Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive Administrator's Guide - Kerio Software Archive

download.kerio.com
from download.kerio.com More from this publisher
30.01.2015 Views

User Accounts and Groups Additional rights: Users can override WWW content rules This option specifies application of ruled for web page elements for pages matching an existing URL rule. For details on this right, refer to chapter 16.2. User can unlock URL rules This option allows its members one-shot bypassing of denial rules for blocked websites (if allowed by the corresponding URL rule — see chapter 13.2). All performed unlock actions are traced in the Security log. Users can dial RAS connection If the Internet connection uses dial-up lines, users of this group will be allowed to dial and hang up these lines in the Web interface (see chapter 12). Users can connect using VPN Members of the group can connect to the local network via the Internet using the Kerio VPN Client (for details, see chapter 23). User can use Clientless SSL-VPN Members of this group will be allowed to access shared files and folders in the local network via the Clientless SSL-VPN web interface. The Clientless SSL-VPN interface and the corresponding user right in Kerio Control is available for Windows only. For details, see chapter 24. Users are allowed to use P2P networks The P2P Eliminator module (detection and blocking of Peer-to-Peer networks — see chapter 8.4) will not be applied to members of this group. Users are allowed to view statistics Users in this group will be allowed to view firewall statistics in the web interface (see chapter 12). Group access rights are combined with user access rights. This means that current user rights are defined by actual rights of the user and by rights of all groups in which the user is included. 238

Chapter 17 Administrative settings 17.1 System configuration (Software Appliance / VMware Virtual Appliance) In the Software Appliance / VMware Virtual Appliance edition, the Kerio Control administration console allows setting of a few basic parameters of the firewall’s operating system. These settings are necessary for correct functionality of the firewall and they can be found in Configuration / Advanced options, on the System Configuration tab. Figure 17.1 System configuration — host name, date, time and time zone Server name Name is important both for some Kerio Control services (e.g. secured web interface) and for the firewall’s operating system’s services. The DNS module in Kerio Control sets IP addresses of all the firewall’s interfaces for the name automatically. If another DNS server is used in the local network, it is necessary to set corresponding DNS records on it. Date, time and time zone Many Kerio Control features (user authentication, logs, statistics, etc.) require correct setting of date, time and time zone on the firewall. Date and time can be set automatically but it is more useful to use an NTP server which provides information about the current time and allows automatic management of the 239

User Accounts and Groups<br />

Additional rights:<br />

Users can override WWW content rules<br />

This option specifies application of ruled for web page elements for pages matching an<br />

existing URL rule. For details on this right, refer to chapter 16.2.<br />

User can unlock URL rules<br />

This option allows its members one-shot bypassing of denial rules for blocked websites<br />

(if allowed by the corresponding URL rule — see chapter 13.2). All performed unlock<br />

actions are traced in the Security log.<br />

Users can dial RAS connection<br />

If the Internet connection uses dial-up lines, users of this group will be allowed to dial<br />

and hang up these lines in the Web interface (see chapter 12).<br />

Users can connect using VPN<br />

Members of the group can connect to the local network via the Internet using the <strong>Kerio</strong><br />

VPN Client (for details, see chapter 23).<br />

User can use Clientless SSL-VPN<br />

Members of this group will be allowed to access shared files and folders in the local<br />

network via the Clientless SSL-VPN web interface.<br />

The Clientless SSL-VPN interface and the corresponding user right in <strong>Kerio</strong> Control is<br />

available for Windows only. For details, see chapter 24.<br />

Users are allowed to use P2P networks<br />

The P2P Eliminator module (detection and blocking of Peer-to-Peer networks — see<br />

chapter 8.4) will not be applied to members of this group.<br />

Users are allowed to view statistics<br />

Users in this group will be allowed to view firewall statistics in the web interface (see<br />

chapter 12).<br />

Group access rights are combined with user access rights. This means that current user rights<br />

are defined by actual rights of the user and by rights of all groups in which the user is included.<br />

238

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!