How to Configure Port Forwarding (K7 computing) 0 (0)

Port forwarding is the process of configuring and to make a computer or other network device to communicate even from outside of the local network. Port forwarding uses an IP address plus port number to route network requests to specific devices. Steps to be followed 1. Login to K7 Security UTM, and Click on Configuration. 2. […]

Read More

How to configure the system Security (K7 computing) 0 (0)

Below steps shall be followed to configure System Security on a K7 Security UTM appliance. Steps to be followed: 1. Login to K7 Security UTM, and Click on Configuration 2. Navigate to Firewall/NAT and select System Security 3. HTTP/ HTTPS port number as per preference and can Enable/Disable the HTTP & HTTPS Remote Management of K7 Security UTM via WAN NOTE: By Default Web Server […]

Read More

How to Configure the Zone Policy (K7 computing) 0 (0)

Zone is grouping of Interfaces (Physical or Logical) that represents a segment of the network that is connected to, and controlled by, the firewall. Zones can be used to apply security policies to control the incoming and outgoing traffic on selected interfaces. Steps to be followed: 1. Login to K7 Security UTM 2. Click the Configuration and navigate to Firewall/NAT […]

Read More

How to configure the Wan (K7 computing) 0 (0)

K7 Security UTM is shipped with a limited number of Physical Interfaces. The number of Interfaces available depends on the K7 Security UTM model. Administrators have to configure these interfaces to fit their requirements. This article explains how to set up a WAN Interface for Static, DHCP or PPPoE. The following sections are covered: How […]

Read More

How to Configure Alternate DNS (K7 computing) 0 (0)

Description: The purpose of the alternate DNS servers are specified for load balancing on busy networks, if the primary DNS server is busy, it can forward requests to the alternate DNS server. Below steps shall be followed to configure Alternate DNS in K7 Security UTM appliance. Steps to be followed: 1. Login to K7 Security UTM 2. Click […]

Read More

How to Configure DHCP (K7 computing) 0 (0)

Description: The K7 Security UTM includes DHCP (Dynamic Host Configuration Protocol) server to distribute IP addresses, subnet masks, gateway addresses, and DNS server addresses to available devices in network. Below steps shall be followed to configure DHCP Server for the LAN, DMZ or other network zone on a K7 Security UTM appliance. Steps to be followed: […]

Read More

How to Configure LAN (K7 computing) 0 (0)

To configure LAN settings, following below steps shall help to achieve LAN configuration 1. Login to K7 Security UTM 2. Click the Configuration and navigate to Network Settings tab and Select LAN Port eg: LAN 1 or LAN 2 3. Change the LAN Connection Type from Disable to STATIC (Fixed IP). 4. Provide the Local Area Network IP Address and Subnet Mask in the respective fields. 5. Configure as LAN under […]

Read More

How to Configure the VLAN (K7 computing) 0 (0)

Description: VLAN’s can be used to create broadcast domains which eliminate the need of expensive routers. Periodically, sensitive data may be broadcasted on a network. In such cases, placing only those users who can have access to that data on a VLAN can reduce the chances of an outsider gaining access to the data. Steps for […]

Read More

How to configure Dynamic DNS (K7 computing) 0 (0)

Steps to be followed: Login to the K7 Security UTM. Click on Configuration and select Management and navigate to Dynamic DND Click on Add and select service as Enable. In Configuration under Provider enter the Service provider name Select Method for which interface DYDNS needs to to access. Provide the DNS name and the account information. After making the necessary configuration, Click Save and Restart Service. Note: In […]

Read More

How to configure Email Alert (K7 computing) 0 (0)

Steps to be followed: 1: Login to K7 Security UTM.           2: Click on the Configuration > Alert/Logs/Reports > Email setting           3: Select the Account > modify > enable the services 4: Mention the service name and the port number of outgoing           5: Check the TLS/ […]

Read More