Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

145 total results found

Subscription API guide

Subscription API

Version 1.8.The latest Subscription API guide is available here: https://docs.safedns.com/books/subscription-api/page/subscription-api-guide Introduction SafeDNS Subscription API is designed to give you an easy and fast way to automatically create new us...

About SafeUTM

1. About SafeUTM

SafeUTM security gateway is a modern software solution that secures the network perimeter and allows to make internet access 100% controllable, safe and reliable. SafeUTM features: Firewall Intrusion prevention system Content Filter Application contro...

Technical Support

2. General Information

One of the main priorities for SafeDNS is our clients’ high satisfaction rate. Technical support is provided throughout the service subscription period. The subscription is included in the license price and is valid for a year from the date of purchase. Upo...

Creating a USB flash startup disk

3. Installation

Windows The creation of the ISO image will erase all existing information from the USB drive. Download Rufus software and open the downloaded file. Choose the designated USB flash drive in the Device: Select Disk or ISO image in Boot Selection. Click ...

Setting up Hypervisors

3. Installation

Necessary conditions for SafeUTM work:1. UEFI support.2. Legacy download mode must be turned off (it may also be called CSM - Compatibility Support Module).3. Turn off Secure Boot in UEFI. SafeUTM supports the following hypervisors: VMware (Workstation and...

Installation Process

3. Installation

System Requirements Mandatory conditions for work with SafeUTM:1. UEFI support.2. Turn off Legacy boot mode, it may be called CSM (Compatibility Support Module).3. Turn off the Secure Boot option in UEFI. Hardware Minimum system requirements ...

Initial Configuration

3. Installation

Connection to SafeUTM Web Interface If you haven’t installed SafeUTM yet, please see the Installation Process article. After you have successfully installed SafeUTM you can start its initial configuration. Start an internet browser on any local network comp...

Dashboard

4.1. Setup - Dashboard

Information about the server status. This module allows you to view the following information about the server: Server uptime; Basic information about the license; CPU load over a certain period of time (5 minutes, 1 hour, 6 hours, 1 day, 7 days); RAM...

User tree

4.2. Setup - Users User tree

In the SafeUTM management interface, users are displayed as a tree. Users can be organized into trees. The group nesting level is not limited.The user account tree is available in Users -> User & Group. SafeUTM implements the principle of inheritance, whic...

User & Group

4.2. Setup - Users User tree

Creating, deleting, and moving user accounts. General To manage groups and accounts in the user tree, there are corresponding buttons on each group: Symbol Description Create user account Create group ...

Configuring Users

4.2. Setup - Users User tree

Configuring user account settings. Categories Users are configured in Users -> User & Group. To determine/edit the user account settings, select the account in the user tree by left-clicking on it. The parameters of the selected account will appear on the ...

Terminal Server Users

4.2. Setup - Users User tree

Used for remote work with the provision of a separate desktop for each user. Provides a service for the work of dozens and even hundreds of users. Terminal Server Authorization If the admin does not need the separate authorization of terminal server users,...

User Authorization

4.2. Setup - Users User Authorization

Authorization is a necessary condition for users to access the internet. General Information There are several authorization methods that you can find in this subsection. All types of authorizations on SafeUTM are IP-based (based on the host IP address) a...

Web Authorization

4.2. Setup - Users User Authorization

Supported browsers:- Google Chrome, version >= 76- Firefox, version >= 71- Safari, version >= 13 In this type of authorization, any request from an unauthenticated user sent via a web browser will be redirected to a special authorization page of SafeUTM. Afte...

Authorization by IP and MAC address

4.2. Setup - Users User Authorization

General Information The IP and MAC authorization rules also create a similar binding in the SafeUTM DHCP server. However, if the same IP and MAC addresses will be used in the enabled rules of the DHCP server, then the DHCP server rules will be executed first....

Authorization by IP address

4.2. Setup - Users User Authorization

Configuring Authorization by IP Authorization by IP implies that an authorized user will gain access to Internet resources without entering a username and password, but simply by initiating a connection to these resources. You can also authorize network devi...

Authorization by MAC address

4.2. Setup - Users User Authorization

This type of authorization is suitable for those devices whose location changes from time to time between local networks within the organization (for example, employees' work laptops) or network devices that are issued an IP address via DHCP, on which IP+MAC b...

VPN Connection

4.2. Setup - Users VPN Connections

To gain access from outside (from home, hotel, or another office) to the enterprise's local network located behind SafeUTM, you can connect via VPN from this machine (computer or mobile device) to the SafeUTM server. For client-to-site VPN, our server support...

Authorization by PPTP

4.2. Setup - Users VPN Connections

Do not use this type of connection. This connection method is EXTREMELY insecure and has been left solely for compatibility with older solutions. Use IPsec-IKEv2. Authorization by PPTP protocol involves authorization via a secure network tunnel between the us...

Authorization by PPPoE

4.2. Setup - Users VPN Connections

Authorization by PPPoE protocol involves authorization via a secure network tunnel between the user’s network device and the SafeUTM server. A login/password bundle is used for user authorization. With this type of authorization, the assignment of the workstat...