Jump to navigation

  • English
  • Русский
Home
  • Resources

      • Document Library
      • Video
      • Changes in UserGate 5
      • Changes in UserGate 6
      • Changes in UserGate Management Center 6
      • Changes in UserGate Log Analyzer 6
      • Changes in UserGate 7
      • Changes in UserGate Management Center 7
      • Changes in UserGate Log Analyzer 7
      • Changes in UserGate SIEM 7
      • Changes in UserGate WAF 7

      • L7 Applications
      • Categories
  • Support service
    • Add a Ticket
    • Download
    • Demo Online
  • Lifecycle

You are here

Home > Support Portal > Documentation > UserGate 7

Search form

  • 1. Introduction
    • 1.1. Network Security and Threat Protection
      • 1.1.1. Firewalling
      • 1.1.2. Intrusion Detection and Prevention
      • 1.1.3. DoS and Network Flood Protection
      • 1.1.4. Checking Traffic for Malware
      • 1.1.5. Email Traffic Checking
      • 1.1.6. Integrating with External Security Systems
      • 1.1.7. Scenario-Based Security Policy Configuration
    • 1.2. Internet Performance and Reliability Improvement
      • 1.2.1. Clustering and High Availability Support
      • 1.2.2. FTP over HTTP
      • 1.2.3. Multi-Provider Support
      • 1.2.4. Traffic Shaping Management
      • 1.2.5. WCCP Support
    • 1.3. Traffic Management and Internet Access Control
      • 1.3.1. Traffic Routing and Resource Publishing
      • 1.3.2. User Authentication
      • 1.3.3. Guest Portal Support
      • 1.3.4. Application Proxying
    • 1.4. Content Filtering and Application Control
      • 1.4.1. Internet Filtering
      • 1.4.2. Selective Ad Blocking
      • 1.4.3. Safe Search Activation
      • 1.4.4. Social Network App Blocking
      • 1.4.5. Code Injection into Webpages
      • 1.4.6. SSL Traffic Inspection
      • 1.4.7. VPN and Web Portal
    • 1.5. Logs and Reports
    • 1.6. Other Features
      • 1.6.1. Role-Based Administrator Access to UserGate Controls
      • 1.6.2. Using Notifications
      • 1.6.3. Interface Types
      • 1.6.4. DNS Filtering
      • 1.6.5. Load Balancer
  • 2. Initial Configuration
    • 2.1. Network Environment Requirements
    • 2.2. Virtual Appliance Deployment
    • 2.3. Connecting to UserGate
    • 2.4. Automate UserGate Deployment Using Cloud-init
  • 3. UserGate Licensing
    • 3.1. Licensing for the number of concurrently connected devices
    • 3.2. Licensing for platform performance parameters
    • 3.3. Additional modules to be licensed
  • 4. Device Setup
    • 4.1. General Settings
    • 4.2. Device management
      • 4.2.1. Diagnostics
      • 4.2.2. Server operations
      • 4.2.3. System backup management
      • 4.2.4. Settings export and import
    • 4.3. Clustering and High Availability
      • 4.3.1. Configuration cluster
      • 4.3.2. Active-Passive HA Cluster
      • 4.3.3. Active-Active HA Cluster
    • 4.4. UserGate Console Access Management
    • 4.5. Certificate Management
      • 4.5.1. Using Corporate CA to Create an SSL Inspection Certificate
  • 5. Network Configuration
    • 5.1. Zone Configuration
    • 5.2. Network Interface Configuration
      • 5.2.1. Creating a VLAN Interface
      • 5.2.2. Bonding Network Interfaces
      • 5.2.3. Interface Bridging
      • 5.2.4. PPPOE Interface
      • 5.2.5. VPN Interface
      • 5.2.6. Tunnel Interface
      • 5.2.7. Netflow Configuration
    • 5.3. Gateway Configuration
    • 5.4. DHCP Configuration
    • 5.5. DNS Configuration
    • 5.6. Virtual Routers
      • 5.6.1. Static Routes
      • 5.6.2. Dynamic Routing Protocols
      • 5.6.3. OSPF
      • 5.6.4. BGP
      • 5.6.5. RIP
      • 5.6.6. Multicasting
    • 5.7. WCCP
  • 6. Users and Devices
    • 6.1. Groups
    • 6.2. Users
    • 6.3. Auth servers
      • 6.3.1. LDAP Connector
      • 6.3.2. RADIUS User Authentication Server
      • 6.3.3. TACACS+ User Authentication Server
      • 6.3.4. SAML IDP User Authentication Server
      • 6.3.5. NTLM Authentication Server
      • 6.3.6. Kerberos Authentication Method
      • 6.3.7. HTTP Basic Authentication Method
    • 6.4. Authentication Profiles
    • 6.5. Captive Portal Configuration
    • 6.6. MFA (Multi-Factor Authentication) Profiles
    • 6.7. Terminal Server Users
    • 6.8. Windows Authentication Agent
    • 6.9. Windows Proxy Agent
    • 6.10. Managing guest users
    • 6.11. RADIUS Accounting
  • 7. Network Policies
    • 7.1. Firewall
    • 7.2. NAT and Routing
      • 7.2.1. NAT Rules
      • 7.2.2. DNAT Rules
      • 7.2.3. Port Forwarding Rules
      • 7.2.4. Policy-Based Routing
      • 7.2.5. Network Mapping
    • 7.3. Load Balancing
    • 7.4. Traffic Shaping
  • 8. Security Policies
    • 8.1. Content Filtering
    • 8.2. Safe Browsing
    • 8.3. Tunnel Inspection
    • 8.4. SSL Inspection
    • 8.5. SSH Inspection
    • 8.6. Intrusion Detection and Prevention System
    • 8.7. Scenarios
    • 8.8. Working with External ICAP Servers
    • 8.9. Mail Security
      • 8.9.1. Antispam Configuration
    • 8.10. DoS Protection
  • 9. Global Portal
    • 9.1. Web Portal (SSL VPN)
    • 9.2. HTTP/HTTPS Resource Publishing Using Reverse Proxy
  • 10. VPN Settings
    • 10.1. Remote Access VPN
    • 10.2. Site-to-Site VPN connections
    • 10.3. IPsec over GRE
    • 10.4. GRE over IPsec
  • 11. Libraries of items
    • 11.1. Morphology
    • 11.2. Services
    • 11.3. Services groups
    • 11.4. IP Addresses
    • 11.5. Browser Useragent
    • 11.6. Content types
    • 11.7. URL lists
    • 11.8. Time Sets
    • 11.9. Bandwidth Pools
    • 11.10. Response Pages
    • 11.11. URL Categories
    • 11.12. Overridden URL categories
    • 11.13. Applications
    • 11.14. Emails
    • 11.15. Phones
    • 11.16. IPS Profiles
    • 11.17. Notification Profiles
    • 11.18. Netflow Profiles
    • 11.19. LLDP Profiles
    • 11.20. SSL Profiles
    • 11.21. SSL Forwarding Profiles
  • 12. Command Line Interface (CLI)
    • 12.1. Commands Available Prior to Initial Node Setup
    • 12.2. Initial Setup
    • 12.3. Diagnostics and Monitoring Commands
      • 12.3.1. Interface Statistics
      • 12.3.2. ARP Entries
      • 12.3.3. Packet Tracing
      • 12.3.4. Traffic Monitoring
      • 12.3.5. LLDP
      • 12.3.6. Routes
    • 12.4. Configuration mode
      • 12.4.1. Execute commands
      • 12.4.2. Import command
      • 12.4.3. Export command
    • 12.5. Configuring UserGate devices
      • 12.5.1. Configuring CLI
      • 12.5.2. UserGate General Settings
      • 12.5.3. Configuring device management
      • 12.5.4. Cluster settings
      • 12.5.5. Configuring UserGate console access control
      • 12.5.6. Configuring certificates
      • 12.5.7. Settings for device parameters
      • 12.5.8. Telemetry settings
      • 12.5.9. Configuring proxy servers
    • 12.6. UserGate network settings
      • 12.6.1. Zones
      • 12.6.2. Interfaces
      • 12.6.3. Gateways
      • 12.6.4. DHCP
      • 12.6.5. Configuration of DNS
      • 12.6.6. Configuring Virtual Routers
      • 12.6.7. Configuring WCCP
    • 12.7. Configuring rules using UPL
    • 12.8. Configuring the Users and devices section
      • 12.8.1. Configuring user groups
      • 12.8.2. Configuring users
      • 12.8.3. Configuring authentication servers
      • 12.8.4. Configuring authentication profiles
      • 12.8.5. Captive portal
      • 12.8.6. Configuring Captive profiles
      • 12.8.7. Configuring terminal servers
      • 12.8.8. Configuring MFA (multifactor authentication) profiles
    • 12.9. Configuring the Network policies section
      • 12.9.1. Configuring firewall rules
      • 12.9.2. Configuring NAT and routing rules
      • 12.9.3. Configuring load balancing
      • 12.9.4. Configuring traffic shaping rules
    • 12.10. Configuring the Security policies section
      • 12.10.1. Configuring content filtering
      • 12.10.2. Configuring safe browsing
      • 12.10.3. Configuring tunnel inspection rules
      • 12.10.4. Configuring SSL inspection
      • 12.10.5. Configuring SSH inspection
      • 12.10.6. Configuring IPS
      • 12.10.7. Configuring scenarios
      • 12.10.8. Configuring mail security rules
      • 12.10.9. Configuring ICAP rules
      • 12.10.10. Configuring ICAP servers
      • 12.10.11. Configuring DoS rules
      • 12.10.12. Configuring DoS profiles
    • 12.11. Configuring a global portal
      • 12.11.1. Configuring a web portal
      • 12.11.2. Configuring reverse proxy rules
      • 12.11.3. Configuring reverse proxy servers
    • 12.12. Configuring remote access (VPN)
      • 12.12.1. Configuring server rules
      • 12.12.2. Configuring client rules
      • 12.12.3. Configuring a VPN Network
      • 12.12.4. Configuring VPN security profiles
    • 12.13. Configuring libraries
      • 12.13.1. Configuring morphology
      • 12.13.2. Configuring services
      • 12.13.3. Configuring service groups
      • 12.13.4. Configuring IP addresses
      • 12.13.5. Configuring useragents
      • 12.13.6. Configuring content types
      • 12.13.7. Configuring URL lists
      • 12.13.8. Configuring time sets
      • 12.13.9. Configuring bandwidth pools
      • 12.13.10. Configuring response pages
      • 12.13.11. Configuring URL categories
      • 12.13.12. Configuring overridden URL categories
      • 12.13.13. Configuring applications
      • 12.13.14. Configuring email addresses
      • 12.13.15. Configuring phones
      • 12.13.16. Configuring IPS profiles
      • 12.13.17. Configuring notification profiles
      • 12.13.18. Configuring Netflow profiles
      • 12.13.19. Configuring LLDP profiles
      • 12.13.20. Configuring SSL profiles
      • 12.13.21. Configuring SSL forwarding profiles
  • 13. Platform Management Controller Command LIne Interface
    • 13.1. Basic Hardware Parameters
    • 13.2. Platform Management
    • 13.3. Network Settings Management
    • 13.4. Users Management
    • 13.5. PMC Loader Mode
  • 14. System utilities
  • 15. Dashboard
  • 16. Diagnostics and monitoring
    • 16.1. Traffic monitoring
    • 16.2. Routes
    • 16.3. VPN
    • 16.4. Web portal
    • 16.5. Packet capture
    • 16.6. Requests for white list
    • 16.7. Tracing rules
    • 16.8. Ping
    • 16.9. Traceroute
    • 16.10. DNS Query
    • 16.11. LLDP neighbors
    • 16.12. LLDP statistics
    • 16.13. Notifications
      • 16.13.1. Alert rules
      • 16.13.2. SNMP
  • 17. Logs and reports
    • 17.1. Logs
      • 17.1.1. Event log
      • 17.1.2. Web Access Log
      • 17.1.3. Traffic log
      • 17.1.4. IDPS log
      • 17.1.5. SCADA log
      • 17.1.6. SSH inspection log
      • 17.1.7. Search history
      • 17.1.8. Data search and filtering
      • 17.1.9. Log Export
    • 17.2. Reports
      • 17.2.1. Report templates
      • 17.2.2. Report rules
      • 17.2.3. Generated reports
  • 18. Guest portal
  • 19. Help
  • 20. ADMIN
  • 21. Appendix 1. Network environment requirements
  • 22. Appendix 2. Installing local CA certificates
    • 22.1. Installing certificates in Internet Explorer and Chrome browsers in Windows
    • 22.2. Installing certificates in Safari and Chrome browsers in MacOS X
    • 22.3. Installing certificate in Firefox
  • 23. Appendix 3. Log format description
    • 23.1. Logs Export in CEF Format
      • 23.1.1. Event log format
      • 23.1.2. Web access log format
      • 23.1.3. Traffic log format
      • 23.1.4. IDPS log format
      • 23.1.5. SCADA log format
      • 23.1.6. SSH inspection log format
    • 23.2. Export logs in JSON format
      • 23.2.1. Event log description
      • 23.2.2. Web access log description
      • 23.2.3. Traffic log description
      • 23.2.4. IDPS log description
      • 23.2.5. SCADA log description
      • 23.2.6. SSH inspection log description
  • 24. Appendix 4. DHCP Options

UserGate 7

Version: 
UserGate 7.x
Download PDF

Administrator's Guide

  • 1. Introduction
  • 2. Initial Configuration
  • 3. UserGate Licensing
  • 4. Device Setup
  • 5. Network Configuration
  • 6. Users and Devices
  • 7. Network Policies
  • 8. Security Policies
  • 9. Global Portal
  • 10. VPN Settings
  • 11. Libraries of items
  • 12. Command Line Interface (CLI)
  • 13. Platform Management Controller Command LIne Interface
  • 14. System utilities
  • 15. Dashboard
  • 16. Diagnostics and monitoring
  • 17. Logs and reports
  • 18. Guest portal
  • 19. Help
  • 20. ADMIN
  • 21. Appendix 1. Network environment requirements
  • 22. Appendix 2. Installing local CA certificates
  • 23. Appendix 3. Log format description
  • 24. Appendix 4. DHCP Options
1. Introduction ›
Terms of Use|Privacy Policy

Copyright © 2001-2025 UserGate