Difference between revisions of "Trutzbox Manual"
Line 1,182: | Line 1,182: | ||
[[#top|-> <u>Table of Contents </u> (of this manual)]] | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
<BR/><BR/> | <BR/><BR/> | ||
+ | == Use of the TrutzBox<sup>®</sup> (-> for users)== | ||
+ | The TrutzBox<sup>® </sup> is delivered by Comidio with security settings suitable for everyday use, so that even inexperienced users can email and surf immediately protected and without a trace. | ||
+ | |||
+ | The following sections describe the functions and options that the inexperienced user can use immediately after setting up TrutzBox. | ||
+ | |||
+ | These include: | ||
+ | * '''TrutzBrowse''': Traceless surfing through modified, incomprehensible browser profile data. | ||
+ | * '''TrutzMail''': End-to-end email service with encrypted content and encrypted metadata. | ||
+ | * '''TrutzContent''': Maximum protection for children and young people by using filter lists to block inappropriate websites. | ||
+ | * '''TrutzRTC''': Real-time communication with '''TrutzChat''' (Messaging) and '''TrutzMeeting'' (Audio and Video Conferencing Service) | ||
+ | * '''TrutzBase''': Use of modern virus protection, firewall and intrusion detection systems | ||
+ | |||
+ | |||
+ | === Traceless Surfing - TrutzBrowse === | ||
+ | Independent of browser (e.g. Mozilla Firefox, Chrome, Internet Explorer, Safari, etc.) and operating system (Microsoft windows, Apple iOS, Linux), the TrutzBox helps to avoid data tracing while surfing. | ||
+ | |||
+ | |||
+ | Use your browser as usual (in the following as an example with windows 7 and Firefox). | ||
+ | |||
+ | ==== TrutzBrowse in standard operation ==== | ||
+ | <br /> | ||
+ | [[File:20160301 Slider mit Thor 2.png|700px|link=]]<br /> | ||
+ | <br /><br /> The TrutzBurg symbol in the upper right corner of the website indicates that TrutzBrowse is activated with the security settings. With the above setting, the TrutzBox (symbol: TrutzBurg) and the Tor network (symbol: onion) are activated. | ||
+ | <br /><br /> | ||
+ | The color of the TrutzBurg shield indicates the setting of the security slider for this URL; green = level 1 = highest security level; red = level 9 = lowest security level. | ||
+ | <br /><br /> | ||
+ | If there are operating elements on the website which are hidden by the TrutzBurg and can therefore no longer be operated, the TrutzBurg can be moved to another corner of the browser window.<br/> | ||
+ | For touch screens, simply touch the symbol for longer than 1s. | ||
+ | <br /><br /> | ||
+ | [[File:20160301 Slider mit Tor & TrutzBrowse 4.png|700px|link=]] | ||
+ | <br/><br/> | ||
+ | |||
+ | After clicking on the TrutzBurg, the security slider and four further functions are available. | ||
+ | |||
+ | The Security-Slider can be set to 10 security levels (Level 1 = highest protection up to Level 9 = lowest protection; Level 10 = for this website the TrutzBox is switched off). | ||
+ | From level 1-9, the user can make the settings himself. If set to level 10 (TrutzBox protection is disabled), only the administrator can reset the level for this website. | ||
+ | |||
+ | <br /> | ||
+ | On delivery, the security slider is set to "highest security level" (level 1, green, far left). | ||
+ | |||
+ | <br /><br /> | ||
+ | If the website shows malfunctions, e.g. because it wants to store a cookie, the user can gradually deactivate individual security and anonymisation measures by dragging the security slider to the right (towards red) in order to restore the website's functionality. | ||
+ | However, the security level should only be reduced for trusted websites. | ||
+ | <br /> | ||
+ | |||
+ | <br /><br /> | ||
+ | |||
+ | |||
+ | [[File:20160301 TrutzBrowse Blockierung & Zugriffe 2.png|700px|link=]] | ||
+ | <br /><br /> | ||
+ | Click on "Details" to see a list of all web accesses accessed from this website. | ||
+ | |||
+ | <br /> | ||
+ | Blocked HTTP calls are marked by a "red crossed out circle“. | ||
+ | The overview also shows the HTTP headers that have not been completely blocked (marked by a "green tick in a green circle"). | ||
+ | This makes it obvious which data was transmitted from the browser to a Web server ("Request" tab) and which data went from a Web server to the browser ("Response" tab). | ||
+ | <br /> | ||
+ | Depending on how the TrutzBox® is configured for the current position of the Security Slider, certain HTTP header data may not be transmitted to the web server at all (blocked headers) or may be changed (replaced headers). | ||
+ | <br /> | ||
+ | On the left, the HTTP calls are listed, which are automatically called in the background - without the user's active intervention - in addition to the web page called up by the user (here: www.krone.at). On the right under "Details" you can see which header information has been blocked or replaced. | ||
+ | <br /> | ||
+ | Click on one of the HTTP calls listed on the left to obtain additional information on this. | ||
+ | <br /> | ||
+ | Set a check mark to " Nur Blockierungen anzeigen ", then only the blockings are listed. | ||
+ | <br /><br /> | ||
+ | |||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /> | ||
+ | |||
+ | ==== TrutzBrowse for experts ==== | ||
+ | The TrutzBox<sup>®</sup> monitors web access and is thus able to prevent unwanted data traffic. The TrutzBox<sup>®</sup> distinguishes whether a device or a user calls up a web page directly or whether a web server - after the deliberately called up web page has been loaded - contacts further web pages and loads them without the user's knowledge and without his consent. | ||
+ | |||
+ | The TrutzBox<sup>®</sup> offers two different basic functions for this purpose: | ||
+ | |||
+ | '''1. TrutzContent:''' | ||
+ | |||
+ | A content filter that prevents a device or user from directly accessing a particular Web page. Examples of unwanted calls: | ||
+ | * A young person wants to load a website with content harmful to young people. | ||
+ | * An Internet device unnoticedly calls up a web page in the background without a user deliberately initiating it. These can be TVs, washing machines or game consoles (if they are connected to the Internet), or even the standard Internet browser of the user's PC, which in turn contacts Mozilla or Google or the server of a plug-in provider independently, for example. | ||
+ | The TrutzBox<sup>®</sup> checks if the contact to such a server is allowed and blocks the connection to this server if necessary. | ||
+ | |||
+ | '''2. TrutzBrowse:''' | ||
+ | |||
+ | A user or an Internet-enabled device has validly accessed a Web page. When loading the page, however, this website contacts other web servers (often commercial data trackers) that may be interested in the user data. TrutzBox<sup>®</sup> monitors calls to other web servers that are indirectly contacted without the user's knowledge during the loading process of the deliberately accessed web page. | ||
+ | |||
+ | In both case 1 (TrutzContent) and case 2 (TrutzBrowse), the TrutzBox<sup>®</sup> compares every web page called up with the web pages (filter lists) known to it. Comidio provides approx. 110 filter lists covering 55 different Internet topics. These filter lists are updated regularly. The TrutzBox<sup>®</sup> Administrator can add own filter lists if required. | ||
+ | |||
+ | |||
+ | |||
+ | '''Approach of the TrutzBox<sup>®</sup>:''' | ||
+ | |||
+ | Wenn ein Internet-Nutzer eine Webseite aufruft, dann prüft die TrutzContent Funktion zunächst, ob der PC und/oder der Nutzer, der diesen Webseitenaufruf angestoßen hat, diese Seite überhaupt aufrufen darf. Soll diese Webseite gemäß den Filterlisten blockiert werden, dann bekommt der Internet-Nutzer im Browser eine Fehlermeldung angezeigt. | ||
+ | |||
+ | If the website can be accessed, the TrutzBox<sup>®</sup> allows the data from the web server to pass to the browser, but it monitors each call to other web servers that the website then contacts automatically. Usually a website loads additional content from many other web servers. For each contact with a web server other than the originally called web server, the TrutzBox<sup>®</sup> checks whether this later called web server is in a filter list group "TrutzBrowse". If it is listed there, the connection to this server will be blocked. | ||
+ | |||
+ | |||
+ | This prevents data tracker calls that are programmed into most websites, and data trackers cannot spy on user behavior. | ||
+ | |||
+ | [[File:TrutzBrowse_90_HTTP_Requ-Resp_ur.png|700x700px|link=]] | ||
+ | |||
+ | Each time a Web server is granted (permitted) access, information is sent from the Web browser to the Web server via the HTTP header (http request header). Without the TrutzBox<sup>®</sup> the browser would then deliver this requested data to the web server. This can be very personal data, such as which other pages you have recently called up, are you currently logged on to Facebook or how exactly does your PC/browser configuration look in order to recognize you on further calls. The HTTP header filter also controls the setting and retrieval of cookies | ||
+ | |||
+ | |||
+ | With its TrutzBrowse function, the TrutzBox<sup>®</sup> is thus able to control the entire HTTP data exchange on the Internet and to block or falsify these HTTP header data as long as they are not absolutely necessary.. | ||
+ | |||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | |||
+ | ===== Handling SSL connections ===== | ||
+ | The proxy can only break (and analyze) an SSL-encrypted connection between a program and a server if the SSL key has been signed by one of the known certificate authorities. Here are two cases where breaking the encrypted connection does not work: | ||
+ | |||
+ | *if an app establishes an encrypted connection to the server, but the key used is a self-generated key and has therefore not been signed by an official certification authority. If the app is a browser, the user is asked if he accepts the server. If the app is not a browser, the user cannot be requested. | ||
+ | |||
+ | * if the client is authenticated. In this case, a key is usually programmed into the client. | ||
+ | |||
+ | |||
+ | In all cases where the SSL connection cannot be broken, the SecSlider is automatically set to L10 and thus the data transfer is no longer analyzed. This ensures that apps still work "without manual intervention". The user (or the TrutzBox administrator) can deactivate this automatic feature in the "Configure filter" menu with the option "If SSL errors occur, automatically deactivate filtering for the selected domain". The data connection is nevertheless displayed in "Status" for checking purposes. Since this automatic activation only becomes effective if the server has not yet been set in the slider table, this automatism can also prevent a single server if the SecSlider is set manually to any value for this server. | ||
+ | |||
+ | |||
+ | |||
+ | |||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | |||
+ | ==== Install proxy switch for activating/deactivating the TrutzBox<sup>®</sup> in the browser ==== | ||
+ | |||
+ | '''Attention: Switching the TrutzBox on and off as a proxy (="Call forwarding") only makes sense if the browser to be used (or the terminal device used, e.g. PC) is operated in "proxy mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).''' | ||
+ | |||
+ | If the browser to be used (or the end-device used, e.g. PC) is operated in "transparent mode", i.e. the PC is connected directly to the TrutzBox (and not directly to the Internet router), I do not need a switch, as the PC is constantly protected via the TrutzBox and switching a proxy on or off makes no difference.. | ||
+ | |||
+ | |||
+ | As is known, it is possible to activate or deactivate the TrutzBox<sup>®</sup> functionality "TrutzBrowse" by activating/deactivating the "PAC" file in the browser settings. | ||
+ | |||
+ | If you want to save yourself these "efforts", you can also install a "proxy switch" (in the form of a downloadable "Add-On" = additional function) in the respective browser and then easily activate or deactivate the TrutzBrowse functionality by simply pressing or selecting it in the browser header line. | ||
+ | |||
+ | The following shows the installations of two proxy switches: | ||
+ | * for Browser "Firefox": Add-On „Proxy Switcher“ and | ||
+ | * [https://comidio.de/wiki/index.php?title=TrutzBox_Handbuch#Proxy_Schalter_f.C3.BCr_Browser_.22Chrome.22 für Browser "Chrome": Add-On „Proxy SwitchyOmega“.] | ||
+ | |||
+ | Of course, other proxy switches can also be implemented and used. | ||
+ | <br /> | ||
+ | ===== Proxy Switch for "Firefox" Browser ===== | ||
+ | ''' Attention: Switching the TrutzBox on and off as a proxy (=" Redirection") only makes sense if the browser to be used (or the end-device used, e.g. PC) is operated in "Proxy Mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).''' | ||
+ | |||
+ | If the„'''FoxyProxy Standard'''“ add-on is implemented, the user can activate and deactivate the "Trutzbox" proxy and thus the TrutzBrowse function by clicking the Proxy Switcher button (orange fox head) in the browser header.: | ||
+ | * to '''switch on''': by clicking on the symbol "crossed out, orange fox head" the FoxyProxy selection window appears; there click on the green line "'''Use proxy Trutzbox for all URLs (ignore patterns)''''" and the proxy is switched on and the symbol "orange fox head" appears. | ||
+ | * to turn off: by clicking on the symbol "orange fox head" the FoxyProxy selection window appears; click on the red line "'''Turn Off All Proxies'''" and the proxy is switched off and the symbol "crossed out, orange fox head" appears. | ||
+ | <br /> | ||
+ | The"'''FoxyProxy Standard'''" add-on is installed as follows: | ||
+ | <br /><br /> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 210.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | *Click on "Extras" (1). | ||
+ | * Click on "Add-ons" (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 220.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | *Ganz nach unten scrollen (1). | ||
+ | * Click on "Sehen Sie sich weitere Add-ons an!" (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 230.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Enter "proxy switch" in the search field (1). | ||
+ | * Click on "FoxyProxy Standard" (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 240.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Click on "+ Zu Firefox hinzufügen" (1). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 250.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Click on "Hinzufügen" (1). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 260.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * The symbol "FoxyProxy switched off" (crossed out logo) is displayed in the symbol line. (1). | ||
+ | * Scroll all the way down (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 270.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * If this view appears, click on "Cancel". (1). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 280.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * To enter the Trutzbox as a proxy: Click on "Add" (1). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 290.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Drop down the selection field (1). | ||
+ | * Click on "HTTP" (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 300.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Enter descriptive name, e.g. "Trutzbox“ (1). | ||
+ | * Enter "trutzbox" as server name (2). | ||
+ | * Enter "8081" as the port address. (3). | ||
+ | * Click on "Save" (4). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 310.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Click on the symbol "FoxyProxy switched off" (crossed out logo) in the symbol line. (1). | ||
+ | * Switch on the Trutzbox as proxy by clicking on "Use proxy Trutzbox for all URLs" (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 320.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | In the symbol line, the "FoxyProxy" symbol (1) indicates that the proxy is switched on. | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 330.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Test input of e.g. "focus.de" (1). | ||
+ | * The Trutzburg (Trutzbox symbol) appears in the upper right corner in the color of the slider setting and shows the number of avoided tracker calls (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 340.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * To switch off the proxy: click on the "FoxyProxy" symbol in the symbol line (1). Then the selection menu opens up. | ||
+ | *In the selection menu, click on "Turn Off All Proxies (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 350.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * In the symbol line, the symbol "FoxyProxy switched off" (crossed out logo) indicates that the proxy is switched off (1). | ||
+ | * Durch Refresh, bzw. erneutes Aufrufen, also z.B. Klick auf (2), wird die Seite neu aufgebaut. | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | [[File:04 01 03 01 360.png|700px|link=]] | ||
+ | <BR/><BR/> | ||
+ | * Since the proxy is now switched off, the Trutzburg (Trutzbox symbol) is not displayed in the upper right corner. (2). | ||
+ | <BR/> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <BR/><BR/> | ||
+ | <!-- ******************************************************************* --> | ||
+ | <!-- nächstes Bild nächstes Bild nächstes Bild nächstes Bild nächstes Bild --> | ||
+ | <!-- ******************************************************************* --> | ||
+ | |||
+ | ===== Proxy Schalter für Browser "Chrome" ===== | ||
+ | '''Caution: Switching the TrutzBox on and off as a proxy (="Call forwarding") only makes sense if the browser to be used (or the terminal device used, e.g. PC) is operated in "proxy mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).''' | ||
+ | |||
+ | If the add-on "Proxy SwitchyOmega" is implemented, the user can press and select a button in the header line of the Chrome Browser in the form of a ring: | ||
+ | * To switch on: click on grey circle. Ochre circle shows: TrutzBrowse is switched on.<br /> | ||
+ | * to switch off: click on the ochre circle. Grey circle shows: TrutzBrowse is switched off.<br /> | ||
+ | <br /><br /> | ||
+ | How to implement the "Proxy SwitchyOmega" add-on: | ||
+ | <br /> | ||
+ | [[File:20151203 Chrome Proxy switch 01-3 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Click on menu selection (1); click on "More Tools" (2). "Click on "Settings" (3). | ||
+ | |||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 04 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Click on „Mehr Erweiterungen herunterladen“ (4). | ||
+ | |||
+ | <br /> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 05-6 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | I Enter "switchy" in the search field (5). Click on „+ HINZUFÜGEN“(6). | ||
+ | |||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 07 V01.png|300px|link=]] | ||
+ | <br /> | ||
+ | Click on „Erweiterung hinzufügen“ (7). | ||
+ | |||
+ | <br /> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 07a V01.png|300px|link=]] | ||
+ | <br /> | ||
+ | The confirmation message that the switch has been added. | ||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 08 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Click on „Skip guide“ (8). | ||
+ | |||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 09-10 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Enter „TrutzBox“ (09). Click on „PAC Profile“ (10). | ||
+ | |||
+ | <br /> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 11-13 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Enter <nowiki>„http://trutzbox/api/proxy/pac“</nowiki> (11). Click on „Download Profile Now“ (12). Click on „Apply changes“ (13). | ||
+ | |||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 14-15 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Click on „Interface“ (14). Click on „Quick Switch“ anklicken (15). | ||
+ | |||
+ | <br /> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 16-18 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | Pull "TrutzBox" upwards (16). " Pull up [Direct]" (17). "Click on "Apply changes (18). | ||
+ | |||
+ | <br /><br /> | ||
+ | [[File:20151203 Chrome Proxy switch 19-20 V01.png|700px|link=]] | ||
+ | <br /> | ||
+ | To switch on: click on the grey circle (19). Ochre circle shows: TrutzBrowse is switched on.<br /> | ||
+ | To turn off: click the ochre circle (20). Grey circle shows: TrutzBrowse is switched off.<br /> | ||
+ | |||
+ | <br /> | ||
+ | [[#top|-> <u>Table of Contents </u> (of this manual)]] | ||
+ | <br /><br /> | ||
+ | |||
+ | === Encrypted Mailing - TrutzMail === | ||
+ | You can use TrutzMail either via | ||
+ | * an immediately usable web-mailer: http://trutzbox/mail (Roundcube), | ||
+ | * your usual e-mail system (e.g. Outlook) or | ||
+ | |||
+ | * both ways. | ||
+ | |||
+ | |||
+ | ==== Using the Web-Mailer==== | ||
+ | The Web mailer is called via https://trutzbox/mail.<br /><br /> | ||
+ | [[File:TrutzMail Web-Mailer 010.png|700px|link=]] | ||
+ | |||
+ | The login is done by entering the user name and password. Both were created by the administrator either at the [[Main Page#Create first TrutzMail address|<u>Setup</u>]] or [Manage Main Page#User|<u>after</u>]].<br /><br /> |
Revision as of 18:37, 24 April 2018
Contents
- 1 The TrutzBox®
- 2 Fast Lane (for TrutzBox® Administrator)
- 3 TrutzBox® Setup (for TrutzBox® Administrator)
- 4 Use of the TrutzBox® (-> for users)
1 The TrutzBox®
Comprehensive background information and technical details that go beyond setting up and using the TrutzBox® are provided by the Comidio Compendium', see https://comidio.de/trutzbox-kompendium/.
1.1 Searching the manual
Comment on "Search":
This manual is structured as a single, large wiki page. Therefore the search function (top right) is not helpful.
To search, please use "Ctrl f", i.e.
- Press and hold the " Strg" or "Ctrl" key
- Press the "f" key simultaneously (for "find")
A search line will appear at the bottom of the browser window.
Enter the search term in the search window on the left, and depending on the search direction, press down arrow or up arrow to jump to the next search result.
If the search text is displayed on a red field, the search term does not appear in the entire text.
(To hide the search line: click on "x" on the right side in the search line.
1.2 Before you turn to the TrutzBox... updates!
Please make sure that the following Updates are done and that you can access your Internet router user interface.
Operating system | Please make sure that your operating system is up to date with the latest update. Only in this way can you be sure that you are optimally protected by the latest updates.In addition, TrutzBox is set up with its own updates to work with the latest operating system updates. If the operating system is not equipped with the latest update, the TrutzBox may not be able to work and thus do not offer optimum protection. |
Browser | Bitte achten Sie darauf, dass jeder Ihr Browser mit dem neusten Update versehen auf dem neusten Stand ist. Only in this way can you be sure that you are optimally protected by the latest updates. In addition, TrutzBox is set up with its own updates to work with the latest browser updates. If the browser is not equipped with the latest update, the TrutzBox may not work and therefore does not offer optimum protection.
|
Internet- Router |
Please make sure that your Internet router is up to date with the latest firmware update. Only in this way can you be sure that you are optimally protected by the latest updates.In addition, settings are made on the Internet router for certain functions of the TrutzBox. In this respect, access to the user interface of the Internet router may be necessary, i.e. the Internet router administrator should know its call and password'. |
-> Table of Contents (of this manual)
1.3 Follow this manual
ATTENTION:
We can only provide support if you first go through Quick Start
|
The TrutzBox® will now make your Internet more secure. It has the effect that you cannot be observed while e-mailing and cannot be spied on while surfing. You leave fewer traces on the Internet and you are less traceable. With the TrutzBox ® you strengthen your privacy.
The TrutzBox® is the security center of your home network. It controls incoming and outgoing Internet traffic. With the TrutzBox® you determine which information the devices connected to the Internet in your home network may disclose.
With the TrutzBox® you can control the Internet connections of your
- Internet devices at home, like computers, tablets, smartphones,
- mobile Internet devices on the move, such as laptops, tablets, smartphones,
- Internet-enabled devices, such as television, house control (e.g. roller shutters, heating), toothbrush, refrigerator, etc.
The TrutzBox® will make the lives of criminal Internet hackers, professional data traders and secret services, which have been observing you while surfing and use your data for their own purposes or commercially, more difficult to a previously unknown extent.
Comidio TrutzBox® offers optimal protection of your privacy through
- automatic end-to-end encryption of your e-mails,
- traceless surfing the Internet,
- maximum protection for your children,
- Firewall and virus protection,
- easy operability,
- cost-effective use,
and thus delivers optimal anonymity.
The TrutzBox® offers plug and play settings and is already optimally configured for most requirements at the factory. Special personal requirements are set via the easy-to-use user interface.
-> Table of Contents (of this manual)
1.4 TrutzBox with or without (own) WLAN?
The WLAN module of the TrutzBox is required if a mobile device is to be controlled via the TrutzBox®. This is then connected directly to the network of the TrutzBox (= its WLAN).
There are basically two ways to connect devices to the TrutzBox®:
Case 1: | PC 1 is connected to the Internet router via WLAN or network cable (dashed yellow).
|
Case 2: | PC 2 is connected to the TrutzBox® via WLAN or network cable (green dashed). All Internet traffic (surfing) automatically passes through the TrutzBox®.This mode is called |
To use the TrutzBrowse and TrutzContent functions (secure surfing for and protection of minors), it can be decided for each device whether it should be left on the network of the Internet router (e.g. Fritzbox) (proxy mode) or connected to the TrutzBox network (transparent mode).
The aim is to connect as many or all devices as possible in the home network directly via the TrutzBox® (i.e. in "transparent mode").
It is advisable to reach this state step by step.
Therefore, you should start "small" at the beginning and gain experience in "proxy mode" by not changing anything on your home network, i.e. the devices initially remain on the Internet router.
You can also intentionally surf in a browser (e.g. Firefox) in proxy mode while surfing in parallel in a second browser (e.g. Chrome) without protection.
For example, you can track the influence the security slider has on unprotected access in various positions (e.g. effects on advertising offers shown).
If you have sufficient experience in proxy mode and would like to gain additional security, you can gradually connect devices in transparent mode by connecting them directly to the TrutzBox® via WLAN (or network cable).
[Since there are occasional exceptions in which website use is not possible even with SliderLevel 10 (TrutzBox set to "pull-through"), it is recommended to operate a browser-based client device in proxy mode, so that the TrutzBox can be switched off as a proxy in the browser of this client device if necessary. This allows the browser of this device to access the Internet directly via the Internet router (bypassing the TrutzBox). After the exception has been made, the TrutzBox should be activated again in the browser as a proxy].
This means that the TrutzBox can also be operated safely without a WLAN module and the WLAN module can be added later if required.
The other TrutzBox functions, such as Webmeeting, Mail, Chat and Remote Access, work in both modes unaffected by this.
To change from transparent mode to proxy mode or vice versa, please proceed as follows:
- Shut down PC or device (= switch off by software).
- If previously connected to TrutzBox, now connect to the Internet router or vice versa.
- Switch on/restart the device (now the device automatically receives an IP address valid in this network area).
-> Table of Contents (of this manual)
1.5 Phases, users and administrator
This manual describes two roles in these words:
”User”
Anyone using TrutzBox functions is referred to in this manual as "'User'".
Administrator
A person who uses certain administrative functions of the TrutzBox that are not available to every user is described in this manual "Administrator".
With private use of the TrutzBox the administrator is usually an adult, in families e.g. a legal guardian.
For commercial use of the TrutzBox, the administrator is usually an internal or external IT administrator.
In general, the following phases can be distinguished when using the TrutzBox:
Phase | activities | |
start up (ca. 15 Min.) |
Unpacking, checking, connecting and switching on the TrutzBox | Administrator |
set up (ca. 30 Min. plus updates) |
Test Internet connection, import certificate, set admin password, register TrutzBox, create TrutzMail address, set WLAN name and password | Administrator |
Usage (ongoing) |
Surfing, Mailing, Webmeets | User |
Administrieren (as needed) |
Manage users, create PGP partners, manage TrutzBrowse filters, set up remote access (VPN), import certificates on end devices, reactivate SecuritySlider, advise and support users | Administrator |
-> Table of Contents (of this manual)
1.6 How do I set up my TrutzBox?
Depending on the administrator's IT skills, the following sections of this manual may be helpful:
Administrator is ... | recommended chapter |
IT-Expert | chapter: 2.1 (Weiter zu 2.1) |
IT- knowledgable | chapter: 2.2 (Weiter zu 2.2) |
interested layperson | chapter: 3 (Weiter zu 3) |
-> Table of Contents (of this manual)
Fast Lane *** Fast Lane *** Fast Lane *** Fast Lane *** Fast Lane *** Fast Lane *** Fast Lane *** Fast Lane
2 Fast Lane (for TrutzBox® Administrator)
Chapter 2 contains information for technically affine users:
- für IT-Experts, following, in chapter 2.1 (Weiter zu 2.1)
- for IT-knowledgable in chapter 2.2 (Weiter zu 2.2)
Interested laymen will find detailed information in chapter 3 (Weiter zu 3)
2.1 Installation Instructions (Overview for Experts)
Folgende Tabelle kann auch als PDF heruntergeladen werden: Download
TrutzBox Function | Sub-Function | Action |
Wiring the Hardware | Connect the TrutzBox LAN-Ext socket to the Internet router using the LAN cable supplied. Connect TrutzBox to the power supply with the power supply unit. (Details) | |
Carry out setup | "http://trutzbox" enter in browser (Details); Confirm certificate error |
|
Install TrutzBox certificate on any device & on any browser | Install TrutzBox certificate on any device & on any browser (Details) |
little-tracking surfing | transparent mode (every software on the device is controlled) | Connect the Device to the TrutzBox network (via WLAN or LAN) (Details) |
Proxy mode (only browser accesses are controlled) | Keep Device on the network of the Internet router and Automatic proxy configuration "http://trutzbox/api/proxy/pac" configure in the browser (Details) |
encrypted mails |
secure mail exchange with other TrutzBoxes (TrutzMail) | set up an additional email address in the email program: incoming mail server (IMAP): trutzbox, port: 143, TLS; outgoing email server (SMTP): trutzbox, port: 587, TLS (Details) |
Exchange PGP-encrypted emails with "normal mail accounts“ | configure external SMTP server on the TrutzBox and enter public keys of the mail recipients (Details) |
Access restrictions for young people or IoT |
transparent Mode (any software on the device) | If necessary, select another user group on the TrutzBox or define your own access restrictions (Details) |
secure video conferencing | Set up a new video conference room | Think up a room name and call it up in your browser (preferably Chrome) https://trutzbox:9082/raumname and log in with your mail account (Details) |
Subscribers are connected to the internal network | call up in your browser (preferably Chrome): https://trutzbox:9082/raumname | |
Participants want to connect via the Internet | Set up port sharing for TrutzRTC on the Internet router: Port 9083 UDP and port 9082 TCP. In the browser (preferably Chrome) launch https://ip-addr:9082/raumname. ip-addr is the external IP address or (if configured) DynDNS domain of the Internet router. |
secure Chat/ Messaging |
install xmpp-client: Apple Macintosh Adium (https://adium.im) |
Remote access to TrutzBox (mobile access) | Allow VPN access on the Internet router | Setting up port sharing for VPN on the Internet router: Port 1194 UDP |
DynDNS - Get domain and activate remote access on the TrutzBox | If not yet available: Get DynDNS domain for the Internet connection from a service provider. Z.B. spdyn.de:
Activate DynDNS in the Internet router. |
|
VPN client setup on the mobile device | Activate remote access on the TrutzBox for the user. User will then receive a TrutzMail with an OpenVPN configuration file. This must then be imported into the OpenVPN software on the mobile device. (Details) | |
Use remote access - establish connection | Connect the device to the Internet and activate connection setup in the VPN client. (Details) |
This table can also be downloaded as PDF: Download
-> Table of Contents (of this manual)
2.2 TrutzBox Setup-Guide
The following quick introduction corresponds to the two-sided "TrutzBox Setup Guide", which is included with the TrutzBox delivery.
For better navigation, the Quick Start wiki contains green headings.
Steps A - D must be performed one after the other.
Safety instructions:
- Use only the supplied power supply and network cable. Connect only compatible accessories.
- The TrutzBox is not splash-proof. Do not place them in bathrooms or shower rooms.
- Protect the TrutzBox from shocks, dust and chemicals.
- The TrutzBox must not be exposed to strong temperature variations and may only be operated indoors. Protect the TrutzBox from overheating and direct sunlight; do not place the TrutzBox near stoves, radiators or similar heat sources.
Disposal:
It is prohibited to dispose of the TrutzBox (including the entire scope of delivery) with household waste. If the adjacent symbol of a crossed-out waste bin is attached to a product, this product is subject to European Directive 2002/96/EC. Please dispose of the device including the scope of delivery in accordance with this directive. If you have any questions regarding disposal, please contact the local authority responsible for disposal. The TrutzBox contains a built-in battery. You are legally obliged to dispose of the (used) battery only via specialist electrical retailers or recycling collection points (do not dispose of it with household waste!).
2.2.1 Check scope of delivery (Step A)
... and if applicable the WLAN antenna installation kit.
-> Details zu Lieferumfang überprüfen
-> Table of Contents (of this manual)
2.2.2 Connecting TrutzBox (Step B)
- Connect the network cable to the Internet router (1) and "Ext" on the TrutzBox (2).
- Connect the power supply unit to the "12V DC" connection of the TrutzBox (3) and then to the power supply (4).
- After approx. 1 minute the TrutzBox beeps and after approx. 3-4 minutes the left-hand LED on the front of the TrutzBox starts to flash "and after another approx. 5-6 minutes (after a total of approx. 9-10 minutes) the TrutzBox is ready for operation.
If required, the WLAN built-in antenna available in the Comidio Shop (www.comidio.de/shop) can be retrofitted at any time.
-> Details zu TrutzBox anschließen
-> Table of Contents (of this manual)
2.2.3 Setting up TrutzBox (Step C)
In the Internet browser address bar of a computer connected to your home network, type: http://trutzbox
Now 9 screen pages follow one after the other for the initial setup of your TrutzBox:
- Page 1: Welcome : TrutzBox self-tests whether it has access to the Internet,
- Page 2: License terms : accept the license agreement,
- Page 3: Import Root-Zertificate
Schritt 1: | Download Root-Zertificate |
Step 2: using Firefox: |
2a. Certificate is automatically loaded into Firefox certificate management 2b. Confirm the first box of the certificate trust query |
Step 2: using IE* / Chrome |
2a. Root certificate is located in the download directory 2b. Importing the root certificate into Windows certificate management |
Step 3 | Start test |
- Page 4: Set admin password : Setting the administrator password for your TrutzBox,
- Page 5: Register TrutzBox : Enter TrutzLegitimierung (TrutzKennung und TrutzSchlüssel),
- Page 6: Create TrutzMail Adresse: Create name, e-mail address and password,
- Page 7: WLAN settings : Setting the WLAN name (SSID) and the WLAN password (can be done later in case of later WLAN setup),
- Page 8: source packages : Determine memory release or storage of source packages, and
- Page 9: recap : Presentation of the entries, and if OK: "Start initial setup".
*IE = Internet Explorer
At the end of setup, updates are downloaded to the TrutzBox.
This process can take more than 60 minutes. Please do not switch off the TrutzBox or start any other process during this time. As soon as the "Complete Setup" window appears, all updates are complete. Press on „Fertig“.
Then the TrutzBox user interface appears, which can be opened with the just defined admin password (4.). Re-call the TrutzBox user interface with http://trutzbox.
-> Details zu TrutzBox einrichten
-> Table of Contents (of this manual)
2.2.4 Enter TrutzBox as a proxy in your browser (Step D)
In order for the PC to surf the Internet securely via the TrutzBox (and not unprotected via the Internet router), the TrutzBox must be entered as a proxy (= deputy, quasi "bouncer" to protect your devices) in each browser of the connected devices.
-> Details zu TrutzBox als Proxy in Browser eintragen
To enable and disable the TrutzBox as a proxy in the browser - especially in the initial phase -, the use of a proxy switch is recommended.
-> Details zu Verwendung eines Proxy-Schalters
This completes the setup.
For more information on using the TrutzBox see chapter 4.
-> Details zu Nutzung der TrutzBox
2.2.5 Import TrutzBox Certificate
For other devices that wish to use TrutzBox via browser, mail or XMPP chat: To identify the TrutzBox as a secure device, the root certificate generated during setup must be imported into every Firefox browser and operating system used on the device (PC, tablet, smartphone).
-> Details zu TrutzBox Zertifikat importieren
*** END of Fast Lane *** END of Fast Lane *** END of Fast Lane *** END of Fast Lane *** END of Fast Lane *** END of Fast Lane ***
-> Table of Contents (of this manual)
3 TrutzBox® Setup (for TrutzBox® Administrator)
This chapter includes
- Start-up of the TrutzBox®
- Set-up of the TrutzBox®
The aim is to connect as many or all devices as possible in the home network via the TrutzBox®.
However, this only happens after setting up according to the manual.
After the TrutzBox® is connected to the Internet router, start "small" by entering the TrutzBox® as "Proxy" (= deputy, quasi "doorman") in a browser of a connected PC and thus controlling the TrutzBox® the incoming and outgoing Internet traffic of this connected PC.
After completing this quick start, the user can
- surf without tracks (at least with few tracks) with presets,
- encrypted email via web access and
- use the proposed filter lists for child and youth protection.
Once this state has been reached, further devices should be connected to the TrutzBox® in a controlled manner.
Devices for which a proxy can be set up
Devices for which a proxy can be configured (e.g. browser on PC or, if available, on TV set) should first be connected to the Internet router via WLAN (or network cable) and the TrutzBox® should be entered as the proxy.
Once you have gained experience in this way, you can connect the devices directly to the TrutzBox® via WLAN (or network cable).
Devices for which no proxy can be set up
Devices for which no proxy can be set up (e.g. refrigerator or toothbrush) should be connected to the TrutzBox®; then the communication characteristics can be monitored and, if necessary and controlled, external communication can be permitted.
-> Table of Contents (of this manual)
3.1 Start-up of the TrutzBox®
ATTENTION:
We can only provide support if you first go through Quick Start
|
3.1.1 Before connecting the TrutzBox®
Before you connect the TrutzBox®
- check the scope of delivery,
- check the prerequisites for start-up,
- read "Safety and Handling" and
- familiarize yourself with connections and displays..
Please only put your TrutzBox® into operation afterwards.
3.1.1.1 Scope of delivery
Please check the completeness of the scope of delivery:
3.1.1.2 Prerequisite for start-up
For the start-up of the TrutzBox® the following requirements must be fulfilled:
- Computer or Internet-enabled device with access to the Internet router,
- the up-to-date web browser (e.g. Internet Explorer, Google Chrome, Mozilla Firefox) and
- Internet connection.
-> Table of Contents (of this manual)
3.1.1.3 Safety and Operation
Before installing and using the TrutzBox® read the following safety and operating instructions.
Safety instructions:
Before connecting the TrutzBox® ®, please take note of the following safety instructions to protect yourself and the TrutzBox® from damage.
- Use only the supplied AC adapter and network cable. Incidentally, only connect compatible accessories.
- The TrutzBox® is not splash-proof. Therefore, only place them in dry rooms; not in bathrooms or shower rooms.
- Protect the TrutzBox® against shocks, dust and chemicals.
- The TrutzBox® must not be exposed to strong temperature changes and may only be operated indoors.
- Protect the TrutzBox® from overheating and avoid direct sunlight on the TrutzBox® as well as the proximity of the TrutzBox® to ovens, radiators or similar heat sources.
- Avoid overloading sockets, extension cords and socket strips. Overloaded power supplies present a fire and electric shock risk.
- Do not place the TrutzBox® on carpet or upholstered furniture.
- Do not cover the TrutzBox® .
- Do not place the TrutzBox® on heat-sensitive surfaces, as the underside of the unit may heat up during normal operation.
- Do not install the TrutzBox® during thunderstorms.
- Disconnect the TrutzBox® from the power supply and the Internet connection during thunderstorms.
- Do not allow liquids to penetrate inside the TrutzBox®, as electric shocks or short circuits may result.
- Do not open the housing of the TrutzBox® . Improper opening and improper repairs can pose a risk to users of the device.
Operation
- If you want to establish wireless connections between the TrutzBox® and computers, place the TrutzBox® in a central location.
- Ensure sufficient distance to sources of interference such as microwave ovens, DECT telephones or electrical appliances with large metal housings.
Disposal:
It is prohibited to dispose of the TrutzBox (including the entire scope of delivery) with household waste. If the adjacent symbol of a crossed-out waste bin is attached to a product, this product is subject to European Directive 2002/96/EC. Please dispose of the device including the scope of delivery in accordance with this directive. If you have any questions regarding disposal, please contact the local authority responsible for disposal. The TrutzBox contains a built-in battery. You are legally obliged to dispose of the (used) battery only via specialist electrical retailers or recycling collection points (do not dispose of it with household waste!)
-> Table of Contents (of this manual)
3.1.1.4 Interfacing and LEDs
Connections (rear panel) The following connections are located on the rear panel:
COM-1 | V24 connection (not required) |
LAN-Ext | Network connection, insecure network: Internet router |
LAN-Int1 | Network connection, secure network: network-compatible device, e.g. PC or switch |
LAN-Int2 | Network connection, secure network: network-compatible device, e.g. PC or switch |
USB | two USB ports (e.g. for connecting a WLAN adapter via USB cable) |
12 V DC | Power supply unit connection via included power supply unit |
-> Table of Contents (of this manual)
LEDs (front panel) At the front panel there are three LEDs:
left LED: Heartbeat |
off permanent on Rhythmic blinking |
TrutzBox® is switched off TrutzBox® is booting TrutzBox® in operation |
LED Mitte: TrutzMail |
Lights Up | TrutzMail is sending or receiving an e-mail |
right LED: TrutzBrowse, TrutzContent |
Lights Up | Short flash as soon as tracker / website are blocked |
-> Table of Contents (of this manual)
3.1.2 Connecting the TrutzBox®
Before initial operation of the TrutzBox® observe the instructions in the section "Safety and Operation“.
Connect the TrutzBox® as follows:
- Connect the RJ45 network cable to a network socket of the Internet router (1) and to the "Ext" connector on the back of the TrutzBox® (2).
- Connect the power supply unit to the "12V DC" connection of the TrutzBox® (3) and to the 100-240V power supply (4). Only use the supplied power supply unit for connection to the power supply.
After approx. 1 minute the TrutzBox beeps and after approx. 3-4 minutes the left LED on its front side starts to flash, and after another approx. 5-6 minutes (after a total of approx. 9-10 minutes) the TrutzBox is ready for operation.
If required, the WLAN options available in the Comidio Shop (www.comidio.de/shop) can be retrofitted at any time.
Important:
|
-> Table of Contents (of this manual)
3.2 TrutzBox® Set up
To set up your Trutzbox, you can do this with any browser. The process is a little different, depending on which browser is used. There are two groups:
- Mozila Firefox (with own certificate management) and
- Internet Explorer or Google Chrome (with shared certificate management in the operating system).
The following example shows the processes for both types; starting with Mozilla Firefox.
After connecting the TrutzBox® according to chapter "Connecting the TrutzBox®" it starts up. This can take 9-10 minutes.
Then connect your computer's browser to the TrutzBox® by entering"http://trutzbox" in the browser's address bar..
It is recommended to open 2 browser windows, so that you can work e.g. in the left window on the TrutzBox® user interface and directly next to it, e.g. in the right window, you can access the manual or the browser administration.
This is shown below:
- Part I is the same for all browser types,
- Part II distinguishes between Firefox (2a) and "Non-Firefox" (2b) and
- Part III is identical again.
3.2.1 Part I: Preparation of the setup
After you open a browser window, enter <Ctrl><N> on the keyboard:
Hold down key <Ctrl> (2a) and additionally press key "n" (2b).
This opens a second browser window.
-> Table of Contents (of this manual)
The second window (1) is now above the first window. Click with the left mouse button on the upper frame of the browser window and move the second window (with pressed left mouse button) to the right, next to the first window.
-> Table of Contents (of this manual)
Open the wiki manual in the right window (1) (www.comidio.de/wiki) and go to chapter 3.2.
Enter in the left window (2) "http://trutzbox".
If you are using Firefox, please read on...
If you are not using Firefox, please continue reading at "Part IIb: Setup with Non-Firefox"
3.2.2 Part IIa: Setup with Firefox
-> Table of Contents (of this manual)
The TrutzBox® checks the Internet connection (1) ...
-> Table of Contents (of this manual)
... and confirms the connection with a green tick (1).
Click on "Next" (2).
-> Table of Contents (of this manual)
Here you can read the license conditions.
If you agree, click on "Accept license terms" (1).
-> Table of Contents (of this manual)
Since we are currently using Firefox, click on "here" in step 1 of (a)(1)
-> Table of Contents (of this manual)
In the trust query, set the two upper check marks (1)+(2).
Click on "Weiter" (3).
-> Table of Contents (of this manual)
Click on "Test starten" (1) ...
-> Table of Contents (of this manual)
... and wait for the test result (1).
Click on "Weiter" (2).
Continue to "Part III: Completion of the setup".
3.2.3 Part IIb: Setup with Non-Firefox
The main difference to "Setup with Firefox" is that with non-Firefox the root certificate
- is downloaded into the download directory of the PC and
- is imported from the download directory into the certificate management of the PC..
Then, the root certificate is automatically available to both Internet Explorer and Google Chrome.
Then connect your computer's browser to the TrutzBox® by entering"http://trutzbox" in the browser's address bar (1).
-> Table of Contents (of this manual)
The TrutzBox® checks the internet connection (1) ...
-> Table of Contents (of this manual)
... and confirms the connection with a green checkmark (1).
Click on "Weiter" (2).
-> Table of Contents (of this manual)
Here you can read the license conditions.
If you agree, click on "Accept license terms" (1).
-> Table of Contents (of this manual)
Since you are currently using Chrome (i.e. non-Firefox), click on "here" in step 1 (b) (1).
This downloaded the root certificate under the name "trutzbox.cer" into the download area.
Open a second tab window (2) to import the root certificate.
-> Table of Contents (of this manual)
Open "Customize and configure Google Chrome" (1) and click on " Settings " (2).
-> Table of Contents (of this manual)
Scroll all the way down (1) and click on "Show advanced settings" (2).
-> Table of Contents (of this manual)
Scroll down (1) and click on "Manage Certificates" (2) and then on "Trusted Root Certification Authorities" (3).
-> Table of Contents (of this manual)
Click on "Import" (1).
-> Table of Contents (of this manual)
Click on " Weiter " (1).
-> Table of Contents (of this manual)
Click on " Durchsuchen " (1).
-> Table of Contents (of this manual)
Click on "trutzbox.cer" (1) and then on "Open" (2).
-> Table of Contents (of this manual)
Click on " Weiter " (1).
-> Table of Contents (of this manual)
Check that "Trusted Root Certification Authorities" is checked (1) and click "Next" (2).
-> Table of Contents (of this manual)
Click on " Fertigstellen " (1).
-> Table of Contents (of this manual)
Click on " Ja " (1).
-> Table of Contents (of this manual)
Click on " OK " (1).
-> Table of Contents (of this manual)
The TrutzBox root certificate (1) appears in the list; click on "Close" (2).
-> Table of Contents (of this manual)
To continue the TrutzBox setup, switch back to the first tab window (1).
-> Table of Contents (of this manual)
Click on " Test starten " (1). ...
-> Table of Contents (of this manual)
... and wait for the test result (1).
Click on " Weiter " (2).
-> Table of Contents (of this manual)
3.2.4 Part III: Completion of the setup
Determine, enter (1) and repeat administrator password (2).
All characters according to ASCII table https://en.wikipedia.org/wiki/ASCII#ASCII_printable_code_chart are allowed.
This password is required to open the TrutzBox® user interface as administrator..
Click on " Weiter " (3).
-> Table of Contents (of this manual)
Take the data from the TrutzLegitimierung (coloured paper) and enter the TrutzKennung (1) and TrutzSchlüssel (2).
Click on " Weiter " (3).
-> Table of Contents (of this manual)
Self-chose and enter TrutzMail details:
- Name (1),
- TrutzMail address (2): please enter only the name of the user, "@comidio.email" will be added automatically.
- Set, enter (3) and repeat (4) the TrutzMail password. All characters according to ASCII table https://en.wikipedia.org/wiki/ASCII#ASCII_printable_code_chart are allowed.
These are your TrutzMail account data, which you need to use your webmail or to configure your e-mail program.
Click on " Weiter " (5).
-> Table of Contents (of this manual)
Enter a WLAN name of your choice [SSID = Service Set IDentifier = Name of wireless network)] (1) and WLAN password (2).
All characters according to ASCII table https://en.wikipedia.org/wiki/ASCII#ASCII_printable_code_chart are allowed.
Note: choose a pseudonym as name (SSID), no clear name, as the wireless network connection name is visible with a range of up to approx. 50 m.
With this TrutzBox® SSID you connect the WLAN devices of the home network.
Click on " Weiter " (4).
-> Table of Contents (of this manual)
If the check mark remains set (1), about half a gigabyte of memory space is freed up.
Click on " Weiter " (2).
-> Table of Contents (of this manual)
Check your details; for corrections click on „Zurück“.
Then click on „Ersteinrichtung starten“.
Please note that this process can take several minutes.
-> Table of Contents (of this manual)
The TrutzBox® checks if there are current updates; if yes, they will be downloaded now (1).
Please note that this process can take up to 30 minutes.
-> Table of Contents (of this manual)
The updates are completely downloaded when the window " Abschluss der Einrichtung " appears.
Click directly - without clicking on steps 1 & 2 - on the "Fertig" button to end the setup process.
(Step 1 follows only after the installation; Step 2 can now be saved due to the further development of the TrutzBox).
-> Table of Contents (of this manual)
Then the TrutzBox user interface appears automatically and shows you:
Now the quick start is complete.
-> Table of Contents (of this manual)
After downloading, your TrutzBox® is ready for operation.
The next step is to
- set up the TrutzBox as a proxy; see Chapter entitled "Connecting the device to the TrutzBox" and
- import the root certificate (if you want to use other devices with a browser in addition to your PC); see the "Certificates" chapter.
On every other device with a browser that uses the TrutzBox®, the certificate
- if browser is Firefox: must be imported into the Firefox certificate management,
- if browser is not Firefox: must be imported into the certificate management of the other browser, and thus automatically into the certificate management of the operating system. (see chapter "Certificates").
To use TrutzMail or TrutzChat, the TrutzBox certificate must also have been imported into the certificate management of the operating system.
The TrutzBox certificate only needs to be imported once into the certificate management of the operating system and is then available there for
- all non-Firefox browsers and
- TrutzMail and
- TrutzChat.
If you do not import the certificate into the browsers and notify the mail system, you will be prompted for security confirmation each time you open it.
Therefore it is recommended to download the TrutzBox® certificate from the TrutzBox® to the device with browser and import it into the browser afterwards.
-> Table of Contents (of this manual)
3.2.5 Disable IPv6
The TrutzBox works exclusively with IPv4 addresses.
If your TrutzBox is not connected to the router or your terminal device (e.g. PC) cannot reach the TrutzBox, one reason for this may be that the router assigns IPv6 addresses. To avoid this, it should be ensured that the router assigns IPv4 addresses.
To disable IPv6 addresses, proceed as follows:
In the FRITZ!box user interface, call up Internet.
-> Table of Contents (of this manual)
Click on " Zugangsdaten " (2).
-> Table of Contents (of this manual)
Click on " IPv6" (1).
The box under "IPv6 support" should not be checked (2).
-> Table of Contents (of this manual)
If a check mark is set, deactivate this option.
-> Table of Contents (of this manual)
3.3 WLAN Installation Guide
3.3.1 Replacement installation of WLAN-Plus (e.g. after WLAN basic)
If you have already used another WLAN hardware (e.g. WLAN-Basic EDIMAX stick) with the TrutzBox, please proceed according to the following "WLAN Installation Info" BEFORE installing the built-in antenna.
Call Webmin
- via TrutzBox user interface: System -> Advanced settings, or
- via call: https://trutzbox:10000.
In Webmin:
- System (1)
- -> Kommandozeile (2)
- enter there in the field to the right „Führe Befehl aus:“ (3): rm /etc/udev/rules.d/70-persistent-net.rules
- and click on "Führe Befehl aus" (4).
-> Table of Contents (of this manual)
Shutdown TrutzBox
- using Webmin: System (1)
- -> System-Start und –Stop (2),
- scroll down (3) and
- click on „System herunterfahren“ (4).
When LEDs are off, remove TrutzBox from the power supply, open the housing and install the built-in antenna (see the following WLAN installation instructions).
-> Table of Contents (of this manual)
3.3.2 First installation of WLAN-Plus
- Attention, the WLAN card can be damaged by electrical (discharge) charging. Before opening the WLAN card bag and touching the WLAN card, be sure to touch an earthed metal part (e.g. radiator) or at least the TrutzBox housing with both hands (to drain off possible charging).
- Check scope of delivery: WLAN card (1), two antenna cables (2) and two antennas (3).
- If necessary, shut down the TrutzBox and disconnect all cable connections, including the power supply.
- Open the TrutzBox by loosening the 4 screws and remove the housing cover. (4).
- Check that the cables of the supplied WLAN card are still firmly plugged onto the WLAN card (5).
-> Table of Contents (of this manual)
- Carefully insert the card at an angle into the middle terminal strip (6) seen from behind and carefully press the card downwards until it clicks into place on both sides (7).
- Remove the two rubber caps inserted into the back of the TrutzBox (8).
-> Table of Contents (of this manual)
- Insert the two antenna cables into the two outer cut-out holes on the TrutzBox rear side (from the inside) (9) - Attention: the thread and hole are flattened at the top - and (from the outside) screw on (10) with washer and nut (8 mm wrench).
-> Table of Contents (of this manual)
- Screw on the two antennas (11).
- In the left position (seen from behind) the SSD is located (12).
- Replace the housing cover on the TrutzBox and tighten it with the 4 screws..
- Connect TrutzBox to router and power supply - so that it boots
( wait approx. 10 minutes).
If a WLAN has not already been set up in the TrutzBox interface, set the SSID (name of the TrutzBox WLAN network) and the access password in the TrutzBox interface under Network -> WLAN.
-> Table of Contents (of this manual)
3.4 SSD Installation Guide
- Attention, the WLAN card can be damaged by electrical (discharge) charging. Before opening the WLAN card bag and touching the WLAN card, be sure to touch an earthed metal part (e.g. radiator) or at least the TrutzBox housing with both hands (to drain off possible charging).
- Shut down the TrutzBox and disconnect all cables, including the power supply.
Loosen the 4 screws (1) and remove the housing cover (2).
-> Table of Contents (of this manual)
As necessary, remove the SD card (3) or the SSD card/plate (4).
-> Table of Contents (of this manual)
Remove SD card: Grab SD card (5) …
-> Table of Contents (of this manual)
… and carefully pull out the SD card (6).
-> Table of Contents (of this manual)
Remove the SSD card: Carefully push both locking springs (7) and (8) backwards, towards the back of the housing …
-> Table of Contents (of this manual)
… and carefully lift the detached SSD card upwards (9).
-> Table of Contents (of this manual)
Carefully pull out the old SSD card (10) at an angle upwards..
-> Table of Contents (of this manual)
Carefully insert the new SSD card (11) at an angle to the bottom....
-> Table of Contents (of this manual)
... and insert the SSD card (12) into the holder with gentle pressure.
-> Table of Contents (of this manual)
Press SSD card on "free side" with feeling down (13)...
-> Table of Contents (of this manual)
... until SSD card audibly engages in both retaining springs (14).
-> Table of Contents (of this manual)
Slide the housing back on (15) and screw in the 4 screws again (16).
Good luck with your new SSD!
-> Table of Contents (of this manual)
4 Use of the TrutzBox® (-> for users)
The TrutzBox® is delivered by Comidio with security settings suitable for everyday use, so that even inexperienced users can email and surf immediately protected and without a trace.
The following sections describe the functions and options that the inexperienced user can use immediately after setting up TrutzBox.
These include:
- TrutzBrowse: Traceless surfing through modified, incomprehensible browser profile data.
- TrutzMail: End-to-end email service with encrypted content and encrypted metadata.
- TrutzContent: Maximum protection for children and young people by using filter lists to block inappropriate websites.
- TrutzRTC': Real-time communication with TrutzChat (Messaging) and TrutzMeeting (Audio and Video Conferencing Service)
- TrutzBase: Use of modern virus protection, firewall and intrusion detection systems
4.1 Traceless Surfing - TrutzBrowse
Independent of browser (e.g. Mozilla Firefox, Chrome, Internet Explorer, Safari, etc.) and operating system (Microsoft windows, Apple iOS, Linux), the TrutzBox helps to avoid data tracing while surfing.
Use your browser as usual (in the following as an example with windows 7 and Firefox).
4.1.1 TrutzBrowse in standard operation
The TrutzBurg symbol in the upper right corner of the website indicates that TrutzBrowse is activated with the security settings. With the above setting, the TrutzBox (symbol: TrutzBurg) and the Tor network (symbol: onion) are activated.
The color of the TrutzBurg shield indicates the setting of the security slider for this URL; green = level 1 = highest security level; red = level 9 = lowest security level.
If there are operating elements on the website which are hidden by the TrutzBurg and can therefore no longer be operated, the TrutzBurg can be moved to another corner of the browser window.
For touch screens, simply touch the symbol for longer than 1s.
After clicking on the TrutzBurg, the security slider and four further functions are available.
The Security-Slider can be set to 10 security levels (Level 1 = highest protection up to Level 9 = lowest protection; Level 10 = for this website the TrutzBox is switched off). From level 1-9, the user can make the settings himself. If set to level 10 (TrutzBox protection is disabled), only the administrator can reset the level for this website.
On delivery, the security slider is set to "highest security level" (level 1, green, far left).
If the website shows malfunctions, e.g. because it wants to store a cookie, the user can gradually deactivate individual security and anonymisation measures by dragging the security slider to the right (towards red) in order to restore the website's functionality.
However, the security level should only be reduced for trusted websites.
Click on "Details" to see a list of all web accesses accessed from this website.
Blocked HTTP calls are marked by a "red crossed out circle“.
The overview also shows the HTTP headers that have not been completely blocked (marked by a "green tick in a green circle").
This makes it obvious which data was transmitted from the browser to a Web server ("Request" tab) and which data went from a Web server to the browser ("Response" tab).
Depending on how the TrutzBox® is configured for the current position of the Security Slider, certain HTTP header data may not be transmitted to the web server at all (blocked headers) or may be changed (replaced headers).
On the left, the HTTP calls are listed, which are automatically called in the background - without the user's active intervention - in addition to the web page called up by the user (here: www.krone.at). On the right under "Details" you can see which header information has been blocked or replaced.
Click on one of the HTTP calls listed on the left to obtain additional information on this.
Set a check mark to " Nur Blockierungen anzeigen ", then only the blockings are listed.
-> Table of Contents (of this manual)
4.1.2 TrutzBrowse for experts
The TrutzBox® monitors web access and is thus able to prevent unwanted data traffic. The TrutzBox® distinguishes whether a device or a user calls up a web page directly or whether a web server - after the deliberately called up web page has been loaded - contacts further web pages and loads them without the user's knowledge and without his consent.
The TrutzBox® offers two different basic functions for this purpose:
1. TrutzContent:
A content filter that prevents a device or user from directly accessing a particular Web page. Examples of unwanted calls:
- A young person wants to load a website with content harmful to young people.
- An Internet device unnoticedly calls up a web page in the background without a user deliberately initiating it. These can be TVs, washing machines or game consoles (if they are connected to the Internet), or even the standard Internet browser of the user's PC, which in turn contacts Mozilla or Google or the server of a plug-in provider independently, for example.
The TrutzBox® checks if the contact to such a server is allowed and blocks the connection to this server if necessary.
2. TrutzBrowse:
A user or an Internet-enabled device has validly accessed a Web page. When loading the page, however, this website contacts other web servers (often commercial data trackers) that may be interested in the user data. TrutzBox® monitors calls to other web servers that are indirectly contacted without the user's knowledge during the loading process of the deliberately accessed web page.
In both case 1 (TrutzContent) and case 2 (TrutzBrowse), the TrutzBox® compares every web page called up with the web pages (filter lists) known to it. Comidio provides approx. 110 filter lists covering 55 different Internet topics. These filter lists are updated regularly. The TrutzBox® Administrator can add own filter lists if required.
Approach of the TrutzBox®:
Wenn ein Internet-Nutzer eine Webseite aufruft, dann prüft die TrutzContent Funktion zunächst, ob der PC und/oder der Nutzer, der diesen Webseitenaufruf angestoßen hat, diese Seite überhaupt aufrufen darf. Soll diese Webseite gemäß den Filterlisten blockiert werden, dann bekommt der Internet-Nutzer im Browser eine Fehlermeldung angezeigt.
If the website can be accessed, the TrutzBox® allows the data from the web server to pass to the browser, but it monitors each call to other web servers that the website then contacts automatically. Usually a website loads additional content from many other web servers. For each contact with a web server other than the originally called web server, the TrutzBox® checks whether this later called web server is in a filter list group "TrutzBrowse". If it is listed there, the connection to this server will be blocked.
This prevents data tracker calls that are programmed into most websites, and data trackers cannot spy on user behavior.
Each time a Web server is granted (permitted) access, information is sent from the Web browser to the Web server via the HTTP header (http request header). Without the TrutzBox® the browser would then deliver this requested data to the web server. This can be very personal data, such as which other pages you have recently called up, are you currently logged on to Facebook or how exactly does your PC/browser configuration look in order to recognize you on further calls. The HTTP header filter also controls the setting and retrieval of cookies
With its TrutzBrowse function, the TrutzBox® is thus able to control the entire HTTP data exchange on the Internet and to block or falsify these HTTP header data as long as they are not absolutely necessary..
-> Table of Contents (of this manual)
4.1.2.1 Handling SSL connections
The proxy can only break (and analyze) an SSL-encrypted connection between a program and a server if the SSL key has been signed by one of the known certificate authorities. Here are two cases where breaking the encrypted connection does not work:
- if an app establishes an encrypted connection to the server, but the key used is a self-generated key and has therefore not been signed by an official certification authority. If the app is a browser, the user is asked if he accepts the server. If the app is not a browser, the user cannot be requested.
- if the client is authenticated. In this case, a key is usually programmed into the client.
In all cases where the SSL connection cannot be broken, the SecSlider is automatically set to L10 and thus the data transfer is no longer analyzed. This ensures that apps still work "without manual intervention". The user (or the TrutzBox administrator) can deactivate this automatic feature in the "Configure filter" menu with the option "If SSL errors occur, automatically deactivate filtering for the selected domain". The data connection is nevertheless displayed in "Status" for checking purposes. Since this automatic activation only becomes effective if the server has not yet been set in the slider table, this automatism can also prevent a single server if the SecSlider is set manually to any value for this server.
-> Table of Contents (of this manual)
4.1.3 Install proxy switch for activating/deactivating the TrutzBox® in the browser
Attention: Switching the TrutzBox on and off as a proxy (="Call forwarding") only makes sense if the browser to be used (or the terminal device used, e.g. PC) is operated in "proxy mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).
If the browser to be used (or the end-device used, e.g. PC) is operated in "transparent mode", i.e. the PC is connected directly to the TrutzBox (and not directly to the Internet router), I do not need a switch, as the PC is constantly protected via the TrutzBox and switching a proxy on or off makes no difference..
As is known, it is possible to activate or deactivate the TrutzBox® functionality "TrutzBrowse" by activating/deactivating the "PAC" file in the browser settings.
If you want to save yourself these "efforts", you can also install a "proxy switch" (in the form of a downloadable "Add-On" = additional function) in the respective browser and then easily activate or deactivate the TrutzBrowse functionality by simply pressing or selecting it in the browser header line.
The following shows the installations of two proxy switches:
- for Browser "Firefox": Add-On „Proxy Switcher“ and
- für Browser "Chrome": Add-On „Proxy SwitchyOmega“.
Of course, other proxy switches can also be implemented and used.
4.1.3.1 Proxy Switch for "Firefox" Browser
Attention: Switching the TrutzBox on and off as a proxy (=" Redirection") only makes sense if the browser to be used (or the end-device used, e.g. PC) is operated in "Proxy Mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).
If the„FoxyProxy Standard“ add-on is implemented, the user can activate and deactivate the "Trutzbox" proxy and thus the TrutzBrowse function by clicking the Proxy Switcher button (orange fox head) in the browser header.:
- to switch on: by clicking on the symbol "crossed out, orange fox head" the FoxyProxy selection window appears; there click on the green line "Use proxy Trutzbox for all URLs (ignore patterns)'" and the proxy is switched on and the symbol "orange fox head" appears.
- to turn off: by clicking on the symbol "orange fox head" the FoxyProxy selection window appears; click on the red line "Turn Off All Proxies" and the proxy is switched off and the symbol "crossed out, orange fox head" appears.
The"FoxyProxy Standard" add-on is installed as follows:
- Click on "Extras" (1).
- Click on "Add-ons" (2).
-> Table of Contents (of this manual)
- Ganz nach unten scrollen (1).
- Click on "Sehen Sie sich weitere Add-ons an!" (2).
-> Table of Contents (of this manual)
- Enter "proxy switch" in the search field (1).
- Click on "FoxyProxy Standard" (2).
-> Table of Contents (of this manual)
- Click on "+ Zu Firefox hinzufügen" (1).
-> Table of Contents (of this manual)
- Click on "Hinzufügen" (1).
-> Table of Contents (of this manual)
- The symbol "FoxyProxy switched off" (crossed out logo) is displayed in the symbol line. (1).
- Scroll all the way down (2).
-> Table of Contents (of this manual)
- If this view appears, click on "Cancel". (1).
-> Table of Contents (of this manual)
- To enter the Trutzbox as a proxy: Click on "Add" (1).
-> Table of Contents (of this manual)
- Drop down the selection field (1).
- Click on "HTTP" (2).
-> Table of Contents (of this manual)
- Enter descriptive name, e.g. "Trutzbox“ (1).
- Enter "trutzbox" as server name (2).
- Enter "8081" as the port address. (3).
- Click on "Save" (4).
-> Table of Contents (of this manual)
- Click on the symbol "FoxyProxy switched off" (crossed out logo) in the symbol line. (1).
- Switch on the Trutzbox as proxy by clicking on "Use proxy Trutzbox for all URLs" (2).
-> Table of Contents (of this manual)
In the symbol line, the "FoxyProxy" symbol (1) indicates that the proxy is switched on.
-> Table of Contents (of this manual)
- Test input of e.g. "focus.de" (1).
- The Trutzburg (Trutzbox symbol) appears in the upper right corner in the color of the slider setting and shows the number of avoided tracker calls (2).
-> Table of Contents (of this manual)
- To switch off the proxy: click on the "FoxyProxy" symbol in the symbol line (1). Then the selection menu opens up.
- In the selection menu, click on "Turn Off All Proxies (2).
-> Table of Contents (of this manual)
- In the symbol line, the symbol "FoxyProxy switched off" (crossed out logo) indicates that the proxy is switched off (1).
- Durch Refresh, bzw. erneutes Aufrufen, also z.B. Klick auf (2), wird die Seite neu aufgebaut.
-> Table of Contents (of this manual)
- Since the proxy is now switched off, the Trutzburg (Trutzbox symbol) is not displayed in the upper right corner. (2).
-> Table of Contents (of this manual)
4.1.3.2 Proxy Schalter für Browser "Chrome"
Caution: Switching the TrutzBox on and off as a proxy (="Call forwarding") only makes sense if the browser to be used (or the terminal device used, e.g. PC) is operated in "proxy mode", i.e. the PC is connected to the Internet router (and not directly to the TrutzBox).
If the add-on "Proxy SwitchyOmega" is implemented, the user can press and select a button in the header line of the Chrome Browser in the form of a ring:
- To switch on: click on grey circle. Ochre circle shows: TrutzBrowse is switched on.
- to switch off: click on the ochre circle. Grey circle shows: TrutzBrowse is switched off.
How to implement the "Proxy SwitchyOmega" add-on:
Click on menu selection (1); click on "More Tools" (2). "Click on "Settings" (3).
Click on „Mehr Erweiterungen herunterladen“ (4).
-> Table of Contents (of this manual)
I Enter "switchy" in the search field (5). Click on „+ HINZUFÜGEN“(6).
Click on „Erweiterung hinzufügen“ (7).
-> Table of Contents (of this manual)
The confirmation message that the switch has been added.
Click on „Skip guide“ (8).
Enter „TrutzBox“ (09). Click on „PAC Profile“ (10).
-> Table of Contents (of this manual)
Enter „http://trutzbox/api/proxy/pac“ (11). Click on „Download Profile Now“ (12). Click on „Apply changes“ (13).
Click on „Interface“ (14). Click on „Quick Switch“ anklicken (15).
-> Table of Contents (of this manual)
Pull "TrutzBox" upwards (16). " Pull up [Direct]" (17). "Click on "Apply changes (18).
To switch on: click on the grey circle (19). Ochre circle shows: TrutzBrowse is switched on.
To turn off: click the ochre circle (20). Grey circle shows: TrutzBrowse is switched off.
-> Table of Contents (of this manual)
4.2 Encrypted Mailing - TrutzMail
You can use TrutzMail either via
- an immediately usable web-mailer: http://trutzbox/mail (Roundcube),
- your usual e-mail system (e.g. Outlook) or
- both ways.
4.2.1 Using the Web-Mailer
The Web mailer is called via https://trutzbox/mail.
The login is done by entering the user name and password. Both were created by the administrator either at the Setup or [Manage Main Page#User|after]].