Conflicting software, 2 conflicting software – Kerio Tech Firewall6 User Manual

Page 11

Advertising
background image

2.2 Conflicting software

11

Email alerts

WinRoute can send email alerts informing users about various events. This function

makes firewall administration easier for the administrators since they need not connect

to WinRoute frequently to check it through. All sent alerts are saved in a special log file.

User quotas

A limit can be set for transmitted data per each user. This limit can be set for the amount

of downloaded or/and uploaded data per day/month. These limits are called quotas. If

any quota is exceeded, the connection to the Internet will be blocked for a corresponding

user. Email alert can be optionally sent to the user.

Blocking of P2P networks

WinRoute can detect and block so called Peer-to-Peer networks (networks used for sharing

of files, such as Kazaa, DirectConnect etc.).

Kerio StaR — statistics and reporting

Detailed statistics of the firewall interface (current speed of transmitted data, amount

of data transmitted in certain time periods) as well as of individual users (amount of

transmitted data, used services, visited websites and their categories, etc.) can be viewed

in WinRoute.

Basic statistics are available in the administration program while detailed statistics can

be found in the firewall’s web interface.

Kerio VPN — proprietary VPN server and client

WinRoute also provides a proprietary VPN solution which can be applied to the server-

to-server and client-to-server modes. This VPN solution can perform NAT (even multiple)

at both ends. The Kerio VPN Client client software is included in the WinRoute package

that can be used for creation of client-to-server VPN types (connection of remote clients

to local networks).

Clientless SSL-VPN

The role of the VPN solution which requires a special application at the client side can be

supplied by remote access to a private network using a web browser. Clientless SSL-VPN

enables browsing through hosts and shared items in remote networks as well as files

downloads and saving. The traffic is secured by SSL (HTTPS).

2.2 Conflicting software

The WinRoute host can be used as a workstation, however it is not recommended as user

activity can affect the functionality of the operating system and WinRoute in a negative way.

WinRoute can be run with most of common applications. However, there are certain applica-

tions that should not be run at the same host as WinRoute for this could result in collisions.

Collision of low-level drivers

WinRoute Firewall may collide with applications that use low-level drivers with either

identical or similar technology.

Advertising