About services

Authentication

You can set global logon time settings and connect to directory servers to retrieve groups, apply network and web filtering permissions, and verify the identity of users trying to access network or Internet resources. You can customize group names, manage temporarily banned user accounts, view the sign-in times, usernames, group membership and IP address details of recently authenticated users. You can also customize the end-user SSL login page and configure SSL login redirection and exceptions, import and manage Kerberos keytabs. You can authenticate users with their own devices and allow them to connect to the network and allow filtering using Google credentials for user authentication.

User Portals

User Portals are simple user interfaces that allow users to perform restricted simple tasks. You can create a single User Portal or several User Portals for various departments or users. For each User Portal, you can hide or show functionality so that you can control what tasks the users can perform. For example, you might only want a User Portal so that users can run reports or just manage filter groups and lists.

Proxies

Note: To view this page, you need a Unified Threat Management license.

You can configure the SIP, FTP and reverse proxy services.

Simple Network Management Protocol (SNMP)

To monitor network-attached devices, you can turn on Smoothwall’s Simple Network Management Protocol (SNMP) agent.

Message censor

This is where you can create and manage filtering policies by assigning actions to matched content. Create and manage filters for matching types of message content, time periods for limiting the time of day during which filtering policies are enforced, and custom content categories for inclusion in filters.

Intrusion system

Note: To use this functionality, you need a Unified Threat Management license.

This is where you can deploy customized and automatic rules in the intrusion detection and intrusion prevention systems. You can configure your Smoothwall’s intrusion detection and prevention rules for inclusion in IDS and IPS policies. You can enable and configure policies to monitor network activity using the Intrusion Detection System (IDS) and the Intrusion Prevention System (IDS).

Dynamic Host Configuration Protocol (DHCP)

Note: To use this functionality, you need a Unified Threat Management license.

You can enable the DHCP service and set its mode of operation, configure automatic dynamic and static IP leasing to DHCP requests received from network hosts, view all current DHCP leases, including IP address, MAC address, hostname, lease start and end time, and the current lease state, configure the DHCP service to forward all DHCP requests to another DHCP server, and reroute DHCP responses back to the requesting host, and create and edit custom DHCP options.