Kerio Control Step by Step en 7.0.0
Kerio Control Step by Step en 7.0.0
Kerio Control Step by Step en 7.0.0
Step-by-Step Configuration
Kerio Technologies
Kerio Technologies s.r.o. All rights reserved.
This guide provides detailed description on configuration of the local network which uses
the Kerio Control, version 7.0. All additional modifications and updates reserved.
1 Introduction ................................................................... 4
2 Headquarters configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.1 Selection of IP addresses for LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Configuration of network interfaces of the Internet gateway . . . . . . . . . . . . . . . . 7
2.3 Kerio Control installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.4 Basic Traffic Policy Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
2.5 Intrusion Prevention System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.6 DHCP Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
2.7 DNS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.8 Web interface and SSL-VPN certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.9 Mapping of user accounts and groups from the Active Directory . . . . . . . . . . . 13
2.10 Address Groups and Time Ranges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.11 Web Rules Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
2.12 FTP Policy Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.13 Antivirus Scanning Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.14 Enabling access to local services from the Internet . . . . . . . . . . . . . . . . . . . . . . . . 16
2.15 Secured access of remote clients to LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.16 LAN Hosts Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.17 Viewing statistics of Internet usage and user browsing behavior . . . . . . . . . . . 18
B Legal Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
3
Chapter 1
Introduction
This manual describes configuration steps to be taken for implementation of Kerio Con-
trol in a model network. This network includes most elements present in a real-life Kerio
Control network — Internet access from the local network, protection against attacks from
the Internet, access to selected services on the LAN from the Internet, user access control,
automatic configuration of clients on the LAN, user authentication in the Active Directory
domain, user browsing behavior control, etc.
Another issue is to provide interconnection of networks between the headquarters and
a branch office by a secure (encrypted) channel (so called VPN tunnel) and secure access of
clients to the local network via the Internet using Kerio Control.
This manual provides guidelines for quick setup. Detailed information addressing individual
Kerio Control features and configuration instructions are provided in the Kerio Control —
Administrator’s Guide available at http://www.kerio.com/firewall/manual.
4
It is recommended to reserve a standalone server for the firewall’s purposes (Internet gateway).
Such server can be:
Use Kerio Control in a Windows edition installed in the system as an application. The
firewall can be run along with other server applications, such as the mailserver with
groupware fetaures Kerio Connect. However, the firewall host should not be used as
a user workstation.
Besides that, for the VMware platform, there is a ready virtual appliance available in
OVF and VMX, simply to be imported and started.
5
Chapter 2
Headquarters configuration
This chapter provides detailed description on configuration of the local network and setup
of Kerio Control in company headquarters. The same procedure can be applied for network
configuration in a branch office (bearing in mind slight differences described in chapter 3).
For purposes of this example, it is supposed that an Active Directory domain company.com is
created in the headquarters’ LAN and all hosts in the network are included in this domain.
Warning:
Do not use other IP addresses in private networks, otherwise some web pages (those
networks that have the same IP addresses) might be unavailable!
For the headquarters’ LAN, the private addresses 192.168.1.x with subnet mask
255.255.255.0 (IP subnet 192.168.1.0) will be used whereas IP addresses10.1.1.x with
subnet mask 255.255.255.0 (IP subnet 10.1.1.0) will be used for the filial’s LAN.
• The 192.168.1.2 static IP address will be assigned to the domain server / FTP server
(its IP address must not be changed, otherwise mapping from the Internet will not
work).
• A Static IP address will be assigned to the network printer by the DHCP server (DHCP
lease). Printing machines cannot have dynamic IP addresses, otherwise they would be
unavailable from clients if the IP changes.
6
2.2 Configuration of network interfaces of the Internet gateway
Notes:
1. The DNS domain in the LAN must be identical with the Active Directory domain (i.e.
company.com).
2. IP addresses 10.1.1.x with the subnet mask 255.255.255.0 will be used in the network
of the branch office. The Active Directory domain is not used in this network, so it is
necessary to create a local DNS domain filial.company.com.
7
Headquarters configuration
Internet Interfaces
Follow the ISP’s instructions to set the interface connected to the Internet. Most ISP use
automatic configuration of TCP/IP parameters by using DHCP protocol. In case of manual
configuration, the following parameters are required for proper functionality of the Internet
interface: IP address, subnet mask, default gateway and at least one DNS server’s address.
The web interface of the company headquarter’s firewall should have a fixed IP address to
make it possible for the filial’s server and VPN clients to connect to it (see requirements
in chapter 1). Suppose that the ISP has aasigned IP adddress 85.17.210.230. It is also
recommended to assign a DNS name (e.g. server.company.com) to this IP address; otherwise
all VPN clients will be required to define the server by the IP address.
Verify connectivity (i.e. by using the ping command or by opening a Web site using your
browser).
LAN Interface
Installation on Windows
If the installation program detects the Internet Connection Sharing service, it is recommended
to strictly disable this service, otherwise collisions might occur and Kerio Connect may work
incorrectly. It is also recommended to disable also other system services which might cause
collisions — Universal Plug and Play Device Host and SSDP Discovery Service.
Now set a password for access to administration (user Admin). If the installation is performed
remotely (e.g. via Remote Desktop), check the corresponding option to avoid blocking of
network traffic when the installation is completed.
Under usual circumstances, a reboot of the computer is not required after the installation is
completed (a restart may be required if the installation program rewrites shared files which
are currently in use). This will install the Kerio Control Engine low-level driver into the system
8
2.4 Basic Traffic Policy Configuration
kernel. Kerio Control Engine and Kerio Control Engine Monitor will be automatically launched
when the installation is complete. The engine runs as a service.
Kerio Control in the software appliance edition is distribuded as an ISO image of the
installation CD that can be used to implement the system and install the firewall on either
a physical or virtual host.
ISO image of the installation CD can be burned on a physical CD and then the CD can be used
for installation of the system on the target computer (either physical or virtual). In case of
virtual computers, the ISO image can be also connected as a virtual CD ROM, without the need
to burn the installation ISO file on a CD.
After installation, the computer will be rebooted and a simple wizard for setting of
the following basic firewall parameters will get started — network interfaces, remote
administration, Admin passwords, etc. Any other settings can be done remotely in the Kerio
Administration Console or on the Kerio Control Administration web interface.
Use a corresponding package in accordance with the type of your VMware product (see
above):
• In case of products VMware Server, Workstation and Fusion, download the compressed
VMX distribution file (*.zip), unpack it and open it in the your VMware product.
• You can import a virtual appliance directly to VMware ESX/ESXi from the URL of the
OVF file — for example:
http://download.kerio.com/dwn/control/
kerio-control-appliance-7.0.0-1234-linux.ovf
Upon the first start of the virtual host, a simple wizard for setting of the following basic
firewall parameters will get started — network interfaces, remote administration, Admin
passwords, etc. Other settings can be done remotely in the Kerio Administration Console or on
the Kerio Control Administration web interface.
9
Headquarters configuration
• Internet connection types (the wizard, page 2) — select persistent connection with
a single Internet line.
• Internet interface (the wizard, page 3) — select an interface connected to the Internet.
• Rules used for outgoing traffic (the wizard, page 4) — these rules enable access to
Internet services.
• Rules for VPN (the wizard, page 5) — leave both options enabled: Create rules for
Kerio VPN (this creates key traffic rules for interconnection of headquarters and filial
networks and for connection of remote clients — see chapter 4) and Create rules for
Kerio Clientless SSL-VPN (remote access to shared folders and files in the network via
browser).
Note: There is no reason to create rules for Kerio Clientless SSL-VPN on the firewall of
the branch office (Active Directory domain is not used on the side of the branch office).
• Rules for incoming traffic (the wizard, page 6) — add mapping of SMTP service on the
firewall.
Note: In this step you can also define mapping for other hosted services such as an
FTP server. This will be better understood through the second method — custom rule
definition. For details, see chapter 2.14.
• Default gateway — IP address of the firewall interface that is connected to the local
network (192.168.1.1).
10
2.6 DHCP Server Configuration
• DNS server — IP address of the firewall interface that is connected to the local network
(192.168.1.1 — the same as the default gateway). The Kerio Control’s DNS forwarder
will be used as the primary DNS server. The forwarder will procure correct forwarding
of requests between the company’s offices and to the Internet.
• Domain — local DNS domain (identical with the Active Directory domain, i.e.
company.com).
Now add a reservation for the network printer. The address you reserve need not necessarily
belong to the scope described above, however, it must belong to the specified network (in
this example the 192.168.1.3 address is reserved). You need to know the hardware (MAC)
address of the printing machine to make the reservation.
Hints:
2. Do not make the reservation manually unless you know the MAC address of your
printing machine. Run the DHCP server and connect the machine to the network. An
IP address from the formerly defined scope (see above) will be assigned to the printing
machine. In the list of leased addresses, mark this IP address and click on Reserve. This
opens a dialog for IP address reservation with the corresponding MAC address already
predefined. Change reserved IP address to the desired one (192.168.1.3), edit the
description and click on OK. Restart your printing machine. The appropriate IP address
will be assigned to the printing machine by the DHCP server after the restart.
Notes:
1. Do not enable (allow) the DHCP server unless all desired scopes and reservations are made
or unless you need to determine a client’s MAC address (see above).
2. You can also use another DHCP server to detect settings of your network equipment
automatically. Set the firewall computer’s internal IP address (192.168.1.1) as the default
gateway and DNS server in parameters for this range on the DHCP server.
In this case it is necessary to keep the DHCP server in Kerio Control disabled!
11
Headquarters configuration
• Enable the Use custom forwarding option Add the rule for forwarding of requests to
the Active Directory, i.e. of all requests for names starting with _ (underscore), to the
domain server in the LAN. This setting is required for correct communication of local
computers with the domain server.
_* 192.168.1.2
It is also necessary to add rules for correct forwarding of DNS queries between the
headquarters’ network and networks of branch offices. For detailed description on
these settings, refer to chapters 4.1 and 4.2.
Hint:
It is recommended to replace the created SSL certificates by an SSL certificate issued by
a public certification authority (one certificate can be used both for the web interface and
the Clientless SSL-VPN interface — there is no need to pay for two certificates).
12
2.9 Mapping of user accounts and groups from the Active Directory
2.9 Mapping of user accounts and groups from the Active Directory
To enable disposal of Active Directory user accounts, set mapping of a corresponding domain
and define a template that will apply specific Kerio Control parameters (user rights, data
transfer quotas, etc.) to all users.
Domain mapping
To set Active Directory domain mapping, go to the Active Directory tab under User and
Groups → Users. The firewall must belong to the corresponding domain. For mapping of
user accounts, enter name and password of a user with rights to read the Active Directory
database (any user belonging to the domain).
On the User Accounts tab, select the mapped Active Directory domain, i.e. company.com. If
mapping is set correctly, all user accounts included in the domain will be displayed here.
Click on the Template button to define a template for user accounts. It is also intended to
enable remote users to access the local network by Kerio VPN Client or Kerio Clientless SSL-
VPN. Set user rights on the Rights tab.
Hint:
In case you do not want to use any of the domain accounts, you can block them in Kerio
Control and hide blocked accounts. The accounts will be blocked only in Kerio Control, they
will stay active in the domain.
Note: Definition of the first group requires name of the new group, later additions allow
selection of an existing group.
Likely, go to Configuration → Definition → Time Ranges to create a time interval that will be
limited to accessing Internet services during the labor hours (from Monday to Friday from 8
A.M. to 4:30 P.M., Saturdays and Sundays from 8 A.M. to 12 A.M.).
You can use predefined day groups (Weekday or Weekend) to define the Valid on entry — it is
not necessary to tick each day individually.
13
Headquarters configuration
Requirements
• access to Web pages that offer jobs is denied (only users working in Personal
Departments are allowed to access these pages),
• user authentication will be required before access to the Internet is allowed (this way
you can monitor which pages are opened by each user).
The following basic HTTP rules are already predefined and available in the URL Rules tab in
Configuration → Content Filtering → HTTP Policy:
• It is recommended to keep rules Allow automatic updates for Kerio software and Allow
automatic updates and MS Windows activation enabled, so that Kerio Control automatic
updates and the server’s operating system activations work correctly.
• Rules Allow popular search engines and Remove advertisement and banners can be
used according to your needs.
• Rule Deny sites rated in Kerio Web Filter categoriescan be used to block all users access
to pages with erotic contents.
Use the Select Rating... button to select Kerio Web Filter categories that will be blocked.
Then select appropriate categories in the Pornography /Nudity section to deny access
to pages with erotic/sexual content.
On the Advanced tab, enter the text which will be displayed if a user to access a page
with forbidden content or set redirection to another webpage.
To restrict access to websites with job offers, use the following rules:
1. Add a rule allowing users from the Human Resources Department group to access pages
categorized by Kerio Web Filter as Job Offers.
2. Behind this rule, add a rule blocking access to the same category for any other users.
14
2.12 FTP Policy Configuration
It is recommended not to require user authentication in this rule. This prevents from
redirecting unauthenticated users’ browser to the authentication page before showing the
information that the page is blocked.
Requirements
FTP usage will be limited by the following restrictions:
• Rules Forbid *.mpg, *.mp3 and *.mpeg files and Forbid upload are ready to use.
• Modify the Forbid *.avi files rule by going to the Advanced tab and setting the time
when the rule is valid in the Working hours range (see chapter 2.10).
• On the General tab set the following condition: “if any user acesses FTP server
192.168.1.10, then allow.”
• On the Advanced tab, set the operation type to Upload and use the wildcard for any
file (*).
15
Headquarters configuration
Notes:
1. The IP address of the host where the appropriate FTP service is running must be used to
define the FTP server’s IP address. It is not possible to use an outbound IP address of the
firewall that the FTP server is mapped from (unless the FTP server runs on the firewall)! IP
addresses are translated before the content filtering rules are applied.
2. The same method can be also applied to enable upload to a particular FTP server in the
Internet whereas upload to other FTP servers will be forbidden.
Kerio Control allows to select protocols which antivirus check will be applied to. The HTTP,
FTP scanning, Email scanning and SSL-VPN scanning, tabs enable detailed configuration of
scanning of individual protocols. Usually, the default settings are convenient.
• Mapping of local FTP server — unsecured access only is supposed which makes it
possible to filter traffic and scan it for viruses.
Table 2.2 Making the local FTP servers available from the Internet
• Access to other mail server services (save SMTP) — allowed only from certain IP
addresses in the Working hours time range.
16
2.15 Secured access of remote clients to LAN
Notes:
1. This rule enables access to IMAP and POP3 services in both encrypted and
unencrypted versions — client can select which service they will use.
2. Based on this example, the SMTP service was mapped by the traffic rules Wizard
(refer to chapter 2.4) — the appropriate rule already exists.
3. Access to the SMTP service must not be limited to certain IP addresses only as
anyone is allowed to send an email to the local domain.
• DNS server — since Microsoft DNS is running on the host, the system sets the local
loopback address (loopback — 127.0.0.1) as the primary DNS server.
17
Headquarters configuration
Set automatic configuration of both IP address and DNS server (using DHCP) at all workstations
(it is set by default under most operating systems).
• visited websites,
• email messages and instant messaging,
• large file transfers,
• multimedia (online audio and video streaming),
• remote access (terminal access and VPN connection).
Tables and charts are available for the following statistical issues:
Statistics can be either showed for the overall traffic or for individual users.
18
Chapter 3
For quick configuration of the filial’s LAN, it is possible to follow similar method as for the
headquarter’s network (see chapter 2). The only difference is in DNS and DHCP configuration.
Supposing that there is no domain server or any other DNS server in the filial’s network. The
Kerio Control’s DNS module will be used as the primary DNS server.
Follow the ISP’s instructions to set the interface connected to the Internet.
• Enable the Use custom forwarding option The settings are addressed in details in
chapter 4.2.
• It is recommended to add a record about the server (or about other hosts to which
a fixed IP address will be assigned) to the hosts file:
10.1.1.1 server
19
Configuration of the LAN in a filial office
• Default gateway — IP address of the firewall interface that is connected to the local
network (10.1.1.1).
• DNS server — IP address of the firewall interface that is connected to the local network
(10.1.1.1 — the same as the default gateway). The Kerio Control’s DNS forwarder will
be used as the primary DNS server. The forwarder will procure correct forwarding of
requests between the company’s offices and to the Internet.
20
Chapter 4
The configuration consists of two parts: settings in the headquarters and settings of the filial.
It is supposed that both networks have been already configured as described in chapter 2 and
that connection to the Internet is available.
For better reference, review the figure providing a graphical description of interconnected
networks, including their IP addresses.
21
Interconnection of the headquarters and branch offices
The headquarters uses IP addresses 192.168.1.x with the network mask 255.255.255.0 and
with DNS domain company.com. The branch office uses IP addresses 10.1.1.x with network
mask 255.255.255.0 and with the subdomain filial.company.com.
1. In Kerio Control under Configuration / Interfaces select a VPN server, open its settings
dialog and enable it.
Note: The VPN network and Mask entries now include an automatically selected free
subnet for VPN. There is no reason to change the network.
2. Use the Edit SSL certificate button to create an SSL certificate with the name of
the corresponding server (e.g. server.company.com). This certificate is used for
identification of the VPN server.
3. Create a passive endpoint of the VPN tunnel (the office’s server uses a dynamic IP address
— therefore there must be the active endpoint of the tunnel at the office). Specify the
remote endpoint SSL certificate’s fingerprint by the fingerprint of the certificate of the
branch office VPN server.
4. In the configuration of the DNS module (refer to chapter 2.7), enable the Use custom for-
warding. Define rules for the filial.company.com domain. Specify the server for DNS
forwarding by the IP address of the remote Kerio Control host’s interface (i.e. interface
connected to the local network at the other end of the tunnel).
filial.company.com 10.1.1.1
1. In Kerio Control under Configuration / Interfaces select a VPN server, open its settings
dialog and enable it.
Note: The VPN network and Mask entries now include an automatically selected free
subnet for VPN. There is no reason to change the network.
Use the Edit SSL certificate button to create an SSL certificate with the name of the
corresponding server (e.g. server.filial.company). This certificate is used for
22
identification of the VPN server. The fingerprint of the created SSL certificate will be
required for definition of the VPN tunnel on the headquarters server (see chapter 4.1).
Select it, copy it to the clipboard and paste it to an email message, text file, etc.
2. Create an active endpoint of the VPN tunnel which connects to the company’s
headquarters server (server.company.com). The fingerprint of the VPN server certificate
can be set simply by clicking on Detect remote certificate.
3. In the configuration of the DNS module (refer to chapter 2.7), enable the Use cus-
tom forwarding. Define rules for the company.com domain. Set the IP address of the
headquarter’s domain server (192.168.1.2) which is used as the primary server for the
company.com domain as the DNS server used for forwarding.
company.com 192.168.1.2
For example, the ping or/and tracert operating system commands can be used for this
testing. It is recommended to test availability of remote hosts both through IP addresses and
DNS names.
If a remote host is tested through IP address and it does not respond, check configuration
of the traffic rules or/and find out whether the subnets do not collide (i.e. whether the same
subnet is not used at both ends of the tunnel).
Note: VPN clients connecting to the headquarters server can access both the headquarters
and the branch office networks and vice versa (the access is not limited by any restrictions).
Therefore, it is recommended to test connection to both networks also from the VPN client.
23
Appendix A
Kerio Control contains open-source software. Full source code packages for these components
are available in the Software Archive at http://download.kerio.com/archive/.
24
Appendix B
Legal Notices
Other names of real companies and products mentioned in this document may be registered
trademarks or trademarks of their owners.
25