Kerio Control 7.2
Product Specifications:
http://www.kerio.com/control/technical-specifications
http://www.kerio.com/control/download
Connection Limit
Anti-Spoofing
Protocol Inspection
Traffic Rules Configuration Wizard
DHCP server
DNS forwarder
IDS/IPS (Snort based)
Individual, Group, Entire Network Internet Usage Reports
User based reports
Bandwidth utilization
Security
Kerio Web Filter Reports
External Logging to Syslog
Email Alerts
Web site usage
Protocol usage
Browser based activity
NT Domain
Web login
Proxy Server authentication (for Terminal services)
NTLM authentication
Windows / Mac OS / Linux clients
VPN Client can run as service
User based authentication
Multiple tunnels (site to site)
Web SSL-VPN (Windows only)
User based traffic rules
Time based rules
NAT Mapping
Group Based rules
Dynamic DNS
MAC filtering
Blacklist in IDS/IPS
Rule Exemption Capability
P2P Eliminator
URL Categories
Custom denial page
Administrative alerts
Custom URLs
Forbidden Words
FTP Policy
Proxy server
URL White-listing
Anti-Virus Filtering
Policy based routing
Implicit failover
Bandwidth Management and QoS Configuration Wizard
Web-based administration
Multiple IP addresses on a single network interface
Customizable routing table
Variable Level Administrative Rights
Update Checker Option
Configuration Export/Import
Active Directory Integration
Local User Database
Domain Template for default user configuration
Auto Logout after Timeout
Configurable Time Ranges for groups
Multi-Language Support
http://www.kerio.com/control/technical-specifications
http://www.kerio.com/control/download
Firewall and Router
Connection tracking (SPI)Connection Limit
Anti-Spoofing
Protocol Inspection
Traffic Rules Configuration Wizard
DHCP server
DNS forwarder
IDS/IPS (Snort based)
- Kerio Certified IDS Signatures
- IP Blacklists
- Three severity levels
Reporting
Historical analysisIndividual, Group, Entire Network Internet Usage Reports
User based reports
Bandwidth utilization
Security
Kerio Web Filter Reports
External Logging to Syslog
Email Alerts
Web site usage
Protocol usage
Browser based activity
User Authentication
Kerberos/Active Directory/Open DirectoryNT Domain
Web login
Proxy Server authentication (for Terminal services)
NTLM authentication
Virtual Private Networking
Split tunnel supportWindows / Mac OS / Linux clients
VPN Client can run as service
User based authentication
Multiple tunnels (site to site)
Web SSL-VPN (Windows only)
NAT and traffic rules
Pre-configured servicesUser based traffic rules
Time based rules
NAT Mapping
Group Based rules
Dynamic DNS
MAC filtering
Blacklist in IDS/IPS
Rule Exemption Capability
Content Filtering
Time interval restrictionP2P Eliminator
URL Categories
Custom denial page
Administrative alerts
Custom URLs
Forbidden Words
FTP Policy
Proxy server
URL White-listing
Anti-Virus Filtering
- Sophos integration
- Dual scanning with plug-in
Load Balancing and QoS
Supports multiple Internet linksPolicy based routing
Implicit failover
Bandwidth Management and QoS Configuration Wizard
Administration
AdministrationWeb-based administration
Multiple IP addresses on a single network interface
Customizable routing table
Variable Level Administrative Rights
Update Checker Option
Configuration Export/Import
Active Directory Integration
Local User Database
Domain Template for default user configuration
Auto Logout after Timeout
Configurable Time Ranges for groups
Multi-Language Support
- English
- Chinese (Simplified)
- Croatian
- Czech
- Dutch
- French
- German
- Hungarian
- Italian
- Japanese
- Polish
- Portuguese
- Russian
- Spanish
- Swedish
Comments
Post a Comment