Recently Updated Pages
System Monitoring
Contains general statistics on authorized users, the number of VPN connections, CPU and disk usag...
Authorized users and VPN users
This section contains data about users authorized on the server, interfaces, and CPU utilizatio...
Wi-Fi Networks
Configuring access point and router modes. In the current version, SafeUTM does not support Wi...
Netscan
Automatic creation of a user with authorization by IP address for a device trying to access the i...
Import of Users
Import of Accounts from LDAP SafeUTM implements the possibility to import accounts from the Ac...
Automatic Authorization and De-authorization Scripts
Authorization and de-authorization of users are possible in fully automatic mode. For that, you ...
Entering Server into Domain
Go to the tab Users -> Active Directory. Click Add. Fill in the following fields: ...
Active Directory User Authorization
Import accounts from Active Directory, see Import of Users for details. Setting up user auth...
Integration with Active Directory
SafeUTM provides the possibility of one-way synchronization with a domain based on Microsoft Acti...
Fixed VPN IPs
The section allows you to bind a specific IP address for a specific user for VPN connections. ...
Subnet Authorization
This type of authorization allows you to create an authorization rule for a specific UTM user fro...
Instructions for running PowerShell scripts
Use ready-made scripts downloaded from your server to create a VPN connection in Windows versions...
Features of Routing and Access Organization
If VPN is required only to access local network resources If you need to access the Internet d...
User's Personal Account
To quickly configure user connections, you can enable access to the SafeUTM web interface. In ...
L2TP IPSec
If possible, do not use this type of connection. This connection method can be unstable, has hu...
SSTP
SSTP (Secure Socket Tunneling Protocol) is a protocol of secure traffic tunneling based on SSL/TL...
IPSec IKEv2
This VPN protocol is preferable and recommended for all usage scenarios.Instructions for setting ...
Authorization by PPPoE
Authorization by PPPoE protocol involves authorization via a secure network tunnel between the us...
Authorization by PPTP
Do not use this type of connection. This connection method is EXTREMELY insecure and has been lef...
VPN Connection
To gain access from outside (from home, hotel, or another office) to the enterprise's local netwo...