Kerio-tech Firewall6 Manual do Utilizador Página 1

Consulte online ou descarregue Manual do Utilizador para Hardware Kerio-tech Firewall6. Kerio Tech Firewall6 User Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 404
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes

Resumo do Conteúdo

Página 1 - Kerio WinRoute Firewall 6

Kerio WinRoute Firewall 6Administrator’s GuideKerio Technologies

Página 2

Chapter 2 Introduction10access to a specific port (it can temporarily open the port demanded by the server). FTPin the active mode, Real Audio or PPTP

Página 3 - Contents

Chapter 7 Traffic Policy100Figure 7.40 Enabling Full cone NAT in the traffic rule7.9 Media hairpinningWinRoute allows to “arrange” traffic between two clien

Página 4

7.9 Media hairpinning101a packet is addressed to a client in the local network. Then it translates the destination IPaddress and sends the packet back

Página 5

102Chapter 8Configuration of network servicesThis chapter provides guidelines for setting of basic services in WinRoute helpful for easyconfiguration an

Página 6

8.1 DNS Forwarder103of the firewall’s network interfaces, see chapter 5, more information on Internet connectionoptions, refer to chapter 6.DNS Forward

Página 7 - Quick Checklist

Chapter 8 Configuration of network services1041. Time period for keeping DNS logs in the cache is specified individually in each log(usually 24 hours).2

Página 8

8.1 DNS Forwarder105The rule can be defined for:• DNS name — queries requiring names of computers will be forwarded to this DNSserver (so called A quer

Página 9 - Introduction

Chapter 8 Configuration of network services106• The Name DNS query option allows specification of a rule for name queries. Use the Ifthe queried name ma

Página 10

8.1 DNS Forwarder107names. When any DNS query is received, this file will be checked first to find outwhether the desired name or IP address is included.

Página 11 - 2.2 Conflicting software

Chapter 8 Configuration of network services108ExampleThe local domain’s name is company.com. The host called john is configured so as toobtain an IP add

Página 12

8.2 DHCP server109DHCP Server ConfigurationTo configure the DHCP server in WinRoute go to Configuration → DHCP Server. Here you candefine IP scopes, reser

Página 13 - 2.3 Installation

2.2 Conflicting software11Email alertsWinRoute can send email alerts informing users about various events. This functionmakes firewall administration ea

Página 14

Chapter 8 Configuration of network services110Figure 8.6 DHCP server — default DHCP parametersDNS serverAny DNS server (or multiple DNS servers separat

Página 15

8.2 DHCP server111Figure 8.7 DHCP server — IP scopes definitionFirst address, Last addressFirst and last address of the new scope.Note: If possible, we

Página 16

Chapter 8 Configuration of network services112ExampleIn 192.168.1.0 subnet you intend to create two scopes: from 192.168.1.10to 192.168.1.49 and from 1

Página 17 - Sharing

8.2 DHCP server113Figure 8.9 DHCP server — DHCP settingsTo view configured DHCP parameters and their values within appropriate IP scopes see theright c

Página 18 - 2.4 WinRoute Components

Chapter 8 Configuration of network services114Figure 8.11 DHCP server — reserving an IP addressAny IP address included in a defined subnet can be reserv

Página 19 - 2.5 WinRoute Engine Monitor

8.2 DHCP server115LeasesIP scopes can be viewed in the Leases tab. These scopes are displayed in the form of trees. Allcurrent leases within the appro

Página 20

Chapter 8 Configuration of network services1161. Data about expired and released addresses are kept by the DHCP server and canbe used later if the same

Página 21

8.2 DHCP server117Figure 8.13 DHCP server — advanced optionsWarning1. DHCP server cannot assign addresses to RAS clients connecting to the RAS serverd

Página 22 - 2.7 Configuration Wizard

Chapter 8 Configuration of network services1188.3 Dynamic DNS for public IP address of the firewallKerio WinRoute Firewall provides (among others) servi

Página 23

8.3 Dynamic DNS for public IP address of the firewall1192. Dynamic DNS records use very short time-to-live (TTL) and, therefore, they are kept incache

Página 24 - WinRoute Administration

Chapter 2 Introduction12• The Windows Firewall / Internet Connection Sharing system service. WinRoute canautomatically detect and disable this service

Página 25

Chapter 8 Configuration of network services120Once this information is defined, it is recommended to test update of dynamic DNS record byclicking on Upd

Página 26

8.4 Proxy server121Proxy Server ConfigurationTo configure proxy server parameters open the Proxy server tab in Configuration → ContentFiltering → HTTP Po

Página 27 - 3.2 View Settings

Chapter 8 Configuration of network services122Enable connection to any TCP portThis security option enables to allow or block so called tunneling of ot

Página 28

8.5 HTTP cache123Allow browsers to use configuration script automatically...It is possible to let Internet Explorer be configured automatically by the D

Página 29 - Chapter 4

Chapter 8 Configuration of network services124Figure 8.16 HTTP cache configurationCache directoryDirectory that will be used to store downloaded objects

Página 30 - 4.2 License information

8.5 HTTP cache125startup, the WinRoute Firewall Engine detects that the cache size exceeds 2047 MB,the size is changed to the allowed value automatica

Página 31

Chapter 8 Configuration of network services126Note: Clients can always require a check for updates from the Web server (regardless of thecache settings

Página 32

8.5 HTTP cache127TTLTTL of objects matching with the particular URL.The 0 days, 0 hours option means that objects will not be cached.Cache status and

Página 33

Chapter 8 Configuration of network services128Figure 8.19 HTTP cache administration dialogExampleSearch for the*ker?o*string lists all objects with URL

Página 34

8.5 HTTP cache129

Página 35

2.3 Installation13• 4090/TCP+UDP — proprietary VPN server (for details refer to chapter 23)Antivirus applicationsMost of the modern desktop antivirus

Página 36

130Chapter 9Bandwidth LimiterThe main problem of shared Internet connection is when one or more users download orupload big volume of data and occupy

Página 37

9.2 Bandwidth Limiter configuration131Figure 9.1 Bandwidth Limiter configurationThe Bandwidth Limiter module enables to define reduction of speed of inco

Página 38

Chapter 9 Bandwidth Limiter132services if too much big data volumes are transferred). If they are lower, full line capacity isoften not employed.Warni

Página 39

9.2 Bandwidth Limiter configuration133Figure 9.2 Bandwidth Limiter — network servicesFigure 9.3 Bandwidth Limiter — selection of network servicesIP Add

Página 40

Chapter 9 Bandwidth Limiter134addresses across the local network and the Internet. Where user workstations use fixedIP addresses, it is also possible t

Página 41

9.3 Detection of connections with large data volume transferred135cally. With exception of special conditions (testing purposes) it is highly recommen

Página 42 - 4.6 User counter

Chapter 9 Bandwidth Limiter136Examples:The detection of connections transferring large data volumes will be better understoodthrough the following exa

Página 43

137Chapter 10User AuthenticationWinRoute allows administrators to monitor connections (packet, connection, Web pages orFTP objects and command filterin

Página 44 - Network interfaces

Chapter 10 User Authentication138from the IP address. However, users may authenticate from other hosts (using themethods described above).IP addresses

Página 45

10.1 Firewall User Authentication139Redirection to the authentication pageIf the Always require users to be authenticated when accessing web pages opt

Página 46

Chapter 2 Introduction14Installation packagesKerio WinRoute Firewall is distributed in two editions: one is for 32-bit systems and the otherfor 64-bit

Página 47 - Figure 5.2 Editing interfaces

Chapter 10 User Authentication140available for other operating systems.For details, refer to chapter 25.2.Automatically logout users when they are ina

Página 48

141Chapter 11Web InterfaceWinRoute contains a special Web server that can be used for several purposes, such as aninterface for viewing of statistics

Página 49 - Internet Connection

Chapter 11 Web Interface142Figure 11.1 Configuration of WinRoute’s Web InterfaceEnable secured Web Interface (HTTPS)Use this option to open the secured

Página 50

11.1 Web Interface Parameters Configuration143Advanced parameters for the Web interface can be set upon clicking on the Advanced button.Configuration of

Página 51

Chapter 11 Web Interface144SSL Certificate for the Web InterfaceThe principle of an encrypted WinRoute Web interface is based on the fact that all comm

Página 52

11.1 Web Interface Parameters Configuration145Figure 11.3 SSL certificate of WinRoute’s Web interfaceFigure 11.4 Creating a new “self-signed” certificate

Página 53

Chapter 11 Web Interface146Verisign, Thawte, SecureSign, SecureNet, Microsoft Authenticode, etc.).To import a certificate, open the certificate file (*.c

Página 54

11.2 User logon and logout147• Primary domain — missing domain is acceptable in the name specification (e.g.jsmith), but it is also possible to include

Página 55

Chapter 11 Web Interface148HintURL for user logout from the firewall can be added to the web browser’s toolbar as a link. Usercan use this “button” for

Página 56

11.3 Status information and user statistics14911.3 Status information and user statisticsOn the Status tab, the following information is provided:User

Página 57

2.3 Installation15We recommend you to check through the following items before you run WinRoute installation:• Time of the operating system should be

Página 58 - 6.3 Connection Failover

Chapter 11 Web Interface150Figure 11.8 Current web restrictions and rules11.4 User preferencesThe Preferences tab allows setting of custom web content

Página 59

11.4 User preferences151Figure 11.9 Customized Web objects filteringThis option will block the window.open() method in JavaScript.• Cross-domain refere

Página 60 - Chapter 6 Internet Connection

Chapter 11 Web Interface152Figure 11.10 Editing user passwordWarningPasswords can be changed only if the user is configured in the WinRoute internal da

Página 61

11.5 Dial-up153Note: Language settings affect also the format of displaying date and numbers in the webinterface.11.5 Dial-upUsers allowed to dial RAS

Página 62 - 6.4 Network Load Balancing

154Chapter 12HTTP and FTP filteringWinRoute provides a wide range of features to filter traffic using HTTP and FTP protocols.These protocols are the most

Página 63

12.1 Conditions for HTTP and FTP filtering15512.1 Conditions for HTTP and FTP filteringFor HTTP and FTP content filtering, the following conditions must

Página 64

Chapter 12 HTTP and FTP filtering156Rules in this section are tested from the top of the list downwards (you can order the listentries using the arrow

Página 65

12.2 URL Rules157Figure 12.2 URL Rule — basic parametersOpen the General tab to set general rules and actions to be taken.DescriptionDescription of th

Página 66

Chapter 12 HTTP and FTP filtering158for example a rule allowing access to certain pages without authenticationcan be defined.2. Unless authentication is

Página 67 - Traffic Policy

12.2 URL Rules159Go to the Advanced tab to define more conditions for the rule or/and to set options for deniedpages.Figure 12.3 URL Rule — advanced pa

Página 68

Chapter 2 Introduction16Figure 2.1 Installation — customization by selecting optional componentsuse). This will install the WinRoute low-level driver

Página 69

Chapter 12 HTTP and FTP filtering160Denial optionsAdvanced options for denied pages. Whenever a user attempts to open a page that isdenied by the rule,

Página 70

12.2 URL Rules161Figure 12.4 Options for Websites with content meeting a URL ruleDeny Web pages containing ...Use this option to deny users to access

Página 71

Chapter 12 HTTP and FTP filtering162Figure 12.5 HTTP protocol inspector settings12.3 Global rules for Web elementsIn WinRoute you can also block certai

Página 72

12.4 Content Rating System (ISS OrangeWeb Filter)163Figure 12.6 Global rules for Web elementsAllow <applet> HTML tagsHTML <applet> tags (J

Página 73

Chapter 12 HTTP and FTP filtering164in the ISS OrangeWeb Filter tab will not be available). For detailed information about thelicensing policy, read ch

Página 74 - 7.2 How traffic rules work

12.4 Content Rating System (ISS OrangeWeb Filter)165Figure 12.7 ISS OrangeWeb Filter configuration• server name (e.g. www.kerio.com). Server name repre

Página 75

Chapter 12 HTTP and FTP filtering166On the URL Rules tab in Configuration → Content Filtering → HTTP Rules, define a rule by usingimage 12.8 as guidance:

Página 76

12.5 Web content filtering by word occurrence167Figure 12.9 ISS OrangeWeb Filter categoriesNote:1. You can define multiple URL rules that will use the I

Página 77

Chapter 12 HTTP and FTP filtering168WarningDefinition of forbidden words and treshold value is ineffective unless corresponding URL rulesare set!Definitio

Página 78

12.5 Web content filtering by word occurrence169• On the Content Rules tab, check the Deny Web pages containing... option to enablefiltering by word occ

Página 79

2.3 Installation17WarningIf the FAT32 file system is used, it is not possible to protect WinRoute in the way suggestedabove. For this reason, it is rec

Página 80

Chapter 12 HTTP and FTP filtering170Individual groups and words included in them are displayed in form of trees. To enablefiltering of particular words

Página 81

12.6 FTP Policy171WeightWord weight the level of how the word affects possible blocking or allowing of accessto websites. The weight should respect fre

Página 82

Chapter 12 HTTP and FTP filtering172FTP Rules DefinitionTo create a new rule, select a rule after which the new rule will be added, and click Add. Youca

Página 83

12.6 FTP Policy173Open the General tab to set general rules and actions to be taken.DescriptionDescription of the rule (information for the administra

Página 84

Chapter 12 HTTP and FTP filtering174Go to the Advanced tab to define other conditions that must be met for the rule to be appliedand to set advanced opt

Página 85

12.6 FTP Policy175Scan content for viruses according to scanning rulesUse this option to enable/disable scanning for viruses for FTP traffic which meet

Página 86

176Chapter 13Antivirus controlWinRoute provides antivirus check of objects (files) transmitted by HTTP, FTP, SMTP and POP3protocols. In case of HTTP an

Página 87 - 7.4 Basic Traffic Rule Types

13.2 How to choose and setup antiviruses177local network — incoming email at the local SMTP server). Check of outgoing trafficcauses problems with tempo

Página 88

Chapter 13 Antivirus control178Use the Integrated antivirus engine section in the Antivirus tab to set update parameters forMcAfee.Figure 13.2 Antivir

Página 89

13.2 How to choose and setup antiviruses179Last update check performed ... agoTime that has passed since the last update check.Virus database versionD

Página 90

Chapter 2 Introduction18Figure 2.2 Disabling colliding system services during installationNote:1. Upon each startup, WinRoute detects automatically wh

Página 91

Chapter 13 Antivirus control180Use the Options button to set advanced parameters for the selected antivirus. Dialogs for in-dividual antiviruses differ

Página 92

13.3 HTTP and FTP scanning181network send their email via an SMTP server located in the Internet. Checking of outgoingSMTP traffic is not apt for local

Página 93 - 7.5 Policy routing

Chapter 13 Antivirus control182To set parameters of HTTP and FTP antivirus check, open the HTTP, FTP scanning tab inConfiguration → Content Filtering →

Página 94

13.3 HTTP and FTP scanning183WarningWhen handling files in the quarantine directory, please consider carefully each actionyou take, otherwise a virus m

Página 95

Chapter 13 Antivirus control184Scanning rules are ordered in a list and processed from the top. Arrow buttons on the right canbe used to change the or

Página 96

13.4 Email scanning185ActionSettings in this section define whether or not the object will be scanned.If the Do not scan alternative is selected, antiv

Página 97

Chapter 13 Antivirus control186Advanced parameters and actions that will be taken when a virus is detected can be set in theEmail scanning tab.Figure

Página 98 - 7.8 Use of Full cone NAT

13.5 Scanning of files transferred via Clientless SSL-VPN187Note: Regardless of what action is set to be taken, the attachment is always removed anda w

Página 99

Chapter 13 Antivirus control188Figure 13.10 Settings for scanning of files transferred via Clientless SSL-VPNTransfer directionsUse the top section of

Página 100 - 7.9 Media hairpinning

189Chapter 14Definitions14.1 IP Address GroupsIP groups are used for simple access to certain services (e.g. WinRoute’s remote administration,Web serve

Página 101

2.5 WinRoute Engine Monitor19system start-up). It also provides easy access to the Administration Console. For details,refer to chapter 2.5.Note: WinR

Página 102 - 8.1 DNS Forwarder

Chapter 14 Definitions190Figure 14.2 IP group definitionTypeType of the new item:• Host (IP address or DNS name of a particular host),• Network / Mask (

Página 103

14.2 Time Intervals191Figure 14.3 WinRoute’s time intervalsTime range typesWhen defining a time interval three types of time ranges (subintervals) can

Página 104

Chapter 14 Definitions192Figure 14.4 Time range definitionValid at daysDefines days when the interval will be valid. You can either select particular wee

Página 105

14.3 Services193Figure 14.5 WinRoute’s network servicesClicking on the Add or the Edit button will open a dialog for service definition.Figure 14.6 Net

Página 106

Chapter 14 Definitions194DescriptionComments for the service defined. It is strongly recommended describing each definition,especially with non-standard

Página 107

14.3 Services195• Any — all the ports available (1-65535)• Equal to —a particular port (e.g.80)• Greater than, Less than — all ports with a number tha

Página 108 - 8.2 DHCP server

Chapter 14 Definitions196Note:1. Generally, protocol inspectors cannot be applied to secured traffic (SSL/TLS). In this case,WinRoute “perceives” the tra

Página 109

14.4 URL Groups197• Search engines — top Internet search engines.• Windows Updates — URL of pages requested for automatic updates of Windows.These URL

Página 110

Chapter 14 Definitions198Examples:• www.kerio.com/index.html — a particular page• www.*— all URL addresses starting with www. www.*• www.kerio.com — al

Página 111

199Chapter 15User Accounts and GroupsUser accounts in WinRoute improve control of user access to the Internet from the local net-work. User accounts c

Página 112

 Kerio Technologies. All Rights Reserved.This guide provides detailed description on the Kerio WinRoute Firewall, version 6.5.1.Improved version. All

Página 113

Chapter 2 Introduction20Start-up PreferencesWith these options WinRoute Engine and/or WinRoute Engine Monitor applications can beset to be launched au

Página 114

Chapter 15 User Accounts and Groups200Transparent cooperation with Active Directory (Active Directory mapping)WinRoute can use accounts and groups sto

Página 115

15.1 Viewing and definitions of user accounts201The searching is helpful especially when the domain includes too many accounts whichmight make it difficu

Página 116

Chapter 15 User Accounts and Groups202Note: It is also possible to select more than one account by using the Ctrl and Shiftkeys to perform mass change

Página 117

15.2 Local user accounts203Figure 15.2 Local user accounts in WinRouteStep 1 — basic informationFigure 15.3 Creating a user account — basic parameters

Página 118

Chapter 15 User Accounts and Groups204WarningThe user name is not case-sensitive. We recommend not to use special characters (non-English languages) w

Página 119

15.2 Local user accounts205Warning1. Passwords may contain printable symbols only (letters, numbers, punctuationmarks). Password is case-sensitive. We

Página 120 - 8.4 Proxy server

Chapter 15 User Accounts and Groups206Step 3 — access rightsFigure 15.5 Creating a new user account — user rightsEach user must be assigned one of the

Página 121

15.2 Local user accounts207is displayed. The unlock feature must also be enabled in the corresponding URL rule (fordetails, refer to chapter 12.2).Use

Página 122

Chapter 15 User Accounts and Groups208Figure 15.6 Creating a new user account — data transmission quotaCheck the Notify user by email when quota is ex

Página 123 - 8.5 HTTP cache

15.2 Local user accounts209Don’t block further traffic mode• resetting of the data volume counter of the user (see chapter 20.1).2. Actions for quota-ex

Página 124

2.6 Upgrade and Uninstallation21UninstallationTo uninstall WinRoute, stop all three WinRoute components. The Add/Remove Programsoption in the Control

Página 125

Chapter 15 User Accounts and Groups210set by using user’s web browser preferences, language set as preferred for the previous user’slogin to the web i

Página 126

15.3 Local user database: external authentication and import of accounts211Automatic login can be set for the firewall (i.e. for the WinRoute host) or/

Página 127

Chapter 15 User Accounts and Groups212Active DirectoryUse the Enable Active Directory authentication option to enable/disable user authentication atth

Página 128

15.3 Local user database: external authentication and import of accounts213Figure 15.10 Configuration of automatic import of user accounts from Active

Página 129

Chapter 15 User Accounts and Groups214domain type, specify the following parameters:• NT domain — domain name is required for import. The WinRoute hos

Página 130 - Bandwidth Limiter

15.4 Active Directory domains mapping215Note: The Windows NT domain cannot be mapped as described. In case of the Windows NTdomain, it is recommended

Página 131

Chapter 15 User Accounts and Groups216Figure 15.13 Active Directory domain mappingDomain AccessIn the Domain Access section, specify the login user na

Página 132

15.4 Active Directory domains mapping217Figure 15.14 Advanced settings for access to the Active DirectoryNT authentication supportFor the Active Direc

Página 133

Chapter 15 User Accounts and Groups218One domain is always set as primary. In this domain, all user accounts where the domain isnot specified, will be

Página 134

15.5 User groups219The following operations will be performed automatically within each conversion:• substitution of any appearance of the local accou

Página 135

Chapter 2 Introduction222.7 Configuration WizardUsing this Wizard you can define all basic WinRoute parameters. It is started automatically bythe instal

Página 136

Chapter 15 User Accounts and Groups220DomainUse the Domain option to select a domain for which user accounts or other parameterswill be defined. This i

Página 137 - User Authentication

15.5 User groups221Step 2 — group membersFigure 15.19 Creating a user group — adding user accounts to the groupUsing the Add and Remove buttons you ca

Página 138

Chapter 15 User Accounts and Groups222The group must be assigned one of the following three levels of access rights:No access to administrationUsers i

Página 139

223Chapter 16Remote Administration and Update Checks16.1 Setting Remote AdministrationRemote administration can be either permitted or denied by defini

Página 140

Chapter 16 Remote Administration and Update Checks224HintThe same method can be used to enable or disable remote administration of Kerio MailServerthr

Página 141 - Web Interface

16.2 Update Checking225Check for new versionsUse this option to enable/disable automatic checks for new versions. Checks are per-formed:• 2 minutes af

Página 142

Chapter 16 Remote Administration and Update Checks226Figure 16.3 Administration Console’s welcome page informing that a new version is available

Página 143

227Chapter 17Advanced security features17.1 P2P EliminatorPeer-to-Peer (P2P) networks are world-wide distributed systems, where each node can repre-se

Página 144

Chapter 17 Advanced security features228Figure 17.1 Detection settings and P2P EliminatorCheck the Inform user by email option if you wish that users

Página 145

17.1 P2P Eliminator229Note:1. If a user who is allowed to use P2P networks (see chapter 15.1) is connected to the fire-wall from a certain host, no P2P

Página 146 - 11.2 User logon and logout

2.7 Configuration Wizard23and administration. Thus WinRoute will enable all traffic between the firewall and the remotehost.Note: Skip this step if you in

Página 147

Chapter 17 Advanced security features230Number of suspicious connectionsBig volume of connections established from the client host is a typical featur

Página 148

17.2 Special Security Settings231Figure 17.4 Security options — Anti-Spoofing and cutting down number of connections for one hostAnti-SpoofingAnti-Spoofi

Página 149

Chapter 17 Advanced security features232Connections count limit is useful especially when a local client host is attacked by a wormor Trojan horse whi

Página 150 - 11.4 User preferences

233Chapter 18Other settings18.1 Routing tableUsing Administration Console you can view or edit the system routing table of the host whereWinRoute is r

Página 151

Chapter 18 Other settings234WarningChanges in the routing table might interrupt the connection between the WinRoute FirewallEngine and the Administrat

Página 152

18.1 Routing table235Definitions of Dynamic and Static RulesClick on the Add (or Edit when a particular route is selected) button to display a dialog f

Página 153 - 11.5 Dial-up

Chapter 18 Other settings236If this option is not enabled, the route will be valid only until the operating system isrestarted or until removed manual

Página 154 - HTTP and FTP filtering

18.2 Universal Plug-and-Play (UPnP)237Enable UPnPThis option enables UPnP.WarningIf WinRoute is running on Windows XP, Windows Server 2003, Windows Vi

Página 155 - 12.2 URL Rules

Chapter 18 Other settings23818.3 Relay SMTP serverWinRoute provides a function which enables notification to users or/and administrators byemail alerts

Página 156

18.3 Relay SMTP server239be used for reference in recipient’s mail client or for email classification. This is why it isalways recommended to specify s

Página 157

24Chapter 3WinRoute AdministrationAll Kerio products including WinRoute are administered through the Kerio AdministrationConsole application(an applic

Página 158

240Chapter 19Status InformationWinRoute activities can be well monitored by the administrator (or by other users with ap-propriate rights). There are

Página 159

19.1 Active hosts and connected users241Figure 19.1 List of active hosts and users connected to the firewallUserName of the user which is connected fro

Página 160

Chapter 19 Status Information242ConnectionsTotal number of connections to and from the host. Details can be displayed in the contextmenu (see below)Au

Página 161

19.1 Active hosts and connected users243User quotaUse this option to show quota of the particular user (Administration Console switches tothe User quo

Página 162

Chapter 19 Status Information244Login informationInformation on logged-in users:• User — name of a user, DNS name (if available) and IP address of the

Página 163

19.1 Active hosts and connected users245• FTP — DNS name or IP address of the server, size of downloaded/saved data,information on currently downloade

Página 164

Chapter 19 Status Information246The following columns are hidden by default. They can be shown through the Modify columnsdialog opened from the contex

Página 165

19.2 Network connections overview247Figure 19.6 Information on selected host and user — traffic histogramSelect an item from the Time interval combo box

Página 166

Chapter 19 Status Information248• connections from other hosts to services provided by the host with WinRoute• connections performed by clients within

Página 167

19.2 Network connections overview249Source, DestinationIP address of the source (the connection initiator) and of the destination. If there is anappro

Página 168

3.1 Administration Window25Figure 3.1 The main window of Administration Console for WinRouteAdministration Window — Main menuThe main menu provides th

Página 169

Chapter 19 Status Information250Figure 19.8 Context menu for ConnectionsRefreshThis option will refresh the information in the Connections window imme

Página 170

19.3 Alerts251For each item either a color or the Default option can be chosen. Default colors are set in theoperating system (the common setting for

Página 171 - 12.6 FTP Policy

Chapter 19 Status Information252This tab provides list of “rules” for alert sending. Use checking boxes to enable/disable indi-vidual rules.Use the Ad

Página 172

19.3 Alerts253• Connection failover event — the Internet connection has failed and the systemwas switched to a secondary line, or vice versa (it was s

Página 173

Chapter 19 Status Information254(overview),• the console\details subdirectory — messages displayed at the bottom section ofStatus → Alerts (details),•

Página 174

19.3 Alerts255Each line provides information on one alert:• Date — date and time of the event,• Alert — event type,• Details — basic information on ev

Página 175

256Chapter 20Basic statisticsStatistical information about users (volume of transmitted data, used services, categorizationof web pages) as well as of

Página 176 - Antivirus control

20.1 Volume of transferred data and quota usage257Figure 20.1 User statisticsNote:1. Optionally, other columns providing information on volume of data

Página 177

Chapter 20 Basic statistics258WarningBe aware that using this option for the all users item resets counters of all users, includingunrecognized ones!N

Página 178

20.2 Interface statistics259Figure 20.3 Firewall’s interface statisticsExampleThe WinRoute host connects to the Internet through the Public interface

Página 179

Chapter 3 WinRoute Administration26• Copy license number to clipboard — copies the license number (the ID licenceitem) to the clipboard. This may be h

Página 180

Chapter 20 Basic statistics260Reset interface statisticsThis option resets statistics of the selected interface. It is available only if the mousepoin

Página 181 - 13.3 HTTP and FTP scanning

20.2 Interface statistics261Figure 20.5 Chart informing about average throughput at the interfaceExampleSuppose the 1 day interval is selected. Then,

Página 182

262Chapter 21Kerio StaR — statistics and reportingThe WinRoute’s web interface provides detailed statistics on users, volume of transferred data,visit

Página 183

21.1 Monitoring and storage of statistic data263The statistics use data from the main database. This implies that current traffic of individualusers is

Página 184

Chapter 21 Kerio StaR — statistics and reporting264The following example addresses case of a mapped web server accessible from the Internet.Any (anony

Página 185 - 13.4 Email scanning

21.2 Settings for statistics and quota265Enable/disable gathering of statistic dataThe Gather Internet Usage statistics option enables/disables all st

Página 186

Chapter 21 Kerio StaR — statistics and reporting266Statistics and quota exceptionsOn the Exceptions tab, it is possible to define exceptions for statis

Página 187

21.3 Connection to StaR and viewing statistics267For details on IP groups, see chapter 14.1.Users and groupsSelect users and/or user groups which will

Página 188

Chapter 21 Kerio StaR — statistics and reporting268Note: Within local systems, secured traffic would be useless and the browser would botheruser with ne

Página 189 - Definitions

21.3 Connection to StaR and viewing statistics269WarningIn case of access via the Internet (i.e. from a remote host) it is recommended to use only the

Página 190 - 14.2 Time Intervals

3.2 View Settings27Detection of WinRoute Firewall Engine connection drop-outAdministration Console is able to detect the connection failure automatica

Página 191

Chapter 21 Kerio StaR — statistics and reporting270Printable versionAny page of the StaR interface can be converted to a printable version. For this p

Página 192 - 14.3 Services

21.4 Accounting period271Figure 21.7 Selection of accounting periodFigure 21.8 Custom accounting periodThe starting and ending day can be defined manua

Página 193

Chapter 21 Kerio StaR — statistics and reporting27221.5 Overall ViewThe Overall tab provides overall statistics for all users within the local network

Página 194

21.5 Overall View273Figure 21.10 Chart of top visited web domainsTop Requested Web CategoriesThis chart shows top five web categories requested in the

Página 195

Chapter 21 Kerio StaR — statistics and reporting274Figure 21.12 Top 5 users statisticster 10.1.HintThe way of users’ names are displayed in the table

Página 196 - 14.4 URL Groups

21.5 Overall View275For better reference, WinRoute sorts protocols to predefined classes:• Web — HTTP and HTTPS protocols and any other traffic served by

Página 197

Chapter 21 Kerio StaR — statistics and reporting27621.6 User statisticsThe Individual tab allows showing of statistics for a selected user.First, sele

Página 198

21.7 Users’ Activity27721.7 Users’ ActivityThe Users’ Activity tab allows showing of detailed information on “browsing activities” of in-dividual user

Página 199 - User Accounts and Groups

Chapter 21 Kerio StaR — statistics and reporting278• Updating data in StaR — to WinRoute, gathering and evaluation of information forStaR means proces

Página 200

21.7 Users’ Activity279The header informs about the total number of visited web pages in the selected periodand the total number of web searches. WinR

Página 201

Chapter 3 WinRoute Administration28Figure 3.4 Column customization in InterfacesThis dialog offers a list of all columns available for a corresponding

Página 202 - 15.2 Local user accounts

Chapter 21 Kerio StaR — statistics and reporting280The header informs about number of detected email messages and total volume of datatransferred by e

Página 203 - Step 1 — basic information

21.7 Users’ Activity281The header informs about total number of recognized files, total volume of transferreddata (in both directions), data transferre

Página 204

Chapter 21 Kerio StaR — statistics and reporting282rules — e.g. by browsing through banned web pages on a remote host or by transferringforbidden files

Página 205

21.9 Top Visited Websites283Figure 21.23 The Users by Traffic tableHintThe way of users’ names are displayed in the table can be set in the Administrati

Página 206

Chapter 21 Kerio StaR — statistics and reporting284Figure 21.24 Top visited web domainsthe particular domain (the www prefix is attached to the domain

Página 207

21.10 Top Requested Web Categories285Figure 21.26 Table of top active users for the particular domainHintThe way of users’ names are displayed in the

Página 208

Chapter 21 Kerio StaR — statistics and reporting286Below the chart, detailed statistics for each of top ten visited web categories are shown:• The hea

Página 209

21.10 Top Requested Web Categories287HintThe way of users’ names are displayed in the table can be set in the Administration Console,in section Accoun

Página 210

288Chapter 22LogsLogs are files where history of certain events performed through or detected by WinRoute arerecorded and kept. Each log is displayed i

Página 211

22.1 Log settings289Figure 22.1 Log settingsFile LoggingUse the File Loggingtab to define file name and rotation parameters.Enable logging to fileUse thi

Página 212

29Chapter 4Product Registration and LicensingWhen purchased, Kerio WinRoute Firewall must be registered, Upon registration of the product,so called li

Página 213

Chapter 22 Logs290Figure 22.2 File logging settingsKeep at most ... log file(s)Maximal count of log files that will be stored. Whenever the threshold is

Página 214

22.2 Logs Context Menu291Figure 22.3 Syslog settingsSyslog serverDNS name or IP address of the Syslog server.FacilityFacility that will be used for th

Página 215

Chapter 22 Logs292CopyCopies the selected text onto the clipboard. A key shortcut from the operating systemcan be used (Ctrl+C or Ctrl+Insert in Windo

Página 216

22.2 Logs Context Menu293HighlightingHighlighting may be set for logs meeting certain criteria (for details, see below).Select fontWithin this dialog

Página 217

Chapter 22 Logs294Figure 22.6 Log highlighting settingsFigure 22.7 Highlighting rule definitionEach highlighting rule consists of a condition and a col

Página 218

22.3 Alert Log295The Debug log advanced settingsSpecial options are available in the Debug log context menu. These options are available onlyto users

Página 219 - 15.5 User groups

Chapter 22 Logs2962. Configuration database changesChanges performed in the Administration Console. A simplified form of the SQL languageis used when co

Página 220

22.5 Connection Log29722.5 Connection LogThe Connection log gathers information about traffic matching traffic rules with the Log match-ing connections en

Página 221

Chapter 22 Logs29822.6 Debug LogDebug (debug information) is a special log which can be used to monitor certain kinds ofinformation, especially for pr

Página 222

22.7 Dial Log299Figure 22.9 Selection of information monitored by the Debug log• WinRoute services — protocols processed by WinRoute services (DHCP se

Página 223 - Chapter 16

3Contents1 Quick Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Página 224 - 16.2 Update Checking

Chapter 4 Product Registration and Licensing30McAfee licenseThis license is defined by the two following dates:• update right expiration date (independ

Página 225

Chapter 22 Logs300The first log item is reported upon initialization of dialing. The log always includesWinRoute name of the dialed line (see chapter 5

Página 226

22.8 Error Log301Another event is logged upon a successful connection (i.e. when the line is dialed, uponauthentication on a remote server, etc.).5. O

Página 227 - Advanced security features

Chapter 22 Logs302Each record in the Error log contains error code and sub-code as two numbers in parentheses(x y). The error code (x) may fall into o

Página 228

22.9 Filter Log30322.9 Filter LogThis log gathers information on web pages and objects blocked/allowed by the HTTP and FTPfilters (see chapters 12.2 an

Página 229

Chapter 22 Logs304• Local traffic — the name of the traffic rule that was matched by the packet• packet to — packet direction (either to or from a parti

Página 230

22.10 Http log305An example of an HTTP log record in the Apache format192.168.64.64 - jflyaway[18/Apr/2008:15:07:17 +0200]"GET http://www.kerio.c

Página 231

Chapter 22 Logs306• DIRECT — the WWW server access method (WinRoute always uses DIRECT access)• 206.168.0.9 — IP address of the WWW server22.11 Securi

Página 232

22.12 Sslvpn Log307Example 1[17/Jul/2008 11:55:14] FTP: Bounce attack attempt:client: 1.2.3.4, server: 5.6.7.8,command: PORT 10,11,12,13,14,15(attack

Página 233 - Other settings

Chapter 22 Logs308Example[17/Mar/2008 08:01:51] Copy File: User: [email protected]: ’\\server\data\www\index.html’22.13 Warning LogThe Warning lo

Página 234

22.14 Web Log309Note: With the above three examples, the relevant records will also appear in the Securitylog.22.14 Web LogThis log contains all HTTP

Página 235

4.2 License information31Figure 4.1 Administration Console welcome page providing license informationCopyrightCopyright information.HomepageLink to th

Página 236

310Chapter 23Kerio VPNWinRoute enables secure interconnection of remote private networks using an encrypted tun-nel and it provides clients secure acc

Página 237

23.1 VPN Server Configuration311• No special user accounts must be created for VPN clients. User accounts in WinRoute(or domain accounts if the Active

Página 238 - 18.3 Relay SMTP server

Chapter 23 Kerio VPN312Figure 23.2 VPN server settings — basic parametersEnable VPN serverUse this option to enable /disable VPN server. VPN server us

Página 239

23.1 VPN Server Configuration313It is recommended to check whether IP collision is not reported after each change inconfiguration of the local network o

Página 240 - Status Information

Chapter 23 Kerio VPN314DNSFigure 23.4 VPN server settings — specification of DNS serversSpecify a DNS server which will be used for VPN clients:• Use W

Página 241

23.1 VPN Server Configuration315Figure 23.5 VPN server settings — server port and routes for VPN clientsupon clicking on the Apply button:(4103:10048)

Página 242

Chapter 23 Kerio VPN31623.2 Configuration of VPN clientsThe following conditions must be met to enable connection of remote clients to local networksvi

Página 243

23.3 Interconnection of two private networks via the Internet (VPN tunnel)317items). To generate the rules automatically, select Yes, I want to use Ke

Página 244

Chapter 23 Kerio VPN318Figure 23.7 VPN tunnel configurationThe passive mode is only useful when the local end of the tunnel has a fixed IPaddress and wh

Página 245

23.3 Interconnection of two private networks via the Internet (VPN tunnel)319Figure 23.8 VPN tunnel — certificate fingerprintsIf the local endpoint is s

Página 246

Chapter 4 Product Registration and Licensing32CompanyName of the company (or a person) to which the product is registered.Depending on the current lic

Página 247

Chapter 23 Kerio VPN320Routing settingsOn the Advanced tab, you can set which method will be used to add routes provided by theremote endpoint of the

Página 248

23.3 Interconnection of two private networks via the Internet (VPN tunnel)321Connection establishmentActive endpoints automatically attempt to recover

Página 249

Chapter 23 Kerio VPN322Figure 23.11 Common traffic rules for VPN tunnel2. Traffic rules set by this method allow full IP communication between the local n

Página 250

23.5 Example of Kerio VPN configuration: company with a filial office323sions, custom routes are used as prior. This option easily solves the problem wher

Página 251 - 19.3 Alerts

Chapter 23 Kerio VPN324networks). Configuration of VPN with redundant routes (typically in case of a company withtwo or more filials) is described in ch

Página 252 - Figure 19.11 Alert Definitions

23.5 Example of Kerio VPN configuration: company with a filial office325Suppose that both networks are already deployed and set according to the figure and

Página 253

Chapter 23 Kerio VPN326local hosts into the hosts file (if they use IP addresses) or enable cooperation of the DNSForwarder with the DHCP server (in ca

Página 254

23.5 Example of Kerio VPN configuration: company with a filial office327Figure 23.13 Headquarters — no restrictions are applied to accessing the Internet

Página 255

Chapter 23 Kerio VPN328When the VPN tunnel is created, customize these rules according to the restriction re-quirements (see item 6).Note: To keep the

Página 256 - Basic statistics

23.5 Example of Kerio VPN configuration: company with a filial office329• Set the IP address of this interface (10.1.1.1) as a primary DNS server for theW

Página 257 - Figure 20.1 User statistics

4.3 Registration of the product in the Administration Console33Clicking on Become a registered trial user launches the registration wizard.1. On the fi

Página 258 - 20.2 Interface statistics

Chapter 23 Kerio VPN330Figure 23.19 Headquarters — VPN server configurationFor a detailed description on the VPN server configuration, refer to chapter

Página 259

23.5 Example of Kerio VPN configuration: company with a filial office3315. Create a passive end of the VPN tunnel (the server of the branch office uses a dy

Página 260

Chapter 23 Kerio VPN332Figure 23.21 Headquarter — final traffic rules• Add the Company headquarters rule allowing connections from both headquar-ters sub

Página 261

23.5 Example of Kerio VPN configuration: company with a filial office333In this case, it would be meaningless to create rules for the Kerio VPN server and

Página 262 - Chapter 21

Chapter 23 Kerio VPN334Figure 23.25 Filial office — DNS forwarder configurationFigure 23.26 Filial office — DNS forwarding settings• Set the IP address of

Página 263

23.5 Example of Kerio VPN configuration: company with a filial office335Figure 23.27 Filial office — TCP/IP configuration ata firewall’s interface connected t

Página 264

Chapter 23 Kerio VPN336(newyork.company.com). Use the fingerprint of the VPN server of the headquarters as aspecification of the fingerprint of the remot

Página 265

23.6 Example of a more complex Kerio VPN configuration3376. Add the new VPN tunnel into the Local Traffic rule. It is also possible to remove the Dial-In

Página 266

Chapter 23 Kerio VPN338tunnels (so called triangle pattern). This example can be then adapted and applied to anynumber of interconnected private netwo

Página 267

23.6 Example of a more complex Kerio VPN configuration339Note: For every installation of WinRoute, a stand-alone license for the corresponding num-ber

Página 268

Chapter 4 Product Registration and Licensing34Figure 4.3 Trial version registration — user informationFigure 4.4 Trial version registration — other in

Página 269

Chapter 23 Kerio VPN3407. Allow traffic between the local and the remote networks. To allow any traffic, just add thecreated VPN tunnels to the Source and

Página 270 - 21.4 Accounting period

23.6 Example of a more complex Kerio VPN configuration341In step 5, select Create rules for Kerio VPN server. Status of the Create rules for KerioClien

Página 271

Chapter 23 Kerio VPN342• Enable the Use custom forwarding option and define rules for names in thefilial1.company.com and filial2.company.com domains.

Página 272 - 21.5 Overall View

23.6 Example of a more complex Kerio VPN configuration343Figure 23.37 Headquarter — TCP/IP configuration ata firewall’s interface connected to the local

Página 273

Chapter 23 Kerio VPN3444. Enable the VPN server and configure its SSL certificate (create a self-signed certificate if nocertificate provided by a certific

Página 274

23.6 Example of a more complex Kerio VPN configuration3455. Create a passive endpoint of the VPN tunnel connected to the London filial. Use the fin-gerpr

Página 275

Chapter 23 Kerio VPN346Figure 23.40 The headquarters — routing configuration for the tunnel connected to the London filialWarningIn case that the VPN co

Página 276 - 21.6 User statistics

23.6 Example of a more complex Kerio VPN configuration3476. Use the same method to create a passive endpoint for the tunnel connected to the Parisfilial

Página 277 - 21.7 Users’ Activity

Chapter 23 Kerio VPN348Figure 23.42 The headquarters — routing configuration for the tunnel connected to the Paris filialFigure 23.43 Headquarter — final

Página 278

23.6 Example of a more complex Kerio VPN configuration349Configuration of the London filial1. Install WinRoute (version 6.1.0 or higher) at the default g

Página 279

4.3 Registration of the product in the Administration Console35Figure 4.5 Registration of the trial version — summaryFigure 4.6 Trial version registra

Página 280

Chapter 23 Kerio VPN350warded (primary and secondary DNS server of the Internet connection providerby default).Figure 23.46 The London filial office — de

Página 281

23.6 Example of a more complex Kerio VPN configuration351• Set the IP address of this interface (172.16.1.1) as a primary DNS server for theWinRoute ho

Página 282 - 21.8 Users by Traffic

Chapter 23 Kerio VPN352our example, the ping gw-newyork.company.com command can be used at the Londonbranch office server.Figure 23.50 The London filial

Página 283 - 21.9 Top Visited Websites

23.6 Example of a more complex Kerio VPN configuration353Figure 23.51 The London filial — routing configuration for the tunnel connected to the headquart

Página 284

Chapter 23 Kerio VPN3546. Create a passive endpoint of the VPN tunnel connected to the Paris filial. Use the finger-print of the VPN server of the Paris

Página 285

23.6 Example of a more complex Kerio VPN configuration355Figure 23.53 The London filial — routing configurationfor the tunnel connected to the Paris bran

Página 286

Chapter 23 Kerio VPN356Configuration of the Paris filial1. Install WinRoute (version 6.1.0 or higher) at the default gateway of the filial’s network.2. U

Página 287

23.6 Example of a more complex Kerio VPN configuration3573. Customize DNS configuration as follows:• In configuration of the DNS Forwarder in WinRoute, s

Página 288 - 22.1 Log settings

Chapter 23 Kerio VPN358Note: The VPN network and Mask entries now include an automatically selected free sub-net. Check whether this subnet does not c

Página 289 - Figure 22.1 Log settings

23.6 Example of a more complex Kerio VPN configuration3595. Create an active endpoint of the VPN tunnel which will connect to the headquarters server(n

Página 290

Chapter 4 Product Registration and Licensing36Registration of the purchased productFollow the Register product with a purchased license number link to

Página 291 - 22.2 Logs Context Menu

Chapter 23 Kerio VPN360Paris branch office server.Figure 23.61 The Paris filial — routing configuration for the tunnel connected to the headquarters

Página 292

23.6 Example of a more complex Kerio VPN configuration3616. Create an active endpoint of the tunnel connected to London (servergw-london.company.com).

Página 293

Chapter 23 Kerio VPN362Figure 23.63 The Paris filial — routing configurationfor the tunnel connected to the London branch officeFigure 23.64 The Paris fili

Página 294

363Chapter 24Kerio Clientless SSL-VPNKerio Clientless SSL-VPN (thereinafter “SSL-VPN”) is a special interface used for secured remoteaccess to shared

Página 295 - 22.4 Config Log

Chapter 24 Kerio Clientless SSL-VPN364Click Advanced to open a dialog where port and SSL certificate for SSL-VPN can be set.Figure 24.2 Setting of TCP

Página 296

24.2 Usage of the SSL-VPN interface36524.2 Usage of the SSL-VPN interfaceFor access to the interface, most of common graphical web browsers can be use

Página 297 - 22.5 Connection Log

Chapter 24 Kerio Clientless SSL-VPN366• If it is a mapped Active Directory domain which is not set as pri-mary, the domain must be included in the use

Página 298 - 22.6 Debug Log

24.2 Usage of the SSL-VPN interface367Right under the navigation tree, actions available for the specified location (i.e. for the se-lected item or fol

Página 299 - 22.7 Dial Log

Chapter 24 Kerio Clientless SSL-VPN368Figure 24.6 Clientless SSL-VPN — new bookmarkExamples of operations with files and foldersIn this section, severa

Página 300

24.2 Usage of the SSL-VPN interface369Figure 24.8 Clientless SSL-VPN — destination path (folder) selectionFigure 24.9 Clientless SSL-VPN — copying or

Página 301 - 22.8 Error Log

4.3 Registration of the product in the Administration Console37Figure 4.8 Product registration — license numbersof additional components, add-ons and

Página 302

Chapter 24 Kerio Clientless SSL-VPN370a standard download dialog.It is not possible to download whole folders or multiple files at a time.Uploading file

Página 303 - 22.9 Filter Log

371Chapter 25Specific settings and troubleshootingThis chapter provides description of advanced features and specific configurations of the fire-wall. It

Página 304 - 22.10 Http log

Chapter 25 Specific settings and troubleshooting372For details on traffic between the WinRoute Firewall Engine and theAdministration Console, refer to Ke

Página 305

25.1 Configuration Backup and Transfer373starThe star directory includes a complete database for statistics of the WinRoute web inter-face.Handling con

Página 306 - 22.11 Security Log

Chapter 25 Specific settings and troubleshooting3748. Use a plaintext editor (e.g. Notepad) to open the winroute.cfg configuration file. Go tothe followi

Página 307 - 22.12 Sslvpn Log

25.2 Automatic user authentication using NTLM375Note: The method described above includes a complete “clone” of WinRoute on a new host.Some of the ste

Página 308 - 22.13 Warning Log

Chapter 25 Specific settings and troubleshooting376Figure 25.1 NTLM — user authentication optionsFigure 25.2 Setting of NT authentication for local use

Página 309 - 22.14 Web Log

25.2 Automatic user authentication using NTLM377Figure 25.4 Configuration of WinRoute’s Web InterfaceWeb browsersFor proper functioning of NTLM, a brow

Página 310 - Kerio VPN

Chapter 25 Specific settings and troubleshooting378Firefox/SeaMonkeyThe browser displays the login dialog. For security reasons, automatic user authent

Página 311 - 23.1 VPN Server Configuration

25.3 FTP on WinRoute’s proxy server379Terminal FTP clients (such as the ftp command in Windows or Linux) do not allow config-uration of the proxy serve

Página 312

Chapter 4 Product Registration and Licensing38Figure 4.9 Product registration — user information4. Page four includes optional information. Is is not

Página 313

Chapter 25 Specific settings and troubleshooting380HintTo configure web browsers, you can use a configuration script or the automatic detection ofconfigur

Página 314

25.4 Internet links dialed on demand381HintThe defined proxy server is indexed and saved to the list of proxy servers automatically. Later,whenever you

Página 315

Chapter 25 Specific settings and troubleshooting382net would be routed via this interface (no matter where it is actually connected to) andWinRoute wou

Página 316

25.4 Internet links dialed on demand383will be dialed upon a client’s DNS query. If a local DNS server is used, the line will bedialed upon a query se

Página 317

Chapter 25 Specific settings and troubleshooting384To avoid unintentional dialing based on DNS requests, WinRoute allows definition of ruleswhere DNS na

Página 318

25.4 Internet links dialed on demand385Activate the Enable dialing for local DNS names option in the Other settings tab to enablethis (at the top of t

Página 319

386Chapter 26Technical supportFree email and telephone technical support is provided for Kerio WinRoute Firewall. For con-tacts, see the end of this c

Página 320

26.2 Tested in Beta version387The text file will be stored in the home directory of the logged user.(e.g. C:\Documents and Settings\Administrator)as ke

Página 321

Chapter 26 Technical support388USAKerio Technologies Inc.111 W. Saint John Street, Suite 1100San Jose, CA 95113Phone: +1 408 496 4500http://www.kerio.

Página 322

389Appendix ALegal NoticesMicrosoft, Windows, Windows NT, Windows Vista, Internet Explorer, ActiveX, and ActiveDirectoryare trademarks or regis

Página 323

4.3 Registration of the product in the Administration Console39Figure 4.10 Product registration — other informationFigure 4.11 Product registration —

Página 324

390Appendix BUsed open-source librariesKerio WinRoute Firewall contains the following open-source libraries:bindlibCopyright 1983, 1993 The Regents o

Página 325

391PHPCopyright  1999-2006 The PHP Group. All rights reserved.This product includes PHP software, freely availablefrom http://www.php.net/software/.p

Página 326

392Glossary of termsActiveXThis Microsoft’s proprietary technology is used for creation of dynamic objects for webpages. This technology provides many

Página 327

393DMZDMZ (demilitarized zone) is a reserved network area where services available both fromthe Internet and from the LAN are run (e.g. a company’s pu

Página 328

Glossary of terms394IdentThe Ident protocol is used for identification of user who established certain TCP connec-tion from a particular (multi-user) s

Página 329

395will be redirected to this host. Packets that do not match with any record in theNAT table will be dropped.• destination address translation (Desti

Página 330 - Chapter 23 Kerio VPN

Glossary of terms396Ports 1-1023 are reserved and used by well known services (e.g. 80 = WWW). Ports above1023 can be freely used by any application.P

Página 331

397Routing tableThe information used by routers when making packet forwarding decisions (so calledroutes). Packets are routed according to the packet’

Página 332

Glossary of terms398• RST (Reset) — request on termination of a current connection and on initiationof a new one• URG (Urgent) — urgent packet• PSH (P

Página 333

399IndexAActive Directory 205, 212automatic import of accounts 212domain mapping 214import of user accounts 213multiple domains mapping 217administrat

Página 334

47.9 Media hairpinning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1008 Configuration of

Página 335

Chapter 4 Product Registration and Licensing404.4 Product registration at the websiteIf, by any reason, registration of WinRoute cannot be performed f

Página 336

Index400forwarding rules 104hosts file 106local domain 107dynamic DNS 118FFTP 154, 195, 378filtering rules 171full cone NAT 83Ggroupsinterface throughpu

Página 337

401web 309Mmedia hairpinning 100multihoming 90NNAT 81, 87full cone NAT 83, 98NT domain 212import of user accounts 213NTLM 137, 139, 212configuration of

Página 338

Index402top visited websites 283user groups 256users’ activity 277volume of transferred data 282status information 240active hosts 240connections 247s

Página 339

403security center 18Windows Firewall 17, 18WinRoute Engine Monitor 18, 19WinRoute Firewall Engine 18wizardconfiguration 22traffic rules 67

Página 341

4.5 Subscription / Update Expiration41Administrators are informed in two ways:• By a pop-up bubble tip (this function is featured by the WinRoute Engi

Página 342

Chapter 4 Product Registration and Licensing42Figure 4.13 The notice that the subscription has already expired4.6 User counterThis chapter provides a

Página 343

4.6 User counter43The following items are considered as clients:1. All hosts from which users are connected to the firewall2. All clients of the WinRou

Página 344

44Chapter 5Network interfacesWinRoute is a network firewall. This implies that it represents a gateway between two or morenetworks (typically between t

Página 345

45change of a network adapter etc., there is no need to edit traffic rules — simple adding of thenew interface in the correct group will do.In WinRoute,

Página 346

Chapter 5 Network interfaces46IP Address and MaskIP address and the mask of this interface’s subnet.If the more IP addresses are set for the interface

Página 347

47Figure 5.2 Editing interfacesRemoveRemoves the selected interface from WinRoute. This can be done under the followingconditions:• the interface is a

Página 348

Chapter 5 Network interfaces48handle the line by hand.Note: You can use WinRoute’s web interface (see chapter 11) to dial or hang uplines.• For VPN tu

Página 349

49Chapter 6Internet ConnectionThe basic function of WinRoute is connection of the local network to the Internet via one ormore Internet connections (I

Página 350

515 User Accounts and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19915.1 Viewing and

Página 351

Chapter 6 Internet Connection50This involves selection of the Internet connection type in the Configuration → Interfaces sec-tion of the WinRoute config

Página 352

6.1 Persistent connection with a single link51Figure 6.1 Traffic Policy Wizard — persistent connection with a single linkFigure 6.2 Network Policy Wizar

Página 353

Chapter 6 Internet Connection52Resulting interface configurationWhen you finish set-up in Traffic Policy Wizard, the resulting configuration can be viewedu

Página 354

6.2 Connection with a single leased link — dial on demand536.2 Connection with a single leased link — dial on demandIf the WinRoute host is connected

Página 355

Chapter 6 Internet Connection54Figure 6.4 Traffic Policy Wizard — dial on demandFigure 6.5 Network Policy Wizard — selection of an interface for the Int

Página 356

6.2 Connection with a single leased link — dial on demand55Figure 6.6 Configuration of interfaces — an on-demand dial linkpackets to the corresponding

Página 357

Chapter 6 Internet Connection56Figure 6.7 Interface properties — dialing settingsFor these purposes, it is possible to set time intervals for persiste

Página 358

6.2 Connection with a single leased link — dial on demand57connection is recovered automatically.• If the connection is set to be hung-up at the momen

Página 359

Chapter 6 Internet Connection58WarningWinRoute is running in the operating system as a service. Therefore, external applica-tions and operating system

Página 360 - Paris branch office server

6.3 Connection Failover59a new default route via this link which allows us to test Internet connection on thesecondary link.• In case of two leased li

Página 361

622.4 Config Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29522.5 Conn

Página 362

Chapter 6 Internet Connection60Figure 6.10 Traffic Policy Wizard — failover of a leased link by a dial-upResulting interface configurationWhen you finish

Página 363 - Kerio Clientless SSL-VPN

6.3 Connection Failover61The Internet interfaces group includes the Internet and the Dial-up link selected as primary andsecondary (failover) on the t

Página 364

Chapter 6 Internet Connection62Note:1. Probe hosts must not block ICMP Echo Requests (PING) since such requests are used to testavailability of these

Página 365

6.4 Network Load Balancing63Both the primary and the secondary link may be configured automatically by the DHCP proto-col. In that case, WinRoute looks

Página 366

Chapter 6 Internet Connection64On the third page of the wizard, add all links (one by one) which you intend to use for trafficload balancing.Figure 6.14

Página 367

6.4 Network Load Balancing65Resulting interface configurationWhen you finish set-up in Traffic Policy Wizard, the resulting configuration can be viewedunde

Página 368

Chapter 6 Internet Connection66Advanced settings (optimization, dedicated links, etc.)In basic configuration, network load balancing is applied automat

Página 369

67Chapter 7Traffic PolicyTraffic Policy belongs to of the basic WinRoute configuration. All the following settings aredisplayed and can be edited within th

Página 370

Chapter 7 Traffic Policy68Step 1 — informationFigure 7.1 Traffic Policy Wizard — introductionTo run successfully, the wizard requires the following parame

Página 371 - Chapter 25

7.1 Network Rules Wizard69Step 4 — Internet access limitationsSelect which Internet services will be available for LAN users:Figure 7.2 Network Policy

Página 372

7Chapter 1Quick ChecklistIn this chapter you can find a brief guide for a quick setup of “Kerio WinRoute Firewall” (calledbriefly “WinRoute” in further

Página 373

Chapter 7 Traffic Policy70Kerio VPN and it can be used along with a third-party VPN solution. For detailed information,see chapter 24.Figure 7.3 Network

Página 374

7.1 Network Rules Wizard71Figure 7.5 Network Policy Wizard — mapping of the local serviceService is running onSelect a computer where the correspondin

Página 375

Chapter 7 Traffic Policy72Rules Created by the WizardThe traffic policy is better understood through the traffic rules created by the Wizard in theprevious

Página 376

7.1 Network Rules Wizard73These rules are not created unless the option allowing access to a particular service isenabled in step 5.Note: In these rul

Página 377

Chapter 7 Traffic Policy74Firewall TrafficThis rule enables access to certain services from the WinRoute host. It is similar to theNAT rule except from th

Página 378

7.3 Definition of Custom Traffic Rules75NameName of the rule. It should be brief and unique. More detailed information can be included inthe Description

Página 379

Chapter 7 Traffic Policy76Figure 7.9 Traffic rule — source address definitionWarningIf either the source or the destination computer is specified by DNS nam

Página 380

7.3 Definition of Custom Traffic Rules77Figure 7.10 Traffic rule — selecting an interface of a group of interfacesNote: Only the Internet interfaces and th

Página 381

Chapter 7 Traffic Policy78Figure 7.12 Traffic rule — users and groups in the source/destination address definitionHintUsers/groups from various domains can

Página 382

7.3 Definition of Custom Traffic Rules79Use the Any button to replace all defined items with the Any item (this item is also used bydefault for all new ru

Página 383

Chapter 1 Quick Checklist89. Select an antivirus and define types of objects that will be scanned. If you choose theintegrated McAfee antivirus applica

Página 384

Chapter 7 Traffic Policy80Use the Any button to replace all defined items with the Any item (this item is also used bydefault for all new rules). Wheneve

Página 385

7.3 Definition of Custom Traffic Rules81Note: It is recommended to use the Deny option to limit the Internet access for local users andthe Drop option to

Página 386 - Technical support

Chapter 7 Traffic Policy82If WinRoute works in the mode of network traffic load balancing (see chapter 6.4), youcan select a method which will be used for

Página 387 - 26.3 Contacts

7.3 Definition of Custom Traffic Rules83Figure 7.16 Traffic rule — NAT — NAT with specific interface (its IP address)any other address is used (including ev

Página 388

Chapter 7 Traffic Policy84are let in. This translation method guarantees high security — the firewall will not let in anypacket which is not a response t

Página 389 - Legal Notices

7.3 Definition of Custom Traffic Rules85Figure 7.18 Traffic rule — destination address translation• No Translation — destination address will not be modifie

Página 390 - Used open-source libraries

Chapter 7 Traffic Policy86• Log matching packets — all packets matching with rule (permitted, denied or dropped,according to the rule definition) will be

Página 391

7.4 Basic Traffic Rule Types87• Default — all necessary protocol inspectors (or inspectors of the services listed in theService entry) will be applied o

Página 392 - Glossary of terms

Chapter 7 Traffic Policy88DestinationThe Internet interfaces group. With this group, the rule is usable for any type of Internetconnection (see chapter

Página 393

7.4 Basic Traffic Rule Types89Figure 7.23 Traffic rule that makes the local web server available from the InternetSourceMapped services can be accessed by

Página 394

9Chapter 2Introduction2.1 Kerio WinRoute FirewallKerio WinRoute Firewall 6.0 is a complex tool for connection of the local network to the Internetand

Página 395

Chapter 7 Traffic Policy90dropped. Therefore, it is recommended to put all rules for mapped services at the top ofthe table of traffic rules.Note: If ther

Página 396

7.4 Basic Traffic Rule Types91Limiting Internet AccessSometimes, it is helpful to limit users access to the Internet services from the local network.Acc

Página 397

Chapter 7 Traffic Policy92Alternatively you can define the rule to allow only authenticated users to access specificservices. Any user that has a user acc

Página 398

7.5 Policy routing937.5 Policy routingIf the LAN is connected to the Internet by multiple links with load balancing (see chapter 6.4),it may be needed

Página 399

Chapter 7 Traffic Policy94Setting of NAT in the rule for email services is shown in figure 7.31. It is recommended toallow use of a back-up link for case

Página 400

7.6 User accounts and groups in traffic rules95Example: Optimization of network traffic load balancingWinRoute provides two options of network traffic load

Página 401

Chapter 7 Traffic Policy96Figure 7.34 This traffic rule allows only selected users to connect to the InternetSuch a rule enables the specified users to con

Página 402

7.7 Partial Retirement of Protocol Inspector97User not authenticated yet who attempts to open a Web site will be automatically redirectedto the authen

Página 403

Chapter 7 Traffic Policy98Figure 7.37 Service definition without inspector protocolFigure 7.38 This traffic rule allows accessing service without protocol

Página 404

7.8 Use of Full cone NAT99Example: SIP telephone in local networkIn the local network, there is an IP telephone registered to an SIP server in the Int

Comentários a estes Manuais

Sem comentários