چیزی در مورد بتا بودنش ننوشته

  محتوای مخفی: اطلاعات دانلود 


Kerio Control - is a complete UTM solution that includes all the necessary instruments: a comprehensive system of security, --- server, bandwidth management, load balancing for Internet channels, as well as ample opportunities to curb the abuse of network access. Kerio Control has more flexibility in terms of hardware requirements, and scalability than traditional security solutions and allows administrators to monitor network activity of users down to the smallest detail.

Features:

Intrusion prevention
- Signature analysis package data
- List of blocked IP-addresses (blacklist)
- Management of safety rules

Firewall certified by ICSA Labs
- Testing for recognized industry standards
- Corporate level of protection - provides security policy by default, immediately after installation
- Secure remote administration - all changes in security policies logged

Application Layer Gateway
- Create policies for inbound and outbound traffic.
- Protection of servers without the need to organize the DMZ through easily customizable NAT.
- Implementation of static monitoring and logging of network packets and protocols (stateful packet and protocol inspection).

Virus protection
- Filtering of incoming and outgoing traffic for viruses, worms and other piece of code claimed.
- Easy deployment of anti-virus protection with integrated anti-virus from Sophos.
- Ability to use two anti-virus modules for better protection.

Filter web sites for content
- Blocking access to Web sites with malicious or unwanted content
- 53 ralichnye category of Web content
- Statistics of resources by categories of web content

--- server
- Unlimited number of connections in the --- server mode server
- --- client for Mac, Windows and Linux
- Clientless SSL---- for Windows networks

Politicians user access
- Integration with Active Directory to simplify password management.
- Monitor and restrict access user accounts on the Internet.

Kerio StaR: Tracking the activities of employees at the request of management
- View and print individual activities on the Internet, including requests to the global search engine.
- Identifying the causes of congestion in the network, as well as cases of misuse of the Internet.

P2P Eliminator
- Reducing the likelihood of violations related to the downloading of unlicensed software, preventing data leaks and loading of dangerous objects from the peering networks.
- Blocking of different types of peering network is using several technologies: restricting access to certain ports, assess the load on the network and behavioral analysis of network activity to adapt to new technologies peering.

Load balancing Channels
- Increased bandwidth network channel by combining multiple Internet connections.
- Increased loading speed and impact of files.
- Increased productivity services that require high bandwidth such as VoIP and video conferencing.

Speed limit channel
- Set daily or monthly quotas for bandwidth usage by users.
- Limit speed connection for non-critical applications.

Connecting to standby channels
- Support for connection to the Internet for critical applications (mail, SQL, web).
- Automatic connection to a backup channel in case of no connection to the core.

Technical characteristics

Firewall and router
Tracking connections (SPI)
Access Restrictions
Anti-spoofing
Inspector reports
Wizard traffic policy
DHCP server
Redirect DNS-server (forwarder)
IDS / IPS (based on Snort)
Kerio Certified signature IDS
Blacklisting IP-addresses
Three levels of seriousness of incidents

Reporting
Statistics Analyzer
Reports use the Internet for users, groups, interfaces
Detailed reports on users
Reports on the use of bandwidth
Reports on Safety
Statistics on the Web category visited pages using Kerio Web Filter
Syslog support
Email Alerts
Reports of visited Web resources
Reports on the protocol for use
Access to statistics via Web browser

User Authentication
Kerberos / Active Directory
NT domain
Manual authentication for login and password
Authentication through opaque proxy server (terminal services)
NTLM Authentication

Virtual private network (---)
Support for split-tunneling
--- clients for Windows / MacOS / Linux
--- client can be run as a service
Authentication user
Unlimited number of tunnels (servers server)
Bezklientsky SSL---- through a Web browser (for Windows)

Traffic policy and NAT
Pre service
Traffic policy for users
Traffic policy at time intervals
NAT mapping
Policy groups
Dynamic DNS
Filtering by MAC-addresses
Support blacklists in the IDS / IPS
The ability to add exceptions in the traffic policy

Content filtering
Setting the time interval
P2P Eliminator
URL Categorization
Page denial of access with the possibility of customization
Notification to the administrator via e-mail
Ability to add your own URL rules
Filtering by the prohibited words
FTP Policy
Proxy serverr
URL Whitelist
Virus filtering
Integration with Sophos
The possibility of dual anti-virus filtering

Load the channels and QoS
Support multiple channels of communication the Internet
Policy-based routing
Connecting to back channel
Limiter bandwidth

Administration
Administration Console
Web administration console
Several IP addresses on one network interface
Customizable routing table
Adjustable set privileges administration
Ability to check updates
Export / Import server configuration
Integration with Active Directory
Local user base
Domain configuration template default user
Fvtomatichesky out user after a timeout
Configurable intervals for groups
Multilingual support
English
Chinese (Simplified)
Croatian
Czech
German
French
Danish
Hungarian
Italian
Japanese
Polish
Portuguese
RUSSIAN
Spanish
Swedish

Certification
Certification ICSA Labs - Corporate Firewall
Windows 7

Requirements
Windows
CPU: 1 GHz
RAM: 1 GB RAM
Hard disk: 8 GB HDD space for installation, journals and statistics
Network Adapter: 1 Ethernet (10/100/1000 Mb) a network interface supported by OS

Operating Systems *:
Windows 7 (all versions)
Windows XP (all versions)
Windows Vista (all versions)
Windows 2000 Professional
Windows Server 2008 (all versions except the Core)
Windows Server 2008 R2 (all versions except the Core)
Windows Server 2003 (all versions)
Windows Server 2003 R2 (all versions)
Windows Server 2000 (all versions)
* Requires installation of the latest updates, if not further specified

Kerio Control Software Appliance
CPU: 500 MHz
RAM: 1 GB RAM
Hard disk: 8 GB HDD space to install the OS product, journals and statistics
Network Adapter: 1 Ethernet (10/100/1000 Mb) a network interface supported by the Linux kernel version 2.6.30
(Most of the existing network adapters are supported ..)
Kerio Control VMware Virtual Appliance
CPU: 2 GHz
RAM: 1 GB RAM dedicated virtual machine
Hard disk: 8 GB HDD space dedicated OS installation, product, journals and statistics
Network Adapter: 1 virtual network adapter

Hypervisor VMware:
VMware Workstation 6.5 or 7.0
VMware Server 1.0 or 2.0
VMware Fusion 2.0 or 3.0
VMware Player 2.5 or 3.0
VMware ESX 3.5 or 4.0
VMware ESXi 3.5 or 4.0

Kerio --- Client
Windows
Operating system?:
Windows 7 (all versions)
Windows XP (all versions)
Windows Vista (all versions)
Windows 2000 Professional
Windows Server 2008 (all versions except the Core)
Windows Server 2008 R2 (all versions except the Core)
Windows Server 2003 (all versions)
Windows Server 2003 R2 (all versions)
Windows Server 2000 (all versions)

Mac OS X
(Only the Mac-and technology-based Intel)
Operating system:
Mac OS X 10.4 Tiger
Mac OS X 10.5 Leopard
Mac OS X 10.6 Snow Leopard

Linux
Operating system:
Debian 5.0
Ubuntu 8.04 to 10.4

Web Browsers
The basic functions of input / output user:
All HTTP (S)-compatible browsers, including mobile browsers are supported.

Administration Console Kerio Control, StaR, and SSL----:
Microsoft Internet Explorer 7 and 8
Firefox 3 and above
Safari 4

Title: Kerio Control 7.0
Year: 2010
Platform: PC
Language: ENG | RUS
Medicine: Yes





لینکها:

کد:
برای مشاهده محتوا ، لطفا وارد شوید یا ثبت نام کنید