Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Filtering HTTPS Connections

    Overview Kerio Control decrypts and filters HTTPS (Hyper Text Transfer Protocol Secure) connections. Filtering is the same as for the HTTP (Hyper Text Transfer Protocol). Kerio Control can apply the s...

  • Kerio Control System Alerts

    Overview All system alert messages are recorded in the Alert log. The Alert log provides a complete history of system alerts generated by Kerio Control: virus detection, dialing and hanging up, reache...

  • Modifying Static Routes In Routing Tables

    Overview Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic. Depending on the number of networ...

  • Configuring the Protocol Inspection Feature

    Overview Kerio Control includes protocol inspectors, which monitor all traffic on application protocols, such as HTTP (Hypertext Transfer Protocol) and FTP (File Transfer Protocol). The inspectors fil...

  • Connection Limits for Excluded IP Address Groups in Kerio Control

    Overview Limiting the number of TCP and UDP connections within your network in Kerio Control has its benefits. For instance, it helps protect your business against DoS (denial of service) attacks. How...

  • Creating Service Groups in Kerio Control

    Overview Services are defined by a communication protocol and by a port number (e.g. the HTTP service uses the TCP protocol with the port number 80). You can create groups of services that simplify cr...

  • Setting Shared Password for Guest Users

    Overview Kerio Control allows customization of the guest network password. This article describes the steps for setting up a password that guests can use to access the Internet via the guest network. ...

  • Enabling Syslog Logging

    Information The Kerio Control External Logging tab allows sending individual log records to the Syslog server.   Back to top   Process In the Administration interface, go to Logs. Click any log file t...

  • Configuring Bandwidth Management in Kerio Control

    Overview Kerio Control includes bandwidth management, which regulates network traffic to ensure the reliability of essential services and avoid congestion. The bandwidth management feature provides tw...

  • Configuring Non-Transparent Proxy Server

    Overview Even though the NAT technology used in Kerio Control enables direct access to the Internet from all local hosts, Kerio Control contains a standard non-transparent proxy server that needs to b...