Configuring Your Gateman Proxy Server
|
|
|
- Bonnie Parks
- 10 years ago
- Views:
Transcription
1 Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching service. A proxy server together with a firewall protects a network from outside intrusion. An advantage of a proxy server is that caches pages. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A proxy can also log usage and sites visited, as well as block access to sites. This feature gives parents the ability to be aware of their children s internet habits as well as provides them the ability to block undesirable sites. Within an office this feature allows monitoring usage of the internet facility for non-official purposes. Gateman Internet Proxy Server Basics Your Gateman Lifestyle Server includes an Internet Proxy Server that provides a secure internet experience to users. It is based on the World renowned Squid Internet Proxy Server and utilizes Squidguard Internet Proxy coupled with University of Toulouse Blacklist collection to block configured categories of sites. Gateman s Internet Proxy Server s features include user configurable white lists, user configurable blacklists, the ability to share bandwidth, timing groups, proxy groups, preconfigured blacklists and reports based on monitored usage. Gateman provides an HTTP proxy service only; it does not provide proxy services for SMTP, POP or SOCKS as it has its own built-in server. Internet Proxy Configuration Configure Gateman s Internet Proxy by selecting Proxy from the Administration menu. It opens a window that offers a variety of configuration options. Configure the Allowed Sites The Misc settings screen (described in a later section) has a set of preconfigured blacklisted domains that the user may be barred from visiting. In the event some desirable sites are inadvertently blocked, the administrator may include the allowed site names in the Allowed sites to over-ride the blocked sites. Click the Allowed sites button to configure a set of domains that a user is allowed access to. This opens up the following page where the administrator may enter a set of filters for the purpose. Below is an explanation of required terms: URL The complete address that you see in the address bar of your internet browser e.g. Domain It consists of the web site identifier e.g. URL path The path to a resource within a domain e.g. /files/configuringyourgatemanproxyserver.pdf Gateman Integrated Security Configuring Your Gateman Proxy Server
2 Choose a suitable name Choose the appropriate radio button, then enter the filter details as required Click to Add the filter Select the required name from the group, modify the filter entries and click to Modify Select the required name from the group and click to Delete Configure the Denied Sites Click Denied sites to configure the set of filters. They allow you to specify sites or files that you wish to block. For example, if you wish to deny download of mp3 files you could block any URL with the word mp3 within it or even within the URL path alone. Use this screen to block access to sites or resources that you wish. In a later section you will configure the groups against which this will apply. Enter a suitable name Choose the appropriate radio button, then enter the filter details as required Click to Add the filter Select the required name from the group list, modify the filter entries and click to Modify Select the required name from the group list and click to Delete Gateman Integrated Security Configuring Your Gateman Proxy Server
3 Configure the Bandwidth Groups Your Gateman Proxy Server provides you with the ability to share the available bandwidth in any ratio between different user categories. For example: Within a home, if you find the children hogging the bandwidth with their large downloads, you may configure the proxy to drop the user speed for files beyond a certain size. Within an organisation one may wish to have multiple bandwidth groups; a fast speed set aside for those who require frequent internet access for their work and a slow one for those that do not require internet access. Note that you must set at least one bandwidth group. Also a user group must be assigned to a single bandwidth group. Following are an explanation of the terms used: User bandwidth (kbps) The maximum bandwidth that will be allotted to any single user. User download (Kbytes) The max size of file that can be downloaded at the User bandwidth speed. Group bandwidth (Kbps) The bandwidth that will be shared between all users belonging to this group at any point in time Group download (Kbytes) If the total size of downloads by uses of this group an any point in time exceeds the specified size, then the users downloading the files will be slowed. Example for a Home with a 2MBPS Internet connection Have a single Bandwidth group as follows... Group name: FAST Group bandwidth: 2000 Group download: 2500 User bandwidth: 1000 User download: 1000 Gateman Integrated Security Configuring Your Gateman Proxy Server
4 Configure the Timing Groups Your Gateman Proxy Server allows you to configure times during which a person can browse the internet. This is useful in a variety of situations including: Restricting internet access to children to between 7:00pm and 9:00pm on weekdays and between 8:00am and 9:00pm on weekends Allowing internet access to a group of employees during their lunch break In this section you must configure the Timing groups; selecting the timing appropriate to the user groups is done in the next section. Note a user group can be allowed access during multiple timing groups. For a home with school going children one might configure the following Timing groups: Weekdays Monday to Friday 7pm to 9pm Weekends Saturday and Sunday 7am to 9pm Everyday Monday to Sunday 012:00:01am to 11:59:59pm Configure the Internet Proxy Groups Click the Proxy groups button to open a screen that allows you to create a Proxy group and configure the properties for the group. These Proxy Groups will then be available within the User Administration section where you may assign a user to a group. Typically you will create a group for each category of user based on the different functional requirements. Within a home for example, one may have 3 categories; parents, children, guests. In a business one may have manager, staff, visitor, etc. Gateman Integrated Security Configuring Your Gateman Proxy Server
5 Configuration of a new Proxy Group is done through a wizard. Click the New button to open the wizard screen. A suitable name to identify the group Select the bandwidth assigned to the group Select one or more browsing times for the group Fig: New Proxy Group Wizard Screen 1 Check to deny access to the blacklisted sites defined earlier The user goes directly to the internet, if the IP address of the workstation is within the assigned range (defined later) The user will require to log in to the proxy server to get to the internet Fig: New Proxy Group Wizard Screen 2 Note IP Address Range is appropriate for facilities where there are a large number of users and the IP addresses are known or assigned by a DHCP server. This may be the case with Visitor or Student groups. After clicking the Finish button on the wizard, the configured group is displayed in the Proxy Groups Configuration page as shown. Gateman Integrated Security Configuring Your Gateman Proxy Server
6 The list of Proxy Groups defined in the system. To modify a group: Select the appropriate entry from this list Modify the required fields to the right Click the Modify button (bottom right) To define an IP address range: Select the radio button Enter the IP addresses in the From and To IP address fields and click the Add Range button Fig: The Proxy Group Configuration Screen Note a group once created can be renamed, but not deleted. A group may not have any user assigned to it. Misc Settings for Gateman s Internet Proxy Server Click the Misc settings button to be able to configure the additional settings for the proxy server. There are a number of subsections in this interface that are defined below. Providing HTTP access on ports other than port 80 The Enable HTTP Access on destination ports box must be checked and the suitable ports defined in order to allow a user to access sites via ports other than PORT 80 (the default HTTP port). Selecting FTP, POP, etc only define the default port traditionally assigned to those services; Gateman will now allow those remote ports to be accessed by the user for HTTP services (it does not mean Gateman Integrated Security Configuring Your Gateman Proxy Server
7 that it will provide an FTP or POP proxy protocol). This setting is useful to allow or block access to services such as Skype, MSN, etc which are on well defined ports. Note if you wish to allow your users to access their via a POP server on the internet, you will need to provide these users to NAT access via the ADSL router or through Gateman s Firewall. In order to ensure that the users do not bypass the proxy server (if configured), please ensure that only certain destination ports (e.g. POP, SMTP, etc) are opened for NAT. Banned categories for all users As explained at the start, your Gateman Proxy server includes the widely used open source Squidguard engine, that allows a user to block access to a set of predefined URLs on the web. Your Gateman proxy server utilises the University of Toulouse Blacklist which is regularly updated, in order to provide a reliable set of blacklists in a set of predetermined categories. If you choose to use the blacklists, this restriction will apply to all Proxy Users irrespective of the group they belong to. You may however have a set of user s directly access the Internet using NAT via the ADSL router or Gateman s firewall. Note your Gateman s blacklists are automatically updated regularly via our Internet Server (typically once a month) The Configuration Screen Check to enable Gateman s Internet Proxy Server The port on which the proxy service is started; traditionally 8080 or 3128 The interfaces on which the proxy server will be started Cost info used in reports Blacklist groups Duration to retain the user internet access records for Gateman Integrated Security Configuring Your Gateman Proxy Server
8 Configuring Internet Proxy Users After configuration of your Gateman Internet Proxy Server and other Gateman modules (e.g. Devices, Access Control and Attendance, File and Server), you need to define the users and assign them to various groups. This is done from within the Administration -> Users menu. Please refer to the relevant document for additional details. For each configured user, the administrator may enable or disable Internet Proxy access and assign the user to a suitable Proxy Group. Assign the user to a suitable Proxy Group Applying the Changes Once the configuration changes defined in each of the previous subsections is completed, you will need to restart your Gateman Service used for the Internet Proxy. Select the Restart Proxy Server button and in the screen that opens select the Restart Proxy Server button. This operation takes a few seconds and when complete, you will see a message in the Status bar. Gateman Integrated Security Configuring Your Gateman Proxy Server
SysAid Remote Discovery Tool
SysAid Remote Discovery Tool SysAid Release 7 Document Updated: 27-Apr-10 SysAid Remote Discovery Tool The SysAid server comes with a built-in discovery service that performs various network discovery
Configuring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
How to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
Talk-101 User Guides Web Content Filter Administration
Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Chapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
Kerio Control. Step-by-Step Guide. Kerio Technologies
Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio
Quick Guide of HiDDNS Settings (with UPnP)
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
Secure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Chapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
Technical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband
Firewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
Name Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
Quick Guide of DDNS Settings
Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
Product Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com [email protected] The information and content in this document is provided for informational purposes only and is provided "as is" with
Burst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
SecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
Network Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
D-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
NovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
Safe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
Home Internet Filter User Guide
Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Control Panel User Guide
December 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise this publication from time to time without obligation of ClearAccess to notify any person
Evaluation Guide. Powerful & Immediate Business Web Security via the Cloud
Evaluation Guide Powerful & Immediate Business Web Security via the Cloud Contents 1 Introduction & Product highlights 2 Set up & Configuration 3 Managing your WebTitan Cloud Service 4 Reporting 5 Support
Web Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
Configuring Your Gateman File Server
Configuring Your Gateman File Server Your Gateman system includes a File Server that can be used to provide authenticated access to Windows, MAC and Linux machines via the LAN and also provides a Web Browser
Access to Kozminski University library databases from home
Access to Kozminski University library databases from home All students and staff at Kozminski University can benefit from special, purchased by the Library of ALK, databases containing many interesting
How To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
Chapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
Chapter 4 Security and Firewall Protection
Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be
Chapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
Configuring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
Basic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
Sentral servers provide a wide range of services to school networks.
Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
CYBERSITTER NAME. LLC/Solid Oak Software. Company. Version 11.12.7.20. Client. Type of product. Computer. Devices supported
NAME CYBERSITTER Company LLC/Solid Oak Software Version 11.12.7.20 Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 Bits) Windows 7 (32/64 Bits) Windows XP Windows
User s Guide for OpenERP Microsoft Outlook Free Plug-in 1.0 By Axelor http://www.axelor.com
User s Guide for OpenERP Microsoft Outlook Free Plug-in 1.0 By Axelor http://www.axelor.com Contents 1. Introduction...3 Outlook Plug-in Free Edition Feature:... 3 Dependencies / Prerequisites... 3 More
How to set up popular firewalls to work with Web CEO
How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
Sonicwall Reporting Server
Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the
ACCREDITED SOLUTION. EXPLORER Core FTP
ACCREDITED SOLUTION EXPLORER Core FTP Document Name: EXPLORER Core FTP Revision: B Introduction: Typical Users: Product Description: This document describes the Core FTP (File Transfer Protocol) software
SurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
DSL-G604T Install Guides
Internet connection with NAT...2 Internet connection with No NAT, IP Un-number...6 Port Forwarding...12 Filtering & Firewall Setup...20 Access Control... 21 DMZ Setup... 26 Allow Incoming Ping... 27 How
www.entensys.com UserGate Proxy & Firewall USERGATE Administrator Manual
UserGate Proxy & Firewall Administrator Manual 1 Content Introduction 4 UserGate Proxy & Firewall 4 System requirements 4 UserGate Server installation 5 UserGate registration 5 UserGate update and removal
OPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
ShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
Trend Micro Worry-Free Remote Manager Agent Installation Guide
Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
1. How do I access my VPS control panel?
VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to
Quick Guide of DDNS Settings
Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
Load Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
Remote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Multi-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
Test Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application
How to Prevent Children from Browsing Improper Web Page within the Time Limit Step 1: Get the MAC Address of the Computer that Children Use
How to Prevent Children from Browsing Improper Web Page within the Time Limit If parents want to limit their children not accessing into Internet within a period of time (e.g., PM11:00 ~ AM 8:00) and prevent
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
Multi-Homing Gateway. User s Manual
Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33
Introduction to the AirWatch Browser Guide
Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016
ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
Cyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
MultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
Chapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
Home Network Manager User Guide version 2.4. 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com
version 2.4 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com February 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise
How To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
How-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx
Securepoint Security System Version 2007nx HTTP proxy authentication with radius to a Windows 2003 server The Remote Authentication Dial-In User Service (RADIUS) is a client-server-protocol which is used
Business mail 1 MS OUTLOOK CONFIGURATION... 2
Business mail Instructions for configuration of Outlook, 2007, 2010, 2013 and mobile devices CONTENT 1 MS OUTLOOK CONFIGURATION... 2 1.1 Outlook 2007, 2010 and 2013 adding new exchange account, automatic
HomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
How to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
Setting up a Squid-Proxy Server
LinuxFocus article number 235 http://linuxfocus.org Setting up a Squid-Proxy Server by D.S. Oberoi About the author: D.S. Oberoi lives in Jammu, India and has currently problems
User's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes
NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)
Implementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
