Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Configuring L2TP Tunnel

    Overview Kerio Control supports Layer 2 Tunneling Protocol (L2TP). Some Internet providers use L2TP to create tunnels for connecting you to the Internet. If your provider requires this protocol, you c...

  • Configuring PPTP tunnel

    Overview Kerio Control supports PPTP (Point-to-Point Tunneling Protocol). Some Internet providers use PPTP to create tunnels for connecting you to the Internet. If your provider requires this protocol...

  • Configuring Simple DNS Forwarding in Kerio Control

    Overview Kerio Control includes a DNS server. We recommend configuring the DNS server with the DHCP server together in Kerio Control. The DNS forwarding service only works for IPv4 and IPv6 is not sup...

  • Configuring Date, Time, Time Zone and Server Name for Kerio Control

    Overview Many Kerio Control features (user authentication, logs, statistics, etc.) require the correct setting of the date, time, and time zone on the firewall. Kerio Control allows manual settings or...

  • Creating Time Ranges in Kerio Control

    Overview Time ranges allow you to define time intervals for specific rules to be active. This article shares information about creating time ranges that can be configured and applied to various polici...

  • Customizing Page Title, Logo and Favicon in Kerio Control

    Overview Kerio Control allows you to customize a Logo, Page title, and Favicon on the login page that allows your users to access the internet, denial pages, and user alerts. However, the login pages ...

  • Defining User Quotas

    Overview Kerio Control allows configuring a limit for the volume of data a user is allowed to transfer. Furthermore, Kerio Control allows defining what happens once the quota is exceeded.  To define u...

  • Deny traffic to a particular user in Kerio Control

    Overview Traffic policy in Kerio Control consists of rules that are ordered by priority. Rules found at the top being are considered with high priority and are processed/applied first. In the default ...

  • Disabling 2-Step Verification in Kerio Control Statistics

    Overview If you lose your mobile device, ask your system administrator to disable the 2-step verification for you. If your administrator sets the 2-step verification as compulsory, you must enable it ...

  • Exclude Specific Users from SafeSearch in Kerio Control

    Overview Users can have problems with SafeSearch enabled. For example, SafeSearch can block an important web page with harmless content. If this happens, there is a way to exclude users from the SafeS...