Kerio Control is an award-winning UTM firewall designed to protect businesses from a comprehensive range of invasive and crippling corporate network threats.

Comprehensive Network Protection
Intrusion Prevention System
- Signature based packet analysis
- IP blacklisting
- Rule management
- Password guessing protection
- Content filter
ICSA Labs Certified
- Industry accepted standard test criteria
- Corporate level criteria – enforces default security policy immediately after installation
- Secure access remote administration – all changes to security policy are logged
Application layer and network firewall
- Create inbound and outbound traffic policies.
- Protect servers without the need for a DMZ through application-friendly NAT traversal.
- Perform stateful packet and protocol inspection and logging.
- Manage complex networks with VLANs
Sophos antivirus protection
- Filter viruses and worms from incoming and outgoing traffic.
- Simplify deployment with integrated Sophos engine.
Kerio Control Web Filter
- Block access to websites with harmful or inappropriate content
- 141 different categories of web content
- Apply categorization to traffic statistics
Dual VPN server
- IPsec VPN and Kerio VPN
- Ensure availability with VPN tunnel failover
- Securely connect with 3rd party firewalls in branch offices
- iOS and Android mobile device connectivity

User-Based Access Control
Protecting your corporate network from crippling network threats is vital, but it doesn’t guarantee employee productivity. Distractions lurk behind every YouTube link and banner ad. You need a simple and effective tool for minimizing those distractions. Kerio Control gives you precise power to allow, deny, and report usage statistics on specific traffic types for each user and user group.
Manage Users
Policy-based user access
- Integrate with Active and Open Directory for simplified password management.
- Monitor and restrict Internet access based on user login.
Monitor Traffic
Kerio Control Statistics and detailed traffic charts
- View real-time charts of employee activity by traffic type, dscp value, and more.
- View on-demand or automated email reports on individual or group Internet activity, down to the search engine keywords.
- Quickly identify bandwidth bottlenecks and Internet abuse.
Restrict Connections
P2P Eliminator
- Minimize liabilities and prevent data leakage and harmful downloads from peer-to-peer (P2P) networks.
- Utilize multiple technologies including port blocking, payload analysis and behavior analysis to adapt to evolving P2P applications.
Block Applications and Web Content
Kerio Control Web Filter
- Block access to websites with harmful or inappropriate content
- 141 different categories of web content
- Apply categorization to traffic statistics
Application protocol recognition
- Block applications based on protocol, regardless of port

What is QoS (Quality of Service) and Traffic Shaping?
It’s all about priority. Kerio Control’s QoS tools allow you to easily prioritize and monitor network traffic to guarantee high speed for the most important traffic types. With easy-to-use traffic shaping tools, DSCP rules, and load balancing flexibility, Kerio Control provides you with the ability to throttle up speeds for essential communications like VoIP or video conferencing while limiting the bandwidth consumed by your company’s YouTube addicts. But it’s more than a bandwidth manager. With built-in failover redundancy, it’s a full service Internet connection management system with true Quality of Service.
Link-load balancing & connection failover
- Expand network bandwidth by combining multiple Internet connections.
- Increase upload and download speeds.
- Improve the performance of high bandwidth services, such as VoIP or video conferencing.
- Maintain connectivity for critical applications (email, SQL, web)
- Automatically switch to a second Internet connection in event of an Internet connection outage.
Traffic shaping
- Guarantee bandwidth for high-prioritiy traffic types.
- Restrict bandwidth for low-priority traffic types.
- Create rules by user/group, specific protocol, DSCP value, and more.
Monitor bandwidth usage with real-time charts.

Flexible Deployment and Administration
Deploy as software or hardware.
This UTM firewall puts the choice in your hands. Install it on any box as a bare-metal install using the ISO software appliance, or drop it into a virtualized environment one of the ready-to-run virtual appliances. Download and try any of these options free for 30 days. Or skip the software/virtual installation all together and go with either of Kerio Control’s fully loaded solid state hardware appliances.
Web-based firewall administration
Kerio Control’s fully functional web-based administration interface helps you easily configure your UTM firewall settings no matter which deployment option you choose. IP tools enable admins to easily check status of their network. With a fully customizable dashboard GUI, you can monitor system health, traffic charts and more, all from one screen. Quickly and securely access security settings, user management, traffic policies, bandwidth management rules and more, from virtually any desktop web browser – even from your iPad. Automatic backup configuration to Samepage.io ensures valuable configuration does not get lost.
IPv4 and IPv6 support
The transition from IPv4 to IPv6 is inevitable. It won’t happen overnight, but native IPv6 adoption has grown over 500% since 2009 with no signs of slowing down. Organizations need to plan and test thoroughly, and be ready to adopt IPv6 when the ISPs are ready to deliver it. Kerio Control is ready when you are, providing simultaneous IPv4 UTM protection and stateful firewall support of IPv6 with HTTP protocol inspection and IPv6 Stateless Address Autoconfiguration (SLAAC) support.
SNMP protocol support
Kerio Control supports Simple Network Management Protocol so any of the firewall´s essential state information can be accessed over the standardized interface of SNMP protocol. There are plenty of free or commercial SNMP monitoring tools available that allow admins to manage switches, routers, modems and other network elements within a single application.

Kerio Control Box
Kerio Control UTM software in a performance optimized hardware appliance.
Kerio Control Box incorporates specially selected hardware components ideally suited to ensure the performance of Kerio Control software.
HARDWARE MODELS |
KERIO CONTROL BOX 1120 |
KERIO CONTROL BOX 3130 |
Users Included | 5 users | 5 users |
---|---|---|
Software | Kerio Control with Sophos Anti-Virus and Kerio Control Web Filter | |
FEATURES | ||
Chassis | Desktop – fan-less design | 1U Rack Mount Unit |
Dimensions (in/mm) | 9.8 x 7.6 x 1.6 in / 250 x 194 x 40 mm | 16.8 x 10.7 x 1.7 in / 426 x 272 x 44 mm |
Weight (lb/kg) | 4,4 lb / 2.0 kg | 15 lb / 6.8 kg |
Ethernet | 6 x 10/100/1000 RJ-45 | 8 x 10/100/1000 RJ-45 |
Other ports | 2 x USB 2.0, 1 x RJ-45 console port | 2 x USB 2.0, 1 x RJ-45 console port |
Power input | 40W | 200W |
Hard disc drive | 32 GB SSD | 32 GB SSD |
Memory | 4 GB | 4 GB DDR3 1333 SDRAM |
Processor | Intel Atom Dual Core 1.8 Ghz | Intel Core i3-2120 3.3 GHz |
Warranty | Standard 1-year warranty | Standard 1-year warranty |
PERFORMANCE | ||
IPS | 90 Mbit/s | 600 Mbit/s |
Antivirus | 50 Mbit/s | 190 Mbit/s |
UTM | 40 Mbit/s | 190 Mbit/s |
Technical Specifications
Firewall and Router
Simultaneous IPv4 and IPv6 support
802.1Q VLAN support
Connection tracking (SPI)
Connection Limit
Anti-Spoofing
Protocol Inspection
Traffic Rules Configuration Wizard
DHCP server
DNS forwarder
IDS/IPS (Snort based)
Kerio Certified IDS Signatures
IP Blacklists
Three severity levels
Reporting
Historical analysis
Individual, Group, Entire Network Internet usage reports
User based reports
Bandwidth utilization
Security
SNMP monitoring
Kerio Control Web Filter Reports
External Logging to Syslog
Email Alerts
Web site usage
Protocol usage
Browser based activity
User Authentication
Kerberos/Active Directory/Open Directory
NT Domain
Web login
Proxy Server authentication (for Terminal services)
NTLM authentication
Virtual Private Networking
Split tunnel support
Windows / Mac OS / Linux clients
VPN Client can run as service
User based authentication
IPsec support for VPN clients & tunnels
Multiple tunnels (site to site)
NAT and traffic rules
Pre-configured services
User based traffic rules
Time based rules
NAT Mapping
Group Based rules
Dynamic DNS
MAC filtering
Blacklist in IDS/IPS
Rule Exemption Capability
Content Filtering
Time interval restriction
P2P Eliminator
URL Categories
Custom denial page
Administrative alerts
Custom URLs
Forbidden Words
FTP Policy
Proxy server
URL White-listing
Sophos Antivirus Filtering
Load Balancing and QoS
Supports multiple Internet links
Policy based routing
Implicit failover
Bandwidth Management and QoS Configuration
Administration
Web-based administration
Administration Dashboard
Multiple IP addresses on a single network interface
Customizable routing table
Variable Level Administrative Rights
Update Checker Option
Configuration Export/Import
Active Directory Integration
Open Directory Integration
Local User Database
Domain Template for default user configuration
Auto Logout after Timeout
Configurable Time Ranges for groups
Multi-Language Support
English
Chinese (Simplified)
Croatian
Czech
Dutch
French
German
Hungarian
Italian
Japanese
Polish
Portuguese
Russian
Spanish
Swedish
Certifications
ICSA Labs Certified – Corporate Firewall
System Requirements
Software Appliance
CPU: 500 MHz
Memory: 1.5 GB RAM
Hard drive: 8 GB HDD space for OS, product, logs and statistics data
Network interface: 2 Ethernet (10/100/1000 Mbit)
HW: Kerio Control is based on Linux kernel version 3.2. Hardware supported by this kernel is required. For list of supported hardware see e.g. kmuto.jp
VMware Virtual Appliance
VMware hypervisor
VMware Workstation 8.0 or 9.0
VMware Fusion 4.0 or 5.0
VMware Player 4.0 or 5.0
VMware ESX 4.1
VMware ESXi / vSphere Hypervisor 4.1, 5.0 or 5.1
CPU: 2 GHz
Memory: 1.5 GB RAM assigned to the virtual machine
Hard drive: 8 GB assigned HDD space for OS, product, logs and statistics data
Network interface: 2 assigned virtual network adapters
Hyper-V Virtual Appliance
Hyper-V hypervisor
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2
CPU: 2 GHz
Memory: 1.5 GB RAM assigned to the virtual machine
Hard drive: 8 GB assigned HDD space for OS, product, logs and statistics data
Network interface: 2 assigned virtual network adapters
Kerio VPN Client
Windows
Operating systems:
Windows 8.1 (all editions except RT)
Windows 8 (all editions except RT)
Windows 7 (all editions)
Windows XP (all editions)
Windows Vista (all editions)
Windows 2000 Professional
Windows Server 2012 R2 (all editions except Core)
Windows Server 2012 (all editions except Core)
Windows Server 2008 R2 (all editions except Core)
Windows Server 2008 (all editions except Core)
Windows Server 2003 R2 (all editions)
Windows Server 2003 (all editions)
Windows Server 2000 (all editions)
*Latest service pack and up to date security patches are required unless otherwise stated.
OS X
Operating systems:
OS X 10.8 Mountain Lion
OS X 10.9 Mavericks
*Latest updates are a requirement unless otherwise stated.
Linux
(32-bit editions and 64-bit editions with multiarch i386 libraries are supported)
Operating Systems:
Debian 7
Ubuntu 12.04 to 13.10
IPsec VPN client devices
Android 4
Apple iOS 6 and 7
Client Web Browsers
Basic User Login/Logout
All HTTP(S)-compliant web browsers including mobile browsers are supported.
Kerio Control Administration and Kerio Control Statistics
CPU: 1 GHz (2.4GHz dual-core for best performance)
Memory: 1 GB RAM (512 MB on Windows XP with Firefox or Google Chrome)
Browser:
Microsoft Internet Explorer 7 to 11
Firefox 3.5 and newer
Safari 4, 6 and 7
Google Chrome 8 and newer
Kerio Control Administration, mobile devices
Apple iPad (iOS 5 and newer)
Android 4
Some of Kerio clients







