Connect. Communicate. Collaborate. Securely.

Home » Kerio User Forums » Kerio Control » KWF 6.x Feature Request
  •  
Droopy

Messages: 18
Karma: 0
Send a private message to this user
1. per user bandwidth control (aka bandwidthcontroller.com)
  •  
Droopy

Messages: 18
Karma: 0
Send a private message to this user
2. Import-export for forbidden words, url groups, url rules, traffic policy
  •  
Tahattmeruh

Messages: 10
Karma: 0
Send a private message to this user
3. copy of rules
4. loadbalancing between 2 internet connections.
  •  
cheming1

Messages: 30
Karma: 0
Send a private message to this user
5. Do the Garbage collecting work in the night automatically.
6. Add filters to let me choose the file size that can be scanned by AV engine.

[Updated on: Sun, 13 June 2004 10:27]

  •  
RHarmsen.nl

Messages: 186

Karma: 0
Send a private message to this user
7. Alternative mapping (if original host is down where a port is mapped to, use a second host)
  •  
digiclone

Messages: 82
Karma: 0
Send a private message to this user
I like these features also, especially:

Load Balancing between 2 network connections!
and
Bandwidth Control!



  •  
Veydajar

Messages: 1
Karma: 0
Send a private message to this user
8. All the traffic statistics, quotas and other traffic management tools FOR VPN CLIENTS (based on decrypted, "clean" traffic).
  •  
cmfSQL

Messages: 3
Karma: 0
Send a private message to this user
Good,

i agree with this feature to be added to new releases, and as soon as posible.

cmf.


Shocked
  •  
Tol_

Messages: 9
Karma: 0
Send a private message to this user
9. Internet access for VPN clients through the KWF with NAT. (See post topic NAT for VPN clients not working)
  •  
Tol_

Messages: 9
Karma: 0
Send a private message to this user
10. Intrusion Detection System (IDS), I would like to have more information on what is going through my network, similar to Snort
  •  
digiclone

Messages: 82
Karma: 0
Send a private message to this user
Yes, #10 is also much needed. We have a cheap little netgear firewall that accurately detects and notifies us of many different specific types of attacks, what ip the attack is coming from, etc. When we replace the Netgear with KWF, Kerio only seems to notify of port scans and not much else. The Netgear was able to inform us of a syn flood attack, and we were able to tell from the log files the outside ip and the inside ip. We then examined the internal pc and found a trojan program running on it and were able to eliminate the problem. Unfortunately, Kerio does not do this for us, but hopefully Kerio will add this functionality! Smile
  •  
feite

Messages: 523
Karma: 0
Send a private message to this user
11. Seperation between users and source/destination. Users should be an extra colomn. Now its not possible to allow a specific user/usergroup access from only a specific ip-range.

consider the following rule:
source: user x, ip-range y
destination: any
service: any

If one of the items selected by 'source' is valid the rule is valid and traffice is allowed. So if a user is selected and a ip-range is selected all traffic from that user is allowed and it does not matter from where the traffic is comming. Also any user generation traffic from ip-range y is allowed.

I would like to create the following rule:
source: ip-range y
destination: any
service: any
user: user x

Now user x is allowed only if he/she is using a computer in the ip-range y.

Feite
  •  
Tuneld

Messages: 7

Karma: 0
Send a private message to this user

ICQ filetransfer problems?.. Then checkout my site! www.Tuneld.com
  •  
senis_kenis

Messages: 5
Karma: 0
Send a private message to this user
1. Automotic login by MAC address not only by IP
2. Bandwidth control
2.1 User bandwidth limit
2.2 Service bandwidth limit
2.3 IP or MAC Address bandwidth limit
2.4 Bandwidth limit in HTTP rules (for internal HTTP servers and external WEB sites).
Ex.: 1. www.internal_web_site1.com - 256 kbps
2. www.internal_web_site2.com - 128 kbps
3. www.external_webs_ite1.com - 64 kbps
2.5 Guarantied bandwidth (for servers, services).
Nutty

Messages: 14

Karma: 0
Send a private message to this user
senis_kenis wrote on Tue, 06 July 2004 20:11

1. Automotic login by MAC address not only by IP
2. Bandwidth control
2.1 User bandwidth limit
2.2 Service bandwidth limit
2.3 IP or MAC Address bandwidth limit
2.4 Bandwidth limit in HTTP rules (for internal HTTP servers and external WEB sites).
Ex.: 1. www.internal_web_site1.com - 256 kbps
2. www.internal_web_site2.com - 128 kbps
3. www.external_webs_ite1.com - 64 kbps
2.5 Guarantied bandwidth (for servers, services).


I dont know that we want that kinda function in the firewall software. The less we make it do the more stable it will be. Yeah it would be nice but I dunno how much I would want to give up stability for that. I know what you are trying to do but alot of times the web server software can manage that aspect. There are also alot of 3rd party products that do it also and they can run from radius servers and other database systems.

[Updated on: Wed, 07 July 2004 01:15]

Previous Topic: VPN Encription
Next Topic: eassist.exe - Unable To Locate DLL : The dynamic link library dbgeng.dll
Goto Forum:
  


Disclaimer:
Kerio discussion forums are intended for open communication between forum members and may contain information and material posted by members which may be useful in learning about Kerio products. The discussion forums are not intended to provide technical support for any specific product. Any information implied or expressed in the discussion forums is that of the posting member. Kerio is in no way responsible for the information posted in the forums, or its accuracy. Kerio employees may participate in the discussions, but their postings do not represent an offical position of the company on any issues raised or discussed. Kerio reserves the right to monitor and maintain the forums to promote free and accurate exchange of information.

Current Time: Thu Nov 23 06:40:45 CET 2017

Total time taken to generate the page: 0.00504 seconds
.:: Contact :: Home ::.
Powered by: FUDforum 3.0.4.