration Backup and Transfer

361

 

23.3

Automatic user authentication using NTLM

365

 

23.4

Partial Retirement of Protocol Inspector

369

 

23.5

User accounts and groups in traffic rules

370

 

23.6

FTP on WinRoute’s proxy server

372

24

Network Load Balancing

375

 

24.1

Basic Information and System Requirements

375

 

24.2

Network Configuration

375

 

24.3

Configuration of the servers in the cluster

377

25

Technical support

380

 

25.1

Essential Information

380

 

25.2

Tested in Beta version

381

 

25.3

Contacts

382

6

Page 6
Image 6
Kerio Tech Firewall6 manual Kerio Clientless SSL-VPN 355