|
Instructions Kerio Tech, Modèle KERIO WINROUTE FIREWALL 6
Fabricant : Kerio Tech Taille : 2.24 mb Nom Fichier : kwfag6-en.pdf
Langue d'enseignement:
|
|
|
|
Aller à la télécharger
Facilité d'utilisation
© Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration and administration of Kerio WinRoute Firewall, version 6.7.1. All additional modifications and updates reserved. User interfaces Kerio StaR and Kerio Clientless SSL-VPN are focused in a standalone document, Kerio WinRoute Firewall — User’s Guide. The Kerio VPN Client application is described in a stand-alone document Kerio VPN Client — User’s Guide. For current version of the product, go to For other documents addressing the product, see Information regarding registered trademarks and trademarks are provided in appendix A. Products Kerio WinRoute Firewall and Kerio VPN Client include open source software. To view the list of open source items included, refer to attachment B. Contents 1 QuickChecklist ................................................................ 7 2 Introduction ................................................................... 9 2.1 What’snewin6.7.1 ....................................................... 9 2.2 Conflictingsoftware ..................................................... 10 2.3 Systemrequirements .................................................... 11 2.4 Installation-Windows ................................................... 12 2.5 Initialconfigurationwizard(Windows) .................................... 17 2.6 UpgradeandUninstallation-Windows .................................... 19 2.7 Installation -Software Appliance and VMware Virtual Appliance . . . . . . . . . . . 20 2.8 Upgrade -Software Appliance / VMware Virtual Appliance . . . . . . . . . . . . . . . . 23 2.9 WinRouteComponents ................................................... 23 2.10 WinRouteEngineMonitor(Windows) ..................................... 24 2.11 The firewall’s console (Software Appliance / VMware Virtual Appliance) . . . . 25 3 WinRouteAdministration ..................................................... 27 3.1 AdministrationConsole-themainwindow ............................... 28 3.2 AdministrationConsole-viewpreferences ................................ 31 4 ProductRegistrationandLicensing ............................................ 32 4.1 Licensetypesandnumberofusers ....................................... 32 4.2 Licenseinformation ...................................................... 33 4.3 Registration of the product in the Administration Console . . . . . . . . . . . . . . . . 35 4.4 Productregistrationatthewebsite ....................................... 43 4.5 Subscription/UpdateExpiration ......................................... 43 4.6 Usercounter ............................................................ 45 5 Networkinterfaces ............................................................ 47 6 InternetConnection ........................................................... 53 6.1 Persistentconnectionwithasinglelink ................................... 54 6.2 Connectionwithasingleleasedlink-dialondemand ..................... 57 6.3 ConnectionFailover ...................................................... 62 6.4 NetworkLoadBalancing ................................................. 66 7 TrafficPolicy .................................................................. 71 7.1 NetworkRulesWizard ................................................... 71 7.2 Howtrafficruleswork ................................................... 78 7.3 DefinitionofCustomTrafficRules ........................................ 78 7.4 BasicTrafficRuleTypes .................................................. 90 3 7.5 Policyrouting ........................................................... 95 7.6 Useraccountsandgroupsintrafficrules ................................. 98 7.7 PartialRetirementofProtocolInspector .................................. 99 7.8 UseofFullconeNAT .................................................. 101 7.9 Mediahairpinning ..................................................... 102 8 Configurationofnetworkservices ........................................... 104 8.1 DNSmodule ........................................................... 104 8.2 DHCPserver ........................................................... 110 8.3 DynamicDNSforpublicIPaddressofthefirewall ....................... 119 8.4 Proxyserver ........................................................... 121 8.5 HTTPcache ............................................................ 124 9 BandwidthLimiter ........................................................... 130 9.1 Howthebandwidthlimiterworksandhowtouseit ..................... 130 9.2 BandwidthLimiterconfiguration ....................................... 130 9.3 Detection of connections with large data volume transferred . . . . . . . . . . . . 135 10 UserAuthentication .......................................................... 137 10.1 FirewallUserAuthentication ........................................... 137 11 We...
Écrivez votre propre critique du dispositif
|
|