Administrator's Guide - Kerio Software Archive
Administrator's Guide - Kerio Software Archive Administrator's Guide - Kerio Software Archive
Kerio VPN • No DNS server will be set on interfaces of the Kerio Control host connected to the local networks LAN 1 and LAN 2. • On other computers set an IP address as the primary DNS server. This address must match the corresponding default gateway (10.1.1.1 or 10.1.2.1). Hosts in the local network can be configured automatically by DHCP protocol. 340
23.6 Example of a more complex Kerio VPN configuration 4. Enable the VPN server and configure its SSL certificate (create a self-signed certificate if no certificate provided by a certification authority is available). Note: The VPN network and Mask entries now include an automatically selected free subnet. Check whether this subnet does not collide with any other subnet in the headquarters or in the filials. If it does, specify a free subnet. Figure 23.33 Headquarters — VPN server configuration For a detailed description on the VPN server configuration, refer to chapter 23.1. 341
- Page 289 and 290: 22.3 Alert Log Figure 22.7 Highligh
- Page 291 and 292: 22.5 Connection Log A typical examp
- Page 293 and 294: 22.6 Debug Log The expression must
- Page 295 and 296: 22.7 Dial Log 3. Disconnection caus
- Page 297 and 298: 22.9 Filter Log • 8000-8099 — H
- Page 299 and 300: 22.10 Http log Packet log example:
- Page 301 and 302: 22.11 Security Log An example of Ht
- Page 303 and 304: 22.11 Security Log Example: [17/Jul
- Page 305 and 306: 22.13 Warning Log Events causing di
- Page 307 and 308: Chapter 23 Kerio VPN Kerio Control
- Page 309 and 310: 23.1 VPN Server Configuration Figur
- Page 311 and 312: 23.1 VPN Server Configuration the V
- Page 313 and 314: 23.1 VPN Server Configuration Kerio
- Page 315 and 316: 23.3 Interconnection of two private
- Page 317 and 318: 23.3 Interconnection of two private
- Page 319 and 320: 23.3 Interconnection of two private
- Page 321 and 322: 23.4 Exchange of routing informatio
- Page 323 and 324: 23.5 Example of Kerio VPN configura
- Page 325 and 326: 23.5 Example of Kerio VPN configura
- Page 327 and 328: 23.5 Example of Kerio VPN configura
- Page 329 and 330: 23.5 Example of Kerio VPN configura
- Page 331 and 332: 23.5 Example of Kerio VPN configura
- Page 333 and 334: 23.5 Example of Kerio VPN configura
- Page 335 and 336: 23.6 Example of a more complex Keri
- Page 337 and 338: 23.6 Example of a more complex Keri
- Page 339: 23.6 Example of a more complex Keri
- Page 343 and 344: 23.6 Example of a more complex Keri
- Page 345 and 346: 23.6 Example of a more complex Keri
- Page 347 and 348: 23.6 Example of a more complex Keri
- Page 349 and 350: 23.6 Example of a more complex Keri
- Page 351 and 352: 23.6 Example of a more complex Keri
- Page 353 and 354: 23.6 Example of a more complex Keri
- Page 355 and 356: 23.6 Example of a more complex Keri
- Page 357 and 358: 23.6 Example of a more complex Keri
- Page 359 and 360: 23.6 Example of a more complex Keri
- Page 361 and 362: 24.1 Kerio Control SSL-VPN configur
- Page 363 and 364: Chapter 25 Specific settings and tr
- Page 365 and 366: 25.3 Automatic user authentication
- Page 367 and 368: 25.3 Automatic user authentication
- Page 369 and 370: 25.4 FTP over Kerio Control proxy s
- Page 371 and 372: 25.5 Internet links dialed on deman
- Page 373 and 374: 25.5 Internet links dialed on deman
- Page 375 and 376: 25.5 Internet links dialed on deman
- Page 377 and 378: The text file will be stored in the
- Page 379 and 380: Appendix B Used open source items K
- Page 381 and 382: Copyright © 2005 Harald Welte Dist
- Page 383 and 384: Glossary of terms ActiveX This Micr
- Page 385 and 386: Ident The Ident protocol is used fo
- Page 387 and 388: Policy routing Advanced routing tec
- Page 389 and 390: TCP Transmission Control Protocol i
23.6 Example of a more complex <strong>Kerio</strong> VPN configuration<br />
4. Enable the VPN server and configure its SSL certificate (create a self-signed certificate if no<br />
certificate provided by a certification authority is available).<br />
Note: The VPN network and Mask entries now include an automatically selected free<br />
subnet. Check whether this subnet does not collide with any other subnet in the<br />
headquarters or in the filials. If it does, specify a free subnet.<br />
Figure 23.33<br />
Headquarters — VPN server configuration<br />
For a detailed description on the VPN server configuration, refer to chapter 23.1.<br />
341