Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

147 total results found

IPSec IKEv2

4.2. Setup - Users VPN Connections

This VPN protocol is preferable and recommended for all usage scenarios.Instructions for setting up VPN connections on different operating systems are available here.  Setting up VPN Server in SafeUTM To enable authorization by IKEv2, check the correspon...

SSTP

4.2. Setup - Users VPN Connections

SSTP (Secure Socket Tunneling Protocol) is a protocol of secure traffic tunneling based on SSL/TLS. It is supported by Windows OS Vista and above, as well as Mikrotik, Keenetic routers, and others. If possible, do not use this type of connection. This conne...

L2TP IPSec

4.2. Setup - Users VPN Connections

If possible, do not use this type of connection. This connection method can be unstable, has huge redundancy, has low performance, and does not support the strongest encryption. IPsec-IKEv2 is recommended instead.All modern operating systems support IKEv2, o...

User's Personal Account

4.2. Setup - Users VPN Connections

To quickly configure user connections, you can enable access to the SafeUTM web interface. In the personal account accessible with the use of SafeUTM accounts details (local or domain, in case of integration with Active Directory), users will be able to dow...

Features of Routing and Access Organization

4.2. Setup - Users VPN Connections

If VPN is required only to access local network resources If you need to access the Internet directly through your provider, and you need to use a VPN only to access corporate network resources on computers connected via VPN, you need to configure the follo...

Instructions for running PowerShell scripts

4.2. Setup - Users VPN Connections

Use ready-made scripts downloaded from your server to create a VPN connection in Windows versions 8.1 and 10. If you are using Windows 7, you must create the connection manually (see Manually create user-side VPN connections). Which VPN protocol should I...

Fixed VPN IPs

4.2. Setup - Users

The section allows you to bind a specific IP address for a specific user for VPN connections. If you create a fixed binding for any user, then only one active VPN session will be possible for this user. For example, you have a host on a local network that ...

Subnet Authorization

4.2. Setup - Users

This type of authorization allows you to create an authorization rule for a specific UTM user from a specific subnet In order not to register each device as a separate UTM user and not to fix authorization factors for it, you can use Subnet Authorization. ...

Integration with Active Directory

4.2. Setup - Users Integration with Active Directory

SafeUTM provides the possibility of one-way synchronization with a domain based on Microsoft Active Directory. Only accounts are imported, excluding passwords. When the user undergoes the authorization procedure, verification is carried out by means of Acti...

Active Directory User Authorization

4.2. Setup - Users Integration with Active Directory

Import accounts from Active Directory, see Import of Users for details. Setting up user authorization For users imported from Active Directory, all types of user authorization are available. The most commonly used user authorization options are Single Si...

Entering Server into Domain

4.2. Setup - Users Integration with Active Directory

Go to the tab Users -> Active Directory. Click Add. Fill in the following fields: Domain: enter the full domain name (domain DNS name, i.e., domain name, not domain controller). Maximum 64 characters. For example, mydomain.example AD DNS server...

Automatic Authorization and De-authorization Scripts

4.2. Setup - Users Integration with Active Directory

Authorization and de-authorization of users are possible in fully automatic mode. For that, you need to configure scripts executed when users log on and log out of the system. For example, it can be done using domain group policies (GPOs). For these scripts ...

Import of Users

4.2. Setup - Users Integration with Active Directory

Import of Accounts from LDAP SafeUTM implements the possibility to import accounts from the Active Directory LDAP directory (hereinafter referred to as AD). Import is carried out by LDAP/LDAPS protocols (LDAPS protocol does not require additional settings f...

Netscan

4.2. Setup - Users

Automatic creation of a user with authorization by IP address for a device trying to access the internet via SafeUTM. Netscan creates MAC authorization for local addresses on a single Ethernet segment. If the device is located on a local network behind a ro...

Wi-Fi Networks

4.2. Setup - Users

Configuring access point and router modes. In the current version, SafeUTM does not support Wi-Fi adapters. For wireless clients to work, it is necessary to use special wireless access points or Wi-Fi routers. To access the internet, users connected via Wi...

Authorized users and VPN users

4.3. Setup - Monitoring

This section contains data about users authorized on the server, interfaces, and CPU utilization, as well as traffic data in real-time. Authenticated users The full list of users authenticated in UTM can be viewed as a table in the section Monitoring -> ...

System Monitoring

4.3. Setup - Monitoring

Contains general statistics on authorized users, the number of VPN connections, CPU and disk usage, etc. This module allows you to view graphs about the state of UTM in real-time. The horizontal scale of the graph is always time (depending on the selected i...

Traffic Monitor

4.3. Setup - Monitoring

The section Monitoring -> Traffic Monitor displays data about traffic (inbound/outbound, speed, number of sessions) passing through SafeUTM in real-time. In order to enable traffic monitoring, you need to launch the Application Control module. By nodes of ...

SNMP

4.3. Setup - Monitoring

To switch the section to working mode, switch the slider to the On position. This module allows you to monitor the operation of SafeUTM using the SNMP protocol versions 1/2c and 3. To do this, you need to configure the login, password, and encryption key. ...

Syslog

4.3. Setup - Monitoring

Enabling this module makes it possible to transfer all SafeUTM system messages (Syslog) to third-party collectors (Syslog Collector) or to SIEM systems. Forwarding System Messages Any private (local) or public (external) IP address can be specified as a co...