Home
User Guide - Kerio Control
Contents
1. file e Sharing transfers of files in P2P networks the record includes name of detected P2P network and volume of data transferred in each direction e Blocked P2P file sharing attempts information about attempts for file sharing in P2P networks that was blocked by P2P Eliminator e Unknown connection any traffic between the local network and the Internet within which more than 2 MB of data was transferred and which cannot be sorted in another category e g in Multimedia The record includes name or IP address of the server protocol service if recognized and volume of data transferred in each direction Multimedia The Multimedia category includes real time transfers of multimedia data so called streaming typically online radio and television channels A Multimedia Data transferred 24 478 KB Connections 3 Hide details Start Duration Details 09 09 am 6 58 DIGITALLY IMPORTED Dance amp HINRG 09 14 am 1 24 YouTube what does YOUR fridge say about YOU 09 18 am 4 30 YouTube lonelygirliS Season 1 Recap Figure 3 17 User s Activity multimedia The header informs about total volume of data transferred by multimedia protocols and total number of connections to such servers Records addressing individual activities include the following information e Stream name or URL if the name is not available Under certain circumstances name can be displayed as a link by which the stream can be opened e Name
2. and controlled from a web browser simply by using a specific address URL For full and correct functionality any of the supported web browsers is required e Internet Explorer 7 to 9 e Firefox 3 5 to 4 e Safari 4 and 5 This user guide addresses features of individual interfaces as well as options of their use Tt touch on configuration options of the very firewall Generally it is recommended to contact your firewall administrator should any issues arise Chapter 2 Web user interface The most basic and bare function of the Kerio Control s web interface is user login to the firewall authentication at a session initiation The firewall is usually configured to allow access to internet services web pages multimedia FTP servers etc only to authenticated users The firewall allows viewing browsing statistics of individual users visited web pages data volume transferred etc and applies possible restrictions To keep the manipulation as simple as possible automatic redirection to the web interface s authentication page is usually set for cases when user attempts to access a web page without having been authenticated at the firewall Upon a successful login the browser redirects to the requested web page This procedure usually takes part at the opening of the home page upon startup of user s web browser This makes user s authentication at the firewall almost transparent All users regardless their user rights can us
3. day today week and month In case that any quota is set current usage of individual quotas percentage is displayed Hint Week and month starting days can be changed by setting of so called accounting period in the Kerio Control configuration B Transfer Quota Statistics 2 Today 3 2 2007 This Week Since 2 26 2007 s This Month BE since 3 1 2007 Web Site Restrictions The lower part of the Status tab provides an overview of current URL rules applied to the particular user i e rules applied to all users rules applied to the particular user and rules applied to the group the user belongs to This makes it simple to find out which web pages and objects are allowed or restricted for the particular user Time intervals Data IN 130 172 KB Data OUT 3 721 KB Data IN 897 441 KB Data OUT 27 212 KB Data IN 384 763 KB Data OUT 10 273 KB within which the rules are valid are provided as well Quota TOTAL 7 Figure 2 1 Transfer Quota Statistics 2 3 User preferences 3 Web Site Restrictions Content Type Time Interval adframe ad handler ads banner please showit popup popups gator com adserv ad ad ad ad ads Any Any windowsupdate com update microsoft com Figure 2 2 Current web restrictions and rules 2 3 User preferences The Preferences tab allows setting of custom web content filtering and preferred language f
4. has already expired Kerio Control requires user authentication by password This precaution helps avoid misuse of the user identity by another user Under the conditions described above the welcome page displays a warning message informing that another user is already logged on the firewall from the particular host Authenticated user connecting to the web interface can continue their work in the interface after entering their password If a new user attempts to connect to the web interface the connected user must log out first and then the new user is asked to authenticate by username and password Sessionis every single period during which a browser is running For example in case of Internet Explorer Firefox and Opera a session is terminated whenever all windows and tabs of the browser are closed while in case of SeaMonkey a session is not closed unless the Quick Launch program is stopped an icon is displayed in the toolbar s notification area when the program is running Web user interface 2 2 Status information and user statistics On the Status tab the following information is provided User and firewall information The page header provides user s name or their username as well as the firewall s DNS name or IP address Transfer Quota Statistics The upper section of the Status page provides information on the data volume having been transferred by the moment in both directions download upload for the particular
5. in a manner an alternative to the My Network Places system tool it does not enable access to web servers or other services in a remote network SSL VPN is suitable for an immediate access to shared files in remote networks in such environments where it is not possible or useful to use Kerio VPN Client 4 1 Usage of the SSL VPN interface The interface can be accessed from most of common web browsers see chapter 1 Specify URL in the browser in the https server format where server represents the name or IP address of the Kerio Control host If SSL VPN uses another port than the default port for HTTPS 443 it is necessary to specify the used port in the URL e g https server 12345 Upon a connection to the server the SSL VPN interface s welcome page is displayed localized to the language set in the browser If the language defined as preferred is not available the English version will be used For access to the network by SSL VPN authentication to the particular domain at the login page by username and password is required The login information usually match the authentication details used for login to the user s operating system Any operations with shared files and folders are performed under the identity of the user currently logged in 32 4 1 Usage of the SSL VPN interface KerofHosntiesSSSLVPN Login to Kerio Clientless SSL PN Name jsmith Password freee Login Figure 4 1 Clientle
6. 0 ccc cence eee aee eee s 21 3 6 Users by Tate usas sssaado owe ei peed RSS DEDO Cad dad ipae P Ades 27 3 7 Top Visited Websites 0 0000 eee ene eee eens 28 3 8 Top Requested Web Categories 0 0000 c cee eens 30 4 Kerio Clientless SSL VPN oc cece erence eens seen ene eeeeeee 32 4 1 Usage of the SSL VPN interface 00 00 00 000 c eee eee eee 32 A Legal NOWGGS 14525223 ssm r icms asd ERG saute LOS REESE Sadi ds nae ME oats 38 Glossary Of terms scddiwsews UUpes ttu owen amd a mada da pau Rao LAG Lda ain 39 Index i 4 2 2 2 5t b ee heme eibi a spas isa RE RUE Sead IA Rad rbi SEE 42 Chapter 1 Introduction Kerio Control is a complex tool for connection of the local network to the Internet protection of this network from intrusions network monitoring and user access control Kerio Control also provides various tools for non administrators e Web user interface used for user authentication at the firewall viewing of status information and setting of user preferences For details see chapter 2 e Kerio StaR this component provides detailed information on user browsing activities visited web pages volume of transferred data etc For details see chapter3 e Kerio SSL VPN allows remote access from the Internet to files stored in shared folders on LAN computers For details see chapter 4 All the items described above are so called web interfaces This means that they are accessed
7. 4 Categories Entertainment Culture IT 09 08 am 1 41 wemes net Visits 3 09 10 am 0 47 www cnn com Visits 5 Categories Entertainment Culture Information Communication 09 14 am 4 55 youtube com Visits 11 Categories Entertainment Culture 09 59 am 0 16 google com Visits 2 Categories Information Communication 09 59 am google com 09 59 am 0 01 emule project net Visits 1 Categories IT 09 59 am 0 15 emule com Visits 2 Categories IT Figure 3 14 User s Activity access to web pages The header informs about the total number of visited web pages in the selected period and the total number of web searches Kerio Control correctly detects most of the common web browsers Each record of connection to a web page includes e Start time and duration see above e Domain to which the page belongs statistics in StaR are created by domains see e g chapter 3 7 23 Kerio StaR statistics and reporting e Number of visits the number says how many times the page was visited within this activity e Page category site classification by the Kerio Web Filter module If Kerio Web Filter is not running or classification failed category will not be displayed e Page title Page title is displayed as a link it is possible to simply click on the link to open the page in a new window or a new tab of the browser If the page has no title it will not be included in the activity list Conne
8. Blake Iblake Lauren Panos lpanos Laurette Stilles lstilles Lisa Maatz Imaatz Lonnie Stifler Istiffler Lucy Carr lcarr Mark Stone mstone Mark Wayne mwayne Matthew Candler mcandler Figure 3 12 Selection of a user The top left section of the page shows a header with all available information about the selected user username email address etc 7 User s Activity John Smith Username jsmith E mail jsmith company com Description Technician Figure 3 13 User s Activity user info Under this header all detected activities of this user in the selected time period are listed If there are no records meeting the criteria the No data available information is displayed Technically it is not possible to recognize whether there was any activity by this user in the period or not but is has not been recorded for any reason Note 1 The Users Activity section provides overview of user s activity for a certain period but it is not useful for real time monitoring of the use activity Detected activities are always shown with certain delay caused especially by these factors e Updating data in StaR to Kerio Control gathering and evaluation of information for StaR means processing of large data volumes To reduce load on the firewall data for StaR is updated approximately once an hour see information about the last data update e Delay in recording of activities each activity is recorded 15 minute
9. Disconnected Click to Dial This page is refreshed automatically Figure 2 6 Web interface dial ups control The following information items are provided for each line e Name of the line in Kerio Control e Current state Disconnected Connecting Connected Disconnecting e Action hypertext link that dials or hangs up the line when clicked depending on its current state e Connection time e Volume of data transferred in either direction Incoming from the Internet to the LAN Outgoing from the LAN to the Internet Note The Dial up page is automatically refreshed in regular time intervals 12 Chapter 3 Kerio StaR statistics and reporting The Kerio Control s web interface provides detailed statistics on users volume of transferred data visited websites and web categories This information may help figure out browsing activities and habits of individual users The statistics monitor the traffic between the local network and the Internet Volumes of data transferred between local hosts and visited web pages located on local servers are not included in the statistics also for technical reasons One of the benefits of web statistics and reports is their high availability The user usually an office manager does not need the Administration Console and they even do not need Kerio Control administrator rights special rights are used for statistics Statistics viewed in web browsers can also be easily pri
10. Flaura Winston Visits 8 940 Other Alice Perry Lauren Panos Henry Pinard Mark Stone Jennifer Stone Figure 3 21 Chart of top active users for the particular domain e The table next to the chart shows the most active users sorted by number of visits at websites within the particular domain up to ten users User Visits Flaura Winston Fwinston 8 940 Ulrych Depper udepper 98 Figure 3 22 Table of top active users for the particular domain Click on the name of a user in the chart or table to switch to the Individual tab and see detailed statistics of the particular user see chapter 3 4 29 Kerio StaR statistics and reporting Hint Method of username displaying in the table can be set in the Kerio Control configuration Only full names are shown in charts or usernames if the full name is not defined in the account of the particular user 3 8 Top Requested Web Categories The Web Categories section includes statistics of the top ten visited web pages categorized by the Kerio Web Filter Statistics of categories provide more general information of visited websites For example the information help figure out how much users browse websites not related to their work issues The chart on the left shows the top ten most visited web categories in the selected accounting period The number in the chart refers to total number of HTTP requests included in the particular category For technical reasons it is
11. antivirus check 34 bookmarks 34 deployment 32 P preferred language 11 S SSL VPN 32 antivirus check 54 bookmarks 34 deployment 52 StaR 15 accounting period 15 overall view 17 20 overview 13 top requested web categories 50 top visited websites 25 users activity 2 volume of transferred data 27 42 statistics accounting period 15 in the Web interface 15 Kerio StaR 13 overall view 17 20 overview 13 top requested web categories 30 top visited websites 28 users activity 21 volume of transferred data 27 V VPN Kerio Clientless SSL VPN 32 W Web Interface 5 dial ups 12 login page 5 preferred language 11 user preferences 9 user Statistics amp 43
12. evaluation of information for StaR means processing of large data volumes To reduce load on the firewall and slowdown of Internet connection data for StaR is updated approximately once an hour The top right corner of each StaR page displays information about when the last update of the data was performed For the reasons mentioned above the StaR interface is not useful for real time monitoring of user activity 14 3 2 Accounting period Print formatting Any page of the StaR interface can be converted to a printable version For this purpose use the Print option in the upper toolbar Today This Week This Month 7 Custom period 44 Print Figure 3 1 Kerio StaR toolbar Clicking on Print displays the current StaR page in a new window or on a new tab of the browser in a printable format and the browser s print dialog is opened Size and paging are optimized for the two top used paper formats A4 and Letter Warning For technical reasons pages of StaR cannot be printed by the classic File Print method or by pressing Ctrl P This method would print out the original uncustomized for printing page 3 2 Accounting period Most frequently statistic information needed refer to a certain time period today last week etc This period is called accounting period Accounting period can be set in the toolbar at the top of the Kerio StaR page Today This Week This Month 27 Custom period 4 3 Pri
13. from external sources typically from the Internet In this guide the word firewall represents the Kerio Control host FTP File Transfer Protocol IMAP Internet Message Access Protocol IMAP enables clients to manage messages stored on a mail server without downloading them to a local computer This architecture allows the user to access his her mail from multiple locations messages downloaded to a local host disk would not be available from other locations IP address IP address is a unique 32 bit number used to identify the host in the Internet It is specified by numbers of the decimal system 0 255 separated by dots e g 195 129 33 1 P2P network Peer to Peer P2P networks are world wide distributed systems where each node can represent both a client and a server These networks are used for sharing of big volumes of data this sharing is mostly illegal DirectConnect and Kazaa are the most popular ones POP3 Post Office Protocol is an email accessing protocol that allows users to download messages from a server to a local disk It is suitable for clients who don t have a permanent connection to the Internet 39 Glossary of terms Port 16 bit number 1 65535 used by TCP and UDP for application services identification on a given computer More than one application can be run at a host simultaneously e g WWW server mail client FTP client etc Each application is identified by a port number Ports 1 10
14. interface Creating folders The dialog allows creating of a new folder in the specified location By default the current path specified in the URL line is indicated However it is possible to enter a new path Ex Create a new folder Create a new Folder Projecta In folder servertismithiDocuments Change Create Cancel Figure 4 4 Clientless SSL VPN new folder Use the Edit button to select a new path folder where the new folder will be created e use a bookmark e selectitin the folder tree Renaming a file or a folder Renaming is very simple use the dialog to specify a new name for the selected folder or file Copying or moving files folders The SSL VPN interface allows copying or moving of any number of files or and folders at a time First select files and folders by checking the fields next to their names checking of the field in the header selects all files and folders in the current location 35 Kerio Clientless SSL VPN m Select a target location Select a target location Current path iserverlismithiDocuments Choose a destination From your bookmark list Documents X Select a destination From the list C3 server C3 jsmith P Documents C3 Project3 Figure 4 5 Clientless SSL VPN destination path folder selection Copy selected files Copy selected files to the Following Folder Mserverishared Change List of selected files and
15. multiple files at a time 37 Appendix A Legal Notices Microsoft Windows Windows NT Windows Vista Internet Explorer ActiveX and Active Directory are registered trademarks or trademarks of Microsoft Corporation Mac OS and Safari are registered trademarks or trademarks of Apple Inc Linux is registered trademark kept by Linus Torvalds Mozilla and Firefox are registered trademarks of Mozilla Foundation Kerberos is trademark of Massachusetts Institute of Technology MIT Other names of real companies and products mentioned in this document may be registered trademarks or trademarks of their owners 38 Glossary of terms ActiveX This Microsoft s proprietary technology is used for creation of dynamic objects for web pages This technology provides many features such as writing to disk or execution of commands at the client i e on the host where the Web page is opened This technology provides a wide range of features such as saving to disk and running commands at the client i e at the computer where the Web page is opened Using ActiveX virus and worms can for example modify telephone number of the dial up ActiveX is supported only by Internet Explorer in Microsoft Windows operating systems Connections A virtual bidirectional communication channel between two hosts See also TCP Firewall Software or hardware device that protects a computer or computer network against attacks
16. or IP address of the server e Volume of data transferred in each direction Remote Access This category addresses remote access to Internet hosts e g Microsoft Remote Desktop VNC Telnet and SSH as well as VPN access to remote networks Remote access if not used for work purposes can be quite dangerous User can use it to get round local firewall rules e g by browsing through banned web pages on a remote host or by transferring forbidden files by VPN The Remote Access header informs about e number of VPN connections and total volume of data transferred via VPN e number of remote connections and total volume of transferred data Records addressing individual activities include the following information e name or IP address of the server to which the user connected e name of protocol service e volume of data transferred by the connection in each direction 26 3 6 Users by Traffic Remote Access m VPN connections 1 Data transferred 4 714 KB Remote access connections 7 Data transferred 120 195 KB Hide details Start Duration Details 07 59 am 1 12 05 home smith net 10 23 am 1 14 20 home smith net 11 37 am home smith net 11 50 am 1 17 55 home smith net 02 06 pm 20 12 home smith net 02 06 pm 20 12 vpn server com 03 14 pm home smith net Figure 3 18 User s Activity remote and VPN access 3 6 Users by Traffic The Users by Traffic section shows table of all users sorted by volume of
17. regularly even if folder or and file names include blank spaces for example server my folder my file doc 33 Kerio Clientless SSL VPN All shared items in the domain can be browsed using a so called navigation tree on the left The navigation tree is linked to the entry this means that in the entry the path associated with the selected item in the tree is displayed and vice versa if a path is entered in the line a corresponding item is selected in the tree Right under the navigation tree actions available for the specified location ie for the selected item or folder is provided The basic functions provided by the SSL VPN interface are download of a selected file to the local host the host where the user s browser is running and uploading a file from the local host to a selected location in the remote domain the user must have write rights for the destination Downloading or uploading of more than one file or of entire folders is not possible For files and folders any standard functions such as copying renaming moving and removals are still available Files and folders can be copied or moved within the frame of shared files in the particular domain In the current path new folders can be created and empty folders can be removed Antivirus control Kerio Control administrator can set antivirus control for files transferred via the SSL VPN interface only saved files are scanned for viruses by default The S
18. 11 Selection of a user Hint Method of username displaying can be set in the Kerio Control configuration When a user is selected full name username and email address are displayed if defined in the user account The View User s Activity link switches StaR to the Users Activity page providing detailed information on traffic of the particular user in the selected time period for details see chapter 3 5 The same type of statistics as total statistics in the Individual section will be shown for the user as follows e volume of data transferred in individual subperiods of the selected accounting period e top visited websites e top requested web categories e used protocols and their part in the total volume of transferred data For detail information on individual statistic sections see chapter 3 3 3 5 Users Activity The Users Activity tab allows showing of detailed information on browsing activities of individual users This section answers questions like What was this user doing in the Internet in the selected period How much time did this user spend by browsing through web pages etc In the top right section of the Users Activity tab select a user whose activity you wish to see 21 Kerio StaR statistics and reporting Select User Please select user Jennifer Stone jstone Jim Hamm hamm Joel Klecker jklecker John Wayne jwayne X Julian Clifton jclifton Laura
19. 23 are reserved and used by well known services e g 80 WWW Ports above 1023 can be freely used by any application PPTP Microsoft s proprietary protocol used for design of virtual private networks See chapters and sections concerning VPN Proxy server Older but still wide spread method of Internet connection sharing Proxy servers connect clients and destination servers A proxy server works as an application and it is adapted for several particular application protocols i e HTTP FTP Gopher etc It requires also support in the corresponding client application e g web browser Compared to NAT the range of featured offered is not so wide Script A code that is run on the Web page by a client Web browser Scripts are used for generating of dynamic elements on Web pages However they can be misused for ads exploiting of user information etc Modern Web browsers usually support several script languages such as JavaScript and Visual Basic Script VBScript SMTP Simple Mail Transfer Protocol is used for sending email between mail servers The SMTP envelope identifies the sender recipient of an email SSL SSL is a protocol used to secure and encrypt network communication SSL was originally designed in order to guarantee secure transfer of Web pages over HTTP protocol Nowadays it is used by almost all standard Internet protocols SMTP POP3 IMAP LDAP etc At the beginning of communication an encryption key is
20. Change password Figure 2 4 Editing user password Preferred language At the bottom of the Preferences tab it is possible to set language preferences This language will be used for e the firewall s web interface e Kerio StaR e Cautions and further information sent to users by email e g warning of a virus or notification of exceeding of the transfer quota Language preferences are not applied to the Kerio Clientless SSL VPN interface where the language is inherited from the web browser configuration ng Language Preferred language Save settings Spanish Russian Slovak Figure 2 5 Setting language preferences of the web interface 11 Web user interface In the current version of Kerio Control you can choose from 16 languages The language can be either selected from a menu or it can be set automatically according to the web browser s settings default option This option exists in all supported web browsers English will be used if no language set as preferred in the browser is available Note Language settings affect also the format of displaying date and numbers 2 4 Dial up Users with rights for controlling dial ups in Kerio Control can dial and hang up individual RAS lines and view their status on the Dial up lines tab This tab lists all dial up lines defined in Kerio Control de RAS Interfaces RAS Interface Current state Action Connection time Incoming Outgoing Dial up connection
21. Folders C3 Project3 projects doc 2 Files or folders selected Figure 4 6 Clientless SSL VPN copying or moving of files folders In the copy move dialog specify the destination path folder or select it in the tree or it is also possible to use a bookmark see above Moving of files folders It is also possible to remove any number of folders or and files as well as all files and folders in the current path Downloading files Downloading of files from remote shared folders to the local host is performed in the same way as usual downloading of files from web pages Simply click on a file to open 36 a standard download dialog It is not possible to download whole folders or multiple files at a time Uploading files The upload dialog allows selection of a destination folder by default the folder which is currently opened in the SSL VPN interface is set Destination folder can be specified manually selected in the folder tree or loaded from a bookmark see above Use the File entry to specify full path to a local file Files can be also selected by using the Browse button click this link to open the standard system dialog for opening of a file re Upload file To Folder server jsmith Documents Project3 Change File D Project3 specification doc Browse Upload Cancel Figure 4 7 Clientless SSL VPN uploading files to shared folders It is not possible to upload whole folders or
22. KB 4G 8 3 10 11 12 13 14 Figure 3 5 Daily Traffic The subperiod length depends on the current period e day the chart shows traffic by hours e week or month the chart shows traffic by days For custom periods e upto 2 days the chart shows traffic by hours e upto 5 weeks the chart shows traffic by days e upto 6 months the chart shows traffic by weeks e more than 6 months the chart shows traffic by months Top Visited Websites The chart of the most frequented websites shows top five domains second level by their visit rate The number in the chart refers to number of visits of all web pages of the particular domain in the selected accounting period Note Kerio Control can see only separate HTTP requests To count number of visited pages i e to recognize which requests were sent within a single visit a special heuristic algorithm is used The information therefore cannot be precise though the approximation is very good tis not possible to switch to a selected subperiod if the traffic is displayed by hours The shortest accounting period to be selected is one day 17 Kerio StaR statistics and reporting e Top Visited Websites google com gemius pl google com seznam cz Visits 13 693 google cz microsoft com 1 888 1 702 Figure 3 6 Chart of top visited web domains Top Requested Web Categories This chart shows top five web categories requested in the selec
23. Kerio Control User Guide Kerio Technologies O 2011 Kerio Technologies s r o All rights reserved This guide provides detailed description on user interfaces of Kerio Control version 7 1 2 The Kerio VPN Client application is described in a stand alone document Kerio VPN Client User s Guide All additional modifications and updates reserved For current version of the product go to http www kerio com firewall download For other documents addressing the product see http www kerio com firewall manual Information regarding registered trademarks and trademarks are provided in appendix A Contents 1 Introduction 5522 tahaha nad tines aco aa wheat ES A odes Sank 4 2 Web user interface adpsusmnriidisinada seated pedi s DR e RUE da DR ua melada 5 2 1 Accessing the web interface and user authentication 5 2 2 Status information and user statistics 0 eee 8 2 3 USO PUETOLONCOS sousaieoies dee niesek naite poi einna e xad ei dd ea s o 9 zd DialUp csser seed scesderasde cd e a a EEan Eaa ea ES IEN 12 3 Kerio StaR statistics and reporting sssseeesesesseeee eee ee 13 3 1 Connection to StaR and viewing statistics cccccccciiiiiii 13 3 2 Accounting period cce 15 3 3 Overall VIEW ssceciusausamscs ama da semeia e hes E a a E a ai a ma n ee adis 17 34 USerStatiSHOS asipairedantes dae obeaceashwnts Davidson En sda ras duo edad 20 3 5 Users Activity 0
24. SL VPN interface thus guarantees security of files transferred between the client host and a remote local network If a virus is detected in either downloaded or saved file the operation is interrupted and a warning is displayed Bookmarks For quick access to frequently used network items so called bookmarks can be created Bookmarks work on principles similar to the Favorites toolin Windows operating systems The Add to bookmarks option creates a new bookmark for the current path the path displayed in the URL entry It is recommended to label by a short unique name this will help you with the bookmarks maintenance especially if more bookmarks are used If the name is not specified the bookmark will be listed in the list of bookmarks under the UNC path The Folder administration option allows editing or removing of created bookmarks as well as creating of a new bookmark for any path folder The destination path can be specified manually or it can be browsed in the folder tree and it is also possible to use an existing bookmark as a starting point 34 4 1 Usage of the SSL VPN interface gi Insert a new bookmark Bookmark path MservertljsmithiDocumentslProject3 Change Bookmark description Project3 Insert Cancel Figure 4 3 Clientless SSL VPN new bookmark Examples of operations with files and folders In this section several examples of manipulation with files and folders via the SSL VPN
25. The starting and ending day can be defined manually or selected from the thumbnail calendar available upon clicking on the icon next to the corresponding textfield The selected period applies to all tabs until a next selection or until closing of the Kerio StaR interface The today period is set as default and used upon each startup of the Kerio StaR interface Note Under certain circumstances an information may be reported that this period will be rounded to whole weeks or months In such a case the real rounded period for the statistics will be set and shown above the Change Period button 3 3 Overall View 3 3 Overall View The Overall tab provides overall statistics for all users within the local network including anonymous i e unauthenticated users for the selected accounting period Traffic by periods The first chart provides information on the volume of data transferred in individual subperiods of the selected period The table next to the chart informs on data volumes transferred in the entire selected period total and for both directions as well Simply hover a column in the chart with the mouse pointer to view volume of data transferred in the corresponding subperiod Click on a column in the chart to switch to the information on the particular subperiod only for details see chapter 3 2 e Daily Traffic 106 Total 12 292 156 KB Inbound 11 771 964 KB Outbound 520 191 KB 2 180 805
26. a transferred by P2P 6 128 KB P2P attempts blocked 1 Hide details O Start Duration Details 08 24 am 0 03 Download from cerulean cachenetworks com 9 425 KB 08 27 am 0 10 Download from cerulean cachenetworks com 5 128 KB 10 25 am Download from download kerio com 2 074 KB 10 25 am Upload to ftp myftp com 1 044 KB 10 29 am 0 03 Download from ftp2 download com 4 925 KB 10 42 am 54 59 Peer to Peer file sharing 10 30 am 42 15 Unknown connection 193 138 221 214 11 10 am 0 38 Download From www installengine com 3 630 KB 11 37 am Peer to Peer file sharing attempt blocked 11 46 am 43 13 Unknown connection bzq 179 18 134 static bezegint net Figure 3 16 User s Activity large file transfers and usage of P2P networks The header informs about total number of recognized files total volume of transferred data in both directions data transferred via P2P networks in both directions and number of blocked attempts for sharing of files in P2P networks this information is displayed only if there was such attempt detected and blocked Types of records in the Large File Transfers category File downloads and uploads the record includes name or IP address of the server volume of transferred data and name of the transferred file If the record points at download from a web server or from an anonymous FTP server the file name is displayed as a link Clicking on the link downloads the 25 Kerio StaR statistics and reporting
27. category up to ten users User Requests Flaura Winston Fwinskon 12 970 Laurette Stilles Istilles 2 939 Figure 3 25 Table of top users for a selected web category Click on the name of a user in the chart or table to switch to the Individual tab and see detailed statistics of the particular user see chapter 3 4 Hint Method of username displaying in the table can be set in the Kerio Control configuration Only full names are shown in charts or usernames if the full name is not defined in the account of the particular user Note Statistics of visited categories might be affected by wrong categorization of some web pages Some pages might be difficult to categorize for technical reasons and rarely it may happen that a website is included in a wrong category 31 Chapter 4 Kerio Clientless SSL VPN Kerio Clientless SSL VPN thereinafter SSL VPN is a special interface used for secured remote access to shared items files and folders in the network protected by Kerio Control via a web browser To a certain extent the SSL VPN interface is an alternative to Kerio VPN Client Its main benefit is that it enables an immediate access to a remote network from any location without any special application having been installed and any configuration having been performed that s the reason for calling it clientless The main disadvantage of this alternative is that network connections are not transparent SSL VPN is
28. ctions to secured pages HTTPS are encrypted therefore titles and URLs of these pages cannot be recognized In these cases the record includes only the following information e Name or IP address of the server e Protocol HTTPS e Volume of data transferred in each direction The search record includes e Search engine only domain e Searched string The searched string is displayed as a link which can be clicked to perform the corresponding search in the relevant search engine and to view the search results in a new window or a new tab of the browser Messages e mail and instant messaging This category covers two types of activity email communication by SMTP IMAP and POP3 protocols and Instant Messaging services such as ICQ AOL Instant Messenger AIM Yahoo Messenger MSN Messenger etc Messaging Emails recognized 2 Data transferred 12 934 KB Instant messaging used Hide details Start Duration Details 08 25 am 45 57 Instant messaging 02 36 pm 38 38 Mail connection to imap mymail com 02 46 pm 28 10 Mail connection to smtp mymail com 03 37 pm 1 emails sent to smtp mymail com 03 41 pm 1 emails sent to smtp mymail com Figure 3 15 User s Activity email and Instant Messaging The header informs about number of detected email messages and total volume of data transferred by email protocols Kerio Control can recognize only email communication by SMTP and POP3 unless the traffic is encrypted Other
29. d Protocols 24 252 011 KB Other Mail E Ftp Proxy Multimedia Figure 3 9 Parts of individual protocols in the total volume of transferred data For better reference Kerio Control sorts protocols to predefined classes e Web HTTP and HTTPS protocols and any other traffic served by the HTTP protocol inspector e E mail SMTP IMAP POP3 protocols and their secured versions e FIP FTP protocol including traffic over proxy server e Multimedia protocols enabling real time transmission of sound and video files 19 Kerio StaR statistics and reporting Note e g RTSP MMS RealAudio P2P file sharing protocols peer to peer e g DirectConnect BitTorrent eDon key etc The traffic is accounted only if Kerio Control detects that it is traffic within a P2P network VPN connection to remote private networks e g Kerio VPN Microsoft PPTP etc Remote Access terminal access to remote hosts e g Remote desktop VNC Telnet or SSH Instant Messaging online communication via services such as ICQ MSN Mes senger Yahoo Messenger etc Other any traffic which does not belong to any of the previously described categories 1 The No data available alert informs that no data is available in Kerio Control s database for the selected statistics and accounting period This status can be caused by various different reasons e g that the selected user account did not exis
30. e the web interface to e View their daily weekly and monthly transferred data volume quotas and their current status e View web access restriction rules e Set filtering of specific web items e g blocking of pop ups e Set preferred language for the web interface and notifications and alerts sent by email e g alerts on a virus detected or on reaching and exceeding the transferred data volume quota e Change password in specific cases only Users with corresponding privileges can also e View Internet usage statistics see chapter 3 e Dial and hang up dialed Internet lines 2 1 Accessing the web interface and user authentication The Kerio Control s web interface is available in two versions SSL secured or unsecured both versions include identical pages Web user interface Use the following URL server refers to the name or IP of the Kerio Control host 4081 represents a web interface port to open the firewalls web interface https server 4081 In older versions of Kerio Control an unsecured web interface at port 4080 was also available https server 4080 Connections to port 4080 will be redirected to the secured web interface automatically now https server 4081 Users logged in User authentication is required for access to the Kerio Control s web interface Any user with their own account in Kerio Control can access the web interface regardless their access rights If the particular hos
31. ection via the non secured web interface would be too risky StaR page in the web interface The page is divided into the following tabs e Overall overall statistics including traffic of all local users volumes of transferred data top users top web pages etc This section is opened as a welcome page immediately upon a successful logon e Individual statistics of individual users volumes of transferred data top web pages visited by the user etc e Users Activity detailed information about activity of individual users visited websites files transferred via FTP remote access to other hosts etc e Users by Traffic table and chart for volumes of data transferred by individual users e Visited Sites overview of the ten most frequently visited web domains A chart and table of top users having visited the greatest number of web pages of the domain is provided e Web Categories the top ten most frequently visited web categories in accordance with the Kerio Web Filter s categorization A chart referring to each web category is provided along with table of users with the highest number of requests for sites belonging to the particular category Detailed descriptions of individual sections are provided in the following chapters Updating data in StaR First of all the StaR interface is used for gathering of statistics and creating of reviews for certain periods To Kerio Control gathering and
32. h advertisements Filter cross domain referer This option enables disables the Referer item included in an HTTP header NOTE The firewall administrator may setup general rules to eliminate dangerous content From web pages which might override your settings Save settings Figure 2 3 Customized Web objects filtering This option will block the window open method in JavaScript e Cross domain referer blocking of the Referer items in HTTP headers This item includes pages that have been viewed prior to the current page The Cross domain referer option blocks the Referer item in case this item does not match the required server name Cross domain referer blocking protects users privacy the Referer item can be monitored to determine which pages are opened by a user Save settings To save and activate settings click on this button Editing user password The middle section of the Preferences page allows setting of user password Password cannot be changed if the user is authenticated with a Windows domain account in such case the Change password section is not displayed To change a password enter the current user password new password and the new password confirmation into the appropriate text fields Save the new password with the Change pass word button 10 2 3 User preferences E Change Password Old password enn New password e Re type new password Caution The password is case sensitive
33. not possible to recognize whether the number includes requests to a single page or to multiple pages Therefore number of requests is usually much higher than number of visits in statistics of the top visited websites see chapter 3 7 e Top Requested Web Categories Information Com IT Information Communication Society Education Requests 98 321 Ordering 8 496 Entertainment Cu 7 130 Lifestyle 5 752 vehicles Transpor 2 373 Finance Investment 2 039 Games Gambling 763 Private Homepages 618 Figure 3 23 Top visited websites sorted by categories Below the chart detailed statistics for each of top ten visited web categories are shown e The header provides name of the category and total number of requests to websites belonging to the category e The chart shows part of the most active users up to six items in the total visit rate of the particular category Hovering of a user s name by the mouse pointer shows total number of the user s requests to the particular web category 30 3 8 Top Requested Web Categories e Information Communication 98 321 requests Top 10 users John Wayne Thomas Moore Jennifer Stone Norman Flanders Firewall rats Winston sie Aet EVI Winston EMEN Requests 12 970 Other Figure 3 24 Chart of top users for a selected web category e The table next to the chart shows the most active users sorted by number of requests to the particular web
34. nt E y 14 2007 Next day 2 15 2007 Figure 3 2 Kerio StaR toolbar and accounting periods The toolbar includes buttons for fast switching between accounting periods daily weekly monthly Arrows previous next next to the date current period allow fast browsing through the selected period This browsing is not available for custom accounting periods To change accounting period use the Custom period button Select an item in the Period length combo box day week month Further options are displayed depending on which option has been selected Note Weeks and months might not correspond with weeks and months of the civil calendar In Kerio Control statistics settings so called accounting periods can be set the first day of each month and week any change takes effect only for new data i e the information already saved in the database are kept unchanged It is also possible to set a custom accounting period defined by starting and ending days 15 Kerio StaR statistics and reporting M Custom period da Print Period length Day M Day Fa week IN Mo Tu 4 Month 77 Custom 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 1 4 Today OK Cancel Figure 3 3 Selection of accounting period Period length 7 7 Custom v Start Date en 2007 End Date n 4 2007 The selected period will be rounded to weeks o0 OK Cancel Figure 3 4 Custom accounting period
35. nted or saved on the disk as web pages Note 1 Users should be informed that their browsing activities are monitored by the firewall 2 Statistics and reports in Kerio Control should be used for reference only It is highly unrecommended to use them for example to figure out exact numbers of Internet connection costs per user 3 1 Connection to StaR and viewing statistics To view statistics user must authenticate at the Kerio Control s web interface first User or the group the user belongs to needs rights for statistics viewing For details on authentication at the Kerio Control s web interface see chapter 2 1 Access to statistics From any host from which access to the Kerio Control s web interface is allowed Kerio StaR can be opened by any of the methods described below e At https server 4081 star This URL works for the StaR only If the user has not appropriate rights to view statistics an error is reported e At https server 4081 This is the primary URL of the Kerio Controls web interface If the user possesses appropriate rights for stats viewing the StaR welcome page providing overall statistics see below is displayed Otherwise the My Account page is opened this page is available to any user 13 Kerio StaR statistics and reporting Warning For access from the Internet i e from a host outside the local network only the secured web interface will probably be available The other option conn
36. nterface and user authentication Log out Once finished with activities where authentication is required it is recommended to log out of the firewall by using the Logout button It is important to log out especially when multiple users work at the same host If a user doesn t log out of the firewall their identity might be misused easily User can be logged on the firewall even if they have not used the web interface e g if the firewall required user authentication during access to a website To make user avoid opening the web interface when finishing their work and clicking on Logout Kerio Control includes a direct link for user logout https server 4081 1logout This URL performs immediate logout of the user without the need of opening of the web interface s welcome page Hint URL for user logout from the firewall can be added to the web browser s toolbar as a link User can use this button for quick logout Note Kerio Control also allows automatic logout if idle if the user currently logged in a session uses no Internet service for a defined time period usually 2 hours they are logged out of the firewall automatically This handles situations when a user forgets to log out User password authentication If an access to the web interface is attempted when an authentication from the particular host is still valid the user has not logged out and the timeout for idleness has not expired but the particular session
37. or the web interface Users not using an account belonging to the Windows domain can also change their password in preferences Content filtering options The upper section of the page enables to permit or deny particular items of web pages Content filter options Checking of the field gets the corresponding item filtered by the firewall If a particular item is blocked by the Kerio Control administrator the corresponding field on this page is inactive user cannot change the settings Users are only allowed to make the settings more restrictive In other words users cannot enable an HTML item denied by the administrators for themselves Java applets applet HTML tag blocking ActiveX Microsoft ActiveX features this technology enables for example execution of applications at client hosts This option blocks lt object gt and lt embed gt HTML tags Scripts lt script gt HTML tag blocking commands of JavaScript VBScript etc Pop up windows automatic opening of new windows in the browser usually advertisements Web user interface AB Content Filter Options Filter HTML Java applets HTML applet tags Java Applet v Filter HTML ActiveX objects Active objects at web pages Filter HTML Script tags HTML lt script gt tags commands of scripting languages such as JavaScript VBScript etc v Filter HTML JavaScript pop up windows Automatic opening of new browser windows usually pop up windows wit
38. requested and transferred using asymmetrical encryption This key is then used to encrypt symmetrically the data TCP Transmission Control Protocol is a transmission protocol which ensures reliable and sequential data delivery It is used by most of applications protocols which require reliable transmission of all data such as HTTP FTP SMTP IMAP etc TCP IP Name used for all traffic protocols used in the Internet i e for IP ICMP TCP UDP etc TCP IP does not stand for any particular protocol UDP User Datagram Protocol is a transmission protocol which transfers data through individual messages so called datagrams It does not establish new connections nor it provides reliable and sequential data delivery nor it enables error correction or data stream control It is used 40 for transfer of small sized data i e DNS queries or for transmissions where speed is preferred from reliability i e realtime audio and video files transmission VPN Virtual Private Network VPN represents secure interconnection of private networks i e of individual offices of an organization via the Internet Traffic between both networks so called tunnel is encrypted This protects networks from tapping VPN incorporates special tunneling protocols such as PPTP Point to Point Tunneling Protocol and Microsoft s IPSec Kerio Control contains a proprietary VPN implementation called Kerio VPN 41 Index C Clientless SSL VPN 32
39. s after it s finished The reason for this is that similar activities in row are counted as one 22 3 5 Users Activity record for better transparency of user s activity 2 User s activity can be shown for up to 7 days for better transparency If a longer period is selected shorter periods covering the selected period will be provided Activity Categories Detected activities are sorted in a few categories Under the title of each category summary information total number of connections total volume of transferred data etc is provided followed by detailed overview of activities Details can be optionally hidden If a period longer than one day is selected records are divided in sections by days Optionally daily records can also be hidden Each activity record includes this time information start time and duration of the activity If an activity is marked as unfinished the particular connection has not been closed yet it is still open Activity categories are ordered as listed in the following description If there was no corresponding activity by the user in the selected period the category will not be shown Web Pages This category addresses one of the top user activities web browsing 9 Web Pages C Visited pages 34 Searches performed 3 Hide details Start Duration Details 09 06 am 0 20 google com Visits 2 09 06 am google cz 09 06 am 0 59 kerio com Visits 4 09 07 am 2 47 di fm Visits
40. ss SSL VPN login dialog Handling files and folders The way the SSL VPN interface is handled is similar to how the My Network Places system window is used Kerio fae zz ees sSSL VPN KERIO D Current path benesimome OO Q qe Navigation tree O Name Size Changed Description Entire network CS Oneieveltp cx COMPANY S4NewFolderi23 DIR 05 09 2005 08 46 PM m zbenes V NewFolder DIR 05 12 2005 09 05 AM amp income D NewFolder223 DIR 05 09 2005 06 23 PM 3 54NewFolder123 r C3 NewFolderqw 02 DIR 05 10 2005 08 26 AM NewFolder 3 NewFolderw DIR 05 09 2005 06 44 PM NewFolder223 O qwe DIR 05 12 2005 11 46 AM Tasks O about png 4kB 05 11 2005 01 57 PM Ga Rename r adblock Filters SkB 05 09 2005 01 02 PM amp Move to m ColorPic exe 150kB 05 09 2005 01 04 PM D Copy to r cs def 13kB 05 12 2005 07 59 AM Delete O debug log 1kB 05 10 2005 12 41 PM E New Folder r evc4sp3 exe 59125kB 05 09 2005 01 07 PM 2 Upload Cr home030 zip 9766kB 05 09 2005 01 03 PM gt Add to bookmarks E internal kwf 6 1 0 b1 78 win exe 21103kB 05 09 2005 01 13 PM r nestoy zip 98kB 05 10 2005 12 19 PM Bookmarks Cr TryDock log OkB 05 11 2005 11 11 AM LL Manage bookmarks zbenes income Figure 4 2 Clientless SSL VPN main page At the top of the page an entry is available where location of the demanded shared item so called UNC path can be specified for example server folder subfolder The path may be specified
41. t active in web browsing The chart at the top of the tab shows top ten visited web domains The number in the chart refers to number of visits of all web pages of the particular domain in the selected accounting period Note Kerio Control can see only separate HTTP requests To count number of visited pages i e to recognize which requests were sent within a single visit a special heuristic algorithm is used The information therefore cannot be precise though the approximation is very good e Top Visited Websites google com gemius pl google com seznam cz Visits 13 693 google cz 1 888 microsoft com 1 702 idnes cz helpForenglish cz 999 centrum cz 924 vodafone cz 582 o2 com 512 Figure 3 20 Top visited web domains 28 3 7 Top Visited Websites Under the chart detailed statistics for each of top ten visited domains are shown e The header provides name of the DNS name and total number of visits at websites on servers belonging to the domain Domain name is also a link to the main web site of the particular domain the www prefix is attached to the domain name i e for example the www google com page is opened for the google com domain e The chart shows part of the most active users up to six items in the total visit rate of the particular domain Hovering of a user s name by the mouse pointer shows total number of web pages visited by the user e google com 13 693 visits Top 10 users
42. t belongs to the Windows domain user can set to be authenticated automatically at their entrance to the web interface If not the firewall s authentication page is opened first waiting for a valid login username and password The login information usually match the authentication details used for login to the user s operating system Warning In network with multiple domains typically in huge branched organizations username with domain can be required e g wsmith us of fice company com To gain such information contact your firewall s administrator If the user is re directed to the page automatically after inserting the URL of a page for which the firewall authentication is required he she will be re directed to the formerly requested website after successful login attempt Otherwise the web interface s welcome page is displayed The welcome page of the web interface differs according the current user s access rights e If the user is allowed to view statistics the web interface will switch to the Kerio StaR mode and it will start with the page of overall statistics the overall tab for details see chapter 3 The My Account option available at the upper right corner can be used to switch to the user settings It is possible to return to the statistics page by the Statistics link e If the user is not allowed to view statistics user status info page is displayed instead see chapter 2 2 2 1 Accessing the web i
43. t in the particular time period the user did not login to the firewall within the period etc 2 Kerio Control tries to optimize size of the statistic database and volume of processed data The greatest volume of data is generated by statistics of visited websites For this reason daily statistics of visited websites are kept only for the last 40 days Weekly and monthly statistics are available for the entire data storage period as set in the configuration 2 years by default If a period is selected for which no data is available Kerio Control offers another period where data for the requested statistics might be found e Top Visited Websites The requested data is not available for selected time period Please select different time period which partially covers the requested period 1 1 2007 1 31 2007 1 1 2007 1 7 2007 1 8 2007 1 14 2007 1 15 2007 1 21 2007 S 1 22 2007 1 28 2007 Figure 3 10 Selection of a new time period for website statistics 3 4 User statistics The Individual tab allows showing of statistics for a selected user First select a user in the Select User menu The menu includes all users for which any statistic data is available in the database i e users which were active in the selected period 20 3 5 Users Activity Select User John Smith jsmith John Smith Username jsmith E mail jsmith company com Description Technician View Llser s Activity Figure 3
44. ted period sorted by the Kerio Web Filter module The number in the chart refers to total number of HTTP requests included in the particular category For technical reasons it is not possible to recognize whether the number includes requests to a single page or to multiple pages Therefore number of requests is usually much higher than number of visited websites in the previous chart e Top Requested Web Categories Information Communication IT Society Education Religion Ordering 8 496 Entertainment Culture 7 130 98 321 X Information Communication Requests 93 321 Figure 3 7 The chart of top requested web categories Top 5 users Top five users ie users with the greatest volume of data transferred in the selected accounting period The chart includes individual users and total volume of transferred data The chart shows part of the most active users in the total volume of transferred data in the selected period Hover a user s name in the chart by the mouse pointer to see volume of data transferred by the user both in total numbers and both directions download upload Click on a user s name in the chart or in the table to switch to the Individual tab see chapter 3 4 where statistics for the particular user are shown These charts and tables provide useful information on which users use the Internet connection the most and make it possible to set necessary limits and quotas Note 1 Total volume of data
45. transferred by a particular user is a summary of data transferred by the user from all hosts from which they have connected to the firewall in the selected period 2 Data transferred by unauthenticated users is summed and accounted as the not logged in user However this information is not very useful and therefore it is recommended to set firewall to always require authentication 3 Method of username displaying in the table can be set in the Kerio Control 18 3 3 Overall View e Top 5 users not logged in George Hanes q avid Richards Firewall A P George Hanes ghanes Total 3 429 058 KB Inbound 3 352 803 KB Outbound ou 76 254 KB User Total KB Firewall Firewall 6 282 544 Flaura Winston Fwinston Figure 3 8 Top 5 users statistics configuration Only full names are shown in charts or usernames if the full name is not defined in the account of the particular user Used Protocol The chart of used protocols shows part of individual protocols i e their classes in the total volume of data transferred in the selected accounting period Hover a protocol name with the mouse pointer to see volume of data transferred by the particular protocol Such information might for example help recognize type of traffic between the local network and the Internet If the internet line is overloaded it is possible to use the information to set necessary limits and restrictions traffic rules URL rules etc e Use
46. transferred data The table provides an information of part of the user in the total volume of the transferred data It is possible to use the table to view all transferred data or only data transferred by a selected protocol or protocol class This allows to get information about which users have transferred the most data by a service e g streams from online radio channels Note For detailed description of protocol classes distinguished in Kerio StaR see chapter 3 3 Lem Data Transferred by Individual Users Total KB 16 171 609 MA 6 567 748 ES 4 945 206 E Figure 3 19 The Users by Traffic table 27 Kerio StaR statistics and reporting Each row of the table provides name of the user along with information of data transferred by the user incoming data download outgoing data upload and the total volume of transferred data If a particular protocol is selected only total volume of transferred data is displayed Click on the name of a user to switch to the Individual tab and see detailed statistics of the particular user see chapter 3 4 Hint Method of username displaying in the table can be set in the Kerio Control configuration 3 7 Top Visited Websites The Visited Sites tab includes statistics for the top ten most frequently visited web domains These statistics provide for example the following information e which sites domains are visited by the users regularly e which users are the mos
47. wise the IMAP protocol encrypted communication etc only volumes of data transferred by individual protocols are monitored The Messaging section includes the following types of records e Connection to server connection of email client to SMTP IMAP or POP3 server The record includes name or IP address of the server used protocol and volume 24 3 5 Users Activity of data transferred in each direction Sent Received messages number of messages transferred within one connection name or IP address of the incoming outgoing email server used protocol and volumes of data transferred in each direction Note Volume of transferred data is rounded to kilobytes If data volume is smaller than 0 5 KB the value is set to 0 Instant messaging only connection to and disconnection from the server is recorded The record includes protocol IM service and name or IP address of the login server In this case duration of the activity stands for the length of connection to the service regardless of how many messages the user sent or received Large File Transfers This category addresses user activities where large data volumes are transferred downloads from web and FTP servers uploads to FTP servers or sharing of files in P2P networks Large files are files exceeding 1 MB or 2 MB of data transferred by an unknown connection see below Large File Transfers Files 6 Data transferred 34 975 KB Dat
Download Pdf Manuals
Related Search
Related Contents
2009 New Products ROLINE GOLD 3.5mm Audio Extension Cable, Male - Female 2.5m 1LTG664-05 DE revised_finale_2011 05 30 usocome.com - SEW Copyright © All rights reserved.
Failed to retrieve file