Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Setting Access Rights in Kerio Control

    Overview This article provides the required steps to configure access rights in Kerio Control. This procedure is helpful for administrators when implementing the access right access scheme within Keri...

  • Blocking Unwanted Sites in Kerio Control

    Overview If you have a Kerio Control Web Filter license, you can block unwanted sites like Facebook or other social media with the Application awareness. Step by step guide In this article, we will us...

  • Configuring Protocol Inspection

    Overview To apply a protocol inspector explicitly to other traffic, administrators must edit or add a new service where this inspector is to be used. This article provides information to configure Pro...

  • Configuring Dynamic DNS

    Overview DDNS is a service providing the automatic update of the IP address in the DNS record for the particular hostname. Kerio Control allows configuring Dynamic DNS for 3 different providers, such ...

  • Configuring Parameter 66 in DHCP Server

    Overview The DHCP protocol assigns IP addresses. Apart from these addresses, you can also send additional parameters via the DHCP protocol. Parameter 66 configures the TFTP server address.   Back to t...

  • Configuring Protocol-Specific Intrusions

    Overview Some intrusions may target security weaknesses in specific application protocols. Therefore, some security rules are focused on special protocols on standard and frequently used ports. If an ...

  • Configuring connection limits in Kerio Control

    Overview Limiting the number of TCP and UDP connections within your network helps protect your business against denial of service (DoS) attacks. You can set connection limits based on: A source IP add...

  • Creating SSL Certificates with Alternative DNS Names

    Overview If you configure the reverse proxy for your web servers, you can use just one certificate for all the web servers placed behind the reverse proxy.   Back to top   Process To create an SSL cer...

  • Creating an SSL Certificate Signed by Local Authority

    Overview This article will show you how to create a new SSL certificate if the old one is not valid anymore.   Back to top   Process In the Administration interface, navigate to Definitions > SSL Cert...

  • Accessing Kerio Control's Shell Using SSH

    Overview This article provides the steps required to access Kerio Control's shell using Secure Shell (SSH). This is helpful when you need to perform general troubleshooting, specifically on network is...