Skip to main content

Recently Updated Pages

Automatic Authorization and De-authorization Scripts

4.2. Setup - Users Integration with Active Directory

Authorization and de-authorization of users are possible in fully automatic mode. For that, you ...

Updated 1 year ago by Val Redman

Entering Server into Domain

4.2. Setup - Users Integration with Active Directory

Go to the tab Users -> Active Directory. Click Add. Fill in the following fields: ...

Updated 1 year ago by Val Redman

Active Directory User Authorization

4.2. Setup - Users Integration with Active Directory

Import accounts from Active Directory, see Import of Users for details. Setting up user auth...

Updated 1 year ago by Val Redman

Integration with Active Directory

4.2. Setup - Users Integration with Active Directory

SafeUTM provides the possibility of one-way synchronization with a domain based on Microsoft Acti...

Updated 1 year ago by Val Redman

Fixed VPN IPs

4.2. Setup - Users

The section allows you to bind a specific IP address for a specific user for VPN connections. ...

Updated 1 year ago by Val Redman

Subnet Authorization

4.2. Setup - Users

This type of authorization allows you to create an authorization rule for a specific UTM user fro...

Updated 1 year ago by Val Redman

Instructions for running PowerShell scripts

4.2. Setup - Users VPN Connections

Use ready-made scripts downloaded from your server to create a VPN connection in Windows versions...

Updated 1 year ago by Val Redman

Features of Routing and Access Organization

4.2. Setup - Users VPN Connections

If VPN is required only to access local network resources If you need to access the Internet d...

Updated 1 year ago by Val Redman

User's Personal Account

4.2. Setup - Users VPN Connections

To quickly configure user connections, you can enable access to the SafeUTM web interface. In ...

Updated 1 year ago by Val Redman

L2TP IPSec

4.2. Setup - Users VPN Connections

If possible, do not use this type of connection. This connection method can be unstable, has hu...

Updated 1 year ago by Val Redman

SSTP

4.2. Setup - Users VPN Connections

SSTP (Secure Socket Tunneling Protocol) is a protocol of secure traffic tunneling based on SSL/TL...

Updated 1 year ago by Val Redman

IPSec IKEv2

4.2. Setup - Users VPN Connections

This VPN protocol is preferable and recommended for all usage scenarios.Instructions for setting ...

Updated 1 year ago by Val Redman

Authorization by PPPoE

4.2. Setup - Users VPN Connections

Authorization by PPPoE protocol involves authorization via a secure network tunnel between the us...

Updated 1 year ago by Val Redman

Authorization by PPTP

4.2. Setup - Users VPN Connections

Do not use this type of connection. This connection method is EXTREMELY insecure and has been lef...

Updated 1 year ago by Val Redman

VPN Connection

4.2. Setup - Users VPN Connections

To gain access from outside (from home, hotel, or another office) to the enterprise's local netwo...

Updated 1 year ago by Val Redman

Authorization by MAC address

4.2. Setup - Users User Authorization

This type of authorization is suitable for those devices whose location changes from time to time...

Updated 1 year ago by Val Redman

Authorization by IP address

4.2. Setup - Users User Authorization

Configuring Authorization by IP Authorization by IP implies that an authorized user will gain ac...

Updated 1 year ago by Val Redman

Authorization by IP and MAC address

4.2. Setup - Users User Authorization

General Information TheĀ IP and MAC authorization rules also create a similar binding in the Safe...

Updated 1 year ago by Val Redman

Web Authorization

4.2. Setup - Users User Authorization

Supported browsers:- Google Chrome, version >= 76- Firefox, version >= 71- Safari, version >= 13 ...

Updated 1 year ago by Val Redman

User Authorization

4.2. Setup - Users User Authorization

Authorization is a necessary condition for users to access the internet. General Information ...

Updated 1 year ago by Val Redman