Skip to main content

Recently Updated Pages

User's Personal Account

4.2. Setup - Users VPN Connections

To quickly configure user connections, you can enable access to the SafeUTM web interface. In ...

Updated 1 year ago by Val Redman

L2TP IPSec

4.2. Setup - Users VPN Connections

If possible, do not use this type of connection. This connection method can be unstable, has hu...

Updated 1 year ago by Val Redman

SSTP

4.2. Setup - Users VPN Connections

SSTP (Secure Socket Tunneling Protocol) is a protocol of secure traffic tunneling based on SSL/TL...

Updated 1 year ago by Val Redman

IPSec IKEv2

4.2. Setup - Users VPN Connections

This VPN protocol is preferable and recommended for all usage scenarios.Instructions for setting ...

Updated 1 year ago by Val Redman

Authorization by PPPoE

4.2. Setup - Users VPN Connections

Authorization by PPPoE protocol involves authorization via a secure network tunnel between the us...

Updated 1 year ago by Val Redman

Authorization by PPTP

4.2. Setup - Users VPN Connections

Do not use this type of connection. This connection method is EXTREMELY insecure and has been lef...

Updated 1 year ago by Val Redman

VPN Connection

4.2. Setup - Users VPN Connections

To gain access from outside (from home, hotel, or another office) to the enterprise's local netwo...

Updated 1 year ago by Val Redman

Authorization by MAC address

4.2. Setup - Users User Authorization

This type of authorization is suitable for those devices whose location changes from time to time...

Updated 1 year ago by Val Redman

Authorization by IP address

4.2. Setup - Users User Authorization

Configuring Authorization by IP Authorization by IP implies that an authorized user will gain ac...

Updated 1 year ago by Val Redman

Authorization by IP and MAC address

4.2. Setup - Users User Authorization

General Information The IP and MAC authorization rules also create a similar binding in the Safe...

Updated 1 year ago by Val Redman

Web Authorization

4.2. Setup - Users User Authorization

Supported browsers:- Google Chrome, version >= 76- Firefox, version >= 71- Safari, version >= 13 ...

Updated 1 year ago by Val Redman

User Authorization

4.2. Setup - Users User Authorization

Authorization is a necessary condition for users to access the internet. General Information ...

Updated 1 year ago by Val Redman

Terminal Server Users

4.2. Setup - Users User tree

Used for remote work with the provision of a separate desktop for each user. Provides a service f...

Updated 1 year ago by Val Redman

Configuring Users

4.2. Setup - Users User tree

Configuring user account settings. Categories Users are configured in Users -> User & Group. ...

Updated 1 year ago by Val Redman

User & Group

4.2. Setup - Users User tree

Creating, deleting, and moving user accounts. General To manage groups and accounts in the us...

Updated 1 year ago by Val Redman

User tree

4.2. Setup - Users User tree

In the SafeUTM management interface, users are displayed as a tree. Users can be organized int...

Updated 1 year ago by Val Redman

Dashboard

4.1. Setup - Dashboard

Information about the server status. This module allows you to view the following information ...

Updated 1 year ago by Val Redman

Initial Configuration

3. Installation

Connection to SafeUTM Web Interface If you haven’t installed SafeUTM yet, please see the Install...

Updated 1 year ago by Val Redman

Setting up Hypervisors

3. Installation

Necessary conditions for SafeUTM work:1. UEFI support.2. Legacy download mode must be turned off ...

Updated 1 year ago by Val Redman

Creating a USB flash startup disk

3. Installation

Windows The creation of the ISO image will erase all existing information from the USB drive. ...

Updated 1 year ago by Val Redman