Comodo Korugan Administrator Guide | © 2018 Comodo Security Solutions Inc
Total Page:16
File Type:pdf, Size:1020Kb
272rat Comodo Korugan Software Version 1.10 Unified Threat Management Administrator Guide Guide Version 1.10.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Korugan - Administrator Guide Table of Contents 1 Introduction to Comodo Korugan...........................................................................................................................5 1.1 Installing Korugan and logging-in to the Administrative Console..............................................................7 2 The Main Interface .................................................................................................................................................11 3 Network Configuration...........................................................................................................................................15 4 The Dashboard........................................................................................................................................................31 5 Viewing and Modifying System Status and General Configuration..................................................................35 5.1 Managing Administrative Accounts.............................................................................................................36 5.1.1 Adding and Managing Administrators................................................................................................37 5.1.2 Managing Administrative Roles...........................................................................................................40 5.2 Central Management......................................................................................................................................45 5.3 Accessing the Web Console.........................................................................................................................46 5.4 Configuring SSH Access...............................................................................................................................48 5.5 Configuring GUI Settings..............................................................................................................................50 5.6 High Availability.............................................................................................................................................51 5.7 Viewing and Updating Firmware Version....................................................................................................52 5.8 Creating and Scheduling Backup of UTM State..........................................................................................53 5.8.1 Manually Creating a Backup................................................................................................................55 5.8.2 Scheduling Backup Operations...........................................................................................................57 5.8.3 Encrypting Backup Archives...............................................................................................................58 5.8.4 Exporting a backup...............................................................................................................................59 5.8.5 Importing a Backup Archive from a Local Computer........................................................................60 5.8.6 Rolling Back the Appliance to a Previous Time Point.......................................................................60 5.8.7 Resetting the Appliance to Factory Defaults ....................................................................................61 5.9 Shutting Down the UTM Appliance..............................................................................................................61 6 Viewing UTM Appliance Status ............................................................................................................................62 6.1 System Status................................................................................................................................................63 6.2 Network Status...............................................................................................................................................67 6.3 System Usage Summaries............................................................................................................................71 6.4 Network Traffic...............................................................................................................................................74 6.5 Network Connections....................................................................................................................................78 6.6 SSLVPN Connections....................................................................................................................................79 7 Network Configuration - Advanced Settings.......................................................................................................80 7.1 Configuring Interface Devices, Uplinks and VLANs...................................................................................81 7.1.1 Adding and Managing Gateway Uplink Devices................................................................................81 7.1.2 Creating VLANs.....................................................................................................................................85 7.2 Adding and Managing Hosts.........................................................................................................................87 7.3 Routes.............................................................................................................................................................90 7.3.1 Adding and Managing Static Routes...................................................................................................91 7.3.2 Adding and Managing Policy Routing Rules......................................................................................94 8 Configuring UTM Services and Protection Settings.........................................................................................100 8.1 DHCP Server.................................................................................................................................................102 Comodo Korugan Administrator Guide | © 2018 Comodo Security Solutions Inc. | All rights reserved. 2 Comodo Korugan - Administrator Guide 8.2 Dynamic DNS................................................................................................................................................106 8.3 Advanced Threat Protection.......................................................................................................................108 8.3.1 Managing ATP Profiles.......................................................................................................................109 8.3.2 Threat Intelligence...............................................................................................................................113 8.3.3 Endpoint Management........................................................................................................................116 8.3.4 Comodo Antivirus...............................................................................................................................119 8.4 Time Server...................................................................................................................................................121 8.5 Content Flow Check System.......................................................................................................................122 8.5.1 Configuring Intrusion Prevention System........................................................................................123 8.5.2 Managing IPS Rulesets.......................................................................................................................124 8.5.3 Managing Application Identification Rulesets..................................................................................127 8.6 Configuring Wireless Hotspot....................................................................................................................129 8.6.1 Configuring Captive Portal Service...................................................................................................130 8.6.2 Customizing the Login Page..............................................................................................................134 8.6.3 Adding and Managing Permanent Users..........................................................................................134 8.7 Traffic Monitoring.........................................................................................................................................135 8.8 Quality of Service.........................................................................................................................................137 8.9 Internet Content Adaptation Protocol........................................................................................................147 9 Managing Firewall Configuration........................................................................................................................148 9.1 Firewall Objects............................................................................................................................................149 9.1.1 Managing Firewall Address