K7 Mobile Security Activation Window Shows Blank 0 (0)

Scenario:- While activating the K7 Mobile Security License key, you may get blank screen in K7 Mobile Security app rather than the column to enter details. This happens because of font size is set to large. Steps to follow: Step 1 – Open Mobile “Settings”. Step 2 – Click / Tap on Display Option. Step 3 […]

Read More

How to Activate K7 Mobile Security for IOS 0 (0)

Description : Activation is essential to keep your product up-to-date to protect your computer and the software must be updated frequently. To receive updates and support from K7 Computing, you must activate your product. Kindly follow the below steps to activate: Step 1: Kindly install K7 Mobile Security in your apple device from AppStore or […]

Read More

How to Configure the IP sec VPN (K7 computing) 0 (0)

Steps to be followed:  Login to K7 Security UTM, Click on Configuration  Click on the VPN Navigate to IPSec-VPN  Provide the Name and description for desired VPN  Provide the IPsec Mode as Main  Mention the local IP needs to route to branch as same in the Remote side  Disable the Nat Traversal and select the Local […]

Read More

How to configure the SSL Server (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the VPN Navigate to SSL-VPN Server 3: Click On Add server Give description 4: Select the interface name for eg : VST1 5: Select the protocol where the VPN access via UDP /TCP and provide the port number For […]

Read More

How to configure the SSL-VPN Client (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the VPN > SSL-VPN Client > Add > select the operation mode and mention the Client Name and description. 3: Select the Algorithm and cipher type as mention in the server. 4: Certificate > Select upload zip file where […]

Read More

How to add the other ports in web security except 80 port (K7 computing) 0 (0)

Steps to be followed: 1. Login to K7 Security UTM 2. Click on Configuration 3. Navigate to Firewall/NAT 4. Select Filter Rule and choose LAN2WAN Firewall Access. 5. Under Destination Zone Add the required ports under Port Number. 6. After making the necessary configuration, Click Save and Restart Service. Note:If the issue persists or you need any assistance, you may raise ticket at Submit a Ticket and Our […]

Read More

How to bypass IP address under the Web security (K7 computing) 0 (0)

Steps to be followed: 1. Log in to K7 Security UTM Page 2. Click the Configuration and select Web Security tab 3.  Navigate to, HTTP/S Proxy and Enable the service by configuring the Operation Mode as Transparent 4. Navigate to Firewall internet access control. Select HTTPS Access as Tunnel mode 5. In Http/Https proxy bypass, Configure Bypass source as Specify IP and provide the IP address (eg: 192.168.1.2) in Bypass Source IP […]

Read More

How to configure the web security in IP based (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM click on configuration > Web security>HTTP/S Proxy 2: Under the setting: Enable the service and operation mode> AS Transparent 3: Configuration > Web Cache > Enable / Disable and mention the size for store 4: Make Firewall internet access control select Https Access > Tunnel 5: Http […]

Read More

How to configure the web security in user based (K7 computing) 0 (0)

1: Login to K7 Security UTM click on configuration > Web security>HTTP/S Proxy 2: Under the setting: Enable the service and operation mode> AS Transparent 3: Under the Configuration Tab> Web Cache > Enable / Disable and mention the size for store. 4: Select Firewall internet access control > Https Access > Tunnel 5: Http proxy bypass […]

Read More

How to configure Fail-over and Load Balance (K7 computing) 0 (0)

Failover Only: If there are multiple WAN interfaces configured in the device, the WAN interface with higher link weightage takes higher priority and acts as the primary interface. In case of primary interface failure, secondary interface shall take over and provides the access. This is referred as failover mode of operation. In this mode, port […]

Read More