Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.100117
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
It restrict senders to use domains
... [More]
listed/managed in Artica database in the MAIL FROM:
This feature check both internals and externals senders so you need to use a dedicated server that marked has "trusted" if you want to receive messages from Internet users.
It useful when you run this configuration in ISP mode by handle many SMTP domains that able to prevent send SPAM or forged mails from your structure.
In this case Artica server is switched to an Outgoing SMTP relay only.
The schema bellow explain the SMTP routing structure.
To enable this feature :
Click on the left menu on your organization.
Choose your SMTP instance.
Click on security settings tab.
On the security settings, click on "Sender computers restrictions rules" icon.
Check the Reject Senders Domains not listed in Local database option
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.092921
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
It help you importing routed
... [More]
domains from a text file in an organization.
text file must be formatted with a semi-colon and carriage return. For example :
domain.tld;10.10.10.1 domain.net;10.10.10.2 domain.com;10.10.10.3
Select your organization and click on the "messaging" tab.
Click on the Manage email Domains icon
Click on browse button to upload/select the text file.
Explorer will be displayed, select the desired directory and click on the folder + up arrow icon in order to upload a file into the selected folder.
Once the file selected, click on import button.
The second part of the form will display domains number that should be imported
Click on import button on the second part to start the importation process.
After several seconds, the form will display the domain importation progress status.
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.092819
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
this feature use auditd daemon that
... [More]
can be installed by
apt-get install auditd
yum install audit
It run a watchdog from specified directories and store events into mysql database.
With this feature you can follow an history with all files exchanges. useful to see who or what are deleted or read a file.
Click on Explorer on the top menu
browse your disk and select the directory you want to audit.
On the left pan of the directory informations, click on the magnifying glass icon
Turn the red circle to green in order to activate the watchdog feature on the directory.
After severals minutes you can view the events trough Artica Interface.
On the left menu, click on events/Auditd daemon.
On the right pan, select the folder icon on the desired directory.
You can search/Find/select events to display specific operations made on a file or a group file.
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.092819
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
With this feature you can
... [More]
restrict the VPN service during a specific period of each day.
Out of this period, the VPN server will be not available.
On the left menu, click on System / OpenVPN
Choose the OpenVPN server parameters tab
Select uptime service icon.
Enable the feature by checking Enable schedule the activity server checkbox.
Define the start time and end time that will set the time period of the available server
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature allow you to create separate postfix instances.
This is useful for creating a filtered inbound system and a responsive outbound system, on one host.
All instances has different settings, routing method, filtering.With Artica, you will
... [More]
be able to create unlimited postfix instances on your server.You can delegate the routing, filters settings to a specific user in each organization you have created.You can safely running postfix in multiple instances in return back to a single instance.
Each instance has it's own IP address.
The first step is to create virtual IPs on your server. A virtual IP is linked to an organization.
This link will determine if an organization can manage a postfix instance itself.
Run the procedure : Managing multiple Postfix instances on a single host in order to create Virtual IPs for each organization and enable the multiple postfix instances mode.
Go into your organization and select "Messaging servers" tab
Click on "Add mail server" icon.
Select the virtual IP on the "Listen IP address" and give the messaging server name of the new postfix instance.
Click on your new postfix instance and choose "Reconfigure SMTP service" to make the server in production mode.
Now you can manage filters, routing in the same way of a postfix managed has single instance but with severals virtual postfix servers.
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.092511
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
If you using artica with a single
... [More]
language, you can remove the drop-down list displayed on the logon page
On the main page, select "System Config." tab
Choose "Index Page" icon
On the index page popup, choose the "Logon page" tab.
Check the Remove language selection list and define the default language
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.092209
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
The purpose of this article is to
... [More]
provide an easy solution for limiting incoming traffic, thus preventing our LAN users from consuming all the bandwidth of our internet link.This is useful when our internet link is slow or our LAN users download tons of mp3s,iso files and browse non-productive web sites.
On the left menu, choose Web Proxy/Bandwith limitation.
The first set is to create a new rule. Click on "Add a new rule' icon.
Give the rule name and the bandwith rate that this rule will be handle.
After adding the rule, a new icon is displayed with your rule definition.
Click on the icon's rule.
You have several ways to define how or when reduce the bandwith :
By IP addresses and networks (Networks icon)
By remote web sites (Web sites icon)
By file type *.iso,*.zip... (By file type icon)
By time that help you to reduce the bandwith during the week and time.
In our example, we reduce the bandwith for non-productive web sites and for the 192.168.1.x - 255.255.255.0 network.
On the Web site icon section add all the web sites that activate the bandwith limitation when surfing on.
On the network section, define the network that will be the scope of the rule.
Take a look on the bottom of the rule section, a text area explain the rule you have created.
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.091902
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
With this feature, all browsers
... [More]
will be banned except browsers listed in the dedicated sectionThis feature has been designed to provide more security against spywares or bots that should use Internet from your local network.It designed to force users using browsers validated by your company.You can use this feature to provide a specific Proxy for servers which store robots and need different outgoing requests behavior.
Select Web Proxy/ Main Parameters on the left menu.
Select "Filters" tab
Click on the "Browser Filter" icon.
The Browser filter is separated on 2 sections.
The first section browse the User-Agents Database, by checking on a check-box near an user-Agent's string you will add the identification to allow the browser.You can enable/disable the feature by check/uncheck the "Enable the Banned Browsers rule" check-box.A search field help you to find the correct User-Agent string.
The second section display chosen Identifications strings and allow you to delete them.
[Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.091902
If you are under this release you need to upgrade your Artica version. If this version is not released use the How to upgrade Artica to a nightly build ?
This feature works only when you
... [More]
using LDAP Authentification on Squid.
Some robots (eg antivirus) did not support or have troubles with the Squid authentication. This feature list local User-Agents that force squid to disable authentication method.
On the left menu, select Web Proxy / Main Parameters.
Select the Squid Network Parameters tab.
Choose the Authenticate Users icon.
On the Authenticate users box, choose Whitelist: User-Agent tab
Select the main category that list all User-Agent identification string in order to remove the authentication popup.
If your browser User-Agent string is not listed, use the User-Agent Database feature. [Less]
|
Posted
over 14 years
ago
by
David Touzeau
This feature is available with artica version 1.4.091902
If you are under this release you need to upgrade your Artica version.If this version is not released use the How to upgrade Artica to a nightly build ?
This feature allow you to maintain
... [More]
the User-Agent database.
Artica provide a list of 6.000 user-Agent identification strings.
These User-Agents database is used for specific rules using Browser detection.
On the left menu, choose Web Proxy / Main parameters.
Select Squid Network Parameters tab
Click on User-Agents Database.
This section allow you to add/Browse Browser identifications strings.
You have one category (should be the Browser name and main version) you set in the "Add User-Agent" field.
The string is the Browser identification which called "User agent identification" :
Some user agents identify their software as part of the client–server conversation. In HTTP and SIP, the identity is transmitted via the User-Agent request header, as described by RFC 1945. This string is then used by the communications partner to characterize the client and optionally select suitable content or operating parameters for session. For example, this may be used to provide properly formatted content for desktop computers and for smartphones.The user agent string is one of the criteria by which Web crawlers may be excluded from accessing certain parts of a Web site using the Robots Exclusion Standard (robots.txt file).
[Less]
|