Jump to navigation

  • English
  • Русский
Home
  • Resources

      • Document Library
      • Video
      • Changes in UserGate 5
      • Changes in UserGate 6
      • Changes in UserGate Management Center 6
      • Changes in UserGate Log Analyzer 6
      • Changes in UserGate 7
      • Changes in UserGate Management Center 7
      • Changes in UserGate Log Analyzer 7
      • Changes in UserGate SIEM 7
      • Changes in UserGate WAF 7

      • L7 Applications
      • Categories
  • Support service
    • Add a Ticket
    • Download
    • Demo Online
  • Lifecycle

You are here

Home > Support Portal > Documentation > UserGate 5

Search form

  • 1. Introduction
    • 1.1. Network security and protection from network threats
      • 1.1.1. Next Generation Firewall
      • 1.1.2. Intrusion detection and prevention
      • 1.1.3. Protection from DOS attacks and network flooding
      • 1.1.4. Anti-virus traffic check
      • 1.1.5. Anti-spam and anti-virus protection of email traffic
      • 1.1.6. Interaction with 3rd party security systems
      • 1.1.7. SCADA management
      • 1.1.8. Security Orchestration, Automation, and Response
    • 1.2. Improvements in network performance and reliability
      • 1.2.1. High Availability and Clustering
      • 1.2.2. FTP over HTTP
      • 1.2.3. Support of redundant channels
      • 1.2.4. Traffic shaper
      • 1.2.5. WCCP
    • 1.3. Traffic management and Internet access control
      • 1.3.1. Traffic routing and publication of resources
      • 1.3.2. User authentication
      • 1.3.3. Support of the guest portal
      • 1.3.4. Proxy agent for Windows
      • 1.3.5. Support of the BYOD ("Bring Your Own Device") concept
    • 1.4. Content filtering and application control
      • 1.4.1. Internet filtering
      • 1.4.2. Selective ad blocking
      • 1.4.3. Safe search
      • 1.4.4. Access control for social media
      • 1.4.5. Code injection for web pages
      • 1.4.6. Inspection of the SSL traffic
      • 1.4.7. VPN and WEB PORTAL
    • 1.5. Logs and Reports
    • 1.6. Other functions
      • 1.6.1. Role-based management
      • 1.6.2. Monitoring and notifications
      • 1.6.3. Network interfaces
      • 1.6.4. DNS filtering
      • 1.6.5. Load balancer
  • 2. Initial configuration
    • 2.1. Deploying the virtual appliance
    • 2.2. Connecting to UserGate
  • 3. UserGate licensing
  • 4. Managing the device
    • 4.1. General settings
    • 4.2. Device management
      • 4.2.1. Clustering and high availability
      • 4.2.2. Diagnostics
      • 4.2.3. Server operations
    • 4.3. Exporting and importing settings
    • 4.4. Managing access to the UserGate console
    • 4.5. Managing certificates
      • 4.5.1. Creating SSL inspection certificates based on company's CA
    • 4.6. Command-line interface (CLI)
    • 4.7. Backing up and restoring initial settings
  • 5. Configuring a network
    • 5.1. Configuring zones
    • 5.2. Configuring interfaces
      • 5.2.1. Setting up Netflow
      • 5.2.2. Interface bonding
      • 5.2.3. Creating a bridge
      • 5.2.4. PPPoE interface
      • 5.2.5. VPN interface
    • 5.3. Configuring gateways
    • 5.4. Configuring DHCP
    • 5.5. Configuring DNS
    • 5.6. Routes
    • 5.7. WCCP support
    • 5.8. Dynamic routing protocols
      • 5.8.1. OSPF
      • 5.8.2. BGP
  • 6. Users and devices
    • 6.1. Users
    • 6.2. Groups
    • 6.3. Authentication servers
      • 6.3.1. LDAP connector
      • 6.3.2. Radius authentication server
      • 6.3.3. TACACS+ authentication server
      • 6.3.4. SAML IDP authentication server
      • 6.3.5. Kerberos authentication
      • 6.3.6. NTLM authentication server
    • 6.4. Auth profiles
    • 6.5. Configuring a Captive portal
    • 6.6. MFA profiles (multi-factor authentication)
    • 6.7. Users of terminal servers
    • 6.8. Authentication agent for Windows
    • 6.9. Proxy agent for Windows
    • 6.10. Guest portal
    • 6.11. Radius accounting
    • 6.12. BYOD policies
  • 7. Network policies
    • 7.1. Firewall
    • 7.2. NAT and routing
      • 7.2.1. NAT rules
      • 7.2.2. DNAT rules
      • 7.2.3. Port forwarding rules
      • 7.2.4. Policy-based routing
      • 7.2.5. Network mapping
    • 7.3. Load balancing
    • 7.4. Traffic shaping
  • 8. Security policies
    • 8.1. Content filtering
    • 8.2. Safe browsing
    • 8.3. SSL inspection
    • 8.4. Intrusion prevention system
    • 8.5. SCADA rules
    • 8.6. Scenarios
    • 8.7. Integration with external ICAP servers
    • 8.8. Mail security
    • 8.9. Publication of HTTP/HTTPS resources using the reverse proxy
    • 8.10. DoS protection
  • 9. Setting up a VPN
    • 9.1. Remote access VPN
    • 9.2. Site-to-Site VPN
    • 9.3. Setting up an web portal
  • 10. Libraries
    • 10.1. Morphology
    • 10.2. Services
    • 10.3. IP addresses
    • 10.4. Useragents
    • 10.5. Content types
    • 10.6. URL lists
    • 10.7. Time sets
    • 10.8. Bandwidth pools
    • 10.9. SCADA profiles
    • 10.10. Response pages
    • 10.11. URL categories
    • 10.12. Overridden URL categories
    • 10.13. Applications
    • 10.14. Emails
    • 10.15. Phones
    • 10.16. IPS profiles
    • 10.17. Notification profiles
  • 11. Dashboard
  • 12. Diagnostics and monitoring
    • 12.1. Routes
    • 12.2. VPN
    • 12.3. Web portal
    • 12.4. Packet capture
    • 12.5. Requests to a white list
    • 12.6. Tracing of rules
    • 12.7. Ping
    • 12.8. Traceroute
    • 12.9. DNS query
    • 12.10. Notifications
      • 12.10.1. Alert rules
      • 12.10.2. SNMP monitoring
  • 13. Logs and reports
    • 13.1. Logs
      • 13.1.1. Event log
      • 13.1.2. Web access log
      • 13.1.3. Traffic log
      • 13.1.4. IPS log
      • 13.1.5. Search history
      • 13.1.6. Searching and filtering
      • 13.1.7. Logs export
    • 13.2. Reports
      • 13.2.1. Report templates
      • 13.2.2. Report rules
      • 13.2.3. Generated reports
  • 14. Technical support
  • 15. Appendix 1: Installing a certificate issued by the local certification authority
    • 15.1. Installing a certificate for Internet Explorer and Chrome in Windows
    • 15.2. Installing a certificate for Safari and Chrome in MacOS X
    • 15.3. Installing a certificate for Firefox

UserGate 5

Version: 
UserGate 5.x
Download PDF

Administrator's Guide

  • 1. Introduction
  • 2. Initial configuration
  • 3. UserGate licensing
  • 4. Managing the device
  • 5. Configuring a network
  • 6. Users and devices
  • 7. Network policies
  • 8. Security policies
  • 9. Setting up a VPN
  • 10. Libraries
  • 11. Dashboard
  • 12. Diagnostics and monitoring
  • 13. Logs and reports
  • 14. Technical support
  • 15. Appendix 1: Installing a certificate issued by the local certification authority
1. Introduction ›
Terms of Use|Privacy Policy

Copyright © 2001-2025 UserGate