Advanced Search
Search Results
147 total results found
Subscription API guide
Version 1.9.If you are viewing the Subscription API guide as a PDF file, you can always check for the latest version here: https://docs.safedns.com/books/subscription-api/page/subscription-api-guide Introduction SafeDNS Subscription API is designed to gi...
About SafeUTM
SafeUTM security gateway is a modern software solution that secures the network perimeter and allows to make internet access 100% controllable, safe and reliable. SafeUTM features: Firewall Intrusion prevention system Content Filter Application contro...
Technical Support
One of the main priorities for SafeDNS is our clients’ high satisfaction rate. Technical support is provided throughout the service subscription period. The subscription is included in the license price and is valid for a year from the date of purchase. Upo...
Creating a USB flash startup disk
Windows The creation of the ISO image will erase all existing information from the USB drive. Download Rufus software and open the downloaded file. Choose the designated USB flash drive in the Device: Select Disk or ISO image in Boot Selection. Click ...
Setting up Hypervisors
Necessary conditions for SafeUTM work:1. UEFI support.2. Legacy download mode must be turned off (it may also be called CSM - Compatibility Support Module).3. Turn off Secure Boot in UEFI. SafeUTM supports the following hypervisors: VMware (Workstation and...
Installation Process
System Requirements Mandatory conditions for work with SafeUTM:1. UEFI support.2. Turn off Legacy boot mode, it may be called CSM (Compatibility Support Module).3. Turn off the Secure Boot option in UEFI. Hardware Minimum system requirements ...
Initial Configuration
Connection to SafeUTM Web Interface If you haven’t installed SafeUTM yet, please see the Installation Process article. After you have successfully installed SafeUTM you can start its initial configuration. Start an internet browser on any local network comp...
Dashboard
Information about the server status. This module allows you to view the following information about the server: Server uptime; Basic information about the license; CPU load over a certain period of time (5 minutes, 1 hour, 6 hours, 1 day, 7 days); RAM...
User tree
In the SafeUTM management interface, users are displayed as a tree. Users can be organized into trees. The group nesting level is not limited.The user account tree is available in Users -> User & Group. SafeUTM implements the principle of inheritance, whic...
User & Group
Creating, deleting, and moving user accounts. General To manage groups and accounts in the user tree, there are corresponding buttons on each group: Symbol Description Create user account Create group ...
Configuring Users
Configuring user account settings. Categories Users are configured in Users -> User & Group. To determine/edit the user account settings, select the account in the user tree by left-clicking on it. The parameters of the selected account will appear on the ...
Terminal Server Users
Used for remote work with the provision of a separate desktop for each user. Provides a service for the work of dozens and even hundreds of users. Terminal Server Authorization If the admin does not need the separate authorization of terminal server users,...
User Authorization
Authorization is a necessary condition for users to access the internet. General Information There are several authorization methods that you can find in this subsection. All types of authorizations on SafeUTM are IP-based (based on the host IP address) a...
Web Authorization
Supported browsers:- Google Chrome, version >= 76- Firefox, version >= 71- Safari, version >= 13 In this type of authorization, any request from an unauthenticated user sent via a web browser will be redirected to a special authorization page of SafeUTM. Afte...
Authorization by IP and MAC address
General Information The IP and MAC authorization rules also create a similar binding in the SafeUTM DHCP server. However, if the same IP and MAC addresses will be used in the enabled rules of the DHCP server, then the DHCP server rules will be executed first....
Authorization by IP address
Configuring Authorization by IP Authorization by IP implies that an authorized user will gain access to Internet resources without entering a username and password, but simply by initiating a connection to these resources. You can also authorize network devi...
Authorization by MAC address
This type of authorization is suitable for those devices whose location changes from time to time between local networks within the organization (for example, employees' work laptops) or network devices that are issued an IP address via DHCP, on which IP+MAC b...
VPN Connection
To gain access from outside (from home, hotel, or another office) to the enterprise's local network located behind SafeUTM, you can connect via VPN from this machine (computer or mobile device) to the SafeUTM server. For client-to-site VPN, our server support...
Authorization by PPTP
Do not use this type of connection. This connection method is EXTREMELY insecure and has been left solely for compatibility with older solutions. Use IPsec-IKEv2. Authorization by PPTP protocol involves authorization via a secure network tunnel between the us...
Authorization by PPPoE
Authorization by PPPoE protocol involves authorization via a secure network tunnel between the user’s network device and the SafeUTM server. A login/password bundle is used for user authorization. With this type of authorization, the assignment of the workstat...