Start a conversation

Articles

Activity logs Accesses HowTo's/Configuration Reporting Vulnerabilities

  • Configuring IP Address Groups in Kerio Control

    Overview IP addresses are identifiers assigned to devices connected to a TCP/IP Network. Kerio Control uses predefined IP address groups in other configuration dialogs such as the traffic and URL rule...

  • Configuring SNORT to Reduce Memory Consumption in Kerio Control

    Overview You can modify the SNORT configuration to reduce its pre-allocated memory for Kerio Control to run with more RAM available; this article provides the steps required to configure SNORT for thi...

  • Configuring Universal Plug-and-Play

    Overview Universal Plug and Play (UPnP) is a set of networking protocols that permits networked devices, such as personal computers, printers, and Internet gateways, amongst others, to seamlessly disc...

  • Configuring Automatic User Logout Timeout in Kerio Control

    Overview Kerio Control is configured by default to log out authenticated users automatically after 120 minutes of inactivity. You can disable or adjust the timeout. This article details the steps requ...

  • Creating Certificates Signed by Certification Authorities (CA) in Kerio Control

    Overview Using the certificate means that administrators have to select it in the specific settings, e.g.,  for SSL certificates for the VPN server, administrators need to select them by going to Inte...

  • Defining Individual Scopes in Kerio Control

    Overview Kerio Control enables the administrator to define only one scope within each subnet. You can create exclusions from this scope by setting individual ranges, e.g., for a group of servers with ...

  • Extracting Kerio Control Debug Logs

    Overview Logs are required every time we need a root-cause/deep-dive analysis on a reported issue. This article provides the guidelines for extracting debug logs from Kerio Control. Back to top   Proc...

  • Making a DHCP Reservation in Active Hosts

    Overview As an administrator, you can reserve an IP address (within the DHCP scope) based on the MAC address of active hosts in Kerio Control; this can be helpful when administrators want specific IP ...

  • Manual Configuration of Scopes and Reservations in Kerio Control

    Overview If you do not want to use the automatic configuration of IP ranges, you can switch to the manual mode. However, note that changes of interfaces in the Trusted/Local Interfaces, Guest Interfac...

  • Modifying Configuration Parameters in Kerio Control

    Overview In some situations, administrators may need to change the Kerio Control configuration directly. For example, this needs to be done when there is a need to adjust a setting that is not availab...