How to Configure IP passthrough (K7 computing) 0 (0)

One of the unique feature EN6200 carries which is used to assign a Public IP directly to a server behind firewall without compromising the security of the network. For example VoIP or call loggers won’t work behind Firewall via NAT-ed network this feature is very much useful to configure a public IP with Firewall enabled […]

Read More

How to configure the BGP Route (K7 computing) 0 (0)

We configure basic BGP between K7 Security UTM and ISP’s router to advertise a network (with public IP address) to the ISP. It is necessary to have the AS (Autonomous System) numbers and public IP address of both devices. This information should be provided by ISP. Steps to be followed: 1. Login to K7 Security […]

Read More

How to configure the Source NAT (K7 computing) 0 (0)

Steps to be followed: 1. In Configuration navigate to “Firewall / NAT and select “Source NAT” and select “Add”. 2. In Outgoing Interface select the BGP publish interface and make Nat type as NONAT. 3. In Source Qualifier, source address provide the BGP configuration network to announce. 4. In Protocol Tab Select Action and configure Source […]

Read More

How to configure the Policy Routing (K7 computing) 0 (0)

Policy-based routing can be used to change the next hop IP address for traffic matching certain criteria. This can be useful to overrule your routing table for certain traffic types. I will show you how to configure policy based routing. Steps to be followed: 1: Login to K7 Security UTM, and Click on Configuration. 2: Navigate to > […]

Read More

How to Configure the Static Routing (K7 computing) 0 (0)

If routers is configured in the interfaces and in need to access the computers configured under the router, it is required to configure static routes policy in K7 Security UTM appliance. The static route policy shall create static routing entries that decides based on the source address, source netmask, destination address, destination netmask, service, interface, […]

Read More

How to Configure Firewall Filter Rule (K7 computing) 0 (0)

Firewall is a system that is used to define rules that govern the routing of connection requests between networks. Using firewall system, you can allow set of services to pass through different network zones while keeping other services away. Note: Below scenario explains how to block the RDP for a LAN to DMZ Zone. Procedure: […]

Read More

How to Configure the Mac-IP Binding (K7 computing) 0 (0)

MAC-IP binding allows us to reserve static IP assignment for a client. The maximum supported entries are 32 and this feature is applicable only for Local DHCP Scope. Helps reserve IP address to a specific client. Reserving an IP address allows us to create policies in the firewall configuration and to prioritize the traffic.1. Login to […]

Read More

How to Configure Port Forwarding (K7 computing) 0 (0)

Port forwarding is the process of configuring and to make a computer or other network device to communicate even from outside of the local network. Port forwarding uses an IP address plus port number to route network requests to specific devices. Steps to be followed 1. Login to K7 Security UTM, and Click on Configuration. 2. […]

Read More

How to configure the system Security (K7 computing) 0 (0)

Below steps shall be followed to configure System Security on a K7 Security UTM appliance. Steps to be followed: 1. Login to K7 Security UTM, and Click on Configuration 2. Navigate to Firewall/NAT and select System Security 3. HTTP/ HTTPS port number as per preference and can Enable/Disable the HTTP & HTTPS Remote Management of K7 Security UTM via WAN NOTE: By Default Web Server […]

Read More

How to Configure the Zone Policy (K7 computing) 0 (0)

Zone is grouping of Interfaces (Physical or Logical) that represents a segment of the network that is connected to, and controlled by, the firewall. Zones can be used to apply security policies to control the incoming and outgoing traffic on selected interfaces. Steps to be followed: 1. Login to K7 Security UTM 2. Click the Configuration and navigate to Firewall/NAT […]

Read More