Gfi software Help



Download 11,64 Mb.
Pdf ko'rish
bet481/481
Sana31.12.2021
Hajmi11,64 Mb.
#229824
1   ...   473   474   475   476   477   478   479   480   481
Bog'liq
kerio-control-adminguide

Document Outline

  • 1 Introduction
  • 2 Getting started
    • 2.1 System requirements for Kerio Control
    • 2.2 Configuration Assistant
      • 2.2.1 Configure Internet connection and the local network
      • 2.2.2 Define traffic policy
      • 2.2.3 Export your configuration
      • 2.2.4 Import configuration files
      • 2.2.5 Register product
    • 2.3 Logging to Kerio Control
    • 2.4 Adding Kerio Control to MyKerio
      • 2.4.1  Adding Kerio Control to MyKerio through Kerio Control Administration
      • 2.4.2 Adding Kerio Control to MyKerio during the Kerio Control installation
    • 2.5 Upgrading Kerio Control
      • 2.5.1 Checking new versions
      • 2.5.2 Automatic upgrade of Kerio Control
      • 2.5.3 Configuring email alerts
      • 2.5.4 Upgrade with USB tools
      • 2.5.5 Troubleshooting
      • 2.5.6 Upgrading to the latest version from Kerio Control 9.1 and newer
      • 2.5.7 Upgrading to the latest version from Kerio Control 8 & 9.0
      • 2.5.8 Upgrading to the latest version from Kerio Control 7
    • 2.6 Installation
      • 2.6.1 Installing Kerio Control
      • 2.6.2 Configuring the Activation Wizard
      • 2.6.3 Generating a bootable USB flash drive for Kerio Control software appliances
      • 2.6.4 Increasing the number of supported network interfaces in the Kerio Control VMware Virtual Appliance
      • 2.6.5 Migrating from Kerio Control (Windows Edition) to the Appliance Editions (Software/Virtual/Hardware)
      • 2.6.6 Kerio Control Virtual Appliance for Hyper-V
      • 2.6.7 Kerio Control VMware Virtual Appliance
    • 2.7 Licenses and registration
      • 2.7.1 Licensing and registering Kerio Control
      • 2.7.2 License Expiration
      • 2.7.3 Transferring the configuration and license from the Windows version of Kerio Control to the Software or Virtual Appliance edition
      • 2.7.4 How do I apply renewals or add-ons to my Kerio product?
    • 2.8 Hardware appliance
      • 2.8.1 Kerio Control NG series installation guide
      • 2.8.2 End of life of Kerio Control Box 1110
      • 2.8.3 Configuring Ethernet ports in Kerio Control hardware appliances
      • 2.8.4 Migrating configuration from one Kerio Control hardware appliance to another
      • 2.8.5 Connecting to Kerio hardware appliances with a serial console
      • 2.8.6 WiFi
    • 2.9 Kerio Control API
  • 3 Using
    • 3.1 Using Dashboard in Kerio Control
    • 3.2 Tips for tablets
    • 3.3 Antivirus
      • 3.3.1 Configuring antivirus protection
      • 3.3.2 Configuring email scanning
      • 3.3.3 Configuring HTTP and FTP scanning
      • 3.3.4 Using an external antivirus with Kerio products
    • 3.4 Backup
      • 3.4.1 Saving configuration to FTP server
      • 3.4.2 Saving configuration to MyKerio
    • 3.5 Accounts
      • 3.5.1 Managing user accounts in Kerio Control
      • 3.5.2 Setting access rights in Kerio Control
      • 3.5.3 Managing user quotas in Kerio Control
      • 3.5.4 Blocking web object elements for particular users
      • 3.5.5 Configuring automatic user login
      • 3.5.6 Creating user groups in Kerio Control
      • 3.5.7 Authenticating users to Kerio Control
    • 3.6 Directory services
      • 3.6.1 Connecting Kerio Control to directory service
      • 3.6.2 Automatic user authentication using NTLM
      • 3.6.3 How do I force users to log out of the firewall?
      • 3.6.4 How to use a Windows Active Directory Group Policy Object (GPO) to logon and logout users automatically from Kerio Control
      • 3.6.5 Optimizing the communication between Kerio Control and Active Directory
    • 3.7 Monitoring
      • 3.7.1 Monitoring active hosts
      • 3.7.2 Monitoring active connections
      • 3.7.3 Monitoring System Health in Kerio Control
      • 3.7.4 Monitoring traffic in Kerio Control
      • 3.7.5 Monitoring user statistics
      • 3.7.6 Monitoring VPN clients
      • 3.7.7 SNMP monitoring
    • 3.8 Logs
      • 3.8.1 Using and configuring logs
      • 3.8.2 Using the Config log
      • 3.8.3 Using the Connection log
      • 3.8.4 Using the Debug log
      • 3.8.5 Using the Dial log
      • 3.8.6 Using the Error log
      • 3.8.7 Using the Filter log
      • 3.8.8 Using the Host log
      • 3.8.9 Using the Http log
      • 3.8.10 Using the Security log
      • 3.8.11 Using the Warning log
      • 3.8.12 Using the Web log
      • 3.8.13 Logging packets
      • 3.8.14 Log packet formatting
    • 3.9 VPN
      • 3.9.1 Configuring Kerio VPN
      • 3.9.2 Configuring IPsec VPN Server
      • 3.9.3 Routing all traffic through Kerio VPN Tunnel
      • 3.9.4 Connecting multiple offices via Kerio VPN and IPsec VPN tunnels
      • 3.9.5 Assigning static IP addresses for Kerio Control VPN Clients
      • 3.9.6 Kerio Control VPN Client for administrators
      • 3.9.7 Using Logs to troubleshoot VPN Client issues
  • 4 Settings
    • 4.1 Interfaces
      • 4.1.1 Configuring network interfaces
      • 4.1.2 Configuring the guest network
      • 4.1.3 Configuring PPPoE connections
      • 4.1.4 Configuring PPTP tunnel
      • 4.1.5 Configuring TCP/IP settings in Kerio Control interfaces
      • 4.1.6 Configuring L2TP tunnel
      • 4.1.7 Configuring multiple WAN IPs with PPPoE
      • 4.1.8 Configuring VLANs
      • 4.1.9 Changing MAC addresses of network interfaces
      • 4.1.10 Changing the MTU of network interfaces
      • 4.1.11 Changing the speed and duplex settings of Ethernet interfaces
      • 4.1.12 Using alert messages
      • 4.1.13 Sending log message alerts
      • 4.1.14 Using IP Tools
    • 4.2 Security
      • 4.2.1 Configuring 2-step verification
      • 4.2.2 Blocking all incoming connections from specified countries in Kerio Control
      • 4.2.3 Configuring connection limits
      • 4.2.4 Configuring intrusion prevention system
      • 4.2.5 Filtering MAC addresses
      • 4.2.6 Protecting users against password guessing attacks
      • 4.2.7 Protocol inspection in Kerio Control
      • 4.2.8 Encrypting User Data
    • 4.3 IPv6
      • 4.3.1 Configuring IPv6 networking in Kerio Control
      • 4.3.2 Support for IPv6 protocol
      • 4.3.3 Configuring traffic rules for IPv6 network
    • 4.4 Traffic rules
      • 4.4.1 Configuring traffic rules
      • 4.4.2 Configuring IP address translation
      • 4.4.3 Configuring Demilitarized Zone (DMZ)
      • 4.4.4 Configuring traffic rules - exclusions
      • 4.4.5 Configuring traffic rules - multihoming
      • 4.4.6 Limiting Internet access with traffic rules
      • 4.4.7 Troubleshooting traffic rules
    • 4.5 Content filtering
      • 4.5.1 Configuring the Content Filter
      • 4.5.2 Application awareness in Kerio Control
      • 4.5.3 Configuring FTP policy
      • 4.5.4 Configuring HTTP policy
      • 4.5.5 Filtering web content by word occurrence
      • 4.5.6 Blocking inappropriate or explicit content in search results
      • 4.5.7 Filtering HTTPS connections
      • 4.5.8 HTTPS filtering specifics
      • 4.5.9 Using Kerio Control Web Filter
      • 4.5.10 Slow Internet connection with activated Kerio WebFilter
      • 4.5.11 Eliminating Peer-to-Peer traffic
    • 4.6 Bandwidth optimization
      • 4.6.1 Configuring bandwidth management
      • 4.6.2 Configuring policy routing
      • 4.6.3 Setting limit per host
      • 4.6.4 Detecting large data transfers
      • 4.6.5 Bandwidth management - setting the speed of the link
    • 4.7 Proxy server
      • 4.7.1 Configuring proxy server
      • 4.7.2 Configuring the reverse proxy
    • 4.8 Server configuration
      • 4.8.1 Configuring a routing table in Kerio Control
      • 4.8.2 Configuring HTTP cache
      • 4.8.3 Configuring Service Discovery forwarding in the Kerio Control network
      • 4.8.4 Configuring the Kerio Control web interface
      • 4.8.5 Configuring system settings date, time, time zone and server name
      • 4.8.6 Customizing logo on Kerio Control login page, denial pages and user alerts
      • 4.8.7 Customizing the language used in Kerio Control interfaces
      • 4.8.8 Configuring statistics and reports
      • 4.8.9 Configuring the SMTP server
      • 4.8.10 DHCP server in Kerio Control
      • 4.8.11 DNS forwarding service in Kerio Control
      • 4.8.12 Modifying parameters in Kerio Control configuration
      • 4.8.13 Optimizing performance with large segment offload
      • 4.8.14 Using RADIUS server in Kerio Control
      • 4.8.15 Configuring IP address groups
      • 4.8.16 Configuring URL groups
      • 4.8.17 Services in Kerio Control
      • 4.8.18 Creating time ranges in Kerio Control
      • 4.8.19 Configuring Universal Plug-and-Play (UPnP)
      • 4.8.20 Using Remote Desktop IP Virtualization
      • 4.8.21 Wildcards and regular expressions in URL
      • 4.8.22 Dynamic DNS for public IP address of the firewall
    • 4.9 SSL certificates
      • 4.9.1 Configuring SSL certificates in Kerio Control
      • 4.9.2 Exporting and importing Kerio Control local authority as root certificate
      • 4.9.3 Changing SSL certificates in Kerio Control
      • 4.9.4 Deploying Kerio Control certificate via Microsoft Active Directory
    • 4.10 Active/Passive High Availability
      • 4.10.1 Enabling High Availability
      • 4.10.2 High Availability Alert Management
  • 5 Troubleshooting
    • 5.1 How do I generate a network trace (packet dump) for Kerio technical support?
      • 5.1.1 Discussion
      • 5.1.2 Windows and MacOSX
      • 5.1.3 Linux
    • 5.2 Common issues
      • 5.2.1 Authenticating iPhone 5 (iOS6) device to WiFi fails
      • 5.2.2 I have a page that is miscategorized by Kerio Web Filter
      • 5.2.3 Redirecting users to the authentication page does not work, the page cannot be displayed.
      • 5.2.4 Active Directory/LDAP error: Unable to search in dc=example,dc=domain,dc=com (Size limit exceeded)
      • 5.2.5 Browser extensions or add-ons may interfere with Kerio products
      • 5.2.6 User is prompted for credentials
      • 5.2.7 Troubleshooting SSL certificates
    • 5.3 Wifi issues
      • 5.3.1 WiFi connection is slow
      • 5.3.2 Wireless devices cannot connect to WiFi
    • 5.4 USB tools
      • 5.4.1 Recovering your Kerio Control Box NG series password using a USB flash drive
      • 5.4.2 Recovering your Kerio Control password using a USB flash drive
      • 5.4.3 Restoring the Kerio Control Box NG series default configuration using a USB flash drive
      • 5.4.4 Restoring the Kerio Control default configuration using a USB flash drive
      • 5.4.5 Updating Kerio Control Box NG series using a USB flash drive
      • 5.4.6 Updating Kerio Control using a USB flash drive
      • 5.4.7 Diagnostic tool for Kerio Control Box
      • 5.4.8 Diagnostic tool for Kerio Control Box NG series
    • 5.5 Vulnerabilities
  • 6 Glossary
  • 7 Legal Notices
    • 7.1 Trademarks and registered trademarks
    • 7.2 Open source software
      • 7.2.1 bindlib
      • 7.2.2 Clearsilver
      • 7.2.3 Firebird
      • 7.2.4 Heimdal Kerberos
      • 7.2.5 h323plus
      • 7.2.6 KIPF — driver
      • 7.2.7 KIPF — API
      • 7.2.8 KVNET — driver
      • 7.2.9 KVNET — API
      • 7.2.10 libcurl
      • 7.2.11 libiconv
      • 7.2.12 libmbfl
      • 7.2.13 libxml2
      • 7.2.14 Net-SNMP
      • 7.2.15 OpenLDAP
      • 7.2.16 OpenSSL
      • 7.2.17 Operating system
      • 7.2.18 PHP
      • 7.2.19 Prototype
      • 7.2.20 ptlib
      • 7.2.21 Qt
      • 7.2.22 ScoopyNG
      • 7.2.23 Snort
      • 7.2.24 strongSwan
      • 7.2.25 zlib

Download 11,64 Mb.

Do'stlaringiz bilan baham:
1   ...   473   474   475   476   477   478   479   480   481




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish