RSS

Arsip Kategori: Router

Kelemahan Mikrotik ….!!!

– Tidak bisa memblock situs porno secara otomatis.

(tidak bisa mendeteksi situs porno.)

– Tidak ada Antivirus menyertainya

(ini pendapat pribadi saya, silahkan komentar)

contoh software router  Endian firewall community yang lengkap dengan antivirus dan url filter

What is Endian Firewall Community?
Endian Firewall Community is a “turn-key” linux security distribution that turns every system into a full featured security appliance with Unified Threat Management (UTM) functionality. The software has been de signed with “usability in mind” and is very easy to install, use and manage, without losing its flexibility. The features include a stateful packet inspection firewall, application-level proxies for various protocols (HTTP, FTP, POP3, SMTP) with antivirus support, virus and spamfiltering for email traffic (POP and SMTP), content filtering of Web traffic and a “hassle free” VPN solution (based on OpenVPN). The main advantage of Endian Firewall is that it is a pure “Open Source” solution that is sponsored by Endian.

The goal?
Work with the Open Source community to build a complete, secure and stable firewall exclusively from Open Source software. Public forum, rapid progress, open process, open minds, open to new ideas. A proving ground for new technology that may eventually make its way into stable and supported Endian Firewall Appliance.

The software is released under GPL License.

 
13 Komentar

Ditulis oleh pada 14 Februari 2009 inci Router, Software, Virus, Warnet

 

Tag: ,

Untangle (Network Router ++ ) , bisa Load balancing

Product Overview

Untangle delivers an integrated family of applications that simplify and consolidate the network and security products that businesses need at the network gateway.

  • Pre-configured to work right away
  • Downloadable for rapid deployment
  • Integrated with a common GUI, logging & reporting
  • Designed to run on generic Intel/AMD hardware
Open Source & Free Commercial Add-ons

Open Source (and Free)

The Untangle Server and 12 of the applications that run on it are open source and free under the GNU General Public License v2 (GPLv2). Untangle’s platform provides the GUI, logging, reporting and “virtual-pipelining” technology to make all of the apps run together smoothly. Signatures updates and software upgrades, which install automatically, are also included.

Commercial Add-ons

These are designed for networks with advanced needs. Commercial add-ons include live support, advanced management features and applications for additional security and remote access.

Deployment Options

Untangle has 3 network deployment options:

Router:  Dedicated server that performs routing & firewall services

Transparent Bridge:  Dedicated server that drops seamlessly behind existing routers & firewalls

Re-Router:  Adds network-wide protection while running on an existing desktop  (runs on Windows)

Supported Platforms

Untangle runs as a bare-metal install, on Windows XP, VMware, Ubuntu & Debian

Hardware Requirements

Untangle runs on generic Intel/AMD hardware.  A Pentium III processor, 2 NICs and 512MB of RAM is the min spec for smaller networks and multi-core chips with extra RAM really make Untangle sing for larger networks. More specific sizing guidance and links to the community hardware compatibility list can be found on the Hardware Requirements wiki.

3rd Party Connectors

Active Directory:  Integrate with existing AD deployments

Kaseya:  Monitor & receive Untangle alerts

Level Platforms:  Monitor & receive Untangle alerts

N-Able:  Monitor & receive Untangle alerts

 
Tinggalkan komentar

Ditulis oleh pada 6 Desember 2008 inci Router, Software

 

Tag: ,

Pfsense Makin Balancing aje….

Screenshootnya : disini

Versions

There are three pfSense platforms, multiple release versions, and development/testing snapshots available. The following describes the available platforms and versions.

Platforms

Three platforms are available.

Live CD with Installer

The Live CD platform allows you to run directly from the CD without installing to a hard drive or Compact Flash card. The configuration can be saved on a floppy disk or USB flash drive. Some features are not compatible with the live CD platform. In most circumstances, this should only be used as an evaluation of the software with your particular hardware.

Hard drive installation

The live CD includes an installer option to install pfSense to the hard drive on your system. This is the preferred means of running pfSense. The entire hard drive must be overwritten, dual booting with another OS is not supported.

Embedded

The embedded version is specifically tailored for use with any hardware using Compact Flash rather than a hard drive. CF cards can only handle a limited number of writes, so the embedded version runs read only from CF, with read/write file systems as RAM disks. Packages are not supported on embedded versions.

Stable Version

1.2 release

This is the recommended release for all installations. It is widely tested and deployed, and the only release that will receive bug fix releases and any necessary security fix releases in the future.

Features

pfSense includes most all the features in expensive commercial firewalls, and more in many cases. The following is a list of features currently available in the pfSense 1.2 release. All of these things are possible in the web interface, without touching anything at the command line.

In addition to features, this page also includes all limitations of the system of which we are aware. From our experience and the contributed experiences of thousands of our users, we understand very well what the software can and cannot do. Every software package has limitations. Where we differ from most is we clearly communicate them. We also welcome people to contribute to help eliminate these limitations. Many of the listed limitations are common to numerous open source and commercial firewalls. 1.2 limitations already fixed in the code that will become the next major release will be noted.

Firewall

  • Filtering by source and destination IP, IP protocol, source and destination port for TCP and UDP traffic
  • Able to limit simultaneous connections on a per-rule basis
  • pfSense utilizes p0f, an advanced passive OS/network fingerprinting utility to allow you to filter by the Operating System initiating the connection. Want to allow FreeBSD and Linux machines to the Internet, but block Windows machines? pfSense can do so (amongst many other possibilities) by passively detecting the Operating System in use.
  • Option to log or not log traffic matching each rule.
  • Highly flexible policy routing possible by selecting gateway on a per-rule basis (for load balancing, failover, multiple WAN, etc.)
  • Aliases allow grouping and naming of IPs, networks and ports. This helps keep your firewall ruleset clean and easy to understand, especially in environments with multiple public IPs and numerous servers.
  • Transparent layer 2 firewalling capable – can bridge interfaces and filter traffic between them, even allowing for an IP-less firewall (though you probably want an IP for management purposes).
  • Packet normalization – Description from the pf scrub documentation – “‘Scrubbing’ is the normalization of packets so there are no ambiguities in interpretation by the ultimate destination of the packet. The scrub directive also reassembles fragmented packets, protecting some operating systems from some forms of attack, and drops TCP packets that have invalid flag combinations.”
    • Enabled in pfSense by default
    • Can disable if necessary. This option causes problems for some NFS implementations, but is safe and should be left enabled on most installations.
  • Disable filter – you can turn off the firewall filter entirely if you wish to turn pfSense into a pure router.

State Table

The firewall’s state table maintains information on your open network connections. pfSense is a stateful firewall, by default all rules are stateful.

Most firewalls lack the ability to finely control your state table. pfSense has numerous features allowing granular control of your state table, thanks to the abilities of OpenBSD’s pf.

  • Adjustable state table size – there are multiple production pfSense installations using several hundred thousand states. The default state table size is 10,000, but it can be increased on the fly to your desired size. Each state takes approximately 1 KB of RAM, so keep in mind memory usage when sizing your state table. Do not set it arbitrarily high.
  • On a per-rule basis:
    • Limit simultaneous client connections
    • Limit states per host
    • Limit new connections per second
    • Define state timeout
    • Define state type
  • State types – pfSense offers multiple options for state handling.
    • Keep state – Works with all protocols. Default for all rules.
    • Modulate state – Works only with TCP. pfSense will generate strong Initial Sequence Numbers (ISNs) on behalf of the host.
    • Synproxy state – Proxies incoming TCP connections to help protect servers from spoofed TCP SYN floods. This option includes the functionality of keep state and modulate state combined.
    • None – Do not keep any state entries for this traffic. This is very rarely desirable, but is available because it can be useful under some limited circumstances.
  • State table optimization options – pf offers four options for state table optimization.
    • Normal – the default algorithm
    • High latency – Useful for high latency links, such as satellite connections. Expires idle connections later than normal.
    • Aggressive – Expires idle connections more quickly. More efficient use of hardware resources, but can drop legitimate connections.
    • Conservative – Tries to avoid dropping legitimate connections at the expense of increased memory usage and CPU utilization.

Network Address Translation (NAT)

  • Port forwards including ranges and the use of multiple public IPs
  • 1:1 NAT for individual IPs or entire subnets.
  • Outbound NAT
    • Default settings NAT all outbound traffic to the WAN IP. In multiple WAN scenarios, the default settings NAT outbound traffic to the IP of the WAN interface being used.
    • Advanced Outbound NAT allows this default behavior to be disabled, and enables the creation of very flexible NAT (or no NAT) rules.
  • NAT Reflection – in some configurations, NAT reflection is possible so services can be accessed by public IP from internal networks.

NAT Limitations

  • PPTP and GRE Limitation – The state tracking code in pf for the GRE protocol can only track a single session per public IP per external server. This means if you use PPTP VPN connections, only one internal machine can connect simultaneously to a PPTP server on the Internet. A thousand machines can connect simultaneously to a thousand different PPTP servers, but only one simultaneously to a single server. The only available work around is to use multiple public IPs on your firewall, one per client, or to use multiple public IPs on the external PPTP server. This is not a problem with other types of VPN connections. A solution for this is currently under development.
  • SIP Limitation – By default, all TCP and UDP traffic other than SIP and IPsec gets the source port rewritten. More information on this can be found in the static port documentation. Because this source port rewriting is how pf tracks which internal IP made the connection to the given external server, and most all SIP traffic uses the same source port, only one SIP device can connect simultaneously to a single server on the Internet. Unless your SIP devices can operate with source port rewriting (most can’t), you cannot use multiple phones with a single outside server without using a dedicated public IP per device. The sipproxd package now provides a solution for this problem in pfSense 1.2.1 and newer.
  • NAT Reflection limitations – NAT reflection can only be used with port ranges less than 500 ports and cannot be used with 1:1 NAT hosts.

Redundancy

CARP from OpenBSD allows for hardware failover. Two or more firewalls can be configured as a failover group. If one interface fails on the primary or the primary goes offline entirely, the secondary becomes active. pfSense also includes configuration synchronization capabilities, so you make your configuration changes on the primary and they automatically synchronize to the secondary firewall.

pfsync ensures the firewall’s state table is replicated to all failover configured firewalls. This means your existing connections will be maintained in the case of failure, which is important to prevent network disruptions.

Limitations

  • Only works with static public IPs, does not work with DHCP, PPPoE, PPTP, or BigPond type WANs (will be resolved in a future release)
  • Requires a minimum of three public IP addresses (will be resolved in a future release)
  • Backup firewalls are idle (active-passive failover), no active-active clustering is possible at this time.
  • Failover is not instantaneous, it takes about 5 seconds to switch a backup host to master. During this time no traffic will be passed, but existing states will maintain connectivity after failover is completed. This 5 second outage during a failure isn’t even noticeable in most environments.

Load Balancing

Outbound Load Balancing

Outbound load balancing is used with multiple WAN connections to provide load balancing and failover capabilities. Traffic is directed to the desired gateway or load balancing pool on a per-firewall rule basis.

Inbound Load Balancing

Inbound load balancing is used to distribute load between multiple servers. This is commonly used with web servers, mail servers, and others. Servers that fail to respond to ping requests or TCP port connections are removed from the pool.

Limitations
  • Equally distributes load between all available servers – unable to unequally distribute load between servers at this time.
  • Only checks if the server responds to pings or TCP port connections. Cannot check if the server is returning valid content.

VPN

pfSense offers three options for VPN connectivity, IPsec, OpenVPN, and PPTP.

IPsec

IPsec allows connectivity with any device supporting standard IPsec. This is most commonly used for site to site connectivity to other pfSense installations, other open source firewalls (m0n0wall, etc.), and most all commercial firewall solutions (Cisco, Juniper, etc.). It can also be used for mobile client connectivity.

Limitations
  • NAT-T is not supported, which means mobile clients behind NAT are not supported. This limits pfSense’s usefulness with mobile IPsec clients. OpenVPN or PPTP is a better solution.
  • Only one end of an IPsec tunnel can have a dynamic IP address.
  • Some of the more advanced capabilities of ipsec-tools are not yet supported, including DPD, XAuth, NAT-T, and others.

OpenVPN

OpenVPN is a flexible, powerful SSL VPN solution supporting a wide range of client operating systems. See the OpenVPN website for details on its abilities.

Limitations
  • Not all of the capabilities of OpenVPN are supported yet. Support for virtually all of OpenVPN’s capabilities will be included in the next release.
  • Filtering of OpenVPN traffic is not yet possible. Support for this is in 2.0.

PPTP Server

PPTP is a popular VPN option because nearly every OS has a built in PPTP client, including every Windows release since Windows 95 OSR2. See this Wikipedia article for more information on the PPTP protocol.

The pfSense PPTP Server can use a local user database, or a RADIUS server for authentication. RADIUS accounting is also supported. Firewall rules on the PPTP interface control traffic initiated by PPTP clients.

Limitations
  • Because of limitations in pf NAT, when the PPTP Server is enabled, PPTP clients cannot use the same public IP for outbound PPTP connections. This means if you have only one public IP, and use the PPTP Server, PPTP clients inside your network will not work. The work around is to use a second public IP with Advanced Outbound NAT for your internal clients. See also the PPTP limitation under NAT on this page.

PPPoE Server

pfSense offers a PPPoE server. For more information on the PPPoE protocol, see this Wikipedia entry. A local user database can be used for authentication, and RADIUS authentication with optional accounting is also supported.

Reporting and Monitoring

RRD Graphs

The RRD graphs in pfSense maintain historical information on the following.

  • CPU utilization
  • Total throughput
  • Firewall states
  • Individual throughput for all interfaces
  • Packets per second rates for all interfaces
  • WAN interface gateway(s) ping response times
  • Traffic shaper queues on systems with traffic shaping enable

Real Time Information

Historical information is important, but sometimes it’s more important to see real time information.

SVG graphs are available that show real time throughput for each interface.

For traffic shaper users, the Status -> Queues screen provides a real time display of queue usage using AJAX updated gauges.

The front page includes AJAX gauges for display of real time CPU, memory, swap and disk usage, and state table size.

Dynamic DNS

A Dynamic DNS client is included to allow you to register your public IP with a number of dynamic DNS service providers.

  • DynDNS
  • DHS
  • DyNS
  • easyDNS
  • No-IP
  • ODS.org
  • ZoneEdit

A client is also available for RFC 2136 dynamic DNS updates, for use with DNS servers like BIND which support this means of updating.

Limitations

  • Only works on primary WAN interface – multi-WAN support is available in 2.0.
  • Can only update one account with a single provider. 2.0 enables the use of unlimited accounts.
  • Only works when pfSense has the public IP assigned to one of its interfaces. If you have a modem that obtains your public IP and gives pfSense a private IP, the private IP will be registered with the provider. In 2.0, there is an option to determine your actual public IP and correctly register it.

Captive Portal

Captive portal allows you to force authentication, or redirection to a click through page for network access. This is commonly used on hot spot networks, but is also widely used in corporate networks for an additional layer of security on wireless or Internet access. For more information on captive portal technology in general, see the Wikipedia article on the topic. The following is a list of features in the pfSense Captive Portal.

  • Maximum concurrent connections – Limit the number of connections to the portal itself per client IP. This feature prevents a denial of service from client PCs sending network traffic repeatedly without authenticating or clicking through the splash page.
  • Idle timeout – Disconnect clients who are idle for more than the defined number of minutes.
  • Hard timeout – Force a disconnect of all clients after the defined number of minutes.
  • Logon pop up window – Option to pop up a window with a log off button.
  • URL Redirection – after authenticating or clicking through the captive portal, users can be forcefully redirected to the defined URL.
  • MAC filtering – by default, pfSense filters using MAC addresses. If you have a subnet behind a router on a captive portal enabled interface, every machine behind the router will be authorized after one user is authorized. MAC filtering can be disabled for these scenarios.
  • Authentication options – There are three authentication options available.
    • No authentication – This means the user just clicks through your portal page without entering credentials.
    • Local user manager – A local user database can be configured and used for authentication.
    • RADIUS authentication – This is the preferred authentication method for corporate environments and ISPs. It can be used to authenticate from Microsoft Active Directory and numerous other RADIUS servers.
  • RADIUS capabilities
    • Forced re-authentication
    • Able to send Accounting updates
    • RADIUS MAC authentication allows captive portal to authenticate to a RADIUS server using the client’s MAC address as the user name and password.
    • Allows configuration of redundant RADIUS servers.
  • HTTP or HTTPS – The portal page can be configured to use either HTTP or HTTPS.
  • Pass-through MAC and IP addresses – MAC and IP addresses can be white listed to bypass the portal. Any machines with NAT port forwards will need to be bypassed so the reply traffic does not hit the portal. You may wish to exclude some machines for other reasons.
  • File Manager – This allows you to upload images for use in your portal pages.

Limitations

  • Can only run on one interface simultaneously.
  • “Reverse” portal, i.e. capturing traffic originating from the Internet and entering your network, is not possible.
  • Only entire IP and MAC addresses can be excluded from the portal, not individual protocols and ports.
  • Currently not compatible with multi-WAN rules. We hope this will be resolved in 2.0.

DHCP Server and Relay

pfSense includes both DHCP Server and Relay functionality

And More…

This is by no means a conclusive list. It will be expanded as time permits.

… Try it… Good LoadBalancing Firewall Router… Open Source for us.

 
Tinggalkan komentar

Ditulis oleh pada 3 Desember 2008 inci Router, Software

 

Tag: ,

Endian FireWall udah bisa LOADBALANCED !!!

Good Linux Router Firewall !!!

Downloadnya di sini

Change Log :

Endian Firewall - 2.3
=====================
- 0000156: [Application Level Proxies] Havp Whitelist are not applied to havp conf (simon) - resolved.
- 0001479: [GUI] clamav logs show SMTP log in title (peter) - resolved.
- 0001477: [Other Scripts] cheetah prints out warnings when template source is empty (peter) - resolved.
- 0001365: [Proxy HTTP] Browser autoconfiguration doesn't work for HTTP-Proxy (simon) - resolved.
- 0001422: [Proxy HTTP] proxy.pac file always return "DIRECT" ! (simon) - resolved.
- 0001474: [Other Scripts] clamav: Possibly Unwanted Applications (PUA) is to restrictive (peter) - resolved.
- 0000953: [Proxy HTTP] Enable time curfew on BLUE without affecting GREEN. (simon) - resolved.
- 0001318: [Proxy HTTP] Proxygroups can not be add,configure or activated (simon) - resolved.
- 0000901: [Proxy HTTP] Proxy local user management page is blank (simon) - resolved.
- 0001339: [Proxy HTTP] HTTP Proxy needs possibility to customize user and group objectClass for LDAP auth (simon) - resolved.
- 0001463: [Network related (VPN, uplinks)] pppcall does not recognize when pppd dialing in using rp-pppoe receives a timeout and exits (peter) - resolved.
- 0001445: [Network related (VPN, uplinks)] openvpn exits due to timeout after few minutes (peter) - resolved.
- 0001461: [Other Services] per-zone include in dhcp template does not work (peter) - resolved.
- 0001440: [Other Services] upgrade tzdata in order to reflect DST changes in brazil and argentinia (peter) - resolved.
- 0001425: [Other Scripts] Error resolving user; user='monit' (peter) - resolved.
- 0001420: [Other Services] customizable templates are not working for amavis and postfix (peter) - resolved.
- 0001419: [Other Scripts] squid customizeable error message template configuration file points to wrong settings file directory (peter) - resolved.
- 0001174: [Network related (VPN, uplinks)] Please include nslookup or dig/host (peter) - resolved.
- 0001385: [Application Level Proxies] dnsmask blackholes don't work (peter) - resolved.
- 0001267: [GUI] Add cache-size to dnsmasq (peter) - resolved.
- 0001173: [Application Level Proxies] DNS lookups are not showing SRV records for underscore entries (peter) - resolved.
- 0001392: [Firewall (iptables)] remove interface registry on firewall restart (peter) - resolved.
- 0001387: [Application Level Proxies] the proxy firewall rules do not log anymore also when enabled (peter) - resolved.
- 0001377: [Other Scripts] invalid malwaredomains files make dnsmasq fail to start (peter) - resolved.
- 0001358: [Network related (VPN, uplinks)] OpenVPN Gw2Gw restarts every 60 seconds (peter) - resolved.
- 0001347: [Firewall (iptables)] ebtables zone firewall blocks traffic which should not be blocked (peter) - resolved.
- 0001296: [Network related (VPN, uplinks)] When a link goes down the machine appears to freeze. (peter) - resolved.
- 0000865: [Hardware related (kernel, drivers, hardware)] Ethernet connection NOT stable on IBM Server (peter) - resolved.
- 0001321: [Network related (VPN, uplinks)] ppp interface has the same address repeat twice (peter) - resolved.
- 0001326: [Proxy SMTP] sender_bcc will be filled with recipient rules instead of sender rules (peter) - resolved.
- 0001154: [Other Scripts] apache: needs a restartscript with proper cheetah templates (simon) - resolved.

Future Comparison:

 
1 Komentar

Ditulis oleh pada 23 November 2008 inci networking games, Router, Software

 

Tag: , , ,

Clarkconnect Community4.3 Download

Software Modules

Additional software modules are installed via the web-based interface.  More information is provided in the User Guide.

CD / ISO

The ISO download is used to create the ClarkConnect installation and upgrade CD.  The current versions are listed below while previous versions are listed on the archive page.  Before proceeding, please review the following download tips:

  • The Office has been merged with Enterprise — details
  • Please make sure you are downloading the correct edition and version.
  • The Enterprise Edition requires a valid license or free trial license.
  • The Enterprise Edition requires your online account username and password.
ISO Image MD5Sum Size
Community Edition 4.3 ISO HTTP 2febb69c37be48736080360ed0edaea5 513 MB
 
Tinggalkan komentar

Ditulis oleh pada 26 September 2008 inci Router, Software

 

Tag:

ClarkConnect Community 4.3

Release Notes – ClarkConnect 4.3

Contents

[hide]

if (window.showTocToggle) { var tocShowText = “show”; var tocHideText = “hide”; showTocToggle(); }

[edit] Introduction

The following release notes provide an overview of the ClarkConnect 4.3 release. All users should read this document, but special attention should be made by users upgrading their systems to this release.

[edit] What’s New

The Office Edition and Enterprise Edition products have now merged! Unlimited mailboxes are now included in the Enterprise Edition and this includes full groupware support. The full list of changes is available in the developer change log — highlights include:

[edit] Important Notes for 3.x Users

The 3.x to 4.x versions is a major upgrade, so please review the Software Package Notes below. For the impatient:

If you have configured the ClarkConnect system via the web interface only, the configuration files will automatically be upgraded. If you have made changes via the command-line or the Webmin tool, please double check your custom configuration after an upgrade.

[edit] Upgrading

Version 4.x supports upgrades from ClarkConnect 3.0 and later. Upgrades from version 2.x (or systems originally installed with 2.x) are not supported. When you run the ClarkConnect installer, make sure you select the upgrade option (see adjacent screenshot). As with any upgrade, please backup any critical data.

In addition, users who have installed third party software packages or used the command-line apt-get tool to install software should also run the following commands:

apt-get update
apt-get dist-upgrade

[edit] Upgrading from 4.0 / 4.1 / 4.2 to 4.3

If you are upgrading from 4.0, 4.1 or 4.2 and are familiar with the Linux command-line environment, you can perform the upgrade over the Internet. Run the following commands:

apt-get update
apt-get install cc-upgradeto43
apt-get clean
apt-get update
apt-get dist-upgrade

After performing the upgrade, a reboot is required.

[edit] Known Issues

  • Blank screens on first boot with some types of hardware
  • Some legacy Dell/Megaraid RAID cards are not supported.
  • Localization is incomplete.

[edit] Deprecated Packages

The following key packages are no longer included in this version:

2.x to 3.x

  • dhcp (replaced by dnsmasq)
  • lvm (replaced by lvm2)
  • modutils (replaced by module-init-tools)
  • perl-Mail-SpamAssassin (replaced by spamassassin)
  • policy
  • pop-before-smtp (replaced by postfix)
  • raidtools
  • reiserfs-tools (replaced by reiserfs-utils)
  • snortsnarf (replaced by cc-snort-report)

3.x to 4.x

  • dovecot (replaced by cyrus-imapd)
  • sarg (replaced by cc-squid-reports)
  • privoxy (replaced by adzapper)

[edit] Software Package Notes – 4.2 to 4.3

[edit] Kolab

The kolabd service (daemon) has changed to ldapsync. This was done to avoid some confusion with Kolab Groupware. The ldapsync service does two tasks:

  • synchronizes LDAP settings for other applications
  • synchronizes mail accounts with LDAP (if the mail software is installed)

[edit] OpenVPN

If you have been experimenting with OpenVPN in previous versions (beta via , the upgrade to 4.3 may impact your settings. Please verify your configuration after performing an upgrade.

[edit] Kernel

Some Intel Gigabit network cards have changed drivers (from e1000 to e1000e). If your network cards are not detected on your first reboot, please run the kudzu hardware detection tool from the command line. The kernel upgrade from version 4.2 is optional, but you can upgrade it with the following commands:

apt-get update
apt-get install kernel

The last command will show a list of available kernels. Select your preferred kernel and install it, e.g:

apt-get install kernel#2.6.18-93.cc

[edit] Software Package Notes – 4.1 to 4.2

[edit] Content Filter (Beta)

If you installed the experimental version of the content filter in version 4.1, you must perform a re-install of the software. From the command line, run the following:

  • rpm -e cc-dansguardian-av cc-dansguardian dansguardian dansguardian-blacklists dansguardian-phraselists dansguardian-av
  • mv /etc/dansguardian-av /etc/dansguardian-av.old
  • apt-get update
  • apt-get install cc-dansguardian-av cc-dansguardian

[edit] Kernel

The kernel has been upgraded from 2.6.9 to 2.6.18. This means that you must reboot your system after the upgrade. In addition, multiprocessor (SMP) support is now included in the base Linux kernel — you no longer require the kernel-smp package. If you have more than 4 GB of memory installed, please install the special PAE kernel — apt-get update; apt-get install kernel-PAE

[edit] VPN

Both the PPTP VPN and the IPsec VPN servers have been moved in the menu system. You can now find these features under the Network configuration.

[edit] Software Package Notes – 4.0 to 4.1

[edit] Mail – Antispam

Antispam training has changed. Please review the Antispam Training in the User Guide.

[edit] Mail – SMTP

The mail server will now reject e-mail messages to invalid addresses earlier in the mail processing. This will reduce the resources required for the antivirus and antispam services. This change will be reflected in the mail server reports.

[edit] Software Package Notes – 3.x to 4.1

[edit] Backup/Restore

The backup/restore system settings now includes the user database. It is not possible to restore settings from an old release on to the current release.

[edit] Firewall

The firewall has changed to accommodate the new Hot LAN and Blocking features. Custom firewall rules configured via the command line may no longer function as expected. In addition, the advanced firewall module is no longer installed by default.

[edit] Mail – Antivirus

ClamAV is now included in ClarkConnect. Sophos antivirus is no longer supported.

[edit] Mail – Antispam

The configuration for the antispam engine has changed. Please review the configuration settings after an upgrade. You may also want to install the additional Dspam software.

[edit] Mail – POP/IMAP Server

The POP/IMAP mail server has gone through some significant changes. Please read the Migrating Mail to ClarkConnect 4.x document

[edit] User Manager

If you are upgrading from a previous version, go to the web-based administration tool to review the user manager. You may be required to perform one or more of the following actions:

  • Reset a password (important)
  • Change a user’s first and last name

In addition, the following changes have been made:

  • The Community Edition allows a maximum of 10 mailboxes.
  • Shell access is no longer an option.
  • The dual-passwords used in 3.x are no longer supported.

[edit] Webmail

The default webmail system in ClarkConnect 4.x is powered by Horde. Please review the documentation for how to access the webmail system. If you are upgrading from a previous release, you will have to install this software package after upgrading (if desired). Access to the old webmail system is still available.

[edit] Web Proxy

The web proxy server only accepts requests from the local LAN. If you have virtual LANs or other LANs behind your ClarkConnect system, you will need to edit the proxy server configuration file.

[edit] Web Proxy Reports

The web proxy and content filter reports have been replaced.

 
2 Komentar

Ditulis oleh pada 26 September 2008 inci Router, Software

 

Tag:

Hati hati membeli modem 3com OfficeConnect

Anda pengguna Speedy …. ?

Anda gunakan untuk warnet ?

Hati hatilah membeli modem, diantaranya ada 3Com 3CRWDR101A-75

bentuknya seperti ini :

3com 3CRWDR101A-75

karena : jika anda menggunakan speedy dan sering melakukan patch game yang menggunakan FTP … Speedy anda akan sering mengalami DISCONNECT.

by: rudy

 
4 Komentar

Ditulis oleh pada 4 Juli 2008 inci Berita, networking games, Router, Warnet

 

Tag:

CFosSpeed Traffic Shaping

cFosSpeed features list

Connections::

  • Broadband: Cabel and DSL
  • Narrow band: Modem and ISDN
  • Mobile (UMTS, HSDPA, GSM, GPRS, HSCSD)
  • Media:
    • DSL, PPPoE
    • DSL, PPPoA (VCmux and LLC)
    • DSL, PPTP
    • VDSL
    • Cable
    • ISDN
    • IP over AAL
    • RFC1483/2684 bridged

Routing:

Traffic Shaping:

Options:

Extras:

bajakannya : http://rapidshare.com/files/125568659/cFosSpeed.v4.22_Build.1406.rar

 
Tinggalkan komentar

Ditulis oleh pada 28 Juni 2008 inci Router, Software, Warnet

 

Tag:

Mikrotik 2.9.27 level 6

saya mendapatkan link untuk anda @mikrotiklevel 6

http://rapidshare.com/files/125326271/mikrotik-2.9.27.iso_incl_Level6Key.rar

………

silahkan download… tinggal burn image ke cd truss di install ke komputer router…jadi dehh, untuk warnet g

by: Rudy

 
Tinggalkan komentar

Ditulis oleh pada 28 Juni 2008 inci Router, Software

 

Tag:

ClarkConnect 4.3 – Alpha #1 – May 29, 2008

If you have not already done so, please review the introduction to test releases. Every test release includes a table that summarizes the following:

  • Features — major features available in the test release.
  • Tweaks — minor features available in the test release.
  • In the Pipeline — features being actively developed.
Features References
Remote backup service 847
Groupware via webmail 883
RAID manager 851
OpenVPN for desktops/laptops 683
Tweaks References
Additional hardware driver support for 3Ware and Realtek 874 881
DHCP server enhancements 831 866
Suva bi-directional support 856
In The Pipeline References
Mail server queue management (translation pending) 849
System process viewer (translation pending) 850
Administrator antispam mail quarantine 882

What’s New

The OpenVPN and SSL Certificate Manager should be considered alpha at this point. We may decide to rip out parts of the Certificate Manager (read: delete all the certificates and start again), and that’s the primary reason this is an alpha release. Here are some comments on the new features.

Remote Backup

This may or may not work depending on the status of the remote systems.

Groupware via Webmail

Information on this feature is here.

OpenVPN and SSL Certificates

In order to implement OpenVPN, security certificates are required. In order to ease some of the pain out of managing certificates, we are in the process of simplifying the user experience. Here are the steps to get OpenVPN running.

Step 1 — Before you can configure OpenVPN, you will be directed to the Account Manager – Setup – Organization page in the web-based administration tool. The information provided on this page does four important:

  • Initializes LDAP
  • Creates the required certificate authority
  • Creates the required server certificate
  • Creates the default data (e.g. city, country, company, etc.) when adding new users

We certainly do not track this information (or any information for that matter), but you will see these details in security certificates (for example, the one used for HTTPS connections to the web-based administration). If you allow remote access to the web-based administration tool (or webmail), you should know that this information is publicly available. Feel free to create fake details about your organization, but something must be provided.

Step 2 — Add users on the Account Manager – All Accounts – Users page. In the background, a certificate key/pair is created for the user. This certificate can be:

  • Imported into mail clients for encrypting and digitally signing mail
  • Used for OpenVPN

Step 3 — Go to the Network – VPN – OpenVPN page in the web-based administration tool. Configure OpenVPN and start it up!

Step 4 — Logout of the web-based administration page (button on top right).

Step 5 — Install the OpenVPN 2.1 software for Windows (download).

Step 6 — Login to the web-based administration page as the user created in step 2. Go to the Security and Keys page in the menu. You will need to download the certificate and the OpenVPN configuring into the “configuration” directory on your Windows system.

Note: an OpenVPN Windows tool is under development. When complete, this final step will not be necessary. There are a few quirks on this download page right now… sorry about that.

Step 7 — Connect with OpenVPN!

Reporting Bugs

This is an alpha release, so there are many known issues. Please hold off on reporting bugs until the beta #1 release. However, feel free to post feedback in the online forums or via e-mail — contribs@clarkconnect.com.

Download

Web download: Community 4.3 Release Alpha #1
MD5Sum: cc962474bc6a62e6dd93ffba68f03b77

<!–

Upgrade from Previous Betas

apt-get update; apt-get dist-upgrade

–>

 
Tinggalkan komentar

Ditulis oleh pada 2 Juni 2008 inci Router

 

Tag: