30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

25.3 Automatic user authentication using NTLM<br />

Status files<br />

In addition, <strong>Kerio</strong> Control generates other files and directories where certain status<br />

information is saved:<br />

Files:<br />

dnscache.cfg<br />

DNS files stored in the DNS module’s cache (see chapter 9.1).<br />

leases.cfg<br />

IP addresses assigned by the DHCP server.<br />

This file includes all information available in section Configuration → DHCP Server, the<br />

Leased Addresses tab (see chapter 9.2).<br />

stats.cfg<br />

Interface statistics (see chapter 20.2) and user statistics (see chapter 20.1) data.<br />

vpnleases.cfg<br />

IP addresses assigned to VPN clients (see chapter 23.2).<br />

Directories:<br />

logs<br />

The logs directory stores all <strong>Kerio</strong> Control logs (see chapter 22).<br />

star<br />

The star directory includes a complete database for statistics of the <strong>Kerio</strong> Control web<br />

interface.<br />

Handling configuration files<br />

We recommend that <strong>Kerio</strong> Control Engine be stopped prior to any manipulation with the<br />

configuration files (backups, recoveries, etc.)! Information contained within these files is<br />

loaded and saved only upon starting or stopping the engine. All changes to the configuration<br />

performed while the Engine is running are only stored in memory. All modifications done<br />

during Engine performance will be overwritten by the configuration in the system memory<br />

when the Engine is stopped.<br />

25.3 Automatic user authentication using NTLM<br />

<strong>Kerio</strong> Control supports automatic user authentication by the NTLM method (authentication<br />

from web browsers). Users once authenticated for the domain are not asked for username and<br />

password.<br />

This chapter provides detailed description on conditions and configuration settings for correct<br />

functioning of NTLM.<br />

365

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!