Network and Access FAQ's
The term Unified Threat Management refers to a single (virtual) appliance typically used as a firewall that integrates the most common security solutions, including:
- (WiFi) Captive Portal
- Intrusion Detection and Prevention
- Data Leakage Prevention
- Network Address Translation (NAT)
Most UTMs also include a VPN to connect to the network from your home computer or while on the go.
The ThreatControl UTM mini UTM requires that you have at least:
- 500 MHz CPU
- 512 MB RAM
- 4 GB SD card to install reduced system
Minimum specifications for full installation:
- 1 GHz dual-core CPU
- 1 GB RAM
- 40 GB SSD / HDD
- The full system installer requires a minimum of 1 GB RAM
Recommended specifications for full installation:
- 1,5 GHz multi-core CPU
- 4 GB RAM
- 120 GB SSD
ID Control's web filter gives you the option to block dangerous websites, content and applications. For example, you can choose not to let your employees use social media so that they cannot be distracted.
You can filter by the following criteria:
You can set a filter in which you can set, for example, that the use of social media is not allowed during office hours
You can block traffic to and from a particular place when this traffic has a higher classification of risk
- Role of employees
You can create groups of employees that each have different restrictions and permissions
- Active Directory integration
When the connector is installed on Windows, users can be easily adopted
A Virtual Private Network (VPN) is a technology that allows you to establish a secure network connection to a remote network, thereby making you part of that particular network. Consider, for example, your company network: If you have files on a server that you can only access when you are on location, you can use a VPN to set up a connection to that location so that you can still access your files remotely.
Intrusion Alarm Systems (IDS) are systems designed to receive signals that indicate an intrusion into the network or the computer they are monitoring. ThreatControl's intrusion detection system targets incoming network traffic which it analyzes and compares against what is known as “good traffic” and when that does not match, generates a detection alarm.
When this alarm is generated, the connection is automatically disconnected, preventing further intrusion (prevention).
A firewall is a device that secures and monitors incoming and outgoing connections and usually serves as a bridge between the internal network and the Internet.
With our web filtering, you can choose to block specific websites or categories of websites based on certain characteristics such as the class of the website (news site, video site, photo site), geographic location, risk factor of websites (websites that offer illegal software downloads by torrents). use), and much more!
You can use Active Directory for authentication and authorization of (certain parts of the) management console. To do this, you need to add an LDAP server and add a user who can read the user information on the Active Directory side (bind user). You can then use this user to request user information from Active Directory.
With the web filter module, statistics can be displayed about internet use, specific websites that the users go to are not shown, but you get an overview at the macro level of the websites that have been visited (for example, social media).
It is possible to secure the administrator environment with strong authentication. You can use your favorite Authenticator app for this or an RFC 6238 compliant Time-based One Time Password token.
It is possible to implement strong authentication on the VPN access. You have to keep in mind that when you log in to the VPN you add the one-time password to your password. When you set up strong authentication, you can set whether the one-time password should be before or after your normal user password.