Advanced Search
Search Results
266 total results found
DHCP Server
The DHCP server is used to automatically assign IP addresses to network devices on the LAN. SafeUTM interface allows you to configure a range of IP addresses for automatic assignment, as well as to form static bindings of IP addresses to MAC addresses of th...
Branches and Head Office
This type of connection allows you to combine the LANs of several SafeUTM servers. Features of IPsec technology implementation in SafeUTM assume two roles of using SafeUTM: Head office – SafeUTM must have a public address on the Internet and accept conne...
Connecting Devices
Description of options for connecting various routers (Mikrotik, Zyxel Keenetic, etc.) to SafeUTM for site-to-site VPN using IPsec IKEv2 protocol. Devices that are not described in this manual as a rule can be connected using similar settings. When combini...
Connecting users
Connecting remote users via L2TP/IPsec protocol. The settings for connecting users (client-to-site VPN) are described in the article VPN connection L2TP IPsec. Allow remote users to connect via L2TP/IPsec protocol 1. Go to Users -> VPN connections.2. Ch...
PPTP VPN
Using the PPTP protocol, you can connect Branches that use outdated routers supporting only PPTP to the Head Office (if the device supports IPsec, it is recommended to use PPTP). If possible, use a more reliable and secure protocol for connecting branches -...
Incoming Connection of Cisco IOS to SafeUTM via IPsec
Following the steps in this article, you can combine Cisco and SafeUTM networks via IPsec using PSK. Find below the connection setup according to the scheme shown in the figure: Step 1. Initial Setup of SafeUTM Configure the local and external interface...
Outgoing SafeUTM Connection to Cisco IOS via IPsec
Following the steps in this article, you can combine Cisco and SafeUTM networks via IPsec using PSK. Find below the connection setup according to the scheme shown in the figure: Step 1. Initial Setup of SafeUTM Configure the local and external interface...
Incoming pfSense connection to SafeUTM via IPsec
Following the steps in this article, you can combine pfSense and SafeUTM networks via IPsec using PSK. The combined LANs should not overlap! Setting up SafeUTM 1. In the SafeUTM web interface, open tab Services -> IPsec -> Devices.2. Add a new connectio...
Outgoing pfSense Connection to SafeUTM via IPsec
Setting up SafeUTM 1. In the SafeUTM web interface, open tab Services -> IPsec -> Devices.2. Add a new connection: Connection name – any. Type – outgoing. Authentication type – PSK. PSK – specify the PSK key to be used for the connection. UTM identif...
Connecting Keenetic via SSTP
You can connect routers with SSTP protocol support in site-to-site VPN mode. If you do not need access from the central office to the network for Keenetic, then use the article Connecting Wi-Fi Keenetic Routers via SSTP on client-to-site connection. Sett...
Connecting Kerio Control to SafeUTM via IPsec
Following the steps of the article below, you can combine Kerio Control and SafeUTM networks via IPsec using PSK. The combined LANs should not overlap! Setting up SafeUTM 1. In the SafeUTM web interface, open tab Services -> IPsec -> Devices.2. Add a ne...
Connecting Keenetic via IPsec
On the SafeUTM side, configure the connection settings in the Services -> IPSec -> Devices section. On the Keenetic device side, use the following encryption protocol settings:
TLS Certificates
Section with information about SSL certificates. This section displays SSL certificates/certificate chains, the list of which is formed by the following modules: reverse proxying module, IKEv2, SSTP VPN servers, web interface, web authorization, mail, etc. ...
Uploading your SSL certificate to server
After purchasing a trusted SSL certificate from Certificate Authority (CA), you need to create a text file of the type: -----BEGIN PRIVATE KEY----- ..... ..... -----END PRIVATE KEY----- -----BEGIN CERTIFICATE----- ..... ..... -----END CERTIFICATE----- ...
Traffic
Statistics from Application Control and Content Filter. The section automatically collects statistics from the Content filter (categories and sites) and Application Control (protocols), collecting it into widgets with default filters. Information display m...
Security Events
Contains information about the triggering of the rules specified in the Intrusion Prevention section. All widgets are generated in the server's time zone. The section structures the information received from the Intrusion prevention section. Period sele...
Authorization Log
In the Reports -> Authorization Log section, a list of users authorized on SafeUTM is available to you in the form of a table. You can use the possibility to search for specific authorized users with a filter. To do this, at the top of the screen in the C...
Report Designer
Setting up statistics in custom reports and sending ready-made reports to e-mail. UTM provides the ability to create report templates and set up their distribution in .pdf format by e-mail. My templates This tab creates templates with statistics that ca...
Administrators
Managing Administrators It is possible to set the credentials of several administrators of the SafeUTM server to access the settings web interfaces. The pre-installed administrator account cannot be deleted, you can only change its data – name, and passwor...
High availability
This section describes how to configure a cluster consisting of two SafeUTM servers. Each of the two SafeUTM devices is called a node. The cluster operates in active-passive mode. The node that processes traffic at a given time is active. In its turn, the ...