Kerio Control Step-by-Step Configuration
This manual describes configuration steps to be taken for implementation of Kerio Control
in a model network. This network includes most elements present in a real-life Kerio
Control network — Internet access from the local network, protection against attacks from
the Internet, access to selected services on the LAN from the Internet, user access control,
automatic configuration of clients on the LAN, user authentication in the Active Directory
domain, user browsing behavior control, etc.