Kerio Tech KERIO WINROUTE FIREWALL 6 Manual de usuario

Busca en linea o descarga Manual de usuario para Servidores Kerio Tech KERIO WINROUTE FIREWALL 6. Kerio Tech KERIO WINROUTE FIREWALL 6 User's Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 368
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente

Indice de contenidos

Pagina 1 - Kerio WinRoute Firewall 6

Kerio WinRoute Firewall 6Administrator’s GuideKerio Technologies s.r.o.

Pagina 2

Chapter 2 Introduction10Support for Windows 7Kerio WinRoute Firewall now includes full support for the new operating system MicrosoftWindows 7.2.2 Con

Pagina 3 - Contents

Chapter 7 Traffic Policy100ExampleA banking application (client) communicates with the bank’s server through its proper proto-col which uses TCP protoco

Pagina 4

7.8 Use of Full cone NAT101Note: In the default configuration of the Traffic rules section, the Protocol inspector columnis hidden. To show it, modify se

Pagina 5

Chapter 7 Traffic Policy102Figure 7.39 Definition of a Full cone NAT traffic rule• Source — IP address of an SIP telephone in the local network.• Destinati

Pagina 6

7.9 Media hairpinning103Example: Two SIP telephones in the LANLet us suppose two SIP telephones are located in the LAN. These telephones authenticate

Pagina 7 - Quick Checklist

104Chapter 8Configuration of network servicesThis chapter provides guidelines for setting of basic services in WinRoute helpful for easyconfiguration an

Pagina 8

8.1 DNS module105The DNS module configurationBy default, DNS server (the DNS forwarder service), cache (for faster responses to repeatedrequests) and s

Pagina 9 - Introduction

Chapter 8 Configuration of network services106Note:1. Time period for keeping DNS logs in the cache is specified individually in each log(usually 24 hou

Pagina 10 - 2.2 Conflicting software

8.1 DNS module107Figure 8.2 Editor of the Hosts system fileLocal DNS domainIn the When resolving name from the ’hosts’ file or lease table combine it wi

Pagina 11 - 2.3 System requirements

Chapter 8 Configuration of network services108Enable DNS forwardingThe DNS module allows forwarding of certain DNS requests to specific DNS servers. Thi

Pagina 12 - 2.4 Installation - Windows

8.1 DNS module109queries concerning names and reversed queries are independent from each other. For betterreference, it is recommended to start with a

Pagina 13

2.3 System requirements11• 53/UDP — DNS module,• 67/UDP — DHCP server,• 1900/UDP — the SSDP Discovery service,• 2869/TCP — the UPnP Host service.The S

Pagina 14

Chapter 8 Configuration of network services110WarningIn rules for DNS requests, it is necessary to enter an expression matching the full DNSname! If, f

Pagina 15 - Sharing

8.2 DHCP server111DHCP Server ConfigurationTo configure the DHCP server in WinRoute go to Configuration → DHCP Server. Here you candefine IP scopes, reser

Pagina 16

Chapter 8 Configuration of network services112Figure 8.6 DHCP server — default DHCP parametersDNS serverAny DNS server (or multiple DNS servers separat

Pagina 17

8.2 DHCP server113Figure 8.7 DHCP server — IP scopes definitionFirst address, Last addressFirst and last address of the new scope.Note: If possible, we

Pagina 18

Chapter 8 Configuration of network services114ExampleIn 192.168.1.0 subnet you intend to create two scopes: from 192.168.1.10to 192.168.1.49 and from 1

Pagina 19

8.2 DHCP server115Figure 8.9 DHCP server — DHCP settingsTo view configured DHCP parameters and their values within appropriate IP scopes see theright c

Pagina 20

Chapter 8 Configuration of network services116Figure 8.11 DHCP server — reserving an IP address• hardware (MAC) address of the host — it is defined by h

Pagina 21

8.2 DHCP server117Figure 8.12 DHCP server — list of leased and reserved IP addresses• MAC Address — hardware address of the host that the IP address i

Pagina 22

Chapter 8 Configuration of network services118the MAC address or name of the host that the address is currently assigned to. The Scopes tabwith a dialo

Pagina 23 - 2.9 WinRoute Components

8.3 Dynamic DNS for public IP address of the firewall119Warning1. DHCP server cannot assign addresses to RAS clients connecting to the RAS serverdirect

Pagina 24

Chapter 2 Introduction12• 50 MB free disk space for installation of Kerio WinRoute Firewall.• Disk space for statistics (see chapter 21) and logs (in

Pagina 25

Chapter 8 Configuration of network services120• free — user can choose from several second level domains (e.g. no-ip.org,ddns.info, etc.) and select a

Pagina 26

8.4 Proxy server121Figure 8.14 Setting cooperation with dynamic DNS serverOn the Dynamic DNS tab, select a DDNS provider, enter DNS name for which dyn

Pagina 27 - WinRoute Administration

Chapter 8 Configuration of network services122Proxy server can receive and process clients’ queries locally. The line will not be dialed ifaccess to th

Pagina 28

8.4 Proxy server123Enable non-transparent proxy serverThis option enables the HTTP proxy server in WinRoute on the port inserted in the Portentry (312

Pagina 29

Chapter 8 Configuration of network services124where 192.168.1.1 is the IP address of the WinRoute host and number 3128 representsthe port of the proxy

Pagina 30

8.5 HTTP cache125Figure 8.16 HTTP cache configurationEnable cache on proxy serverEnables the cache for HTTP traffic via WinRoute’s proxy server (see chap

Pagina 31

Chapter 8 Configuration of network services126WarningChanges in this entry will not be accepted unless the WinRoute Firewall Engine isrestarted. Old ca

Pagina 32 - Chapter 4

8.5 HTTP cache127WarningSome web servers may attempt to bypass the cache by too short/long TTL.• Ignore server Cache-Control directive — WinRoute will

Pagina 33 - 4.2 License information

Chapter 8 Configuration of network services128Rules within this dialog are ordered in a list where the rules are read one by one from the topdownwards

Pagina 34

8.5 HTTP cache129Figure 8.19 HTTP cache administration dialogExampleSearch for the*ker?o*string lists all objects with URL matching the specification,

Pagina 35

2.4 Installation - Windows13Note:1. WinRoute installation packages include the Kerio Administration Console. The separateKerio Administration Console

Pagina 36

130Chapter 9Bandwidth LimiterThe main problem of shared Internet connection is when one or more users download orupload big volume of data and occupy

Pagina 37

9.2 Bandwidth Limiter configuration131Figure 9.1 Bandwidth Limiter configurationThe Bandwidth Limiter module enables to define reduction of speed of inco

Pagina 38

Chapter 9 Bandwidth Limiter132services if too much big data volumes are transferred). If they are lower, full line capacity isoften not employed.Warni

Pagina 39

9.2 Bandwidth Limiter configuration133Figure 9.2 Bandwidth Limiter — network servicesFigure 9.3 Bandwidth Limiter — selection of network servicesIP Add

Pagina 40

Chapter 9 Bandwidth Limiter134addresses across the local network and the Internet. Where user workstations use fixedIP addresses, it is also possible t

Pagina 41

9.3 Detection of connections with large data volume transferred135cally. With exception of special conditions (testing purposes) it is highly recommen

Pagina 42

Chapter 9 Bandwidth Limiter136Examples:The detection of connections transferring large data volumes will be better understoodthrough the following exa

Pagina 43

137Chapter 10User AuthenticationWinRoute allows administrators to monitor connections (packet, connection, Web pages orFTP objects and command filterin

Pagina 44

Chapter 10 User Authentication138• Redirection — when accessing any website (unless access to this page is explicitlyallowed to unauthenticated users

Pagina 45 - 4.6 User counter

10.1 Firewall User Authentication139Redirection to the authentication pageIf the Always require users to be authenticated when accessing web pages opt

Pagina 46

Chapter 2 Introduction14Figure 2.1 Installation — customization by selecting optional components• Kerio WinRoute Firewall Engine — core of the applica

Pagina 47 - Network interfaces

Chapter 10 User Authentication140available for other operating systems.For details, refer to chapter 25.3.Automatically logout users when they are ina

Pagina 48

141Chapter 11Web InterfaceWinRoute includes a special web server which provides an interface where statistics can beviewed (Kerio StaR), as well as fo

Pagina 49

Chapter 11 Web Interface142Figure 11.1 Configuration of WinRoute’s Web InterfaceThe name need not be necessarily identical with the host name, however,

Pagina 50 - Figure 5.2 Editing interfaces

11.1 Web interface preferences143Configuration of ports of the Web InterfaceUse the TCP ports section to set ports for unencrypted and encrypted versio

Pagina 51

Chapter 11 Web Interface144SSL Certificate for the Web InterfaceThe principle of an encrypted WinRoute Web interface is based on the fact that all comm

Pagina 52

11.1 Web interface preferences145Figure 11.3 SSL certificate of WinRoute’s Web interfaceFigure 11.4 Creating a new “self-signed” certificate for WinRout

Pagina 53 - Internet Connection

Chapter 11 Web Interface146Verisign, Thawte, SecureSign, SecureNet, Microsoft Authenticode, etc.).To import a certificate, open the certificate file (*.c

Pagina 54

147Chapter 12HTTP and FTP filteringWinRoute provides a wide range of features to filter traffic using HTTP and FTP protocols.These protocols are the most

Pagina 55

Chapter 12 HTTP and FTP filtering148An appropriate protocol inspector is activated automatically unless its use is denied bytraffic rules. For details, r

Pagina 56

12.2 URL Rules149access to other web pages, a rule denying access to any URL must be placed at the end of therule list.The following items (columns) c

Pagina 57

2.4 Installation - Windows15• all checked components will be installed or updated,• all checked components will not be installed or will be removedDur

Pagina 58

Chapter 12 HTTP and FTP filtering150Figure 12.2 URL Rule — basic parametersfor example a rule allowing access to certain pages without authenticationca

Pagina 59

12.2 URL Rules151(wildcard matching) to substitute any number of characters (i.e.*.kerio.com*)Server names represent any URL at a corresponding server

Pagina 60

Chapter 12 HTTP and FTP filtering152Figure 12.3 URL Rule — advanced parametersDenial optionsAdvanced options for denied pages. Whenever a user attempts

Pagina 61

12.2 URL Rules153another page (see below).• A blank page — user will not be informed why access to the required page wasdenied.• Another page — user’s

Pagina 62 - 6.3 Connection Failover

Chapter 12 HTTP and FTP filtering154HTTP Inspection Advanced OptionsClick on the Advanced button in the HTTP Policy tab to open a dialog where paramete

Pagina 63

12.3 Content Rating System (Kerio Web Filter)155According to the classification of the page the user will be either allowed or denied to accessthe page

Pagina 64 - Chapter 6 Internet Connection

Chapter 12 HTTP and FTP filtering156Categorize each page regardless of HTTP rulesIf this option is enabled, Kerio Web Filter categorization will be app

Pagina 65

12.3 Content Rating System (Kerio Web Filter)157Figure 12.7 Kerio Web Filter rule

Pagina 66 - 6.4 Network Load Balancing

Chapter 12 HTTP and FTP filtering158Figure 12.8 Selection of Kerio Web Filter categoriesNote:1. You can define multiple URL rules that will use the Keri

Pagina 67

12.4 Web content filtering by word occurrence159So called forbidden words are used to filter out web pages containing undesirable words. URLrules (see c

Pagina 68

Chapter 2 Introduction162. Universal Plug and Play Device Host and SSDP Discovery ServiceThe services support UPnP (Universal Plug and Play) in the Wi

Pagina 69

Chapter 12 HTTP and FTP filtering160• On the Content Rules tab, check the Deny Web pages containing... option to enablefiltering by word occurrence.Figu

Pagina 70

12.4 Web content filtering by word occurrence161Individual groups and words included in them are displayed in form of trees. To enablefiltering of parti

Pagina 71 - Traffic Policy

Chapter 12 HTTP and FTP filtering162WeightWord weight the level of how the word affects possible blocking or allowing of accessto websites. The weight s

Pagina 72

12.5 FTP Policy163FTP Rules DefinitionTo create a new rule, select a rule after which the new rule will be added, and click Add. Youcan later use the a

Pagina 73

Chapter 12 HTTP and FTP filtering164Open the General tab to set general rules and actions to be taken.DescriptionDescription of the rule (information f

Pagina 74

12.5 FTP Policy165Figure 12.15 FTP Rule — advanced settingsValid at time intervalSelection of the time interval during which the rule will be valid (a

Pagina 75

Chapter 12 HTTP and FTP filtering166Scan content for viruses according to scanning rulesUse this option to enable/disable scanning for viruses for FTP

Pagina 76

167Chapter 13Antivirus controlWinRoute provides antivirus check of objects (files) transmitted by HTTP, FTP, SMTP and POP3protocols. In case of HTTP an

Pagina 77

Chapter 13 Antivirus control168For details, see chapter 13.4.• Object transferred by other than HTTP, FTP, SMTP and POP3 protocols cannot bechecked by

Pagina 78 - 7.2 How traffic rules work

13.2 How to choose and setup antiviruses169Figure 13.2 Antivirus selection (integrated antivirus)Figure 13.3 Scheduling McAfee updatesCheck for update

Pagina 79

2.5 Initial configuration wizard (Windows)17warning log. This helps assure that the service will be enabled/started immediately afterthe WinRoute insta

Pagina 80

Chapter 13 Antivirus control170Last update check performed ... agoTime that has passed since the last update check.Virus database versionDatabase vers

Pagina 81

13.2 How to choose and setup antiviruses171Use the Options button to set advanced parameters for the selected antivirus. Dialogs for in-dividual antiv

Pagina 82

Chapter 13 Antivirus control172network send their email via an SMTP server located in the Internet. Checking of outgoingSMTP traffic is not apt for loca

Pagina 83

13.3 HTTP and FTP scanning173To set parameters of HTTP and FTP antivirus check, open the HTTP, FTP scanning tab inConfiguration → Content Filtering → A

Pagina 84

Chapter 13 Antivirus control174WarningWhen handling files in the quarantine directory, please consider carefully each actionyou take, otherwise a virus

Pagina 85

13.3 HTTP and FTP scanning175Figure 13.8 Definition of an HTTP/FTP scanning ruleDescriptionDescription of the rule (for reference of the WinRoute admin

Pagina 86

Chapter 13 Antivirus control176If the object does not match with any rule, it will be scanned automatically. If only selectedobject types are to be sc

Pagina 87

13.4 Email scanning177Figure 13.9 Settings for SMTP and POP3 scanningThe quarantine subdirectory under the WinRoute directory is used for the quaranti

Pagina 88

Chapter 13 Antivirus control178• Enable TLS. This alternative is suitable for such cases where protection from wiretap-ping is prior to antivirus chec

Pagina 89

13.5 Scanning of files transferred via Clientless SSL-VPN (Windows)179Transfer directionsUse the top section of the SSL-VPN Scanning tab to set to whic

Pagina 90 - 7.4 Basic Traffic Rule Types

Chapter 2 Introduction18Password and its confirmation must be entered in the dialog for account settings. Name Admincan be changed in the Username edit

Pagina 91

180Chapter 14Definitions14.1 IP Address GroupsIP groups are used for simple access to certain services (e.g. WinRoute’s remote administration,Web serve

Pagina 92

14.2 Time Ranges181Figure 14.2 IP group definitionTypeType of the new item:• Host (IP address or DNS name of a particular host),• Network / Mask (subne

Pagina 93

Chapter 14 Definitions182Figure 14.3 WinRoute’s time intervalsTime range typesWhen defining a time interval three types of time ranges (subintervals) ca

Pagina 94

14.3 Services183Figure 14.4 Time range definitionValid onDefines days when the interval will be valid. You can either select particular weekdays(Selecte

Pagina 95 - 7.5 Policy routing

Chapter 14 Definitions184Figure 14.5 WinRoute’s network servicesClicking on the Add or the Edit button will open a dialog for service definition.Figure

Pagina 96

14.3 Services185DescriptionComments for the service defined. It is strongly recommended describing each definition,especially with non-standard services

Pagina 97

Chapter 14 Definitions186Figure 14.8 Service definition — source and destination port settingProtocol InspectorsWinRoute includes special subroutines th

Pagina 98

14.4 URL Groups187Note:1. Generally, protocol inspectors cannot be applied to secured traffic (SSL/TLS). In this case,WinRoute “perceives” the traffic as

Pagina 99

Chapter 14 Definitions188Matching fields next to each item of the group can be either checked to activate or uncheckedto disable the item. This way you

Pagina 100

14.4 URL Groups189DescriptionThe item’s description (comments and notes for the administrator).

Pagina 101 - 7.8 Use of Full cone NAT

2.6 Upgrade and Uninstallation - Windows19Enable remote accessThis option enables full access to the WinRoute computer from a selected IP addressRemot

Pagina 102 - 7.9 Media hairpinning

190Chapter 15User Accounts and GroupsUser accounts in WinRoute improve control of user access to the Internet from the local net-work. User accounts c

Pagina 103

15.1 Viewing and definitions of user accounts191Transparent cooperation with Active Directory (Active Directory mapping)WinRoute can use accounts and g

Pagina 104 - 8.1 DNS module

Chapter 15 User Accounts and Groups192The searching is helpful especially when the domain includes too many accounts whichmight make it difficult to loo

Pagina 105 - Figure 8.1 DNS settings

15.2 Local user accounts193Note: It is also possible to select more than one account by using the Ctrl and Shiftkeys to perform mass changes of parame

Pagina 106

Chapter 15 User Accounts and Groups194Figure 15.2 Local user accounts in WinRouteStep 1 — basic informationFigure 15.3 Creating a user account — basic

Pagina 107

15.2 Local user accounts195WarningThe user name is not case-sensitive. We recommend not to use special characters (non-English languages) which might

Pagina 108

Chapter 15 User Accounts and Groups196Warning1. Passwords may contain printable symbols only (letters, numbers, punctuationmarks). Password is case-se

Pagina 109

15.2 Local user accounts197Step 3 — access rightsFigure 15.5 Creating a new user account — user rightsEach user must be assigned one of the following

Pagina 110 - 8.2 DHCP server

Chapter 15 User Accounts and Groups198is displayed. The unlock feature must also be enabled in the corresponding URL rule (fordetails, refer to chapte

Pagina 111

15.2 Local user accounts199Figure 15.6 Creating a new user account — data transmission quotamake such users to reduce their network activities). For d

Pagina 112

 Kerio Technologies s.r.o. All rights reserved.This guide provides detailed description on configuration and administration of KerioWinRoute Firewall,

Pagina 113

Chapter 2 Introduction20Figure 2.5 Uninstallation — asking user whether files created in WinRoute should be deletedKeeping these files may be helpful fo

Pagina 114

Chapter 15 User Accounts and Groups200Don’t block further traffic mode• resetting of the data volume counter of the user (see chapter 20.1).2. Actions f

Pagina 115

15.2 Local user accounts201Pop-up windowsAutomatic opening of new browser windows — usually pop-up windows with advertise-ments.This option will allow

Pagina 116

Chapter 15 User Accounts and Groups202Figure 15.8 Creating a new user account — IP addresses for VPN client and automatic loginsAutomatic login can be

Pagina 117

15.3 Local user database: external authentication and import of accounts20315.3 Local user database: external authentication and import of accountsUse

Pagina 118

Chapter 15 User Accounts and Groups204Figure 15.9 Import of accounts from Active DirectoryFigure 15.10 Importing accounts from the Windows NT domain15

Pagina 119

15.4 User accounts in Active Directory — domain mapping205Directory and forward them to the corresponding domain server. If another DNSserver is used,

Pagina 120

Chapter 15 User Accounts and Groups206The first page of the wizard requires the full name of the Active Directory domain (e.g.company.com) and name and

Pagina 121 - 8.4 Proxy server

15.4 User accounts in Active Directory — domain mapping207Figure 15.13 Advanced options for cooperation with the Active Directory.If WinRoute is insta

Pagina 122

Chapter 15 User Accounts and Groups208Secured connection to the domain serverFor higher security (to prevent from tapping of traffic and exploiting user

Pagina 123

15.4 User accounts in Active Directory — domain mapping209Use buttons Add or Edit to open a dialog for a new domain definition and enter parameters oft

Pagina 124 - 8.5 HTTP cache

2.7 Installation - Software Appliance and VMware Virtual Appliance21Start of the installationSoftware ApplianceISO image of the installation CD can be

Pagina 125

Chapter 15 User Accounts and Groups21015.5 User groupsUser accounts can be sorted into groups. Creating user groups provides the following benefits:• S

Pagina 126

15.5 User groups211The searching is helpful especially when the domain includes too many groups whichmight make it difficult to look up particular items

Pagina 127

Chapter 15 User Accounts and Groups212Using the Add and Remove buttons you can add or remove users to/from the group. If useraccounts have not been cr

Pagina 128

15.5 User groups213Additional rights:Users can override WWW content rulesUser belonging to the group can customize personal web content filtering setti

Pagina 129

214Chapter 16Administrative settings16.1 System configuration (Software Appliance / VMware Virtual Appli-ance)In the Software Appliance / VMware Virtua

Pagina 130 - Bandwidth Limiter

16.2 Setting Remote Administration215firewall’s system time. The time zone also includes information about daylight savingtime settings.Kerio Technolog

Pagina 131

Chapter 16 Administrative settings216HintIn WinRoute, you can use a similar method to allow or block remote administration of KerioMailServer — for co

Pagina 132

16.3 Update Checking217• 2 minutes after each startup of the WinRoute Firewall Engine,• and then every 24 hours.Results of each attempted update check

Pagina 133

218Chapter 17Advanced security features17.1 P2P EliminatorPeer-to-Peer (P2P) networks are world-wide distributed systems, where each node can repre-se

Pagina 134

17.1 P2P Eliminator219Figure 17.1 Detection settings and P2P Eliminatorallowance of only certain services and length of the period for which restricti

Pagina 135

Chapter 2 Introduction22virtual computer allows this) adapter or install WinRoute Software Appliance on another typeof virtual machine. If such issue

Pagina 136

Chapter 17 Advanced security features220Note:1. If a user who is allowed to use P2P networks (see chapter 15.1) is connected to the fire-wall from a ce

Pagina 137 - User Authentication

17.2 Special Security Settings221Number of suspicious connectionsBig volume of connections established from the client host is a typical feature of P2

Pagina 138

Chapter 17 Advanced security features222Figure 17.4 Security options — Anti-Spoofing and cutting down number of connections for one hostAnti-SpoofingAnt

Pagina 139

17.2 Special Security Settings223These restrictions protects firewall (WinRoute host) from overload and may also help protectit from attacks to the tar

Pagina 140

224Chapter 18Other settings18.1 Routing tableUsing Administration Console you can view or edit the system routing table of the host whereWinRoute is r

Pagina 141 - Web Interface

18.1 Routing table225Note: Changes in the routing table might interrupt the connection between the WinRoute Fire-wall Engine and the Administration Co

Pagina 142

Chapter 18 Other settings226Figure 18.2 Adding a route to the routing tableNetwork, Network MaskIP address and mask of the destination network.Interfa

Pagina 143

18.2 Universal Plug-and-Play (UPnP)227Removing routes from the Routing TableUsing the Remove button in the WinRoute admin console, records can be remo

Pagina 144

Chapter 18 Other settings228Enable UPnPThis option enables UPnP.WarningIf WinRoute is running on Windows XP, Windows Server 2003, Windows Vista or Win

Pagina 145

18.3 Relay SMTP server22918.3 Relay SMTP serverWinRoute provides a function which enables notification to users or/and administrators byemail alerts. T

Pagina 146

2.8 Upgrade - Software Appliance / VMware Virtual Appliance232.8 Upgrade - Software Appliance / VMware Virtual ApplianceWinRoute can be upgraded by th

Pagina 147 - HTTP and FTP filtering

Chapter 18 Other settings230be used for reference in recipient’s mail client or for email classification. This is why it isalways recommended to specif

Pagina 148 - 12.2 URL Rules

231Chapter 19Status InformationWinRoute activities can be well monitored by the administrator (or by other users with ap-propriate rights). There are

Pagina 149

Chapter 19 Status Information232Figure 19.1 List of active hosts and users connected to the firewallUserName of the user which is connected from a part

Pagina 150

19.1 Active hosts and connected users233ConnectionsTotal number of connections to and from the host. Details can be displayed in the contextmenu (see

Pagina 151

Chapter 19 Status Information234User quotaUse this option to show quota of the particular user (Administration Console switches tothe User quota tab i

Pagina 152

19.1 Active hosts and connected users235Login informationInformation on logged-in users:• User — name of a user, DNS name (if available) and IP addres

Pagina 153

Chapter 19 Status Information236• FTP — DNS name or IP address of the server, size of downloaded/saved data,information on currently downloaded/saved

Pagina 154

19.1 Active hosts and connected users237The following columns are hidden by default. They can be shown through the Modify columnsdialog opened from th

Pagina 155

Chapter 19 Status Information238Figure 19.6 Information on selected host and user — traffic histogramSelect an item from the Time interval combo box to

Pagina 156

19.2 Network connections overview239• connections from other hosts to services provided by the host with WinRoute• connections performed by clients wi

Pagina 157

Chapter 2 Introduction242.10 WinRoute Engine Monitor (Windows)WinRoute Engine Monitor is a standalone utility used to control and monitor the WinRoute

Pagina 158

Chapter 19 Status Information240Source, DestinationIP address of the source (the connection initiator) and of the destination. If there is anappropria

Pagina 159

19.2 Network connections overview241Figure 19.8 Context menu for ConnectionsRefreshThis option will refresh the information in the Connections window

Pagina 160

Chapter 19 Status Information242For each item either a color or the Default option can be chosen. Default colors are set in theoperating system (the c

Pagina 161

19.4 Alerts243• IP address — public IP address of the host which the client connects from (see theHostname column above).• Client status — connecting,

Pagina 162 - 12.5 FTP Policy

Chapter 19 Status Information244Figure 19.12 Alert DefinitionsalertType of the event upon which the alert will be sent:• Virus detected — antivirus eng

Pagina 163

19.4 Alerts245cense/subscription (or license of any module integrated in WinRoute, such asKerio Web Filter, the McAfee antivirus, etc.) is getting clo

Pagina 164

Chapter 19 Status Information246In the Administration Console, alerts are displayed in the language currently set as preferred(see Kerio Administratio

Pagina 165

19.4 Alerts247Figure 19.14 Details of a selected event

Pagina 166

248Chapter 20Basic statisticsStatistical information about users (volume of transmitted data, used services, categorizationof web pages) as well as of

Pagina 167 - Antivirus control

20.1 Volume of transferred data and quota usage249Figure 20.1 User statisticsis related to the user (the IN direction stands for data received by the

Pagina 168

2.11 The firewall’s console (Software Appliance / VMware Virtual Appliance)25Note:1. If a limited version of WinRoute is used (e.g. a trial version), a

Pagina 169

Chapter 20 Basic statistics250WarningBe aware that using this option for the all users item resets counters of all users, includingunrecognized ones!N

Pagina 170

20.2 Interface statistics251Figure 20.3 Firewall’s interface statisticsExampleThe WinRoute host connects to the Internet through the Public interface

Pagina 171

Chapter 20 Basic statistics252RefreshThis option will refresh the information on the Interface Statistics tab immediately. Thisfunction is equal to th

Pagina 172 - 13.3 HTTP and FTP scanning

20.2 Interface statistics253The period (2 hours or 1 day) can be selected in the Time interval box. The selected time rangeis always understood as the

Pagina 173

254Chapter 21Kerio StaR - statistics and reportingThe WinRoute’s web interface provides detailed statistics on users, volume of transferred data,visit

Pagina 174

21.1 Monitoring and storage of statistic data255is represented by several files on the disk. This implies that any data is kept in the cache evenif the

Pagina 175

Chapter 21 Kerio StaR - statistics and reporting256The following example addresses case of a mapped web server accessible from the Internet.Any (anony

Pagina 176 - 13.4 Email scanning

21.2 Settings for statistics and quota257Enable/disable gathering of statistic dataThe Gather Internet Usage statistics option enables/disables all st

Pagina 177

Chapter 21 Kerio StaR - statistics and reporting258Statistics and quota exceptionsOn the Exceptions tab, it is possible to define exceptions for statis

Pagina 178

21.3 Connection to StaR and viewing statistics259For details on IP groups, see chapter 14.1.Users and groupsSelect users and/or user groups which will

Pagina 179

Chapter 2 Introduction26Shutting down / restarting the firewallIf you need to shut your computer down or reboot it, these options provide secure closur

Pagina 180 - Definitions

Chapter 21 Kerio StaR - statistics and reporting260Note: Within local systems, secured traffic would be useless and the browser would botheruser with ne

Pagina 181 - 14.2 Time Ranges

21.3 Connection to StaR and viewing statistics261Updating data in StaRFirst of all, the StaR interface is used for gathering of statistics and creatin

Pagina 182

262Chapter 22LogsLogs are files where history of certain events performed through or detected by WinRoute arerecorded and kept. Each log is displayed i

Pagina 183 - 14.3 Services

22.1 Log settings263Figure 22.1 Log settingsFile LoggingUse the File Loggingtab to define file name and rotation parameters.Enable logging to fileUse thi

Pagina 184

Chapter 22 Logs264Figure 22.2 File logging settingster 21.2). Rotation follows the rules described above.Syslog LoggingParameters for logging to a Sys

Pagina 185

22.2 Logs Context Menu265Enable Syslog loggingEnable/disable logging to a Syslog server.If this option is disabled, none of the following parameters a

Pagina 186

Chapter 22 Logs266The Save log option opens a dialog box where the following optional parameters can beset:Figure 22.5 Saving a log to a file• Target fi

Pagina 187 - 14.4 URL Groups

22.2 Logs Context Menu267HintSelect a new encoding type if special characters are not printed correctly in non-Englishversions.Log SettingsA dialog wh

Pagina 188

Chapter 22 Logs268Highlighting rules are ordered in a list. The list is processed from the top. The first rulemeeting the criteria stops other processi

Pagina 189 - Description

22.3 Alert Log26922.3 Alert LogThe Alert log provides a complete history of alerts generated by WinRoute (e.g. alerts uponvirus detection, dialing and

Pagina 190 - User Accounts and Groups

27Chapter 3WinRoute AdministrationFor WinRoute configuration, two tools are available:The Web Administration interfaceThe Web Administration interface

Pagina 191

Chapter 22 Logs270Example[18/Apr/2008 10:27:46] james - insert StaticRoutesset Enabled=’1’, Description=’VPN’,Net=’192.168.76.0’, Mask=’255.255.255.0’

Pagina 192

22.6 Debug Log271• [18/Apr/2008 10:22:47] — date and time when the event was logged (note: Con-nection logs are saved immediately after a disconnectio

Pagina 193 - 15.2 Local user accounts

Chapter 22 Logs272Figure 22.8 Expression for traffic monitored in the debug logThe expression must be defined with special symbols. After clicking on the

Pagina 194 - Step 1 — basic information

22.7 Dial Log273• WAN / Dial-up messages information about dialed lines (request dialing, autodisconnection down-counter),• Filtering — logs proving i

Pagina 195

Chapter 22 Logs274connection time 00:15:53, 1142391 bytes received,250404 bytes transmittedThe first log item is recorded upon reception of a hang-up r

Pagina 196

22.8 Error Log275Another event is logged upon a successful connection (i.e. when the line is dialed, uponauthentication on a remote server, etc.).6. C

Pagina 197

Chapter 22 Logs276• 8100-8199 — errors of the Kerio Web Filter module• 8200-8299 — authentication subsystem errors• 8300-8399 — anti-virus module erro

Pagina 198

22.10 Http log277Packet log example[16/Apr/2008 10:51:00] PERMIT ’Local traffic’ packet to LAN,proto:TCP, len:47, ip/port:195.39.55.4:41272 ->192.1

Pagina 199

Chapter 22 Logs278An example of an HTTP log record in the Apache format192.168.64.64 - jflyaway[18/Apr/2008:15:07:17 +0200]"GET http://www.kerio.

Pagina 200

22.11 Security Log279Example[17/Jul/2008 11:46:38] Anti-Spoofing:Packet from LAN, proto:TCP, len:48,ip/port:61.173.81.166:1864 -> 195.39.55.10:445,

Pagina 201

Chapter 3 WinRoute Administration28The following chapters of this document address individual sections of the AdministrationConsole, the module which

Pagina 202

Chapter 22 Logs280administration interface, WebAdmin SSL = secure web administration interface,Proxy = proxy server user authentication)• <IP addre

Pagina 203

22.14 Web Log281• 3000-3999 — warning from individual WinRoute modules (e.g. DHCP server, anti-viruscheck, user authentication, etc.)• 4000-4999 — lic

Pagina 204

Chapter 22 Logs282Note: If the page title cannot be identified (i.e. for its content is compressed), the"Encoded content" will be reported.•

Pagina 205

283Chapter 23Kerio VPNWinRoute enables secure interconnection of remote private networks using an encrypted tun-nel and it provides clients secure acc

Pagina 206

Chapter 23 Kerio VPN284• No special user accounts must be created for VPN clients. User accounts in WinRoute(or domain accounts if the Active Director

Pagina 207

23.1 VPN Server Configuration285Figure 23.2 VPN server settings — basic parametersThe action will be applied upon clicking the Apply button in the Inte

Pagina 208

Chapter 23 Kerio VPN286later).2. Regarding two VPN tunnels, it is also examined when establishing a connectionwhether the VPN subnet does not collide

Pagina 209

23.1 VPN Server Configuration287Figure 23.4 VPN server settings — specification of DNS servers for VPN clientsIf the DNS module is already used as a DNS

Pagina 210 - 15.5 User groups

Chapter 23 Kerio VPN288WINS configuration for VPN clientsThe WINS service is used for resolution of hostnames to IP addresses within Microsoft Windowsn

Pagina 211

23.2 Configuration of VPN clients289Figure 23.6 VPN server settings — server port and routes for VPN clientsCustom RoutesOther networks to which a VPN

Pagina 212

3.1 Administration Console - the main window29• The left column contains the tree view of sections. The individual sections of thetree can be expanded

Pagina 213

Chapter 23 Kerio VPN290Note: Remote VPN clients connecting toWinRoute are included toward the number of personsusing the license (see chapters 4 and 4

Pagina 214 - Administrative settings

23.3 Interconnection of two private networks via the Internet (VPN tunnel)29123.3 Interconnection of two private networks via the Internet (VPN tunnel

Pagina 215

Chapter 23 Kerio VPN292Name of the tunnelEach VPN tunnel must have a unique name. This name will be used in the table of inter-faces, in traffic rules (

Pagina 216 - 16.3 Update Checking

23.3 Interconnection of two private networks via the Internet (VPN tunnel)293Figure 23.9 VPN tunnel — certificate fingerprintsDNS SettingsDNS must be se

Pagina 217

Chapter 23 Kerio VPN294Figure 23.10 VPN tunnel’s routing configurationConnection establishmentActive endpoints automatically attempt to recover connect

Pagina 218 - Advanced security features

23.3 Interconnection of two private networks via the Internet (VPN tunnel)295Note: VPN tunnels keeps their connection (by sending special packets in r

Pagina 219

Chapter 23 Kerio VPN2962. Traffic rules set by this method allow full IP communication between the local network,remote network and all VPN clients. For

Pagina 220

23.5 Example of Kerio VPN configuration: company with a filial office297Routes provided automaticallyUnless any custom routes are defined, the following ru

Pagina 221

Chapter 23 Kerio VPN298The server (default gateway) of the headquarters uses the public IP address 63.55.21.12 (DNSname is newyork.company.com), the s

Pagina 222

23.5 Example of Kerio VPN configuration: company with a filial office299Common methodThe following actions must be taken in both local networks (i.e. in t

Pagina 223

3Contents1 Quick Checklist . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Pagina 224 - Other settings

Chapter 3 WinRoute Administration30for authentication of the firewall when connecting to the administration fromanother host (see Kerio Administration

Pagina 225

Chapter 23 Kerio VPN3006. In traffic rules, allow traffic between the local network, remote network and VPN clientsand set desirable access restrictions.

Pagina 226

23.5 Example of Kerio VPN configuration: company with a filial office301In step 5, select Create rules for Kerio VPN server. Status of the Create rules fo

Pagina 227

Chapter 23 Kerio VPN302Figure 23.17 Headquarter — DNS forwarding settings• Set the IP address of this interface (10.1.1.1) as a primary DNS server for

Pagina 228

23.5 Example of Kerio VPN configuration: company with a filial office303• Set the IP address 10.1.1.1 as a primary DNS server also for the other hosts.Not

Pagina 229 - 18.3 Relay SMTP server

Chapter 23 Kerio VPN3045. Create a passive end of the VPN tunnel (the server of the branch office uses a dynamic IPaddress). Specify the remote endpoint

Pagina 230

23.5 Example of Kerio VPN configuration: company with a filial office305Figure 23.21 Headquarter — final traffic rulesRules defined this way meet all the rest

Pagina 231 - Status Information

Chapter 23 Kerio VPN306In this case, it would be meaningless to create rules for the Kerio VPN server and/or theKerio Clientless SSL-VPN, since the se

Pagina 232

23.5 Example of Kerio VPN configuration: company with a filial office307Figure 23.25 Filial office — DNS forwarding settingsFigure 23.26 Filial office — TCP/I

Pagina 233

Chapter 23 Kerio VPN308certificate provided by a certification authority is available).Note: A free subnet which has been selected is now specified autom

Pagina 234

23.5 Example of Kerio VPN configuration: company with a filial office309Figure 23.28 Filial office — definition of VPN tunnel for the headquartersFigure 23.2

Pagina 235

3.2 Administration Console - view preferences31Note: After a connection failure, the Web Administration interface is redirected and opened atthe login

Pagina 236

Chapter 23 Kerio VPN310VPN testConfiguration of the VPN tunnel has been completed by now. At this point, it is recommendedto test availability of the r

Pagina 237

23.6 Example of a more complex Kerio VPN configuration311The headquarters uses the DNS domain company.com, filials use subdomainssantaclara.company.com

Pagina 238

Chapter 23 Kerio VPN312To provide correct forwarding of DNS requests from a WinRoute host, it is necessary touse an IP address of a network device bel

Pagina 239

23.6 Example of a more complex Kerio VPN configuration313The following sections provide detailed description of the Kerio VPN configuration both forthe

Pagina 240

Chapter 23 Kerio VPN314This step will create rules for connection of the VPN server as well as for communicationof VPN clients with the local network

Pagina 241

23.6 Example of a more complex Kerio VPN configuration315Figure 23.35 Headquarter — TCP/IP configuration ata firewall’s interface connected to the local

Pagina 242

Chapter 23 Kerio VPN3164. Enable the VPN server and configure its SSL certificate (create a self-signed certificate if nocertificate provided by a certific

Pagina 243 - 19.4 Alerts

23.6 Example of a more complex Kerio VPN configuration3175. Create a passive endpoint of the VPN tunnel connected to the London filial. Use the fin-gerpr

Pagina 244 - Figure 19.12 Alert Definitions

Chapter 23 Kerio VPN318Figure 23.38 The headquarters — routing configuration for the tunnel connected to the London filialWarningIn case that the VPN co

Pagina 245

23.6 Example of a more complex Kerio VPN configuration3196. Use the same method to create a passive endpoint for the tunnel connected to the Parisfilial

Pagina 246

32Chapter 4Product Registration and LicensingWhen purchased, Kerio WinRoute Firewall must be registered, Upon registration of the product,so called li

Pagina 247

Chapter 23 Kerio VPN320Figure 23.40 The headquarters — routing configuration for the tunnel connected to the Paris filialFigure 23.41 Headquarter — final

Pagina 248 - Basic statistics

23.6 Example of a more complex Kerio VPN configuration321Configuration of the London filial1. Install WinRoute (version 6.1.0 or higher) at the default g

Pagina 249 - Figure 20.1 User statistics

Chapter 23 Kerio VPN322This step will create rules for connection of the VPN server as well as for communicationof VPN clients with the local network

Pagina 250 - 20.2 Interface statistics

23.6 Example of a more complex Kerio VPN configuration323Figure 23.46 The London filial office — VPN server configurationFor a detailed description on the

Pagina 251

Chapter 23 Kerio VPN324branch office server.Figure 23.47 The London filial office — definition of VPN tunnel for the headquarters

Pagina 252

23.6 Example of a more complex Kerio VPN configuration325Figure 23.48 The London filial — routing configuration for the tunnel connected to the headquart

Pagina 253

Chapter 23 Kerio VPN3266. Create a passive endpoint of the VPN tunnel connected to the Paris filial. Use the finger-print of the VPN server of the Paris

Pagina 254 - Chapter 21

23.6 Example of a more complex Kerio VPN configuration327Figure 23.50 The London filial — routing configurationfor the tunnel connected to the Paris bran

Pagina 255

Chapter 23 Kerio VPN328Configuration of the Paris filial1. Install WinRoute (version 6.1.0 or higher) at the default gateway of the filial’s network.2. U

Pagina 256

23.6 Example of a more complex Kerio VPN configuration3293. Customize DNS configuration as follows:• In the WinRoute’s DNS module configuration, enable D

Pagina 257

4.2 License information33cannot be updated. The time for updates can be extended by purchasing a sub-scription.• product expiration date — specifies th

Pagina 258

Chapter 23 Kerio VPN330Figure 23.55 The Paris filial office — VPN server configuration

Pagina 259

23.6 Example of a more complex Kerio VPN configuration3315. Create an active endpoint of the VPN tunnel which will connect to the headquarters server(n

Pagina 260

Chapter 23 Kerio VPN332Paris branch office server.Figure 23.57 The Paris filial — routing configuration for the tunnel connected to the headquarters

Pagina 261

23.6 Example of a more complex Kerio VPN configuration3336. Create an active endpoint of the tunnel connected to London (servergw-london.company.com).

Pagina 262 - 22.1 Log settings

Chapter 23 Kerio VPN334Figure 23.59 The Paris filial — routing configurationfor the tunnel connected to the London branch officeFigure 23.60 The Paris fili

Pagina 263 - Figure 22.1 Log settings

335Chapter 24Kerio Clientless SSL-VPN (Windows)Kerio Clientless SSL-VPN (thereinafter “SSL-VPN”) is a special interface used for secured remoteaccess

Pagina 264 - Syslog Logging

Chapter 24 Kerio Clientless SSL-VPN (Windows)336SSL-VPN interface configurationThe SSL-VPN interface can be enabled/disabled on the Web Interface → SSL

Pagina 265 - 22.2 Logs Context Menu

24.2 Usage of the SSL-VPN interface337Allowing access from the InternetAccess to the SSL-VPN interface from the Internet must be allowed by defining a

Pagina 266

338Chapter 25Specific settings and troubleshootingThis chapter provides description of advanced features and specific configurations of the fire-wall. It

Pagina 267

25.2 Configuration files33925.2 Configuration filesThis chapter provides clear descriptions of WinRoute configuration and status files. This infor-mation ca

Pagina 268

Chapter 4 Product Registration and Licensing34Figure 4.1 Administration Console welcome page providing license informationProductname of the product (

Pagina 269 - 22.4 Config Log

Chapter 25 Specific settings and troubleshooting340Status filesIn addition, WinRoute generates other files and directories where certain status informati

Pagina 270 - 22.5 Connection Log

25.3 Automatic user authentication using NTLM341General conditionsThe following conditions are applied to this authentication method:1. WinRoute Firew

Pagina 271 - 22.6 Debug Log

Chapter 25 Specific settings and troubleshooting342The configuration of the WinRoute’s web interface must include a valid DNS name of the serveron which

Pagina 272

25.4 FTP on WinRoute’s proxy server343NTLM authentication arise, it is recommended to remove all usernames/passwords forthe server where WinRoute is i

Pagina 273 - 22.7 Dial Log

Chapter 25 Specific settings and troubleshooting344Terminal FTP clients (such as the ftp command in Windows or Linux) do not allow config-uration of the

Pagina 274

25.4 FTP on WinRoute’s proxy server345Figure 25.3 Configuring proxy server in Internet Explorer 6.0HintTo configure web browsers, you can use a configura

Pagina 275 - 22.8 Error Log

Chapter 25 Specific settings and troubleshooting346Figure 25.4 Setting proxy server for FTP in Total CommanderHintThe defined proxy server is indexed an

Pagina 276 - 22.9 Filter Log

25.5 Internet links dialed on demand347If WinRoute receives a packet from the local network, it will compare it with the system routingtable. If the p

Pagina 277 - 22.10 Http log

Chapter 25 Specific settings and troubleshooting348from the local host to the Internet, the packet will be dropped by the operating systembefore the Wi

Pagina 278 - 22.11 Security Log

25.5 Internet links dialed on demand3495. The Proxy server in WinRoute (see chapter 8.4) also provides direct dial-up connections.A special page provi

Pagina 279

4.3 Registration of the product in the Administration Console35Number of usersMaximal number of hosts (unique IP addresses) that can be connected to t

Pagina 280 - 22.13 Warning Log

Chapter 25 Specific settings and troubleshooting350All DNS names missing a suitable rule will be dialed automatically by the DNS module whendemanded.In

Pagina 281 - 22.14 Web Log

351Chapter 26Technical supportFree email and telephone technical support is provided for Kerio WinRoute Firewall. Contactsand more information can be

Pagina 282

Chapter 26 Technical support352as kerio_support_info.txt.Note: The kerio_support_info.txt is generated by the Administration Console. This impliesthat

Pagina 283 - Kerio VPN

353Appendix ALegal NoticesMicrosoft, Windows, Windows NT, Windows Vista, Internet Explorer, ActiveX, and ActiveDirectoryare registered trademar

Pagina 284 - 23.1 VPN Server Configuration

354Appendix BUsed open source itemsKerio WinRoute Firewall contains the following open-source software (open source):bindlibCopyright 1983, 1993 The

Pagina 285

355KVNET — driverKerio Virtual Network Interface driver for Linux (driver for the Kerio VPN virtual networkadapter)Copyright  Kerio Technologies s.r.

Pagina 286

Appendix B Used open source items356PHPCopyright  1999-2006 The PHP Group. All rights reserved.This product includes PHP software available for free

Pagina 287

357Glossary of termsActiveXThis Microsoft’s proprietary technology is used for creation of dynamic objects for webpages. This technology provides many

Pagina 288

Glossary of terms358DMZDMZ (demilitarized zone) is a reserved network area where services available both fromthe Internet and from the LAN are run (e.

Pagina 289

359IdentThe Ident protocol is used for identification of user who established certain TCP connec-tion from a particular (multi-user) system. TheIdent s

Pagina 290

Chapter 4 Product Registration and Licensing36Registration of the trial versionBy registrating the trial version, users get free email and telephonic

Pagina 291

Glossary of terms360will be redirected to this host. Packets that do not match with any record in theNAT table will be dropped.• destination address t

Pagina 292

361Ports 1-1023 are reserved and used by well known services (e.g. 80 = WWW). Ports above1023 can be freely used by any application.PPTPMicrosoft’s pr

Pagina 293

Glossary of terms362Routing tableThe information used by routers when making packet forwarding decisions (so calledroutes). Packets are routed accordi

Pagina 294

363• RST (Reset) — request on termination of a current connection and on initiationof a new one• URG (Urgent) — urgent packet• PSH (Push) — request on

Pagina 295

364IndexAActive Directory 196domain mapping 204import of user accounts 203mapping of other domains 208administration 27remote 18, 215Administration Co

Pagina 296

365local domain 107dynamic DNS 119FFTP 147, 186, 343filtering rules 162full cone NAT 87Ggroupsinterface throughput charts 47IP address 180of forbidden

Pagina 297

Index366Mmedia hairpinning 102multihoming 93NNAT 84, 90full cone NAT 87, 101NT domainimport of user accounts 203NTLM 138, 139configuration of web brows

Pagina 298

367traffic policy 71created by wizard 75default rule 77definition 78exceptions 95Internet access limiting 94wizard 71transparent proxy 124Trial ID 37TTL

Pagina 300

4.3 Registration of the product in the Administration Console37Figure 4.3 Trial version registration — user informationFigure 4.4 Trial version regist

Pagina 301

Chapter 4 Product Registration and Licensing38Figure 4.5 Registration of the trial version — summaryFigure 4.6 Trial version registration — Trial IDAt

Pagina 302

4.3 Registration of the product in the Administration Console39Registration of the purchased productFollow the Register product with a purchased licen

Pagina 303

47.5 Policy routing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 957.6 User a

Pagina 304

Chapter 4 Product Registration and Licensing40Figure 4.8 Product registration — license numbersof additional components, add-ons and subscription

Pagina 305

4.3 Registration of the product in the Administration Console41Figure 4.9 Product registration — user information4. Page four includes optional inform

Pagina 306

Chapter 4 Product Registration and Licensing42Figure 4.10 Product registration — other informationFigure 4.11 Product registration — summary1. The lic

Pagina 307

4.4 Product registration at the website43work connection, etc.), simply restart the wizard and repeat the registration.4.4 Product registration at the

Pagina 308

Chapter 4 Product Registration and Licensing44Administrators are informed in two ways:• By a pop-up bubble tip (this function is featured by the WinRo

Pagina 309

4.6 User counter454.6 User counterThis chapter provides a detailed description on how WinRoute checks whether number oflicensed users has not been exc

Pagina 310

Chapter 4 Product Registration and Licensing46License releaseIdleness time (i.e. time for which no packet with a corresponding IP address meeting allc

Pagina 311

47Chapter 5Network interfacesWinRoute is a network firewall. This implies that it represents a gateway between two or morenetworks (typically between t

Pagina 312

Chapter 5 Network interfaces48change of a network adapter etc., there is no need to edit traffic rules — simple adding of thenew interface in the correc

Pagina 313

49you do not consider RAS clients as parts of trustworthy networks for any reason, you canmove the Dial-In interface to Other interfaces.Note:1. If bo

Pagina 314

515 User Accounts and Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19015.1 Viewing and

Pagina 315

Chapter 5 Network interfaces50DNSIP address of the primary DNS server set on the interface.MACHardware (MAC) address of a corresponding network adapte

Pagina 316

51In WinRoute, it is specify to specify a special name for each interface (names taken fromthe operating system can be confusing and the new name may

Pagina 317

Chapter 5 Network interfaces52Adding new interface (Software Appliance / VMware Virtual Appliance)In the Software Appliance / VMware Virtual Appliance

Pagina 318

53Chapter 6Internet ConnectionThe basic function of WinRoute is connection of the local network to the Internet via one ormore Internet connections (I

Pagina 319

Chapter 6 Internet Connection54This involves selection of the Internet connection type in the Configuration → Interfaces sec-tion of the WinRoute config

Pagina 320 - Chapter 23 Kerio VPN

6.1 Persistent connection with a single link55Figure 6.1 Traffic Policy Wizard — persistent connection with a single linkFigure 6.2 Network Policy Wizar

Pagina 321

Chapter 6 Internet Connection56Resulting interface configurationWhen you finish set-up in Traffic Policy Wizard, the resulting configuration can be viewedu

Pagina 322

6.2 Connection with a single leased link - dial on demand576.2 Connection with a single leased link - dial on demandIf the WinRoute host is connected

Pagina 323

Chapter 6 Internet Connection58Figure 6.4 Traffic Policy Wizard — dial on demandFigure 6.5 Network Policy Wizard — selection of an interface for the Int

Pagina 324

6.2 Connection with a single leased link - dial on demand59Figure 6.6 Configuration of interfaces — an on-demand dial linkThe Internet interfaces group

Pagina 325

622.9 Filter Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27622.10

Pagina 326

Chapter 6 Internet Connection60Figure 6.7 Interface properties — dialing settingsefficient to keep the link up persistently even in times with dense net

Pagina 327

6.2 Connection with a single leased link - dial on demand61connection is recovered automatically.• If the connection is set to be hung-up at the momen

Pagina 328

Chapter 6 Internet Connection62WarningWinRoute is running in the operating system as a service. Therefore, external applica-tions and operating system

Pagina 329

6.3 Connection Failover63WarningConnection failover is relevant only if performed by a persistent connection (i.e. the primaryconnection uses a networ

Pagina 330

Chapter 6 Internet Connection64Figure 6.10 Traffic Policy Wizard — failover of a leased link by a dial-upResulting interface configurationWhen you finish

Pagina 331

6.3 Connection Failover65The Internet interfaces group includes the Internet and the Dial-up link selected as primary andsecondary (failover) on the t

Pagina 332 - Paris branch office server

Chapter 6 Internet Connection66Note:1. Probe hosts must not block ICMP Echo Requests (PING) since such requests are used to testavailability of these

Pagina 333

6.4 Network Load Balancing67Both the primary and the secondary link may be configured automatically by the DHCP proto-col. In that case, WinRoute looks

Pagina 334

Chapter 6 Internet Connection68On the third page of the wizard, add all links (one by one) which you intend to use for trafficload balancing.In the Soft

Pagina 335 - Chapter 24

6.4 Network Load Balancing69Resulting interface configurationWhen you finish set-up in Traffic Policy Wizard, the resulting configuration can be viewedunde

Pagina 336

7Chapter 1Quick ChecklistIn this chapter you can find a brief guide for a quick setup of Kerio WinRoute Firewall (referredto as “WinRoute” within this

Pagina 337

Chapter 6 Internet Connection70Advanced settings (optimization, dedicated links, etc.)In basic configuration, network load balancing is applied automat

Pagina 338 - Chapter 25

71Chapter 7Traffic PolicyTraffic Policy belongs to of the basic WinRoute configuration. All the following settings aredisplayed and can be edited within th

Pagina 339 - 25.2 Configuration files

Chapter 7 Traffic Policy72Figure 7.1 Traffic Policy Wizard — introductionSteps 2 and 3— internet connection settingsOn the second page of the wizard, sele

Pagina 340

7.1 Network Rules Wizard73Figure 7.2 Network Policy Wizard — enabling access to Internet servicesAllow access to the following services onlyOnly selec

Pagina 341

Chapter 7 Traffic Policy74Figure 7.3 Network Policy Wizard — Kerio VPNStep 6 — specification of servers that will be available within the local networkIf

Pagina 342

7.1 Network Rules Wizard75Figure 7.5 Network Policy Wizard — mapping of the local serviceNote: Access to the Internet through WinRoute must be defined

Pagina 343

Chapter 7 Traffic Policy76Figure 7.7 Traffic Policy generated by the wizardFTP Service and HTTP ServiceThese rules map all HTTP and HTTPS services running

Pagina 344

7.1 Network Rules Wizard77NATThis rule sets that in all packets routed from the local network to the Internet, the source(private) IP address will be

Pagina 345

Chapter 7 Traffic Policy787.2 How traffic rules workThe traffic policy consists of rules ordered by their priority. When the rules are applied, theyare proc

Pagina 346

7.3 Definition of Custom Traffic Rules79The background color of each row with this rule can be defined as well. Use the Transparentoption to make the back

Pagina 347

Chapter 1 Quick Checklist89. Select an antivirus and define types of objects that will be scanned.If you choose the integrated McAfee antivirus applica

Pagina 348

Chapter 7 Traffic Policy80WarningIf either the source or the destination computer is specified by DNS name, WinRoutetries to identify its IP address whil

Pagina 349

7.3 Definition of Custom Traffic Rules81Figure 7.11 Traffic rule — VPN clients / VPNtunnel in the source/destination address definitiontunnel The All option

Pagina 350

Chapter 7 Traffic Policy82Note:1. If you require authentication for any rule, it is necessary to ensure that a rule ex-ists to allow users to connect to

Pagina 351 - Technical support

7.3 Definition of Custom Traffic Rules83Figure 7.13 Traffic rule — setting a serviceUse the Remove button to remove all items defined (the Nothing value wil

Pagina 352 - 26.2 Tested in Beta version

Chapter 7 Traffic Policy84Figure 7.14 Traffic rule — selecting an actionTranslationSource or/and destination IP address translation.Source IP address tran

Pagina 353 - Legal Notices

7.3 Definition of Custom Traffic Rules85Figure 7.15 Traffic rule — NAT — automatic IP address selectionload balancing dividing the traffic among individual l

Pagina 354 - Used open source items

Chapter 7 Traffic Policy86Figure 7.16 Traffic rule — NAT — NAT with specific interface (its IP address)failure. If set as suggested, WinRoute will behave l

Pagina 355

7.3 Definition of Custom Traffic Rules87Full cone NATFor all NAT methods it is possible to set mode of allowing of incoming packets coming fromany addres

Pagina 356

Chapter 7 Traffic Policy88Destination NAT (port mapping):Destination address translation (also called port mapping) is used to allow access to servicesh

Pagina 357 - Glossary of terms

7.3 Definition of Custom Traffic Rules89Figure 7.19 Traffic rule — packet/connection loggingNote: Connection cannot be logged for blocking and dropping rul

Pagina 358

9Chapter 2Introduction2.1 What’s new in 6.7.1In version 6.7.1, WinRoute brings the following new features:Kerio WinRoute Firewall Software Appliance /

Pagina 359

Chapter 7 Traffic Policy90• Default — all necessary protocol inspectors (or inspectors of the services listed in theService entry) will be applied on tr

Pagina 360

7.4 Basic Traffic Rule Types91DestinationThe Internet interfaces group. With this group, the rule is usable for any type of Internetconnection (see chap

Pagina 361

Chapter 7 Traffic Policy92Figure 7.23 Traffic rule that makes the local web server available from the InternetSourceMapped services can be accessed by cli

Pagina 362

7.4 Basic Traffic Rule Types93dropped. Therefore, it is recommended to put all rules for mapped services at the top ofthe table of traffic rules.Note: If

Pagina 363

Chapter 7 Traffic Policy94Limiting Internet AccessSometimes, it is helpful to limit users access to the Internet services from the local network.Access

Pagina 364

7.5 Policy routing95Alternatively you can define the rule to allow only authenticated users to access specificservices. Any user that has a user account

Pagina 365

Chapter 7 Traffic Policy96marginal traffic (web browsing, online radio channels, etc.). To meet this crucial requirementof an enterprise data traffic, it is

Pagina 366

7.5 Policy routing97Figure 7.31 Policy routing — setting NAT for a reserved linkFigure 7.32 Policy routing — a link reserved for a specific serverNote:

Pagina 367

Chapter 7 Traffic Policy98IP address will be used). To any other services, load balancing per connection will be applied— thus maximally efficient use of

Pagina 368

7.7 Partial Retirement of Protocol Inspector99counting reasons — see chapter 4.6). However, this NAT rule blocks any connection unlessthe user is auth

Comentarios a estos manuales

Sin comentarios