Kerio-Control-Adminguide.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
ADMINISTRATOR GUIDE Find out how to install and configure Kerio Control in different environments and how to set up advanced features The information and content in this document is provided for informational purposes only and is provided "as is" with no warranties of any kind, either express or implied, including without limitation any warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software disclaims and in no event shall be liable for any losses or damages of any kind, including any consequential or incidental damages in connection with the furnishing, performance or use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no warranty, promise or guarantee about the completeness, accuracy, recency or adequacy of information contained in this document and is not responsible for misprints, out-of-date information, or errors. GFI reserves the right to revise or update its products, software or documentation without notice. You must take full responsibility for your use and application of any GFI product or service. No part of this documentation may be reproduced in any form by any means without prior written authorization of GFI Software. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical. GFI and Kerio Control are trademarks or registered trademarks of GFI Software or its affiliates in the US and other countries. Any other trademarks contained herein are the property of their respective owners. Kerio Control is copyright of Kerio. - 1999-2021 Kerio. All rights reserved. Document Version: 9.2.8 Last updated (month/day/year): 03/09/2021 Contents 1 Introduction 8 2 Getting started 9 2.1 System requirements for Kerio Control 10 2.2 Configuration Assistant 10 2.2.1 Configure Internet connection and the local network 10 2.2.2 Define traffic policy 13 2.2.3 Export your configuration 14 2.2.4 Import configuration files 14 2.2.5 Register product 15 2.3 Logging to Kerio Control 15 2.4 Adding Kerio Control to MyKerio 16 2.4.1 Adding Kerio Control to MyKerio through Kerio Control Administration 16 2.4.2 Adding Kerio Control to MyKerio during the Kerio Control installation 17 2.5 Upgrading Kerio Control 18 2.5.1 Checking new versions 18 2.5.2 Automatic upgrade of Kerio Control 19 2.5.3 Configuring email alerts 19 2.5.4 Upgrade with USB tools 19 2.5.5 Troubleshooting 19 2.5.6 Upgrading to the latest version from Kerio Control 9.1 and newer 19 2.5.7 Upgrading to the latest version from Kerio Control 8 & 9.0 20 2.5.8 Upgrading to the latest version from Kerio Control 7 21 2.6 Installation 21 2.6.1 Installing Kerio Control 22 2.6.2 Configuring the Activation Wizard 25 2.6.3 Generating a bootable USB flash drive for Kerio Control software appliances 32 2.6.4 Increasing the number of supported network interfaces in the Kerio Control VMware Virtual Appliance 33 2.6.5 Migrating from Kerio Control (Windows Edition) to the Appliance Editions (Software/Virtual/Hardware) 33 2.6.6 Kerio Control Virtual Appliance for Hyper-V 35 2.6.7 Kerio Control VMware Virtual Appliance 38 2.7 Licenses and registration 42 2.7.1 Licensing and registering Kerio Control 42 2.7.2 License Expiration 45 2.7.3 Transferring the configuration and license from the Windows version of Kerio Control to the Software or Virtual Appliance edition 46 2.7.4 How do I apply renewals or add-ons to my Kerio product? 46 2.8 Hardware appliance 46 2.8.1 Kerio Control NG series installation guide 47 2.8.2 End of life of Kerio Control Box 1110 52 2.8.3 Configuring Ethernet ports in Kerio Control hardware appliances 52 2.8.4 Migrating configuration from one Kerio Control hardware appliance to another 55 2.8.5 Connecting to Kerio hardware appliances with a serial console 60 2.8.6 WiFi 65 2.9 Kerio Control API 74 3 Using 75 3.1 Using Dashboard in Kerio Control 75 3.2 Tips for tablets 76 3.3 Antivirus 77 3.3.1 Configuring antivirus protection 77 3.3.2 Configuring email scanning 78 3.3.3 Configuring HTTP and FTP scanning 79 3.3.4 Using an external antivirus with Kerio products 80 3.4 Backup 81 3.4.1 Saving configuration to FTP server 81 3.4.2 Saving configuration to MyKerio 83 3.5 Accounts 84 3.5.1 Managing user accounts in Kerio Control 84 3.5.2 Setting access rights in Kerio Control 87 3.5.3 Managing user quotas in Kerio Control 88 3.5.4 Blocking web object elements for particular users 90 3.5.5 Configuring automatic user login 91 3.5.6 Creating user groups in Kerio Control 92 3.5.7 Authenticating users to Kerio Control 93 3.6 Directory services 95 3.6.1 Connecting Kerio Control to directory service 95 3.6.2 Automatic user authentication using NTLM 98 3.6.3 How do I force users to log out of the firewall? 102 3.6.4 How to use a Windows Active Directory Group Policy Object (GPO) to logon and logout users auto- matically from Kerio Control 103 3.6.5 Optimizing the communication between Kerio Control and Active Directory 116 3.7 Monitoring 117 3.7.1 Monitoring active hosts 117 3.7.2 Monitoring active connections 121 3.7.3 Monitoring System Health in Kerio Control 123 3.7.4 Monitoring traffic in Kerio Control 123 3.7.5 Monitoring user statistics 126 3.7.6 Monitoring VPN clients 128 3.7.7 SNMP monitoring 129 3.8 Logs 130 3.8.1 Using and configuring logs 131 3.8.2 Using the Config log 135 3.8.3 Using the Connection log 136 3.8.4 Using the Debug log 137 3.8.5 Using the Dial log 139 3.8.6 Using the Error log 140 3.8.7 Using the Filter log 141 3.8.8 Using the Host log 142 3.8.9 Using the Http log 144 3.8.10 Using the Security log 145 3.8.11 Using the Warning log 147 3.8.12 Using the Web log 148 3.8.13 Logging packets 148 3.8.14 Log packet formatting 151 3.9 VPN 152 3.9.1 Configuring Kerio VPN 153 3.9.2 Configuring IPsec VPN Server 161 3.9.3 Routing all traffic through Kerio VPN Tunnel 179 3.9.4 Connecting multiple offices via Kerio VPN and IPsec VPN tunnels 183 3.9.5 Assigning static IP addresses for Kerio Control VPN Clients 188 3.9.6 Kerio Control VPN Client for administrators 189 3.9.7 Using Logs to troubleshoot VPN Client issues 189 4 Settings 191 4.1 Interfaces 191 4.1.1 Configuring network interfaces 192 4.1.2 Configuring the guest network 195 4.1.3 Configuring PPPoE connections 197 4.1.4 Configuring PPTP tunnel 199 4.1.5 Configuring TCP/IP settings in Kerio Control interfaces 199 4.1.6 Configuring L2TP tunnel 201 4.1.7 Configuring multiple WAN IPs with PPPoE 204 4.1.8 Configuring VLANs 207 4.1.9 Changing MAC addresses of network interfaces 208 4.1.10 Changing the MTU of network interfaces 209 4.1.11 Changing the speed and duplex settings of Ethernet interfaces 210 4.1.12 Using alert messages 212 4.1.13 Sending log message alerts 216 4.1.14 Using IP Tools 218 4.2 Security 220 4.2.1 Configuring 2-step verification 220 4.2.2 Blocking all incoming connections from specified countries in Kerio Control 223 4.2.3 Configuring connection limits 225 4.2.4 Configuring intrusion prevention system 229 4.2.5 Filtering MAC addresses 230 4.2.6 Protecting users against password guessing attacks 231 4.2.7 Protocol inspection in Kerio Control 232 4.2.8 Encrypting User Data 235 4.3 IPv6 236 4.3.1 Configuring IPv6 networking in Kerio Control 236 4.3.2 Support for IPv6 protocol 238 4.3.3 Configuring traffic rules for IPv6 network 239 4.4 Traffic rules 243 4.4.1 Configuring traffic rules 244 4.4.2 Configuring IP address translation 249 4.4.3 Configuring Demilitarized Zone (DMZ) 252 4.4.4 Configuring traffic rules - exclusions 253 4.4.5 Configuring traffic rules - multihoming 253 4.4.6 Limiting Internet access with traffic rules 255 4.4.7 Troubleshooting traffic rules 256 4.5 Content filtering 259 4.5.1 Configuring the Content Filter 259 4.5.2 Application awareness in Kerio Control 265 4.5.3 Configuring FTP policy 274 4.5.4 Configuring HTTP policy 275 4.5.5 Filtering web content by word occurrence 279 4.5.6 Blocking inappropriate or explicit content in search results 280 4.5.7 Filtering HTTPS connections 282 4.5.8 HTTPS filtering specifics 286 4.5.9 Using Kerio Control Web Filter 286 4.5.10 Slow Internet connection with activated Kerio WebFilter 288 4.5.11 Eliminating Peer-to-Peer traffic 289 4.6 Bandwidth optimization 291 4.6.1 Configuring bandwidth management 291 4.6.2 Configuring policy routing 295 4.6.3 Setting limit per host 298 4.6.4 Detecting large data transfers 299 4.6.5 Bandwidth management - setting the speed of the link 300 4.7 Proxy server 300 4.7.1 Configuring proxy server 300 4.7.2 Configuring the reverse proxy 303 4.8 Server configuration 308 4.8.1 Configuring a routing table in Kerio Control 309 4.8.2 Configuring HTTP cache 312 4.8.3 Configuring Service Discovery forwarding in the Kerio Control network 313 4.8.4 Configuring the Kerio Control web interface 314 4.8.5 Configuring system settings date, time, time zone and server name 315 4.8.6 Customizing logo on Kerio Control login page, denial pages and user alerts 318 4.8.7 Customizing the language used in Kerio Control interfaces 318 4.8.8 Configuring statistics and reports 319 4.8.9 Configuring the SMTP server 325 4.8.10 DHCP server in Kerio Control 326 4.8.11 DNS forwarding service in Kerio Control 330 4.8.12 Modifying parameters in Kerio Control configuration 332 4.8.13 Optimizing performance with large segment offload 333 4.8.14 Using RADIUS server in Kerio Control 334 4.8.15 Configuring IP address groups 339 4.8.16 Configuring URL groups 342 4.8.17 Services in Kerio Control 344 4.8.18 Creating time