Intra2net Administrator Manual

Intra2net AG

The contents of this manual have been prepared with care. However, the information in this manual is not a warranty of product performance. Intra2net AG shall only be liable to the extent of its sales and delivery conditions and shall not assume any liability for technical inaccuracies and/or omissions. The information in this manual is subject to change without notice. Additional information, as well as changes and version information for Intra2net systems can be found online at https://www.intra2net.com

The Intra2net system establishes communication connections depending on the configuration. In order to avoid unwanted charges and data loss, the product should be monitored and backed up at regular intervals. Intra2net accepts no responsibility for loss of data, accidental connection costs or damage caused by the unattended operation of the product.

Intra2net and the Intra2net logo are registered trademarks of Intra2net AG. Company and product names are mostly trademarks of their respective companies or manufacturers.

Copyright © 1999-2019 Intra2net AG. All rights reserved. No part of this manual may be reproduced or reused in any form whatsoever without prior written permission from Intra2net AG.


          Intra2net AG
          Mömpelgarder Weg 8
          72072 Tübingen
          Germany
        

Valid for Intra2net software version 6.5.3

Valid for Intra2net Groupware Client Version 4.0.1

08. May 2019


Table of Contents

1. Installation
1. Welcome
1.1. About this Manual
1.2. Factory Settings
2. Installation on Own Hardware
2.1. Hardware Selection
2.2. Installing as a Virtual Machine
2.3. Location
2.4. BIOS
2.5. RAID
2.6. Installation from CD
2.7. Solving Compatibility Problems
3. Installing the Appliance
3.1. Included Contents
3.1.1. Intra2net Appliance Eco
3.1.2. Intra2net Appliance Pro
3.1.3. Intra2net Appliance Ultimate
3.2. Location
3.3. Cleaning and Care
3.4. Connections
3.5. LED display
3.5.1. Start-up of the device
3.5.2. Normal operation
3.5.3. Update running
3.5.4. Error
3.6. Software
4. Installing as a Virtual Machine
4.1. Comparison to Real Hardware
4.1.1. Inconsistent performance speed
4.1.2. Lower I/O Performance
4.1.3. Contact with Unfiltered Network Packets
5. Installation on VMware vSphere Hypervisor 4 (ESXi)
5.1. Virtual Machine Configuration
5.2. Virtual Machine with Direct Internet Access
5.3. Installing the Intra2net System
6. Installation of Microsoft Hyper-V on Windows Server 2012 R2
6.1. Virtual Machine Configuration
6.2. Installation of the Intra2net System
7. The Console
7.1. Hardware Detection
7.2. Network Cards
7.3. DNS and DHCP
7.4. Firewall Emergency Mode
7.5. Restore to Factory Settings
7.6. The Root Password
7.7. The Linux Shell
8. The Web Interface
8.1. Accessing the Web Interface
8.2. License Code
8.3. The Main Page
8.4. The Queue
8.5. The Configuration Check
2. General Functions
9. Intranet
9.1. IPs and Networks
9.2. VLAN Tagging
9.3. Access Rights of a Network Object
9.4. Domain and DNS
9.4.1. The Intra2net system as local DNS server
9.4.2. Integrate another DNS server in the LAN
9.4.3. Forward DNS to Other Domains
9.4.4. Prevent DNS Rebind
9.5. Registering Clients
9.6. DHCP
9.7. Entering Ranges
9.8. Import/Export Client Profiles
9.8.1. Importing Clients
9.8.2. Exporting Clients
9.9. Intranet Routing
10. SSL Encryption and Certificates
10.1. Principles and Dangers of SSL Encryption
10.2. Correctly Creating Certificates
10.2.1. The Computer Name
10.2.2. Configuration
10.3. Installing Certificates on Clients
10.3.1. Installation with Windows
10.3.2. Distributing Certificates via Active Directory
10.4. User Education and Awareness
10.5. Using an External Certificate Authority
10.5.1. Certificates from Let's Encrypt
10.5.2. Certificates from classic certification authorities
10.6. Key Import
10.7. Encryption Strength
11. Internet
11.1. Dial-up with DSL (PPPoE)
11.2. Dial-up with DSL (PPTP)
11.3. Router with static IP
11.4. Router with DHCP or Cable Modem
11.5. Router on the Local Network
11.6. Router vs. Modem
11.7. Official IPs and DMZs
11.7.1. Classic Routing
11.7.2. Static NAT
11.7.3. Proxy-ARP
11.8. Automatic Connection
11.9. Connection Monitoring
11.10. Switching to Other Providers in the Event of an Error (Fallback)
11.11. Bandwidth Management and VoIP Prioritization
11.11.1. Bandwidth Management
11.11.2. Prioritize VoIP and Real-time Data
11.12. Masquerading / NAT
11.13. DynDNS
11.13.1. Providers
11.13.2. Updates and the IP Address Used
11.14. External access
12. Proxy
12.1. Overview
12.2. Access to the Proxy
12.3. Proxy Configuration
12.4. URL Filter
12.4.1. Proxy Profile
12.4.2. Proxy Access Lists
12.4.3. Time Management
12.5. Web Content Filter
12.6. Proxy Virus Scanner
13. Statistics and Data Privacy
13.1. Proxy Statistics
13.1.1. Proxy Logging
13.1.2. Analysis
13.1.3. Methodology
13.2. Internet Access Statistics
13.2.1. Methodology
13.3. Speedometer
13.3.1. Methodology
13.3.2. Sites
13.3.3. Data Privacy
13.4. Space Usage Statistics
13.5. Data Privacy
14. Usermanager
14.1. User Groups
14.1.1. Access Rights
14.1.2. Administration Rights
14.2. User
14.2.1. Settings for Email and Groupware
14.3. Import/export of User Profiles
14.3.1. Importing Users
14.3.2. Exporting Users
15. Email
15.1. Email Relay
15.1.1. Rights
15.1.2. SMTP-Submission
15.1.3. Dispatch Methods
15.1.4. Dispatch via relay server
15.1.5. Direct Dispatch
15.1.6. Choosing the dispatch method
15.2. Receiving emails on the client (POP or IMAP)
15.3. Receive emails using the Intra2net system
15.3.1. Methods
15.3.2. Retrieving individual POP accounts
15.3.3. Direct delivery via SMTP
15.3.4. Retrieval of collective POP accounts (multidrop)
15.4. Forwarding of entire domains
15.4.1. Method
15.4.2. Recipient Address Check
15.4.3. Forwarding of individual POP accounts
15.5. Email Addressing
15.5.1. Address Settings
15.5.2. Email Addresses and Aliases
15.6. Email Processing
15.6.1. Forwarding
15.6.2. Automatic Response
15.6.3. Sorting
15.6.4. Automatic deletion
15.7. Emailfilter
15.7.1. Spamfilter
15.7.2. Virus Scanner
15.7.3. Attachment Filter
15.8. Archiving
15.8.1. Interface
15.8.2. Connecting the MailStore Server
15.9. Automatic Transfer
15.10. Mailinglist
15.11. Additional Settings
15.12. Queue
15.13. Structure of the mail system
15.14. Differences between licenses
16. Services
16.1. Fax
16.1.1. ISDN-Connection
16.1.2. Receiving
16.1.3. Sending
16.1.4. Differences Between Licenses
16.2. Timeserver
16.3. Monitoring via SNMP
17. System Functions
17.1. License
17.1.1. Demo Mode
17.1.2. License Code
17.1.3. Update Period
17.2. Updates
17.2.1. Remote Update via Partner Web
17.2.2. Rescue System
17.3. Backup
17.3.1. Remote Storage
17.3.2. Restore
17.3.3. Procedure for Hard Drive Damage or Hardware Replacement
17.3.4. Standby systems
17.4. Operation Behind Firewall
17.5. Logfiles
17.6. Logcheck Reports
17.7. Scheduled Shutdown
17.8. Inspection and repair of filesystems
3. Groupware Client
18. Introduction
18.1. System Requirements
18.2. Overview of Features
18.3. Known Limitations
19. Installation
19.1. Installing the Program
19.2. Distributing the Program via Active Directory
19.3. Switch from 32 bit to 64 bit
20. Setting up a Profile
21. Account Configuration
21.1. Groupware Account
21.1.1. Activate Certificate Check
21.1.2. Deactivating the Search Indexer
21.2. Importing Existing Data
21.2.1. Importing Using Outlook Import
21.2.2. Importing Larger Amounts of Emails
21.3. Setting up Multiple Accounts and Email Addresses
21.3.1. Multiple Server Accounts
21.3.2. Multiple Outgoing Mail Identities
21.4. Converting Previous Installations of the Groupware Client
22. Sharing and Access to Shared Folders
22.1. Sharing Own Folders
22.1.1. Read Status Shared/Individual
22.2. Linking Shared Folders
23. Additional Features
23.1. Excluding Folders from Synchronization
23.2. Manually Connecting Folders
23.2.1. Switching to Manual Linking
23.2.2. Linking an Individual Folder
23.2.3. Removing a Folder Link
23.3. Folder Hierarchy and ibx_sub
23.4. Folder Options
23.5. Editing Server-Side Settings
23.6. Use Free/Busy Information
23.6.1. Outlook 2010 to 2019
23.6.2. Outlook 2007
23.7. Marking as Private
23.8. Reminders in Shared Folders
23.9. User-Defined Fields in Contacts
23.10. Showing Item Source Text
23.11. Backup Folders
23.11.1. Backup Data after Restore
23.11.2. Backup of local data when resetting to automatic mode
23.12. Advice to the User
23.13. Log files
23.13.1. Submitting log files to support
24. Advanced Email Configuration
24.1. Retrieve Emails Completely or Only Headers
24.2. Notification of New Emails
24.3. Marking Moved Emails as Read
24.4. Email Reminders and Tracking
24.5. Read receipts
25. Compatibility and Collaboration
25.1. Personal firewalls on the Client
25.2. Virus Scanner on the Client
25.3. Compatibility with PDAs and Mobile Phones
25.4. Other Programs
25.4.1. Incompatible Addins
25.5. Automatic detection of compatibility problems
26. Concept for public folders
26.1. Setup
26.2. Emails
27. Migrating Emails with IMAPCopy
28. Migration from Microsoft Exchange
28.1. Offline Migration
28.1.1. Migration Step-by-step
28.2. Migration During Operation
28.2.1. Preparing for Migration
28.2.2. Migrating Individual Users
28.2.3. Shared Folders
28.2.4. Final steps
29. Reference Information
29.1. Synchronizable data
29.1.1. Tasks
29.1.2. Meetings
29.1.3. Notes
29.1.4. Contacts
29.1.5. Contact Groups
29.1.6. Emails
29.1.7. All Items
29.2. Advanced Registry Settings
29.2.1. Store Settings
29.2.2. Addin Settings
29.3. Data Formats
4. Web-Groupware and ActiveSync
30. Introduction to Web Groupware
30.1. The Display Modes
31. Email
31.1. Reading and Editing Emails
31.1.1. Displaying Emails
31.1.2. Deleted Emails
31.1.3. Exporting Emails
31.2. Sending Emails
31.2.1. New Message
31.2.2. Append Signatures
31.3. Managing Folders
31.3.1. Folder Hierarchy
31.3.2. Organizing Folders
31.3.3. Subscribing to Folders
31.3.4. Sharing Folders
32. Address Book
33. Connecting Mobile Devices using ActiveSync
33.1. Introduction
33.2. Server Settings
33.3. Special Features and Tips
33.3.1. Deleting Emails on the Server
33.3.2. Synchronization Steps
33.3.3. Manage and Resynchronize Devices
33.3.4. Synchronize Multiple Calendars or Contact Lists
34. ActiveSync with Android Devices
35. ActiveSync with Apple iOS Devices
36. Reference Information
5. Firewall
37. Selecting Firewall Rulesets
37.1. Rulesets on LAN
37.2. Rulesets for the Internet
37.3. Packet Routes Through the Firewall
37.3.1. Packet Routes on the LAN and Internet
37.3.2. Packet Routes for VPN Connections
38. Firewall Profile
38.1. General Basic LAN Rules
38.2. Client Profiles
38.3. Provider profile
39. Full Rulesets
39.1. Components
39.1.1. Services
39.1.2. Netgroups
39.1.3. Automatic Objects
39.2. Rulesets
39.2.1. Default Settings
39.2.2. Passing Through the Ruleset
39.2.3. Linking Rule Criteria
39.2.4. The Actions
39.2.5. Extra Options
39.2.6. Special Features of Provider Rulesets
40. Additional Functions
40.1. Checking MAC Addresses
40.2. Preventing LAN spoofing
40.3. Blocking IPs After Too Many Login Errors
40.4. Firewall Emergency Mode
41. Case Studies and Examples
41.1. Example 1: Extending a Simple Client Profile
41.1.1. Sample Solution
41.2. Example 2: Port Forwarding Only Accessible from an External IP
41.3. Example 3: Separate Guest Network
41.3.1. Sample Solution
41.4. Example 4: Restricted Access from the VPN
41.5. Example 5: Web Server in the DMZ
41.5.1. Sample Solution
6. VPN
42. IPSec Basics
42.1. IPSec
42.2. Public-Key Cryptography
42.3. Certificates
42.4. IPSec connections
42.5. Algorithms
42.6. Limitations
42.7. Compatibility with Other IPSec Peers
43. Key Management
43.1. Own Keys
43.1.1. Certificate Authorities (CAs)
43.2. Foreign Keys
44. Connecting Individual PCs
44.1. Method
44.2. Configuration on the Intra2net System
44.2.1. Prerequisites
44.2.2. Default Settings
44.2.3. Authentication
44.2.4. Configuring the Tunnel
44.2.5. Rights
44.2.6. Activation
45. VPN with the NCP Secure Entry Client
45.1. Installation
45.2. Certificates
45.3. Connections
45.4. Intra2net System
46. VPN with the Shrew Soft VPN Client
46.1. Certificates
46.2. Client Connection Settings
46.3. Intra2net System
46.4. Establishing Connection
46.5. Connection Protocols
47. VPN with Mac OS X
47.1. Installation
47.2. Generating Certificates
47.3. Importing Certificates
47.4. Configuring Connections
47.5. Intra2net System
48. VPN with the Apple iPhone
48.1. Certificate for iPhone
48.2. Certificate for the Intra2net System
48.3. Connection to the Intra2net System
48.4. Connecting with iPhone
49. VPN with Android
49.1. Preparing the Device
49.2. Certificates
49.3. Connection on the Intra2net System
49.4. Connecting with Android
49.5. Simplify Connection Setup
49.6. Connection Logs
50. Connecting Complete Networks
50.1. Method
50.2. Configuration on the Intra2net System
50.2.1. Prerequisites
50.2.2. Default Settings
50.2.3. Authentication
50.2.4. Configuring the Tunnel
50.2.5. Rights
50.2.6. Activation
51. VPN with ZyXEL ZyWALL USG
51.1. Overview
51.2. Preparation
51.3. Certificate
51.4. Connection
51.4.1. IKE / Phase 1
51.4.2. IPSec / Phase 2
51.5. Intra2net System
51.6. Logs
52. VPN with Lancom Routers
52.1. Overview
52.2. Certificate for the Lancom device
52.3. Certificate for the Intra2net System
52.4. Connecting
52.5. Intra2net System
52.6. Deleting Certificates
53. VPN with Linux
53.1. Overview
53.2. Generating Certificates
53.3. Configuring Connections
53.4. Intra2net System
54. Solving IP Address Conflicts in VPNs Through NAT
54.1. The Problem
54.2. Configuration
54.3. Same IPs on LAN and Peer
54.3.1. Implementation
54.4. Multiple Peers with the Same IPs
54.4.1. Implementation
54.5. Local IPs Defined by Service Provider for Remote Maintenance
54.5.1. Implementation
55. Error Diagnosis
55.1. Reading Logs
55.2. The Protocol Format of the Intra2net System
55.3. Error in Phase 1
55.4. Error in Phase 2
7. Appendix
A. Licenses
A.1. Intra2net Software License Agreement
A.2. Licensed software
B. License
B.1. Intra2net Groupware Client License Agreement (EULA)
B.2. Licensed Software
B.2.1. Info-ZIP
B.2.2. JsonCpp
Index

    We use cookies to analyse access to our website. For further details, please read our Privacy Policy.