Configuring Your Gateman Proxy Server
|
|
- Bonnie Parks
- 8 years ago
- Views:
Transcription
1 Configuring Your Gateman Proxy Server A proxy server acts as an intermediary between a workstation users and the Internet to ensure security, administrative control, distribution of bandwidth and caching service. A proxy server together with a firewall protects a network from outside intrusion. An advantage of a proxy server is that caches pages. If one or more Internet sites are frequently requested, these are likely to be in the proxy's cache, which will improve user response time. A proxy can also log usage and sites visited, as well as block access to sites. This feature gives parents the ability to be aware of their children s internet habits as well as provides them the ability to block undesirable sites. Within an office this feature allows monitoring usage of the internet facility for non-official purposes. Gateman Internet Proxy Server Basics Your Gateman Lifestyle Server includes an Internet Proxy Server that provides a secure internet experience to users. It is based on the World renowned Squid Internet Proxy Server and utilizes Squidguard Internet Proxy coupled with University of Toulouse Blacklist collection to block configured categories of sites. Gateman s Internet Proxy Server s features include user configurable white lists, user configurable blacklists, the ability to share bandwidth, timing groups, proxy groups, preconfigured blacklists and reports based on monitored usage. Gateman provides an HTTP proxy service only; it does not provide proxy services for SMTP, POP or SOCKS as it has its own built-in server. Internet Proxy Configuration Configure Gateman s Internet Proxy by selecting Proxy from the Administration menu. It opens a window that offers a variety of configuration options. Configure the Allowed Sites The Misc settings screen (described in a later section) has a set of preconfigured blacklisted domains that the user may be barred from visiting. In the event some desirable sites are inadvertently blocked, the administrator may include the allowed site names in the Allowed sites to over-ride the blocked sites. Click the Allowed sites button to configure a set of domains that a user is allowed access to. This opens up the following page where the administrator may enter a set of filters for the purpose. Below is an explanation of required terms: URL The complete address that you see in the address bar of your internet browser e.g. Domain It consists of the web site identifier e.g. URL path The path to a resource within a domain e.g. /files/configuringyourgatemanproxyserver.pdf Gateman Integrated Security Configuring Your Gateman Proxy Server
2 Choose a suitable name Choose the appropriate radio button, then enter the filter details as required Click to Add the filter Select the required name from the group, modify the filter entries and click to Modify Select the required name from the group and click to Delete Configure the Denied Sites Click Denied sites to configure the set of filters. They allow you to specify sites or files that you wish to block. For example, if you wish to deny download of mp3 files you could block any URL with the word mp3 within it or even within the URL path alone. Use this screen to block access to sites or resources that you wish. In a later section you will configure the groups against which this will apply. Enter a suitable name Choose the appropriate radio button, then enter the filter details as required Click to Add the filter Select the required name from the group list, modify the filter entries and click to Modify Select the required name from the group list and click to Delete Gateman Integrated Security Configuring Your Gateman Proxy Server
3 Configure the Bandwidth Groups Your Gateman Proxy Server provides you with the ability to share the available bandwidth in any ratio between different user categories. For example: Within a home, if you find the children hogging the bandwidth with their large downloads, you may configure the proxy to drop the user speed for files beyond a certain size. Within an organisation one may wish to have multiple bandwidth groups; a fast speed set aside for those who require frequent internet access for their work and a slow one for those that do not require internet access. Note that you must set at least one bandwidth group. Also a user group must be assigned to a single bandwidth group. Following are an explanation of the terms used: User bandwidth (kbps) The maximum bandwidth that will be allotted to any single user. User download (Kbytes) The max size of file that can be downloaded at the User bandwidth speed. Group bandwidth (Kbps) The bandwidth that will be shared between all users belonging to this group at any point in time Group download (Kbytes) If the total size of downloads by uses of this group an any point in time exceeds the specified size, then the users downloading the files will be slowed. Example for a Home with a 2MBPS Internet connection Have a single Bandwidth group as follows... Group name: FAST Group bandwidth: 2000 Group download: 2500 User bandwidth: 1000 User download: 1000 Gateman Integrated Security Configuring Your Gateman Proxy Server
4 Configure the Timing Groups Your Gateman Proxy Server allows you to configure times during which a person can browse the internet. This is useful in a variety of situations including: Restricting internet access to children to between 7:00pm and 9:00pm on weekdays and between 8:00am and 9:00pm on weekends Allowing internet access to a group of employees during their lunch break In this section you must configure the Timing groups; selecting the timing appropriate to the user groups is done in the next section. Note a user group can be allowed access during multiple timing groups. For a home with school going children one might configure the following Timing groups: Weekdays Monday to Friday 7pm to 9pm Weekends Saturday and Sunday 7am to 9pm Everyday Monday to Sunday 012:00:01am to 11:59:59pm Configure the Internet Proxy Groups Click the Proxy groups button to open a screen that allows you to create a Proxy group and configure the properties for the group. These Proxy Groups will then be available within the User Administration section where you may assign a user to a group. Typically you will create a group for each category of user based on the different functional requirements. Within a home for example, one may have 3 categories; parents, children, guests. In a business one may have manager, staff, visitor, etc. Gateman Integrated Security Configuring Your Gateman Proxy Server
5 Configuration of a new Proxy Group is done through a wizard. Click the New button to open the wizard screen. A suitable name to identify the group Select the bandwidth assigned to the group Select one or more browsing times for the group Fig: New Proxy Group Wizard Screen 1 Check to deny access to the blacklisted sites defined earlier The user goes directly to the internet, if the IP address of the workstation is within the assigned range (defined later) The user will require to log in to the proxy server to get to the internet Fig: New Proxy Group Wizard Screen 2 Note IP Address Range is appropriate for facilities where there are a large number of users and the IP addresses are known or assigned by a DHCP server. This may be the case with Visitor or Student groups. After clicking the Finish button on the wizard, the configured group is displayed in the Proxy Groups Configuration page as shown. Gateman Integrated Security Configuring Your Gateman Proxy Server
6 The list of Proxy Groups defined in the system. To modify a group: Select the appropriate entry from this list Modify the required fields to the right Click the Modify button (bottom right) To define an IP address range: Select the radio button Enter the IP addresses in the From and To IP address fields and click the Add Range button Fig: The Proxy Group Configuration Screen Note a group once created can be renamed, but not deleted. A group may not have any user assigned to it. Misc Settings for Gateman s Internet Proxy Server Click the Misc settings button to be able to configure the additional settings for the proxy server. There are a number of subsections in this interface that are defined below. Providing HTTP access on ports other than port 80 The Enable HTTP Access on destination ports box must be checked and the suitable ports defined in order to allow a user to access sites via ports other than PORT 80 (the default HTTP port). Selecting FTP, POP, etc only define the default port traditionally assigned to those services; Gateman will now allow those remote ports to be accessed by the user for HTTP services (it does not mean Gateman Integrated Security Configuring Your Gateman Proxy Server
7 that it will provide an FTP or POP proxy protocol). This setting is useful to allow or block access to services such as Skype, MSN, etc which are on well defined ports. Note if you wish to allow your users to access their via a POP server on the internet, you will need to provide these users to NAT access via the ADSL router or through Gateman s Firewall. In order to ensure that the users do not bypass the proxy server (if configured), please ensure that only certain destination ports (e.g. POP, SMTP, etc) are opened for NAT. Banned categories for all users As explained at the start, your Gateman Proxy server includes the widely used open source Squidguard engine, that allows a user to block access to a set of predefined URLs on the web. Your Gateman proxy server utilises the University of Toulouse Blacklist which is regularly updated, in order to provide a reliable set of blacklists in a set of predetermined categories. If you choose to use the blacklists, this restriction will apply to all Proxy Users irrespective of the group they belong to. You may however have a set of user s directly access the Internet using NAT via the ADSL router or Gateman s firewall. Note your Gateman s blacklists are automatically updated regularly via our Internet Server (typically once a month) The Configuration Screen Check to enable Gateman s Internet Proxy Server The port on which the proxy service is started; traditionally 8080 or 3128 The interfaces on which the proxy server will be started Cost info used in reports Blacklist groups Duration to retain the user internet access records for Gateman Integrated Security Configuring Your Gateman Proxy Server
8 Configuring Internet Proxy Users After configuration of your Gateman Internet Proxy Server and other Gateman modules (e.g. Devices, Access Control and Attendance, File and Server), you need to define the users and assign them to various groups. This is done from within the Administration -> Users menu. Please refer to the relevant document for additional details. For each configured user, the administrator may enable or disable Internet Proxy access and assign the user to a suitable Proxy Group. Assign the user to a suitable Proxy Group Applying the Changes Once the configuration changes defined in each of the previous subsections is completed, you will need to restart your Gateman Service used for the Internet Proxy. Select the Restart Proxy Server button and in the screen that opens select the Restart Proxy Server button. This operation takes a few seconds and when complete, you will see a message in the Status bar. Gateman Integrated Security Configuring Your Gateman Proxy Server
SysAid Remote Discovery Tool
SysAid Remote Discovery Tool SysAid Release 7 Document Updated: 27-Apr-10 SysAid Remote Discovery Tool The SysAid server comes with a built-in discovery service that performs various network discovery
More informationConfiguring Your Gateman Email Server
Configuring Your Gateman Email Server Your Gateman Lifestyle Server includes an Email Server that provides users access to email via an email client and via your web browser using your laptop and mobile
More informationHow to set up the HotSpot module with SmartConnect. Panda GateDefender 5.0
How to set up the HotSpot module with SmartConnect Panda GateDefender 5.0 Content Introduction... 3 Minimum requirements to enable the hotspot module... 4 Hotspot settings... 6 General settings....6 Configuring
More informationTalk-101 User Guides Web Content Filter Administration
Talk-101 User Guides Web Content Filter Administration Contents Contents... 2 Accessing the Control Panel... 3 Proxy User Management... 4 Adding a new Proxy User... 5 Modifying an existing Proxy User...
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
More informationChapter 3 Security and Firewall Protection
Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+
More informationStep-by-Step Configuration
Step-by-Step Configuration Kerio Technologies C 2001-2003 Kerio Technologies. All Rights Reserved. Printing Date: December 17, 2003 This guide provides detailed description on configuration of the local
More informationKerio Control. Step-by-Step Guide. Kerio Technologies
Kerio Control Step-by-Step Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on configuration of the local network which uses the Kerio
More informationQuick Guide of HiDDNS Settings (with UPnP)
Quick Guide of HiDDNS Settings (with UPnP) Solution 1: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic
More informationSecure Web Appliance. Reverse Proxy
Secure Web Appliance Reverse Proxy Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About Reverse Proxy... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationChapter 6 Virtual Private Networking Using SSL Connections
Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide
More informationTechnical Support Information
Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband
More informationFirewall Firewall August, 2003
Firewall August, 2003 1 Firewall and Access Control This product also serves as an Internet firewall, not only does it provide a natural firewall function (Network Address Translation, NAT), but it also
More informationName Services (DNS): This is Quick rule will enable the Domain Name Services on the firewall.
How to configure quick set up rules You can configure rules/policies using Quick setup to get the Firewall up and running in no time. To do this log in to the Firewall, browse to Firewall > Policies >
More informationQuick Guide of DDNS Settings
Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationConfiguring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
More informationProduct Manual. Administration and Configuration Manual
Product Manual Administration and Configuration Manual http://www.gfi.com info@gfi.com The information and content in this document is provided for informational purposes only and is provided "as is" with
More informationBurst Technology. bt-webfilter User Guide
Burst Technology presents bt-webfilter User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationSecuraLive ULTIMATE SECURITY
SecuraLive ULTIMATE SECURITY Home Edition for Windows USER GUIDE SecuraLive ULTIMATE SECURITY USER MANUAL Introduction: Welcome to SecuraLive Ultimate Security Home Edition. SecuraLive Ultimate Security
More informationNetwork Configuration Settings
Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices
More informationHillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual
Hillstone StoneOS User Manual Hillstone Unified Intelligence Firewall Installation Manual www.hillstonenet.com Preface Conventions Content This document follows the conventions below: CLI Tip: provides
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationOutlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
More informationSafe internet for business use: Getting Started Guide
Safe internet for business use: Getting Started Guide Table of Contents 1. Preface 1 2. Before You Install 2 2.1 Disabling Firewalls 2 2.2 About Accelerators 3 3. About Profiles 4 4. Installation and Initial
More informationHome Internet Filter User Guide
Home Internet Filter User Guide TABLE OF CONTENTS About Home Internet Filter... 2 How Home Internet Filter help you?... 2 Setting up the Residential Gateway and accessing to SingTel Home Internet Filter
More informationChapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
More informationControl Panel User Guide
December 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise this publication from time to time without obligation of ClearAccess to notify any person
More informationEvaluation Guide. Powerful & Immediate Business Web Security via the Cloud
Evaluation Guide Powerful & Immediate Business Web Security via the Cloud Contents 1 Introduction & Product highlights 2 Set up & Configuration 3 Managing your WebTitan Cloud Service 4 Reporting 5 Support
More informationWeb Hosting Getting Started Guide
Web Hosting Getting Started Guide This guide describes: - Hosting Terms and Definitions - How to sync a domain with your hosting account - How to change your domain s nameservers - How to use FTP to upload
More informationBarracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationConfiguring Your Gateman File Server
Configuring Your Gateman File Server Your Gateman system includes a File Server that can be used to provide authenticated access to Windows, MAC and Linux machines via the LAN and also provides a Web Browser
More informationAccess to Kozminski University library databases from home
Access to Kozminski University library databases from home All students and staff at Kozminski University can benefit from special, purchased by the Library of ALK, databases containing many interesting
More informationHow To Check If Your Router Is Working Properly
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the
More informationChapter 3 Restricting Access From Your Network
Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.
More informationChapter 4 Security and Firewall Protection
Chapter 4 Security and Firewall Protection This chapter describes how to use the Security features of the ProSafe Wireless ADSL Modem VPN Firewall Router to protect your network. These features can be
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationConfiguring Security for FTP Traffic
2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP
More informationConfiguring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
More informationTable of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation
User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended
More informationBasic Network Configuration
Basic Network Configuration 2 Table of Contents Basic Network Configuration... 25 LAN (local area network) vs WAN (wide area network)... 25 Local Area Network... 25 Wide Area Network... 26 Accessing the
More informationSentral servers provide a wide range of services to school networks.
Wazza s QuickStart Publishing iweb Sites to a Sentral Server Background Mac OS X, Sentral, iweb 09 Sentral servers provide a wide range of services to school networks. A Sentral server provides a publishing
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationCYBERSITTER NAME. LLC/Solid Oak Software. Company. Version 11.12.7.20. Client. Type of product. Computer. Devices supported
NAME CYBERSITTER Company LLC/Solid Oak Software Version 11.12.7.20 Type of product Devices supported Operating systems Client Computer Windows Vista (32/64 Bits) Windows 7 (32/64 Bits) Windows XP Windows
More informationUser s Guide for OpenERP Microsoft Outlook Free Plug-in 1.0 By Axelor http://www.axelor.com
User s Guide for OpenERP Microsoft Outlook Free Plug-in 1.0 By Axelor http://www.axelor.com Contents 1. Introduction...3 Outlook Plug-in Free Edition Feature:... 3 Dependencies / Prerequisites... 3 More
More informationHow to set up popular firewalls to work with Web CEO
How to set up popular firewalls to work with Web CEO Contents How to set up popular firewalls to work with Web CEO... 1 Setting up Agnitum Outpost Firewall 2.5... 2 Setting up Black ICE 3... 6 Setting
More informationVirtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
More informationSonicwall Reporting Server
Sonicwall Reporting Server How to access the reporting server: Navigate to https://swreports.hitechsupport.com.au, and enter your username and password provided. After you have logged in, click on the
More informationACCREDITED SOLUTION. EXPLORER Core FTP
ACCREDITED SOLUTION EXPLORER Core FTP Document Name: EXPLORER Core FTP Revision: B Introduction: Typical Users: Product Description: This document describes the Core FTP (File Transfer Protocol) software
More informationSurfCop for Microsoft ISA Server. System Administrator s Guide
SurfCop for Microsoft ISA Server System Administrator s Guide Contents INTRODUCTION 5 PROGRAM FEATURES 7 SYSTEM REQUIREMENTS 7 DEPLOYMENT PLANNING 8 AGENTS 10 How It Works 10 What is Important to Know
More informationDSL-G604T Install Guides
Internet connection with NAT...2 Internet connection with No NAT, IP Un-number...6 Port Forwarding...12 Filtering & Firewall Setup...20 Access Control... 21 DMZ Setup... 26 Allow Incoming Ping... 27 How
More informationwww.entensys.com UserGate Proxy & Firewall USERGATE Administrator Manual
UserGate Proxy & Firewall Administrator Manual 1 Content Introduction 4 UserGate Proxy & Firewall 4 System requirements 4 UserGate Server installation 5 UserGate registration 5 UserGate update and removal
More informationOPS Data Quick Start Guide
OPS Data Quick Start Guide OPS Data Features Guide Revision: October, 2014 Technical Support (24/7) - (334) 705-1605 http://www.opelikapower.com Quick Start Guide OPS Data: Beginning today, you have access
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationBurst Technology. bt-loganalyzer User Guide
Burst Technology presents bt-loganalyzer User Guide Burstek TM 9240 Bonita Beach Road Bonita Springs, FL 34135 Telephone: (239) 495-5900 or toll free (800) 709-2551 Visit the Burstek Website at http://www.burstek.com
More informationTrend Micro Worry-Free Remote Manager Agent Installation Guide
Trend Micro Worry-Free Remote Manager Agent Installation Guide Agent Installation Guide The Agent Installation Guide contains information about the Worry-Free Remote Manager (WFRM) agent installation process
More informationEdge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
More informationUser's voice CYBERSIEVE. Make the interface nicer. It is old fashioned. Comprehensibility: Look and Feel: Time to install and configure: 45 minutes
NAME CYBERSIEVE Company SoftForYou Version 3.0 Type of product Devices supported Operating systems Client Computer Microsoft Vista (32/64 bit) Windows 7 (32/64 bit) Price* 1-3 licences 27 3-6 licences
More informationREQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
More information1. How do I access my VPS control panel?
VPS Business FAQ Section 1: Installation...2 1. How do I access my VPS control panel?...2 2. How do I access my Windows VPS?...6 3. How do I access my Linux VPS?...8 Section 2: using a VPS...9 4. How to
More informationQuick Guide of DDNS Settings
Quick Guide of DDNS Settings Solution: With the development of surveillance systems, more and more users want to use ADSL to realize video surveillance through network. But ADSL gives dynamic IP addresses
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationFirewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
More informationDynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationLoad Balance Mechanism
Load Balance Application in Dual-WAN Interface Load Balance Mechanism To which WAN port the traffic will be routed is determined according to the Load Balance mechanism. Below diagram shows how Vigor router
More informationRemote Console Installation & Setup Guide. November 2009
Remote Console Installation & Setup Guide November 2009 Legal Information All rights reserved. No part of this document shall be reproduced or transmitted by any means or otherwise, without written permission
More informationConfiguring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
More informationVirtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
More informationMulti-Homing Dual WAN Firewall Router
Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet
More informationTest Case 3 Active Directory Integration
April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of
More informationSimple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015
Simple, Secure User Guide for OpenDrive Drive Application v1.2.0.4 for OS-X Platform 20150501 May 2015 Table of Contents Logging into the Drive Application 4 Log In Sign Up Access the Drive Application
More informationHow to Prevent Children from Browsing Improper Web Page within the Time Limit Step 1: Get the MAC Address of the Computer that Children Use
How to Prevent Children from Browsing Improper Web Page within the Time Limit If parents want to limit their children not accessing into Internet within a period of time (e.g., PM11:00 ~ AM 8:00) and prevent
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
More informationMulti-Homing Gateway. User s Manual
Multi-Homing Gateway User s Manual Contents System 5 Admin Setting Date/Time Multiple Subnet Hack Alert Route Table DHCP DNS Proxy Dynamic DNS Language Permitted IPs Logout Software Update 8 12 21 22 33
More informationIntroduction to the AirWatch Browser Guide
Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser
More informationExchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
More informationZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016
ZENworks 11 Support Pack 4 Management Zone Settings Reference May 2016 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationCyclope Internet Filtering Proxy. - Installation Guide -
Cyclope Internet Filtering Proxy - Installation Guide - 1. Overview 3 2. Installation 4 2.1 System requirements 4 2.2 Cyclope Internet Filtering Proxy Installation 4 2.3 Client Browser Configuration 6
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationChapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
More informationChapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
More informationMultiSite Manager. Setup Guide
MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...
More informationChapter 4 Restricting Access From Your Network
Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can
More informationUser Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
More informationUser Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
More informationPowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions
Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions Find your network example: 1. Basic network with and 2 WAN lines - click here 2. Add a web server to the LAN - click here 3. Add a web,
More informationSpam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5
Spam Marshall SpamWall Step-by-Step Installation Guide for Exchange 5.5 What is this document for? This document is a Step-by-Step Guide that can be used to quickly install Spam Marshall SpamWall on Exchange
More informationHome Network Manager User Guide version 2.4. 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com
version 2.4 100 Crystal Run Road Middletown, NY 10091 +1 855 558 5812 www.mediacomcable.com February 2011 Copyright by ClearAccess, Inc. All rights reserved. ClearAccess, Inc. reserves the right to revise
More informationHow To Set Up Your Email
How To Set Up Your Email Contents Page Microsoft Outlook 1 Outlook Express 6 7 Webmail (this is for those who do not use an email programme) 12 Windows Live Mail 22 Mozilla Thunderbird 26 Windows Mail
More informationHow-to: HTTP-Proxy and Radius Authentication and Windows IAS Server settings. Securepoint Security System Version 2007nx
Securepoint Security System Version 2007nx HTTP proxy authentication with radius to a Windows 2003 server The Remote Authentication Dial-In User Service (RADIUS) is a client-server-protocol which is used
More informationBusiness mail 1 MS OUTLOOK CONFIGURATION... 2
Business mail Instructions for configuration of Outlook, 2007, 2010, 2013 and mobile devices CONTENT 1 MS OUTLOOK CONFIGURATION... 2 1.1 Outlook 2007, 2010 and 2013 adding new exchange account, automatic
More informationHomeNet. Gateway User Guide
HomeNet Gateway User Guide Gateway User Guide Table of Contents HomeNet Gateway User Guide Gateway User Guide Table of Contents... 2 Introduction... 3 What is the HomeNet Gateway (Gateway)?... 3 How do
More informationHow to configure your Thomson SpeedTouch 780WL for ADSL2+
How to configure your Thomson SpeedTouch 780WL for ADSL2+ Connecting up your router This guide assumes that you have successfully: unpacked your router connected it up to your phone socket using the DSL
More informationBarracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
More informationSetting up a Squid-Proxy Server
LinuxFocus article number 235 http://linuxfocus.org Setting up a Squid-Proxy Server by D.S. Oberoi About the author: D.S. Oberoi lives in Jammu, India and has currently problems
More informationUser's voice OPTENET WEBFILTER PC. Comprehensibility: Test user did not provide any comments. Look and Feel: Time to install and configure: 45 minutes
NAME OPTENET WEBFILTER PC Company Optenet S.A. Version 10.09.69 Type of product Devices supported Operating systems Client Computer Windows XP Sp2 Windows Vista (32 and 64 bits) Windows 7 (32 and 64 bits)
More informationImplementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
More information