Comodo Korugan Administrator Guide | © 2018 Comodo Security Solutions Inc

Comodo Korugan Administrator Guide | © 2018 Comodo Security Solutions Inc

272rat Comodo Korugan Software Version 1.10 Unified Threat Management Administrator Guide Guide Version 1.10.120318 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Korugan - Administrator Guide Table of Contents 1 Introduction to Comodo Korugan...........................................................................................................................5 1.1 Installing Korugan and logging-in to the Administrative Console..............................................................7 2 The Main Interface .................................................................................................................................................11 3 Network Configuration...........................................................................................................................................15 4 The Dashboard........................................................................................................................................................31 5 Viewing and Modifying System Status and General Configuration..................................................................35 5.1 Managing Administrative Accounts.............................................................................................................36 5.1.1 Adding and Managing Administrators................................................................................................37 5.1.2 Managing Administrative Roles...........................................................................................................40 5.2 Central Management......................................................................................................................................45 5.3 Accessing the Web Console.........................................................................................................................46 5.4 Configuring SSH Access...............................................................................................................................48 5.5 Configuring GUI Settings..............................................................................................................................50 5.6 High Availability.............................................................................................................................................51 5.7 Viewing and Updating Firmware Version....................................................................................................52 5.8 Creating and Scheduling Backup of UTM State..........................................................................................53 5.8.1 Manually Creating a Backup................................................................................................................55 5.8.2 Scheduling Backup Operations...........................................................................................................57 5.8.3 Encrypting Backup Archives...............................................................................................................58 5.8.4 Exporting a backup...............................................................................................................................59 5.8.5 Importing a Backup Archive from a Local Computer........................................................................60 5.8.6 Rolling Back the Appliance to a Previous Time Point.......................................................................60 5.8.7 Resetting the Appliance to Factory Defaults ....................................................................................61 5.9 Shutting Down the UTM Appliance..............................................................................................................61 6 Viewing UTM Appliance Status ............................................................................................................................62 6.1 System Status................................................................................................................................................63 6.2 Network Status...............................................................................................................................................67 6.3 System Usage Summaries............................................................................................................................71 6.4 Network Traffic...............................................................................................................................................74 6.5 Network Connections....................................................................................................................................78 6.6 SSLVPN Connections....................................................................................................................................79 7 Network Configuration - Advanced Settings.......................................................................................................80 7.1 Configuring Interface Devices, Uplinks and VLANs...................................................................................81 7.1.1 Adding and Managing Gateway Uplink Devices................................................................................81 7.1.2 Creating VLANs.....................................................................................................................................85 7.2 Adding and Managing Hosts.........................................................................................................................87 7.3 Routes.............................................................................................................................................................90 7.3.1 Adding and Managing Static Routes...................................................................................................91 7.3.2 Adding and Managing Policy Routing Rules......................................................................................94 8 Configuring UTM Services and Protection Settings.........................................................................................100 8.1 DHCP Server.................................................................................................................................................102 Comodo Korugan Administrator Guide | © 2018 Comodo Security Solutions Inc. | All rights reserved. 2 Comodo Korugan - Administrator Guide 8.2 Dynamic DNS................................................................................................................................................106 8.3 Advanced Threat Protection.......................................................................................................................108 8.3.1 Managing ATP Profiles.......................................................................................................................109 8.3.2 Threat Intelligence...............................................................................................................................113 8.3.3 Endpoint Management........................................................................................................................116 8.3.4 Comodo Antivirus...............................................................................................................................119 8.4 Time Server...................................................................................................................................................121 8.5 Content Flow Check System.......................................................................................................................122 8.5.1 Configuring Intrusion Prevention System........................................................................................123 8.5.2 Managing IPS Rulesets.......................................................................................................................124 8.5.3 Managing Application Identification Rulesets..................................................................................127 8.6 Configuring Wireless Hotspot....................................................................................................................129 8.6.1 Configuring Captive Portal Service...................................................................................................130 8.6.2 Customizing the Login Page..............................................................................................................134 8.6.3 Adding and Managing Permanent Users..........................................................................................134 8.7 Traffic Monitoring.........................................................................................................................................135 8.8 Quality of Service.........................................................................................................................................137 8.9 Internet Content Adaptation Protocol........................................................................................................147 9 Managing Firewall Configuration........................................................................................................................148 9.1 Firewall Objects............................................................................................................................................149 9.1.1 Managing Firewall Address

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    272 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us