<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.edge.arista.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cknickerbocker</id>
	<title>Edge Threat Management Wiki - Arista - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.edge.arista.com/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cknickerbocker"/>
	<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Special:Contributions/Cknickerbocker"/>
	<updated>2026-04-04T04:31:43Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.3</generator>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Live_Support&amp;diff=24557</id>
		<title>Live Support</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Live_Support&amp;diff=24557"/>
		<updated>2018-06-22T19:31:37Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Support */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource live_support&amp;quot;&amp;gt;Live_Support&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource live_support_support&amp;quot;&amp;gt;Live_Support#Support&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:LiveSupport.png|128px]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Untangle Support&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/live-support-conf.html Live Support Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/ Untangle Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Live Support FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Live Support ==&lt;br /&gt;
&lt;br /&gt;
Live Support entitles users with access to Untangle&#039;s support team via phone and email.&lt;br /&gt;
&lt;br /&gt;
To learn more about this service, visit the [http://www.untangle.com/store/live-support-conf.html Support] page. Live Support includes [[Configuration Backup]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Support ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Get Support&#039;&#039;&#039; button opens our ticketing system, which is also reachable at [https://support.untangle.com support.untangle.com]. You can also email us directly at &amp;lt;tt&amp;gt;support at untangle dot com&amp;lt;/tt&amp;gt; which will automatically create a support ticket.&lt;br /&gt;
&lt;br /&gt;
Please include as much information as possible when filing a ticket, and please remember that a Live Support subscription is required to work directly with the support team. We will be unable to escalate free customer issues to the engineering team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Support Information&#039;&#039;&#039; lists information will help Untangle Support verify your license and identify your box:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;UID&#039;&#039;&#039;: The &#039;&#039;unique identifier number&#039;&#039; for your Untangle.  This number is generated during the install process.&lt;br /&gt;
* &#039;&#039;&#039;Build&#039;&#039;&#039;: The exact build version your Untangle is running.&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[Configuration Backup]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Live Support FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Live Support FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Network_Configuration&amp;diff=22248</id>
		<title>Network Configuration</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Network_Configuration&amp;diff=22248"/>
		<updated>2018-06-01T20:31:44Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* VRRP */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Network Configuration =&lt;br /&gt;
&lt;br /&gt;
The most critical configuration in Untangle is the proper configuration of your network settings in [[Config]] &amp;gt; [[Network]]. For simple, networks the configuration completed during the [[Setup Wizard]] is probably sufficient. However, some networks have multiple WANs, multiple LANs, various subnets, VLANs, VRRP, etc. This describes how networking operates and is configured in Untangle.&lt;br /&gt;
&lt;br /&gt;
== Cardinal Rules ==&lt;br /&gt;
&lt;br /&gt;
There are several key rules to how Untangle operates that should be understood before deploying Untangle in an advanced/complex network.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|&lt;br /&gt;
[[File:alert.jpg|right|100px|caption]]&lt;br /&gt;
|&lt;br /&gt;
# &#039;&#039;&#039;Untangle MUST be installed in-line.&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Untangle MUST have a working internet connection.&#039;&#039;&#039;&lt;br /&gt;
# &#039;&#039;&#039;Untangle routes ALL traffic according to its routing table.&#039;&#039;&#039;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Untangle MUST be installed in-line.&#039;&#039;&#039; Untangle is a gateway product, and it is designed to be in-line with network traffic. Some network administrators want to deploy some of the functionality of Untangle without installing Untangle in-line. This isn&#039;t how Untangle is designed and it will likely not work. &lt;br /&gt;
&lt;br /&gt;
For example, [[Spam Blocker]] will filter SMTP as it passes through Untangle. It will not store-and-forward to your email server like some products. [[Web Filter]] will filter web traffic as it passes through Untangle. It is does not operate as a explicit proxy that you &amp;quot;point&amp;quot; clients&#039; browsers to send web traffic. All applications and functionality are designed to operate in a context where Untangle is installed in-line with the network flow of traffic.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Untangle MUST have a working internet connection.&#039;&#039;&#039; Untangle and many Untangle apps rely on cloud services. Untangle must have a working and consistent connection with the internet. This includes unfiltered HTTPS, HTTP, and DNS access to various cloud services. Without a valid internet connection and configuration many functions of Untangle will not work properly.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Untangle routes ALL traffic according to its routing table.&#039;&#039;&#039; Obviously, this is how all routers operate. They receive packets on an interface and then lookup in the routing table/rules where to send it. Where Untangle differs is that Untangle is often installed as a bridge or with some interfaces bridged together. In the Untangle context, two bridged interfaces share a configuration (some products call them &amp;quot;zones&amp;quot;). Traffic passing between bridged interfaces are still subject to this cardinal rule.&lt;br /&gt;
&lt;br /&gt;
This is often a surprise to people on complex networks as effectively you will need to tell Untangle where to send all the traffic on your network if you want it to go to the correct place. If you have a subnet that Untangle doesn&#039;t have a route for, then it will be sent to the default gateway even if that subnet is internal. For Untangle to operate correctly, you must configure Untangle with a complete routing table so it knows how to reach all hosts on your network.&lt;br /&gt;
&lt;br /&gt;
== Placing Untangle on the Network ==&lt;br /&gt;
&lt;br /&gt;
The first step, after understanding the above cardinal rules, is to decide where to place Untangle on the network. Obviously, Untangle must be installed in-line with all network traffic so this provides a two options:&lt;br /&gt;
&lt;br /&gt;
# Install Untangle as the gateway/firewall for the network.&lt;br /&gt;
# Install Untangle &#039;&#039;behind&#039;&#039; an existing gateway/firewall in flow with traffic.&lt;br /&gt;
&lt;br /&gt;
Installing Untangle as the gateway/firewall is recommended. It is usually the simplest approach and it allows Untangle to leverage its full feature set including [[WAN Failover]] and [[WAN Balancer]]. This also places it in a convenient place to handle other seperate internal networks (like wireless segments) that may only connected at the gateway. Also, If you have tagged VLANs it is much simpler to run Untangle as a endpoint of those VLANs. This is commonly referred to as &#039;&#039;router mode.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
However, often organizations don&#039;t want to replace the existing gateway/firewall or can&#039;t because it is controlled by a different organization. In these cases, installing Untangle as a &amp;quot;bridge&amp;quot; behind the gateway allows Untangle and the apps to scan and process network traffic without providing the routing functions of your firewall. This is commonly referred to as &#039;&#039;bridge mode.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Also, technically you can stick Untangle &#039;&#039;in front of&#039;&#039; an existing firewall. Typically firewall/gateways use NAT so all internal hosts share external IPs. This means by the time the traffic reaches the Untangle outside the firewall the source address of all internal communication will have the public address of the firewall. As such, Untangle can not differentiate between internal hosts so much of the functionality of Untangle (web filter, reports, shield, etc) is severely compromised. Installing Untangle outside a NAT device is never recommended.&lt;br /&gt;
&lt;br /&gt;
== Configuring the Interfaces ==&lt;br /&gt;
&lt;br /&gt;
The second major step, after choosing a place to deploy Untangle, is configuring the interfaces. All the configuration options of interfaces are documented in [[Interfaces|the Interfaces documentation]]. &lt;br /&gt;
Likely, External and Internal and are already configured from the [[Setup Wizard]].&lt;br /&gt;
&lt;br /&gt;
After the setup wizard you might still need to do some of the following configuration&lt;br /&gt;
&lt;br /&gt;
* Configure additional subnets on the External/Internal. &lt;br /&gt;
&lt;br /&gt;
Because Untangle routes all traffic according to its routing table. Additional routes/aliases may be required for any additional subnets on your network.&lt;br /&gt;
More information on that in [[Installation#Configure Other Subnets]]&lt;br /&gt;
&lt;br /&gt;
* Configure additional interfaces&lt;br /&gt;
 &lt;br /&gt;
After the setup wizard only External and Internal are configured. Additional interfaces are disabled and still require configuration.&lt;br /&gt;
More information on that in [[Installation#Configure Other Interfaces]]&lt;br /&gt;
&lt;br /&gt;
* Configure any tagged VLANs&lt;br /&gt;
&lt;br /&gt;
If you have tagged VLANs (802.1q) on your network. You will need to add [[Network Configuration#VLANs|VLAN Tagged Interfaces]].&lt;br /&gt;
&lt;br /&gt;
== Bridging ==&lt;br /&gt;
&lt;br /&gt;
When two interfaces are bridged in Untangle this means they are effectively sharing a configuration.&lt;br /&gt;
Some products use the concept of &amp;quot;zones.&amp;quot; In this terminology, bridging two interfaces puts those interfaces in the same &amp;quot;zone&amp;quot; or &amp;quot;network space.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=== Standard Bridge Mode ===&lt;br /&gt;
&lt;br /&gt;
The most common scenario this is used is in &#039;&#039;bridge mode&#039;&#039; where the External is bridged to the Internal.&lt;br /&gt;
This is extremely useful when there is a firewall upstream.&lt;br /&gt;
&lt;br /&gt;
For example, if the firewall is 192.168.1.1, then you can  configured External as 192.168.1.2/24 with 192.168.1.1 as the gateway.&lt;br /&gt;
The internal hosts all have 192.168.1.* addresses and can continue to use 192.168.1.1 as a gateway (192.168.1.2 will also work as a gateway).&lt;br /&gt;
&lt;br /&gt;
[[Image:bridge_scenario_standard.png|center|Standard Bridge Mode]]&lt;br /&gt;
&lt;br /&gt;
It is important to remember that even when bridging &#039;&#039;Untangle routes ALL traffic according to its routing table.&#039;&#039;&lt;br /&gt;
This means if you have other subnets besides 192.168.1.* like 192.168.2.*, then you will need to add aliases or routes for them otherwise that traffic will go to the  default gateway.&lt;br /&gt;
&lt;br /&gt;
=== DMZ Bridge ===&lt;br /&gt;
&lt;br /&gt;
Another common scenario to use bridging is when Untangle has a public IP (1.2.3.2 in this example), but you have other public servers with public IPs (1.2.3.*).&lt;br /&gt;
You could put those servers on the private network and use [[Port Forward Rules]]. But lets assume you wanted to keep them configured with public IPs to keep them separate from the internal and avoid any NAT/port forwarding issues.&lt;br /&gt;
&lt;br /&gt;
In this case, you can bridge a &amp;quot;DMZ&amp;quot; interface to your external and it essentially shares the configuration and &amp;quot;zone&amp;quot; with external.&lt;br /&gt;
This means you can place servers with public IPs on that segment and they can continue to use 1.2.3.1 as a gateway.&lt;br /&gt;
&lt;br /&gt;
[[Image:bridge_scenario_dmz.png|center|DMZ Bridge]]&lt;br /&gt;
&lt;br /&gt;
=== Additional Port ===&lt;br /&gt;
&lt;br /&gt;
You can also just use bridge mode to provide alternate ports to existing interfaces/zones.&lt;br /&gt;
Be careful, as traffic between the two goes through Untangle!&lt;br /&gt;
&lt;br /&gt;
For example, if &#039;&#039;Interface 2&#039;&#039; is configured as 192.168.1.1/24 and &#039;&#039;Interface 3&#039;&#039; is bridged to &#039;&#039;Interface 2&#039;&#039;, then they are both effectively 192.168.1.1.&lt;br /&gt;
Basically &#039;&#039;Interface 3&#039;&#039; becomes an additional port for the &#039;&#039;Interface 2&#039;&#039; network.&lt;br /&gt;
&lt;br /&gt;
[[Image:bridge_scenario1_internal.png|center|Scenario 1: Additional Port]]&lt;br /&gt;
&lt;br /&gt;
This is almost identical to a configuration without &#039;&#039;Interface 3&#039;&#039; where &#039;&#039;Interface 2&#039;&#039; is plugged into a switch with two free ports.&lt;br /&gt;
&lt;br /&gt;
[[Image:bridge_scenario2_internal.png|center|Scenario 2: Use a switch]]&lt;br /&gt;
&lt;br /&gt;
There are some important differences: &lt;br /&gt;
* In scenario 1, traffic between &#039;&#039;Interface 2&#039;&#039; and &#039;&#039;Interface 3&#039;&#039; goes through Untangle and is routed via Untangle&#039;s routing table&lt;br /&gt;
* In scenario 1, traffic between &#039;&#039;Interface 2&#039;&#039; and &#039;&#039;Interface 3&#039;&#039; goes through Untangle and is scanned by the apps (if not bypassed via [[Bypass Rules]])&lt;br /&gt;
&lt;br /&gt;
=== What &amp;quot;bridged&amp;quot; really means. ===&lt;br /&gt;
&lt;br /&gt;
In untangle when two interfaces are bridged it means that they are in the same zone or that they both connect to the same network space. As the [[Network_Configuration#Cardinal_Rules|cardinal]] rules explain, &#039;&#039;&#039;Untangle routes all traffic according to its routing table&#039;&#039;&#039; - even those crossing between two bridged interfaces. This is sometimes called &#039;&#039;brouting&#039;&#039; or a &#039;&#039;brouter&#039;&#039; - unlike how a traditional layer-2 bridge/switch behaves.&lt;br /&gt;
&lt;br /&gt;
It means that packets coming inside one side of a bridge will NOT necessarily exit the other side of the bridge. It also means that packets destined with a specific route will be routed according to Untangle&#039;s routing table. &#039;&#039;&#039;All traffic is routed according to Untangle&#039;s routing table.&#039;&#039;&#039; It also means MAC addresses are not maintained across segments, even if they are bridged together as packets are brouted.&lt;br /&gt;
&lt;br /&gt;
This may cause you to wonder how Untangle works in the traditional &amp;quot;Bridge Mode.&amp;quot; The answer is simple, for outbound traffic to the internet untangle will route that to its default gateway which was probably where the traffic was headed anyway and definitely where it should go. For inbound traffic Untangle knows the where each local host on the bridged segment lives and it routes it directly. So inbound and outbound traffic both flow as expected.&lt;br /&gt;
&lt;br /&gt;
Where things get complicated is when networks have more complicated routes and do not configure Untangle with those routes. Assume Untangle is installed in traditional bridge mode on a 192.168.1.1/24 network. Lets assume the network also has another internal network of 192.168.2.1/24 behind an internal router 192.168.1.100. There is probably already a route on the existing firewall telling it that 192.168.2.* can be reached behind 192.168.1.100. If the user then inserts untangle in bridge mode and configures it as 192.168.1.2, the entire 192.168.1.* network will work but none of the traffic on 192.168.2.* will work. Why? Because Untangle routes *all* traffic according to its routing table. The firewall will route 192.168.2.* traffic to 192.168.1.100. When that traffic passes through Untangle it will not route it to 192.168.1.100 - it will route it according to its routing table. Since it knows nothing about 192.168.2.* and those addresses aren&#039;t local, it will be sent back out to the default gateway. As such the 192.168.2.* network will be completely offline as return traffic from the internet will not reach those hosts. Once a 192.168.2.0/24 route to 192.168.1.100 is added to Untangle traffic will flow as expected. The routing table on Untangle must reflect the layout of the network.&lt;br /&gt;
&lt;br /&gt;
Another common scenario is bridging two separate networks with one Untangle server. Lets look at an example with 4 interfaces: network1External, network1Internal, network2External, network2Internal. network1Internal is bridged to network1External. network2Internal is bridged to network2External. The problem with this scenario is that &#039;&#039;&#039;Untangle routes all traffic according to its routing table.&#039;&#039;&#039; If traffic comes in on network2Internal and is bound for the internet it will &#039;&#039;&#039;NOT&#039;&#039;&#039; be sent out network2External just because that&#039;s where it was originally headed. It will be routed according to Untangle&#039;s routing table, which is the default route of Untangle - probably network1External&#039;s gateway! To setup this scenario one must use WAN Balancer and routes to assure that traffic coming in network2Internal is routed via network2External. This is true whether or not the separate network or separate physical networks or separate VLAN networks.&lt;br /&gt;
&lt;br /&gt;
The key to using bridge mode effectively is understanding how Untangle routes traffic. While bridging can often be convenient it can also create headaches for complicated setups.&lt;br /&gt;
&lt;br /&gt;
== NAT ==&lt;br /&gt;
&lt;br /&gt;
NAT or Network Address Translation is the operation of rewriting the source address of packets. Typically this is used so many internal hosts with internal IPs (192.168.*.*, 10.*.*.*, etc) can share one or several public IPs.&lt;br /&gt;
&lt;br /&gt;
There are 3 ways that NAT is done is Untangle:&lt;br /&gt;
&lt;br /&gt;
# If you check &#039;&#039;NAT traffic exiting this interface (and bridged peers)&#039;&#039; on any WAN interface configuration.&lt;br /&gt;
# If you check &#039;&#039;NAT traffic coming from this interface (and bridged peers)&#039;&#039; on any non-WAN interface configuration.&lt;br /&gt;
# If you add a [[NAT Rules|NAT Rule]]&lt;br /&gt;
&lt;br /&gt;
=== NAT traffic exiting this interface (and bridged peers) ===&lt;br /&gt;
&lt;br /&gt;
The first option is &#039;&#039;NAT traffic exiting this interface (and bridged peers)&#039;&#039;, as described in the [[Interfaces]] documentation, will NAT any traffic exiting this interface and any of its bridged peers. This is the enabled by default on all WANs, and is enabled if Untangle is installed as a router via the [[Setup Wizard]].&lt;br /&gt;
&lt;br /&gt;
What this means is that any and all traffic exiting that WAN interface or bridged peers will be NATd to &#039;&#039;auto&#039;&#039; which is the current primary address of that WAN interface. Traffic between this interface and any bridged peers will not be NATd. Checking this option also blocks all traffic coming to this WAN that is not to a local process or explicitly forwarded with a [[Port Forward Rules|Port Forward Rule]].&lt;br /&gt;
&lt;br /&gt;
=== NAT traffic coming from this interface (and bridged peers) ===&lt;br /&gt;
&lt;br /&gt;
The second option is &#039;&#039;NAT traffic coming from this interface (and bridged peers)&#039;&#039;, as described in the [[Interfaces]] documentation, will NAT any traffic coming from this interface and any of its bridged peers. This is not enabled by default.&lt;br /&gt;
&lt;br /&gt;
What this means is that all traffic from this interfaces will get NATd to &#039;&#039;auto&#039;&#039; which is the primary address of which ever interface the traffic it exits. Traffic between this interface and any bridged peers will not be NATd. Checking this option also blocks all traffic to this non-WAN except traffic forwarded with a [[Port Forward Rules|Port Forward Rule]].&lt;br /&gt;
&lt;br /&gt;
=== When and Where to perform NAT ===&lt;br /&gt;
&lt;br /&gt;
If there are only two interfaces in Untangle the first and second options are identical. When there are multiple internal subnets you will need to configure where you wish to NAT so that you have the desired behavior.&lt;br /&gt;
&lt;br /&gt;
If you wish internal networks to be able to speak with each other (ie 192.168.1.100 should be able to reach 192.168.2.100 on a different interface) then you do not want to NAT between those networks.&lt;br /&gt;
&lt;br /&gt;
[[Image:nat_scenario_wan.png|center|Scenario 1:NAT at WAN]]&lt;br /&gt;
&lt;br /&gt;
As such, you should uncheck &#039;&#039;NAT traffic coming from this interface (and bridged peers)&#039;&#039; on both LAN interfaces, and check &#039;&#039;NAT traffic exiting this interface (and bridged peers)&#039;&#039; on the WAN(s).&lt;br /&gt;
&lt;br /&gt;
If you wish for internal networks to be completely separate such that they can not speak to each other then you want to check &#039;&#039;NAT traffic coming from this interface (and bridged peers)&#039;&#039; on the non-WAN interfaces. This means NAT will be performed on all traffic from these LANs and inbound sessions will be blocked unless explicitly forwarded with [[Port Forward Rules]].&lt;br /&gt;
&lt;br /&gt;
[[Image:nat_scenario_lans.png|center|Scenario 1:NAT at LAN]]&lt;br /&gt;
&lt;br /&gt;
=== NAT Rules ===&lt;br /&gt;
&lt;br /&gt;
The third option is explicitly configuring exactly what should be NATd to what address with [[NAT Rules]]. Be aware, these rules do not also explicitly block any inbound traffic like the two NAT options.&lt;br /&gt;
NAT rules can be used in conjunction with the two NAT checkboxes and any matched NAT rule will take precedence. Most networks need only one the first two options, but sometimes there are scenarios where a NAT rule is wanted desired such as [[1:1 NAT]] or when you want to guarantee that certain traffic (like SMTP exiting an email server) uses another address other than the primary WAN address.&lt;br /&gt;
&lt;br /&gt;
If no NAT option is enabled (all unchecked and no NAT rules) then Untangle will route like a typical router without performing any NAT operation.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note:&#039;&#039; The &#039;&#039;NAT traffic exiting this interface (and bridged peers)&#039;&#039; option in WAN is equivalent to appending an &#039;&#039;Auto&#039;&#039; NAT rule to the end of the [[NAT Rules]] matching all traffic with &#039;&#039;Destination Interface&#039;&#039; equal to that WAN or any bridged peer but excluding traffic between any bridged peers in that zone. It also includes a [[Filter Rules|forward filter rule]] to block inbound sessions from this WAN or bridged peers not explicitly port forwarded excluding sessions between any bridged peers in that zone.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note:&#039;&#039; The &#039;&#039;NAT traffic coming from this interface (and bridged peers)&#039;&#039; option in WAN is equivalent to appending an &#039;&#039;Auto&#039;&#039; NAT rule to the end of the [[NAT Rules]] matching all traffic with &#039;&#039;Source Interface&#039;&#039; equal to that non-WAN or any bridged peer but excluding traffic between any bridged peers in that zone. It also includes a [[Filter Rules|forward filter rule]] to block inbound sessions to this non-WAN or bridged peers not explicitly port forwarded, excluding sessions between any bridged peers in that zone.&lt;br /&gt;
&lt;br /&gt;
== VLANs ==&lt;br /&gt;
&lt;br /&gt;
VLANs or [http://http://en.wikipedia.org/wiki/Virtual_LAN Virtual LANs] are commonly used so that multiple subnets can share the same wire while maintaining complete separation including separate broadcast domains. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&#039;&#039;&#039;IMPORTANT:&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
The term VLAN is sometimes also used to describe putting multiple untagged (no 802.1q tag) subnets on the same wire. For example, Untangle is in bridge mode as 192.168.1.2/24 but there is also a 192.168.2.* on the same wire.&lt;br /&gt;
If there are no 802.1q tags on the 192.168.2.* traffic - it is &#039;&#039;&#039;NOT&#039;&#039;&#039; a VLAN and new VLAN interfaces should &#039;&#039;&#039;NOT&#039;&#039;&#039; be created on Untangle. In this scenario you should use guidance in [[Installation#Configure Other Subnets]] to properly configure Untangle to handle these subnets. VLAN interfaces will &#039;&#039;&#039;ONLY&#039;&#039;&#039; handle tagged 802.1q packets and all packets sent to a VLAN interface will be tagged with 802.1q tags.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
VLANs have several uses. Often you want multiple completely separate internal subnets on a network, but you do not want to run multiple physical ethernet networks through a building. VLANs allow you to run multiple networks on the same physical wire while still guaranteeing they are completely separate and secure. To do this you must have VLAN enabled switches and products through-out the network. VLANs can also be useful if you have limited ethernet ports on Untangle and wish to overload a single NIC with two separate purposes. This requires that NIC to be connected to a VLAN enabled switch.&lt;br /&gt;
&lt;br /&gt;
To create a VLAN interface click on the &#039;&#039;Add Tagged VLAN Interface&#039;&#039; button at the bottom of the interfaces grid on the [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]]. This will create a new &#039;&#039;virtual interface.&#039;&#039; First, you will need to give this interface a new name, and also select the &#039;&#039;Parent Interface.&#039;&#039; The &#039;&#039;Parent Interface&#039;&#039; is the physical interface that this VLAN virtual interface exists on. Then you will need to configure an &#039;&#039;802.1q Tag&#039;&#039; which is an integer between 1 and 4094 inclusive. After this you will configure the interface just like any interface.&lt;br /&gt;
&lt;br /&gt;
This new &#039;&#039;VLAN interface&#039;&#039; is just like a physical interface in all ways. This means you can configured this VLAN interface exactly like any physical interface. It is completely separate from the physical parent interface. Any packet coming in on the physical parent interface with the 802.1q tag matching the configured value (1-4094) will be considered by Untangle to be coming in the VLAN interface. Any packet sent to the virtual VLAN interface will actually be sent on the physical parent interface with the configured 802.1q tag. All untagged packets on the physical parent interface will be processed like normal through the physical parent interface, only 802.1q tagged packets with the matching 802.1q tag will be processed by the VLAN interface.&lt;br /&gt;
&lt;br /&gt;
After configuring Untangle with the appropriate tagged VLAN interfaces, you will need to configured some VLAN-enabled managed switch to properly process the packets as desired. For example, [http://vinf.net/2011/01/27/how-to-configure-a-port-based-vlan-on-an-hp-procurve-1810g-switch/ here is a document] describing how to configure a HP procurve switch.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
&#039;&#039;Note:&#039;&#039; VLAN interfaces are completely separate from their physical parents, however they do share the same physical NIC and as such will be limited by the throughput of the physical NIC. For example, if you have two 100Mbit tagged VLAN WANs on the same physical 100Mbit NIC, then you will still be limited to 100Mbit total on both WANs at any given time.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Example:&#039;&#039; We want to have two completely separate LANs on our network but we only have one wire or one network card. As such we need a VLAN enabled switch. Configure the internal interface with the IP and configuration from LAN 1. Create a tagged VLAN interface with 802.1q tag &#039;&#039;3.&#039;&#039; Configured the new VLAN interface with the IP and configuration for LAN 2. Now configure your VLAN switch to send VLAN 3 packets to the appropriate ports with LAN 2 hosts. In this scenario we are using the same wire but have two separate LANs with separate broadcasts domains.&lt;br /&gt;
&lt;br /&gt;
[[Image:vlan_scenario_twolans.png|center|Two LANs with VLANs]]&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Note:&#039;&#039; If you want to use a single wire and/or network card but you don&#039;t care about keeping the two LANs seperate, you don&#039;t need VLANs and can just use aliases/routes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Configuring VLAN on Untangle in Bridge Mode===&lt;br /&gt;
&lt;br /&gt;
Some users want to configure untangle in bridge mode in the middle of a VLANed network. &lt;br /&gt;
This is possible, but &#039;&#039;&#039;NOT RECOMMENDED&#039;&#039;&#039;. It is suggested to install Untangle as the gateway and terminate VLANs on an addressed VLAN interface. However, if you wish to install Untangle as a bridge in the middle of several (V)LANs simultaneously, the following instructions will allow you to establish multiple bridges and then enter the routes to tell Untangle that if traffic enters on a specific interface it should exit the bridged peer.&lt;br /&gt;
&lt;br /&gt;
*You will need to create 2 virtual interfaces for each VLAN you want to set up.&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#One as a child to the external interface&lt;br /&gt;
#One as a child to the internal interface&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*To set up the external&#039;s VLAN interface&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#Click on Create a tagged VLAN interface&lt;br /&gt;
#Give the interface a name that&#039;s easily identifiable by you&lt;br /&gt;
#Set the Parent Interface to External&lt;br /&gt;
#Set the 802.1q tag&lt;br /&gt;
#Config type must be &amp;quot;Addressed&amp;quot;&lt;br /&gt;
#Under IPv4 configuration, assign a unique static IP to the interface.&lt;br /&gt;
#Enter the IP address for the VLAN gateway&lt;br /&gt;
#Enter DNS servers you would like to use&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
[[Image:external_vlan.png|400px|center|Scenario 1: Additional Port]]&lt;br /&gt;
&lt;br /&gt;
*To set up the internal&#039;s VLAN interface&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#Click on Create a tagged VLAN interface&lt;br /&gt;
#Give the interface a name that&#039;s easily identifiable by you&lt;br /&gt;
#Set the Parent Interface to Internal&lt;br /&gt;
#Set the same 802.1q tag that you configured on the external VLAN interface&lt;br /&gt;
#Config type must be &amp;quot;Bridged&amp;quot;&lt;br /&gt;
#Bridge this interface to the external VLAN interface&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
[[Image:internal_vlan.png|400px|center|Scenario 1: Additional Port]]&lt;br /&gt;
&lt;br /&gt;
*Go to WAN Balancer and set the weights to send 100% of network traffic out of your untagged external interface&lt;br /&gt;
&lt;br /&gt;
*Click over to the Route Rules tab and create a new rule&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
#Source Interface : [Internal VLAN interface]&lt;br /&gt;
#Destination WAN : [External VLAN interface]&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== VRRP ==&lt;br /&gt;
&lt;br /&gt;
VRRP provides network level redundancy.&lt;br /&gt;
&lt;br /&gt;
Multiple Untangles can be run in parallel in a high availability configuration.&lt;br /&gt;
In this configuration one Untangle will be the &amp;quot;master&amp;quot; and one or more Untangles will be the &amp;quot;slaves.&amp;quot;&lt;br /&gt;
In the event the master fails, one of the remaining slave Untangles will take over the master role such that network traffic continues to flow without interruption.&lt;br /&gt;
&lt;br /&gt;
Untangle uses VRRP or [http://en.wikipedia.org/wiki/Virtual_Router_Redundancy_Protocol Virtual Redundancy Router Protocol] to handle the switching between Untangle servers.&lt;br /&gt;
All Untangle servers must be on and all configured with a share VRRP Virtual Address. The master is the only Untangle to answer/handle traffic routed to the VRRP Virtual Address.&lt;br /&gt;
If the master fails an &amp;quot;election&amp;quot; is held over VRRP and the next highest priority slave will begin handling traffic to the VRRP Virtual Address.&lt;br /&gt;
&lt;br /&gt;
All Untangles interfaces must be configured statically, and there must be no bridged interfaces. Parallel Untangles configured as bridges will create a bridge loop!&lt;br /&gt;
&lt;br /&gt;
=== VRRP Basic Example  ===&lt;br /&gt;
&lt;br /&gt;
A common configuration is running two Untangles to act as the gateway for the internal network.&lt;br /&gt;
For example, lets assume Untangle 1, the master, has a public IP of 1.2.3.4 and an internal IP of 192.168.1.2.&lt;br /&gt;
Lets assume Untangle 2 has a public IP of 1.2.3.5 and an internal IP of 192.168.1.3. &lt;br /&gt;
Both are running in &amp;quot;router&amp;quot; mode and doing NAT and acting as a gateway. Note that all IPs must be unique! &lt;br /&gt;
This configuration requires each untangle to have its own external IP!&lt;br /&gt;
&lt;br /&gt;
Now we configure Untangle 1 to have a VRRP Virtual Address of 192.168.1.1 on the Internal interface, and also configure Untangle 2 to also have a VRRP Virtual Address of 192.168.1.1 its Internal interface&lt;br /&gt;
They both share the same VRRP Virtual Address. Each Untangle in the group must have the same VRRP ID. So lets give Untangle 1 a VRRP ID of 1 and also give Untangle 2 a VRRP ID of 1.&lt;br /&gt;
We want Untangle 1 to be the master when its on and working without issues so give it a higher priority of 100.&lt;br /&gt;
Untangle 2 is the slave so it should be given a lower priority so lets give it a lower priority of 50.&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpSingle.png|center|Simple VRRP Example]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle1Internal.png|center|VRRP Untangle 1 Config]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle2Internal.png|center|VRRP Untangle 2 Config]]&lt;br /&gt;
&lt;br /&gt;
Configure your internal hosts to use the VRRP Virtual Address (192.168.1.1) as the gateway. In this configuration the master will route all traffic to 192.168.1.1 just like a regular address.&lt;br /&gt;
Should the master fail within a few seconds the slave will become the new master and start routing traffic.&lt;br /&gt;
&lt;br /&gt;
Note: You should configure the DHCP server to hand out 192.168.1.1 as the default gateway. If untangle is providing DHCP. Configure Untangle 1 as the &amp;quot;authoritative&amp;quot; with 192.168.1.1 as the &amp;quot;Gateway Override.&amp;quot; Configure Untangle 2 the same but as non-authoritative. This way Untangle 1 will handle all DHCP unless it is down, in which case Untangle 2 will handle DHCP.&lt;br /&gt;
&lt;br /&gt;
=== VRRP External Example ===&lt;br /&gt;
&lt;br /&gt;
The above example work great for outbound traffic, but if you have inbound traffic being port forwarded that traffic might fail if the Untangle owning that address fails.&lt;br /&gt;
VRRP can also be used to provide redundancy for inbound traffic. For example, similar to above, lets assume you have Untangle 1 with 1.2.3.4 and Untangle 2 with 1.2.3.5.&lt;br /&gt;
&lt;br /&gt;
You can configure both with a shared VRRP Virtual Address of 1.2.3.3. Now configure port forwards on both Untangle for traffic destined to 1.2.3.3 to the appropriate internal host.&lt;br /&gt;
Only the master will handle traffic to 1.2.3.3. If the master fails the slave will take over traffic handling for 1.2.3.3 and port forwarding. External hosts will still be able to reach local services should the master fail.&lt;br /&gt;
&lt;br /&gt;
In this scenario [[NAT Rules]] can also be configured if outbound traffic should use the same address regardless of which server is handling the traffic.&lt;br /&gt;
&lt;br /&gt;
=== VRRP Combined Example ===&lt;br /&gt;
&lt;br /&gt;
It is also possible to combine VRRP on multiple interfaces. For example, combine the above two examples. VRRP &lt;br /&gt;
can be used to provide redundancy on both interfaces. VRRP IDs must be unique for each server. For example, the external on both should be VRRP ID 1 and the internal on both should be VRRP ID 2.&lt;br /&gt;
In this scenario VRRP is &amp;quot;grouped&amp;quot; such that if the server loses its &amp;quot;master&amp;quot; status on one interface it will also release its master status on other interfaces.&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpDouble.png|center|Simple Combined Example]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle1External.png|center|VRRP Untangle 1 Config]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle2External.png|center|VRRP Untangle 2 Config]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle1Internal.png|center|VRRP Untangle 1 Config]]&lt;br /&gt;
&lt;br /&gt;
[[Image:VrrpUntangle2Internal.png|center|VRRP Untangle 2 Config]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For example, in the picture above if the Internal interface on Untangle 1 is unplugged, then Untangle 2 will become the master and start responding to 192.168.1.1.&lt;br /&gt;
Untangle 1 will also release its master status on the external interface so that Untangle 2 will also handle 1.2.3.3. This is to avoid any scenarios where Untangle 1 is master the external address and Untangle 2 is master on the internal address.&lt;br /&gt;
&lt;br /&gt;
=== VRRP FAQs ===&lt;br /&gt;
&lt;br /&gt;
==== What kind of problems count as a failure for VRRP purposes? ====&lt;br /&gt;
&lt;br /&gt;
Most critical hardware issues such as power outages, crashes, or freezes will immediately cause the VRRP broadcast to stop and the slave will immediately take over. &lt;br /&gt;
Furthermore, if some common errors are detected in software such as the NIC being unplugged then the VRRP broadcast is stopped.&lt;br /&gt;
&lt;br /&gt;
==== How can I see which is the VRRP master? ====&lt;br /&gt;
&lt;br /&gt;
The VRRP status is available in the VRRP settings. The &#039;&#039;Is VRRP Master?&#039;&#039; indicator will be green if master.&lt;br /&gt;
&lt;br /&gt;
==== How can I test my VRRP configuration? ====&lt;br /&gt;
&lt;br /&gt;
Simply configure VRRP then unplug one of the VRRP Untangle interfaces. The slave should immediately take over and you should still be able to ping the VRRP Virtual Address.&lt;br /&gt;
&lt;br /&gt;
==== How quickly does traffic switch? ====&lt;br /&gt;
&lt;br /&gt;
VRRP acts very quickly in the case of a failure and usually switches in less than a few seconds. However, TCP sessions will be reset as state is lost.&lt;br /&gt;
&lt;br /&gt;
==== Is state shared between Untangles? ====&lt;br /&gt;
&lt;br /&gt;
No. There is zero state sharing between Untangle. The session tables are separate, so sessions will be reset if the slave takes over. Furthermore application data is not shared or synchronized between servers.&lt;br /&gt;
This includes things like host tables, captive portal logins, openvpn state, ipsec state, email quarantines, reports, quotas &amp;amp; penalty boxes, web filter bypass states, antispam learning, etc.&lt;br /&gt;
&lt;br /&gt;
==== Can I run VRRP in bridge mode? ====&lt;br /&gt;
&lt;br /&gt;
No. &amp;quot;Slave&amp;quot; untangles are still live, they just do not handle traffic to the VRRP Virtual Address. As such if any bridge loop is created with bridged interfaces between the master and slave the network will stop functioning.&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21117</id>
		<title>Administration Notifications</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21117"/>
		<updated>2018-04-27T14:32:32Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Notifications */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_alerts&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_notifications&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Overview = &lt;br /&gt;
&lt;br /&gt;
[[Image:Administrator_Alert.png|right]]&lt;br /&gt;
&lt;br /&gt;
Administration Notifications appear as an exclamation point icon at the top of the rack when logged into the Administration interface or in the &amp;quot;Notifications&amp;quot; widget on the dashboard. When logging in, the server will runs a series of tests which can take a few minutes and then it will display the administration alert icon if there are any alerts. Tests are only performed on login, to force a retest just refresh the browser or click refresh on the Notification widget on the dashboard.&lt;br /&gt;
&lt;br /&gt;
Notifications are  displayed to alert the administrator of common misconfigurations or issues.&lt;br /&gt;
&lt;br /&gt;
= Notifications =&lt;br /&gt;
&lt;br /&gt;
{| width=100% border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Text&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Description&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Upgrades are available and ready to be installed.&#039;&#039; &lt;br /&gt;
| The server detected software upgrades that have not been applied. Upgrades can be applied in [[Config]] &amp;gt; [[Upgrade]].&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| DNS connectivity failed: &#039;&#039;DNS Server IP&#039;&#039;&lt;br /&gt;
| The specified server&#039;s DNS settings is not providing DNS resolution. Check DNS settings of your WAN interfaces in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]]. It is recommended to use your ISP&#039;s DNS servers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Failed to connect to Untangle. &#039;&#039;[address:port]&#039;&#039;&lt;br /&gt;
| Untangle failed to successfully connect to the Untangle servers. Check your network setting to make sure they are valid and that Untangle is online. Also check there is no firewall between Untangle and the internet that could be blocking connectivity. Untangle requires an active connection to the internet for proper operation.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Free disk space is low. &#039;&#039;[ xx% free ]&#039;&#039;&lt;br /&gt;
| Free disk space is running low. Contact Untangle support for help determining what is using disk space and what to do about it.  Please note that our recommended minimum hard disk size is at least 80Gigs.  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Disk errors reported. &lt;br /&gt;
&#039;&#039;Error text&#039;&#039;&lt;br /&gt;
| The disk (hard drive) returned some errors for certain commands. This usually means the disk has bad sectors which are non-responsive. In this case the disk (hard drive) should be immediately replaced.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains two or more &#039;&#039;Application 1&#039;&#039;&lt;br /&gt;
| The given rack contains two or more instances of the same application. While possible this is never desired as it decreases performance and increases management complexity. Remove one of the duplicate applications.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains redundant apps: &#039;&#039;Application 1&#039;&#039; and &#039;&#039;Application 2&#039;&#039;&lt;br /&gt;
| Some applications in Untangle are redundant and should not both be installed in the same rack at the same time. For example, Spam Blocker is a super-set to Spam Blocker Lite. If both are run no additional spam will be blocked, but messages will be scanned twice incurring a performance hit. Remove the redundant application.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| Bridge (&#039;&#039;Interface 1&#039;&#039; &amp;lt;-&amp;gt; &#039;&#039;Interface 2&#039;&#039;) may be backwards. Gateway (&#039;&#039;Gateway IP&#039;&#039;) is on &#039;&#039;Interface 2&#039;&#039;.&lt;br /&gt;
| Often bridges can be plugged in with the WAN interfaces on the LAN and the LAN interface on the WAN. This works and passes traffic, however several applications do not behave as expected. If this is show it has detected that the gateway for the main bridge interface is not on the expected interface. It is recommended to go into [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]] and unplug each interface one at a time and verify and correct the mapping of interfaces by swapping cables around.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| &#039;&#039;Interface 1&#039;&#039; interface NIC has a high number of &#039;&#039;RX/TX&#039;&#039; errors.&lt;br /&gt;
| This indicates that &#039;&#039;ifconfig&#039;&#039; shows a high number of RX or TX errors on the given interface card. This is typically a network layer or NIC issue. If possible, try another NIC or different duplex setting in /admin/index.do#config/network/advanced/network_cards.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but an unsupported DNS server is used&lt;br /&gt;
| Spam Blocker and Spam Blocker Lite rely on DNSBL (DNS blacklists) to categorize spam. Several publicly available and often used DNS servers do not supply access to these services. For example, google(8.8.8.8, 8.8.4.4), opendns(208.67.222.222, 208.67.222.220), level3(4.2.2.1,4.2.2.2) do not provide resolution for DNSBL queries. It is recommended to configure Untangle to use your ISP&#039;s DNS servers for effective spam filtering. If spam filtering is not required simply uninstall the spam filtering application from the rack.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but a DNS server (X, Y) fails to resolve DNSBL queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve DNSBL queries. This will greatly degrade Spam Blocker and Spam Blocker Lite&#039;s ability to detect spam. Try configuring a different DNS server. To test this manually run &#039;&#039;host 2.0.0.127.zen.spamhaus.org your_DNS_server&#039;&#039; in the terminal where &amp;quot;your_DNS_server&amp;quot; is the IP of your DNS server. If it does not return results then DNSBL queries are not being properly resolved by that server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Web Filter is installed but a DNS server (X, Y) fails to resolve categorization queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve Web Filter category queries. Web Filter uses DNS to query for the categorization of unknown sites. If the configured DNS servers do not properly respond to categorization queries then Web Filter will not function correctly and may slow web traffic significantly. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A DNS server responds slowly. (X,Y,Z) This may negatively effect Web Filter performance.&lt;br /&gt;
| This means the specified DNS server (Y) on interface (X) responded slowly (in Z milliseconds) to a Web Filter categorization request. Web Filter will automatically request categorization of unknown and never before seen URLs. If DNS is performing poorly Web Filter categorization will also be slow and may negatively effect web traffic latency as Web Filter categorizes websites.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is slow (x ms).&lt;br /&gt;
| Event logging is slow. This is shown when event logging takes more than 15ms on average. This can be caused by a slow disk or an extremely busy server. If you see this message, you can try a couple things. 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is delayed (x minute delay).&lt;br /&gt;
| The event logging daemon that logs events to the database is behind. This happens when &amp;quot;events&amp;quot; are happening quicker than the events can be written to the database. This can be caused by a slow disk or a busy network. Events will be stored in queued in memory until they can be written to the disk. If the time it takes for an event to happen to be logged to the database reaches a time greater than 10 minutes this warning appears. This is not necessarily an issue, but the administrator should be aware when viewing reports and events that they will be delayed by x minutes. You can try a few things to resolve this alert: 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Packet processing recently overloaded&lt;br /&gt;
| This warning means that at &amp;quot;&#039;&#039;nf_queue: full at * entries, dropping packets(s)&#039;&#039;&amp;quot; was found in &amp;quot;&#039;&#039;/var/log/kern.log.&#039;&#039;&amp;quot; This means packets were incoming faster than the server was able to handle them. This usually indicates some misconfiguration or performance issue, or that some traffic needs to be [[Installation#Bypass_Rules|bypassed]]. This can also indicate that the server is undersized for the current task and is short on memory (swapping) or disk I/O throughput or processing power. For further help with this alert, contact Untangle support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| The shield is disabled. This can cause performance and stability problems.&lt;br /&gt;
| The shield is disabled in [[Config]] &amp;gt; [[System]] &amp;gt; [[Shield]]. While sometimes useful for testing, this configuration will cause performance and stability problems. To fix verify that &#039;&#039;Enable Shield&#039;&#039; is checked.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Route to unreachable address: 1.2.3.4&lt;br /&gt;
| A static route exists in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Routes]], but the next hop is unreachable. All traffic for this route will be dropped.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Currently the number of devices significantly exceeds the number of licensed devices. (x &amp;gt; y)&lt;br /&gt;
| The number of devices for which NGFW has recently processed traffic (x) is greater than the number of allowed devices (y) for the license existing on the NGFW server. In order to return to compliance it may be necessary to bypass devices or get a larger license. Please contact support@untangle.com for help.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| DNS and DHCP services are not functioning.&lt;br /&gt;
| This means that the DNS and DHCP service is not properly functioning. This is a serious issue that must be resolved in order for Untangle to function properly. The usual cause of this is invalid options or syntax in [[Config]] &amp;gt; [[Network]] &amp;gt; Advanced &amp;gt; [[DHCP &amp;amp; DNS]], or in the interface settings in [[Config]] &amp;gt; [[Interfaces]] &amp;gt; Edit &amp;gt; DHCP Configuration &amp;gt; DHCP Options. &lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Purchasing_%26_Subscription_FAQs&amp;diff=21038</id>
		<title>Purchasing &amp; Subscription FAQs</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Purchasing_%26_Subscription_FAQs&amp;diff=21038"/>
		<updated>2018-02-09T16:19:20Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* I just purchased a product, however it is still reporting as a trial version? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[FAQs|All Untangle FAQs]]&lt;br /&gt;
&lt;br /&gt;
== How does Untangle NG Firewall licensing work? ==&lt;br /&gt;
&lt;br /&gt;
Untangle NG Firewall licensing is done by each NG Firewall that you have deployed. You &#039;&#039;&#039;cannot&#039;&#039;&#039; buy one set of licensing and share it across multiple NG Firewall deployments.  You count the number of networked devices that are installed on the LAN side of your NG Firewall and that is the pricing band/bucket you need to purchase for in the Untangle licensing model. If you already have Untangle installed you can click on the &#039;&#039;&#039;Hosts&#039;&#039;&#039; count at the top of the rack to see the devices on your network. Our current pricing model allows you to purchase a monthly, 1-year, 3-year or 5-year subscription for any given NG Firewall deployment.  For licensing purposes, a user is defined as a device (pc, laptop, etc) on the network. If multiple people use the same pc, it still counts as one user. NG Firewall tracks the number of devices connecting through it, and user environments that exceed the license entitlement will be flagged for further review by Untangle.  At this time, we do not automatically disable the software when usage exceeds the license count, but can do so after review of the violation(s).&lt;br /&gt;
&lt;br /&gt;
== How do I transfer my paid license? ==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Video for this process is available [https://support.untangle.com/hc/en-us/articles/201661956 here].&#039;&#039;&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;IMPORTANT:&#039;&#039;&#039; Please be sure to download the config backups (if needed) prior to the transfer.  Once you transfer the license, the config backups will be unavailable.&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
Steps to transfer the license to the new server. &amp;lt;br /&amp;gt;&lt;br /&gt;
1.  Login to the store with the store account. &amp;lt;br /&amp;gt;&lt;br /&gt;
2.  On the top menu, click Subscriptions. &amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:subscriptions-uid.png|none|512px|Remove Subscriptions]]&lt;br /&gt;
3.  Click the &#039;&#039;&#039;Name/UID&#039;&#039;&#039; link for the subscription you want to transfer.&amp;lt;br /&amp;gt; &lt;br /&gt;
4.  This will remove the subscription from the appliance. Click &#039;&#039;&#039;Remove&#039;&#039;&#039; to confirm. Once removed, the subscription becomes a voucher available for use on another NG Firewall UID.&amp;lt;br /&amp;gt;&lt;br /&gt;
5.  To add the license to another NG Firewall UID, click the &#039;&#039;&#039;unassigned&#039;&#039;&#039; link on the Subscriptions tab.&amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:subscriptions-unassigned.png|none|512px|Click Unassigned]]&lt;br /&gt;
6.  Select a device from the list to transfer the subscriptions to and click &#039;&#039;&#039;Add&#039;&#039;&#039;. &amp;lt;br /&amp;gt;&lt;br /&gt;
[[Image:subscriptions-add.png|none|512px|Add Subscription]]&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==What&#039;s a voucher and voucher key?==&lt;br /&gt;
&lt;br /&gt;
A voucher is a &amp;quot;gift certificate&amp;quot; for a specific NG Firewall [https://www.untangle.com/software-packages package or individual application]. A voucher key is a unique alphanumeric code that enables you to redeem your voucher.&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Can a voucher expire?==&lt;br /&gt;
&lt;br /&gt;
Yes. When you purchase a voucher you can select a monthly or yearly subscription that automatically renews. The subscription period begins as of the time the voucher was purchased. So, it&#039;s important that you redeem that voucher as soon as possible to get the &amp;quot;biggest bang for your buck.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why would I want to purchase a voucher?==&lt;br /&gt;
&lt;br /&gt;
* If you are an end-user, but you aren&#039;t in front of the NG Firewall (you&#039;re at the airport), a voucher provides you a way to purchase now and install at your convenience.&lt;br /&gt;
&lt;br /&gt;
* If you are an Untangle Partner:&lt;br /&gt;
&lt;br /&gt;
:* It&#039;s very efficient to purchase a set of vouchers using one transaction, and redeem the vouchers as you install NG Firewalls.&lt;br /&gt;
&lt;br /&gt;
:* If you do not intend to install the NG Firewall yourself, you can simplify the installation process by sending the voucher to your customer.&lt;br /&gt;
&lt;br /&gt;
:* If you&#039;re looking to court a customer, a voucher is a wonderful gift, though not as tasty as chocolate and not nearly as expensive as a diamond.&lt;br /&gt;
&lt;br /&gt;
==How do I redeem a voucher?==&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Video for this process is available [https://support.untangle.com/hc/en-us/articles/201661966 here].&#039;&#039;&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
There are two ways to redeem a voucher.&lt;br /&gt;
&lt;br /&gt;
First: (Primarily used if you were the purchaser of the voucher or have store account access to the account where the voucher was purchased)&lt;br /&gt;
# Log-in to your Untangle Server.&lt;br /&gt;
# From the Navigation pane, click on the &#039;&#039;&#039;My Account&#039;&#039;&#039; button on the bottom left.&lt;br /&gt;
# Log into your Store Account you used to purchase your Voucher.&lt;br /&gt;
# Click on &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039;, then &#039;&#039;&#039;Manage Vouchers&#039;&#039;&#039;.&lt;br /&gt;
# Check the box next to the voucher(s) you&#039;d like to redeem.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Redeem&#039;&#039;&#039; button. The software should automatically install, refresh the web GUI to verify.&lt;br /&gt;
&lt;br /&gt;
Second: (Primarily used if you did not purchase the voucher through your store account)&lt;br /&gt;
# Follow steps 1-4 above.&lt;br /&gt;
# Click the link &#039;&#039;&#039;Enter and Redeem a New Voucher Key&#039;&#039;&#039;.&lt;br /&gt;
# Enter the voucher key(s) in the space(s) provided.&lt;br /&gt;
# Verify the UID, server description and the IP address of your server are correct.&lt;br /&gt;
# Click the &#039;&#039;&#039;Continue&#039;&#039;&#039; button. The software should automatically start install, refresh the web GUI to verify.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--==When would I want to add an additional address to my account?==--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Why do I get a monthly web confirmation from authorization.net?==&lt;br /&gt;
&lt;br /&gt;
Untangle uses authorization.net to process your monthly subscriptions. The first month you receive an email confirmation from Untangle; however, authorization.net sends you all subsequent email confirmations.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Why doesn&#039;t my authorization.net confirmation have a description?==&lt;br /&gt;
&lt;br /&gt;
We&#039;re sorry for this inconvenience. We will be making regular updates to our store, so stay tuned. In the meantime, you can compare the authorization.net confirmation against the invoices in My Invoices.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How do I purchase Untangle NG Firewall software?==&lt;br /&gt;
&lt;br /&gt;
Currently there are two ways to make a purchase of NG Firewall software.&lt;br /&gt;
&lt;br /&gt;
An &#039;&#039;&#039;off-GUI&#039;&#039;&#039; purchase is when you purchase a subscription directly from Untangle&#039;s store without being logged into a deployed NG Firewall. An &#039;off-GUI&#039; purchase results in a voucher you can redeem at any time, keeping in mind that until you redeem the voucher, you don&#039;t have full access to the capabilities of the subscription you&#039;ve purchased until you complete the redemption of the voucher.  Additionally, it&#039;s important to note that your subscription expiration count-down starts from the day you purchase your subscription not the date you redeem the voucher.  &lt;br /&gt;
&lt;br /&gt;
Log-in to your account if you already have one.  If you don’t have one, you should be able to create one.  Once you’ve created an account, you’ll need to click on the &#039;Store&#039; icon in the upper right-hand corner of the website.  You’ll then select the subscription(s) that you’d like to purchase and then select from the right hand side of the product webpage the correct number of pc’s for your pricing band and the correct term/period for the length of your subscription.  You then can click the &#039;Add to Cart&#039; button.  Once you’ve done that, you should be able to either add more items to your cart by clicking the &#039;Continue Shopping&#039; button or changing the quantity in the shopping cart itself.  You then click on the &#039;Proceed to Check-out&#039; button to finish your purchase.  You&#039;ll receive an order confirmation and your voucher key. (see How do I redeem a voucher? [[http://wiki.untangle.com/index.php/Purchasing_%26_Subscription_FAQs#How_do_I_redeem_a_voucher.3F]] section of the wiki)&lt;br /&gt;
&lt;br /&gt;
An &#039;&#039;&#039;on-GUI&#039;&#039;&#039; purchase is when you purchase from your NG Firewall directly.  If you purchase via the &#039;on-GUI&#039; method, the store and the server should talk to each other and the server will automatically download the software you&#039;ve purchased.  We do recommend that you use Firefox when doing this process because some browsers (i.e. Internet Explorer) don&#039;t translate the code properly and won&#039;t allow the store and the server to communicate, which causes the process to fail.&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;on-GUI&#039;&#039;&#039; process is the easiest way to purchase a NG Firewall subscription.  You start by logging into your NG Firewall and you click on the &#039;My Account&#039; button in your admin interface.  It should prompt you to log-in to your account if you already have one.  If you don’t have one, you should be able to create one.  Once you’ve created an account, you’ll need to click on the &#039;Store&#039; icon in the upper right-hand corner of the website.  You’ll then select the subscription(s) that you’d like to purchase and then select from the right hand side of the product webpage the correct number of pc’s for your pricing band and the correct term/period for the length of your subscription.  You then can click the &#039;Add to Cart&#039; button.  Once you’ve done that, you should be able to either add more items to your cart by clicking the &#039;Continue Shopping&#039; button or changing the quantity in the shopping cart itself, or you can click on the &#039;Proceed to Check-out&#039; button to finish your purchase.  By purchasing while logged into your Untangle server the software should automatically download when your purchase is completed.&lt;br /&gt;
&lt;br /&gt;
If you have any problems with either of these two ways to purchase, please contact support at 408-598-4299 option 2, or via e-mail at support@untangle.com .&lt;br /&gt;
&lt;br /&gt;
==How do I access the Store?==&lt;br /&gt;
&lt;br /&gt;
You can access the Untangle store by clicking on any product in your &#039;&#039;&#039;Apps&#039;&#039;&#039;, or directly from https://store.untangle.com.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Do I have a store account?==&lt;br /&gt;
&lt;br /&gt;
You do not have a store account by default. However, if you&#039;ve ever purchased a subscription or redeemed a subscription, you have a store account.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How do I decide which products I should purchase?==&lt;br /&gt;
&lt;br /&gt;
The products that you need depend on your network. Use the Application Wizard. Go to [[Apps#Choosing Which Software Products To Install|Choosing Which Software Products To Install]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==How do I subscribe to a Paid Software Product==&lt;br /&gt;
&lt;br /&gt;
You can download paid Software Products through your NG Firewall&#039;s &#039;&#039;&#039;Apps&#039;&#039;&#039;. This process takes only a few minutes. For instructions, go to [[Apps#Choosing Which Software Products To Install|Choosing Which Software Products To Install]].&lt;br /&gt;
&lt;br /&gt;
==I reinstalled my NG Firewall software. Why can&#039;t I reinstall my paid subscriptions?==&lt;br /&gt;
&lt;br /&gt;
If you&#039;ve reinstalled your NG Firewall, your paid Software Products no longer automatically appear in your rack and when you visit the Untangle Store, you&#039;re prompted to purchase (&#039;&#039;&#039;Buy Now&#039;&#039;&#039;) the subscriptions that you&#039;ve already purchased.&lt;br /&gt;
&lt;br /&gt;
Your Untangle purchases are associated with your [[#What&#039;s a UID?|UID]]. When you reinstalled your NG Firewall on the same appliance, computer or reinstalled on a different machine, you deleted this information. This is true even if you restore from a backup: The UID is not saved as part of a backup, only your configuration.&lt;br /&gt;
&lt;br /&gt;
You can confirm that this is the issue that you&#039;re having by simply comparing the UID that appears on your NG Firewall with the UID that appears in &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039;. The UIDs must match.&lt;br /&gt;
&lt;br /&gt;
[[Image:VerifyActivationKey.png|thumbnail|center]]&lt;br /&gt;
&lt;br /&gt;
If they don&#039;t match, the solution is to migrate your subscriptions to the new UID in the Untangle store. Currently, you must be on-GUI on the newer unit to compete this process. &lt;br /&gt;
For self help on transferring the subscription, please visit here[http://wiki.untangle.com/index.php/Purchasing_%26_Subscription_FAQs#After_a_reinstall.2C_how_do_I_transfer_an_old_subscription_to_a_new_Untangle_server.3F].&lt;br /&gt;
If you need further assistance, [http://www.untangle.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=83&amp;amp;Itemid=187 contact Technical Support] so that we can walk you through this process. The migration is quick, but requires that you provide information about your account.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== How do I unsubscribe from a Paid Software Product ==&lt;br /&gt;
&lt;br /&gt;
You must call Untangle Technical Support. For more information, go to [[Apps#Unsubscribing from Paid Software Products|Unsubscribing from Paid Software Products]].--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== What happens if I stop paying Untangle for my subscription(s)? ==&lt;br /&gt;
&lt;br /&gt;
When your NG Firewall communicates with the licensing server your license will be revoked.  You will no longer be able to use anything but the &#039;Free Package&#039; applications and modules.  You will see &#039;No License Found&#039; on the face-plate of the application module inside the NG Firewall Admin interface. It&#039;s very easy to get your account back working again by contacting Untangle sales (sales@untangle.com) to renew your subscription and all of your previous settings will return.&lt;br /&gt;
&lt;br /&gt;
== What&#039;s a UID? ==&lt;br /&gt;
&lt;br /&gt;
A UID (or Unique IDentifier) is a unique 16-digital alpha numeric code that identifies your Untangle Server. To determine your server&#039;s UID, from the Untangle Server, go to &#039;&#039;&#039;Config&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;System Info&#039;&#039;&#039; tab &amp;gt; &#039;&#039;&#039;Version&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
* If you &#039;&#039;&#039;reinstall&#039;&#039;&#039; your NG Firewall, you will get a new UID, and you may need to transfer any previous subscriptions to be authorized for the new UID.&lt;br /&gt;
* If you &#039;&#039;&#039;reset&#039;&#039;&#039; to factory defaults, your Untangle Server maintains its UID.&lt;br /&gt;
&lt;br /&gt;
The UID also helps Untangle Technical Support identify your server when you call for Technical Support.&lt;br /&gt;
&lt;br /&gt;
== What&#039;s a discount code? ==&lt;br /&gt;
&lt;br /&gt;
Sometimes Untangle discounts its Software Products, and such offers are only available for a short period of time. &lt;br /&gt;
&lt;br /&gt;
[[Image:Discount.png|thumbnail|center]]&lt;br /&gt;
&lt;br /&gt;
In order to have this discount applied to your subscription purchase, type in the advertised discount code.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--== What does &amp;lt;tt&amp;gt;Installed&amp;lt;/tt&amp;gt; mean? ==&lt;br /&gt;
&lt;br /&gt;
If the word &amp;lt;tt&amp;gt;Installed&amp;lt;/tt&amp;gt; appears next to a package in the online store, this means that you&#039;ve installed the product into &#039;&#039;&#039;Navigation Pane&#039;&#039;&#039; &amp;gt; &#039;&#039;&#039;Apps&#039;&#039;&#039;. The installation could have been in the form of a trial or a subscription. Whenever &amp;lt;tt&amp;gt;Installed&amp;lt;/tt&amp;gt; appears, you should have a corresponding package under Apps.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;StorePackagesINSTALLED&amp;quot;&amp;gt;[[Image:StorePackagesINSTALLED.png|thumbnail|center|Installed Products Message from Online Store]]&amp;lt;/span&amp;gt;&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How do I know if my subscription was canceled? ==&lt;br /&gt;
&lt;br /&gt;
If your subscription was canceled, either because you unsubscribed or for non-payment (i.e. your credit card expired), that subscription no longer appears under &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039;. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How do I know if my trial has expired? ==&lt;br /&gt;
&lt;br /&gt;
You can identify an expired trial by looking at the application&#039;s faceplate in the rack. If expired, the app&#039;s faceplate indicates &amp;lt;tt&amp;gt;Free Trial Expired&amp;lt;/tt&amp;gt;. If it hasn&#039;t expired, then the faceplate indicates how many days remain before the trial expires.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Can I make configuration changes to an expired trial? ==&lt;br /&gt;
&lt;br /&gt;
Yes. When a trial expires for a software product, you can still access the applications&#039;s configuration tabs and make changes to the product; however, the product is disabled.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== If a trial expires and then I purchase, What happens to my settings? ==&lt;br /&gt;
&lt;br /&gt;
A trial expiration doesn&#039;t delete your configuration settings for a product. When you purchase the product, NG Firewall simply replaces the expired product in your rack with the purchased product, preserving all configuration settings that you set during the trial period. However, as is the case with a purchased product, if you uninstall the product from the rack, you will lose all configuration data.&lt;br /&gt;
&lt;br /&gt;
== Does a reset to factory defaults reset trials? ==&lt;br /&gt;
&lt;br /&gt;
No. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How can I get my trials reset? ==&lt;br /&gt;
&lt;br /&gt;
We&#039;d be happy to reset your trials, however this will be at the discretion of your Account Manager (Support will &#039;&#039;&#039;not&#039;&#039;&#039; do this directly). You&#039;ll need to check the &#039;Allow Support Access...&#039; checkbox under Config &amp;gt; System and provide your Account Manager with the UID of the NG Firewall box in question for us to complete the reset, though a small percentage of installations (mostly those in bridge mode) may need to enable SSH as outlined [http://wiki.untangle.com/index.php/Enable_SSH here].&lt;br /&gt;
&lt;br /&gt;
== Do my other applications still work after my trials expire? ==&lt;br /&gt;
&lt;br /&gt;
Yes. The [http://www.untangle.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=86&amp;amp;Itemid=179 open-source (free) products] remain in your rack and never expire.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How do I turn-off auto-renewal, unsubscribe or cancel the subscription for one or more paid products? ==&lt;br /&gt;
&lt;br /&gt;
There are two ways to cancel your subscription.&lt;br /&gt;
&lt;br /&gt;
First, you can simply disable the auto-renewal feature inside your store account.  This is located on the &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039; page (&#039;&#039;&#039;Server view&#039;&#039;&#039; or &#039;&#039;&#039;Subscription view&#039;&#039;&#039;) of our online store.  You just need to click the drop-down by the subscription that you want to turn off the auto-renewal for.  By doing this the subscription stays valid until the expiration date of the subscription, thus giving you the full length of the subscription term you purchased previously.&lt;br /&gt;
&lt;br /&gt;
Second, if you want us to cancel your subscription immediately, you&#039;ll need to contact our accounting department at their e-mail address and make the request through to them. [mailto:accounting@untangle.com]&lt;br /&gt;
&lt;br /&gt;
== I just purchased a product, however it is still reporting as a trial version? ==&lt;br /&gt;
&lt;br /&gt;
First please make sure the subscription has been assigned to your UID.  [https://support.untangle.com/hc/en-us/articles/115012197907-How-to-assign-transfer-a-subscription Here is a link to our Knowledge Base] that describes the assignment process.&lt;br /&gt;
&lt;br /&gt;
If the Untangle still shows trials try the following:&lt;br /&gt;
From your NG Firewall, click &#039;&#039;&#039;Config&#039;&#039;&#039; then click &#039;&#039;&#039;About&#039;&#039;&#039;, then select the &#039;&#039;&#039;License&#039;&#039;&#039; tab and finally click &#039;&#039;&#039;Refresh&#039;&#039;&#039; in the lower left corner. This will force the Untangle to refresh license status from the license server.&lt;br /&gt;
&lt;br /&gt;
== How do I know if my subscription needs to be enabled for renewal? ==&lt;br /&gt;
&lt;br /&gt;
If your subscription is not set to auto-renew at the end of the current subscription period, you&#039;ll need to enable that renewal prior to the expiration date to ensure there is no interruption to the service on your NG Firewall  To determine if you need to enable renewal on your subscription(s), here are a few easy steps to follow:&lt;br /&gt;
&lt;br /&gt;
#  Login to your Untangle Store account [http://store.untangle.com]&lt;br /&gt;
#  Click on the &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039; link on the left side of the screen&lt;br /&gt;
#  You&#039;ll then need to click the &#039;&#039;&#039;Subscription View&#039;&#039;&#039; on the upper right-side of that screen&lt;br /&gt;
#  You will be able to see if something is &#039;&#039;&#039;Enabled&#039;&#039;&#039; or &#039;&#039;&#039;Disabled&#039;&#039;&#039; for the Auto-renewal&lt;br /&gt;
&lt;br /&gt;
== How do I renew my subscription(s)? ==&lt;br /&gt;
&lt;br /&gt;
If you need to enable your subscription(s) for renewal, here are the steps necessary:&lt;br /&gt;
&lt;br /&gt;
#  Login to your Untangle Store account [http://store.untangle.com]&lt;br /&gt;
#  Click on the &#039;&#039;&#039;My Subscriptions&#039;&#039;&#039; link on the left side of the screen&lt;br /&gt;
#  You&#039;ll then need to click the &#039;&#039;&#039;Subscription View&#039;&#039;&#039; on the upper right-side of that screen&lt;br /&gt;
#  You will be able to see if something is &#039;&#039;&#039;Enabled&#039;&#039;&#039; or &#039;&#039;&#039;Disabled&#039;&#039;&#039; for the Auto-renewal&lt;br /&gt;
#  You can change it from &#039;&#039;&#039;Disabled&#039;&#039;&#039; to &#039;&#039;&#039;Enabled&#039;&#039;&#039; by click the drop-down and selecting the appropriate option.&lt;br /&gt;
&lt;br /&gt;
== I&#039;ve renewed my subscription, but the renewal date remains unchanged.  Why? ==&lt;br /&gt;
&lt;br /&gt;
If your subscription is enabled for renewal, but the renewal date still shows the same date as before, don&#039;t worry.  Because we won&#039;t charge your account for the subscription renewal until the renewal date, the renewal date will not change until that charge takes place.  &lt;br /&gt;
&lt;br /&gt;
For example, let&#039;s say you enabled a subscription for renewal with a renewal date of November 11, 2010.  On November 11, 2010, we will charge your account for the cost of the renewal, and update your renewal date to November 11, 2011.  &lt;br /&gt;
&lt;br /&gt;
Remember, if your subscription does not appear when you click on the Renewals link in your Untangle Store Account, that means it is enabled for renewal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What is an &amp;quot;Upgrade Order&amp;quot;? ==&lt;br /&gt;
&lt;br /&gt;
First, you can upgrade from one product to another, i.e. from just Web Filter to Complete Package.  To accomplish this, you&#039;ll need to contact our sales team at [mailto:sales@untangle.com] and they will send you an e-mail template that you&#039;ll need to fill out in order to have accounting do the manual process and billing on the back-end.  You will then be notified when you can do a re-install of the upgraded subscription on to your existing NG Firewall deployment.  &lt;br /&gt;
&lt;br /&gt;
For changes to the duration of your subscription (i.e., one month to annual) or changes to the number of licensed devices (i.e. 1-10 to 11-50), go to your &amp;quot;My Account&amp;quot; page. You will find upgrade options under &amp;quot;Subscriptions&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
==  I placed an Upgrade Order, but my subscription&#039;s renewal date stayed the same.  Why? ==&lt;br /&gt;
&lt;br /&gt;
Because an upgrade order simply adds a new term to the end of the current term, the renewal date on your subscription will remain unchanged until the listed renewal date.&lt;br /&gt;
&lt;br /&gt;
For example, let&#039;s say you placed an Upgrade Order to convert a subscription from a Yearly to a 2-Yearly term on June 15, 2010, and the current renewal date is July 1, 2010.  On July 1, 2010, the renewal date on your subscription will be updated to July 1, 2012.&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=File:Administrator_Alert.png&amp;diff=21027</id>
		<title>File:Administrator Alert.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=File:Administrator_Alert.png&amp;diff=21027"/>
		<updated>2018-02-01T21:17:17Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21026</id>
		<title>Administration Notifications</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21026"/>
		<updated>2018-02-01T21:14:32Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_alerts&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_notifications&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Overview = &lt;br /&gt;
&lt;br /&gt;
[[Image:Administrator_Alert.png|right]]&lt;br /&gt;
&lt;br /&gt;
Administration Notifications appear as an exclamation point icon at the top of the rack when logged into the Administration interface. When logging in, the server will runs a series of tests which can take a few minutes and then it will display the administration alert icon if there are any alerts.&lt;br /&gt;
&lt;br /&gt;
Notifications are typically displayed to alert the administrator of common mis-configurations or issues.&lt;br /&gt;
&lt;br /&gt;
= Notifications =&lt;br /&gt;
&lt;br /&gt;
{| width=100% border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Text&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Description&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Upgrades are available and ready to be installed.&#039;&#039; &lt;br /&gt;
| The server detected software upgrades that have not been applied. Upgrades can be applied in [[Config]] &amp;gt; [[Upgrade]].&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| DNS connectivity failed: &#039;&#039;DNS Server IP&#039;&#039;&lt;br /&gt;
| The specified server&#039;s DNS settings is not providing DNS resolution. Check DNS settings of your WAN interfaces in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]]. It is recommended to use your ISP&#039;s DNS servers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Failed to connect to Untangle. &#039;&#039;[address:port]&#039;&#039;&lt;br /&gt;
| Untangle failed to successfully connect to the Untangle servers. Check your network setting to make sure they are valid and that Untangle is online. Also check there is no firewall between Untangle and the internet that could be blocking connectivity. Untangle requires an active connection to the internet for proper operation.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Free disk space is low. &#039;&#039;[ xx% free ]&#039;&#039;&lt;br /&gt;
| Free disk space is running low. Contact Untangle support for help determining what is using disk space and what to do about it.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Disk errors reported. &lt;br /&gt;
&#039;&#039;Error text&#039;&#039;&lt;br /&gt;
| The disk (hard drive) returned some errors for certain commands. This usually means the disk has bad sectors which are non-responsive. In this case the disk (hard drive) should be immediately replaced.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains two or more &#039;&#039;Application 1&#039;&#039;&lt;br /&gt;
| The given rack contains two or more instances of the same application. While possible this is never desired as it decreases performance and increases management complexity. Remove one of the duplicate applications.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains redundant apps: &#039;&#039;Application 1&#039;&#039; and &#039;&#039;Application 2&#039;&#039;&lt;br /&gt;
| Some applications in Untangle are redundant and should not both be installed in the same rack at the same time. For example, Spam Blocker is a super-set to Spam Blocker Lite. If both are run no additional spam will be blocked, but messages will be scanned twice incurring a performance hit. Remove the redundant application.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| Bridge (&#039;&#039;Interface 1&#039;&#039; &amp;lt;-&amp;gt; &#039;&#039;Interface 2&#039;&#039;) may be backwards. Gateway (&#039;&#039;Gateway IP&#039;&#039;) is on &#039;&#039;Interface 2&#039;&#039;.&lt;br /&gt;
| Often bridges can be plugged in with the WAN interfaces on the LAN and the LAN interface on the WAN. This works and passes traffic, however several applications do not behave as expected. If this is show it has detected that the gateway for the main bridge interface is not on the expected interface. It is recommended to go into [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]] and unplug each interface one at a time and verify and correct the mapping of interfaces by swapping cables around.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| &#039;&#039;Interface 1&#039;&#039; interface NIC has a high number of &#039;&#039;RX/TX&#039;&#039; errors.&lt;br /&gt;
| This indicates that &#039;&#039;ifconfig&#039;&#039; shows a high number of RX or TX errors on the given interface card. This is typically a network layer or NIC issue. If possible, try another NIC or different duplex setting in /admin/index.do#config/network/advanced/network_cards.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but an unsupported DNS server is used&lt;br /&gt;
| Spam Blocker and Spam Blocker Lite rely on DNSBL (DNS blacklists) to categorize spam. Several publicly available and often used DNS servers do not supply access to these services. For example, google(8.8.8.8, 8.8.4.4), opendns(208.67.222.222, 208.67.222.220), level3(4.2.2.1,4.2.2.2) do not provide resolution for DNSBL queries. It is recommended to configure Untangle to use your ISP&#039;s DNS servers for effective spam filtering. If spam filtering is not required simply uninstall the spam filtering application from the rack.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but a DNS server (X, Y) fails to resolve DNSBL queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve DNSBL queries. This will greatly degrade Spam Blocker and Spam Blocker Lite&#039;s ability to detect spam. Try configuring a different DNS server. To test this manually run &#039;&#039;host 2.0.0.127.zen.spamhaus.org your_DNS_server&#039;&#039; in the terminal where &amp;quot;your_DNS_server&amp;quot; is the IP of your DNS server. If it does not return results then DNSBL queries are not being properly resolved by that server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Web Filter is installed but a DNS server (X, Y) fails to resolve categorization queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve Web Filter category queries. Web Filter uses DNS to query for the categorization of unknown sites. If the configured DNS servers do not properly respond to categorization queries then Web Filter will not function correctly and may slow web traffic significantly. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A DNS server responds slowly. (X,Y,Z) This may negatively effect Web Filter performance.&lt;br /&gt;
| This means the specified DNS server (Y) on interface (X) responded slowly (in Z milliseconds) to a Web Filter categorization request. Web Filter will automatically request categorization of unknown and never before seen URLs. If DNS is performing poorly Web Filter categorization will also be slow and may negatively effect web traffic latency as Web Filter categorizes websites.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is slow (x ms).&lt;br /&gt;
| Event logging is slow. This is shown when event logging takes more than 15ms on average. This can be caused by a slow disk or an extremely busy server. If you see this message, you can try a couple things. 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is delayed (x minute delay).&lt;br /&gt;
| The event logging daemon that logs events to the database is behind. This happens when &amp;quot;events&amp;quot; are happening quicker than the events can be written to the database. This can be caused by a slow disk or a busy network. Events will be stored in queued in memory until they can be written to the disk. If the time it takes for an event to happen to be logged to the database reaches a time greater than 10 minutes this warning appears. This is not necessarily an issue, but the administrator should be aware when viewing reports and events that they will be delayed by x minutes. You can try a few things to resolve this alert: 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Packet processing recently overloaded&lt;br /&gt;
| This warning means that at &amp;quot;&#039;&#039;nf_queue: full at * entries, dropping packets(s)&#039;&#039;&amp;quot; was found in &amp;quot;&#039;&#039;/var/log/kern.log.&#039;&#039;&amp;quot; This means packets were incoming faster than the server was able to handle them. This usually indicates some misconfiguration or performance issue, or that some traffic needs to be [[Installation#Bypass_Rules|bypassed]]. This can also indicate that the server is undersized for the current task and is short on memory (swapping) or disk I/O throughput or processing power. For further help with this alert, contact Untangle support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| The shield is disabled. This can cause performance and stability problems.&lt;br /&gt;
| The shield is disabled in [[Config]] &amp;gt; [[System]] &amp;gt; [[Shield]]. While sometimes useful for testing, this configuration will cause performance and stability problems. To fix verify that &#039;&#039;Enable Shield&#039;&#039; is checked.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Route to unreachable address: 1.2.3.4&lt;br /&gt;
| A static route exists in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Routes]], but the next hop is unreachable. All traffic for this route will be dropped.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Running 64-bit with less than 2 gigabytes RAM is not suggested.&lt;br /&gt;
| Untangle 64-bit is installed but the system recognizes less than 2 gigs total memory. It is suggested to run the 32-bit version if you have less than 2 gigs RAM. The 32-bit version is more memory efficient for smaller servers but only supports up to 3 gigabytes of RAM. The 64-bit version is less memory efficient on smaller servers but supports hundreds of gigabytes of RAM.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Currently the number of devices significantly exceeds the number of licensed devices. (x &amp;gt; y)&lt;br /&gt;
| The number of devices for which NGFW has recently processed traffic (x) is greater than the number of allowed devices (y) for the license existing on the NGFW server. In order to return to compliance it may be necessary to bypass devices or get a larger license. Please contact support@untangle.com for help.&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21025</id>
		<title>Administration Notifications</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Administration_Notifications&amp;diff=21025"/>
		<updated>2018-02-01T21:14:07Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Overview */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_alerts&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource admin_notifications&amp;quot;&amp;gt;Administration_Notifications&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Overview = &lt;br /&gt;
&lt;br /&gt;
[[Image:admin_alerts.png|right]]&lt;br /&gt;
&lt;br /&gt;
Administration Notifications appear as an exclamation point icon at the top of the rack when logged into the Administration interface. When logging in, the server will runs a series of tests which can take a few minutes and then it will display the administration alert icon if there are any alerts.&lt;br /&gt;
&lt;br /&gt;
Notifications are typically displayed to alert the administrator of common mis-configurations or issues.&lt;br /&gt;
&lt;br /&gt;
= Notifications =&lt;br /&gt;
&lt;br /&gt;
{| width=100% border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Text&lt;br /&gt;
!width=&amp;quot;50%&amp;quot;|Description&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Upgrades are available and ready to be installed.&#039;&#039; &lt;br /&gt;
| The server detected software upgrades that have not been applied. Upgrades can be applied in [[Config]] &amp;gt; [[Upgrade]].&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| DNS connectivity failed: &#039;&#039;DNS Server IP&#039;&#039;&lt;br /&gt;
| The specified server&#039;s DNS settings is not providing DNS resolution. Check DNS settings of your WAN interfaces in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]]. It is recommended to use your ISP&#039;s DNS servers.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Failed to connect to Untangle. &#039;&#039;[address:port]&#039;&#039;&lt;br /&gt;
| Untangle failed to successfully connect to the Untangle servers. Check your network setting to make sure they are valid and that Untangle is online. Also check there is no firewall between Untangle and the internet that could be blocking connectivity. Untangle requires an active connection to the internet for proper operation.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Free disk space is low. &#039;&#039;[ xx% free ]&#039;&#039;&lt;br /&gt;
| Free disk space is running low. Contact Untangle support for help determining what is using disk space and what to do about it.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Disk errors reported. &lt;br /&gt;
&#039;&#039;Error text&#039;&#039;&lt;br /&gt;
| The disk (hard drive) returned some errors for certain commands. This usually means the disk has bad sectors which are non-responsive. In this case the disk (hard drive) should be immediately replaced.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains two or more &#039;&#039;Application 1&#039;&#039;&lt;br /&gt;
| The given rack contains two or more instances of the same application. While possible this is never desired as it decreases performance and increases management complexity. Remove one of the duplicate applications.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| &#039;&#039;Rack Name&#039;&#039; contains redundant apps: &#039;&#039;Application 1&#039;&#039; and &#039;&#039;Application 2&#039;&#039;&lt;br /&gt;
| Some applications in Untangle are redundant and should not both be installed in the same rack at the same time. For example, Spam Blocker is a super-set to Spam Blocker Lite. If both are run no additional spam will be blocked, but messages will be scanned twice incurring a performance hit. Remove the redundant application.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| Bridge (&#039;&#039;Interface 1&#039;&#039; &amp;lt;-&amp;gt; &#039;&#039;Interface 2&#039;&#039;) may be backwards. Gateway (&#039;&#039;Gateway IP&#039;&#039;) is on &#039;&#039;Interface 2&#039;&#039;.&lt;br /&gt;
| Often bridges can be plugged in with the WAN interfaces on the LAN and the LAN interface on the WAN. This works and passes traffic, however several applications do not behave as expected. If this is show it has detected that the gateway for the main bridge interface is not on the expected interface. It is recommended to go into [[Config]] &amp;gt; [[Network]] &amp;gt; [[Interfaces]] and unplug each interface one at a time and verify and correct the mapping of interfaces by swapping cables around.&lt;br /&gt;
&lt;br /&gt;
|- &lt;br /&gt;
| &#039;&#039;Interface 1&#039;&#039; interface NIC has a high number of &#039;&#039;RX/TX&#039;&#039; errors.&lt;br /&gt;
| This indicates that &#039;&#039;ifconfig&#039;&#039; shows a high number of RX or TX errors on the given interface card. This is typically a network layer or NIC issue. If possible, try another NIC or different duplex setting in /admin/index.do#config/network/advanced/network_cards.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but an unsupported DNS server is used&lt;br /&gt;
| Spam Blocker and Spam Blocker Lite rely on DNSBL (DNS blacklists) to categorize spam. Several publicly available and often used DNS servers do not supply access to these services. For example, google(8.8.8.8, 8.8.4.4), opendns(208.67.222.222, 208.67.222.220), level3(4.2.2.1,4.2.2.2) do not provide resolution for DNSBL queries. It is recommended to configure Untangle to use your ISP&#039;s DNS servers for effective spam filtering. If spam filtering is not required simply uninstall the spam filtering application from the rack.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Spam Blocker [Lite] is installed but a DNS server (X, Y) fails to resolve DNSBL queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve DNSBL queries. This will greatly degrade Spam Blocker and Spam Blocker Lite&#039;s ability to detect spam. Try configuring a different DNS server. To test this manually run &#039;&#039;host 2.0.0.127.zen.spamhaus.org your_DNS_server&#039;&#039; in the terminal where &amp;quot;your_DNS_server&amp;quot; is the IP of your DNS server. If it does not return results then DNSBL queries are not being properly resolved by that server.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Web Filter is installed but a DNS server (X, Y) fails to resolve categorization queries.&lt;br /&gt;
| This means one of the configured DNS servers does not properly resolve Web Filter category queries. Web Filter uses DNS to query for the categorization of unknown sites. If the configured DNS servers do not properly respond to categorization queries then Web Filter will not function correctly and may slow web traffic significantly. &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A DNS server responds slowly. (X,Y,Z) This may negatively effect Web Filter performance.&lt;br /&gt;
| This means the specified DNS server (Y) on interface (X) responded slowly (in Z milliseconds) to a Web Filter categorization request. Web Filter will automatically request categorization of unknown and never before seen URLs. If DNS is performing poorly Web Filter categorization will also be slow and may negatively effect web traffic latency as Web Filter categorizes websites.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is slow (x ms).&lt;br /&gt;
| Event logging is slow. This is shown when event logging takes more than 15ms on average. This can be caused by a slow disk or an extremely busy server. If you see this message, you can try a couple things. 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Event processing is delayed (x minute delay).&lt;br /&gt;
| The event logging daemon that logs events to the database is behind. This happens when &amp;quot;events&amp;quot; are happening quicker than the events can be written to the database. This can be caused by a slow disk or a busy network. Events will be stored in queued in memory until they can be written to the disk. If the time it takes for an event to happen to be logged to the database reaches a time greater than 10 minutes this warning appears. This is not necessarily an issue, but the administrator should be aware when viewing reports and events that they will be delayed by x minutes. You can try a few things to resolve this alert: 1) Use a faster disk/disk controller to the daemon is able to more quickly write events. 2) Create less events by turning off apps and/or bypassing traffic that need not be scanned.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Packet processing recently overloaded&lt;br /&gt;
| This warning means that at &amp;quot;&#039;&#039;nf_queue: full at * entries, dropping packets(s)&#039;&#039;&amp;quot; was found in &amp;quot;&#039;&#039;/var/log/kern.log.&#039;&#039;&amp;quot; This means packets were incoming faster than the server was able to handle them. This usually indicates some misconfiguration or performance issue, or that some traffic needs to be [[Installation#Bypass_Rules|bypassed]]. This can also indicate that the server is undersized for the current task and is short on memory (swapping) or disk I/O throughput or processing power. For further help with this alert, contact Untangle support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| The shield is disabled. This can cause performance and stability problems.&lt;br /&gt;
| The shield is disabled in [[Config]] &amp;gt; [[System]] &amp;gt; [[Shield]]. While sometimes useful for testing, this configuration will cause performance and stability problems. To fix verify that &#039;&#039;Enable Shield&#039;&#039; is checked.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Route to unreachable address: 1.2.3.4&lt;br /&gt;
| A static route exists in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Routes]], but the next hop is unreachable. All traffic for this route will be dropped.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Running 64-bit with less than 2 gigabytes RAM is not suggested.&lt;br /&gt;
| Untangle 64-bit is installed but the system recognizes less than 2 gigs total memory. It is suggested to run the 32-bit version if you have less than 2 gigs RAM. The 32-bit version is more memory efficient for smaller servers but only supports up to 3 gigabytes of RAM. The 64-bit version is less memory efficient on smaller servers but supports hundreds of gigabytes of RAM.&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| Currently the number of devices significantly exceeds the number of licensed devices. (x &amp;gt; y)&lt;br /&gt;
| The number of devices for which NGFW has recently processed traffic (x) is greater than the number of allowed devices (y) for the license existing on the NGFW server. In order to return to compliance it may be necessary to bypass devices or get a larger license. Please contact support@untangle.com for help.&lt;br /&gt;
&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20944</id>
		<title>Directory Connector</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20944"/>
		<updated>2017-10-18T17:20:11Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Active Directory Server Login Monitor Agent */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector&amp;quot;&amp;gt;Directory_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_status&amp;quot;&amp;gt;Directory_Connector#Status&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_user_notification_api&amp;quot;&amp;gt;Directory_Connector#User_Notification_API&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_active_directory&amp;quot;&amp;gt;Directory_Connector#Active_Directory&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_radius&amp;quot;&amp;gt;Directory_Connector#RADIUS&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_google&amp;quot;&amp;gt;Directory_Connector#Google&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_facebook&amp;quot;&amp;gt;Directory_Connector#Facebook&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_reports&amp;quot;&amp;gt;Directory_Connector#Reports&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:DirectoryConnector_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Directory Connector&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/directory-connector-conf.html Directory Connector Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://demo.untangle.com/admin/index.do#service/directory-connector Directory Connector Demo]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/directory-connector/ Directory Connector Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Directory Connector ==&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides functionality to integrate with Microsoft&#039;s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or servers that support [http://en.wikipedia.org/wiki/RADIUS RADIUS], as well as some tools manager the [[Host Viewer]] username mapping for the hosts on the network.&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides many tools to assist with [[User Management]].&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Directory Connector. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Status ===&lt;br /&gt;
&lt;br /&gt;
This displays the current status and some statistics.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|status}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== User Notification API ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;User Notification API&amp;quot; is a webapp running on the NGFW that various external scripts can call to notify Untangle that a specific user is logged into a specific IP. The userapi webapp is used to update and maintain the associated usernames in the [[Host Viewer]] so that [[User Matcher]] in [[Rules]] match correctly. When a username is associated with the &#039;&#039;Username&#039;&#039; in [[Rules#Condition_List|rules conditions]] matches as expected.&lt;br /&gt;
&lt;br /&gt;
This API can be called:&lt;br /&gt;
&lt;br /&gt;
# manually&lt;br /&gt;
# via the &#039;&#039;User Notification Login Script&#039;&#039;&lt;br /&gt;
# via the &#039;&#039;Active Directory Server Login Monitor Agent&#039;&#039;&lt;br /&gt;
# via any custom script or external program&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Enable/Disable&#039;&#039;&#039; If enabled the User Notification API is enabled. If disabled, the User Notification is completely disabled.&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: If specified, only API calls specifying the correct secret key will be allowed. All other requests are ignored. If not specified, it is not required to use the API however the clientIP argument is ignored to avoid API abuse.&lt;br /&gt;
&lt;br /&gt;
The webapp lives at &#039;&#039;http://SERVERIP/userapi/registration&#039;&#039; on the server and can be called with the following arguments:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Argument !! Example !! Description&lt;br /&gt;
|- &lt;br /&gt;
| clientIp&lt;br /&gt;
| 192.168.1.100&lt;br /&gt;
| The client IP address of the host in question &lt;br /&gt;
|- &lt;br /&gt;
| username&lt;br /&gt;
| foobar&lt;br /&gt;
| The username to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| hostname&lt;br /&gt;
| machinename&lt;br /&gt;
| The hostname to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| action&lt;br /&gt;
| &#039;&#039;login&#039;&#039; or &#039;&#039;logout&#039;&#039;&lt;br /&gt;
| The action, &#039;&#039;login&#039;&#039; is assumed if no action is specified. &#039;&#039;login&#039;&#039; with associate the username and hostname of the specified client IP. &#039;&#039;logout&#039;&#039; will unset the client IP&#039;s associated username.&lt;br /&gt;
|-&lt;br /&gt;
| secretKey&lt;br /&gt;
| foobarsecret&lt;br /&gt;
| If this argument does not match the specified secretKey the call will be ignored.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For example, If the NGFW internal IP is 192.168.1.1 without a secretKey, to associate user &amp;quot;foobar&amp;quot; on machine &amp;quot;foobarpc&amp;quot; to 192.168.1.100 you would call visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=login&amp;amp;clientIP=192.168.1.100&amp;amp;username=foobar&amp;amp;hostname=foobarpc&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To unset that username mapping when the client logs out simply visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=logout&amp;amp;clientIP=192.168.1.100&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Obviously visiting these URLs manually each time a user logs in or out of a machine is not realistic.&lt;br /&gt;
Typically this process is automated in one of two ways described below or using a custom script.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|user-notification-api}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Notification Login Script ====&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;User Notification Login Script&#039;&#039; or &#039;&#039;UNLS&#039;&#039; which is a small script that runs at login on each machine to notify the NGFW when a user logs in. This script can be pushed out to all the machines in a domain via a group policy object. This is useful in cases where you want to set the username in the [[Host Viewer]] without having users manually log into the [[Captive Portal]].&lt;br /&gt;
&lt;br /&gt;
Once installed, the script starts each time a user logs on to the network and immediately notifies Untangle of the username and IP address. Once this process is finished, any activity for that IP address will be automatically mapped to the username. This scripts runs on login and periodically in the background to keep the Directory Connector Username Map updated with any current information on your network users. &lt;br /&gt;
&lt;br /&gt;
To download the User Notification Login Script, click on the &#039;&#039;&#039;Download User Notification Login Script&#039;&#039;&#039; button and download the script. The script will be configured for your environment but may require further customization. Review the script and make changes as needed.&lt;br /&gt;
&lt;br /&gt;
Now that you have the UNLS on your Domain Controller, you need to decide if you want it run for [[#UNLS for the entire domain | all domain users]] or [[#UNLS for specific users | only for specific users]].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for the entire domain =====&lt;br /&gt;
&lt;br /&gt;
To apply UNLS to the your entire domain you&#039;ll need to set up a new [http://en.wikipedia.org/wiki/Group_policies Group Policy Object] - please follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Log on to the Domain Controller, then launch the Group Policy Management Console (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpmc.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# From the Group Policy Management Console, right-click on the domain and select &#039;&#039;&#039;Create and Link a GPO here&#039;&#039;&#039;.&lt;br /&gt;
# Specify a name for the Group Policy.&lt;br /&gt;
# Right-click on the group policy that you just created and click Edit.&lt;br /&gt;
# Go to &#039;&#039;&#039;User Configuration &amp;gt; Windows Settings &amp;gt; Scripts (Logon/Logoff)&#039;&#039;&#039;.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Logon&#039;&#039;&#039; icon, then &#039;&#039;&#039;Show Files&#039;&#039;&#039;. Windows Explorer will launch into the correct directory.&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded to this location.&lt;br /&gt;
# Click the &#039;&#039;&#039;Add&#039;&#039;&#039; button, browse for the script, then click &#039;&#039;&#039;OK&#039;&#039;&#039;.&lt;br /&gt;
# In the Logon Properties window, click Add , type a descriptive script name, then click ok.&lt;br /&gt;
# In the &#039;&#039;&#039;Select User, Computer or Group&#039;&#039;&#039; window, select the OU or Group to which you want to apply this GPO.&lt;br /&gt;
# From a command prompt, activate the group policy that you just created: &amp;lt;tt&amp;gt;gpupdate /force&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You can verify it is working by looking in the Event Log for login/logout events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for specific users =====&lt;br /&gt;
&lt;br /&gt;
If you only want to use the UNLS for a few users, you can use these instructions:&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Using a text editor, create a &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file that has the following lines:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@ echo off&lt;br /&gt;
\\ADServerIPAddress\netlogon\user_notification.vbs&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Save the &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# From the domain, go to the &#039;&#039;&#039;Users&#039;&#039;&#039; folder, right-click the user and go to Properties.&lt;br /&gt;
# On the Profile tab, type the filename of the UNLS (probably &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt;) in the Logon script field.&lt;br /&gt;
# Launch the Group Policy Management Console, then launch the [http://technet.microsoft.com/en-us/library/cc736591(v=WS.10).aspx Group Policy Object Editor] (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpedit.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded in the first step to this location.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Active Directory Server Login Monitor Agent ====&lt;br /&gt;
&lt;br /&gt;
The other way to call the User Notification API is by running an agent/monitor on the Active Directory Server. The agent monitors the server&#039;s login events and updates the Untangle NGFW when a user logs to a computer.&lt;br /&gt;
This has several advantages over the UNLS. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; - To use the Active Directory Login Monitor a Secret Key must be specified.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# It allows you to set a secretKey that only the agent knows, so only the AD server itself can update the username mapping. (users have no way of overriding changing the information)&lt;br /&gt;
# It is not necessary to run a login/logout script on all machines. No GPO is necessary.&lt;br /&gt;
&lt;br /&gt;
First download and install the agent on the Active Directory server. and configure it so that it updates the Untangle NGFW server when it sees user login events.&lt;br /&gt;
&lt;br /&gt;
[https://support.untangle.com/hc/en-us/articles/201885626-Active-Directory-Login-Monitor-Installation Installation Guide]&lt;br /&gt;
&lt;br /&gt;
[http://download.untangle.com/UntangleActiveDirectoryMonitorSetup.exe Download]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the &#039;&#039;NGFW Settings&#039;&#039; in Login Monitor so it updates your Untangle NGFW event when login events occur.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitor.png|center|frame|The AD Server Login Monitor]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: The Secret Key if there is a &#039;&#039;Secret Key&#039;&#039; configured on the NGFW [[#User_Notification_API]]. User Notification must be enabled on the NGFW. If no &#039;&#039;Secret Key&#039;&#039; is configured leave it blank.&lt;br /&gt;
*&#039;&#039;&#039;Prefix&#039;&#039;&#039;: The protocol to use to communicate with the NGFW Untangle Server.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use to communicate with the NGFW Untangle Server  The default is port 80 for HTTP and 443 for HTTPS.&lt;br /&gt;
*&#039;&#039;&#039;IP Addresses&#039;&#039;&#039;: The IP addresses to reach your NGFW Untangle Servers.  Generally this should be the LAN addresses of your NGFW Untangle Servers.  By default HTTP and HTTPS is closed on the WAN side of NGFW Untangle Server.  If the Login Monitor Agent cannot reach the NGFW, an error icon is shown next to the NGFW IP address entry.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorError.png|center|frame|Error reaching NGFW Untangle Server]]&lt;br /&gt;
&lt;br /&gt;
The Exempt IP Addresses tab is a list of IP addresses which Login Monitor should ignore for login events.  IP addresses are accepted in the following format:&lt;br /&gt;
&lt;br /&gt;
*Single IP address (192.168.2.2)&lt;br /&gt;
*Wildcard IP address (192.168.3.*)&lt;br /&gt;
*CIDR (192.168.4.0/24)&lt;br /&gt;
*Range (192.168.5.5-192.168.5.102)&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorIPAddresses.png|center|frame|Exempt IP Address Tab]]&lt;br /&gt;
&lt;br /&gt;
The Exempt Users tab is a list of AD users which Login show ignore for login events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Active Directory ===&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector allows Untangle to communicate with the Active Directory server. This is useful for two things:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their AD login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
# Allow Untangle to query the groups so the it knows which groups a user belongs to. If this is configured the [[Rules#Condition_List|User in Group]] matcher in [[Rules]] will correctly match.&lt;br /&gt;
&lt;br /&gt;
Before configuring the &#039;&#039;Active Directory Connector&#039;&#039; here are a few important steps:&lt;br /&gt;
&lt;br /&gt;
#Ensure that your Active Directory users are in one domain. Users can be in multiple Active Directory Organizational Units (OUs), but must be under one domain - multiple domains are not supported at this time.&lt;br /&gt;
#Check to see if you have the [http://www.microsoft.com/download/en/details.aspx?displaylang=en&amp;amp;id=21895 Group Policy Management Console] installed; if not, install it.&lt;br /&gt;
#If you&#039;re running Active Directory on Windows Server 2008, please see this [[#Is this supported with all versions of Active Directory? | FAQ]] entry on disabling the Signed LDAP requirement if you have installed with the strictest security settings.&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector tab contains settings for connecting and communicating with a Domain Controller. Other applications such as [[Captive_Portal| Captive Portal]] can use Directory Connector to authenticate and identify users against an existing Domain Controller.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;AD Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the AD server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Secure&#039;&#039;&#039;: Enable SSL for the connection to the AD server. &lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the AD server. The default is 389.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Login&#039;&#039;&#039;: Enter an Active Directory Administrator login.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Password&#039;&#039;&#039;: Enter an Active Directory Administrator password.&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Domain&#039;&#039;&#039;: Your domain, (e.g. mycompany.local).&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Organization&#039;&#039;&#039;: The Active Directory organization unit (OU) that contains the users. If you want the Untangle Server to find all users, leave this blank.&lt;br /&gt;
:If for some reason you want to limit the users to a specific part of the domain tree, specify the OU path in the format of &amp;lt;tt&amp;gt;OU=ouName&amp;lt;/tt&amp;gt;.  Only one OU can be entered. &lt;br /&gt;
&lt;br /&gt;
You can use the test tools to verify your settings and view an &#039;&#039;incomplete&#039;&#039; user list. After Active Directory is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|active-directory}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== RADIUS ===&lt;br /&gt;
&lt;br /&gt;
The RADIUS Connector allows Untangle to communicate with a RADIUS server. This is useful for:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their RADIUS login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
&lt;br /&gt;
The RADIUS tab contains settings to configure communication with the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;RADIUS Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the RADIUS server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the RADIUS server. The default is 1812.&lt;br /&gt;
*&#039;&#039;&#039;Shared Secret&#039;&#039;&#039;: This must match the shared secret set on the RADIUS server.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Method&#039;&#039;&#039;: This must match the authentication method used by the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
You can use the test tool to verify your settings. After RADIUS is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|radius}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Google ===&lt;br /&gt;
&lt;br /&gt;
The Google Connector allows Untangle to communicate and link with your Google account, specifically to upload data to your Google Drive.&lt;br /&gt;
&lt;br /&gt;
To enable Untangle to connect to Google Drive, click the &#039;&#039;Configure Google Drive&#039;&#039; button. It will open a window to google where you have to grant Untangle permission to connect to your google drive account.&lt;br /&gt;
&lt;br /&gt;
If you click &#039;&#039;Allow&#039;&#039; Untangle will be able to access the Google Drive API for your account.&lt;br /&gt;
&lt;br /&gt;
Allow Untangle to connect to Google Drive enables [[Reports]] to upload reporting CSVs and reporting data to Google Drive, and enables [[Configuration Backup]] to backup to Google Drive. To configure that functionality edit the settings of the respective app.&lt;br /&gt;
&lt;br /&gt;
The Google Connector also allows Untangle to authenticate against google accounts.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|google}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
&lt;br /&gt;
The Facebook Connector allows Untangle to authenticate against facebook.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|facebook}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[[Policy Manager]]&lt;br /&gt;
&lt;br /&gt;
[[Captive Portal]]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Active_Directory Active Directory]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Directory Connector FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20943</id>
		<title>Directory Connector</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20943"/>
		<updated>2017-10-18T17:19:48Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Active Directory Server Login Monitor Agent */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector&amp;quot;&amp;gt;Directory_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_status&amp;quot;&amp;gt;Directory_Connector#Status&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_user_notification_api&amp;quot;&amp;gt;Directory_Connector#User_Notification_API&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_active_directory&amp;quot;&amp;gt;Directory_Connector#Active_Directory&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_radius&amp;quot;&amp;gt;Directory_Connector#RADIUS&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_google&amp;quot;&amp;gt;Directory_Connector#Google&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_facebook&amp;quot;&amp;gt;Directory_Connector#Facebook&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_reports&amp;quot;&amp;gt;Directory_Connector#Reports&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:DirectoryConnector_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Directory Connector&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/directory-connector-conf.html Directory Connector Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://demo.untangle.com/admin/index.do#service/directory-connector Directory Connector Demo]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/directory-connector/ Directory Connector Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Directory Connector ==&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides functionality to integrate with Microsoft&#039;s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or servers that support [http://en.wikipedia.org/wiki/RADIUS RADIUS], as well as some tools manager the [[Host Viewer]] username mapping for the hosts on the network.&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides many tools to assist with [[User Management]].&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Directory Connector. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Status ===&lt;br /&gt;
&lt;br /&gt;
This displays the current status and some statistics.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|status}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== User Notification API ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;User Notification API&amp;quot; is a webapp running on the NGFW that various external scripts can call to notify Untangle that a specific user is logged into a specific IP. The userapi webapp is used to update and maintain the associated usernames in the [[Host Viewer]] so that [[User Matcher]] in [[Rules]] match correctly. When a username is associated with the &#039;&#039;Username&#039;&#039; in [[Rules#Condition_List|rules conditions]] matches as expected.&lt;br /&gt;
&lt;br /&gt;
This API can be called:&lt;br /&gt;
&lt;br /&gt;
# manually&lt;br /&gt;
# via the &#039;&#039;User Notification Login Script&#039;&#039;&lt;br /&gt;
# via the &#039;&#039;Active Directory Server Login Monitor Agent&#039;&#039;&lt;br /&gt;
# via any custom script or external program&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Enable/Disable&#039;&#039;&#039; If enabled the User Notification API is enabled. If disabled, the User Notification is completely disabled.&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: If specified, only API calls specifying the correct secret key will be allowed. All other requests are ignored. If not specified, it is not required to use the API however the clientIP argument is ignored to avoid API abuse.&lt;br /&gt;
&lt;br /&gt;
The webapp lives at &#039;&#039;http://SERVERIP/userapi/registration&#039;&#039; on the server and can be called with the following arguments:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Argument !! Example !! Description&lt;br /&gt;
|- &lt;br /&gt;
| clientIp&lt;br /&gt;
| 192.168.1.100&lt;br /&gt;
| The client IP address of the host in question &lt;br /&gt;
|- &lt;br /&gt;
| username&lt;br /&gt;
| foobar&lt;br /&gt;
| The username to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| hostname&lt;br /&gt;
| machinename&lt;br /&gt;
| The hostname to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| action&lt;br /&gt;
| &#039;&#039;login&#039;&#039; or &#039;&#039;logout&#039;&#039;&lt;br /&gt;
| The action, &#039;&#039;login&#039;&#039; is assumed if no action is specified. &#039;&#039;login&#039;&#039; with associate the username and hostname of the specified client IP. &#039;&#039;logout&#039;&#039; will unset the client IP&#039;s associated username.&lt;br /&gt;
|-&lt;br /&gt;
| secretKey&lt;br /&gt;
| foobarsecret&lt;br /&gt;
| If this argument does not match the specified secretKey the call will be ignored.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For example, If the NGFW internal IP is 192.168.1.1 without a secretKey, to associate user &amp;quot;foobar&amp;quot; on machine &amp;quot;foobarpc&amp;quot; to 192.168.1.100 you would call visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=login&amp;amp;clientIP=192.168.1.100&amp;amp;username=foobar&amp;amp;hostname=foobarpc&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To unset that username mapping when the client logs out simply visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=logout&amp;amp;clientIP=192.168.1.100&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Obviously visiting these URLs manually each time a user logs in or out of a machine is not realistic.&lt;br /&gt;
Typically this process is automated in one of two ways described below or using a custom script.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|user-notification-api}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Notification Login Script ====&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;User Notification Login Script&#039;&#039; or &#039;&#039;UNLS&#039;&#039; which is a small script that runs at login on each machine to notify the NGFW when a user logs in. This script can be pushed out to all the machines in a domain via a group policy object. This is useful in cases where you want to set the username in the [[Host Viewer]] without having users manually log into the [[Captive Portal]].&lt;br /&gt;
&lt;br /&gt;
Once installed, the script starts each time a user logs on to the network and immediately notifies Untangle of the username and IP address. Once this process is finished, any activity for that IP address will be automatically mapped to the username. This scripts runs on login and periodically in the background to keep the Directory Connector Username Map updated with any current information on your network users. &lt;br /&gt;
&lt;br /&gt;
To download the User Notification Login Script, click on the &#039;&#039;&#039;Download User Notification Login Script&#039;&#039;&#039; button and download the script. The script will be configured for your environment but may require further customization. Review the script and make changes as needed.&lt;br /&gt;
&lt;br /&gt;
Now that you have the UNLS on your Domain Controller, you need to decide if you want it run for [[#UNLS for the entire domain | all domain users]] or [[#UNLS for specific users | only for specific users]].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for the entire domain =====&lt;br /&gt;
&lt;br /&gt;
To apply UNLS to the your entire domain you&#039;ll need to set up a new [http://en.wikipedia.org/wiki/Group_policies Group Policy Object] - please follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Log on to the Domain Controller, then launch the Group Policy Management Console (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpmc.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# From the Group Policy Management Console, right-click on the domain and select &#039;&#039;&#039;Create and Link a GPO here&#039;&#039;&#039;.&lt;br /&gt;
# Specify a name for the Group Policy.&lt;br /&gt;
# Right-click on the group policy that you just created and click Edit.&lt;br /&gt;
# Go to &#039;&#039;&#039;User Configuration &amp;gt; Windows Settings &amp;gt; Scripts (Logon/Logoff)&#039;&#039;&#039;.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Logon&#039;&#039;&#039; icon, then &#039;&#039;&#039;Show Files&#039;&#039;&#039;. Windows Explorer will launch into the correct directory.&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded to this location.&lt;br /&gt;
# Click the &#039;&#039;&#039;Add&#039;&#039;&#039; button, browse for the script, then click &#039;&#039;&#039;OK&#039;&#039;&#039;.&lt;br /&gt;
# In the Logon Properties window, click Add , type a descriptive script name, then click ok.&lt;br /&gt;
# In the &#039;&#039;&#039;Select User, Computer or Group&#039;&#039;&#039; window, select the OU or Group to which you want to apply this GPO.&lt;br /&gt;
# From a command prompt, activate the group policy that you just created: &amp;lt;tt&amp;gt;gpupdate /force&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You can verify it is working by looking in the Event Log for login/logout events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for specific users =====&lt;br /&gt;
&lt;br /&gt;
If you only want to use the UNLS for a few users, you can use these instructions:&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Using a text editor, create a &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file that has the following lines:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@ echo off&lt;br /&gt;
\\ADServerIPAddress\netlogon\user_notification.vbs&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Save the &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# From the domain, go to the &#039;&#039;&#039;Users&#039;&#039;&#039; folder, right-click the user and go to Properties.&lt;br /&gt;
# On the Profile tab, type the filename of the UNLS (probably &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt;) in the Logon script field.&lt;br /&gt;
# Launch the Group Policy Management Console, then launch the [http://technet.microsoft.com/en-us/library/cc736591(v=WS.10).aspx Group Policy Object Editor] (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpedit.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded in the first step to this location.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Active Directory Server Login Monitor Agent ====&lt;br /&gt;
&lt;br /&gt;
The other way to call the User Notification API is by running an agent/monitor on the Active Directory Server. The agent monitors the server&#039;s login events and updates the Untangle NGFW when a user logs to a computer.&lt;br /&gt;
This has several advantages over the UNLS. &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;NOTE&#039;&#039;&#039; - To use the Active Directory Login Monitor a Secret Key must be specified.&lt;br /&gt;
&lt;br /&gt;
# It allows you to set a secretKey that only the agent knows, so only the AD server itself can update the username mapping. (users have no way of overriding changing the information)&lt;br /&gt;
# It is not necessary to run a login/logout script on all machines. No GPO is necessary.&lt;br /&gt;
&lt;br /&gt;
First download and install the agent on the Active Directory server. and configure it so that it updates the Untangle NGFW server when it sees user login events.&lt;br /&gt;
&lt;br /&gt;
[https://support.untangle.com/hc/en-us/articles/201885626-Active-Directory-Login-Monitor-Installation Installation Guide]&lt;br /&gt;
&lt;br /&gt;
[http://download.untangle.com/UntangleActiveDirectoryMonitorSetup.exe Download]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the &#039;&#039;NGFW Settings&#039;&#039; in Login Monitor so it updates your Untangle NGFW event when login events occur.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitor.png|center|frame|The AD Server Login Monitor]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: The Secret Key if there is a &#039;&#039;Secret Key&#039;&#039; configured on the NGFW [[#User_Notification_API]]. User Notification must be enabled on the NGFW. If no &#039;&#039;Secret Key&#039;&#039; is configured leave it blank.&lt;br /&gt;
*&#039;&#039;&#039;Prefix&#039;&#039;&#039;: The protocol to use to communicate with the NGFW Untangle Server.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use to communicate with the NGFW Untangle Server  The default is port 80 for HTTP and 443 for HTTPS.&lt;br /&gt;
*&#039;&#039;&#039;IP Addresses&#039;&#039;&#039;: The IP addresses to reach your NGFW Untangle Servers.  Generally this should be the LAN addresses of your NGFW Untangle Servers.  By default HTTP and HTTPS is closed on the WAN side of NGFW Untangle Server.  If the Login Monitor Agent cannot reach the NGFW, an error icon is shown next to the NGFW IP address entry.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorError.png|center|frame|Error reaching NGFW Untangle Server]]&lt;br /&gt;
&lt;br /&gt;
The Exempt IP Addresses tab is a list of IP addresses which Login Monitor should ignore for login events.  IP addresses are accepted in the following format:&lt;br /&gt;
&lt;br /&gt;
*Single IP address (192.168.2.2)&lt;br /&gt;
*Wildcard IP address (192.168.3.*)&lt;br /&gt;
*CIDR (192.168.4.0/24)&lt;br /&gt;
*Range (192.168.5.5-192.168.5.102)&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorIPAddresses.png|center|frame|Exempt IP Address Tab]]&lt;br /&gt;
&lt;br /&gt;
The Exempt Users tab is a list of AD users which Login show ignore for login events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Active Directory ===&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector allows Untangle to communicate with the Active Directory server. This is useful for two things:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their AD login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
# Allow Untangle to query the groups so the it knows which groups a user belongs to. If this is configured the [[Rules#Condition_List|User in Group]] matcher in [[Rules]] will correctly match.&lt;br /&gt;
&lt;br /&gt;
Before configuring the &#039;&#039;Active Directory Connector&#039;&#039; here are a few important steps:&lt;br /&gt;
&lt;br /&gt;
#Ensure that your Active Directory users are in one domain. Users can be in multiple Active Directory Organizational Units (OUs), but must be under one domain - multiple domains are not supported at this time.&lt;br /&gt;
#Check to see if you have the [http://www.microsoft.com/download/en/details.aspx?displaylang=en&amp;amp;id=21895 Group Policy Management Console] installed; if not, install it.&lt;br /&gt;
#If you&#039;re running Active Directory on Windows Server 2008, please see this [[#Is this supported with all versions of Active Directory? | FAQ]] entry on disabling the Signed LDAP requirement if you have installed with the strictest security settings.&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector tab contains settings for connecting and communicating with a Domain Controller. Other applications such as [[Captive_Portal| Captive Portal]] can use Directory Connector to authenticate and identify users against an existing Domain Controller.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;AD Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the AD server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Secure&#039;&#039;&#039;: Enable SSL for the connection to the AD server. &lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the AD server. The default is 389.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Login&#039;&#039;&#039;: Enter an Active Directory Administrator login.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Password&#039;&#039;&#039;: Enter an Active Directory Administrator password.&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Domain&#039;&#039;&#039;: Your domain, (e.g. mycompany.local).&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Organization&#039;&#039;&#039;: The Active Directory organization unit (OU) that contains the users. If you want the Untangle Server to find all users, leave this blank.&lt;br /&gt;
:If for some reason you want to limit the users to a specific part of the domain tree, specify the OU path in the format of &amp;lt;tt&amp;gt;OU=ouName&amp;lt;/tt&amp;gt;.  Only one OU can be entered. &lt;br /&gt;
&lt;br /&gt;
You can use the test tools to verify your settings and view an &#039;&#039;incomplete&#039;&#039; user list. After Active Directory is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|active-directory}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== RADIUS ===&lt;br /&gt;
&lt;br /&gt;
The RADIUS Connector allows Untangle to communicate with a RADIUS server. This is useful for:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their RADIUS login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
&lt;br /&gt;
The RADIUS tab contains settings to configure communication with the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;RADIUS Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the RADIUS server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the RADIUS server. The default is 1812.&lt;br /&gt;
*&#039;&#039;&#039;Shared Secret&#039;&#039;&#039;: This must match the shared secret set on the RADIUS server.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Method&#039;&#039;&#039;: This must match the authentication method used by the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
You can use the test tool to verify your settings. After RADIUS is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|radius}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Google ===&lt;br /&gt;
&lt;br /&gt;
The Google Connector allows Untangle to communicate and link with your Google account, specifically to upload data to your Google Drive.&lt;br /&gt;
&lt;br /&gt;
To enable Untangle to connect to Google Drive, click the &#039;&#039;Configure Google Drive&#039;&#039; button. It will open a window to google where you have to grant Untangle permission to connect to your google drive account.&lt;br /&gt;
&lt;br /&gt;
If you click &#039;&#039;Allow&#039;&#039; Untangle will be able to access the Google Drive API for your account.&lt;br /&gt;
&lt;br /&gt;
Allow Untangle to connect to Google Drive enables [[Reports]] to upload reporting CSVs and reporting data to Google Drive, and enables [[Configuration Backup]] to backup to Google Drive. To configure that functionality edit the settings of the respective app.&lt;br /&gt;
&lt;br /&gt;
The Google Connector also allows Untangle to authenticate against google accounts.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|google}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
&lt;br /&gt;
The Facebook Connector allows Untangle to authenticate against facebook.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|facebook}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[[Policy Manager]]&lt;br /&gt;
&lt;br /&gt;
[[Captive Portal]]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Active_Directory Active Directory]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Directory Connector FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20942</id>
		<title>Directory Connector</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=20942"/>
		<updated>2017-10-18T17:19:38Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Active Directory Server Login Monitor Agent */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector&amp;quot;&amp;gt;Directory_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_status&amp;quot;&amp;gt;Directory_Connector#Status&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_user_notification_api&amp;quot;&amp;gt;Directory_Connector#User_Notification_API&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_active_directory&amp;quot;&amp;gt;Directory_Connector#Active_Directory&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_radius&amp;quot;&amp;gt;Directory_Connector#RADIUS&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_google&amp;quot;&amp;gt;Directory_Connector#Google&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_facebook&amp;quot;&amp;gt;Directory_Connector#Facebook&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_reports&amp;quot;&amp;gt;Directory_Connector#Reports&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:DirectoryConnector_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Directory Connector&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/directory-connector-conf.html Directory Connector Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://demo.untangle.com/admin/index.do#service/directory-connector Directory Connector Demo]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/directory-connector/ Directory Connector Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Directory Connector ==&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides functionality to integrate with Microsoft&#039;s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or servers that support [http://en.wikipedia.org/wiki/RADIUS RADIUS], as well as some tools manager the [[Host Viewer]] username mapping for the hosts on the network.&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides many tools to assist with [[User Management]].&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Directory Connector. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Status ===&lt;br /&gt;
&lt;br /&gt;
This displays the current status and some statistics.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|status}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== User Notification API ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;User Notification API&amp;quot; is a webapp running on the NGFW that various external scripts can call to notify Untangle that a specific user is logged into a specific IP. The userapi webapp is used to update and maintain the associated usernames in the [[Host Viewer]] so that [[User Matcher]] in [[Rules]] match correctly. When a username is associated with the &#039;&#039;Username&#039;&#039; in [[Rules#Condition_List|rules conditions]] matches as expected.&lt;br /&gt;
&lt;br /&gt;
This API can be called:&lt;br /&gt;
&lt;br /&gt;
# manually&lt;br /&gt;
# via the &#039;&#039;User Notification Login Script&#039;&#039;&lt;br /&gt;
# via the &#039;&#039;Active Directory Server Login Monitor Agent&#039;&#039;&lt;br /&gt;
# via any custom script or external program&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Enable/Disable&#039;&#039;&#039; If enabled the User Notification API is enabled. If disabled, the User Notification is completely disabled.&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: If specified, only API calls specifying the correct secret key will be allowed. All other requests are ignored. If not specified, it is not required to use the API however the clientIP argument is ignored to avoid API abuse.&lt;br /&gt;
&lt;br /&gt;
The webapp lives at &#039;&#039;http://SERVERIP/userapi/registration&#039;&#039; on the server and can be called with the following arguments:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Argument !! Example !! Description&lt;br /&gt;
|- &lt;br /&gt;
| clientIp&lt;br /&gt;
| 192.168.1.100&lt;br /&gt;
| The client IP address of the host in question &lt;br /&gt;
|- &lt;br /&gt;
| username&lt;br /&gt;
| foobar&lt;br /&gt;
| The username to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| hostname&lt;br /&gt;
| machinename&lt;br /&gt;
| The hostname to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| action&lt;br /&gt;
| &#039;&#039;login&#039;&#039; or &#039;&#039;logout&#039;&#039;&lt;br /&gt;
| The action, &#039;&#039;login&#039;&#039; is assumed if no action is specified. &#039;&#039;login&#039;&#039; with associate the username and hostname of the specified client IP. &#039;&#039;logout&#039;&#039; will unset the client IP&#039;s associated username.&lt;br /&gt;
|-&lt;br /&gt;
| secretKey&lt;br /&gt;
| foobarsecret&lt;br /&gt;
| If this argument does not match the specified secretKey the call will be ignored.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For example, If the NGFW internal IP is 192.168.1.1 without a secretKey, to associate user &amp;quot;foobar&amp;quot; on machine &amp;quot;foobarpc&amp;quot; to 192.168.1.100 you would call visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=login&amp;amp;clientIP=192.168.1.100&amp;amp;username=foobar&amp;amp;hostname=foobarpc&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To unset that username mapping when the client logs out simply visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=logout&amp;amp;clientIP=192.168.1.100&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Obviously visiting these URLs manually each time a user logs in or out of a machine is not realistic.&lt;br /&gt;
Typically this process is automated in one of two ways described below or using a custom script.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|user-notification-api}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Notification Login Script ====&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;User Notification Login Script&#039;&#039; or &#039;&#039;UNLS&#039;&#039; which is a small script that runs at login on each machine to notify the NGFW when a user logs in. This script can be pushed out to all the machines in a domain via a group policy object. This is useful in cases where you want to set the username in the [[Host Viewer]] without having users manually log into the [[Captive Portal]].&lt;br /&gt;
&lt;br /&gt;
Once installed, the script starts each time a user logs on to the network and immediately notifies Untangle of the username and IP address. Once this process is finished, any activity for that IP address will be automatically mapped to the username. This scripts runs on login and periodically in the background to keep the Directory Connector Username Map updated with any current information on your network users. &lt;br /&gt;
&lt;br /&gt;
To download the User Notification Login Script, click on the &#039;&#039;&#039;Download User Notification Login Script&#039;&#039;&#039; button and download the script. The script will be configured for your environment but may require further customization. Review the script and make changes as needed.&lt;br /&gt;
&lt;br /&gt;
Now that you have the UNLS on your Domain Controller, you need to decide if you want it run for [[#UNLS for the entire domain | all domain users]] or [[#UNLS for specific users | only for specific users]].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for the entire domain =====&lt;br /&gt;
&lt;br /&gt;
To apply UNLS to the your entire domain you&#039;ll need to set up a new [http://en.wikipedia.org/wiki/Group_policies Group Policy Object] - please follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Log on to the Domain Controller, then launch the Group Policy Management Console (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpmc.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# From the Group Policy Management Console, right-click on the domain and select &#039;&#039;&#039;Create and Link a GPO here&#039;&#039;&#039;.&lt;br /&gt;
# Specify a name for the Group Policy.&lt;br /&gt;
# Right-click on the group policy that you just created and click Edit.&lt;br /&gt;
# Go to &#039;&#039;&#039;User Configuration &amp;gt; Windows Settings &amp;gt; Scripts (Logon/Logoff)&#039;&#039;&#039;.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Logon&#039;&#039;&#039; icon, then &#039;&#039;&#039;Show Files&#039;&#039;&#039;. Windows Explorer will launch into the correct directory.&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded to this location.&lt;br /&gt;
# Click the &#039;&#039;&#039;Add&#039;&#039;&#039; button, browse for the script, then click &#039;&#039;&#039;OK&#039;&#039;&#039;.&lt;br /&gt;
# In the Logon Properties window, click Add , type a descriptive script name, then click ok.&lt;br /&gt;
# In the &#039;&#039;&#039;Select User, Computer or Group&#039;&#039;&#039; window, select the OU or Group to which you want to apply this GPO.&lt;br /&gt;
# From a command prompt, activate the group policy that you just created: &amp;lt;tt&amp;gt;gpupdate /force&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You can verify it is working by looking in the Event Log for login/logout events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for specific users =====&lt;br /&gt;
&lt;br /&gt;
If you only want to use the UNLS for a few users, you can use these instructions:&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Using a text editor, create a &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file that has the following lines:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@ echo off&lt;br /&gt;
\\ADServerIPAddress\netlogon\user_notification.vbs&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Save the &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# From the domain, go to the &#039;&#039;&#039;Users&#039;&#039;&#039; folder, right-click the user and go to Properties.&lt;br /&gt;
# On the Profile tab, type the filename of the UNLS (probably &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt;) in the Logon script field.&lt;br /&gt;
# Launch the Group Policy Management Console, then launch the [http://technet.microsoft.com/en-us/library/cc736591(v=WS.10).aspx Group Policy Object Editor] (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpedit.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded in the first step to this location.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Active Directory Server Login Monitor Agent ====&lt;br /&gt;
&lt;br /&gt;
The other way to call the User Notification API is by running an agent/monitor on the Active Directory Server. The agent monitors the server&#039;s login events and updates the Untangle NGFW when a user logs to a computer.&lt;br /&gt;
This has several advantages over the UNLS. &lt;br /&gt;
&lt;br /&gt;
NOTE - To use the Active Directory Login Monitor a Secret Key must be specified.&lt;br /&gt;
&lt;br /&gt;
# It allows you to set a secretKey that only the agent knows, so only the AD server itself can update the username mapping. (users have no way of overriding changing the information)&lt;br /&gt;
# It is not necessary to run a login/logout script on all machines. No GPO is necessary.&lt;br /&gt;
&lt;br /&gt;
First download and install the agent on the Active Directory server. and configure it so that it updates the Untangle NGFW server when it sees user login events.&lt;br /&gt;
&lt;br /&gt;
[https://support.untangle.com/hc/en-us/articles/201885626-Active-Directory-Login-Monitor-Installation Installation Guide]&lt;br /&gt;
&lt;br /&gt;
[http://download.untangle.com/UntangleActiveDirectoryMonitorSetup.exe Download]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the &#039;&#039;NGFW Settings&#039;&#039; in Login Monitor so it updates your Untangle NGFW event when login events occur.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitor.png|center|frame|The AD Server Login Monitor]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: The Secret Key if there is a &#039;&#039;Secret Key&#039;&#039; configured on the NGFW [[#User_Notification_API]]. User Notification must be enabled on the NGFW. If no &#039;&#039;Secret Key&#039;&#039; is configured leave it blank.&lt;br /&gt;
*&#039;&#039;&#039;Prefix&#039;&#039;&#039;: The protocol to use to communicate with the NGFW Untangle Server.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use to communicate with the NGFW Untangle Server  The default is port 80 for HTTP and 443 for HTTPS.&lt;br /&gt;
*&#039;&#039;&#039;IP Addresses&#039;&#039;&#039;: The IP addresses to reach your NGFW Untangle Servers.  Generally this should be the LAN addresses of your NGFW Untangle Servers.  By default HTTP and HTTPS is closed on the WAN side of NGFW Untangle Server.  If the Login Monitor Agent cannot reach the NGFW, an error icon is shown next to the NGFW IP address entry.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorError.png|center|frame|Error reaching NGFW Untangle Server]]&lt;br /&gt;
&lt;br /&gt;
The Exempt IP Addresses tab is a list of IP addresses which Login Monitor should ignore for login events.  IP addresses are accepted in the following format:&lt;br /&gt;
&lt;br /&gt;
*Single IP address (192.168.2.2)&lt;br /&gt;
*Wildcard IP address (192.168.3.*)&lt;br /&gt;
*CIDR (192.168.4.0/24)&lt;br /&gt;
*Range (192.168.5.5-192.168.5.102)&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorIPAddresses.png|center|frame|Exempt IP Address Tab]]&lt;br /&gt;
&lt;br /&gt;
The Exempt Users tab is a list of AD users which Login show ignore for login events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Active Directory ===&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector allows Untangle to communicate with the Active Directory server. This is useful for two things:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their AD login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
# Allow Untangle to query the groups so the it knows which groups a user belongs to. If this is configured the [[Rules#Condition_List|User in Group]] matcher in [[Rules]] will correctly match.&lt;br /&gt;
&lt;br /&gt;
Before configuring the &#039;&#039;Active Directory Connector&#039;&#039; here are a few important steps:&lt;br /&gt;
&lt;br /&gt;
#Ensure that your Active Directory users are in one domain. Users can be in multiple Active Directory Organizational Units (OUs), but must be under one domain - multiple domains are not supported at this time.&lt;br /&gt;
#Check to see if you have the [http://www.microsoft.com/download/en/details.aspx?displaylang=en&amp;amp;id=21895 Group Policy Management Console] installed; if not, install it.&lt;br /&gt;
#If you&#039;re running Active Directory on Windows Server 2008, please see this [[#Is this supported with all versions of Active Directory? | FAQ]] entry on disabling the Signed LDAP requirement if you have installed with the strictest security settings.&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector tab contains settings for connecting and communicating with a Domain Controller. Other applications such as [[Captive_Portal| Captive Portal]] can use Directory Connector to authenticate and identify users against an existing Domain Controller.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;AD Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the AD server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Secure&#039;&#039;&#039;: Enable SSL for the connection to the AD server. &lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the AD server. The default is 389.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Login&#039;&#039;&#039;: Enter an Active Directory Administrator login.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Password&#039;&#039;&#039;: Enter an Active Directory Administrator password.&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Domain&#039;&#039;&#039;: Your domain, (e.g. mycompany.local).&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Organization&#039;&#039;&#039;: The Active Directory organization unit (OU) that contains the users. If you want the Untangle Server to find all users, leave this blank.&lt;br /&gt;
:If for some reason you want to limit the users to a specific part of the domain tree, specify the OU path in the format of &amp;lt;tt&amp;gt;OU=ouName&amp;lt;/tt&amp;gt;.  Only one OU can be entered. &lt;br /&gt;
&lt;br /&gt;
You can use the test tools to verify your settings and view an &#039;&#039;incomplete&#039;&#039; user list. After Active Directory is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|active-directory}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== RADIUS ===&lt;br /&gt;
&lt;br /&gt;
The RADIUS Connector allows Untangle to communicate with a RADIUS server. This is useful for:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their RADIUS login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
&lt;br /&gt;
The RADIUS tab contains settings to configure communication with the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;RADIUS Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the RADIUS server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the RADIUS server. The default is 1812.&lt;br /&gt;
*&#039;&#039;&#039;Shared Secret&#039;&#039;&#039;: This must match the shared secret set on the RADIUS server.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Method&#039;&#039;&#039;: This must match the authentication method used by the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
You can use the test tool to verify your settings. After RADIUS is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|radius}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Google ===&lt;br /&gt;
&lt;br /&gt;
The Google Connector allows Untangle to communicate and link with your Google account, specifically to upload data to your Google Drive.&lt;br /&gt;
&lt;br /&gt;
To enable Untangle to connect to Google Drive, click the &#039;&#039;Configure Google Drive&#039;&#039; button. It will open a window to google where you have to grant Untangle permission to connect to your google drive account.&lt;br /&gt;
&lt;br /&gt;
If you click &#039;&#039;Allow&#039;&#039; Untangle will be able to access the Google Drive API for your account.&lt;br /&gt;
&lt;br /&gt;
Allow Untangle to connect to Google Drive enables [[Reports]] to upload reporting CSVs and reporting data to Google Drive, and enables [[Configuration Backup]] to backup to Google Drive. To configure that functionality edit the settings of the respective app.&lt;br /&gt;
&lt;br /&gt;
The Google Connector also allows Untangle to authenticate against google accounts.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|google}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Facebook ===&lt;br /&gt;
&lt;br /&gt;
The Facebook Connector allows Untangle to authenticate against facebook.&lt;br /&gt;
This is experimental and is not suggested for deployments.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|directory-connector|facebook}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[[Policy Manager]]&lt;br /&gt;
&lt;br /&gt;
[[Captive Portal]]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Active_Directory Active Directory]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Directory Connector FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Clear_Hosts_and_Devices&amp;diff=16824</id>
		<title>Script - Clear Hosts and Devices</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Clear_Hosts_and_Devices&amp;diff=16824"/>
		<updated>2017-10-05T15:29:44Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to run */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What it is =&lt;br /&gt;
&lt;br /&gt;
This script will delete all saved hosts and devices information.&lt;br /&gt;
All current state stored associated with each hosts (quotas, captive portal, hostnames) will be deleted.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WARNING:&#039;&#039;&#039; All hosts and devices information will be completely lost.&lt;br /&gt;
&lt;br /&gt;
= How to run =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/dump_hosts_devices.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Reinitialize_Database&amp;diff=16823</id>
		<title>Script - Reinitialize Database</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Reinitialize_Database&amp;diff=16823"/>
		<updated>2017-10-05T15:29:34Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to run */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What it is =&lt;br /&gt;
&lt;br /&gt;
This script will delete all reports data currently stored on the drive. It deletes the entire database and re-initializes it.&lt;br /&gt;
&lt;br /&gt;
This can be useful if you the database is corrupt for some reason and is unable to start.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WARNING:&#039;&#039;&#039; All reports data will be lost.&lt;br /&gt;
&lt;br /&gt;
= How to run =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/reinitialize_db.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Clear_Reports_Data&amp;diff=16822</id>
		<title>Script - Clear Reports Data</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Clear_Reports_Data&amp;diff=16822"/>
		<updated>2017-10-05T15:29:23Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to run */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= What it is =&lt;br /&gt;
&lt;br /&gt;
This script will delete all reports data currently stored in the database.&lt;br /&gt;
&lt;br /&gt;
This can be useful if you have decreased the amount of data retention in reports and want to immediately see the free disk space available to the OS (otherwise it can take a long time for postgres to give that space back to the O/S)&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;WARNING:&#039;&#039;&#039; All reports data will be lost.&lt;br /&gt;
&lt;br /&gt;
= How to run =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/dump_reports_data.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Disk_Usage_Report&amp;diff=16821</id>
		<title>Script - Disk Usage Report</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Disk_Usage_Report&amp;diff=16821"/>
		<updated>2017-10-05T15:29:12Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to run */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What it is ==&lt;br /&gt;
&lt;br /&gt;
This script will run and give you a detailed report on what is using your disk space. This script &#039;&#039;&#039;will not&#039;&#039;&#039; free up any space, only give you a report.&lt;br /&gt;
&lt;br /&gt;
== How to run ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/diskuse.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Check_DNSBL_Access&amp;diff=16820</id>
		<title>Script - Check DNSBL Access</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Check_DNSBL_Access&amp;diff=16820"/>
		<updated>2017-10-05T15:28:59Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to run */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== What it is ==&lt;br /&gt;
&lt;br /&gt;
This script will run and test each of the currently configured upstream DNS servers against the multiple DNSBL servers used by Spam Blocker and Spam Blocker Lite.&lt;br /&gt;
&lt;br /&gt;
First it will test queries against the local Untangle server which will use whatever upstream DNS and local DNS servers you have configured. Next it will test each server individually.&lt;br /&gt;
&lt;br /&gt;
Some commonly used servers (like 8.8.8.8) provide inconsistent results. Sometimes queries will pass and sometimes they will fail. Running the script several times is succession may provide more accurate results in this case.&lt;br /&gt;
&lt;br /&gt;
== How to run ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/check_spam_health.sh | bash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Generate_new_(2048bit)_self-signed_certificate&amp;diff=16819</id>
		<title>Script - Generate new (2048bit) self-signed certificate</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Generate_new_(2048bit)_self-signed_certificate&amp;diff=16819"/>
		<updated>2017-10-05T15:27:01Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to apply */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== What it is ==&lt;br /&gt;
&lt;br /&gt;
This script will replace your current certificate with a new 2048 bit self signed certificate. If your GUI is not loading after importing a certificate this patch will get it back to a state where you can login.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;This patch will invalidate your existing cert, so make sure to backup any purchased certificates before running it.&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How to apply ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/update_cert.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Script_-_Fix_some_charts_not_displaying_in_emailed_reports&amp;diff=16818</id>
		<title>Script - Fix some charts not displaying in emailed reports</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Script_-_Fix_some_charts_not_displaying_in_emailed_reports&amp;diff=16818"/>
		<updated>2017-10-05T15:26:47Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How to apply */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== What it is ==&lt;br /&gt;
&lt;br /&gt;
This script will update your system so that formerly missing charts will be created for fixed reports.&lt;br /&gt;
&lt;br /&gt;
== How to apply ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
curl -k http://download.untangle.com/patches/generic/fixed_reports_patch.sh | dash&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=IPsec_VPN&amp;diff=16804</id>
		<title>IPsec VPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=IPsec_VPN&amp;diff=16804"/>
		<updated>2017-09-12T16:43:40Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* VPN Config */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn&amp;quot;&amp;gt;IPsec_VPN&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_status&amp;quot;&amp;gt;IPsec_VPN#Status&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_ipsec_options&amp;quot;&amp;gt;IPsec_VPN#IPsec_Options&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_ipsec_tunnels&amp;quot;&amp;gt;IPsec_VPN#IPsec_Tunnels&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_l2tp_options&amp;quot;&amp;gt;IPsec_VPN#L2TP_Options&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_l2tp_events&amp;quot;&amp;gt;IPsec_VPN#L2TP_Events&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_l2tp_log&amp;quot;&amp;gt;IPsec_VPN#L2TP_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_vpn_config&amp;quot;&amp;gt;IPsec_VPN#VPN_Config&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_gre_networks&amp;quot;&amp;gt;IPsec_VPN#GRE_Networks&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_ipsec_state&amp;quot;&amp;gt;IPsec_VPN#IPsec_State&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_ipsec_policy&amp;quot;&amp;gt;IPsec_VPN#IPsec_Policy&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource ipsec_vpn_ipsec_log&amp;quot;&amp;gt;IPsec_VPN#IPsec_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:IPsecVPN_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;IPsec VPN&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/ipsec-conf.html IPsec VPN Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://demo.untangle.com/admin/index.do#service/ipsec-vpn IPsec VPN Demo]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/ipsec-vpn/ IPsec VPN Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[IPsec VPN FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== About IPsec VPN ==&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;IPsec VPN&#039;&#039;&#039; service provides secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session.&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for IPsec VPN.&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;Status&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The Status tab shows the status of the different components of the IPsec application.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Enabled IPsec Tunnels&#039;&#039;&#039;&lt;br /&gt;
:This section shows a list of all IPsec tunnels that have been created and enabled.  For tunnels that are active, the status will display the connection details reported by the IPsec subsystem.  For inactive tunnels, the configuration information will be displayed.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; Active VPN Sessions &#039;&#039;&#039;&lt;br /&gt;
: This section shows a list of all active L2TP and Xauth connections. In addition to the connection details, there is a Disconnect column that can be used to forcefully disconnect an active session.  Please note that there is no confirmation when you click the Disconnect icon.  The corresponding session will be immediately terminated.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|status}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;IPsec Options&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Bypass all IPsec traffic&#039;&#039;&#039;&lt;br /&gt;
: When this checkbox is enabled, traffic from IPsec tunnels will bypass all applications and services on the Untangle server.  This was the only behavior available in previous versions of Untangle, so this option is enabled by default to maintain equivalent functionality on upgrade.  If you disable this checkbox, traffic from IPsec tunnels can now be filtered through all active applications and services.&lt;br /&gt;
&lt;br /&gt;
: Also please note that this only applies to plain IPsec tunnels.  Traffic from L2TP and Xauth VPN clients will always pass through all active applications and services.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|ipsec-options}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;IPsec Tunnels&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The IPsec Tunnels tab is where you create and manage the IPsec VPN configuration.  The main tab display shows a summary of all IPsec tunnels that have been created.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; Tunnel Editor &#039;&#039;&#039;&lt;br /&gt;
: When you create a new tunnel, or edit and existing tunnel, the tunnel editor screen will appear with the following configurable settings:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;85%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;15%&amp;quot;|&#039;&#039;&#039;Enable&#039;&#039;&#039;&lt;br /&gt;
|width=&amp;quot;70%&amp;quot;|This checkbox allows you to set a tunnel to either enabled or disabled.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|This field should contain a short name or description.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Connection Type&#039;&#039;&#039;&lt;br /&gt;
|This field allows you to set the connection type to any of the following:&lt;br /&gt;
&lt;br /&gt;
*Select Tunnel to specify a host-to-host, host-to-subnet, or subnet-to-subnet tunnel. This is by far the most common connection type.&lt;br /&gt;
* Select Transport to specify a host-to-host transport mode tunnel. This connection type is much less common, and would generally only be used if you are attempting to establish an IPsec connection to another host which specifically requires this mode.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Auto Mode&#039;&#039;&#039;&lt;br /&gt;
|This field controls how IPsec manages the corresponding tunnel when the IPsec process re-starts:&lt;br /&gt;
&lt;br /&gt;
* Select Start to have the tunnel automatically loaded, routes inserted, and connection initiated.&lt;br /&gt;
* Select Add to have the tunnel load in standby mode, waiting to respond to an incoming connection request.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Interface&#039;&#039;&#039;&lt;br /&gt;
|This field allows you to select the network interface that should be associated with the IPsec tunnel on the Untangle server. When you select a valid interface, the Local IP field (see below) will automatically be configured with the corresponding IP address. If for some reason you want to manually configure an IP address that is not currently active, you can set the Interface to Custom and manually input the IP address below.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;External IP&#039;&#039;&#039;&lt;br /&gt;
|Use this field to configure the IP address that is associated with the IPsec VPN on the Untangle server. Normally this field will be read-only and will automatically be populated based on the Interface selected above. If you select Custom as the interface, you can then manually enter the local IP address.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Remote Host&#039;&#039;&#039;&lt;br /&gt;
|This field should contain the public IP address or DNS name of the host to which the IPsec VPN will be connected.&lt;br /&gt;
: &#039;&#039;&#039;WARNING&#039;&#039;&#039; - Using host names with IPsec tunnels can often cause problems, especially if you have also enabled the L2TP/Xauth VPN server.  We &#039;&#039;&#039;strongly&#039;&#039;&#039; recommend the use of IP addresses in the &#039;&#039;Remote Host&#039;&#039; field. &lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Local Identifier&#039;&#039;&#039;&lt;br /&gt;
|This field is used to configure the local identifier used for authentication. When this field is blank the value in the *External IP* field will be used.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Remote Identifier&#039;&#039;&#039;&lt;br /&gt;
|This field is used to configure the remote identifier used for authentication. When this field is blank, the value in the Remote Host field will be used.&lt;br /&gt;
:&#039;&#039;&#039;IMPORTANT&#039;&#039;&#039; - If the remote host is located behind any kind of NAT device, you may need to use the value &amp;lt;TT&amp;gt;%any&amp;lt;/TT&amp;gt; in this field for a connection to be successfully established.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Local Network&#039;&#039;&#039;&lt;br /&gt;
|This field is used to configure the local network that will be reachable from hosts on the other side of the IPsec VPN.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Remote Network&#039;&#039;&#039;&lt;br /&gt;
|This field is used to configure the remote network that will be reachable from hosts on the local side of the IPsec VPN.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Shared Secret&#039;&#039;&#039;&lt;br /&gt;
|This field should contain the shared secret or PSK (pre-shared key) that is used to authenticate the connection, and must be the same on both sides of the tunnel for the connection to be successful. Because the PSK is actually used as the encryption key for the session, using long strings of a random nature will provide the highest level of security.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;DPD Interval&#039;&#039;&#039;&lt;br /&gt;
|The number of seconds between R_U_THERE messages. Enter 0 to disable this feature.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;DPD Timeout&#039;&#039;&#039;&lt;br /&gt;
| The number of seconds for a dead peer tunnel to be restarted.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Authentication  and SA/Key Exchange&#039;&#039;&#039;&lt;br /&gt;
| If you leave the Phase 1 and Phase 2 manual configuration checkboxes disabled, IPsec will attempt to automatically negotiate the encryption protocol with the remote peer when creating the tunnel.  Given the number of different IPsec implementations and versions, as well as the overall complexity of the protocol, best results can often be achieved by enabling manual configuration of these two options, and selecting Encryption, Hash, DH Key Group, and Lifetime values that exactly match the settings configured on the peer device.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|ipsec-tunnels}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;VPN Config&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The VPN Config tab allows you to enable and configure the L2TP/Xauth server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Enable L2TP/Xauth Server&#039;&#039;&#039;&lt;br /&gt;
: Use this checkbox to enable or disable the L2TP/Xauth server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;L2TP Address Pool&#039;&#039;&#039;&lt;br /&gt;
: This field configures the pool of IP addresses that will be assigned to L2TP clients while they are connected to the server. The default 198.18.0.0/16 is a private network that is generally reserved for internal network testing. It was chosen as the default because it is used less frequently than other RFC-1918 address blocks, and thus is less likely to conflict with existing address assignments on your network.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Xauth Address Pool&#039;&#039;&#039;&lt;br /&gt;
: This field configures the pool of IP addresses that will be assigned to Xauth clients while they are connected to the server. The default 198.19.0.0/16 is a private network that is generally reserved for internal network testing. It was chosen as the default because it is used less frequently than other RFC-1918 address blocks, and thus is less likely to conflict with existing address assignments on your network.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039; Custom DNS Servers&#039;&#039;&#039;&lt;br /&gt;
: Leave both of these fields blank to have L2TP and Xauth clients use the Untangle server for all DNS resolution.  Alternatively, if you have other DNS servers you want clients to use, you can enter IP addresses in these fields.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;IPsec Secret&#039;&#039;&#039;&lt;br /&gt;
: This is the shared secret that will be used between the client and server to establish the IPsec channel that will secure all L2TP and Xauth communications.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;User Authentication&#039;&#039;&#039;&lt;br /&gt;
: In addition to the IPsec Secret configured above, VPN clients will also need to authenticate with a username and password.  To use the Local Directory, select this option and click the &#039;&#039;Configure Local Directory&#039;&#039; button to manage use credentials.  Alternatively, you can use an external RADIUS server for authentication by selecting the RADIUS option, and clicking the Configure RADIUS button to configure the RADIUS server options.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Server Listen Addresses&#039;&#039;&#039;&lt;br /&gt;
: This list is used to configure one or more of your server IP addresses to listen for inbound VPN connection requests from remote clients.  Clicking the add button will insert a new line allowing the entry of another server IP address.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|vpn-config}}&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;GRE Networks&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The GRE Networks tab is where you create and manage connections to remote GRE servers. Generic Routing Encapsulation (GRE) is a tunneling protocol that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;GRE Address Pool&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
This field configures the pool of IP addresses that will be assigned to interfaces created and associated with tunnels added on the GRE Networks tab. The default 198.51.100.0/24 is a private network that is generally reserved for internal network testing. It was chosen as the default because it is used less frequently than other RFC-1918 address blocks, and thus is less likely to conflict with existing address assignments on your network. If you use GRE to connect multiple Untangle servers together, you may need to configure a different, unused pool on each server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The main tab display shows a summary of all GRE Networks that have been created.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039; Network Editor &#039;&#039;&#039;&lt;br /&gt;
: When you create a new GRE Network, or edit and existing network, the network editor screen will appear with the following configurable settings:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;85%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;15%&amp;quot;|&#039;&#039;&#039;Enable&#039;&#039;&#039;&lt;br /&gt;
|width=&amp;quot;70%&amp;quot;|This checkbox allows you to set a network to either enabled or disabled.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Description&#039;&#039;&#039;&lt;br /&gt;
|This field should contain a short name or description.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Interface&#039;&#039;&#039;&lt;br /&gt;
|This field allows you to select the network interface that should be associated with the GRE Network on the Untangle server. When you select a valid interface, the Local IP field (see below) will automatically be configured with the corresponding IP address. If for some reason you want to manually configure an IP address that is not currently active, you can set the Interface to Custom and manually input the IP address below.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;External IP&#039;&#039;&#039;&lt;br /&gt;
|Use this field to configure the IP address that is associated with the GRE Network on the Untangle server. Normally this field will be read-only and will automatically be populated based on the Interface selected above. If you select Custom as the interface, you can then manually enter the local IP address.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Remote Host&#039;&#039;&#039;&lt;br /&gt;
|This field should contain the public IP address of the host to which the GRE tunnel will be connected.&lt;br /&gt;
|- &lt;br /&gt;
|&#039;&#039;&#039;Remote Networks&#039;&#039;&#039;&lt;br /&gt;
|This field is used to configure the list of remote network traffic that should be routed across this GRE tunnel. Networks should be entered one per line in CIDR (192.168.123.0/24) format.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|gre-networks}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;IPsec State&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The IPsec State tab allows you to see the status of all established IPsec connections.  There will typically be two entries per tunnel, one with details about the local side of the connection, and another with details about the remote side of the connection.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|ipsec-state}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;IPsec Policy&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The IPsec Policy tab allows you to see the routing table rules associated with each IPsec VPN that is active.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|ipsec-policy}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;IPsec Log&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The IPsec Log tab allows you to see the low level status messages that are generated by the underlying IPsec protocol components.  This information can be very helpful when attempting to diagnose connection problems or other IPsec issues.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|ipsec-log}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &amp;lt;u&amp;gt;L2TP Log&amp;lt;/u&amp;gt; ===&lt;br /&gt;
&lt;br /&gt;
The L2TP Log tab allows you to see the low level status messages that are generated by the underlying L2TP protocol daemon.    This information can be very helpful when attempting to diagnose connection problems or other L2TP issues.&lt;br /&gt;
&lt;br /&gt;
{{ServiceAppScreenshot|ipsec-vpn|l2tp-log}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:IPsec VPN Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[[OpenVPN]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== IPsec VPN FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:IPsec VPN FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4507</id>
		<title>IPsec VPN FAQs</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4507"/>
		<updated>2017-04-17T19:28:18Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:FAQs]]&lt;br /&gt;
=== What&#039;s the difference between tunnel and transport mode? ===&lt;br /&gt;
&lt;br /&gt;
When using &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode, you can think of the payload packet as being completely encased in another packet. In addition, IPsec can allow or deny packets access to the tunnel depending on policies. When using &#039;&#039;&#039;transport&#039;&#039;&#039; mode, communication is limited between two hosts. Only one IP header is present, with the rest of the packet being encrypted. Unless you have very specific needs, you&#039;ll most likely want to use &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What devices can I connect to with Untangle&#039;s IPsec VPN? ===&lt;br /&gt;
&lt;br /&gt;
We have currently verified that IPsec VPN can successfully connect to other Untangle boxes and pfSense. We have user-submitted settings for other devices below, but please be aware Untangle Support cannot debug tunnels between Untangle and a 3rd party device. We only support IPsec tunnels between two Untangle boxes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== If I install Untangle behind a NAT device, what do I need to forward to Untangle for IPsec VPN to connect? ===&lt;br /&gt;
&lt;br /&gt;
You will need to forward ESP, AH, and UDP port 500 from the public IP to the Untangle server. You may also need to enable NAT traversal. It is recommended to give Untangle a public IP if you want to set up IPsec tunnels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I use IPsec on a server that uses DHCP to get its external address? ===&lt;br /&gt;
&lt;br /&gt;
It is generally recommended to use IPsec VPN only on Untangle servers configured with static IPs. However, technically it can work with DHCP, but you will need to reconfigure the tunnel whenever the IP address actually changes. On some ISPs this is rare and servers will often have the same IP for months. On other ISPs IPs change daily.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Does IPsec traffic go through other Untangle applications? ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yes and Maybe&#039;&#039;&#039;.  IPsec tunnel traffic and traffic from L2TP and Xauth clients will pass through all the other apps just like any other LAN traffic. However, if you want IPsec tunnel traffic to bypass scanning by other applications you can add a [[Bypass Rules|bypass rule]]. &lt;br /&gt;
&lt;br /&gt;
Note: In versions prior to 11.2, the default was to bypass all IPsec tunnel traffic (but not L2TP or Xauth). You may still have a bypass rule in place to &#039;&#039;Bypass all IPsec traffic&#039;&#039; which will cause the traffic to not be scanned by other apps.&lt;br /&gt;
&lt;br /&gt;
=== How do I connect IPsec between Untangle and my IPsec Device? ===&lt;br /&gt;
&lt;br /&gt;
IPsec on Untangle should work with any compatible endpoint, but unfortunately Untangle doesn&#039;t have the resources to test against all known IPSec devices.  Untangle recommends documenting the Phase1/Phase2 settings of the 3rd party IPSec device then matching those settings on Untangle, which cab be entered under the Manual Configuration available in all tunnel configurations.  Untangle support has successfully deployed IPSec connections to various models from the following 3rd party manufacturers.  &lt;br /&gt;
&lt;br /&gt;
*Cisco&lt;br /&gt;
*Endian&lt;br /&gt;
*eSoft&lt;br /&gt;
*Firebox&lt;br /&gt;
*Fortinet&lt;br /&gt;
*Juniper&lt;br /&gt;
*M0n0wall&lt;br /&gt;
*pfSense&lt;br /&gt;
*Sonicwall&lt;br /&gt;
*Watchguard&lt;br /&gt;
*and many others....&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4506</id>
		<title>IPsec VPN FAQs</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4506"/>
		<updated>2017-04-17T19:27:26Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How do I connect IPsec between Untangle and my IPsec Device? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:FAQs]]&lt;br /&gt;
=== What&#039;s the difference between tunnel and transport mode? ===&lt;br /&gt;
&lt;br /&gt;
When using &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode, you can think of the payload packet as being completely encased in another packet. In addition, IPsec can allow or deny packets access to the tunnel depending on policies. When using &#039;&#039;&#039;transport&#039;&#039;&#039; mode, communication is limited between two hosts. Only one IP header is present, with the rest of the packet being encrypted. Unless you have very specific needs, you&#039;ll most likely want to use &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What devices can I connect to with Untangle&#039;s IPsec VPN? ===&lt;br /&gt;
&lt;br /&gt;
We have currently verified that IPsec VPN can successfully connect to other Untangle boxes and pfSense. We have user-submitted settings for other devices below, but please be aware Untangle Support cannot debug tunnels between Untangle and a 3rd party device. We only support IPsec tunnels between two Untangle boxes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== If I install Untangle behind a NAT device, what do I need to forward to Untangle for IPsec VPN to connect? ===&lt;br /&gt;
&lt;br /&gt;
You will need to forward ESP, AH, and UDP port 500 from the public IP to the Untangle server. You may also need to enable NAT traversal. It is recommended to give Untangle a public IP if you want to set up IPsec tunnels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I use IPsec on a server that uses DHCP to get its external address? ===&lt;br /&gt;
&lt;br /&gt;
It is generally recommended to use IPsec VPN only on Untangle servers configured with static IPs. However, technically it can work with DHCP, but you will need to reconfigure the tunnel whenever the IP address actually changes. On some ISPs this is rare and servers will often have the same IP for months. On other ISPs IPs change daily.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Does IPsec traffic go through other Untangle applications? ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yes and Maybe&#039;&#039;&#039;.  IPsec tunnel traffic and traffic from L2TP and Xauth clients will pass through all the other apps just like any other LAN traffic. However, if you want IPsec tunnel traffic to bypass scanning by other applications you can add a [[Bypass Rules|bypass rule]]. &lt;br /&gt;
&lt;br /&gt;
Note: In versions prior to 11.2, the default was to bypass all IPsec tunnel traffic (but not L2TP or Xauth). You may still have a bypass rule in place to &#039;&#039;Bypass all IPsec traffic&#039;&#039; which will cause the traffic to not be scanned by other apps.&lt;br /&gt;
&lt;br /&gt;
=== How do I connect IPsec between Untangle and my IPsec Device? ===&lt;br /&gt;
&lt;br /&gt;
IPsec on Untangle should work with any compatible endpoint, but unfortunately Untangle doesn&#039;t have the resources to test against all known IPSec devices.  Untangle recommends documenting the Phase1/Phase2 settings of the 3rd party IPSec device then matching those settings on Untangle, which cab be entered under the Manual Configuration available in all tunnel configurations.  Untangle support has successfully deployed IPSec connections to various models from the following 3rd party manufacturers.  &lt;br /&gt;
&lt;br /&gt;
*Cisco&lt;br /&gt;
*Endian&lt;br /&gt;
*eSoft&lt;br /&gt;
*Firebox&lt;br /&gt;
*Fortinet&lt;br /&gt;
*Juniper&lt;br /&gt;
*M0n0wall&lt;br /&gt;
*pfSense&lt;br /&gt;
*Sonicwall&lt;br /&gt;
*Watchguard&lt;br /&gt;
*and many others....&lt;br /&gt;
&lt;br /&gt;
=== How do I connect IPsec between Untangle and pfSense? ===&lt;br /&gt;
&lt;br /&gt;
These settings have been verified by Untangle Support:&lt;br /&gt;
&lt;br /&gt;
Untangle Settings:&lt;br /&gt;
&lt;br /&gt;
* Enable: (check if you want the tunnel up)&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Connection Type: Tunnel&lt;br /&gt;
* Auto Mode: Start&lt;br /&gt;
* Interface: (pick your interface)&lt;br /&gt;
* External IP: (will be automatically set from the WAN you choose)&lt;br /&gt;
* Remote IP: The WAN IP of the pfSense box&lt;br /&gt;
* Local Network: The LAN of the Untangle box (eg 192.168.1.0/24)&lt;br /&gt;
* Local IP: Untangle&#039;s LAN IP (eg 192.168.1.1)&lt;br /&gt;
* Remote Network: The LAN of the pfSense box (eg 192.168.2.0/24)&lt;br /&gt;
* PFS: Checked&lt;br /&gt;
* Shared Secret: (must match the Pre-Shared Key secret on the pfSense box)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pfSense Settings:&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
* Disabled: (unchecked)&lt;br /&gt;
* Interface: WAN&lt;br /&gt;
* Remote Gateway: Untangle&#039;s WAN IP&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Authentication: Mutual PSK&lt;br /&gt;
* Negotiation Mode: main&lt;br /&gt;
* My identifier: My IP address&lt;br /&gt;
* Peer identifier: Peer IP address&lt;br /&gt;
* Pre-Shared Key: (must match the Shared Secret on the pfSense box)&lt;br /&gt;
* Policy Generation: Default&lt;br /&gt;
* Proposal: Default&lt;br /&gt;
* Encryption algorithm: 3DES&lt;br /&gt;
* Hash algorithm: SHA1&lt;br /&gt;
* DH key group: 2&lt;br /&gt;
* Lifetime: 28800&lt;br /&gt;
* NAT Traversal: Enable&lt;br /&gt;
* Dead Peer Detection: (checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
* Disabled (unchecked)&lt;br /&gt;
* Mode: Tunnel&lt;br /&gt;
* Local Network: LAN Subnet&lt;br /&gt;
* Remote Network: Network, Address: The LAN of the Untangle box (eg 192.168.1.0/24)&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Protocol: ESP&lt;br /&gt;
* Encryption algorithm: check AES, 128 bits&lt;br /&gt;
* Hash algorithm: check SHA1&lt;br /&gt;
* PFS key group: 2&lt;br /&gt;
* Lifetime: 28800&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to M0n0wall? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks random person):&lt;br /&gt;
&lt;br /&gt;
* Local subnet : M0n0wall LAN subnet&lt;br /&gt;
* Remote subnet: x.x.x.0 / xx (fill in your Remote Untangle&#039;s subnet address and netmask with .0 on the end)&lt;br /&gt;
* Remote gateway: &amp;lt;Remote Untangle&#039;s External IP address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
* Negotiation mode : main&lt;br /&gt;
* Encryption algorithm : 3DES&lt;br /&gt;
* Hash algorithm : SHA1&lt;br /&gt;
* DH key group : 2 = 1024 bit&lt;br /&gt;
* Authentication method : Pre-shared key&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
* Protocol : ESP&lt;br /&gt;
* Encryption algorithm : 3DES&lt;br /&gt;
* Hash algorithm : SHA1&lt;br /&gt;
* PFS key group : 2 = 1024 bit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to Cisco RV series? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks jcoffin):&lt;br /&gt;
&lt;br /&gt;
* Keying Mode : IKE with Pre-shared key&lt;br /&gt;
* Phase1 DH Group : Group 2&lt;br /&gt;
* Phase1 Encryption : 3DES&lt;br /&gt;
* Phase1 Authentication : SHA1&lt;br /&gt;
* Phase1 SA Life Time : 86400 seconds&lt;br /&gt;
* Perfect Forward Secrecy : checked&lt;br /&gt;
* Phase2 DH Group : Group 2&lt;br /&gt;
* Phase2 Encryption : 3DES&lt;br /&gt;
* Phase2 Authentication : SHA1&lt;br /&gt;
* Phase2 SA Life Time 3600 seconds&lt;br /&gt;
* Pre-shared Key : &amp;lt;same as on UT&amp;gt;&lt;br /&gt;
* Advanced  (all unchecked except)	 	&lt;br /&gt;
** AH Hash Algorithm  : SHA1&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to Endian? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks aboyce):&lt;br /&gt;
&lt;br /&gt;
* Remote host / IP : Public IP of the Untangle server&lt;br /&gt;
* Local Subnet : Endian LAN subnet&lt;br /&gt;
* Remote Subnet : x.x.x.0 / xx (fill in your Remote Untangle&#039;s subnet address and netmask with .0 on the end)&lt;br /&gt;
* Local ID : Public IP of the Endian server&lt;br /&gt;
* Remote ID : Public IP of the Untangle server&lt;br /&gt;
* Dead Peer Detection : Restart&lt;br /&gt;
* Pre-shared Key : &amp;lt;same as on UT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Advanced settings:&lt;br /&gt;
* IKE encryption AES (128 bit) and 3DES&lt;br /&gt;
* IKE integrity : SHA and MD5&lt;br /&gt;
* IKE Group DH group 5 (1536 bits) and DH group 2 (1024 bits)&lt;br /&gt;
* IKE lifetime 1 hours&lt;br /&gt;
&lt;br /&gt;
* ESP encryption AES (128 bit) and 3DES&lt;br /&gt;
* ESP integrity SHA1 and MD5&lt;br /&gt;
* ESP key life 8 hours&lt;br /&gt;
* IKE Aggresive Mode Allowed : Off&lt;br /&gt;
* Perfect Forward Secrecy (PFS) : On&lt;br /&gt;
* Negotiate Payload : Off&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Cisco 870 series? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks djoey1982):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;On the Untangle&#039;&#039;&#039;:&lt;br /&gt;
* Connection Type: Tunnel&lt;br /&gt;
* Auto Mode: Start&lt;br /&gt;
* Interface: External&lt;br /&gt;
* External IP: (The external IP address of this server)&lt;br /&gt;
* Remote IP: (The public IP address of the remote IPsec gateway)&lt;br /&gt;
* Local Network: (The private network attached to the local side of the tunnel)&lt;br /&gt;
* Local IP: (The IP address of this server on the local private network)&lt;br /&gt;
* Remote Network: (The private network attached to the remote side of the tunnel)&lt;br /&gt;
* Perfect Forward Secrecy (PFS) : unchecked&lt;br /&gt;
* Shared Secret : &amp;lt;same as Cisco&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Link to Cisco 870 Settings&#039;&#039;&#039;: [http://pastebin.com/ZysE8rxt Cisco 870 Settings]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Watchguard Firebox X10/X20? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks snecklifter!)&lt;br /&gt;
&lt;br /&gt;
* Credential Method: Shared Key&lt;br /&gt;
* Main Mode, IP Address&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
&lt;br /&gt;
* SHA1-HMAC&lt;br /&gt;
* 3DES-CBC&lt;br /&gt;
* Neg expires in 0kb, 8 hours&lt;br /&gt;
* DH group 2&lt;br /&gt;
* Enabled DPD (Note that this is important, IKE Keep alive is proprietary and does not work)&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
&lt;br /&gt;
* SHA1-HMAC&lt;br /&gt;
* AES 256&lt;br /&gt;
* Untick TOS for IPSEC&lt;br /&gt;
* Enable PFS&lt;br /&gt;
* key expiry in 128000kb, 24 hours&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to an eSoft InstaGate? ===&lt;br /&gt;
&lt;br /&gt;
The default InstaGate and Untangle settings can be used to create a connection.&lt;br /&gt;
&lt;br /&gt;
* Network: Local Network to Remote Network&lt;br /&gt;
* Key Management: Automatic (Shared Secret)&lt;br /&gt;
&lt;br /&gt;
IKE Settings (Phase 1):&lt;br /&gt;
&lt;br /&gt;
* 24 hours, 0 KB &lt;br /&gt;
* Strict PFS disabled &lt;br /&gt;
* Aggressive Mode disabled&lt;br /&gt;
* High Security&lt;br /&gt;
&lt;br /&gt;
IPSec Settings (Phase 2):&lt;br /&gt;
&lt;br /&gt;
* 1 hours, 0 KB &lt;br /&gt;
* PFS Group 2 (DH) &lt;br /&gt;
* High Security&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Sonicwall? ===&lt;br /&gt;
&lt;br /&gt;
Sonicwall Configuration is listed below. &lt;br /&gt;
&lt;br /&gt;
General:&lt;br /&gt;
&lt;br /&gt;
* Authentication Method: IKE using Pre-shared Secret&lt;br /&gt;
* IPsec Primary Gateway Name or Address: WAN IP on Untnagle&lt;br /&gt;
* Enter Shared Secret&lt;br /&gt;
&lt;br /&gt;
Network:&lt;br /&gt;
&lt;br /&gt;
* Local Networks: Choose local network from list, select predefined network.&lt;br /&gt;
* Destination Networks: Choose local network from list, select predefined network.&lt;br /&gt;
&lt;br /&gt;
Proposals:&lt;br /&gt;
&lt;br /&gt;
IKE (Phase 1) Proposal&lt;br /&gt;
* Exchange: Main Mode&lt;br /&gt;
* DH Group: Group 2&lt;br /&gt;
* Encryption: 3DES&lt;br /&gt;
* Authentication: SHA1&lt;br /&gt;
* Life Time: 28800&lt;br /&gt;
&lt;br /&gt;
Ipsec (Phase 2) Proposal&lt;br /&gt;
* Protocol: ESP&lt;br /&gt;
* Encryption: AES-128&lt;br /&gt;
* Authentication: SHA1&lt;br /&gt;
* Enable Perfect Forward Secrecy: Enabled (checked)&lt;br /&gt;
* DH Group: Group 2&lt;br /&gt;
* Life Time: 28800&lt;br /&gt;
&lt;br /&gt;
Advanced:&lt;br /&gt;
* Enable Keep Alive: Enabled (checked)&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4505</id>
		<title>IPsec VPN FAQs</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=IPsec_VPN_FAQs&amp;diff=4505"/>
		<updated>2017-04-17T19:26:43Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* How do I connect IPsec between Untangle and my IPsec Device? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:FAQs]]&lt;br /&gt;
=== What&#039;s the difference between tunnel and transport mode? ===&lt;br /&gt;
&lt;br /&gt;
When using &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode, you can think of the payload packet as being completely encased in another packet. In addition, IPsec can allow or deny packets access to the tunnel depending on policies. When using &#039;&#039;&#039;transport&#039;&#039;&#039; mode, communication is limited between two hosts. Only one IP header is present, with the rest of the packet being encrypted. Unless you have very specific needs, you&#039;ll most likely want to use &#039;&#039;&#039;tunnel&#039;&#039;&#039; mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What devices can I connect to with Untangle&#039;s IPsec VPN? ===&lt;br /&gt;
&lt;br /&gt;
We have currently verified that IPsec VPN can successfully connect to other Untangle boxes and pfSense. We have user-submitted settings for other devices below, but please be aware Untangle Support cannot debug tunnels between Untangle and a 3rd party device. We only support IPsec tunnels between two Untangle boxes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== If I install Untangle behind a NAT device, what do I need to forward to Untangle for IPsec VPN to connect? ===&lt;br /&gt;
&lt;br /&gt;
You will need to forward ESP, AH, and UDP port 500 from the public IP to the Untangle server. You may also need to enable NAT traversal. It is recommended to give Untangle a public IP if you want to set up IPsec tunnels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I use IPsec on a server that uses DHCP to get its external address? ===&lt;br /&gt;
&lt;br /&gt;
It is generally recommended to use IPsec VPN only on Untangle servers configured with static IPs. However, technically it can work with DHCP, but you will need to reconfigure the tunnel whenever the IP address actually changes. On some ISPs this is rare and servers will often have the same IP for months. On other ISPs IPs change daily.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Does IPsec traffic go through other Untangle applications? ===&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Yes and Maybe&#039;&#039;&#039;.  IPsec tunnel traffic and traffic from L2TP and Xauth clients will pass through all the other apps just like any other LAN traffic. However, if you want IPsec tunnel traffic to bypass scanning by other applications you can add a [[Bypass Rules|bypass rule]]. &lt;br /&gt;
&lt;br /&gt;
Note: In versions prior to 11.2, the default was to bypass all IPsec tunnel traffic (but not L2TP or Xauth). You may still have a bypass rule in place to &#039;&#039;Bypass all IPsec traffic&#039;&#039; which will cause the traffic to not be scanned by other apps.&lt;br /&gt;
&lt;br /&gt;
=== How do I connect IPsec between Untangle and my IPsec Device? ===&lt;br /&gt;
&lt;br /&gt;
IPsec on Untangle should work with any compatible endpoint, but unfortunately Untangle doesn&#039;t have the resources to test against all known IPSec devices.  Untangle recommends documenting the Phase1/Phase2 settings of the 3rd party IPSec device then matching those settings on Untangle, which cab be entered under the Manual Configuration available in all tunnel configurations.  Untangle support has successfully deployed IPSec connections to various models from the following 3rd party manufacturers.  &lt;br /&gt;
&lt;br /&gt;
Cisco&lt;br /&gt;
Endian&lt;br /&gt;
eSoft&lt;br /&gt;
Firebox&lt;br /&gt;
Fortinet&lt;br /&gt;
Juniper&lt;br /&gt;
M0n0wall&lt;br /&gt;
pfSense&lt;br /&gt;
Sonicwall&lt;br /&gt;
Watchguard&lt;br /&gt;
and many others....&lt;br /&gt;
&lt;br /&gt;
=== How do I connect IPsec between Untangle and pfSense? ===&lt;br /&gt;
&lt;br /&gt;
These settings have been verified by Untangle Support:&lt;br /&gt;
&lt;br /&gt;
Untangle Settings:&lt;br /&gt;
&lt;br /&gt;
* Enable: (check if you want the tunnel up)&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Connection Type: Tunnel&lt;br /&gt;
* Auto Mode: Start&lt;br /&gt;
* Interface: (pick your interface)&lt;br /&gt;
* External IP: (will be automatically set from the WAN you choose)&lt;br /&gt;
* Remote IP: The WAN IP of the pfSense box&lt;br /&gt;
* Local Network: The LAN of the Untangle box (eg 192.168.1.0/24)&lt;br /&gt;
* Local IP: Untangle&#039;s LAN IP (eg 192.168.1.1)&lt;br /&gt;
* Remote Network: The LAN of the pfSense box (eg 192.168.2.0/24)&lt;br /&gt;
* PFS: Checked&lt;br /&gt;
* Shared Secret: (must match the Pre-Shared Key secret on the pfSense box)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
pfSense Settings:&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
* Disabled: (unchecked)&lt;br /&gt;
* Interface: WAN&lt;br /&gt;
* Remote Gateway: Untangle&#039;s WAN IP&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Authentication: Mutual PSK&lt;br /&gt;
* Negotiation Mode: main&lt;br /&gt;
* My identifier: My IP address&lt;br /&gt;
* Peer identifier: Peer IP address&lt;br /&gt;
* Pre-Shared Key: (must match the Shared Secret on the pfSense box)&lt;br /&gt;
* Policy Generation: Default&lt;br /&gt;
* Proposal: Default&lt;br /&gt;
* Encryption algorithm: 3DES&lt;br /&gt;
* Hash algorithm: SHA1&lt;br /&gt;
* DH key group: 2&lt;br /&gt;
* Lifetime: 28800&lt;br /&gt;
* NAT Traversal: Enable&lt;br /&gt;
* Dead Peer Detection: (checked)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
* Disabled (unchecked)&lt;br /&gt;
* Mode: Tunnel&lt;br /&gt;
* Local Network: LAN Subnet&lt;br /&gt;
* Remote Network: Network, Address: The LAN of the Untangle box (eg 192.168.1.0/24)&lt;br /&gt;
* Description: (whatever you want)&lt;br /&gt;
* Protocol: ESP&lt;br /&gt;
* Encryption algorithm: check AES, 128 bits&lt;br /&gt;
* Hash algorithm: check SHA1&lt;br /&gt;
* PFS key group: 2&lt;br /&gt;
* Lifetime: 28800&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to M0n0wall? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks random person):&lt;br /&gt;
&lt;br /&gt;
* Local subnet : M0n0wall LAN subnet&lt;br /&gt;
* Remote subnet: x.x.x.0 / xx (fill in your Remote Untangle&#039;s subnet address and netmask with .0 on the end)&lt;br /&gt;
* Remote gateway: &amp;lt;Remote Untangle&#039;s External IP address&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
* Negotiation mode : main&lt;br /&gt;
* Encryption algorithm : 3DES&lt;br /&gt;
* Hash algorithm : SHA1&lt;br /&gt;
* DH key group : 2 = 1024 bit&lt;br /&gt;
* Authentication method : Pre-shared key&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
* Protocol : ESP&lt;br /&gt;
* Encryption algorithm : 3DES&lt;br /&gt;
* Hash algorithm : SHA1&lt;br /&gt;
* PFS key group : 2 = 1024 bit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to Cisco RV series? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks jcoffin):&lt;br /&gt;
&lt;br /&gt;
* Keying Mode : IKE with Pre-shared key&lt;br /&gt;
* Phase1 DH Group : Group 2&lt;br /&gt;
* Phase1 Encryption : 3DES&lt;br /&gt;
* Phase1 Authentication : SHA1&lt;br /&gt;
* Phase1 SA Life Time : 86400 seconds&lt;br /&gt;
* Perfect Forward Secrecy : checked&lt;br /&gt;
* Phase2 DH Group : Group 2&lt;br /&gt;
* Phase2 Encryption : 3DES&lt;br /&gt;
* Phase2 Authentication : SHA1&lt;br /&gt;
* Phase2 SA Life Time 3600 seconds&lt;br /&gt;
* Pre-shared Key : &amp;lt;same as on UT&amp;gt;&lt;br /&gt;
* Advanced  (all unchecked except)	 	&lt;br /&gt;
** AH Hash Algorithm  : SHA1&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to Endian? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks aboyce):&lt;br /&gt;
&lt;br /&gt;
* Remote host / IP : Public IP of the Untangle server&lt;br /&gt;
* Local Subnet : Endian LAN subnet&lt;br /&gt;
* Remote Subnet : x.x.x.0 / xx (fill in your Remote Untangle&#039;s subnet address and netmask with .0 on the end)&lt;br /&gt;
* Local ID : Public IP of the Endian server&lt;br /&gt;
* Remote ID : Public IP of the Untangle server&lt;br /&gt;
* Dead Peer Detection : Restart&lt;br /&gt;
* Pre-shared Key : &amp;lt;same as on UT&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Advanced settings:&lt;br /&gt;
* IKE encryption AES (128 bit) and 3DES&lt;br /&gt;
* IKE integrity : SHA and MD5&lt;br /&gt;
* IKE Group DH group 5 (1536 bits) and DH group 2 (1024 bits)&lt;br /&gt;
* IKE lifetime 1 hours&lt;br /&gt;
&lt;br /&gt;
* ESP encryption AES (128 bit) and 3DES&lt;br /&gt;
* ESP integrity SHA1 and MD5&lt;br /&gt;
* ESP key life 8 hours&lt;br /&gt;
* IKE Aggresive Mode Allowed : Off&lt;br /&gt;
* Perfect Forward Secrecy (PFS) : On&lt;br /&gt;
* Negotiate Payload : Off&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Cisco 870 series? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks djoey1982):&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;On the Untangle&#039;&#039;&#039;:&lt;br /&gt;
* Connection Type: Tunnel&lt;br /&gt;
* Auto Mode: Start&lt;br /&gt;
* Interface: External&lt;br /&gt;
* External IP: (The external IP address of this server)&lt;br /&gt;
* Remote IP: (The public IP address of the remote IPsec gateway)&lt;br /&gt;
* Local Network: (The private network attached to the local side of the tunnel)&lt;br /&gt;
* Local IP: (The IP address of this server on the local private network)&lt;br /&gt;
* Remote Network: (The private network attached to the remote side of the tunnel)&lt;br /&gt;
* Perfect Forward Secrecy (PFS) : unchecked&lt;br /&gt;
* Shared Secret : &amp;lt;same as Cisco&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Link to Cisco 870 Settings&#039;&#039;&#039;: [http://pastebin.com/ZysE8rxt Cisco 870 Settings]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Watchguard Firebox X10/X20? ===&lt;br /&gt;
&lt;br /&gt;
These settings have &#039;&#039;&#039;not&#039;&#039;&#039; been verified by Untangle Support (thanks snecklifter!)&lt;br /&gt;
&lt;br /&gt;
* Credential Method: Shared Key&lt;br /&gt;
* Main Mode, IP Address&lt;br /&gt;
&lt;br /&gt;
Phase 1:&lt;br /&gt;
&lt;br /&gt;
* SHA1-HMAC&lt;br /&gt;
* 3DES-CBC&lt;br /&gt;
* Neg expires in 0kb, 8 hours&lt;br /&gt;
* DH group 2&lt;br /&gt;
* Enabled DPD (Note that this is important, IKE Keep alive is proprietary and does not work)&lt;br /&gt;
&lt;br /&gt;
Phase 2:&lt;br /&gt;
&lt;br /&gt;
* SHA1-HMAC&lt;br /&gt;
* AES 256&lt;br /&gt;
* Untick TOS for IPSEC&lt;br /&gt;
* Enable PFS&lt;br /&gt;
* key expiry in 128000kb, 24 hours&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to an eSoft InstaGate? ===&lt;br /&gt;
&lt;br /&gt;
The default InstaGate and Untangle settings can be used to create a connection.&lt;br /&gt;
&lt;br /&gt;
* Network: Local Network to Remote Network&lt;br /&gt;
* Key Management: Automatic (Shared Secret)&lt;br /&gt;
&lt;br /&gt;
IKE Settings (Phase 1):&lt;br /&gt;
&lt;br /&gt;
* 24 hours, 0 KB &lt;br /&gt;
* Strict PFS disabled &lt;br /&gt;
* Aggressive Mode disabled&lt;br /&gt;
* High Security&lt;br /&gt;
&lt;br /&gt;
IPSec Settings (Phase 2):&lt;br /&gt;
&lt;br /&gt;
* 1 hours, 0 KB &lt;br /&gt;
* PFS Group 2 (DH) &lt;br /&gt;
* High Security&lt;br /&gt;
&lt;br /&gt;
=== How can I connect IPsec from Untangle to a Sonicwall? ===&lt;br /&gt;
&lt;br /&gt;
Sonicwall Configuration is listed below. &lt;br /&gt;
&lt;br /&gt;
General:&lt;br /&gt;
&lt;br /&gt;
* Authentication Method: IKE using Pre-shared Secret&lt;br /&gt;
* IPsec Primary Gateway Name or Address: WAN IP on Untnagle&lt;br /&gt;
* Enter Shared Secret&lt;br /&gt;
&lt;br /&gt;
Network:&lt;br /&gt;
&lt;br /&gt;
* Local Networks: Choose local network from list, select predefined network.&lt;br /&gt;
* Destination Networks: Choose local network from list, select predefined network.&lt;br /&gt;
&lt;br /&gt;
Proposals:&lt;br /&gt;
&lt;br /&gt;
IKE (Phase 1) Proposal&lt;br /&gt;
* Exchange: Main Mode&lt;br /&gt;
* DH Group: Group 2&lt;br /&gt;
* Encryption: 3DES&lt;br /&gt;
* Authentication: SHA1&lt;br /&gt;
* Life Time: 28800&lt;br /&gt;
&lt;br /&gt;
Ipsec (Phase 2) Proposal&lt;br /&gt;
* Protocol: ESP&lt;br /&gt;
* Encryption: AES-128&lt;br /&gt;
* Authentication: SHA1&lt;br /&gt;
* Enable Perfect Forward Secrecy: Enabled (checked)&lt;br /&gt;
* DH Group: Group 2&lt;br /&gt;
* Life Time: 28800&lt;br /&gt;
&lt;br /&gt;
Advanced:&lt;br /&gt;
* Enable Keep Alive: Enabled (checked)&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=OpenVPN_FAQs&amp;diff=4503</id>
		<title>OpenVPN FAQs</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=OpenVPN_FAQs&amp;diff=4503"/>
		<updated>2017-04-11T23:39:14Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Can I still use OpenVPN if my Untangle does not have a public IP? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:FAQs]]&lt;br /&gt;
&lt;br /&gt;
=== What operating systems are supported? ===&lt;br /&gt;
&lt;br /&gt;
OpenVPN supports most operating system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Microsoft Windows ====&lt;br /&gt;
&lt;br /&gt;
The OpenVPN client that Untangle distributes is compatible with all versions of Windows, however if you&#039;re using Windows Vista or Windows 7 you&#039;ll need to &#039;&#039;&#039;both install and run&#039;&#039;&#039; the application as an Administrator - simply right-click and choose &#039;&#039;&#039;Run as Administrator&#039;&#039;&#039;. Running as an administrator is necessarily to allow the application to write routes for the VPN and must be done every time the application is started on Windows Vista or 7.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Apple Mac ====&lt;br /&gt;
&lt;br /&gt;
For Macs, we suggest [https://code.google.com/p/tunnelblick http://code.google.com/p/tunnelblick tunnelblick].  &lt;br /&gt;
&lt;br /&gt;
# Download and install an OpenVPN client for MacOSX&lt;br /&gt;
# Login to the Untangle Server, download the client config file zip and extract the files from the zip file. &lt;br /&gt;
# Place it in the ~/Library/Application Support/Tunnelblick/Configurations folder on the Mac. &lt;br /&gt;
# Run Tunnelblick by double-clicking its icon in the Applications folder.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Linux ====&lt;br /&gt;
&lt;br /&gt;
For all other operating systems Untangle distributes a .zip with configuration and certificate files - these can be used with any OpenVPN-compatible VPN software on any operating system. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I use it with my phone or tablet? ===&lt;br /&gt;
&lt;br /&gt;
For smartphones, you&#039;ll need to install and run a VPN client that supports OpenVPN. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== iOS based iPhones and iPads ====&lt;br /&gt;
&lt;br /&gt;
[[File:Ios-openvpn.png|200px|thumb]]&lt;br /&gt;
&lt;br /&gt;
For iPhones, we suggest OpenVPN Connect available on iTunes https://itunes.apple.com/us/app/openvpn-connect/id590379981?mt=8&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Install OpenVPN Connect app on your iPhone or iPad.&lt;br /&gt;
# Login to the Untangle Server, download the client config file by selecting &amp;quot;client&#039;s configuration zip for other OSs&amp;quot;.&lt;br /&gt;
# Unzip the config file.&lt;br /&gt;
# Open iTunes and select the .ovpn, .crt, and .key files from the config zip to add to the app on your iPhone or iPad.&lt;br /&gt;
&lt;br /&gt;
[[File:Openvpn-ios-add-files.jpg|200px|thumb]]&lt;br /&gt;
&lt;br /&gt;
==== Android Based Phones ====&lt;br /&gt;
&lt;br /&gt;
[[File:Openvpn-on-android.png|200px|thumb]]&lt;br /&gt;
&lt;br /&gt;
OpenVPN for Android 4.0+ is available for connecting to Untangle OpenVPN.  Detailed instructions from our forum contributor WebFool. http://forums.untangle.com/openvpn/30472-openvpn-android-4-0-a.html  &lt;br /&gt;
&lt;br /&gt;
# Download/Install Openvpn for Android on your android unit.&lt;br /&gt;
## https://play.google.com/store/apps/details?id=net.openvpn.openvpn&lt;br /&gt;
# Then download the Openvpn Configuration files from the Untangle Unit.&lt;br /&gt;
# Unzip them and copy them to the Phone/SDcard.&lt;br /&gt;
# Now Open &amp;quot;Openvpn for Android&amp;quot;&lt;br /&gt;
# Click &amp;quot;All your precious VPNs&amp;quot;&lt;br /&gt;
# In the top right corner Click on the folder.&lt;br /&gt;
# Browse to the folder where you have the OpenVPN .Conf file. Click on the file and hit Select&lt;br /&gt;
# Then in the top right corner hit the little Floppy disc Icon to save the import.&lt;br /&gt;
# Now you should see &amp;quot;imported profile&amp;quot; click on it to connect to the tunnel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== With OpenVPN, can I force all network traffic through the VPN tunnel? ===&lt;br /&gt;
&lt;br /&gt;
Yes, you can run &amp;quot;Full Tunnel&amp;quot; which forces all internet-bound traffic to go through the VPN and out the Untangle on the remote end (and is subject to all Untangle filtering). If running as a &amp;quot;Split Tunnel&amp;quot; where &#039;&#039;Full Tunnell&#039;&#039; is not checked only traffic to exported networks only will go through the VPN.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I still use OpenVPN if my Untangle does not have a public IP? ===&lt;br /&gt;
&lt;br /&gt;
Sometimes Untangle is installed behind another router (typically as a bridge). You can still run OpenVPN, however you will need to make some additional changes so remote clients can connect to the server:&lt;br /&gt;
&lt;br /&gt;
# Port forward UDP port 1194 from your router to the Untangle server. This will allow remote clients to connect to Untangle even though it doesn&#039;t have a public IP.&lt;br /&gt;
# Configure your public address in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Hostname]]. This is the address in the distributed clients that remote clients and networks will attempt to connect to.&lt;br /&gt;
&lt;br /&gt;
=== Can I use OpenVPN on both of my WAN connections? ===&lt;br /&gt;
&lt;br /&gt;
Yes. The client chooses which WAN to connect to; the server will answer via the same WAN the client connected on. The client chooses based on your configuration of Public Address. If the Public Address fails it will then try the IPs of the WANs manually as configured in the conf file.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Is there a way to setup a password for the OpenVPN users? ===&lt;br /&gt;
&lt;br /&gt;
Yes, if you right click on the OpenVPN icon on the client&#039;s PC there is an option for a password - please note this password is only used when launching the client.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== OpenVPN connects, however I can not access anything. Why is this? ===&lt;br /&gt;
&lt;br /&gt;
Many things could cause this issue. First verify that the hosts that you are trying to reach are exported in &#039;&#039;Exported Networks.&#039;&#039; After connecting OpenVPN, try to ping Untangle&#039;s LAN IP address (if exported), then try to bring up the UI by entering the IP in a browser. If these work your tunnel is up and operational. If you can&#039;t reach a Windows machine, verify Windows Firewall is disabled on the target machine as it will block access from non-local subnets by default. If the target machine runs another OS, verify it is either using Untangle as a gateway or the machine its using as a gateway has a static route sending the VPN Address Pool to the Untangle.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I restrict access to certain OpenVPN users? ===&lt;br /&gt;
&lt;br /&gt;
By default, openvpn users can connect to any machine that the Untangle can connect to. However, routes are pushed to all the &amp;quot;Exported&amp;quot; network automatically. Beware, nothing prevents adding remote users that have administrator access to their machines to add routes manually.&lt;br /&gt;
&lt;br /&gt;
If restricting access to OpenVPN users is a concern, [[Firewall]] rules or [[Filter Rules#Forward Filter Rules|Forward Filter Rules]] can be used. In the [[Firewall]], the easiest way is to create a block rule blocking traffic when &#039;&#039;Source Interface&#039;&#039; == &#039;&#039;OpenVPN&#039;&#039;. Above that rule create rules to allow traffic when &#039;&#039;Username&#039;&#039; is the openvpn user you want to allow to the desired locations. In this scenario openvpn traffic will be blocked into your network except for explicitly allowed traffic.&lt;br /&gt;
&lt;br /&gt;
Using rules you can limit access to certain resources to only the desired remote users.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Can I create site-to-site tunnels with non-Untangle devices? ===&lt;br /&gt;
&lt;br /&gt;
When using OpenVPN for site-to-site tunnels Untangle only supports using other Untangle boxes as endpoints. Some users have had success with DD-WRT and Tomato, but this is not supported by Untangle. If you need to connect a VPN tunnel to a non-Untangle device, we recommend using [[IPsec VPN]]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m using site-to-site and my software clients can only talk to the main server. Why? ===&lt;br /&gt;
&lt;br /&gt;
If you have both software clients on the road and site-to-site tunnels, the software clients will only be able to see your main site by default. To allow them to transit the tunnel(s) to other sites, simply add the &#039;&#039;&#039;VPN Address Pool&#039;&#039;&#039; to the &#039;&#039;&#039;Exported Hosts and Networks&#039;&#039;&#039;. After this is done, software clients will be able to reach all exported sites.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How can I allow software clients to resolve DNS over the tunnel? ===&lt;br /&gt;
&lt;br /&gt;
To allow DNS resolution for remote clients you&#039;ll need to modify some OpenVPN settings - if Untangle is doing DNS resolution on your network, simply check &#039;&#039;&#039;Push DNS&#039;&#039;&#039; in &#039;&#039;&#039;OpenVPN Settings &amp;gt; Server &amp;gt; Groups &amp;gt; Group Name&#039;&#039;&#039; for any groups you want to push DNS settings to. Configure the DNS settings you would like pushed to the remote clients. You may need to use the [http://en.wikipedia.org/wiki/Fully_qualified_domain_name FQDN] when accessing resources across the tunnel.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do I auto-start OpenVPN when my computer boots? ===&lt;br /&gt;
&lt;br /&gt;
This only applies to Windows XP Pro, Vista, &amp;amp; Windows 7 to auto-start OpenVPN on boot:&lt;br /&gt;
First, Navigate to C:\Program Files\OpenVPN\config. This directory will have sitename.conf, sitename.ovpn and subdirectory untangle-vpn. In this directory, identify the .ovpn file that corresponds to your site&#039;s name.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modify OpenVPN&#039;&#039;&#039;&lt;br /&gt;
#Go to START &amp;gt; Control Panel  &amp;gt; Administrative  Tools  &amp;gt; Services&lt;br /&gt;
#Right click on OpenVPN and select Properties&lt;br /&gt;
#Change Startup Type to Automatic&lt;br /&gt;
#Click OK&lt;br /&gt;
#Close the Services window&lt;br /&gt;
#Close the Administrative Tools window&lt;br /&gt;
#Close Control Panel&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modify Registry&#039;&#039;&#039;&lt;br /&gt;
#Go to Start &amp;gt; Run &amp;gt; Regedit&lt;br /&gt;
#Follow path down to: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run&lt;br /&gt;
#Locate the entry for &amp;quot;openvpn-gui&amp;quot;&lt;br /&gt;
#The command reference should say: C:\Program Files\OpenVPN\bin\openvpn-gui.exe&lt;br /&gt;
#MODIFY IT TO: C:\Program Files\OpenVPN\bin\openvpn-gui.exe --connect sitename.ovpn. Where sitename is customized for your specific site.&lt;br /&gt;
#Modify the following registry value to 1: HKEY_LOCAL_MACHINE\SOFTWARE\OpenVPN-GUI\allow_service&lt;br /&gt;
#Exit RegEdit&lt;br /&gt;
When the machine restarts, the user will automatically be connected with the VPN client.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Clients are getting disconnected after 60 seconds. Why? ===&lt;br /&gt;
&lt;br /&gt;
Did you share the same client config between multiple machines. If both are running they will conflict. When the second one connects the first is disconnected. After 60 seconds the first will reconnect and disconnect the second. This repeats endlessly. Do not share the same client config with multiple machines.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== I&#039;m setting up a new client and can&#039;t connect. Why? ===&lt;br /&gt;
&lt;br /&gt;
Make sure that the IP that the client is connecting to is the public IP of the server, or that the traffic to that IP on port 1194 is being forwarded to your server. Also make sure you are testing from the outside. By default the input [[Filter Rules]] block OpenVPN clients from connecting to a server from one of its own LANs. This is to prevent clients from losing connectivity while on the local network because of a routing loop.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do load a 9.4.x (server) remote network client zip on a 10.x Untangle (client) ===&lt;br /&gt;
&lt;br /&gt;
9.4.2 site-to-site client zip will load on 10.x without modifications.  10.x has built-in converters to load 9.4 configuration zip files.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How do load a 10.0 and later (server) remote network client zip on a 9.4.x Untangle (client) ===&lt;br /&gt;
&lt;br /&gt;
The directory structure of the client config zip has changed in 10.0.  This means 9.4 Untangle instances will not load 10.0 and later config zip files correctly.  The workaround is to modify the 10.0+ zip file to the 9.4 directory structure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Modify OpenVPN config zip file for use on 9.4 instances&#039;&#039;&#039;&lt;br /&gt;
# Download client config zip from 10.0 OpenVPN server.&lt;br /&gt;
# Unzip the config zip.&lt;br /&gt;
# The directory structure is &lt;br /&gt;
#* openvpn-&amp;lt;name of untangle&amp;gt;-config&lt;br /&gt;
#**  untangle-vpn&lt;br /&gt;
#*** untangle-&amp;lt;random number&amp;gt;.conf   &lt;br /&gt;
#*** untangle-&amp;lt;random number&amp;gt;.ovpn&lt;br /&gt;
#*** key            &#039;&#039;&#039;&#039;&#039;&amp;lt;--- rename this directory to untangle-vpn&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#**** untangle-&amp;lt;random number&amp;gt;-&amp;lt;name of untangle&amp;gt;.crt&lt;br /&gt;
#**** untangle-&amp;lt;random number&amp;gt;-&amp;lt;name of untangle&amp;gt;.key&lt;br /&gt;
#**** untangle-&amp;lt;random number&amp;gt;-&amp;lt;name of untangle&amp;gt;-ca.crt&lt;br /&gt;
# Modify untangle-&amp;lt;random number&amp;gt;.conf and untangle-&amp;lt;random number&amp;gt;.ovpn files &lt;br /&gt;
#* &#039;&#039;&#039;&#039;&#039;Change the following lines:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#** cert key/untangle-4855-FortWayne.crt&lt;br /&gt;
#** key key/untangle-4855-FortWayne.key&lt;br /&gt;
#** ca key/untangle-4855-FortWayne-ca.crt&lt;br /&gt;
#* &#039;&#039;&#039;&#039;&#039;To:&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
#** cert untangle-vpn/untangle-4855-FortWayne.crt&lt;br /&gt;
#** key untangle-vpn/untangle-4855-FortWayne.key&lt;br /&gt;
#** ca untangle-vpn/untangle-4855-FortWayne-ca.crt&lt;br /&gt;
# Rezip the directory structure from the top untangle-vpn folder&lt;br /&gt;
# Import this new remote openVPN client config file to the 9.4 Untangle in VPN client mode.&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=OpenVPN&amp;diff=4502</id>
		<title>OpenVPN</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=OpenVPN&amp;diff=4502"/>
		<updated>2017-04-11T23:38:25Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource openvpn&amp;quot;&amp;gt;OpenVPN&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource openvpn_status&amp;quot;&amp;gt;OpenVPN#Status&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource openvpn_server&amp;quot;&amp;gt;OpenVPN#Server&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource openvpn_client&amp;quot;&amp;gt;OpenVPN#Client&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource openvpn_event_log&amp;quot;&amp;gt;OpenVPN#Event_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:OpenVPN_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;OpenVPN&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/openvpn.html OpenVPN Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/openvpn.html OpenVPN Screenshots]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/openvpn/ OpenVPN Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[OpenVPN FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About OpenVPN ==&lt;br /&gt;
&lt;br /&gt;
OpenVPN enables you to create an [http://en.wikipedia.org/wiki/Transport_Layer_Security SSL]-based [http://en.wikipedia.org/wiki/VPN VPN] (virtual private network) that supports both site-to-site and client-to-site tunnels. This allows your &#039;&#039;road warrior&#039;&#039; users to connect to local resources as if they were in the office, or connect the networks of several geographically distant offices together - all with the added security of encryption protecting your data. OpenVPN supports any operating system with an OpenVPN-compatible VPN client (which is almost every OS), even smartphones!&lt;br /&gt;
&lt;br /&gt;
The OpenVPN application can run as a server allowing for remote client to connect to the Untangle server, and the OpenVPN application can connect to other remote Untangle servers as a client. &lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for OpenVPN.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Status ===&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Status&#039;&#039;&#039; tab shows you a list of open connections, the time the tunnels were created and transmit statistics.&lt;br /&gt;
&lt;br /&gt;
==== Connected Remote Clients ====&lt;br /&gt;
&lt;br /&gt;
This grid shows the currently connected remote clients that are connected to this OpenVPN (if server is enabled.)&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;85%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;10%&amp;quot;|&#039;&#039;&#039;Address&#039;&#039;&#039;&lt;br /&gt;
|width=&amp;quot;70%&amp;quot;|The IP of the remote client.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Client&#039;&#039;&#039;&lt;br /&gt;
|The OpenVPN client name.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Start Time&#039;&#039;&#039;&lt;br /&gt;
|The time that the client connected.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Rx Data&#039;&#039;&#039;&lt;br /&gt;
|The amount of data received from this client in this session.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Tx Data&#039;&#039;&#039;&lt;br /&gt;
|The amount of data sent to this client in this session.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== Remote Server Status ====&lt;br /&gt;
&lt;br /&gt;
This grid shows the remote servers this OpenVPN is connecting to as a client.&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot; width=&amp;quot;85%&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Name !! Description&lt;br /&gt;
|-&lt;br /&gt;
|width=&amp;quot;10%&amp;quot;|&#039;&#039;&#039;Name&#039;&#039;&#039;&lt;br /&gt;
|width=&amp;quot;70%&amp;quot;|The name of the remote server.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Connected&#039;&#039;&#039;&lt;br /&gt;
|The current connection status&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Rx Data&#039;&#039;&#039;&lt;br /&gt;
|The amount of data received from this client in this session.&lt;br /&gt;
|-&lt;br /&gt;
|&#039;&#039;&#039;Tx Data&#039;&#039;&#039;&lt;br /&gt;
|The amount of data sent to this client in this session.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Server ===&lt;br /&gt;
&lt;br /&gt;
The Server tab includes all the configuration for OpenVPN&#039;s server functionality.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Site Name&#039;&#039; is the name of the this OpenVPN site. A random name is chosen so that it is unique. A new name can be given, but it should be unique across all Untangle sites in the organization. For example, if the company name is &amp;quot;MyCompany&amp;quot; then &amp;quot;mycompany&amp;quot; is a bad site name if you have multiple Untangles deployed as it might be used elsewhere. The &#039;&#039;Site Name&#039;&#039; &#039;&#039;&#039;must&#039;&#039;&#039; be unique.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Site URL&#039;&#039; shows the URL that remote clients will use to connect to this server. This is just for reference. Verify that this address will resolve and be publicly reachable from remote networks. This URL can be configured in [[Config]] &amp;gt; [[Network]] &amp;gt; [[Hostname]].&lt;br /&gt;
&lt;br /&gt;
If &#039;&#039;Server Enabled&#039;&#039; is checked, the OpenVPN server will run and accept connections from configured &#039;&#039;Remote Clients&#039;&#039;. If unchecked the OpenVPN server will not run and not server services will be provided.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Address Space&#039;&#039; defines an IP network/space for the VPN to use internally. The &#039;&#039;Address Space&#039;&#039; &#039;&#039;&#039;must&#039;&#039;&#039; be unique and separate from all existing networks and other address spaces on other OpenVPNs. A default will be chosen that does not conflict with the existing configuration.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;NAT OpenVPN Traffic&#039;&#039; will NAT all traffic from remote networks to local networks to a local address. This helps solve routing and host-based firewall issues. The default and recommended value is enabled. &lt;br /&gt;
&lt;br /&gt;
==== Remote Clients ====&lt;br /&gt;
&lt;br /&gt;
The Remote Clients sub-tab configures all the &#039;&#039;Remote Clients&#039;&#039; that can connect to this OpenVPN server. A &#039;&#039;Remote Client&#039;&#039; is any entity that connects to this OpenVPN server as a client. This includes both remote desktops, laptops, devices, road warriors, etc. This also includes remote OpenVPNs and remote Untangle networks.&lt;br /&gt;
&lt;br /&gt;
Initially there are no clients that are allowed to connect and an unique entry must be created for each remote client you wish to allow to connect to this server.&lt;br /&gt;
&lt;br /&gt;
To add a new &#039;&#039;Remote Client&#039;&#039; click on the Add and provide the following information:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;Enabled&#039;&#039; - If checked, this client is enabled. If unchecked, this client is disabled and can not connect.&lt;br /&gt;
* &#039;&#039;Client Name&#039;&#039; - A unique name for the client. (alphanumerics only)&lt;br /&gt;
* &#039;&#039;Group&#039;&#039; - The &#039;&#039;group&#039;&#039; for this client. More information below.&lt;br /&gt;
* &#039;&#039;Type&#039;&#039; - The type of this client. &#039;&#039;Individual Client&#039;&#039; for a single host like a remote desktop or laptop. &#039;&#039;Network&#039;&#039; for an entire remote network that the server should also be able to reach.&lt;br /&gt;
* &#039;&#039;Remote Networks&#039;&#039; - The remote network in CIDR notation if this remote client is of type &#039;&#039;Network&#039;&#039;. For example: 192.168.1.0/24 means that the 192.168.1.* network lives behind the remote client and should be reachable from the server. If there are multiple networks reachable through this remote client, a comma separated list of CIDR networks can be used. These networks are automatically &#039;&#039;exported&#039;&#039; such that hosts on the main network and other remote clients can reach these networks. &lt;br /&gt;
&lt;br /&gt;
After configuring this information save the new &#039;&#039;Remote Client&#039;&#039; by clicking &#039;&#039;OK&#039;&#039; then &#039;&#039;Apply.&#039;&#039; After saving settings, click on the &#039;&#039;Download Client&#039;&#039; button in the &#039;&#039;Remote Clients&#039;&#039; table on the row for the new client.&lt;br /&gt;
This will provide 3 links to various distributions that can be installed on the remote client.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;Click here to download this client&#039;s Windows setup.exe file.&#039;&#039; provides an .exe file that can be run on the remote client if the remote client is a standard Windows machine. Just download the file and email it or give it to the remote client via some other means. This .exe file will install the OpenVPN client software and configure it to connect to this OpenVPN server with the proper certificate information.&lt;br /&gt;
* &#039;&#039;Click here to download this client&#039;s configuration zip file for other OSs (Apple/Linux/etc).&#039;&#039; provides a zip file with the OpenVPN client configuration files. This file can be used to configure various OpenVPN clients for various OSs, like linux, apple, and even some phones/tables/devices.&lt;br /&gt;
* &#039;&#039;Click here to download this client&#039;s configuration file for remote Untangle OpenVPN clients.&#039;&#039; provides a zip file with the OpenVPN client configuration for setting up a remote OpenVPN application on Untangle to connect as a client to this server. For more information about how to install this on the remote client read the [[OpenVPN#Client]] documentation below.&lt;br /&gt;
* &#039;&#039;Click here to download this client&#039;s configuration onc file for Chromebook.&#039;&#039; provides a onc file that can be used to configure your Chromebook as a client to connect to the Untangle OpenVPN server. On the target device, browse to chrome://net-internals and use Import ONC file.&lt;br /&gt;
&lt;br /&gt;
After installing the software on the remote client, the remote client should be able to connect to the OpenVPN server.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; A client can only be connected once. If you install the same client on multiple remote devices they will kick each other off when a new one logs in. In most cases you need to setup a client for each remote device.&lt;br /&gt;
&lt;br /&gt;
==== Groups ====&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Groups&#039;&#039; are convenience feature to &amp;quot;group&amp;quot; clients together and apply some settings to that entire group.&lt;br /&gt;
By default there will be a &#039;&#039;Default Group.&#039;&#039; Each group has the following settings:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;Full Tunnel&#039;&#039; - If checked, remote clients will send ALL traffic bound to the internet through the VPN. This allows for Untangle to filter ALL internet traffic for connected clients by &amp;quot;proxying&amp;quot; it through the VPN and then out through Untangle&#039;s internet connection. This will have no effect on remote Untangle OpenVPN clients. If unchecked, then only traffic destined to the local network are subject to filtering.&lt;br /&gt;
* &#039;&#039;Push DNS&#039;&#039; - If enable, OpenVPN will &amp;quot;push&amp;quot; some DNS configuration to the remote clients when they connect. This is useful if you wish for some local names and services to properly resolve via DNS that would not publicly resolve.&lt;br /&gt;
* &#039;&#039;Push DNS Server&#039;&#039; - If set to &#039;&#039;OpenVPN Server&#039;&#039; then the IP of the Untangle server itself will be pushed to the remote clients and all remote clients will use Untangle for all DNS lookups. If &#039;&#039;Custom&#039;&#039; is selected then one or two DNS entries can be specified that will be used for DNS resolution.&lt;br /&gt;
* &#039;&#039;Push DNS Custom 1&#039;&#039; - If &#039;&#039;Push DNS Server&#039;&#039; is set to custom, this IP will be pushed to remote clients to use for DNS resolution. It is important to export this address if that traffic should travel through the VPN tunnel. If this value is blank nothing will be pushed.&lt;br /&gt;
* &#039;&#039;Push DNS Custom 2&#039;&#039; - Just like &#039;&#039;Push DNS Custom 1&#039;&#039; except this sets the secondary DNS value. If blank, no secondary DNS will be pushed.&lt;br /&gt;
* &#039;&#039;Push DNS Domain&#039;&#039; - If set this domain will be pushed to remote clients to extend their domain search path during DNS resolution.&lt;br /&gt;
&lt;br /&gt;
These settings will apply to all clients belonging to that group. Many sites will only have one group because all clients need the same settings. However, some clients have some &#039;&#039;Full Tunnel&#039;&#039; remote clients and some &#039;&#039;Split Tunnel&#039;&#039; remote clients. In this case, you need two groups where each client belongs to the appropriate group.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Exported Networks ====&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;Exported Networks&#039;&#039; is a list of networks that are reachable through the OpenVPN server for remote clients. &#039;&#039;Exported Networks&#039;&#039; are routes that are pushed to remote clients when they connect effectively telling remote clients to reach the specified network through the OpenVPN server.&lt;br /&gt;
&lt;br /&gt;
For example, exporting &#039;&#039;1.2.3.4/24&#039;&#039; will result in all &#039;&#039;1.2.3.* &#039;&#039;traffic going through the OpenVPN server. &lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Exported Networks&#039;&#039; grid is pre-populated on installation with the IP/netmask of each static non-WAN interface.&lt;br /&gt;
&lt;br /&gt;
* If &#039;&#039;Enabled&#039;&#039; is checked this network will be exported/pushed to connecting remote clients.&lt;br /&gt;
* &#039;&#039;Export Name&#039;&#039; is a name, purely used for documentation purposes.&lt;br /&gt;
* &#039;&#039;Network&#039;&#039; is the network, in CIDR notation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Client ===&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;&#039;Client&#039;&#039;&#039; tab is configures which remote servers this OpenVPN will connect to as a client.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Remote Servers ====&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;Remote Servers&#039;&#039; grid lists the currently configured remote servers that OpenVPN is configured to connect to. &lt;br /&gt;
&lt;br /&gt;
To configure a new server to connect to, first login to the remote server and configure a new client as described above and click on  the &#039;&#039;Download Client&#039;&#039; as described above in the [[OpenVPN#Remote_Clients]] section. After you have downloaded the distribution zip file return to this OpenVPN and click on the &#039;&#039;Browse&#039;&#039; button below the &#039;&#039;Remote Servers&#039;&#039; grid. Select the zip file downloaded from the OpenVPN server and then press  OK. Next press the &#039;&#039;Submit&#039;&#039; button to upload the zip file to OpenVPN which will add a new entry into the &#039;&#039;Remote Servers&#039;&#039; grid based on the configuration in the submitted zip file.&lt;br /&gt;
&lt;br /&gt;
Once connected to a remote server, you will be able to reach their exported networks. They will also be able to reach the networks on this server specified as the &#039;&#039;Remote Network&#039;&#039; in the [[OpenVPN#Remote_Clients]]  configuration.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;Note:&#039;&#039; Site to Site connections are not full-tunnel even if selected in the Group for the site to site.  Internet traffic on the remote site will exit through its local gateway.&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:OpenVPN Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/OpenVPN OpenVPN]&lt;br /&gt;
&lt;br /&gt;
[[IPsec VPN]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OpenVPN FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:OpenVPN FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Operators&amp;diff=4473</id>
		<title>Operators</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Operators&amp;diff=4473"/>
		<updated>2017-03-20T16:31:46Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Operators are used with Conditions to create custom reports and alerts. The operator is used to evaluate the value criteria specified for the given condition.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;width:1%; text-align:left; padding:5px;&amp;quot; | Operator&lt;br /&gt;
! style=&amp;quot;width:14%; text-align:left; padding:5px;&amp;quot; | Description&lt;br /&gt;
! style=&amp;quot;width:33%; text-align:left; padding:5px;&amp;quot; | Syntax&lt;br /&gt;
! style=&amp;quot;width:22%; text-align:left; padding:5px;&amp;quot; | Notes&lt;br /&gt;
! style=&amp;quot;width:30%; text-align:left; padding:5px;&amp;quot; | Example&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | =&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Equal To&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition = value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Only show Web Filter events where host accessed is &amp;quot;www.google.com&amp;quot; &#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Host [host] = www.google.com&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | != or &amp;lt;&amp;gt;&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Not Equal To&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition != value&amp;lt;br&amp;gt;Condition &amp;lt;&amp;gt; value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all Web Filter events where client IP address is not &amp;quot;192.168.2.214&amp;quot; &#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Client [c_client_addr] != 192.168.2.214&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &amp;gt;&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Greater Than&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition &amp;gt; value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all activity in Firewall for non-standard ports (1024 - 65535) &#039;&#039; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Server Port [s_server_port] &amp;gt; 1024&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &amp;lt;&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Less Than&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition &amp;lt; value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all instances where available memory was less than 500 MB. Server Status Events, found under System &amp;gt; Reports, shows memory usage.&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Memory Free [mem_free] &amp;lt; 524288000 (it is stored in the database as bytes)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &amp;gt;=&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Greater Than Or Equal To&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition &amp;gt;= value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all sessions scanned by Shield where total bytes sent to destination IP is greater than 1 GB&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; To-Server Bytes [p2s_bytes] &amp;gt;= 1073741824 (it is stored in the database as bytes)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &amp;lt;=&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Less Than Or Equal To&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition &amp;lt;= value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all instances where Free Disk Space was less than or equal to 100 GB. Server Status Events, found under System &amp;gt; Reports, shows free disk space.&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Disk Free [disk_free] &amp;lt; 100000000000 (it is stored in the database as bytes) &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | LIKE&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Similar to &lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition LIKE (%)value(%)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Often used in conjunction with % to wildcard the value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all Web Filter Events where a user accessed any part of google.com.&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Host [host] like %google.com&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | NOT LIKE&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Not Similar to &lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition NOT LIKE (%)value(%)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Often used in conjunction with % to wildcard the value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show Firewall events that do not have a destination address (server) in your ISP&#039;s subnet. Example 123.45.67.0/24&#039;&#039; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt; Server [s_server_addr] not like 123.45.67%&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | IS&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition IS NULL&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Condition IS true/false/unknown&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Condition1 IS distinct from Condition2&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Does not work with string or number values&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all Shield events where there was no username on the session.&#039;&#039; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Username [username] is NULL&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | IS NOT&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Not value&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition IS NOT NULL&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Condition IS NOT true/false/unknown&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Condition1 IS NOT distinct from Condition2&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials. &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Does not work with string or number values&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all Application Control events that have Detail values.&#039;&#039; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Detail (Application Control) [application_control_detail] is not NULL &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | IN&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is In set of values (value_1, value_2, ...)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition IN (value_1, value_2, value_3)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Only works with integer (whole number) and boolean (true/false) type values.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show In Firewall all entries for web related ports&#039;&#039; &amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Server Port [s_server_port] in (53,80,443)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | NOT IN&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Is Not In set of values (value_1, value_2, ...)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Condition NOT IN (value_1, value_2, value_3)&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | Requires an exact match it will not match partials.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Only works with integer (whole number) and boolean (true/false) type values.&lt;br /&gt;
| style=&amp;quot;text-align:left; vertical-align:top;&amp;quot; | &#039;&#039;Show all traffic in Application Control that is not email related.&#039;&#039;&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Server Port [s_server_port] not in (25,110,143,993.995.587,465)&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=4149</id>
		<title>Directory Connector</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Directory_Connector&amp;diff=4149"/>
		<updated>2016-10-05T15:18:01Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Active Directory Connector */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector&amp;quot;&amp;gt;Directory_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_user_notification_api&amp;quot;&amp;gt;Directory_Connector#User_Notification_API&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_active_directory_connector&amp;quot;&amp;gt;Directory_Connector#Active_Directory_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_radius_connector&amp;quot;&amp;gt;Directory_Connector#RADIUS_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_google_connector&amp;quot;&amp;gt;Directory_Connector#Google_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_facebook_connector&amp;quot;&amp;gt;Directory_Connector#Facebook_Connector&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource directory_connector_reports&amp;quot;&amp;gt;Directory_Connector#Reports&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:DirectoryConnector_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Directory Connector&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/directory-connector-conf.html Directory Connector Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/directory-connector-conf.html Directory Connector Screenshots]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/directory-connector/ Directory Connector Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Directory Connector FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Directory Connector ==&lt;br /&gt;
&lt;br /&gt;
Directory Connector provides functionality to integrate with Microsoft&#039;s [http://en.wikipedia.org/wiki/Active_Directory Active Directory] or servers that support [http://en.wikipedia.org/wiki/RADIUS RADIUS], as well as some tools manager the [[Host Viewer]] username mapping for the hosts on the network.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Directory Connector. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== User Notification API ===&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;User Notification API&amp;quot; is a webapp running on the NGFW that various external scripts can call to notify Untangle that a specific user is logged into a specific IP. The userapi webapp is used to update and maintain the associated usernames in the [[Host Viewer]] so that [[User Matcher]] in [[Rules]] match correctly. When a username is associated with the &#039;&#039;Username&#039;&#039; in [[Rules#Condition_List|rules conditions]] matches as expected.&lt;br /&gt;
&lt;br /&gt;
This API can be called:&lt;br /&gt;
&lt;br /&gt;
# manually&lt;br /&gt;
# via the &#039;&#039;User Notification Login Script&#039;&#039;&lt;br /&gt;
# via the &#039;&#039;Active Directory Server Login Monitor Agent&#039;&#039;&lt;br /&gt;
# via any custom script or external program&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Enable/Disable&#039;&#039;&#039; If enabled the User Notification API is enabled. If disabled, the User Notification is completely disabled.&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: If specified, only API calls specifying the correct secret key will be allowed. All other requests are ignored. If not specified, all calls from all sources are accepted. &lt;br /&gt;
&lt;br /&gt;
The webapp lives at &#039;&#039;http://SERVERIP/userapi/registration&#039;&#039; on the server and can be called with the following arguments:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
|+&lt;br /&gt;
! Argument !! Example !! Description&lt;br /&gt;
|- &lt;br /&gt;
| clientIp&lt;br /&gt;
| 192.168.1.100&lt;br /&gt;
| The client IP address of the host in question &lt;br /&gt;
|- &lt;br /&gt;
| username&lt;br /&gt;
| foobar&lt;br /&gt;
| The username to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| hostname&lt;br /&gt;
| machinename&lt;br /&gt;
| The hostname to associate with the client IP.&lt;br /&gt;
|-&lt;br /&gt;
| action&lt;br /&gt;
| &#039;&#039;login&#039;&#039; or &#039;&#039;logout&#039;&#039;&lt;br /&gt;
| The action, &#039;&#039;login&#039;&#039; is assumed if no action is specified. &#039;&#039;login&#039;&#039; with associate the username and hostname of the specified client IP. &#039;&#039;logout&#039;&#039; will unset the client IP&#039;s associated username.&lt;br /&gt;
|-&lt;br /&gt;
| secretKey&lt;br /&gt;
| foobarsecret&lt;br /&gt;
| If this argument does not match the specified secretKey the call will be ignored.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
For example, If the NGFW internal IP is 192.168.1.1 without a secretKey, to associate user &amp;quot;foobar&amp;quot; on machine &amp;quot;foobarpc&amp;quot; to 192.168.1.100 you would call visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=login&amp;amp;clientIP=192.168.1.100&amp;amp;username=foobar&amp;amp;hostname=foobarpc&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
To unset that username mapping when the client logs out simply visit this URL:&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;http://192.168.1.1/userapi/registration?action=logout&amp;amp;clientIP=192.168.1.100&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Obviously visiting these URLs manually each time a user logs in or out of a machine is not realistic.&lt;br /&gt;
Typically this process is automated in one of two ways described below or using a custom script.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== User Notification Login Script ====&lt;br /&gt;
&lt;br /&gt;
The &#039;&#039;User Notification Login Script&#039;&#039; or &#039;&#039;UNLS&#039;&#039; which is a small script that runs at login on each machine to notify the NGFW when a user logs in. This script can be pushed out to all the machines in a domain via a group policy object. This is useful in cases where you want to set the username in the [[Host Viewer]] without having users manually log into the [[Captive Portal]].&lt;br /&gt;
&lt;br /&gt;
Once installed, the script starts each time a user logs on to the network and immediately notifies Untangle of the username and IP address. Once this process is finished, any activity for that IP address will be automatically mapped to the username. This scripts runs on login and periodically in the background to keep the Directory Connector Username Map updated with any current information on your network users. &lt;br /&gt;
&lt;br /&gt;
To download the User Notification Login Script, click on the &#039;&#039;&#039;Download User Notification Login Script&#039;&#039;&#039; button and download the script. The script will be configured for your environment but may require further customization. Review the script and make changes as needed.&lt;br /&gt;
&lt;br /&gt;
Now that you have the UNLS on your Domain Controller, you need to decide if you want it run for [[#UNLS for the entire domain | all domain users]] or [[#UNLS for specific users | only for specific users]].&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for the entire domain =====&lt;br /&gt;
&lt;br /&gt;
To apply UNLS to the your entire domain you&#039;ll need to set up a new [http://en.wikipedia.org/wiki/Group_policies Group Policy Object] - please follow the instructions below.&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Log on to the Domain Controller, then launch the Group Policy Management Console (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpmc.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# From the Group Policy Management Console, right-click on the domain and select &#039;&#039;&#039;Create and Link a GPO here&#039;&#039;&#039;.&lt;br /&gt;
# Specify a name for the Group Policy.&lt;br /&gt;
# Right-click on the group policy that you just created and click Edit.&lt;br /&gt;
# Go to &#039;&#039;&#039;User Configuration &amp;gt; Windows Settings &amp;gt; Scripts (Logon/Logoff)&#039;&#039;&#039;.&lt;br /&gt;
# Click on the &#039;&#039;&#039;Logon&#039;&#039;&#039; icon, then &#039;&#039;&#039;Show Files&#039;&#039;&#039;. Windows Explorer will launch into the correct directory.&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded to this location.&lt;br /&gt;
# Click the &#039;&#039;&#039;Add&#039;&#039;&#039; button, browse for the script, then click &#039;&#039;&#039;OK&#039;&#039;&#039;.&lt;br /&gt;
# In the Logon Properties window, click Add , type a descriptive script name, then click ok.&lt;br /&gt;
# In the &#039;&#039;&#039;Select User, Computer or Group&#039;&#039;&#039; window, select the OU or Group to which you want to apply this GPO.&lt;br /&gt;
# From a command prompt, activate the group policy that you just created: &amp;lt;tt&amp;gt;gpupdate /force&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
You can verify it is working by looking in the Event Log for login/logout events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===== UNLS for specific users =====&lt;br /&gt;
&lt;br /&gt;
If you only want to use the UNLS for a few users, you can use these instructions:&lt;br /&gt;
&lt;br /&gt;
# Click on the &#039;&#039;Download User Notification Login Script&#039;&#039; and save the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# Using a text editor, create a &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file that has the following lines:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
@ echo off&lt;br /&gt;
\\ADServerIPAddress\netlogon\user_notification.vbs&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
# Save the &amp;lt;tt&amp;gt;local.bat&amp;lt;/tt&amp;gt; file to &amp;lt;tt&amp;gt;\\localhost\\NETLOGON&amp;lt;/tt&amp;gt;.&lt;br /&gt;
# From the domain, go to the &#039;&#039;&#039;Users&#039;&#039;&#039; folder, right-click the user and go to Properties.&lt;br /&gt;
# On the Profile tab, type the filename of the UNLS (probably &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt;) in the Logon script field.&lt;br /&gt;
# Launch the Group Policy Management Console, then launch the [http://technet.microsoft.com/en-us/library/cc736591(v=WS.10).aspx Group Policy Object Editor] (&#039;&#039;&#039;Start &amp;gt; Run&#039;&#039;&#039;: &amp;lt;tt&amp;gt;gpedit.msc&amp;lt;/tt&amp;gt;).&lt;br /&gt;
# Copy the &amp;lt;tt&amp;gt;user_notification.vbs&amp;lt;/tt&amp;gt; file that you downloaded in the first step to this location.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Active Directory Server Login Monitor Agent ====&lt;br /&gt;
&lt;br /&gt;
The other way to call the User Notification API is by running an agent/monitor on the Active Directory Server. The agent monitors the server&#039;s login events and updates the Untangle NGFW when a user logs to a computer.&lt;br /&gt;
This has several advantages over the UNLS. &lt;br /&gt;
&lt;br /&gt;
# It allows you to set a secretKey that only the agent knows, so only the AD server itself can update the username mapping. (users have no way of overriding changing the information)&lt;br /&gt;
# It is not necessary to run a login/logout script on all machines. No GPO is necessary.&lt;br /&gt;
&lt;br /&gt;
First download and install the agent on the Active Directory server. and configure it so that it updates the Untangle NGFW server when it sees user login events.&lt;br /&gt;
&lt;br /&gt;
[https://support.untangle.com/hc/en-us/articles/201885626-Active-Directory-Login-Monitor-Installation Installation Guide]&lt;br /&gt;
&lt;br /&gt;
[http://download.untangle.com/UntangleActiveDirectoryMonitorSetup.exe Download]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Configure the &#039;&#039;NGFW Settings&#039;&#039; in Login Monitor so it updates your Untangle NGFW event when login events occur.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitor.png|center|frame|The AD Server Login Monitor]]&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;Secret Key&#039;&#039;&#039;: The Secret Key if there is a &#039;&#039;Secret Key&#039;&#039; configured on the NGFW [[#User_Notification_API]]. User Notification must be enabled on the NGFW. If no &#039;&#039;Secret Key&#039;&#039; is configured leave it blank.&lt;br /&gt;
*&#039;&#039;&#039;Prefix&#039;&#039;&#039;: The protocol to use to communicate with the NGFW Untangle Server.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use to communicate with the NGFW Untangle Server  The default is port 80 for HTTP and 443 for HTTPS.&lt;br /&gt;
*&#039;&#039;&#039;IP Addresses&#039;&#039;&#039;: The IP addresses to reach your NGFW Untangle Servers.  Generally this should be the LAN addresses of your NGFW Untangle Servers.  By default HTTP and HTTPS is closed on the WAN side of NGFW Untangle Server.  If the Login Monitor Agent cannot reach the NGFW, an error icon is shown next to the NGFW IP address entry.&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorError.png|center|frame|Error reaching NGFW Untangle Server]]&lt;br /&gt;
&lt;br /&gt;
The Exempt IP Addresses tab is a list of IP addresses which Login Monitor should ignore for login events.  IP addresses are accepted in the following format:&lt;br /&gt;
&lt;br /&gt;
*Single IP address (192.168.2.2)&lt;br /&gt;
*Wildcard IP address (192.168.3.*)&lt;br /&gt;
*CIDR (192.168.4.0/24)&lt;br /&gt;
*Range (192.168.5.5-192.168.5.102)&lt;br /&gt;
&lt;br /&gt;
[[Image:ADServerLoginMonitorIPAddresses.png|center|frame|Exempt IP Address Tab]]&lt;br /&gt;
&lt;br /&gt;
The Exempt Users tab is a list of AD users which Login show ignore for login events.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Active Directory Connector ===&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector allows Untangle to communicate with the Active Directory server. This is useful for two things:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their AD login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
# Allow Untangle to query the groups so the it knows which groups a user belongs to. If this is configured the [[Rules#Condition_List|User in Group]] matcher in [[Rules]] will correctly match.&lt;br /&gt;
&lt;br /&gt;
Before configuring the &#039;&#039;Active Directory Connector&#039;&#039; here are a few important steps:&lt;br /&gt;
&lt;br /&gt;
#Ensure that your Active Directory users are in one domain. Users can be in multiple Active Directory Organizational Units (OUs), but must be under one domain - multiple domains are not supported at this time.&lt;br /&gt;
#Check to see if you have the [http://www.microsoft.com/download/en/details.aspx?displaylang=en&amp;amp;id=21895 Group Policy Management Console] installed; if not, install it.&lt;br /&gt;
#If you&#039;re running Active Directory on Windows Server 2008, please see this [[#Is this supported with all versions of Active Directory? | FAQ]] entry on disabling the Signed LDAP requirement if you have installed with the strictest security settings.&lt;br /&gt;
&lt;br /&gt;
The Active Directory Connector tab contains settings for connecting and communicating with a Domain Controller. Other applications such as [[Captive_Portal| Captive Portal]] can use Directory Connector to authenticate and identify users against an existing Domain Controller.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;AD Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the AD server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Secure&#039;&#039;&#039;: Enable SSL for the connection to the AD server. &lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the AD server. The default is 389.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Login&#039;&#039;&#039;: Enter an Active Directory Administrator login.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Password&#039;&#039;&#039;: Enter an Active Directory Administrator password.&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Domain&#039;&#039;&#039;: Your domain, (e.g. mycompany.local).&lt;br /&gt;
*&#039;&#039;&#039;Active Directory Organization&#039;&#039;&#039;: The Active Directory organization unit (OU) that contains the users. If you want the Untangle Server to find all users, leave this blank.&lt;br /&gt;
:If for some reason you want to limit the users to a specific part of the domain tree, specify the OU path in the format of &amp;lt;tt&amp;gt;OU=ouName&amp;lt;/tt&amp;gt;.  Only one OU can be entered. &lt;br /&gt;
&lt;br /&gt;
You can use the test tools to verify your settings and view an &#039;&#039;incomplete&#039;&#039; user list. After Active Directory is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Google Connector ===&lt;br /&gt;
&lt;br /&gt;
The Google Connector allows Untangle to communicate and link with your Google account, specifically to upload data to your Google Drive.&lt;br /&gt;
&lt;br /&gt;
To enable Untangle to connect to Google Drive, click the &#039;&#039;Configure Google Drive&#039;&#039; button. It will open a window to google where you have to grant Untangle permission to connect to your google drive account.&lt;br /&gt;
&lt;br /&gt;
If you click &#039;&#039;Allow&#039;&#039; Untangle will be able to access the Google Drive API for your account.&lt;br /&gt;
&lt;br /&gt;
Allow Untangle to connect to Google Drive enables [[Reports]] to upload reporting CSVs and reporting data to Google Drive, and enables [[Configuration Backup]] to backup to Google Drive. To configure that functionality edit the settings of the respective app.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== RADIUS Connector ===&lt;br /&gt;
&lt;br /&gt;
The RADIUS Connector allows Untangle to communicate with a RADIUS server. This is useful for:&lt;br /&gt;
&lt;br /&gt;
# Allowing users to login to [[Captive Portal]] using their RADIUS login/password. The [[Captive Portal]] will verify the authentication information directly with the AD server.&lt;br /&gt;
&lt;br /&gt;
The RADIUS tab contains settings to configure communication with the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
*&#039;&#039;&#039;RADIUS Server IP or Hostname&#039;&#039;&#039;: The IP or hostname of the RADIUS server - we recommend using the IP to prevent DNS issues.&lt;br /&gt;
*&#039;&#039;&#039;Port&#039;&#039;&#039;: The port to use when connecting to the RADIUS server. The default is 1812.&lt;br /&gt;
*&#039;&#039;&#039;Shared Secret&#039;&#039;&#039;: This must match the shared secret set on the RADIUS server.&lt;br /&gt;
*&#039;&#039;&#039;Authentication Method&#039;&#039;&#039;: This must match the authentication method used by the RADIUS server.&lt;br /&gt;
&lt;br /&gt;
You can use the test tool to verify your settings. After RADIUS is configured, you can configure Captive Portal to use it for authenticating users if you wish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector Reports}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
[[Policy Manager]]&lt;br /&gt;
&lt;br /&gt;
[[Captive Portal]]&lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Active_Directory Active Directory]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Directory Connector FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Directory Connector FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=12.0.1_Changelog&amp;diff=3858</id>
		<title>12.0.1 Changelog</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=12.0.1_Changelog&amp;diff=3858"/>
		<updated>2016-04-28T18:32:19Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Changes */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Changelogs]]&lt;br /&gt;
= Overview = &lt;br /&gt;
&lt;br /&gt;
12.0.1 is a bugfix release with some minor bugfixes for 12.0.0. It also does some necessary changes to prepare for the upgrade to 12.1. 12.0.1 is an &amp;quot;unskippable upgrade&amp;quot; so all servers will have to upgrade to 12.0.1 before going to 12.1&lt;br /&gt;
&lt;br /&gt;
= Changes =&lt;br /&gt;
&lt;br /&gt;
* Fix some LCD driver startup issues.&lt;br /&gt;
* Add more attempts for spamassassin to get signatures.&lt;br /&gt;
* Some more SSL handling fixes.&lt;br /&gt;
* Turn off SMTPS SSL scanning by default.&lt;br /&gt;
* Revert back to separate block/tarpit settings in [[Application Control]].&lt;br /&gt;
&lt;br /&gt;
= Minor build updates =&lt;br /&gt;
&lt;br /&gt;
[[Date Changelog]]&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Web_Filter_Lite&amp;diff=3844</id>
		<title>Web Filter Lite</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Web_Filter_Lite&amp;diff=3844"/>
		<updated>2016-04-25T16:17:26Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Advanced */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite&amp;quot;&amp;gt;Web_Filter_Lite&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_block_lists&amp;quot;&amp;gt;Web_Filter_Lite#Block_Lists&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_block_categories&amp;quot;&amp;gt;Web_Filter_Lite#Block_Categories&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_block_sites&amp;quot;&amp;gt;Web_Filter_Lite#Block_Sites&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_block_filetypes&amp;quot;&amp;gt;Web_Filter_Lite#Block_File_Types&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_block_mimetypes&amp;quot;&amp;gt;Web_Filter_Lite#Block_MIME_Types&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_pass_sites&amp;quot;&amp;gt;Web_Filter_Lite#Pass_Sites&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_pass_clients&amp;quot;&amp;gt;Web_Filter_Lite#Pass_Clients&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_advanced&amp;quot;&amp;gt;Web_Filter_Lite#Advanced_Settings&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_lite_event_log&amp;quot;&amp;gt;Web_Filter_Lite#Event_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:WebFilterLite_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Web Filter Lite&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/web-filter.html Web Filter Lite Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/web-filter.html Web Filter Lite Screenshots]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/web-filter-lite/ Web Filter Lite Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Web Filter Lite Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Web Filter Lite FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Web Filter Lite ==&lt;br /&gt;
&lt;br /&gt;
Web Filter Lite monitors HTTP traffic on your network to monitor user behavior and block inappropriate content.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Web Filter.&lt;br /&gt;
&lt;br /&gt;
=== Block Categories ===&lt;br /&gt;
&lt;br /&gt;
Block Categories allows you to customize which categories of sites will be blocked or flagged. Categories that are blocked will display a block page to the user; categories that are flagged will allow the user to access the site, but will be silently flagged as a violation for event logs and [[Reports]]. These block/flag actions operate the same way for all of the different Web Filter options.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_blockCategoriesLite.png|center|frame|Block categories]]&lt;br /&gt;
&lt;br /&gt;
=== Block Sites ===&lt;br /&gt;
Under Blocked Sites you can add individual domain names you want to be blocked or flagged - just enter the domain name (e.g. youtube.com) and specify your chosen action. This list uses [[URL Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_blockList.png|center|frame|A few sites entered into the Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Block File Types ===&lt;br /&gt;
The Block File Types section allows you to block files by file extension - just select (or add) your chosen file extension, check your preferred action, and save. This list uses [[Glob Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_fileType.png|center|frame|The File Types Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Block MIME Types ===&lt;br /&gt;
The Block MIME Types section allows you to block files by MIME types - just select (or add) your chosen file extension, check your preferred action, and save. This list uses [[Glob Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_mimeType.png|center|frame|The MIME Types Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Pass Sites ===&lt;br /&gt;
&lt;br /&gt;
Pass Sites is used to pass content that would have otherwise been blocked. This can be useful for &amp;quot;unblocking&amp;quot; sites that you don&#039;t want blocked according to block settings.  Any domains you add to the Passed Sites list will be allowed, even if blocked by category or by individual URL - just add the domain and save. Unchecking the pass option will allow the site to be blocked as if the entry was not present. This list uses [[URL Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_PassList.png|center|frame|A few sites entered into the Pass List]]&lt;br /&gt;
&lt;br /&gt;
=== Pass Clients ===&lt;br /&gt;
&lt;br /&gt;
If you add an IP address to this list, Web Filter will not block any traffic from that IP regardless of the blocked categories or sites. Just add the IP and save. Unchecking the pass option will have the block/pass lists affect the user as if they were not entered into the Passed Client IPs list. This list uses [[IP Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
:If you have a few users that need to completely bypass Web Filter controls, consider using pass lists. If you have users that simply need different Web Filter settings, you should set up a separate rack using [[Policy Manager]]. When using this feature, please remember that DHCP IPs can change, so you&#039;ll probably want to set up either a Static IP or a Static DHCP Lease for the machine in question.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_PassClientList.png|center|frame|A few different entries in the Pass Listed Client IPs list]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced ===&lt;br /&gt;
The Advanced section allows you to configure additional web filter options.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Block pages from IP only hosts&#039;&#039;&#039;: When this option is enabled, users entering an IP address rather than domain name will be blocked.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Pass if referers match Pass Sites&#039;&#039;&#039;.  When this option is checked, if a page contains external content from any site in &#039;&#039;Pass Sites&#039;&#039;, that external content will be passed regardless of other block policies.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Block Google applications&#039;&#039;&#039;: When this option is enabled, only domains listed in &#039;&#039;&#039;Domain&#039;&#039;&#039; are allowed to access Google applications such as Gmail.  All others are blocked by Google.  Multiple domains can be specified, separated by commas such as:&lt;br /&gt;
::&amp;lt;tt&amp;gt;untangle.com,domain.com&amp;lt;/tt&amp;gt;.  &lt;br /&gt;
:&#039;&#039;NOTE: SSL Inspector must be installed and running with the Inspect Google Traffic configured to Inspect.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Unblock&#039;&#039;&#039;:  This section can be used to add a button to allow users to bypass restrictions on a case-by-case basis.&lt;br /&gt;
&lt;br /&gt;
:If Unblock is set to &#039;&#039;&#039;None&#039;&#039;&#039; no users will be allowed to bypass the block page. If Unblock is set to &#039;&#039;&#039;Temporary&#039;&#039;&#039; users will be allowed to visit the site for one hour from the time it is unblocked. If Unblock is set to &#039;&#039;&#039;Permanent and Global&#039;&#039;&#039; then users will be allowed to visit the site and unblocked sites will be added to the permanent global pass list so it will always be allowed in the future.&lt;br /&gt;
&lt;br /&gt;
:You also have the option of setting a password to Unblock; it can either be the existing Administrator password for the Untangle or you can set a new, separate password only for the Unblock feature.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_advancedLite.png|center|frame|Advanced options]]&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter Lite Reports}}&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[Web Filter]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Web Filter Lite FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter Common FAQs}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter Lite FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
	<entry>
		<id>https://wiki.edge.arista.com/index.php?title=Web_Filter&amp;diff=3843</id>
		<title>Web Filter</title>
		<link rel="alternate" type="text/html" href="https://wiki.edge.arista.com/index.php?title=Web_Filter&amp;diff=3843"/>
		<updated>2016-04-25T16:17:03Z</updated>

		<summary type="html">&lt;p&gt;Cknickerbocker: /* Advanced */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Category:Applications]]&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter&amp;quot;&amp;gt;Web_Filter&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_block_lists&amp;quot;&amp;gt;Web_Filter#Block_Lists&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_block_categories&amp;quot;&amp;gt;Web_Filter#Block_Categories&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_block_sites&amp;quot;&amp;gt;Web_Filter_Lite#Block_Sites&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_block_filetypes&amp;quot;&amp;gt;Web_Filter#Block_File_Types&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_block_mimetypes&amp;quot;&amp;gt;Web_Filter#Block_MIME_Types&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_pass_sites&amp;quot;&amp;gt;Web_Filter#Pass_Sites&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_pass_clients&amp;quot;&amp;gt;Web_Filter#Pass_Clients&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_event_log&amp;quot;&amp;gt;Web_Filter#Event_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_query_event_log&amp;quot;&amp;gt;Web_Filter#Query_Event_Log&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;display:none&amp;quot; class=&amp;quot;helpSource web_filter_advanced&amp;quot;&amp;gt;Web_Filter#Advanced&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&#039;100%&#039;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | [[Image:WebFilter_128x128.png]] &amp;amp;nbsp; &amp;amp;nbsp; &#039;&#039;&#039;Web Filter&#039;&#039;&#039;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| Other Links:&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/web-filter-conf.html Web Filter Description Page]&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/videos/ Web Filter Video Demo]&lt;br /&gt;
|-&lt;br /&gt;
|[http://www.untangle.com/store/web-filter-conf.html Web Filter Screenshots]&lt;br /&gt;
|-&lt;br /&gt;
|[http://forums.untangle.com/web-filter/ Web Filter Forums]&lt;br /&gt;
|-&lt;br /&gt;
|[[Web Filter Reports]]&lt;br /&gt;
|-&lt;br /&gt;
|[[Web Filter FAQs]]&lt;br /&gt;
|}&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== About Web Filter ==&lt;br /&gt;
&lt;br /&gt;
Web Filter monitors HTTP traffic on your network to monitor user behavior and block inappropriate content. Web Filter also appeals to customers who require an added level of protection or are subject to regulations, for example Web Filter helps libraries comply with the [http://en.wikipedia.org/wiki/Children%27s_Internet_Protection_Act Children&#039;s Internet Protection Act]). Need to block Pornography or Hate Speech on your network? Web Filter is your answer.&lt;br /&gt;
&lt;br /&gt;
Some users may be familiar with [[Web Filter Lite]]. Web Filter improves upon [[Web Filter Lite]] in the following areas:&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Real-time classification and updates&#039;&#039;&#039;: When your users visit a site, Untangle sends the URL to the [http://zvelo.com/technology/zvelodb-url-database cloud] to be categorized. When the data is returned, Untangle keeps a temporary local cache of the site and category to speed up the process the next time the URL is requested. This data is then used to block or allow users access to the site they have requested, all without any appreciable increase in load time. If a site is not categorized upon request, it is autocategorized by our partners at [http://zvelo.com zVelo] and put into a queue to be verified by a human. Because this is done dynamically, new sites and updated URLs are allowed or blocked according to your settings without additional intervention, plus you have the option of requesting [http://zvelo.com/partners/test-a-site recategorization] of sites.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;HTTPS Filtering&#039;&#039;&#039;: Web Filter has multiple techniques to deal with HTTPS, SSL-encrypted HTTP. HTTPS traffic is encrypted so only some information is visible and this information is used to categorize the session. More information on how this is down below.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Detailed categorization&#039;&#039;&#039;: Web Filter offers over 140 categories and over 450 million categorized sites. The Web Filter database is over 100 times larger and more accurate. With over 10 times the number of categories it also has better granularity. The abundance of categories means that you can narrow your scope - maybe you want to block websites related to Sex, but allow sites dealing with Sexual Education or Pregnancy. With Web Filter Lite you would have to block &#039;Pornography&#039; category and allow any specifics sites through, while with Web Filter you could set the separate categories appropriately and not worry about manually unblocking anything.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Additional features&#039;&#039;&#039;: The ability to force SafeSearch on search engines that support it, and more!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Settings ==&lt;br /&gt;
&lt;br /&gt;
This section reviews the different settings and configuration options available for Web Filter.&lt;br /&gt;
&lt;br /&gt;
=== Block Categories ===&lt;br /&gt;
&lt;br /&gt;
Block Categories allows you to customize which categories of sites will be blocked or flagged. Categories that are blocked will display a block page to the user; categories that are flagged will allow the user to access the site, but will be silently flagged as a violation for event logs and [[Reports]]. These block/flag actions operate the same way for all of the different Web Filter options.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_blockCategories.png|center|frame|Block categories]]&lt;br /&gt;
&lt;br /&gt;
==== Site Lookup ====&lt;br /&gt;
Site Lookup allows you to find the categorization of a URL.  Clicking it brings up a dialog.  In &#039;&#039;&#039;Site URL&#039;&#039;&#039; specify the URL to find and click &#039;&#039;&#039;Search&#039;&#039;&#039; to find the URL&#039;s categorization.&lt;br /&gt;
&lt;br /&gt;
If you feel the current categorization is incorrect, check &#039;&#039;&#039;Suggest a different category&#039;&#039;&#039;, select a new category from the list, and click &#039;&#039;&#039;Suggest&#039;&#039;&#039; to submit the category change for consideration.&lt;br /&gt;
&lt;br /&gt;
:NOTE: This is only a suggestion and may not be accepted. If accepted it may take a few days to become active.&lt;br /&gt;
&lt;br /&gt;
=== Block Sites ===&lt;br /&gt;
Under Blocked Sites you can add individual domain names you want to be blocked or flagged - just enter the domain name (e.g. youtube.com) and specify your chosen action. This list uses [[URL Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_blockList.png|center|frame|A few sites entered into the Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Block File Types ===&lt;br /&gt;
The Block File Types section allows you to block files by file extension - just select (or add) your chosen file extension, check your preferred action, and save. This list uses [[Glob Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_fileType.png|center|frame|The File Types Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Block MIME Types ===&lt;br /&gt;
The Block MIME Types section allows you to block files by MIME types - just select (or add) your chosen file extension, check your preferred action, and save. This list uses [[Glob Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_mimeType.png|center|frame|The MIME Types Block List]]&lt;br /&gt;
&lt;br /&gt;
=== Pass Sites ===&lt;br /&gt;
&lt;br /&gt;
Pass Sites is used to pass content that would have otherwise been blocked. This can be useful for &amp;quot;unblocking&amp;quot; sites that you don&#039;t want blocked according to block settings.  Any domains you add to the Passed Sites list will be allowed, even if blocked by category or by individual URL - just add the domain and save. Unchecking the pass option will allow the site to be blocked as if the entry was not present. This list uses [[URL Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_PassList.png|center|frame|A few sites entered into the Pass List]]&lt;br /&gt;
&lt;br /&gt;
=== Pass Clients ===&lt;br /&gt;
&lt;br /&gt;
If you add an IP address to this list, Web Filter will not block any traffic from that IP regardless of the blocked categories or sites. Just add the IP and save. Unchecking the pass option will have the block/pass lists affect the user as if they were not entered into the Passed Client IPs list. This list uses [[IP Matcher]] syntax.&lt;br /&gt;
&lt;br /&gt;
:If you have a few users that need to completely bypass Web Filter controls, consider using pass lists. If you have users that simply need different Web Filter settings, you should set up a separate rack using [[Policy Manager]]. When using this feature, please remember that DHCP IPs can change, so you&#039;ll probably want to set up either a Static IP or a Static DHCP Lease for the machine in question.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_PassClientList.png|center|frame|A few different entries in the Pass Listed Client IPs list]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Advanced ===&lt;br /&gt;
The Advanced section allows you to configure additional web filter options.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Process HTTPS traffic by SNI (Server Name Indication) if present&#039;&#039;&#039;: If this option is enabled, HTTPS traffic will be categorized using the &amp;quot;Server Name Indication&amp;quot; in the HTTPS data stream, if present. More details in [[#HTTPS Options]].&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Process HTTPS traffic by hostname in server certificate when SNI information not present&#039;&#039;&#039;: If this option is enabled &#039;&#039;and&#039;&#039; SNI information is not present, the certificate is fetched from the HTTPS server and the server name on the certificate will be used for categorization and filtering purposes.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Process HTTPS traffic by server IP if both SNI and certificate hostname information are not available&#039;&#039;&#039;: If this option is enabled &#039;&#039;and&#039;&#039; neither of the previous options worked, HTTPS traffic will be categorized using the IP address. More details in [[#HTTPS Options]]. &lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Enforce safe search on popular search engines&#039;&#039;&#039;:  When this option is enabled, safe search will be enforced on all searches using supported search engines: Google, Yahoo!, Bing, Ask.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Block pages from IP only hosts&#039;&#039;&#039;: When this option is enabled, users entering an IP address rather than domain name will be blocked.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Pass if referers match Pass Sites&#039;&#039;&#039;.  When this option is checked, if a page contains external content from any site in &#039;&#039;Pass Sites&#039;&#039;, that external content will be passed regardless of other block policies.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Block Google applications&#039;&#039;&#039;: When this option is enabled, only domains listed in &#039;&#039;&#039;Domain&#039;&#039;&#039; are allowed to access Google applications such as Gmail.  All others are blocked by Google.  Multiple domains can be specified, separated by commas such as:&lt;br /&gt;
::&amp;lt;tt&amp;gt;untangle.com,domain.com&amp;lt;/tt&amp;gt;.  &lt;br /&gt;
:&#039;&#039;NOTE: HTTPS Inspector must be installed and running with the Inspect Google Traffic configured to Inspect.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Unblock&#039;&#039;&#039;:  This section can be used to add a button to allow users to bypass restrictions on a case-by-case basis.&lt;br /&gt;
&lt;br /&gt;
:If Unblock is set to &#039;&#039;&#039;None&#039;&#039;&#039; no users will be allowed to bypass the block page. If Unblock is set to &#039;&#039;&#039;Temporary&#039;&#039;&#039; users will be allowed to visit the site for one hour from the time it is unblocked. If Unblock is set to &#039;&#039;&#039;Permanent and Global&#039;&#039;&#039; then users will be allowed to visit the site and unblocked sites will be added to the permanent global pass list so it will always be allowed in the future.&lt;br /&gt;
&lt;br /&gt;
:You also have the option of setting a password to Unblock; it can either be the existing Administrator password for the Untangle or you can set a new, separate password only for the Unblock feature.&lt;br /&gt;
&lt;br /&gt;
* &#039;&#039;&#039;Clear Category URL Cache&#039;&#039;&#039;: This option will clear the local cache of categorized sites and URLs. After clearing the cache all new web visits will be looked up fresh using the categorization service. The cache automatically cleans itself as entries become old or stale, so this is mostly for testing.&lt;br /&gt;
&lt;br /&gt;
[[Image:WF_advanced.png|center|frame|Advanced options]]&lt;br /&gt;
&lt;br /&gt;
== Reports ==&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter Reports}}&lt;br /&gt;
&lt;br /&gt;
== HTTPS Options ==&lt;br /&gt;
&lt;br /&gt;
As described briefly above, there are two HTTPS options.&lt;br /&gt;
&lt;br /&gt;
* Process HTTPS traffic by SNI (Server Name Indication) if present.&lt;br /&gt;
* Process HTTPS traffic by IP Address when SNI information not present.&lt;br /&gt;
&lt;br /&gt;
If &#039;&#039;Process HTTPS traffic by SNI (Server Name Indication) if present&#039;&#039; encrypted port-443 traffic will be scanned by Web Filter. Most modern browsers on modern OSs will send the hostname of the server in cleartext - this is called &amp;quot;Server Name Indication&amp;quot; or SNI. SNI is an optional cleartext field in the HTTPS request that shows the hostname of the server. If this option is enabled and the SNI information is present in the HTTPS request, this hostname will be used as the URL for this request and all categorization, block lists, and pass lists, will be processed as if this were a regular HTTP request to that URL.&lt;br /&gt;
&lt;br /&gt;
If the SNI-based categorization determines the page should be blocked the session is reset. If the SNI-based categorization determines the page should be passed (and/or flagged) then the session is allowed and the appropriate event based on the SNI information is logged (&amp;quot;https://example.com/&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
For example, if the user visits &amp;quot;https://wellsfargo.com/welcome&amp;quot; in the browser, Web Filter will see &amp;quot;wellsfargo.com&amp;quot; as the SNI information. If enabled, the request will be handled exactly like &amp;quot;http://wellsfargo.com&amp;quot; would be. If &amp;quot;Banking&amp;quot; is blocked it will be blocked, unless &amp;quot;wellsfargo.com&amp;quot; is in the pass list or the client IP is in the client IP pass list. If &amp;quot;wellsfargo.com&amp;quot; is blocked it will be blocked, unless &amp;quot;wellsfargo.com&amp;quot; is in the pass list or the client IP is in the client IP pass list.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
If &#039;&#039;Process HTTPS traffic by IP Address when SNI information not present&#039;&#039; is disabled and no SNI information is present the session will be allowed as there is no information available to process the traffic.&lt;br /&gt;
If &#039;&#039;Process HTTPS traffic by IP Address when SNI information not present&#039;&#039; is enabled and no SNI information is present the session will be processed and categorized by IP address. If the IP-based processing and categorization of the web requests determines the session should be blocked, the session is reset and no more processing of this session will be done. If the IP-based processing and categorization determines the page should be passed (and/or flagged) then the session is allowed and the appropriate event based on its IP is logged (&amp;quot;https://1.2.3.4&amp;quot;). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&lt;br /&gt;
For example, if the user visits &amp;quot;https://wellsfargo.com/welcome&amp;quot; in a non-SNI enabled browser, then there is no SNI information for Web Filter to use. In this case if &#039;&#039;Process HTTPS traffic by IP Address when SNI information not present&#039;&#039; is enabled Web Filter will use the IP address instead. So it will process/categorize this web request as &#039;http://1.2.3.4&#039; if 1.2.3.4 is the IP of wellsfargo.com. This will still often result in correct categorization for dedicated web servers, but does poorly when using generic cloud computing servers that offer a wide variety of websites.&lt;br /&gt;
&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; When blocking HTTPS traffic, block pages can not be shown. The HTTPS encryption prevents man-in-the-middle spoofing of data required to display the block page. The connection will simply be reset and the browser will display an error.&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Note:&#039;&#039;&#039; Neither HTTPS process (IP-based nor SNI-based) can read the URI information as it is not sent in cleartext. As such the URI will not be used as part of the categorization and the URI is assumed to be &amp;quot;/&amp;quot; when evaluating block/pass rules.&lt;br /&gt;
&lt;br /&gt;
To see the HTTPS categorization in action use the &amp;quot;All HTTPS Events&amp;quot; query in the event log.&lt;br /&gt;
&lt;br /&gt;
== Related Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[Web Filter Lite]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Web Filter FAQs ==&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter Common FAQs}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{:Web Filter FAQs}}&lt;/div&gt;</summary>
		<author><name>Cknickerbocker</name></author>
	</entry>
</feed>