Below steps shall be followed to configure Ethernet port management on a K7 Security UTM appliance. Steps to be followed: 1. Login to K7 Security UTM, Click on Administration 2. Navigate to Ethernet Port Management 3: Under Ethernet Ports Select the required ports to reassign. From the drop down list select the interface which we need to remapped. NOTE: For easier access sort […]
Articles Tagged: K7 Computing
How to configure the FTP (K7 computing)
Steps to be followed to achieve Log Backup Login to K7 Security UTM Click on Configuration Select Alert/Logs/Report Click on Ftp Log Export and Enable the Services In Configuration Tab provide the Custom Name Configure the Backup Frequency as Daily In Backup Start /End Time provide the time to export the log to the FTP server from firewall […]
How to create Admin User in Firewall (K7 computing)
Steps to be Followed: Login to K7 Security UTM Click on Administration and navigate to Admin user Management and Choose Add Select the Account Type from the list (Local Admin/Read user/ Administrator) Configure the User ID, Password and Name. In Page Access configure it as specify and Drag the pages which only needs to be accessed After making the necessary configuration, Click […]
How to Export and Import Configuration (K7 computing)
Steps to be followed: 1: Login to K7 Security UTM. 2: Click the Administration and navigate to configuration Management 3: Export the file manually > Click on download to export the file. 4: To Import the setting Click on Import Settings 5: We can also restore or download daily backup. 6: After Import/restore you must need to reboot the system now. Step 7: For reboot system […]
How to configure the POP3 server (K7 computing)
Description: POP3 Server is used to enable virus and spam filtering on incoming emails. Which is in need to have a Firewall rule that redirects the pop3 requests to the port number specified in the pop3 proxy configuration. Steps to be followed: Log in to K7 Security Click on the Configuration tab and Navigate to Email security Choose Pop3 […]
How to configure the SMTP Server (K7 computing)
Description: This is used to enable virus and spam filtering on outgoing emails. You must have a Firewall rule that redirects SMTP requests to the port number specified in the SMTP proxy configuration. Steps to be followed: 1: Login to K7 Security UTM, Click on Configuration 2: Click on the Email Security > SMTP proxy > enable the […]
How to configure the Spam Mail Server. (K7 computing)
Steps to be followed: Login to K7 Security UTM Click the Configuration and navigate Email security Choose SPAM server setting and Enable the services Provide the Description and Subject on the prefix on the mail Spam score refers the score given to an email by applying a set of rules. The higher the score, the higher is the likelihood for […]
How to allow Anydesk under K7 Security UTM
Steps to add new rule: 1. Login to K7 Security UTM 2. Click the Configuration and navigate to Firewall/NAT tab 3. Choose the Filter Rules and select Add 4. Provide Rule Name to identify the rules easily 5. In Protocol Action select Accept 6. In Protocol configure TCP & UDP 7. Choose Source Zone as LAN […]
Installation window disappears during installation (K7 computing)
1. Run the K7ESRT removal tool and then try installing the product. 2. If the issue persist Click on Run->Type regedit and enter 3. Go to the Location HKEY_LOCAL_MACHINESoftwareK7 Computing and Delete the key K7tssetup only. 4. If the OS is 64 bit delete the K7tssetup key under HKEY_LOCAL_MACHINESoftwareWow64NodeK7 Computing and then try installing the K7 Console. Note: In case of […]
Unable to login to K7 Console and nothing happens when clicking on Login button
1. Kindly check whether any desk has been installed in the console system, if yes please uninstall it. 2. Open Run->services.msc-> restart the K7 Web Server (Z3) service and SQL K7BIZSQL Service and check for the login. 3. If still, the issue persists please run the below URL in console machine via browser and check […]