Recently Updated Pages
Connecting to External ICAP Services
Sending HTTP(S) traffic for analysis to third-party servers using ICAP protocol. In this case,...
Exclude IP Addresses from Proxy Server Processing
Setting up exceptions for the traffic of individual users or traffic to certain Internet resource...
Configuring Proxy with Single Interface
If necessary, you can use SafeUTM as a proxy server with direct connections of clients to the pro...
Proxy
Setting up a direct connection to the proxy server. Proxy Server for Web Traffic You do not n...
OSPF
SafeUTM 13 supports OSPF (Open Shortest Path First), a routing protocol based on the state of cha...
BGP
Configuring BGP to exchange information about the availability of networks. SafeUTM 13 impleme...
Routing
Used to redirect network traffic passing through SafeUTM. It has a number of advantages over s...
Channel Aggregation & Failover
Configuring channel failover, static and dynamic aggregation. If you have multiple connections...
Connection via 3G and 4G
To connect to the networks of mobile operators, it is possible to use 4G routers with Ethernet in...
Configuring PPPoE Connection
Connection via PPPoE protocol is traditionally used by providers offering connection via xDSL. ...
Configuring L2TP Connection
Connection via L2TP protocol is sometimes used by Internet service providers in order to provide ...
Configuring PPTP Connection
Connection via PPTP protocol is used by Internet service providers in order to provide a more rel...
Configuring External Ethernet
Manual and automatic configuration using the DHCP protocol. Usually, all necessary information...
Configuring Local Ethernet
Manual and automatic configuration using the DHCP protocol. Be careful!If you select Local Eth...
Network Interfaces
A detailed description of creating and configuring each type of network interface is described ...
Quotas
In SafeUTM, it is possible to use traffic limits for users. For each quota, you can define its...
Objects
In the section Traffic rules -> Objects, you can create objects to be used in the rules of firewa...
Intrusion Prevention System
Intrusion detection and prevention system The intrusion detection and prevention system is onl...
Antivirus
For ease of administration, the optimal performance settings of the antivirus module and antivi...
Traffic Shaping
This service is designed to limit the external incoming traffic speed for network users. Intru...