Iniciar sesión:
Votos - 1, Puntuación media: 4 ( )

Manual de usuario Kerio Tech, modelo KERIO WINROUTE FIREWALL 6

Fabricar: Kerio Tech
Tamaño del archivo: 2.24 mb
Nombre del archivo: kwfag6-en.pdf
Idioma del manual:en
Enlace gratuito para este manual disponible en la parte inferior de la página



Resumen del manual


© Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration and administration of Kerio WinRoute Firewall, version 6.7.1. All additional modifications and updates reserved. User interfaces Kerio StaR and Kerio Clientless SSL-VPN are focused in a standalone document, Kerio WinRoute Firewall — User’s Guide. The Kerio VPN Client application is described in a stand-alone document Kerio VPN Client — User’s Guide. For current version of the product, go to For other documents addressing the product, see Information regarding registered trademarks and trademarks are provided in appendix A. Products Kerio WinRoute Firewall and Kerio VPN Client include open source software. To view the list of open source items included, refer to attachment B. Contents 1 QuickChecklist ................................................................ 7 2 Introduction ................................................................... 9 2.1 What’snewin6.7.1 ....................................................... 9 2.2 Conflictingsoftware ..................................................... 10 2.3 Systemrequirements .................................................... 11 2.4 Installation-Windows ................................................... 12 2.5 Initialconfigurationwizard(Windows) .................................... 17 2.6 UpgradeandUninstallation-Windows .................................... 19 2.7 Installation -Software Appliance and VMware Virtual Appliance . . . . . . . . . . . 20 2.8 Upgrade -Software Appliance / VMware Virtual Appliance . . . . . . . . . . . . . . . . 23 2.9 WinRouteComponents ................................................... 23 2.10 WinRouteEngineMonitor(Windows) ..................................... 24 2.11 The firewall’s console (Software Appliance / VMware Virtual Appliance) . . . . 25 3 WinRouteAdministration ..................................................... 27 3.1 AdministrationConsole-themainwindow ............................... 28 3.2 AdministrationConsole-viewpreferences ................................ 31 4 ProductRegistrationandLicensing ............................................ 32 4.1 Licensetypesandnumberofusers ....................................... 32 4.2 Licenseinformation ...................................................... 33 4.3 Registration of the product in the Administration Console . . . . . . . . . . . . . . . . 35 4.4 Productregistrationatthewebsite ....................................... 43 4.5 Subscription/UpdateExpiration ......................................... 43 4.6 Usercounter ............................................................ 45 5 Networkinterfaces ............................................................ 47 6 InternetConnection ........................................................... 53 6.1 Persistentconnectionwithasinglelink ................................... 54 6.2 Connectionwithasingleleasedlink-dialondemand ..................... 57 6.3 ConnectionFailover ...................................................... 62 6.4 NetworkLoadBalancing ................................................. 66 7 TrafficPolicy .................................................................. 71 7.1 NetworkRulesWizard ................................................... 71 7.2 Howtrafficruleswork ................................................... 78 7.3 DefinitionofCustomTrafficRules ........................................ 78 7.4 BasicTrafficRuleTypes .................................................. 90 3 7.5 Policyrouting ........................................................... 95 7.6 Useraccountsandgroupsintrafficrules ................................. 98 7.7 PartialRetirementofProtocolInspector .................................. 99 7.8 UseofFullconeNAT .................................................. 101 7.9 Mediahairpinning ..................................................... 102 8 Configurationofnetworkservices ........................................... 104 8.1 DNSmodule ........................................................... 104 8.2 DHCPserver ........................................................... 110 8.3 DynamicDNSforpublicIPaddressofthefirewall ....................... 119 8.4 Proxyserver ........................................................... 121 8.5 HTTPcache ............................................................ 124 9 BandwidthLimiter ........................................................... 130 9.1 Howthebandwidthlimiterworksandhowtouseit ..................... 130 9.2 BandwidthLimiterconfiguration ....................................... 130 9.3 Detection of connections with large data volume transferred . . . . . . . . . . . . 135 10 UserAuthentication .......................................................... 137 10.1 FirewallUserAuthentication ........................................... 137 11 We...


Comentarios



Tu reseña
Tu nombre:
Introduzca dos números de la imagen:
capcha





Categoría