| 20.7 | Dial Log | 286 |
| 20.8 | Error Log | 289 |
| 20.9 | Filter Log | 290 |
| 20.10 | Http log | 291 |
| 20.11 | Security Log | 293 |
| 20.12 | Sslvpn Log | 295 |
| 20.13 | Warning Log | 295 |
| 20.14 | Web Log | 296 |
21 | Kerio VPN | 298 | |
| 21.1 | VPN Server Configuration | 299 |
| 21.2 | Configuration of VPN clients | 304 |
21.3Interconnection of two private networks via the Internet (VPN
tunnel) | 305 |
21.4 Exchange of routing information | 311 |
21.5Example of Kerio VPN configuration: company with a filial office . . . . 313
| 21.6 | Example of a more complex Kerio VPN configuration | 328 |
22 | Kerio Clientless | 355 | |
| 22.1 | Configuration of WinRoute’s | 355 |
| 22.2 | Usage of the | 357 |
23 | Troubleshooting | 360 | |
| 23.1 | Detection of incorrect configuration of the default gateway | 360 |
| 23.2 | Configuration Backup and Transfer | 361 |
| 23.3 | Automatic user authentication using NTLM | 365 |
| 23.4 | Partial Retirement of Protocol Inspector | 369 |
| 23.5 | User accounts and groups in traffic rules | 370 |
| 23.6 | FTP on WinRoute’s proxy server | 372 |
24 | Network Load Balancing | 375 | |
| 24.1 | Basic Information and System Requirements | 375 |
| 24.2 | Network Configuration | 375 |
| 24.3 | Configuration of the servers in the cluster | 377 |
25 | Technical support | 380 | |
| 25.1 | Essential Information | 380 |
| 25.2 | Tested in Beta version | 381 |
| 25.3 | Contacts | 382 |
6