Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

265 total results found

Active Directory Agent Installation

Y.API Domain Database access service

Advanced Settings

4.8. Setup - Mail Relay

Rules

4.8. Setup - Mail Relay

Instructions for Creating VPN Connections

6. Instructions and Troubleshooting

Troubleshooting

6. Instructions and Troubleshooting

VPN Connections

4.2. Setup - Users

OpenDNS and Cisco Umbrella migration

Installation guides

Central Console

4.7. Setup - Server Management

Authorization by IP and MAC address

4.2. Setup - Users User Authorization

General Information The IP and MAC authorization rules also create a similar binding in the SafeUTM DHCP server. However, if the same IP and MAC addresses will be used in the enabled rules of the DHCP server, then the DHCP server rules will be executed first....

Authorization by IP address

4.2. Setup - Users User Authorization

Configuring Authorization by IP Authorization by IP implies that an authorized user will gain access to Internet resources without entering a username and password, but simply by initiating a connection to these resources. You can also authorize network devi...

Authorization by MAC address

4.2. Setup - Users User Authorization

This type of authorization is suitable for those devices whose location changes from time to time between local networks within the organization (for example, employees' work laptops) or network devices that are issued an IP address via DHCP, on which IP+MAC b...

VPN Connection

4.2. Setup - Users VPN Connections

To gain access from outside (from home, hotel, or another office) to the enterprise's local network located behind SafeUTM, you can connect via VPN from this machine (computer or mobile device) to the SafeUTM server. For client-to-site VPN, our server support...

Authorization by PPTP

4.2. Setup - Users VPN Connections

Do not use this type of connection. This connection method is EXTREMELY insecure and has been left solely for compatibility with older solutions. Use IPsec-IKEv2. Authorization by PPTP protocol involves authorization via a secure network tunnel between the us...

Authorization by PPPoE

4.2. Setup - Users VPN Connections

Authorization by PPPoE protocol involves authorization via a secure network tunnel between the user’s network device and the SafeUTM server. A login/password bundle is used for user authorization. With this type of authorization, the assignment of the workstat...

IPSec IKEv2

4.2. Setup - Users VPN Connections

This VPN protocol is preferable and recommended for all usage scenarios.Instructions for setting up VPN connections on different operating systems are available here.  Setting up VPN Server in SafeUTM To enable authorization by IKEv2, check the correspon...

SSTP

4.2. Setup - Users VPN Connections

SSTP (Secure Socket Tunneling Protocol) is a protocol of secure traffic tunneling based on SSL/TLS. It is supported by Windows OS Vista and above, as well as Mikrotik, Keenetic routers, and others. If possible, do not use this type of connection. This conne...

Schedule Setup

Installation guides Installation and configuration

Unlike other content filtering systems that use simple schedules with complete blocking of internet access based on time, SafeDNS uses a complex system of schedules that can be flexibly configured for any needs and any scenario. However, greater flexibility br...

Allow/Denylists And Named Lists

Installation guides Installation and configuration

"Named Lists" is the feature for Education, Hotspot, Office, and Enterprise billing plans. This feature comes in handy when you need to add the same list of domains to the different policies (filtering profiles). You can create or edit one named list and then ...

Top-level Domains Blocking

Installation guides Installation and configuration

If you want to block any top-level domain, just add it without a leading dot to your Denylist. For example, if you want to block access to all websites in the RU domain zone, add ru to your Denylist. Internationalized country code top-level domains should ...

NAT DNS Setup

Installation guides Installation and configuration

This feature is not available for the Safe@Home plan. Network Address Translation or NAT is frequently used in corporate networks. It allows network owners and administrators to:• decrease the number of static IPs• secure local networks• prevent unwanted ex...

General Setup via OpenVPN

Installation guides Installation and configuration

Some devices are not yet supported by the SafeDNS Agent or cannot have it installed for various reasons. In this case, you can configure the SafeDNS filtering via the third-party app OpenVPN. ⤵Download OpenVPN OpenVPN creates a VPN connection using the S...

Block Page Setup

Installation guides Installation and configuration

The block page is displayed when a user is trying to access a website blocked by the filtering rules. SafeDNS provides instruments to customize the block page. For example, you can add your logo and contact details on the block page, and an explanation why the...

L2TP IPSec

4.2. Setup - Users VPN Connections

If possible, do not use this type of connection. This connection method can be unstable, has huge redundancy, has low performance, and does not support the strongest encryption. IPsec-IKEv2 is recommended instead.All modern operating systems support IKEv2, o...

User's Personal Account

4.2. Setup - Users VPN Connections

To quickly configure user connections, you can enable access to the SafeUTM web interface. In the personal account accessible with the use of SafeUTM accounts details (local or domain, in case of integration with Active Directory), users will be able to dow...

Features of Routing and Access Organization

4.2. Setup - Users VPN Connections

If VPN is required only to access local network resources If you need to access the Internet directly through your provider, and you need to use a VPN only to access corporate network resources on computers connected via VPN, you need to configure the follo...

Instructions for running PowerShell scripts

4.2. Setup - Users VPN Connections

Use ready-made scripts downloaded from your server to create a VPN connection in Windows versions 8.1 and 10. If you are using Windows 7, you must create the connection manually (see Manually create user-side VPN connections). Which VPN protocol should I...

Fixed VPN IPs

4.2. Setup - Users

The section allows you to bind a specific IP address for a specific user for VPN connections. If you create a fixed binding for any user, then only one active VPN session will be possible for this user. For example, you have a host on a local network that ...

Subnet Authorization

4.2. Setup - Users

This type of authorization allows you to create an authorization rule for a specific UTM user from a specific subnet In order not to register each device as a separate UTM user and not to fix authorization factors for it, you can use Subnet Authorization. ...