Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities
Overview Kerio Control enables administrators to limit the data/internet that users can use. Furthermore, using Bandwidth Management in Kerio Control, it is possible to define what happens when that l...
Overview IP addresses are identifiers assigned to devices connected to a TCP/IP Network. Kerio Control uses predefined IP address groups in other configuration dialogs such as the traffic and URL rule...
Overview You can modify the SNORT configuration to reduce its pre-allocated memory for Kerio Control to run with more RAM available; this article provides the steps required to configure SNORT for thi...
Overview Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, and Internet gateways, amongst others, to seamlessly disc...
Overview Kerio Control is configured by default to log out authenticated users automatically after 120 minutes of inactivity. You can disable or adjust the timeout. This article details the steps requ...
Overview Using the certificate means that administrators have to select it in the specific settings, e.g., for SSL certificates for the VPN server, administrators need to select them by going to Inte...
Overview Kerio Control enables the administrator to define only one scope within each subnet. You can create exclusions from this scope by setting individual ranges, e.g., for a group of servers with ...
Overview Logs are required every time we need a root-cause/deep-dive analysis on a reported issue. This article provides the guidelines for extracting debug logs from Kerio Control. Back to top Proc...
Overview As an administrator, you can reserve an IP address (within the DHCP scope) based on the MAC address of active hosts in Kerio Control; this can be helpful when administrators want specific IP ...
Overview If you do not want to use the automatic configuration of IP ranges, you can switch to the manual mode. However, note that changes of interfaces in the Trusted/Local Interfaces, Guest Interfac...