Intra2net Administrator Manual

Intra2net AG

The contents of this manual have been prepared with care. However, the information in this manual is not a warranty of product performance. Intra2net AG shall only be liable to the extent of its sales and delivery conditions and shall not assume any liability for technical inaccuracies and/or omissions. The information in this manual is subject to change without notice. Additional information, as well as changes and version information for Intra2net systems can be found online at https://www.intra2net.com

The Intra2net system establishes communication connections depending on the configuration. In order to avoid unwanted charges and data loss, the product should be monitored and backed up at regular intervals. Intra2net accepts no responsibility for loss of data, accidental connection costs or damage caused by the unattended operation of the product.

Intra2net and the Intra2net logo are registered trademarks of Intra2net AG. Company and product names are mostly trademarks of their respective companies or manufacturers.

Copyright © 1999-2018 Intra2net AG. All rights reserved. No part of this manual may be reproduced or reused in any form whatsoever without prior written permission from Intra2net AG.


          Intra2net AG
          Mömpelgarder Weg 8
          72072 Tübingen
          Germany
        

Valid for Intra2net software version 6.5.1

Valid for Intra2net Groupware Client Version 4.0.0

12. December 2018


Table of Contents

1. Installation
1. Welcome
1.1. About this Manual
1.2. Factory Settings
2. Installation on Own Hardware
2.1. Hardware Selection
2.2. Installing as a Virtual Machine
2.3. Location
2.4. BIOS
2.5. RAID
2.6. Installation from CD
2.7. Solving Compatibility Problems
3. Installing the Appliance
3.1. Included Contents
3.1.1. Intra2net Appliance Eco
3.1.2. Intra2net Appliance Pro
3.1.3. Intra2net Appliance Ultimate
3.2. Location
3.3. Cleaning and Care
3.4. Connections
3.5. LED display
3.5.1. Start-up of the device
3.5.2. Normal operation
3.5.3. Update running
3.5.4. Error
3.6. Software
4. Installing as a Virtual Machine
4.1. Comparison to Real Hardware
4.1.1. Inconsistent performance speed
4.1.2. Lower I/O Performance
4.1.3. Contact with Unfiltered Network Packets
5. Installation on VMware vSphere Hypervisor 4 (ESXi)
5.1. Virtual Machine Configuration
5.2. Virtual Machine with Direct Internet Access
5.3. Installing the Intra2net System
6. Installation of Microsoft Hyper-V on Windows Server 2012 R2
6.1. Virtual Machine Configuration
6.2. Installation of the Intra2net System
7. The Console
7.1. Hardware Detection
7.2. Network Cards
7.3. DNS and DHCP
7.4. Firewall Emergency Mode
7.5. Restore to Factory Settings
7.6. The Root Password
7.7. The Linux Shell
8. The Web Interface
8.1. Accessing the Web Interface
8.2. License Code
8.3. The Main Page
8.4. The Queue
8.5. The Configuration Check
2. General Functions
9. Intranet
9.1. IPs and Networks
9.2. VLAN Tagging
9.3. Access Rights of a Network Object
9.4. Domain and DNS
9.4.1. The Intra2net system as local DNS server
9.4.2. Integrate another DNS server in the LAN
9.4.3. Forward DNS to Other Domains
9.4.4. Prevent DNS Rebind
9.5. Registering Clients
9.6. DHCP
9.7. Entering Ranges
9.8. Import/Export Client Profiles
9.8.1. Importing Clients
9.8.2. Exporting Clients
9.9. Intranet Routing
10. SSL Encryption and Certificates
10.1. Principles and Dangers of SSL Encryption
10.2. Correctly Creating Certificates
10.2.1. The Computer Name
10.2.2. Configuration
10.3. Installing Certificates on Clients
10.3.1. Installation with Windows
10.3.2. Distributing Certificates via Active Directory
10.4. User Education and Awareness
10.5. Using an External Certificate Authority
10.5.1. Certificates from Let's Encrypt
10.5.2. Certificates from classic certification authorities
10.6. Key Import
10.7. Encryption Strength
11. Internet
11.1. Dial-up with DSL (PPPoE)
11.2. Dial-up with DSL (PPTP)
11.3. Router with static IP
11.4. Router with DHCP or Cable Modem
11.5. Router on the Local Network
11.6. Router vs. Modem
11.7. Official IPs and DMZs
11.7.1. Classic Routing
11.7.2. Static NAT
11.7.3. Proxy-ARP
11.8. Automatic Connection
11.9. Connection Monitoring
11.10. Switching to Other Providers in the Event of an Error (Fallback)
11.11. Bandwidth Management and VoIP Prioritization
11.11.1. Bandwidth Management
11.11.2. Prioritize VoIP and Real-time Data
11.12. Masquerading / NAT
11.13. DynDNS
11.13.1. Providers
11.13.2. Updates and the IP Address Used
11.14. External access
12. Proxy
12.1. Overview
12.2. Access to the Proxy
12.3. Proxy Configuration
12.4. URL Filter
12.4.1. Proxy Profile
12.4.2. Proxy Access Lists
12.4.3. Time Management
12.5. Web Content Filter
12.6. Proxy Virus Scanner
13. Statistics and Data Privacy
13.1. Proxy Statistics
13.1.1. Proxy Logging
13.1.2. Analysis
13.1.3. Methodology
13.2. Internet Access Statistics
13.2.1. Methodology
13.3. Speedometer
13.3.1. Methodology
13.3.2. Sites
13.3.3. Data Privacy
13.4. Space Usage Statistics
13.5. Data Privacy
14. Usermanager
14.1. User Groups
14.1.1. Access Rights
14.1.2. Administration Rights
14.2. User
14.2.1. Settings for Email and Groupware
14.3. Import/export of User Profiles
14.3.1. Importing Users
14.3.2. Exporting Users
15. Email
15.1. Email Relay
15.1.1. Rights
15.1.2. SMTP-Submission
15.1.3. Dispatch Methods
15.1.4. Dispatch via relay server
15.1.5. Direct Dispatch
15.2. Receiving emails on the client (POP or IMAP)
15.3. Receive emails using the Intra2net system
15.3.1. Methods
15.3.2. Retrieving individual POP accounts
15.3.3. Direct delivery via SMTP
15.3.4. Retrieval of collective POP accounts (multidrop)
15.4. Forwarding of entire domains
15.4.1. Method
15.4.2. Recipient Address Check
15.4.3. Forwarding of individual POP accounts
15.5. Email Addressing
15.5.1. Address Settings
15.5.2. Email Addresses and Aliases
15.6. Email Processing
15.6.1. Forwarding
15.6.2. Automatic Response
15.6.3. Sorting
15.6.4. Automatic deletion
15.7. Emailfilter
15.7.1. Spamfilter
15.7.2. Virus Scanner
15.7.3. Attachment Filter
15.8. Archiving
15.8.1. Interface
15.8.2. Connecting the MailStore Server
15.9. Automatic Transfer
15.10. Mailinglist
15.11. Additional Settings
15.12. Queue
15.13. Structure of the mail system
15.14. Differences between licenses
16. Services
16.1. Fax
16.1.1. ISDN-Connection
16.1.2. Receiving
16.1.3. Sending
16.1.4. Differences Between Licenses
16.2. Timeserver
16.3. Monitoring via SNMP
16.4. Remote Access / RAS
17. System Functions
17.1. License
17.1.1. Demo Mode
17.1.2. License Code
17.1.3. Update Period
17.2. Updates
17.2.1. Remote Update via Partner Web
17.2.2. Rescue System
17.3. Backup
17.3.1. Remote Storage
17.3.2. Restore
17.3.3. Procedure for Hard Drive Damage or Hardware Replacement
17.4. Operation Behind Firewall
17.5. Logfiles
17.6. Logcheck Reports
17.7. Scheduled Shutdown
3. Groupware Client
18. Introduction
18.1. System Requirements
18.2. Overview of Features
18.3. Known Limitations
19. Installation
19.1. Installing the Program
19.2. Distributing the Program via Active Directory
20. Setting up a Profile
21. Account Configuration
21.1. Groupware Account
21.1.1. Activate Certificate Check
21.1.2. Deactivating the Search Indexer
21.2. Importing Existing Data
21.2.1. Importing Using Outlook Import
21.2.2. Importing Larger Amounts of Emails
21.3. Setting up Multiple Accounts and Email Addresses
21.3.1. Multiple Server Accounts
21.3.2. Multiple Outgoing Mail Identities
21.4. Converting Previous Installations of the Groupware Client
22. Sharing and Access to Shared Folders
22.1. Sharing Own Folders
22.1.1. Read Status Shared/Individual
22.2. Linking Shared Folders
23. Additional Features
23.1. Excluding Folders from Synchronization
23.2. Manually Connecting Folders
23.2.1. Switching to Manual Linking
23.2.2. Linking an Individual Folder
23.2.3. Removing a Folder Link
23.3. Folder Hierarchy and ibx_sub
23.4. Folder Options
23.5. Editing Server-Side Settings
23.6. Use Free/Busy Information
23.6.1. Outlook 2010 to 2019
23.6.2. Outlook 2007
23.7. Marking as Private
23.8. Reminders in Shared Folders
23.9. User-Defined Fields in Contacts
23.10. Showing Item Source Text
23.11. Backup Folders
23.11.1. Backup Data after Restore
23.11.2. Backup of Local Data Before Folder Linking
23.12. Advice to the User
23.13. Log files
23.13.1. Submitting log files to support
24. Advanced Email Configuration
24.1. Retrieve Emails Completely or Only Headers
24.2. Notification of New Emails
24.3. Marking Moved Emails as Read
24.4. Email Reminders and Tracking
24.5. Read receipts
25. Compatibility and Collaboration
25.1. Personal firewalls on the Client
25.2. Virus Scanner on the Client
25.3. Compatibility with PDAs and Mobile Phones
25.4. Other Programs
25.4.1. Incompatible Addins
25.5. Automatic detection of compatibility problems
26. Migrating Emails with IMAPCopy
27. Migration from Microsoft Exchange
27.1. Offline Migration
27.1.1. Migration Step-by-step
27.2. Migration During Operation
27.2.1. Preparing for Migration
27.2.2. Migrating Individual Users
27.2.3. Shared Folders
27.2.4. Final steps
28. Reference Information
28.1. Synchronizable data
28.1.1. Tasks
28.1.2. Meetings
28.1.3. Notes
28.1.4. Contacts
28.1.5. Contact Groups
28.1.6. Emails
28.1.7. All Items
28.2. Advanced Registry Settings
28.2.1. Store Settings
28.2.2. Addin Settings
28.3. Data Formats
4. Web-Groupware and ActiveSync
29. Introduction to Web Groupware
29.1. The Display Modes
30. Email
30.1. Reading and Editing Emails
30.1.1. Displaying Emails
30.1.2. Deleted Emails
30.1.3. Exporting Emails
30.2. Sending Emails
30.2.1. New Message
30.2.2. Append Signatures
30.3. Managing Folders
30.3.1. Folder Hierarchy
30.3.2. Organizing Folders
30.3.3. Subscribing to Folders
30.3.4. Sharing Folders
31. Address Book
32. Connecting Mobile Devices using ActiveSync
32.1. Introduction
32.2. Server Settings
32.3. Special Features and Tips
32.3.1. Deleting Emails on the Server
32.3.2. Synchronization Steps
32.3.3. Manage and Resynchronize Devices
32.3.4. Synchronize Multiple Calendars or Contact Lists
33. ActiveSync with Android Devices
34. ActiveSync with Apple iOS Devices
35. Reference Information
5. Firewall
36. Selecting Firewall Rulesets
36.1. Rulesets on LAN
36.2. Rulesets for the Internet
36.3. Packet Routes Through the Firewall
36.3.1. Packet Routes on the LAN and Internet
36.3.2. Packet Routes for VPN Connections
37. Firewall Profile
37.1. General Basic LAN Rules
37.2. Client Profiles
37.3. Provider profile
38. Full Rulesets
38.1. Components
38.1.1. Services
38.1.2. Netgroups
38.1.3. Automatic Objects
38.2. Rulesets
38.2.1. Default Settings
38.2.2. Passing Through the Ruleset
38.2.3. Linking Rule Criteria
38.2.4. The Actions
38.2.5. Extra Options
38.2.6. Special Features of Provider Rulesets
39. Additional Functions
39.1. Checking MAC Addresses
39.2. Preventing LAN spoofing
39.3. Blocking IPs After Too Many Login Errors
39.4. Firewall Emergency Mode
40. Case Studies and Examples
40.1. Example 1: Extending a Simple Client Profile
40.1.1. Sample Solution
40.2. Example 2: Port Forwarding Only Accessible from an External IP
40.3. Example 3: Separate Guest Network
40.3.1. Sample Solution
40.4. Example 4: Restricted Access from the VPN
40.5. Example 5: Web Server in the DMZ
40.5.1. Sample Solution
6. VPN
41. IPSec Basics
41.1. IPSec
41.2. Public-Key Cryptography
41.3. Certificates
41.4. IPSec connections
41.5. Algorithms
41.6. Limitations
41.7. Compatibility with Other IPSec Peers
42. Key Management
42.1. Own Keys
42.1.1. Certificate Authorities (CAs)
42.2. Foreign Keys
43. Connecting Individual PCs
43.1. Method
43.2. Configuration on the Intra2net System
43.2.1. Prerequisites
43.2.2. Default Settings
43.2.3. Authentication
43.2.4. Configuring the Tunnel
43.2.5. Rights
43.2.6. Activation
44. VPN with the NCP Secure Entry Client
44.1. Installation
44.2. Certificates
44.3. Connections
44.4. Intra2net System
45. VPN with the Shrew Soft VPN Client
45.1. Certificates
45.2. Client Connection Settings
45.3. Intra2net System
45.4. Establishing Connection
45.5. Connection Protocols
46. VPN with Mac OS X
46.1. Installation
46.2. Generating Certificates
46.3. Importing Certificates
46.4. Configuring Connections
46.5. Intra2net System
47. VPN with the Apple iPhone
47.1. Certificate for iPhone
47.2. Certificate for the Intra2net System
47.3. Connection to the Intra2net System
47.4. Connecting with iPhone
48. VPN with Android
48.1. Preparing the Device
48.2. Certificates
48.3. Connection on the Intra2net System
48.4. Connecting with Android
48.5. Simplify Connection Setup
48.6. Connection Logs
49. Connecting Complete Networks
49.1. Method
49.2. Configuration on the Intra2net System
49.2.1. Prerequisites
49.2.2. Default Settings
49.2.3. Authentication
49.2.4. Configuring the Tunnel
49.2.5. Rights
49.2.6. Activation
50. VPN with ZyXEL ZyWALL USG
50.1. Overview
50.2. Preparation
50.3. Certificate
50.4. Connection
50.4.1. IKE / Phase 1
50.4.2. IPSec / Phase 2
50.5. Intra2net System
50.6. Logs
51. VPN with Lancom Routers
51.1. Overview
51.2. Certificate for the Lancom device
51.3. Certificate for the Intra2net System
51.4. Connecting
51.5. Intra2net System
51.6. Deleting Certificates
52. VPN with Linux
52.1. Overview
52.2. Generating Certificates
52.3. Configuring Connections
52.4. Intra2net System
53. Solving IP Address Conflicts in VPNs Through NAT
53.1. The Problem
53.2. Configuration
53.3. Same IPs on LAN and Peer
53.3.1. Implementation
53.4. Multiple Peers with the Same IPs
53.4.1. Implementation
53.5. Local IPs Defined by Service Provider for Remote Maintenance
53.5.1. Implementation
54. Error Diagnosis
54.1. Reading Logs
54.2. The Protocol Format of the Intra2net System
54.3. Error in Phase 1
54.4. Error in Phase 2
7. Appendix
A. Licenses
A.1. Intra2net Software License Agreement
A.2. Licensed software
B. License
B.1. Intra2net Groupware Client License Agreement (EULA)
B.2. Licensed Software
B.2.1. Info-ZIP
B.2.2. JsonCpp
Index

    We use cookies to analyse access to our website. For further details, please read our Privacy Policy.