Steps to be followed: 1: Login to K7 Security UTM click on configuration > Web security>HTTP/S Proxy 2: Under the setting: Enable the service and operation mode> AS Transparent 3: Configuration > Web Cache > Enable / Disable and mention the size for store 4: Make Firewall internet access control select Https Access > Tunnel 5: Http […]
Articles Tagged: K7 Computing for home
How to configure the web security in user based (K7 computing)
1: Login to K7 Security UTM click on configuration > Web security>HTTP/S Proxy 2: Under the setting: Enable the service and operation mode> AS Transparent 3: Under the Configuration Tab> Web Cache > Enable / Disable and mention the size for store. 4: Select Firewall internet access control > Https Access > Tunnel 5: Http proxy bypass […]
How to configure Fail-over and Load Balance (K7 computing)
Failover Only: If there are multiple WAN interfaces configured in the device, the WAN interface with higher link weightage takes higher priority and acts as the primary interface. In case of primary interface failure, secondary interface shall take over and provides the access. This is referred as failover mode of operation. In this mode, port […]
How to Configure IP passthrough (K7 computing)
One of the unique feature EN6200 carries which is used to assign a Public IP directly to a server behind firewall without compromising the security of the network. For example VoIP or call loggers won’t work behind Firewall via NAT-ed network this feature is very much useful to configure a public IP with Firewall enabled […]
How to configure the BGP Route (K7 computing)
We configure basic BGP between K7 Security UTM and ISP’s router to advertise a network (with public IP address) to the ISP. It is necessary to have the AS (Autonomous System) numbers and public IP address of both devices. This information should be provided by ISP. Steps to be followed: 1. Login to K7 Security […]
How to configure the Source NAT (K7 computing)
Steps to be followed: 1. In Configuration navigate to “Firewall / NAT and select “Source NAT” and select “Add”. 2. In Outgoing Interface select the BGP publish interface and make Nat type as NONAT. 3. In Source Qualifier, source address provide the BGP configuration network to announce. 4. In Protocol Tab Select Action and configure Source […]
How to configure the Policy Routing (K7 computing)
Policy-based routing can be used to change the next hop IP address for traffic matching certain criteria. This can be useful to overrule your routing table for certain traffic types. I will show you how to configure policy based routing. Steps to be followed: 1: Login to K7 Security UTM, and Click on Configuration. 2: Navigate to > […]
How to Configure the Static Routing (K7 computing)
If routers is configured in the interfaces and in need to access the computers configured under the router, it is required to configure static routes policy in K7 Security UTM appliance. The static route policy shall create static routing entries that decides based on the source address, source netmask, destination address, destination netmask, service, interface, […]
How to Configure Firewall Filter Rule (K7 computing)
Firewall is a system that is used to define rules that govern the routing of connection requests between networks. Using firewall system, you can allow set of services to pass through different network zones while keeping other services away. Note: Below scenario explains how to block the RDP for a LAN to DMZ Zone. Procedure: […]
How to Configure the Mac-IP Binding (K7 computing)
MAC-IP binding allows us to reserve static IP assignment for a client. The maximum supported entries are 32 and this feature is applicable only for Local DHCP Scope. Helps reserve IP address to a specific client. Reserving an IP address allows us to create policies in the firewall configuration and to prioritize the traffic.1. Login to […]