Part 2. General Functions

Table of Contents

8. Intranet
8.1. IPs and Networks
8.2. VLAN Tagging
8.3. Access Rights of a Network Object
8.4. Domain and DNS
8.4.1. The Intra2net system as local DNS server
8.4.2. Integrate another DNS server in the LAN
8.4.3. Forward DNS to Other Domains
8.4.4. Prevent DNS Rebind
8.5. Registering Clients
8.5.1. Wake-On-LAN
8.5.2. DHCP
8.6. DHCP-Server
8.7. Entering Ranges
8.8. Import/Export Client Profiles
8.8.1. Importing Clients
8.8.2. Exporting Clients
8.9. Intranet Routing
9. SSL Encryption and Certificates
9.1. Principles and Dangers of SSL Encryption
9.2. Correctly Creating Certificates
9.2.1. The Computer Name
9.2.2. Configuration
9.3. Installing Certificates on Clients
9.3.1. Installation with Windows
9.3.2. Distributing Certificates via Active Directory
9.4. User Education and Awareness
9.5. Using an External Certificate Authority
9.5.1. Certificates from Let's Encrypt
9.5.2. Certificates from classic certification authorities
9.6. Key Import
9.7. Encryption Strength
10. Internet
10.1. Dial-up with DSL (PPPoE)
10.2. Dial-up with DSL (PPTP)
10.3. Router with static IP
10.4. Router with DHCP or Cable Modem
10.5. Router on the Local Network
10.6. Router vs. Modem
10.7. Official IPs and DMZs
10.7.1. Classic Routing
10.7.2. Static NAT
10.7.3. Proxy-ARP
10.8. Automatic Connection
10.9. Connection Monitoring
10.10. Switching to Other Providers in the Event of an Error (Fallback)
10.11. Bandwidth Management and VoIP Prioritization
10.11.1. Bandwidth Management
10.11.2. Prioritize VoIP and Real-time Data
10.12. Masquerading / NAT
10.13. DynDNS
10.13.1. Providers
10.13.2. Updates and the IP Address Used
10.14. External access
11. Proxy
11.1. Overview
11.2. Access to the Proxy
11.3. Proxy Configuration
11.4. URL Filter
11.4.1. Proxy Profile
11.4.2. Proxy Access Lists
11.4.3. Time Management
11.5. Web Content Filter
11.6. Proxy Virus Scanner
12. Statistics and Data Privacy
12.1. Proxy Statistics
12.1.1. Proxy Logging
12.1.2. Analysis
12.1.3. Methodology
12.2. Internet Access Statistics
12.2.1. Methodology
12.3. Speedometer
12.3.1. Methodology
12.3.2. Sites
12.3.3. Data Privacy
12.4. Space Usage Statistics
12.5. Data Privacy
13. Usermanager
13.1. User Groups
13.1.1. Access Rights
13.1.2. Administration Rights
13.2. User
13.2.1. Settings for Email and Groupware
13.3. Import/export of User Profiles
13.3.1. Importing Users
13.3.2. Exporting Users
14. Email
14.1. Email Relay
14.1.1. Rights
14.1.2. SMTP-Submission
14.1.3. Dispatch Methods
14.1.4. Dispatch via relay server
14.1.5. Direct Dispatch
14.1.6. Choosing the dispatch method
14.2. Receiving emails on the client (POP or IMAP)
14.3. Receive emails using the Intra2net system
14.3.1. Methods
14.3.2. Retrieving individual POP accounts
14.3.3. Direct delivery via SMTP
14.3.4. Retrieval of collective POP accounts (multidrop)
14.4. Forwarding of entire domains
14.4.1. Method
14.4.2. Recipient Address Check
14.4.3. Forwarding of individual POP accounts
14.5. Email Addressing
14.5.1. Address Settings
14.5.2. Email Addresses and Aliases
14.6. Email Processing
14.6.1. Forwarding
14.6.2. Automatic Response
14.6.3. Sorting
14.6.4. Automatic deletion
14.7. Emailfilter
14.7.1. Spamfilter
14.7.2. Virus Scanner
14.7.3. Attachment Filter
14.8. DKIM
14.8.1. Basic principles
14.8.2. Implementation
14.8.3. Further standards
14.8.4. Prerequisites for use
14.8.5. Configuration
14.8.6. Filtering and quarantine
14.8.7. Header lists and exceptions
14.8.8. Rotate the key
14.9. Archiving
14.9.1. Interface
14.9.2. Connecting the MailStore Server
14.10. Automatic Transfer
14.11. Mailinglist
14.12. Additional Settings
14.13. Queue
14.14. Structure of the mail system
14.15. Differences between licenses
15. Services
15.1. Timeserver
15.2. Monitoring via SNMP
16. System Functions
16.1. License
16.1.1. Demo Mode
16.1.2. License Code
16.1.3. Update Period
16.2. Updates
16.2.1. Remote Update via Partner Web
16.2.2. Rescue System
16.3. Backup
16.3.1. Backup protection
16.3.2. Storage period
16.3.3. Remote Storage
16.3.4. Restore
16.3.5. Procedure for Hard Drive Damage or Hardware Replacement
16.3.6. Hardware migration with Intra2net support
16.3.7. Standby systems
16.4. Operation Behind Firewall
16.5. Logfiles
16.6. Logcheck Reports
16.7. Scheduled Shutdown
16.8. Inspection and repair of filesystems