|
Компьютерный форум OSzone.net » Компьютеры + Интернет » Сетевые технологии » Kerio - [решено] Kerio Connect и SSL |
|
|
Kerio - [решено] Kerio Connect и SSL
|
Новый участник Сообщения: 29 |
Помогите разобраться.
Цепочка сертификата следующая: "*.site.ru"->"Sectigo RSA Domain Validation Secure Server CA"->"USERTrust RSA Certification Authority"->"AddTrust External CA Root" Точно так же по этой цепочке был сформирован crt файл. Который был подключен в kerio connect и установлен как основной. Kerio виндовская версия Такой же сертификат подключен на сайте у хостера. Айпи сайта на хостере и айпи mx записи отличаются. при проверке через sslcheckers.com сайта компании - ошибок нет, вся цепочка проходит тестирование. при проверке mx.site.ru, выходит ошибка на "AddTrust External CA Root" sslshopper.com так же на mx.site.ru показывает цепочку не из 4-х, а трех сертификатов. Служба поддержки хостера говорит, что необходимо на стороне mx.site.ru подключить "AddTrust External CA Root". В ОС данный сертификат присутствует, смотрел через консоль сертификатов ОС. В общем по этой причине и не устанавливается SSL соединение. |
|
Отправлено: 16:43, 28-05-2019 |
Забанен Сообщения: 6345
|
Цитата ANDiv1976:
Цитата ANDiv1976:
Цитата ANDiv1976:
|
|||
Отправлено: 11:08, 29-05-2019 | #2 |
Для отключения данного рекламного блока вам необходимо зарегистрироваться или войти с учетной записью социальной сети. Если же вы забыли свой пароль на форуме, то воспользуйтесь данной ссылкой для восстановления пароля. |
Новый участник Сообщения: 29
|
Профиль | Отправить PM | Цитировать Цитата Jula0071:
Цитата Jula0071:
Цитата:
"*.site.ru"->"Sectigo RSA Domain Validation Secure Server CA"->"USERTrust RSA Certification Authority"->"AddTrust External CA Root" Цитата Jula0071:
есть подозрение, что kerio connect может не видеть его. машина на windows server 2016 и на ней поднят kerio connect |
||||
Отправлено: 12:09, 29-05-2019 | #3 |
Забанен Сообщения: 6345
|
Цитата ANDiv1976:
|
|
Отправлено: 13:05, 29-05-2019 | #4 |
Новый участник Сообщения: 29
|
Профиль | Отправить PM | Цитировать |
|
Отправлено: 13:10, 29-05-2019 | #5 |
Забанен Сообщения: 6345
|
Цитата ANDiv1976:
|
|
Отправлено: 16:15, 29-05-2019 | #6 |
Новый участник Сообщения: 29
|
Профиль | Отправить PM | Цитировать Цитата Jula0071:
вот, что происходит вообще. машина на котором установлен Kerio Connect, в нем есть все корневые сертификаты. в самом Kerio установлен наш сертификат. Из вне до этой машины прокинуты 443 и 993 порты, т.е. https и imaps при проверке ссл соединения из вне по 443 порты - все тесты проходят нормально. в логах сервера следующие записи [30/May/2019 11:14:41][3224] {conn} Connection from 192.64.115.26:39080 to 192.168.1.215:443, socket 5908. [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write certificate A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write key exchange A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server done A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client key exchange A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read certificate verify A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read finished A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write session ticket A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write change cipher spec A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write finished A [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake done: SSL negotiation finished successfully [30/May/2019 11:14:41][3224] {conn} Established secure server connection from 192.64.115.26:39080 to 192.168.1.215:443 using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384, id 0000000008775E38 [30/May/2019 11:14:41][3224] {conn} SSL debug: id 0000000001D988A0 SSL3 alert write:warning:close notify [30/May/2019 11:14:41][3224] {conn} Closing socket 5908 [30/May/2019 11:14:42][3224] {conn} Connection from 192.64.115.26:39082 to 192.168.1.215:443, socket 6312. [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write certificate A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write key exchange A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server done A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client key exchange A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read certificate verify A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read finished A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write change cipher spec A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write finished A [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake done: SSL negotiation finished successfully [30/May/2019 11:14:42][3224] {conn} Established secure server connection from 192.64.115.26:39082 to 192.168.1.215:443 using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384, id 0000000008775E38 [30/May/2019 11:14:42][3224] {conn} SSL debug: id 0000000001D988A0 SSL3 alert write:warning:close notify [30/May/2019 11:14:42][3224] {conn} Closing socket 6312 [30/May/2019 11:14:43][3224] {conn} Connection from 192.64.115.26:39084 to 192.168.1.215:443, socket 5912. [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write change cipher spec A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write finished A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read finished A [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake done: SSL negotiation finished successfully [30/May/2019 11:14:43][3224] {conn} Established secure server connection from 192.64.115.26:39084 to 192.168.1.215:443 using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384, id 0000000008775E38 [30/May/2019 11:14:43][3224] {conn} SSL debug: id 0000000001D988A0 SSL3 alert write:warning:close notify [30/May/2019 11:14:43][3224] {conn} Closing socket 5912 [30/May/2019 11:14:44][3224] {conn} Connection from 192.64.115.26:39086 to 192.168.1.215:443, socket 6084. [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write change cipher spec A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write finished A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read finished A [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake done: SSL negotiation finished successfully [30/May/2019 11:14:44][3224] {conn} Established secure server connection from 192.64.115.26:39086 to 192.168.1.215:443 using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384, id 0000000008775E38 [30/May/2019 11:14:44][3224] {conn} SSL debug: id 0000000001D988A0 SSL3 alert write:warning:close notify [30/May/2019 11:14:44][3224] {conn} Closing socket 6084 [30/May/2019 11:14:45][3224] {conn} Connection from 192.64.115.26:39088 to 192.168.1.215:443, socket 5920. [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write change cipher spec A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write finished A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read finished A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read finished A [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL handshake done: SSL negotiation finished successfully [30/May/2019 11:14:45][3224] {conn} Established secure server connection from 192.64.115.26:39088 to 192.168.1.215:443 using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384, id 0000000008775E38 [30/May/2019 11:14:45][3224] {conn} SSL debug: id 0000000001D988A0 SSL3 alert write:warning:close notify [30/May/2019 11:14:45][3224] {conn} Closing socket 5920 при этом на сервере в логах следующее [30/May/2019 11:09:38][1172] {imaps} Task 18 handler BEGIN [30/May/2019 11:09:38][1172] {conn} Connection from 192.64.115.26:40360 to 192.168.1.215:993, socket 6012. [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL handshake started: before/accept initialization [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:before/accept initialization [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv2/v3 read client hello A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 Client requests server by name: mx.<site>.ru [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 Used default server context for connection by name: mx.<site>.ru [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 read client hello A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server hello A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write certificate A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write key exchange A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 write server done A [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:SSLv3 flush data [30/May/2019 11:09:38][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:10:25][1172] {conn} SSL debug: id 0000000001D988A0 SSL_accept:error in SSLv3 read client certificate A [30/May/2019 11:10:25][1172] {conn} Cannot accept SSL connection from 192.64.115.26:40360 to 192.168.1.215:993: SSL code 5, system error: (0) Операция успешно завершена. [30/May/2019 11:10:25][1172] {imaps} Task 18 handler END [30/May/2019 11:10:25][1172] {conn} Closing socket 6012 |
|
Отправлено: 11:17, 30-05-2019 | #7 |
Забанен Сообщения: 6345
|
Попробуйте провести тестовую imap-сессию сами –
openssl s_client -connect mx.site.ru:993 |
Отправлено: 11:22, 30-05-2019 | #8 |
Новый участник Сообщения: 29
|
Профиль | Отправить PM | Цитировать результары тетса. часть информации вырезал. та которая не интересная.
depth=2 C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority verify error:num=20:unable to get local issuer certificate verify return:1 depth=1 C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Ser ver CA verify return:1 depth=0 OU = Domain Control Validated, OU = PositiveSSL Wildcard, CN = *.<site>.ru verify return:1 CONNECTED(0000022C) --- Certificate chain 0 s:OU = Domain Control Validated, OU = PositiveSSL Wildcard, CN = *.<site>.ru i:C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA 1 s:C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA i:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority 2 s:C = US, ST = New Jersey, L = Jersey City, O = The USERTRUST Network, CN = USERTrust RSA Certification Authority i:C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = AddTrust External CA Root --- Server certificate subject=OU = Domain Control Validated, OU = PositiveSSL Wildcard, CN = *.<site>.ru issuer=C = GB, ST = Greater Manchester, L = Salford, O = Sectigo Limited, CN = Sectigo RSA Domain Validation Secure Server CA --- No client certificate CA names sent Peer signing digest: SHA256 Peer signature type: RSA Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 5191 bytes and written 451 bytes Verification error: unable to get local issuer certificate --- New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 1C725759C2B984A4B297B13323CE26F8AAC1692941E51AAA5BDC04D4B05A4EE3 Session-ID-ctx: Master-Key: 6CDC5646D24A389FA0AC58135603E866FC65292A29E0BB79EBE23FCB5C000F8B78E5E0BD11AF9EC7442FCA645494ABC6 PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - a3 e5 36 c0 b0 3e b8 b3-f9 c3 6b 2f a3 b4 e2 9a ..6..>....k/.... 0010 - 81 35 15 7a 4b dd 2e 0f-a0 b8 9d ac 9b 48 df 28 .5.zK........H.( 0020 - 1b a2 29 a1 2e 3b 49 35-5b 30 43 1d 06 84 9e 08 ..)..;I5[0C..... 0030 - 0a 4a 78 54 46 7a f5 12-83 82 f4 3a 41 22 4e 49 .JxTFz.....:A"NI 0040 - dc 28 cb 7b 70 7b cf 35-25 c0 12 f9 da aa 19 cd .(.{p{.5%....... 0050 - 57 f2 cd 6b de d4 6d a5-a0 f7 9e 1b bc 4d e8 da W..k..m......M.. 0060 - 03 5b fc ce ca 0d d6 44-50 53 0b 13 3c 69 de d7 .[.....DPS..<i.. 0070 - d8 50 ba e6 99 ae da d0-ab 4f 30 f1 0b 1c 36 9f .P.......O0...6. 0080 - fc c8 82 14 73 77 5d 23-e9 ee 00 71 54 63 11 ec ....sw]#...qTc.. 0090 - 95 66 b8 4e c2 4a e1 df-54 c1 df 37 c2 4b eb 8e .f.N.J..T..7.K.. 00a0 - d5 11 9a 32 18 3e f0 70-f0 cf d6 ea f2 4b e3 cc ...2.>.p.....K.. 00b0 - f1 6d f2 81 3c 2f fe ca-b5 02 b9 a0 10 8c d6 22 .m..</........." Start Time: 1559206636 Timeout : 7200 (sec) Verify return code: 20 (unable to get local issuer certificate) Extended master secret: no --- * OK Kerio Connect 9.2.9 patch 1 IMAP4rev1 server ready verify error:num=20:unable to get local issuer certificate |
Последний раз редактировалось ANDiv1976, 30-05-2019 в 12:00. Причина: не верный был сертификат при первом тестировании Отправлено: 11:52, 30-05-2019 | #9 |
fascinating rhythm Сообщения: 6672
|
Профиль | Отправить PM | Цитировать В Керио надо лепить конечный и промежуточные сертификаты в один, это было сделано?
Цитата:
|
|
------- Отправлено: 12:41, 30-05-2019 | #10 |
|
![]() |
Участник сейчас на форуме |
![]() |
Участник вне форума |
![]() |
Автор темы |
![]() |
Сообщение прикреплено |
| |||||
Название темы | Автор | Информация о форуме | Ответов | Последнее сообщение | |
Kerio - [решено] Kerio Connect | wusoldier | Сетевые технологии | 9 | 02-11-2016 19:40 | |
Разное - [решено] Kerio connect | Jekael | Другие серверные продукты | 0 | 15-12-2014 18:28 | |
Kerio - Kerio Connect и Control | zaval4ik | Сетевые технологии | 2 | 23-12-2012 19:52 | |
Kerio Connect 7.1.2 | OSZone Software | Новости программного обеспечения | 0 | 25-10-2010 20:30 | |
2008 R2 - Windows Server 2008 R2 Foundation + Kerio Connect + Kerio WinRote Firewall | Nemiroff_84 | Windows Server 2008/2008 R2 | 14 | 08-05-2010 04:40 |
|