Part 2. General Functions

Table of Contents

9. Intranet
9.1. IPs and Networks
9.2. VLAN Tagging
9.3. Access Rights of a Network Object
9.4. Domain and DNS
9.4.1. The Intra2net system as local DNS server
9.4.2. Integrate another DNS server in the LAN
9.4.3. Forward DNS to Other Domains
9.4.4. Prevent DNS Rebind
9.5. Registering Clients
9.5.1. Wake-On-LAN
9.5.2. DHCP
9.6. DHCP-Server
9.7. Entering Ranges
9.8. Import/Export Client Profiles
9.8.1. Importing Clients
9.8.2. Exporting Clients
9.9. Intranet Routing
10. SSL Encryption and Certificates
10.1. Principles and Dangers of SSL Encryption
10.2. Correctly Creating Certificates
10.2.1. The Computer Name
10.2.2. Configuration
10.3. Installing Certificates on Clients
10.3.1. Installation with Windows
10.3.2. Distributing Certificates via Active Directory
10.4. User Education and Awareness
10.5. Using an External Certificate Authority
10.5.1. Certificates from Let's Encrypt
10.5.2. Certificates from classic certification authorities
10.6. Key Import
10.7. Encryption Strength
11. Internet
11.1. Dial-up with DSL (PPPoE)
11.2. Dial-up with DSL (PPTP)
11.3. Router with static IP
11.4. Router with DHCP or Cable Modem
11.5. Router on the Local Network
11.6. Router vs. Modem
11.7. Official IPs and DMZs
11.7.1. Classic Routing
11.7.2. Static NAT
11.7.3. Proxy-ARP
11.8. Automatic Connection
11.9. Connection Monitoring
11.10. Switching to Other Providers in the Event of an Error (Fallback)
11.11. Bandwidth Management and VoIP Prioritization
11.11.1. Bandwidth Management
11.11.2. Prioritize VoIP and Real-time Data
11.12. Masquerading / NAT
11.13. DynDNS
11.13.1. Providers
11.13.2. Updates and the IP Address Used
11.14. External access
12. Proxy
12.1. Overview
12.2. Access to the Proxy
12.3. Proxy Configuration
12.4. URL Filter
12.4.1. Proxy Profile
12.4.2. Proxy Access Lists
12.4.3. Time Management
12.5. Web Content Filter
12.6. Proxy Virus Scanner
13. Statistics and Data Privacy
13.1. Proxy Statistics
13.1.1. Proxy Logging
13.1.2. Analysis
13.1.3. Methodology
13.2. Internet Access Statistics
13.2.1. Methodology
13.3. Speedometer
13.3.1. Methodology
13.3.2. Sites
13.3.3. Data Privacy
13.4. Space Usage Statistics
13.5. Data Privacy
14. Usermanager
14.1. User Groups
14.1.1. Access Rights
14.1.2. Administration Rights
14.2. User
14.2.1. Settings for Email and Groupware
14.3. Import/export of User Profiles
14.3.1. Importing Users
14.3.2. Exporting Users
15. Email
15.1. Email Relay
15.1.1. Rights
15.1.2. SMTP-Submission
15.1.3. Dispatch Methods
15.1.4. Dispatch via relay server
15.1.5. Direct Dispatch
15.1.6. Choosing the dispatch method
15.2. Receiving emails on the client (POP or IMAP)
15.3. Receive emails using the Intra2net system
15.3.1. Methods
15.3.2. Retrieving individual POP accounts
15.3.3. Direct delivery via SMTP
15.3.4. Retrieval of collective POP accounts (multidrop)
15.4. Forwarding of entire domains
15.4.1. Method
15.4.2. Recipient Address Check
15.4.3. Forwarding of individual POP accounts
15.5. Email Addressing
15.5.1. Address Settings
15.5.2. Email Addresses and Aliases
15.6. Email Processing
15.6.1. Forwarding
15.6.2. Automatic Response
15.6.3. Sorting
15.6.4. Automatic deletion
15.7. Emailfilter
15.7.1. Spamfilter
15.7.2. Virus Scanner
15.7.3. Attachment Filter
15.8. Archiving
15.8.1. Interface
15.8.2. Connecting the MailStore Server
15.9. Automatic Transfer
15.10. Mailinglist
15.11. Additional Settings
15.12. Queue
15.13. Structure of the mail system
15.14. Differences between licenses
16. Services
16.1. Fax
16.1.1. ISDN-Connection
16.1.2. Receiving
16.1.3. Sending
16.1.4. Differences Between Licenses
16.2. Timeserver
16.3. Monitoring via SNMP
17. System Functions
17.1. License
17.1.1. Demo Mode
17.1.2. License Code
17.1.3. Update Period
17.2. Updates
17.2.1. Remote Update via Partner Web
17.2.2. Rescue System
17.3. Backup
17.3.1. Backup protection
17.3.2. Storage period
17.3.3. Remote Storage
17.3.4. Restore
17.3.5. Procedure for Hard Drive Damage or Hardware Replacement
17.3.6. Standby systems
17.4. Operation Behind Firewall
17.5. Logfiles
17.6. Logcheck Reports
17.7. Scheduled Shutdown
17.8. Inspection and repair of filesystems