Jump to navigation

  • English
  • Русский
Home
  • Resources

      • Document Library
      • Video
      • Changes in UserGate 5
      • Changes in UserGate 6
      • Changes in UserGate Management Center 6
      • Changes in UserGate Log Analyzer 6
      • Changes in UserGate 7
      • Changes in UserGate Management Center 7
      • Changes in UserGate Log Analyzer 7
      • Changes in UserGate SIEM 7
      • Changes in UserGate WAF 7

      • L7 Applications
      • Categories
  • Support service
    • Add a Ticket
    • Download
    • Demo Online
  • Lifecycle

You are here

Home > Support Portal > Documentation > UserGate NGFW 7.1.0

Search form

  • NGFW 7.1.0 Administrator Guide
    • Table of Contents
  • Introduction
  • Network Security and Threat Protection
    • Firewall
    • Intrusion Detection and Prevention
    • DoS and Network Flood Protection
    • Checking Traffic for Malware
    • Email Traffic Checking
    • Integrating with External Security Systems
    • SCADA Management
    • Scenario-Based Security Policy Configuration
  • Internet Performance and Reliability Improvement
    • Clustering and High Availability Support
    • FTP over HTTP
    • Multi-Provider Support
    • Traffic Shaping Management
    • WCCP Support
  • Traffic Management and Internet Access Control
    • Traffic Routing and Resource Publishing
    • User Authentication and Authorization
    • Guest Portal Support
    • Application Proxying
    • Redirecting Traffic to Upstream Proxy
  • Logs and Reports
    • Logs and Reports (Description)
  • Content Filtering and Application Control
    • Internet Filtering
    • Selective Ad Blocking
    • Safe Search Activation
    • Social Network App Blocking
    • Code Injection into Webpages
    • SSL Traffic Inspection
    • VPN and Web Portal
  • Other Features
    • Load Balancing
    • DNS Filtering
    • Interface Types
    • Using Notifications
    • Role-Based Administrator Access to UserGate NGFW Controls
  • Licensing
    • Licensing (Description)
    • Licensing by the Number of Simultaneous Connections
    • Licensing by Platform Performance Parameters
    • Additionally Licensed Modules
    • Online License Activation
    • Offline License Activation
  • Initial Configuration
    • Description
    • Virtual Appliance Deployment
    • Automate UserGate NGFW Deployment Using Cloud-init
    • Network Environment Requirements
    • Connecting to UserGate NGFW
  • Device Setup
    • General Settings
    • Device Management
    • UserGate NGFW Console Access Management
    • Clustering and High Availability
    • Upstream Proxy
    • Description
    • Usage Scenarios
    • Upstream Proxy Settings
    • Certificate Management
    • Client Certificate Profiles
    • Expanding the System Partition
  • Network Configuration
    • Zone Configuration
    • Network Interface Configuration
    • Gateway Configuration
    • DHCP Configuration
    • DNS Configuration
    • Virtual Routers
    • WCCP
  • Users and Devices
    • Users and Groups
    • Groups
    • Users
    • Authentication Servers
    • Authentication Profiles
    • Captive Portal Configuration
    • Terminal Server Users
    • MFA (Multi-Factor Authentication) Profiles
    • UserID Agent
    • Description
    • How it works
    • Settings
    • Microsoft Active Directory
    • Syslog
    • RADIUS Accounting
    • Windows Authentication Agent
    • Windows Proxy Agent
    • Guest User Management
    • UserGate Client Endpoints
    • UserGate Client + NGFW
    • Registering Endpoint Device with NGFW
    • UserGate Client Software Installation
  • Network Policies
    • Description
    • Firewall
    • NAT and Routing
    • Load Balancing
    • Traffic Shaping
  • Security Policies
    • General Information
    • Content Filtering
    • Safe Browsing
    • Tunnel Inspection
    • SSL Inspection
    • SSH Inspection
    • Scenarios
    • Mail Security
  • Mail Security
  • Antispam Settings
    • BATV Configuration
    • DNSBL servers
    • DNSBL white list
    • DNSBL black list
    • Working with External ICAP Servers
    • DoS Protection
    • Intrusion Detection and Prevention System
  • Global Portal
    • Description
    • Web Portal (SSL VPN)
    • HTTP/HTTPS Resource Publishing Using Reverse Proxy
    • [COPY] Веб-портал (SSL VPN)
  • VPN Settings
    • VPN (Description)
    • Types of VPN Connection
    • Secure VPN Tunneling Options
    • Site-to-Site VPN Connections
    • Remote Access VPN
    • UserGate Client IPsec L2TP
    • UserGate Client IKEv2 with certificate
    • UserGate Client IKEv2 Authentication via Radius Using Login and Password
  • WAF
    • WAF (Description)
    • UserGate WAF (Web Application Firewall) Licensing
    • System WAF Rules
    • Personal WAF layers
    • WAF profiles
    • Connecting a WAF Profile to Reverse Proxy Rules
  • Libraries of Items
    • Description
    • Morphology
    • Services
    • Services Groups
    • IP Addresses
    • Browser Useragent
    • Content types
    • Time Sets
    • Bandwidth Pools
    • Response Pages
    • URL Categories
    • Overridden URL Categories
    • Applications
    • Applications Profiles
    • Application Groups
    • Emails
    • Phones
    • IDPS Signatures
    • IDPS Profiles
    • Notification Profiles
    • Netflow Profiles
    • LLDP Profiles
    • SSL Profiles
    • SSL Forwarding Profiles
    • HIP Objects
    • HIP profiles
    • BFD Profiles
    • UserID Agent Syslog Filters
  • Diagnostics and Monitoring
    • Traffic Monitoring
    • Routes
    • OSPF
    • VPN
    • Web portal
    • Blocked IDPS/L7 IP Addresses
    • Packet Capture
    • Requests for White List
    • Tracing Rules
    • Ping
    • Traceroute
    • DNS Query
    • LLDP Neighbors
    • LLDP Statistics
  • Notifications
    • SNMP
    • SNMP Parameters
    • SNMP Security Profiles
    • Alert Rules
  • Logs and Reports
  • Logs
    • Description
    • Event Log
    • Web Access Log
    • DNS Log
    • Traffic Log
    • IDPS Log
    • SCADA Log
    • SSH Inspection Log
    • Search History
    • Mail Security Log
    • UserID Agent
    • Windows Active Directory log
    • Syslog (Log)
    • UserID (Log)
    • Logs Export
    • Data Search and Filtering
  • Reports
    • Description
    • Report Templates
    • Report Rules
    • Generated Reports
  • Guest portal
    • Guest User Management
  • Command Line Interface (CLI) v7.1
  • General Provisions
    • General Provisions (Description)
  • Commands Available Prior to Initial Node Setup
    • Commands Available Prior to Initial Node Setup (Description)
  • Initial Setup
    • Initial Setup (Description)
    • Install UserGate as the master node.
    • Install UserGate as a slave node.
    • Configuration using UserGate Management Center.
  • Diagnostics and Monitoring Commands
    • Diagnostics and Monitoring Commands (Description)
    • Interface Statistics
    • ARP Entries
    • Packet Tracing
    • Traffic Monitoring
    • LLDP
    • Routes
    • Cluster State Monitoring
    • Monitoring IDPS-Blocked IP Addresses
    • Display System Information
    • Dynamic Routing Protocol Diagnostics
  • Configuration Mode
    • Configuration Mode (Description)
    • General Command Structure in Configuration Mode
    • Execute Commands
    • Import Commands
    • Export Commands
    • Debug Command
  • Device Setup
    • Device Setup (Description)
    • Configuring CLI
    • UserGate General Settings
    • Configuring device management
    • Cluster Settings
    • Configuration cluster settings
    • Settings for high availability clusters
    • Configuring UserGate NGFW Console Access Control
    • General access settings
    • Configuring administrator accounts
    • Configuring Permissions for Administrator Profiles
    • Managing Administrator Sessions
    • Configuring Certificates
    • Settings for Device Parameters
    • Configuring Proxy Servers
    • Upstream Proxy Configuration
    • Настройка параметров мониторинга устройства
    • Настройка параметров SNMP устройства
    • Настройка правил мониторинга по SNMP
    • Настройка профилей безопасности SNMP
    • Настройка правил оповещений
    • These are the options for packet capture
  • Network Configuration
    • Zones
    • Interfaces
    • Adapter settings
    • Configuring a VLAN
    • Properties of bond interfaces
    • Bridge Interface Settings
    • PPPoE configuration
    • Configuring a VPN device
    • Configuring tunnels
    • Properties of loopback interfaces
    • Gateways
    • DHCP
    • DNS Configuration
    • Settings for System DNS servers
    • DNS proxy settings
    • Configuring DNS rules
    • Configuring DNS proxy static records
    • Configuring Virtual Routers
    • Configuring static routes
    • OSPF Configuration
    • Configuring BGP
    • RIP Configuration
    • Configuring multicast routing
    • WCCP Configuration
  • Configuring Rules Using UPL
    • Configuring Rules Using UPL (Description)
    • Syntax of WAF UPL Rules
  • Configuring the Users and Devices Section
    • Configuring User Groups
    • Configuring Users
    • Configuring Authentication Servers
    • Configuring LDAP connectors
    • Configuring RADIUS servers
    • Configuring a TACACS+ server
    • Configuring NTLM servers
    • Configuring an SAML IDP server
    • Configuring Authentication Profiles
    • Configuring Captive Profiles
    • Captive portal
    • Configuring Terminal Servers
    • Configuring MFA (Multifactor Authentication) Profiles
    • Configuring MFA by TOTP
    • Configuring MFA by email
    • Configuring MFA by SMS
  • Configuring the Network Policies Section
    • Configuring Firewall Rules
    • Configuring NAT and Routing Rules
    • Configuring NAT rules
    • Configuring DNAT Rules
    • Configuring port forwarding rules
    • Configuring Policy-based routing rules
    • Configuring Network mapping rules
    • Configuring Load Balancing
    • Configuring TCP/UDP load balancers
    • Configuring ICAP load balancers
    • Configuring reverse proxy load balancer
    • Configuring Traffic Shaping Rules
  • Configuring the Security Policies Section
    • Configuring Content Filtering
    • Configuring Safe Browsing
    • Configuring Tunnel Inspection Rules
    • Configuring SSL Inspection
    • Configuring SSH Inspection
    • Configuring IDPS
    • Configuring Scenarios
    • General Rules for Creating Scenarios
    • Types of Conditions Used When Creating Scenarios
    • Configuring Mail Security
    • Configuring Mail Security Rules
    • Setting up Antispam
    • Configuring ICAP Rules
    • Configuring ICAP Servers
    • Configuring DoS Profiles
    • Configuring DoS Rules
  • Configuring a Global Portal
    • Configuring a Web Portal
    • Configuring Reverse Proxy Rules
    • Configuring Reverse Proxy Servers
  • Configuring Remote Access (VPN)
    • Configuring Server Rules
    • Configuring Client Rules
    • Configuring VPN Networks
    • Configuring VPN Security Profiles
    • Creating a VPN Server Security Profile
    • Creating a VPN Client Security Profile
    • Example of Creating and Editing a VPN Security Profile
  • Configuring Libraries
    • Configuring Libraries (Description)
    • Configuring morphology
    • Configuring services
    • Configuring service groups
    • Configuring IP addresses
    • Configuring useragents
    • Configuring content types
    • Configuring URL lists
    • Configuring time sets
    • Configuring bandwidth pools
    • Configuring response pages
    • Configuring URL categories
    • Configuring overridden URL categories
    • Configuring Application Groups
    • Configuring Application Profiles
    • Configuring Application Signatures
    • Configuring email addresses
    • Configuring IDPS Signatures
    • Configuring IPS profiles
    • Configuring notification profiles
    • Configuring Netflow profiles
    • Configuring LLDP profiles
    • Configuring SSL profiles
    • Configuring SSL forwarding profiles
    • Configuring HIP Objects
    • Configuring HIP profiles
    • Configuring BFD profiles
    • Configuring UserID Agent Syslog Filters
  • UserGate Application and Security Language (UASL)
    • UserGate Application and Security Language (UASL)
    • Metainformation
    • ID
    • Filtering by IP Address
    • Filtering by Port
    • Scanning Packets Without Payload
    • Template Lookup
    • Regular Expression Search
    • Search Area Modifiers
    • .no_case
    • .where
    • .service
    • .distance, .within, .at, .startin
    • .protocol
    • Triggering Frequency
    • Signature Prioritization
    • Analysis Direction
    • Binary Data Search
    • File Search
    • Working with Tags
    • Protocol Analyzers
    • ICMP
    • TCP
    • UDP
    • HTTP
    • Examples
    • Example 1
    • Example 2
    • Example 3
  • Platform Management Controller Command Line Interface
    • General Information
    • Platform Management
    • Network Settings Management
    • Working with Factory Settings
    • User Management
    • Working in Loader Mode
  • System utilities
    • System utilities
  • Dashboard
    • DashBoard
  • Help
    • Help (Description)
  • ADMIN
    • ADMIN (description)
  • Favorites
    • Favorites
  • Applications
    • Installing Local CA Certificates
    • Description of Log Formats
  • Logs Export in CEF Format
    • Event Log Format
    • Web access log format
    • DNS log format
    • Traffic log format
    • IDPS log format
    • SCADA log format
    • SSH inspection log format
    • Mail Security Log Format
    • Windows Active Directory Log Format
    • Syslog Format
    • UserID log format
  • Export logs in JSON format
    • Event log description
    • Web access log description
    • DNS log description
    • Traffic log description
    • IDPS log description
    • SCADA log description
    • SSH inspection log description
    • Mail Security Log Description
    • Windows Active Directory Log Description
    • Syslog Description
    • UserID log description
    • Network Environment Requirements
    • DHCP options
    • Examples of Certificate Generation for IKEv2 VPN
    • Certificate generation in Linux using OpenSSL
    • Certificate Generation by the Microsoft Server Certification Center

UserGate NGFW 7.1.0

Version: 
UserGate 7.x

Administrator's Guide

  • NGFW 7.1.0 Administrator Guide
  • Introduction
  • Network Security and Threat Protection
  • Internet Performance and Reliability Improvement
  • Traffic Management and Internet Access Control
  • Logs and Reports
  • Content Filtering and Application Control
  • Other Features
  • Licensing
  • Initial Configuration
  • Device Setup
  • Network Configuration
  • Users and Devices
  • Network Policies
  • Security Policies
  • Mail Security
  • Antispam Settings
  • Global Portal
  • VPN Settings
  • WAF
  • Libraries of Items
  • Diagnostics and Monitoring
  • Notifications
  • Logs and Reports
  • Logs
  • Reports
  • Guest portal
  • Command Line Interface (CLI) v7.1
  • General Provisions
  • Commands Available Prior to Initial Node Setup
  • Initial Setup
  • Diagnostics and Monitoring Commands
  • Configuration Mode
  • Device Setup
  • Network Configuration
  • Configuring Rules Using UPL
  • Configuring the Users and Devices Section
  • Configuring the Network Policies Section
  • Configuring the Security Policies Section
  • Configuring a Global Portal
  • Configuring Remote Access (VPN)
  • Configuring Libraries
  • UserGate Application and Security Language (UASL)
  • Platform Management Controller Command Line Interface
  • System utilities
  • Dashboard
  • Help
  • ADMIN
  • Favorites
  • Applications
  • Logs Export in CEF Format
  • Export logs in JSON format
NGFW 7.1.0 Administrator Guide ›
Terms of Use|Privacy Policy

Copyright © 2001-2025 UserGate