Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Setting Access Rights in Kerio Control

    Overview This article provides the required steps to configure access rights in Kerio Control. This procedure is helpful for administrators when implementing the access right access scheme within Keri...

  • Configuring NAT in Kerio Control

    Overview Network Address Translation (NAT) is a term used for the exchange of a private IP address in a packet going out from the local network to the Internet with the IP address of the Internet inte...

  • Configuring Protocol Inspection

    Overview To apply a protocol inspector explicitly to other traffic, administrators must edit or add a new service where this inspector is to be used. This article provides information to configure Pro...

  • Configuring Parameter 66 in DHCP Server

    Overview The DHCP protocol assigns IP addresses. Apart from these addresses, you can also send additional parameters via the DHCP protocol. Parameter 66 configures the TFTP server address.   Back to t...

  • Configuring Protocol-Specific Intrusions

    Overview Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rules are focused on special protocols on standard and frequently used ports. If an ...

  • Configuring connection limits in Kerio Control

    Overview Limiting the number of TCP and UDP connections within your network helps protect your business against denial of service (DoS) attacks. You can set connection limits based on: A source IP add...

  • Creating SSL Certificates with Alternative DNS Names

    Overview If you configure the reverse proxy for your web servers, you can use just one certificate for all the web servers placed behind the reverse proxy.   Back to top   Process To create an SSL cer...

  • Creating an SSL Certificate Signed by Local Authority

    Overview This article will show you how to create a new SSL certificate if the old one is not valid anymore.   Back to top   Process In the Administration interface, navigate to Definitions > SSL Cert...

  • Accessing Kerio Control's Shell Using SSH

    Overview This article provides the steps required to access Kerio Control's shell using Secure Shell (SSH). This is helpful when you need to perform general troubleshooting, specifically on network is...

  • Displaying Kerio Control Statistics

    Overview By default, Kerio Control Statistics displays statistics of the current day. However, you can change the view and customize the period for which to show statistics.   Back to top    Process I...