Netgear STM150 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Směrovače Netgear STM150. Netgear STM150 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 704
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
350 East Plumeria Drive
San Jose, CA 95134
USA
October 2012
202-10780-03
v1.0
ProSecure Unified Threat
Management (UTM)
Appliance
Reference Manual
Zobrazit stránku 0
1 2 3 4 5 6 ... 703 704

Shrnutí obsahu

Strany 1

350 East Plumeria DriveSan Jose, CA 95134USAOctober 2012202-10780-03v1.0ProSecure Unified Threat Management (UTM) ApplianceReference Manual

Strany 2 - Revision History

10ProSecure Unified Threat Management (UTM) ApplianceConfigure User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401

Strany 3

LAN Configuration100ProSecure Unified Threat Management (UTM) Appliance • When a port receives an untagged packet, this packet is forwarded to a VLAN

Strany 4

LAN Configuration101 ProSecure Unified Threat Management (UTM) ApplianceFigure 54. For each VLAN profile, the following fields display in the VLAN Pr

Strany 5 - Contents

LAN Configuration102ProSecure Unified Threat Management (UTM) Appliance DHCP ServerThe default VLAN (VLAN 1) has the DHCP server option enabled by def

Strany 6 - Chapter 4 LAN Configuration

LAN Configuration103 ProSecure Unified Threat Management (UTM) Applianceconfiguration in auto-rollover mode with route diversity (that is, with two di

Strany 7 - Chapter 5 Firewall Protection

LAN Configuration104ProSecure Unified Threat Management (UTM) Appliance 2. Either select an entry from the VLAN Profiles table and click the correspon

Strany 8

LAN Configuration105 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table: Table 21. Edit VLA

Strany 9

LAN Configuration106ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server Select the Enable DHCP Server radio button to enable the UT

Strany 10

LAN Configuration107 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Enable LDAP informationTo enable the DHCP

Strany 11

LAN Configuration108ProSecure Unified Threat Management (UTM) Appliance Note: When you have completed the LAN setup, all outbound traffic is allowed a

Strany 12

LAN Configuration109 ProSecure Unified Threat Management (UTM) ApplianceFigure 57. 3. From the MAC Address for VLANs drop-down list, select Unique. (

Strany 13

11ProSecure Unified Threat Management (UTM) ApplianceView the Active PPTP and L2TP Users . . . . . . . . . . . . . . . . . . . . . . . .501View the Po

Strany 14

LAN Configuration110ProSecure Unified Threat Management (UTM) Appliance The following is an example of correctly configured IP addresses on a multiple

Strany 15 - Introduction

LAN Configuration111 ProSecure Unified Threat Management (UTM) Appliance To edit a secondary LAN IP address:1. On the LAN Multi-homing screen (see th

Strany 16 - Key Features and Capabilities

LAN Configuration112ProSecure Unified Threat Management (UTM) Appliance These are some advantages of the network database:• Generally, you do not need

Strany 17 - Outbound Load Balancing

LAN Configuration113 ProSecure Unified Threat Management (UTM) ApplianceFigure 59. The Known PCs and Devices table lists the entries in the network da

Strany 18 - DSL Features

LAN Configuration114ProSecure Unified Threat Management (UTM) Appliance Add Computers or Devices to the Network Database To add computers or devices

Strany 19 - A Powerful, True Firewall

LAN Configuration115 ProSecure Unified Threat Management (UTM) ApplianceFigure 60. 2. Modify the settings as explained in Table 22 on page 114.3. Cli

Strany 20 - Security Features

LAN Configuration116ProSecure Unified Threat Management (UTM) Appliance Figure 61. 3. Select the radio button next to the group name that you want to

Strany 21 - Extensive Protocol Support

LAN Configuration117 ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable the DMZ PortThe demilitarized zone (DMZ) is a network tha

Strany 22 - Model Comparison

LAN Configuration118ProSecure Unified Threat Management (UTM) Appliance Figure 62. 2. Enter the settings as explained in the following table: Table 2

Strany 23

LAN Configuration119 ProSecure Unified Threat Management (UTM) ApplianceDHCPDisable DHCP Server If another device on your network is the DHCP server f

Strany 24 - Hardware Features

12ProSecure Unified Threat Management (UTM) ApplianceAppendix A xDSL Network Module for the UTM9S and UTM25SxDSL Network Module Configuration Tasks. .

Strany 25 - Front Panel UTM5 and UTM10

LAN Configuration120ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: For all UTM models except for the U

Strany 26 - Front Panel UTM50

LAN Configuration121 ProSecure Unified Threat Management (UTM) ApplianceManage Routing• Configure Static Routes• Configure Routing Information Protoco

Strany 27 - Front Panel UTM150

LAN Configuration122ProSecure Unified Threat Management (UTM) Appliance Figure 64. 3. Enter the settings as explained in the following table: 4. Clic

Strany 28

LAN Configuration123 ProSecure Unified Threat Management (UTM) Appliance To edit a static route that is in the Static Routes table:1. On the Routing

Strany 29 - Wireless Network Modules

LAN Configuration124ProSecure Unified Threat Management (UTM) Appliance Figure 65. 3. Enter the settings as explained in the following table: Table 2

Strany 30

LAN Configuration125 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.RIP Version By default, the RIP version i

Strany 31

LAN Configuration126ProSecure Unified Threat Management (UTM) Appliance Static Route ExampleIn this example, we assume the following:• The UTM’s prima

Strany 32

12755. Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chapter contains the foll

Strany 33

Firewall Protection128ProSecure Unified Threat Management (UTM) Appliance Administrator TipsConsider the following operational items:1. As an option,

Strany 34 - Rear Panel UTM50 and UTM150

Firewall Protection129 ProSecure Unified Threat Management (UTM) ApplianceA firewall has two default rules, one for inbound traffic and one for outbou

Strany 35 - Rear Panel UTM9S and UTM25S

13ProSecure Unified Threat Management (UTM) ApplianceAppendix D Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)What to Consider Bef

Strany 36 - Figure 13

Firewall Protection130ProSecure Unified Threat Management (UTM) Appliance WARNING:Allowing inbound services opens security holes in your UTM. Enable o

Strany 37 - Figure 15

Firewall Protection131 ProSecure Unified Threat Management (UTM) ApplianceLAN Users The settings that determine which computers on your network are af

Strany 38 - Figure 17

Firewall Protection132ProSecure Unified Threat Management (UTM) Appliance QoS Profile The priority assigned to IP packets of this service. The priorit

Strany 39 - Choose a Location for the UTM

Firewall Protection133 ProSecure Unified Threat Management (UTM) ApplianceInbound Rules (Port Forwarding)If you have enabled Network Address Translati

Strany 40 - Use the Rack-Mounting Kit

Firewall Protection134ProSecure Unified Threat Management (UTM) Appliance • Local computers need to access the local server using the computers’ local

Strany 41 - UTM in Your Network

Firewall Protection135 ProSecure Unified Threat Management (UTM) ApplianceTable 28. Inbound rules overviewSetting Description Inbound RulesService(al

Strany 42 - Log In to the UTM

Firewall Protection136ProSecure Unified Threat Management (UTM) Appliance LAN Users The settings that determine which computers on your network are af

Strany 43 - Figure 20

Firewall Protection137 ProSecure Unified Threat Management (UTM) ApplianceQoS Profile The priority assigned to IP packets of this service. The priorit

Strany 44 - Figure 21

Firewall Protection138ProSecure Unified Threat Management (UTM) Appliance Note: Some residential broadband ISP accounts do not allow you to run any se

Strany 45

Firewall Protection139 ProSecure Unified Threat Management (UTM) ApplianceFor any traffic attempting to pass through the firewall, the packet informat

Strany 46 - Figure 24

14ProSecure Unified Threat Management (UTM) ApplianceEmail Filter Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Strany 47 - Figure 25

Firewall Protection140ProSecure Unified Threat Management (UTM) Appliance  To change an existing outbound or inbound service rule:In the Action colum

Strany 48 - Figure 26

Firewall Protection141 ProSecure Unified Threat Management (UTM) ApplianceFigure 68. 2. Enter the settings as explained in Table 27 on page 130.3. Cl

Strany 49

Firewall Protection142ProSecure Unified Threat Management (UTM) Appliance Figure 69. 2. Enter the settings as explained in Table 28 on page 135.3. Cl

Strany 50

Firewall Protection143 ProSecure Unified Threat Management (UTM) Applianceadding outbound services rules (see Create DMZ WAN Outbound Service Rules on

Strany 51 - Figure 27

Firewall Protection144ProSecure Unified Threat Management (UTM) Appliance Create DMZ WAN Outbound Service RulesYou can change the default outbound pol

Strany 52

Firewall Protection145 ProSecure Unified Threat Management (UTM) Appliance To create an inbound DMZ WAN service rule:1. In the DMZ WAN Rules screen,

Strany 53

Firewall Protection146ProSecure Unified Threat Management (UTM) Appliance To access the LAN DMZ Rules screen and to change an existing outbound or inb

Strany 54 - Connection on page 75

Firewall Protection147 ProSecure Unified Threat Management (UTM) ApplianceCreate LAN DMZ Outbound Service RulesYou can change the default outbound pol

Strany 55 - Figure 29

Firewall Protection148ProSecure Unified Threat Management (UTM) Appliance Figure 75. 2. Enter the settings as explained in Table 28 on page 135.3. Cl

Strany 56

Firewall Protection149 ProSecure Unified Threat Management (UTM) ApplianceFigure 76. LAN WAN Inbound Rule: Allow Videoconference from Restricted Addre

Strany 57 - Figure 30

1511. IntroductionThis chapter provides an overview of the features and capabilities of the NETGEAR ProSecure® Unified Threat Management (UTM) Appli

Strany 58 - Figure 31

Firewall Protection150ProSecure Unified Threat Management (UTM) Appliance Figure 77. LAN WAN or DMZ WAN Inbound Rule: Set Up One-to-One NAT MappingIn

Strany 59

Firewall Protection151 ProSecure Unified Threat Management (UTM) ApplianceTip: If you arrange with your ISP to have more than one public IP address fo

Strany 60 - Figure 32

Firewall Protection152ProSecure Unified Threat Management (UTM) Appliance 6. In the Send to LAN Server field, enter the local IP address of your web s

Strany 61

Firewall Protection153 ProSecure Unified Threat Management (UTM) ApplianceWARNING:For security, NETGEAR strongly recommends that you avoid creating an

Strany 62 - Figure 33

Firewall Protection154ProSecure Unified Threat Management (UTM) Appliance Configure Other Firewall Features• VLAN Rules• Attack Checks, VPN Pass-throu

Strany 63 - Figure 34

Firewall Protection155 ProSecure Unified Threat Management (UTM) ApplianceFigure 82. 3. Enter the settings as explained in the following table.Table

Strany 64 - Firmware on page 454

Firewall Protection156ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new VLAN rule is added to the VLAN

Strany 65 - Register the UTM with NETGEAR

Firewall Protection157 ProSecure Unified Threat Management (UTM) ApplianceAttack Checks, VPN Pass-through, and Multicast Pass-throughThe Attack Checks

Strany 66 - Figure 36

Firewall Protection158ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Configure Multicast Pass-Through To co

Strany 67 - Electronic Licensing

Firewall Protection159 ProSecure Unified Threat Management (UTM) ApplianceFigure 84. 2. In the Multicast Pass through section of the screen, select t

Strany 68 - What to Do Next

Introduction16ProSecure Unified Threat Management (UTM) Appliance carry session traffic, or to maintain a backup connection in case of failure of your

Strany 69

Firewall Protection160ProSecure Unified Threat Management (UTM) Appliance  To delete one or more multicast source addresses:1. In the Alternate Netwo

Strany 70

Firewall Protection161 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Manage the Application Level Gateway fo

Strany 71 - Connections

Firewall Protection162ProSecure Unified Threat Management (UTM) Appliance Figure 86. 2. In the ALG section, select the Enable SIP ALG check box.3. In

Strany 72 - Figure 37

Firewall Protection163 ProSecure Unified Threat Management (UTM) Appliance• QoS profiles. A Quality of Service (QoS) profile defines the relative prio

Strany 73 - Figure 38

Firewall Protection164ProSecure Unified Threat Management (UTM) Appliance  To add a customized service:1. Select Network Security > Services. The

Strany 74 - Figure 39

Firewall Protection165 ProSecure Unified Threat Management (UTM) Appliance To edit a service:1. In the Custom Services table, click the Edit table bu

Strany 75 - Figure 40

Firewall Protection166ProSecure Unified Threat Management (UTM) Appliance Figure 89. 2. Under the Custom Service Group table, click the Add table but

Strany 76 - Figure 41

Firewall Protection167 ProSecure Unified Threat Management (UTM) ApplianceCreate IP GroupsAn IP group contains a collection of individual IP addresses

Strany 77 - Figure 42

Firewall Protection168ProSecure Unified Threat Management (UTM) Appliance Figure 92. 5. In the IP Address fields, type an IP address.6. Click the Add

Strany 78 - Figure 43

Firewall Protection169 ProSecure Unified Threat Management (UTM) ApplianceCreate Quality of Service ProfilesA Quality of Service (QoS) profile defines

Strany 79 - Figure 44

Introduction17 ProSecure Unified Threat Management (UTM) Appliance• Depending on the model, bundled with a one-user license of the NETGEAR ProSafe VPN

Strany 80

Firewall Protection170ProSecure Unified Threat Management (UTM) Appliance Figure 93. The screen displays the List of QoS Profiles table with the user

Strany 81

Firewall Protection171 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new QoS profile is added to the Li

Strany 82

Firewall Protection172ProSecure Unified Threat Management (UTM) Appliance When a new connection is established by a device, the device locates the fir

Strany 83

Firewall Protection173 ProSecure Unified Threat Management (UTM) ApplianceFigure 96. 3. Enter the settings as explained in the following table:Table

Strany 84 - Figure 46

Firewall Protection174ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new bandwidth profile is added to

Strany 85 - (Multiple WAN Port Models)

Firewall Protection175 ProSecure Unified Threat Management (UTM) Applianceboth downloaded and uploaded traffic. When applied to multiple firewall rule

Strany 86 - Figure 47

Firewall Protection176ProSecure Unified Threat Management (UTM) Appliance Figure 98. 3. Enter the settings as explained in the following table:Table

Strany 87 - Figure 48

Firewall Protection177 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new traffic meter profile is added

Strany 88 - Figure 49

Firewall Protection178ProSecure Unified Threat Management (UTM) Appliance Figure 100. 3. Enter the settings as explained in the following table:Table

Strany 89

Firewall Protection179 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new schedule is added to the List

Strany 90 - Figure 50

Introduction18ProSecure Unified Threat Management (UTM) Appliance Wireless FeaturesWireless client connections are supported on the UTM9S and UTM25S w

Strany 91

Firewall Protection180ProSecure Unified Threat Management (UTM) Appliance  To enable MAC filtering and add MAC addresses to be permitted or blocked:1

Strany 92 - Figure 51

Firewall Protection181 ProSecure Unified Threat Management (UTM) ApplianceSet Up IP/MAC BindingsIP/MAC binding allows you to bind an IP address to a M

Strany 93 - Figure 52

Firewall Protection182ProSecure Unified Threat Management (UTM) Appliance Figure 102. 2. Enter the settings as explained in the following table:3. Cl

Strany 94

Firewall Protection183 ProSecure Unified Threat Management (UTM) Appliance To edit an IP/MAC binding:1. In the IP/MAC Bindings table, click the Edit

Strany 95 - Figure 53

Firewall Protection184ProSecure Unified Threat Management (UTM) Appliance  To add a port-triggering rule:1. Select Network Security > Port Trigger

Strany 96

Firewall Protection185 ProSecure Unified Threat Management (UTM) Appliance To edit a port-triggering rule:1. In the Port Triggering Rules table, clic

Strany 97

Firewall Protection186ProSecure Unified Threat Management (UTM) Appliance Configure Universal Plug and PlayThe Universal Plug and Play (UPnP) feature

Strany 98

Firewall Protection187 ProSecure Unified Threat Management (UTM) ApplianceEnable and Configure the Intrusion Prevention SystemThe intrusion prevention

Strany 99 - Port-Based VLANs

Firewall Protection188ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: Traffic that passes on the UTM’s

Strany 100 - LAN Configuration

Firewall Protection189 ProSecure Unified Threat Management (UTM) ApplianceFigure 106. IPS, screen 1 of 2

Strany 101 - VLAN DHCP Options

Introduction19 ProSecure Unified Threat Management (UTM) Appliance• SSL VPN provides remote access for mobile users to selected corporate resources wi

Strany 102 - DNS Proxy

Firewall Protection190ProSecure Unified Threat Management (UTM) Appliance Figure 107. IPS, screen 2 of 24. Click Apply to save your settings.The foll

Strany 103 - Configure a VLAN Profile

Firewall Protection191 ProSecure Unified Threat Management (UTM) ApplianceNote: To ensure that alerts are emailed to an administrator, you need to con

Strany 104 - Figure 56

19266. Content Filtering and Optimizing ScansThis chapter describes how to apply the content-filtering features of the UTM and how to optimize scans

Strany 105

Content Filtering and Optimizing Scans193 ProSecure Unified Threat Management (UTM) ApplianceNote: The UTM can quarantine spam and malware only if you

Strany 106

Content Filtering and Optimizing Scans194ProSecure Unified Threat Management (UTM) Appliance Configure Email Protection• Customize Email Protocol Scan

Strany 107

Content Filtering and Optimizing Scans195 ProSecure Unified Threat Management (UTM) ApplianceNote: For information about web protocols and ports, see

Strany 108 -  To edit a VLAN profile:

Content Filtering and Optimizing Scans196ProSecure Unified Threat Management (UTM) Appliance Customize Email Antivirus and Notification SettingsWhethe

Strany 109 - Figure 57

Content Filtering and Optimizing Scans197 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Strany 110 - Figure 58

Content Filtering and Optimizing Scans198ProSecure Unified Threat Management (UTM) Appliance Scan ExceptionsThe default maximum size of the email mess

Strany 111

Content Filtering and Optimizing Scans199 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Email Content Filter

Strany 112 - Manage the Network Database

2ProSecure Unified Threat Management (UTM) Appliance SupportThank you for choosing NETGEAR.After installing your device, locate the serial number on t

Strany 113 - Figure 59

Introduction20ProSecure Unified Threat Management (UTM) Appliance analysis to stop both known and unknown threats. The malware database contains hundr

Strany 114

Content Filtering and Optimizing Scans200ProSecure Unified Threat Management (UTM) Appliance  To configure email content filtering: 1. Select Applica

Strany 115 - Figure 60

Content Filtering and Optimizing Scans201 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Strany 116 - Set Up Address Reservation

Content Filtering and Optimizing Scans202ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Protect Against Emai

Strany 117

Content Filtering and Optimizing Scans203 ProSecure Unified Threat Management (UTM) ApplianceThis order of implementation ensures the optimum balance

Strany 118 - Figure 62

Content Filtering and Optimizing Scans204ProSecure Unified Threat Management (UTM) Appliance  To configure the whitelist and blacklist:1. Select Appl

Strany 119

Content Filtering and Optimizing Scans205 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Strany 120

Content Filtering and Optimizing Scans206ProSecure Unified Threat Management (UTM) Appliance Configure the Real-Time BlacklistBlacklist providers are

Strany 121 - Manage Routing

Content Filtering and Optimizing Scans207 ProSecure Unified Threat Management (UTM) Appliance To delete a blacklist provider from the real-time black

Strany 122 - Figure 64

Content Filtering and Optimizing Scans208ProSecure Unified Threat Management (UTM) Appliance Figure 113. 2. Enter the settings as explained in the fo

Strany 123

Content Filtering and Optimizing Scans209 ProSecure Unified Threat Management (UTM) ApplianceSensitivity From the Sensitivity drop-down list, select t

Strany 124 - Figure 65

Introduction21 ProSecure Unified Threat Management (UTM) ApplianceExtensive Protocol SupportThe UTM supports the Transmission Control Protocol/Interne

Strany 125

Content Filtering and Optimizing Scans210ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. The Distributed Spa

Strany 126 - Static Route Example

Content Filtering and Optimizing Scans211 ProSecure Unified Threat Management (UTM) ApplianceScanning all protocols enhances network security but migh

Strany 127 - Firewall Protection

Content Filtering and Optimizing Scans212ProSecure Unified Threat Management (UTM) Appliance service on your network uses both port 80 and port 8080,

Strany 128 - Administrator Tips

Content Filtering and Optimizing Scans213 ProSecure Unified Threat Management (UTM) Appliance2. In the HTTPS Smart Block Port section of the screen, e

Strany 129

Content Filtering and Optimizing Scans214ProSecure Unified Threat Management (UTM) Appliance Figure 117. The HTTPS Smart Block Profiles table shows a

Strany 130

Content Filtering and Optimizing Scans215 ProSecure Unified Threat Management (UTM) Appliance To change a profile:1. In the Action column of the HTTP

Strany 131

Content Filtering and Optimizing Scans216ProSecure Unified Threat Management (UTM) Appliance Configure Web Malware or Antivirus ScansWhether or not th

Strany 132

Content Filtering and Optimizing Scans217 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Strany 133

Content Filtering and Optimizing Scans218ProSecure Unified Threat Management (UTM) Appliance Configure Web Content FilteringIf you want to restrict ac

Strany 134

Content Filtering and Optimizing Scans219 ProSecure Unified Threat Management (UTM) ApplianceNote: You can bypass any type of web blocking for trusted

Strany 135 - . On the single WAN port

Introduction22ProSecure Unified Threat Management (UTM) Appliance • SNMP. The UTM supports the Simple Network Management Protocol (SNMP) to let you mo

Strany 136

Content Filtering and Optimizing Scans220ProSecure Unified Threat Management (UTM) Appliance Figure 120. Content filtering, screen 2 of 3

Strany 137

Content Filtering and Optimizing Scans221 ProSecure Unified Threat Management (UTM) ApplianceFigure 121. Content filtering, screen 3 of 32. Enter the

Strany 138 - Order of Precedence for Rules

Content Filtering and Optimizing Scans222ProSecure Unified Threat Management (UTM) Appliance Block Files with the Following ExtensionsBy default, the

Strany 139 - Configure LAN WAN Rules

Content Filtering and Optimizing Scans223 ProSecure Unified Threat Management (UTM) ApplianceSelect the Web Categories You Wish to BlockSelect the Ena

Strany 140

Content Filtering and Optimizing Scans224ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: When the UTM b

Strany 141 - Figure 68

Content Filtering and Optimizing Scans225 ProSecure Unified Threat Management (UTM) Appliance To configure web URL filtering:1. Select Application Se

Strany 142 - Configure DMZ WAN Rules

Content Filtering and Optimizing Scans226ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table

Strany 143 - Figure 70

Content Filtering and Optimizing Scans227 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.URL(continued)Delete

Strany 144 - Figure 71

Content Filtering and Optimizing Scans228ProSecure Unified Threat Management (UTM) Appliance Configure HTTPS Scanning and SSL Certificates• How HTTPS

Strany 145 - Configure LAN DMZ Rules

Content Filtering and Optimizing Scans229 ProSecure Unified Threat Management (UTM) ApplianceDuring SSL authentication, the HTTPS client authenticates

Strany 146 - Figure 73

Introduction23 ProSecure Unified Threat Management (UTM) ApplianceService Registration Card with License KeysBe sure to store the license key card tha

Strany 147 - Figure 74

Content Filtering and Optimizing Scans230ProSecure Unified Threat Management (UTM) Appliance Configure the HTTPS Scan Settings To configure the HTTPS

Strany 148 - Examples of Firewall Rules

Content Filtering and Optimizing Scans231 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Manage SSL Certifica

Strany 149 - Figure 76

Content Filtering and Optimizing Scans232ProSecure Unified Threat Management (UTM) Appliance recommends that you replace this digital certificate with

Strany 150 - Figure 77

Content Filtering and Optimizing Scans233 ProSecure Unified Threat Management (UTM) Appliance To download the current certificate into your browser:1

Strany 151 - Figure 78

Content Filtering and Optimizing Scans234ProSecure Unified Threat Management (UTM) Appliance The Trusted Certificates table contains the trusted certi

Strany 152 - Figure 79

Content Filtering and Optimizing Scans235 ProSecure Unified Threat Management (UTM) Appliance To delete an untrusted certificate:1. From the Exceptio

Strany 153 - Outbound Rule Example

Content Filtering and Optimizing Scans236ProSecure Unified Threat Management (UTM) Appliance Figure 130. 2. Enter the settings as explained in the fo

Strany 154 - VLAN Rules

Content Filtering and Optimizing Scans237 ProSecure Unified Threat Management (UTM) ApplianceConfigure the SSL Settings for HTTPS Scanning To configu

Strany 155 - Figure 82

Content Filtering and Optimizing Scans238ProSecure Unified Threat Management (UTM) Appliance Configure FTP Scanning• Customize FTP Antivirus Settings•

Strany 156 -  To edit a VLAN rule:

Content Filtering and Optimizing Scans239 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Configure FTP Conten

Strany 157 - Figure 83

Introduction24ProSecure Unified Threat Management (UTM) Appliance Note: When you reset the UTM to the original factory default settings after you have

Strany 158

Content Filtering and Optimizing Scans240ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. Configure Applicati

Strany 159 - Figure 84

Content Filtering and Optimizing Scans241 ProSecure Unified Threat Management (UTM) Appliance• Private protocols• Social networksControl is set for en

Strany 160 - Set Session Limits

Content Filtering and Optimizing Scans242ProSecure Unified Threat Management (UTM) Appliance  To configure an application control profile and enable

Strany 161 - VPN Scanning

Content Filtering and Optimizing Scans243 ProSecure Unified Threat Management (UTM) ApplianceFigure 135. 3. Configure the common settings in the uppe

Strany 162 - Traffic Meter Profiles

Content Filtering and Optimizing Scans244ProSecure Unified Threat Management (UTM) Appliance 4. In the lower part of the screen, select the categories

Strany 163 - Add Customized Services

Content Filtering and Optimizing Scans245 ProSecure Unified Threat Management (UTM) Appliance5. In the Active Categories and Individual Applications t

Strany 164 - Figure 87

Content Filtering and Optimizing Scans246ProSecure Unified Threat Management (UTM) Appliance 6. Configure the policy as explained in the following tab

Strany 165 - Create Service Groups

Content Filtering and Optimizing Scans247 ProSecure Unified Threat Management (UTM) Appliance7. Click Apply to save the policy settings. The pop-up sc

Strany 166 -  To edit a service group:

Content Filtering and Optimizing Scans248ProSecure Unified Threat Management (UTM) Appliance 2. Modify the settings that you wish to change (see the p

Strany 167 - Create IP Groups

Content Filtering and Optimizing Scans249 ProSecure Unified Threat Management (UTM) Appliance• A combination of file extensions and protocols• One URL

Strany 168 -  To delete an IP group:

Introduction25 ProSecure Unified Threat Management (UTM) Appliance• Rear Panel UTM50 and UTM150• Rear Panel UTM9S and UTM25S• Bottom Panels with Produ

Strany 169 -  To create a QoS profile:

Content Filtering and Optimizing Scans250ProSecure Unified Threat Management (UTM) Appliance 2. Under the File Extension table at the bottom of the sc

Strany 170 - Figure 94

Content Filtering and Optimizing Scans251 ProSecure Unified Threat Management (UTM) Appliance• File Extension.Figure 140. Add or edit exceptions: fil

Strany 171 - Create Bandwidth Profiles

Content Filtering and Optimizing Scans252ProSecure Unified Threat Management (UTM) Appliance • URL Filtering.Figure 142. Add or edit exceptions: URL

Strany 172 - Figure 95

Content Filtering and Optimizing Scans253 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/GroupClick the Edit button to open the Applies

Strany 173 - Figure 96

Content Filtering and Optimizing Scans254ProSecure Unified Threat Management (UTM) Appliance DomainUser/Group(continued)Local Groups Do the following:

Strany 174 - Create Traffic Meter Profiles

Content Filtering and Optimizing Scans255 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/Group(continued)Custom Groups Do the following

Strany 175 - Figure 97

Content Filtering and Optimizing Scans256ProSecure Unified Threat Management (UTM) Appliance Category (and related information)(continued)File Extensi

Strany 176 - Figure 98

Content Filtering and Optimizing Scans257 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings. The new exception r

Strany 177 - Figure 99

Content Filtering and Optimizing Scans258ProSecure Unified Threat Management (UTM) Appliance Create Custom Categories for Exceptions for Web andApplic

Strany 178 - Figure 100

Content Filtering and Optimizing Scans259 ProSecure Unified Threat Management (UTM) Appliance• Application. Figure 145. Custom categories: applicatio

Strany 179 - Enable Source MAC Filtering

Introduction26ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM25Viewed from left to right, the UTM25 front panel contains the follo

Strany 180 - Figure 101

Content Filtering and Optimizing Scans260ProSecure Unified Threat Management (UTM) Appliance • Web Category. Figure 147. Custom categories: web categ

Strany 181 - Set Up IP/MAC Bindings

Content Filtering and Optimizing Scans261 ProSecure Unified Threat Management (UTM) ApplianceCategory Type(continued)Application(continued)To remove o

Strany 182 - Figure 102

Content Filtering and Optimizing Scans262ProSecure Unified Threat Management (UTM) Appliance 5. Click Apply to save your settings. The new category is

Strany 183 - Configure Port Triggering

Content Filtering and Optimizing Scans263 ProSecure Unified Threat Management (UTM) ApplianceFigure 148. 2. In the Add Scanning Exclusions section of

Strany 184 - Figure 103

26477. Virtual Private NetworkingUsing IPSec, PPTP, or L2TP ConnectionsThis chapter describes how to use the IP security (IPSec) virtual private net

Strany 185 - Figure 104

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections265 ProSecure Unified Threat Management (UTM) Appliancebalancing mode if the IP addre

Strany 186 - Figure 105

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections266ProSecure Unified Threat Management (UTM) Appliance Use the IPSec VPN Wizard for C

Strany 187

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections267 ProSecure Unified Threat Management (UTM) Appliance• Multiple WAN port models. A

Strany 188

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections268ProSecure Unified Threat Management (UTM) Appliance Figure 153. The VPN Wizard de

Strany 189

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections269 ProSecure Unified Threat Management (UTM) Appliance2. Select the radio buttons an

Strany 190

Introduction27 ProSecure Unified Threat Management (UTM) ApplianceFigure 4. Front panel UTM50Front Panel UTM150Viewed from left to right, the UTM150 f

Strany 191

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections270ProSecure Unified Threat Management (UTM) Appliance Tip: To ensure that tunnels st

Strany 192

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections271 ProSecure Unified Threat Management (UTM) ApplianceFigure 155. b. Locate the pol

Strany 193

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections272ProSecure Unified Threat Management (UTM) Appliance Use the VPN Wizard to Configur

Strany 194 - Configure Email Protection

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections273 ProSecure Unified Threat Management (UTM) ApplianceTo display the wizard default

Strany 195 - Figure 108

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections274ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your se

Strany 196 - Figure 109

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections275 ProSecure Unified Threat Management (UTM) ApplianceFigure 158. Note: When you ar

Strany 197

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections276ProSecure Unified Threat Management (UTM) Appliance Use the NETGEAR VPN Client Wiz

Strany 198

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections277 ProSecure Unified Threat Management (UTM) ApplianceFigure 160. 3. Select the A r

Strany 199 - Email Content Filtering

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections278ProSecure Unified Threat Management (UTM) Appliance Figure 162. 6. This screen is

Strany 200 - Figure 110

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections279 ProSecure Unified Threat Management (UTM) Appliancec. Specify the settings that a

Strany 201

Introduction28ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM9S and UTM25S and Network ModulesViewed from left to right, the UTM9S

Strany 202 - Protect Against Email Spam

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections280ProSecure Unified Threat Management (UTM) Appliance Figure 164. b. Specify the de

Strany 203

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections281 ProSecure Unified Threat Management (UTM) ApplianceConfigure the Authentication S

Strany 204 - Figure 111

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections282ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the

Strany 205

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections283 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to use the new

Strany 206 - Figure 112

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections284ProSecure Unified Threat Management (UTM) Appliance 8. Click Apply to use the new

Strany 207

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections285 ProSecure Unified Threat Management (UTM) ApplianceFigure 169. 3. Specify the se

Strany 208 - Figure 113

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections286ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to use the new

Strany 209

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections287 ProSecure Unified Threat Management (UTM) ApplianceTest the Connection and View C

Strany 210

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections288ProSecure Unified Threat Management (UTM) Appliance Perform one of the following t

Strany 211 - Figure 114

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections289 ProSecure Unified Threat Management (UTM) ApplianceNETGEAR VPN Client Status and

Strany 212 - Configure HTTPS Smart Block

Introduction29 ProSecure Unified Threat Management (UTM) AppliancexDSL Network ModulesThe following xDSL network modules are available for insertion i

Strany 213 - Figure 116

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections290ProSecure Unified Threat Management (UTM) Appliance The Active IPSec SA(s) table l

Strany 214 - Figure 117

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections291 ProSecure Unified Threat Management (UTM) ApplianceFigure 178. Manage IPSec VPN a

Strany 215 -  To change a profile:

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections292ProSecure Unified Threat Management (UTM) Appliance Manage IKE PoliciesThe Interne

Strany 216 - Figure 118

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections293 ProSecure Unified Threat Management (UTM) ApplianceFigure 179. Each policy contai

Strany 217

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections294ProSecure Unified Threat Management (UTM) Appliance  To delete one or more IKE po

Strany 218

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections295 ProSecure Unified Threat Management (UTM) ApplianceFigure 180.

Strany 219

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections296ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select

Strany 220

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections297 ProSecure Unified Threat Management (UTM) ApplianceIdentifier Type From the drop-

Strany 221

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections298ProSecure Unified Threat Management (UTM) Appliance Authentication Method Select o

Strany 222

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections299 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Strany 223

3ProSecure Unified Threat Management (UTM) Appliance 202-10780-03(continued)1.0(continued)October 2012(continued)(continued)• Added Appendix C, 3G/4G

Strany 224 - Configure Web URL Filtering

Introduction30ProSecure Unified Threat Management (UTM) Appliance Figure 8. Wireless network moduleLED Descriptions, UTM5, UTM10, UTM25, UTM50, and UT

Strany 225 - Figure 122

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections300ProSecure Unified Threat Management (UTM) Appliance Manage VPN Policies You can cr

Strany 226

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections301 ProSecure Unified Threat Management (UTM) ApplianceFigure 181. Each policy contai

Strany 227

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections302ProSecure Unified Threat Management (UTM) Appliance  To delete one or more VPN po

Strany 228 - How HTTPS Scanning Works

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections303 ProSecure Unified Threat Management (UTM) ApplianceFigure 182.

Strany 229 - Figure 124

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections304ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select

Strany 230 - Figure 125

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections305 ProSecure Unified Threat Management (UTM) ApplianceEnable KeepaliveNote: See also

Strany 231 - Figure 126

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections306ProSecure Unified Threat Management (UTM) Appliance Encryption Algorithm From the

Strany 232

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections307 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Strany 233

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections308ProSecure Unified Threat Management (UTM) Appliance  To edit a VPN policy:1. Sele

Strany 234

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections309 ProSecure Unified Threat Management (UTM) ApplianceConfigure XAUTH for VPN Client

Strany 235 -  To specify trusted hosts:

Introduction31 ProSecure Unified Threat Management (UTM) ApplianceLAN portsLeft LED Off The LAN port has no link.On (green) The LAN port has detected

Strany 236 - Figure 130

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections310ProSecure Unified Threat Management (UTM) Appliance User Database ConfigurationWhe

Strany 237 - Figure 131

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections311 ProSecure Unified Threat Management (UTM) Appliance2. Complete the fields and sel

Strany 238 - Configure FTP Scanning

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections312ProSecure Unified Threat Management (UTM) Appliance Assign IP Addresses to Remote

Strany 239 - To configure the FTP filters:

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections313 ProSecure Unified Threat Management (UTM) Appliance To configure Mode Config on

Strany 240 - Configure Application Control

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections314ProSecure Unified Threat Management (UTM) Appliance Figure 185. 3. Complete the f

Strany 241

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections315 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Strany 242 - Figure 134

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections316ProSecure Unified Threat Management (UTM) Appliance 6. Under the List of IKE Polic

Strany 243 - Figure 135

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections317 ProSecure Unified Threat Management (UTM) ApplianceNote: The IKE policy settings

Strany 244

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections318ProSecure Unified Threat Management (UTM) Appliance IKE SA ParametersNote: General

Strany 245

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections319 ProSecure Unified Threat Management (UTM) Appliance8. Click Apply to save your se

Strany 246

Introduction32ProSecure Unified Threat Management (UTM) Appliance LED Descriptions, UTM9S, UTM25S, and their Network ModulesThe following table descri

Strany 247

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections320ProSecure Unified Threat Management (UTM) Appliance Note: Perform these tasks from

Strany 248

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections321 ProSecure Unified Threat Management (UTM) ApplianceFigure 188. 3. Change the nam

Strany 249 - Figure 138

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections322ProSecure Unified Threat Management (UTM) Appliance 4. Specify the settings that a

Strany 250

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections323 ProSecure Unified Threat Management (UTM) Appliance7. Specify the settings that a

Strany 251 - • HTTPS Smart Block

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections324ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the

Strany 252 - • Web Category

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections325 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to use the new

Strany 253

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections326ProSecure Unified Threat Management (UTM) Appliance 2. Specify the following defau

Strany 254

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections327 ProSecure Unified Threat Management (UTM) ApplianceFigure 195. 3. From the clien

Strany 255

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections328ProSecure Unified Threat Management (UTM) Appliance Configure Keep-Alives and Dead

Strany 256

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections329 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as expla

Strany 257

Introduction33 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM5, UTM10, and UTM25The rear panel of the UTM5, UTM10, and UTM25 includ

Strany 258 - Application Access

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections330ProSecure Unified Threat Management (UTM) Appliance 3. In the IKE SA Parameters se

Strany 259 - • Application

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections331 ProSecure Unified Threat Management (UTM) ApplianceFigure 198. 3. Select the Ena

Strany 260

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections332ProSecure Unified Threat Management (UTM) Appliance  To enable the PPTP server an

Strany 261

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections333 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your se

Strany 262

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections334ProSecure Unified Threat Management (UTM) Appliance The List of PPTP Active Users

Strany 263 - Figure 148

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections335 ProSecure Unified Threat Management (UTM) ApplianceFigure 201. 2. Enter the sett

Strany 264 - Virtual Private Networking

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections336ProSecure Unified Threat Management (UTM) Appliance View the Active L2TP Users To

Strany 265

33788. Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically to provide remote acc

Strany 266 - Configurations

Virtual Private Networking Using SSL Connections338ProSecure Unified Threat Management (UTM) Appliance • SSL port forwarding. Like an SSL VPN tunnel,

Strany 267 - Figure 152

Virtual Private Networking Using SSL Connections339 ProSecure Unified Threat Management (UTM) Appliance2. Select the SSL VPN Wizard radio button.3. Cl

Strany 268 - Figure 153

Introduction34ProSecure Unified Threat Management (UTM) Appliance Viewed from left to right, the rear panel of the UTM5, UTM10, and UTM25 contains the

Strany 269

Virtual Private Networking Using SSL Connections340ProSecure Unified Threat Management (UTM) Appliance WARNING:Do not enter an existing portal layout

Strany 270 - Figure 154

Virtual Private Networking Using SSL Connections341 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V

Strany 271 - Figure 156

Virtual Private Networking Using SSL Connections342ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 2 of 6 (Domain Settings)Fig

Strany 272 - Figure 157

Virtual Private Networking Using SSL Connections343 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing domain name in

Strany 273

Virtual Private Networking Using SSL Connections344ProSecure Unified Threat Management (UTM) Appliance Authentication Type(continued)• WIKID-CHAP. WiK

Strany 274

Virtual Private Networking Using SSL Connections345 ProSecure Unified Threat Management (UTM) AppliancePortal The portal that you selected on the firs

Strany 275 - Figure 158

Virtual Private Networking Using SSL Connections346ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V

Strany 276 - Figure 159

Virtual Private Networking Using SSL Connections347 ProSecure Unified Threat Management (UTM) ApplianceSSL VPN Wizard Step 3 of 6 (User Settings)Figur

Strany 277 - Figure 161

Virtual Private Networking Using SSL Connections348ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V

Strany 278 - Figure 163

Virtual Private Networking Using SSL Connections349 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing route for a VP

Strany 279

Introduction35 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM9S and UTM25SThe rear panel of the UTM9S and UTM25S includes the cable

Strany 280 - Figure 164

Virtual Private Networking Using SSL Connections350ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 5 of 6 (Port Forwarding)Not

Strany 281 - Figure 166

Virtual Private Networking Using SSL Connections351 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V

Strany 282 - Figure 167

Virtual Private Networking Using SSL Connections352ProSecure Unified Threat Management (UTM) Appliance Figure 209.

Strany 283 - Figure 168

Virtual Private Networking Using SSL Connections353 ProSecure Unified Threat Management (UTM) ApplianceClick Apply to save your settings. If the setti

Strany 284

Virtual Private Networking Using SSL Connections354ProSecure Unified Threat Management (UTM) Appliance Figure 211. 3. To verify access, enter the use

Strany 285 - Figure 169

Virtual Private Networking Using SSL Connections355 ProSecure Unified Threat Management (UTM) ApplianceFigure 212. Figure 213. A portal screen displ

Strany 286 - Figure 170

Virtual Private Networking Using SSL Connections356ProSecure Unified Threat Management (UTM) Appliance Note: The first time that a user attempts to co

Strany 287 - Information

Virtual Private Networking Using SSL Connections357 ProSecure Unified Threat Management (UTM) ApplianceView the UTM SSL VPN Log To query the SSL VPN

Strany 288 - Figure 175

Virtual Private Networking Using SSL Connections358ProSecure Unified Threat Management (UTM) Appliance 2. Create authentication domains, user groups,

Strany 289 - Figure 177

Virtual Private Networking Using SSL Connections359 ProSecure Unified Threat Management (UTM) ApplianceManually Create or Modify the Portal LayoutThe

Strany 290 - View the UTM IPSec VPN Log

Introduction36ProSecure Unified Threat Management (UTM) Appliance Bottom Panels with Product LabelsThe product label on the bottom of the UTM’s enclos

Strany 291 - Figure 178

Virtual Private Networking Using SSL Connections360ProSecure Unified Threat Management (UTM) Appliance The List of Layouts table displays the followin

Strany 292 - Manage IKE Policies

Virtual Private Networking Using SSL Connections361 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and select the check box

Strany 293 - Figure 179

Virtual Private Networking Using SSL Connections362ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new p

Strany 294

Virtual Private Networking Using SSL Connections363 ProSecure Unified Threat Management (UTM) ApplianceConfigure Applications for Port ForwardingPort

Strany 295 - Figure 180

Virtual Private Networking Using SSL Connections364ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new applicat

Strany 296

Virtual Private Networking Using SSL Connections365 ProSecure Unified Threat Management (UTM) Appliance2. In the Add New Host Name for Port Forwarding

Strany 297

Virtual Private Networking Using SSL Connections366ProSecure Unified Threat Management (UTM) Appliance Configure the Client IP Address RangeFirst dete

Strany 298

Virtual Private Networking Using SSL Connections367 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings. VPN tunne

Strany 299 -  To edit an IKE policy:

Virtual Private Networking Using SSL Connections368ProSecure Unified Threat Management (UTM) Appliance  To change the specifications of an existing r

Strany 300 - Manage VPN Policies

Virtual Private Networking Using SSL Connections369 ProSecure Unified Threat Management (UTM) ApplianceUse Network Resource Objects to Simplify Polici

Strany 301 - Figure 181

Introduction37 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25:Figure 14. The following

Strany 302

Virtual Private Networking Using SSL Connections370ProSecure Unified Threat Management (UTM) Appliance  To delete one or more network resources:1. Se

Strany 303 - Figure 182

Virtual Private Networking Using SSL Connections371 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new c

Strany 304

Virtual Private Networking Using SSL Connections372ProSecure Unified Threat Management (UTM) Appliance For example, assume the following global policy

Strany 305

Virtual Private Networking Using SSL Connections373 ProSecure Unified Threat Management (UTM) ApplianceView Policies To view the existing policies:1.

Strany 306

Virtual Private Networking Using SSL Connections374ProSecure Unified Threat Management (UTM) Appliance .Figure 224. 3. Select the radio buttons, comp

Strany 307

Virtual Private Networking Using SSL Connections375 ProSecure Unified Threat Management (UTM) ApplianceApply Policy For(continued)Network ResourcePoli

Strany 308 -  To edit a VPN policy:

Virtual Private Networking Using SSL Connections376ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The polic

Strany 309

Virtual Private Networking Using SSL Connections377 ProSecure Unified Threat Management (UTM) Appliance To delete one or more SSL VPN policies:1. On

Strany 310 - User Database Configuration

37899. Manage Users, Authentication, and VPN CertificatesThis chapter describes how to manage users, authentication, and security certificates for I

Strany 311

Manage Users, Authentication, and VPN Certificates379 ProSecure Unified Threat Management (UTM) ApplianceThe UTM supports security policies that are b

Strany 312 - Mode Config Operation

Introduction38ProSecure Unified Threat Management (UTM) Appliance The following figure shows the product label for the UTM150:Figure 16. The following

Strany 313 - Figure 184

Manage Users, Authentication, and VPN Certificates380ProSecure Unified Threat Management (UTM) Appliance Configure Authentication Domains, Groups, and

Strany 314 - Figure 185

Manage Users, Authentication, and VPN Certificates381 ProSecure Unified Threat Management (UTM) ApplianceFigure 225. Users with Special Access Privile

Strany 315 - Config Records table

Manage Users, Authentication, and VPN Certificates382ProSecure Unified Threat Management (UTM) Appliance Figure 226. The User Portal Login screen disp

Strany 316 - Figure 186

Manage Users, Authentication, and VPN Certificates383 ProSecure Unified Threat Management (UTM) ApplianceFigure 227. If you do not use the DC agent in

Strany 317

Manage Users, Authentication, and VPN Certificates384ProSecure Unified Threat Management (UTM) Appliance For information about how to configure and mo

Strany 318

Manage Users, Authentication, and VPN Certificates385 ProSecure Unified Threat Management (UTM) Appliance• An OU is created in the root node (for exam

Strany 319

Manage Users, Authentication, and VPN Certificates386ProSecure Unified Threat Management (UTM) Appliance Figure 228. 4. To verify Jamie Hanson’s user

Strany 320 - Figure 187

Manage Users, Authentication, and VPN Certificates387 ProSecure Unified Threat Management (UTM) Appliance6. Select Users > Domains. 7. Click Add. T

Strany 321 - Figure 189

Manage Users, Authentication, and VPN Certificates388ProSecure Unified Threat Management (UTM) Appliance Figure 231. 14. Complete the remaining field

Strany 322 - Figure 190

Manage Users, Authentication, and VPN Certificates389 ProSecure Unified Threat Management (UTM) ApplianceThe List of Domains table displays the domain

Strany 323

Introduction39 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25S:Figure 18. Choose a Loca

Strany 324 - Figure 191

Manage Users, Authentication, and VPN Certificates390ProSecure Unified Threat Management (UTM) Appliance 3. Enter the settings as explained in the fol

Strany 325 - Figure 192

Manage Users, Authentication, and VPN Certificates391 ProSecure Unified Threat Management (UTM) ApplianceAuthentication Type(continued)Note: If you se

Strany 326 - Figure 194

Manage Users, Authentication, and VPN Certificates392ProSecure Unified Threat Management (UTM) Appliance Authentication Secret All RADIUS, WiKID, and

Strany 327 - Figure 195

Manage Users, Authentication, and VPN Certificates393 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The dom

Strany 328 - Configure Keep-Alives

Manage Users, Authentication, and VPN Certificates394ProSecure Unified Threat Management (UTM) Appliance  To delete one or more domains:1. In the Lis

Strany 329 - Configure Dead Peer Detection

Manage Users, Authentication, and VPN Certificates395 ProSecure Unified Threat Management (UTM) ApplianceCreate and Delete Groups To create a VPN gro

Strany 330

Manage Users, Authentication, and VPN Certificates396ProSecure Unified Threat Management (UTM) Appliance 2. In the Add New Group section of the screen

Strany 331 - Configure the PPTP Server

Manage Users, Authentication, and VPN Certificates397 ProSecure Unified Threat Management (UTM) ApplianceFigure 235. Except for groups that are assoc

Strany 332 - Figure 199

Manage Users, Authentication, and VPN Certificates398ProSecure Unified Threat Management (UTM) Appliance Figure 236. 2. Under the Custom Groups table

Strany 333 - View the Active PPTP Users

Manage Users, Authentication, and VPN Certificates399 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and make your selectio

Strany 334 - Configure the L2TP Server

4ProSecure Unified Threat Management (UTM) Appliance 202-10780-01 1.0 September 2011 • Added the UTM9S with the following major new features:- xDSL m

Strany 335 - Figure 201

Introduction40ProSecure Unified Threat Management (UTM) Appliance Use the Rack-Mounting KitUse the mounting kit for the UTM to install the appliance i

Strany 336 - View the Active L2TP Users

Manage Users, Authentication, and VPN Certificates400ProSecure Unified Threat Management (UTM) Appliance 4. After you have specified all members of th

Strany 337 - Using SSL Connections

Manage Users, Authentication, and VPN Certificates401 ProSecure Unified Threat Management (UTM) ApplianceConfigure User AccountsThe UTM supports both

Strany 338 - Figure 203

Manage Users, Authentication, and VPN Certificates402ProSecure Unified Threat Management (UTM) Appliance Figure 238. The List of Users table displays

Strany 339 - Figure 204

Manage Users, Authentication, and VPN Certificates403 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the fol

Strany 340

Manage Users, Authentication, and VPN Certificates404ProSecure Unified Threat Management (UTM) Appliance Set User Login PoliciesYou can restrict the a

Strany 341

Manage Users, Authentication, and VPN Certificates405 ProSecure Unified Threat Management (UTM) ApplianceConfigure Login Restrictions Based on IP Addr

Strany 342 - Figure 205

Manage Users, Authentication, and VPN Certificates406ProSecure Unified Threat Management (UTM) Appliance 6. In the Add Defined Addresses section of th

Strany 343 - WARNING:

Manage Users, Authentication, and VPN Certificates407 ProSecure Unified Threat Management (UTM) ApplianceFigure 242. 4. In the Defined Browsers Statu

Strany 344

Manage Users, Authentication, and VPN Certificates408ProSecure Unified Threat Management (UTM) Appliance Change Passwords and Other User SettingsFor a

Strany 345

Manage Users, Authentication, and VPN Certificates409 ProSecure Unified Threat Management (UTM) Appliance3. Modify the settings as explained in the fo

Strany 346

4122. Use the Setup Wizard to Provision the UTM in Your NetworkThis chapter explains how to log in to the UTM and use the web management interface,

Strany 347 - Figure 206

Manage Users, Authentication, and VPN Certificates410ProSecure Unified Threat Management (UTM) Appliance Note: The DC agent does not function with LDA

Strany 348 - Figure 207

Manage Users, Authentication, and VPN Certificates411 ProSecure Unified Threat Management (UTM) Appliance To download ProSecure DC Agent software and

Strany 349

Manage Users, Authentication, and VPN Certificates412ProSecure Unified Threat Management (UTM) Appliance 4. On the DC Agent screen (see Figure 244 on

Strany 350 - Figure 208

Manage Users, Authentication, and VPN Certificates413 ProSecure Unified Threat Management (UTM) Applianceb. Click the Add table button to add a domain

Strany 351

Manage Users, Authentication, and VPN Certificates414ProSecure Unified Threat Management (UTM) Appliance 2. Add a DC agent on the UTM50:a. Select User

Strany 352 - Figure 209

Manage Users, Authentication, and VPN Certificates415 ProSecure Unified Threat Management (UTM) ApplianceConfigure RADIUS VLANsYou can use a RADIUS vi

Strany 353 - Access the New SSL VPN Portal

Manage Users, Authentication, and VPN Certificates416ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new VLAN i

Strany 354 - Figure 211

Manage Users, Authentication, and VPN Certificates417 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save the session settings.5

Strany 355 - Figure 213

Manage Users, Authentication, and VPN Certificates418ProSecure Unified Threat Management (UTM) Appliance  To view all or selected users:1. On the Act

Strany 356 - Figure 214

Manage Users, Authentication, and VPN Certificates419 ProSecure Unified Threat Management (UTM) ApplianceThe List of Users table displays the followin

Strany 357 - View the UTM SSL VPN Log

Use the Setup Wizard to Provision the UTM in Your Network42ProSecure Unified Threat Management (UTM) Appliance 4. Verify the installation. See Verify

Strany 358

Manage Users, Authentication, and VPN Certificates420ProSecure Unified Threat Management (UTM) Appliance On the UTM, the uploaded digital certificate

Strany 359 - Figure 216

Manage Users, Authentication, and VPN Certificates421 ProSecure Unified Threat Management (UTM) Appliance• Active Self Certificates table. Contains th

Strany 360 - Figure 217

Manage Users, Authentication, and VPN Certificates422ProSecure Unified Threat Management (UTM) Appliance  To upload a digital certificate of a truste

Strany 361

Manage Users, Authentication, and VPN Certificates423 ProSecure Unified Threat Management (UTM) ApplianceGenerate a CSR and Obtain a Self-Signed Certi

Strany 362 -  To edit a portal layout:

Manage Users, Authentication, and VPN Certificates424ProSecure Unified Threat Management (UTM) Appliance 2. In the Generate Self Certificate Request s

Strany 363 - Add Servers and Port Numbers

Manage Users, Authentication, and VPN Certificates425 ProSecure Unified Threat Management (UTM) ApplianceFigure 256. 5. Copy the contents of the Data

Strany 364 - Add a Host Name

Manage Users, Authentication, and VPN Certificates426ProSecure Unified Threat Management (UTM) Appliance  To delete one or more SCRs:1. In the Self C

Strany 365 - Configure the SSL VPN Client

Manage Users, Authentication, and VPN Certificates427 ProSecure Unified Threat Management (UTM) ApplianceThe Certificate Revocation Lists (CRL) table

Strany 366 - Figure 219

4281010. Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its performance and the system m

Strany 367

Network and System Management429 ProSecure Unified Threat Management (UTM) Appliance- Auto-rollover mode (multiple WAN port models only). 1000 Mbps (o

Strany 368 - Figure 220

Use the Setup Wizard to Provision the UTM in Your Network43 ProSecure Unified Threat Management (UTM) ApplianceFigure 20. 3. In the User Name field,

Strany 369 - Add New Network Resources

Network and System Management430ProSecure Unified Threat Management (UTM) Appliance The following section summarizes the various criteria that you can

Strany 370 - Figure 222

Network and System Management431 ProSecure Unified Threat Management (UTM) Appliance• QoS profile. You can define QoS profiles and then apply them to

Strany 371

Network and System Management432ProSecure Unified Threat Management (UTM) Appliance - Web services blocking. You can block web services such as instan

Strany 372 - Global Default Policy

Network and System Management433 ProSecure Unified Threat Management (UTM) ApplianceEach rule lets you specify the desired action for the connections

Strany 373 - Add a Policy

Network and System Management434ProSecure Unified Threat Management (UTM) Appliance • Users allowed. You can specify that the rule applies to individu

Strany 374 - Figure 224

Network and System Management435 ProSecure Unified Threat Management (UTM) ApplianceConfigure Exposed HostsSpecifying an exposed host allows you to se

Strany 375

Network and System Management436ProSecure Unified Threat Management (UTM) Appliance Monitoring Tools for Traffic ManagementThe UTM includes several to

Strany 376 -  To edit an SSL VPN policy:

Network and System Management437 ProSecure Unified Threat Management (UTM) Appliance2. In the Action column of the List of Users table, click the Edit

Strany 377 - For More SSL VPN Information

Network and System Management438ProSecure Unified Threat Management (UTM) Appliance Note: For enhanced security, restrict access to as few external IP

Strany 378 - Certificates

Network and System Management439 ProSecure Unified Threat Management (UTM) Appliance2. Select one of the following radio buttons:• Yes. Enable HTTPS r

Strany 379

Use the Setup Wizard to Provision the UTM in Your Network44ProSecure Unified Threat Management (UTM) Appliance Figure 21. Web Management Interface Men

Strany 380 - Login Portals

Network and System Management440ProSecure Unified Threat Management (UTM) Appliance Note: If you are unable to connect remotely to the UTM after enabl

Strany 381 - Figure 225

Network and System Management441 ProSecure Unified Threat Management (UTM) ApplianceFigure 261.

Strany 382 - Figure 226

Network and System Management442ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:3. Click

Strany 383 - Figure 227

Network and System Management443 ProSecure Unified Threat Management (UTM) Appliance To configure the SNMPv3 settings:1. Select Administration > S

Strany 384 - How an Active Directory Works

Network and System Management444ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The SNMPv3 user profile is a

Strany 385

Network and System Management445 ProSecure Unified Threat Management (UTM) ApplianceThe SNMPv3 Settings table shows the following columns:• User Name.

Strany 386 - 5. Log in to the UTM

Network and System Management446ProSecure Unified Threat Management (UTM) Appliance Figure 263. Back Up SettingsThe backup feature saves all UTM setti

Strany 387 - Figure 230

Network and System Management447 ProSecure Unified Threat Management (UTM) ApplianceRestore SettingsWARNING:Restore only settings that were backed up

Strany 388 - Configure Domains

Network and System Management448ProSecure Unified Threat Management (UTM) Appliance WARNING:When you press the hardware Factory Defaults reset button

Strany 389 - Figure 233

Network and System Management449 ProSecure Unified Threat Management (UTM) ApplianceFigure 264. Firmware screen, available versionsThe Firmware Reboo

Strany 390

Use the Setup Wizard to Provision the UTM in Your Network45 ProSecure Unified Threat Management (UTM) ApplianceFigure 22. The web management interface

Strany 391

Network and System Management450ProSecure Unified Threat Management (UTM) Appliance  To upgrade the UTM’s firmware directly from an update server and

Strany 392

Network and System Management451 ProSecure Unified Threat Management (UTM) ApplianceThe UTM reboots automatically. During the reboot process, the Firm

Strany 393

Network and System Management452ProSecure Unified Threat Management (UTM) Appliance  To upgrade the UTM’s firmware from a downloaded file and reboot

Strany 394 - Configure Groups

Network and System Management453 ProSecure Unified Threat Management (UTM) Appliance3. (Optional) To install the new firmware version and reboot the U

Strany 395 - Create and Delete Groups

Network and System Management454ProSecure Unified Threat Management (UTM) Appliance Reboot without Changing the Firmware To reboot the UTM without ch

Strany 396 - Edit Groups

Network and System Management455 ProSecure Unified Threat Management (UTM) ApplianceFigure 267. The Info section onscreen shows the following informat

Strany 397 - Configure Custom Groups

Network and System Management456ProSecure Unified Threat Management (UTM) Appliance Configure Automatic Update and Frequency Settings To configure th

Strany 398 - Figure 237

Network and System Management457 ProSecure Unified Threat Management (UTM) Appliance To set time, date, and NTP servers:1. Select Administration >

Strany 399

Network and System Management458ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: If you select the defau

Strany 400

Network and System Management459 ProSecure Unified Threat Management (UTM) ApplianceLog StorageAfter you have integrated a ReadyNAS with the UTM—wheth

Strany 401 - Configure User Accounts

Use the Setup Wizard to Provision the UTM in Your Network46ProSecure Unified Threat Management (UTM) Appliance • Back. Go to the previous screen (for

Strany 402 - Figure 239

Network and System Management460ProSecure Unified Threat Management (UTM) Appliance Figure 269. 2. To connect to the ReadyNAS, select the Yes radio b

Strany 403

Network and System Management461 ProSecure Unified Threat Management (UTM) ApplianceFigure 270. 2. To enable the UTM to quarantine files, select the

Strany 404 - Set User Login Policies

4621111. Monitor System Access and PerformanceThis chapter describes the system-monitoring features of the UTM. You can be alerted to important even

Strany 405 - Figure 241

Monitor System Access and Performance463 ProSecure Unified Threat Management (UTM) Appliance To monitor traffic limits on each of the WAN ports, and

Strany 406

Monitor System Access and Performance464ProSecure Unified Threat Management (UTM) Appliance Table 114. WAN traffic meter settingsSetting DescriptionE

Strany 407 - Figure 242

Monitor System Access and Performance465 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.4. For the multiple W

Strany 408 - Figure 243

Monitor System Access and Performance466ProSecure Unified Threat Management (UTM) Appliance Configure Logging, Alerts, and Event Notifications• Config

Strany 409 - DC Agent

Monitor System Access and Performance467 ProSecure Unified Threat Management (UTM) ApplianceFigure 273. 6. Enter the settings as explained in the fol

Strany 410

Monitor System Access and Performance468ProSecure Unified Threat Management (UTM) Appliance  To configure and activate logs:1. Select Monitoring >

Strany 411 - Figure 245

Monitor System Access and Performance469 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:

Strany 412 -  To edit a DC agent:

Use the Setup Wizard to Provision the UTM in Your Network47 ProSecure Unified Threat Management (UTM) ApplianceUse the Setup Wizard to Perform the Ini

Strany 413 - Figure 246

Monitor System Access and Performance470ProSecure Unified Threat Management (UTM) Appliance Enable (continued)Select Logs to Send(continued)• Service

Strany 414 - Figure 248

Monitor System Access and Performance471 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings, or click Clear Log I

Strany 415 - Configure RADIUS VLANs

Monitor System Access and Performance472ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save the settings. To change the remote

Strany 416 - Figure 250

Monitor System Access and Performance473 ProSecure Unified Threat Management (UTM) Appliance To specify the syslog server that is connected to Gatewa

Strany 417 - View and Log Out Active Users

Monitor System Access and Performance474ProSecure Unified Threat Management (UTM) Appliance Figure 275. 2. Enter the settings as explained in the fol

Strany 418 - Figure 252

Monitor System Access and Performance475 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Enable Malware Alerts

Strany 419

Monitor System Access and Performance476ProSecure Unified Threat Management (UTM) Appliance Configure and Activate Firewall LogsYou can configure the

Strany 420 - VPN Certificates Screen

Monitor System Access and Performance477 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Monitor Real-Time Tra

Strany 421 - Manage CA Certificates

Monitor System Access and Performance478ProSecure Unified Threat Management (UTM) Appliance Figure 277. Dashboard, screen 1 of 3To clear the statistic

Strany 422 - Figure 254

Monitor System Access and Performance479 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro

Strany 423

Use the Setup Wizard to Provision the UTM in Your Network48ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 1 of 10: LAN Settings

Strany 424

Monitor System Access and Performance480ProSecure Unified Threat Management (UTM) Appliance Figure 278. Dashboard, screen 2 of 3Threats (Counts)This i

Strany 425 - Figure 256

Monitor System Access and Performance481 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Most Recent

Strany 426 -  To delete one or more SCRs:

Monitor System Access and Performance482ProSecure Unified Threat Management (UTM) Appliance Figure 279. Dashboard, screen 3 of 3The following table ex

Strany 427 -  To delete one or more CRLs:

Monitor System Access and Performance483 ProSecure Unified Threat Management (UTM) ApplianceMonitor Application Use in Real TimeIf you have enabled ap

Strany 428 - Network and System Management

Monitor System Access and Performance484ProSecure Unified Threat Management (UTM) Appliance Figure 280. Line chart iconPie chart icon

Strany 429 - Features That Reduce Traffic

Monitor System Access and Performance485 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro

Strany 430

Monitor System Access and Performance486ProSecure Unified Threat Management (UTM) Appliance View Status Screens• View the System Status• View the Acti

Strany 431 - Content Filtering

Monitor System Access and Performance487 ProSecure Unified Threat Management (UTM) ApplianceView the System Status ScreenTo view the System Status scr

Strany 432 - Source MAC Filtering

Monitor System Access and Performance488ProSecure Unified Threat Management (UTM) Appliance View the Network Status ScreenTo view the Network Status s

Strany 433

Monitor System Access and Performance489 ProSecure Unified Threat Management (UTM) Applianceavailable wireless access point, and has a Wireless Statis

Strany 434 - Configure the DMZ Port

Use the Setup Wizard to Provision the UTM in Your Network49 ProSecure Unified Threat Management (UTM) ApplianceTable 4. Setup Wizard Step 1: LAN Sett

Strany 435 - Assign Bandwidth Profiles

Monitor System Access and Performance490ProSecure Unified Threat Management (UTM) Appliance View the Router Statistics Screen To view the Router Stat

Strany 436 - System Management

Monitor System Access and Performance491 ProSecure Unified Threat Management (UTM) ApplianceTo change the poll interval period, enter a new value in t

Strany 437 - Figure 259

Monitor System Access and Performance492ProSecure Unified Threat Management (UTM) Appliance The following table explains the fields of the Wireless St

Strany 438 - Figure 260

Monitor System Access and Performance493 ProSecure Unified Threat Management (UTM) ApplianceView the Detailed Status ScreenTo view the Detailed Status

Strany 439

Monitor System Access and Performance494ProSecure Unified Threat Management (UTM) Appliance Figure 287. Detailed Status screen sections that are speci

Strany 440

Monitor System Access and Performance495 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Detailed St

Strany 441 - Figure 261

Monitor System Access and Performance496ProSecure Unified Threat Management (UTM) Appliance Firmware Version (UTM9S and UTM25S only)The firmware on th

Strany 442

Monitor System Access and Performance497 ProSecure Unified Threat Management (UTM) ApplianceMAC Address For the WAN or xDSL ports, this field displays

Strany 443 - Table 109. SNMPv3 settings

Monitor System Access and Performance498ProSecure Unified Threat Management (UTM) Appliance View the VLAN Status ScreenThe VLAN Status screen displays

Strany 444 - SNMPv3 settings (continued)

Monitor System Access and Performance499 ProSecure Unified Threat Management (UTM) ApplianceView the xDSL Statistics Screen (UTM9S and UTM25S Only)To

Strany 445 - Manage the Configuration File

5ContentsChapter 1 IntroductionWhat Is the ProSecure Unified Threat Management (UTM) Appliance? . .15Key Features and Capabilities . . . . . . . . . .

Strany 446 - Back Up Settings

Use the Setup Wizard to Provision the UTM in Your Network50ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server(continued)Primary DN

Strany 447 - Restore Settings

Monitor System Access and Performance500ProSecure Unified Threat Management (UTM) Appliance View the VPN Tunnel Connection StatusTo review the status

Strany 448 - Update the Firmware

Monitor System Access and Performance501 ProSecure Unified Threat Management (UTM) ApplianceFigure 292. The active user’s user name, group, and IP add

Strany 449

Monitor System Access and Performance502ProSecure Unified Threat Management (UTM) Appliance The default poll interval is 5 seconds. To change the poll

Strany 450

Monitor System Access and Performance503 ProSecure Unified Threat Management (UTM) ApplianceFigure 295. 2. Select the Status option arrow in the uppe

Strany 451

Monitor System Access and Performance504ProSecure Unified Threat Management (UTM) Appliance View the WAN, xDSL, or USB Port StatusYou can view the sta

Strany 452

Monitor System Access and Performance505 ProSecure Unified Threat Management (UTM) ApplianceDepending on the type of connections, any of the following

Strany 453

Monitor System Access and Performance506ProSecure Unified Threat Management (UTM) Appliance Figure 298. 2. Select the LAN Groups submenu tab. The LAN

Strany 454

Monitor System Access and Performance507 ProSecure Unified Threat Management (UTM) Appliancemanually to add a meaningful name). If the computer or dev

Strany 455 - Figure 267

Monitor System Access and Performance508ProSecure Unified Threat Management (UTM) Appliance Overview of the LogsThe UTM generates logs that provide de

Strany 456

Monitor System Access and Performance509 ProSecure Unified Threat Management (UTM) ApplianceYou can query and generate each type of log separately and

Strany 457 - Figure 268

Use the Setup Wizard to Provision the UTM in Your Network51 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t

Strany 458 - Settings

Monitor System Access and Performance510ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:

Strany 459 - Connect to a ReadyNAS

Monitor System Access and Performance511 ProSecure Unified Threat Management (UTM) ApplianceView All Select one of the following radio buttons:• View

Strany 460 - Figure 269

Monitor System Access and Performance512ProSecure Unified Threat Management (UTM) Appliance Search Criteria(continued)Category or CategoriesFrom the d

Strany 461 - Figure 270

Monitor System Access and Performance513 ProSecure Unified Threat Management (UTM) Appliance3. Click one of the following action buttons:• Search. Que

Strany 462 - Performance

Monitor System Access and Performance514ProSecure Unified Threat Management (UTM) Appliance Log ManagementGenerated logs take up space and resources o

Strany 463 - Figure 271

Monitor System Access and Performance515 ProSecure Unified Threat Management (UTM) ApplianceQuery the Quarantined Logs To query the quarantine logs:1

Strany 464

Monitor System Access and Performance516ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:

Strany 465 - Figure 272

Monitor System Access and Performance517 ProSecure Unified Threat Management (UTM) ApplianceView and Manage the Quarantined Spam TableWhen you query t

Strany 466

Monitor System Access and Performance518ProSecure Unified Threat Management (UTM) Appliance After you have selected one or more table entries, take on

Strany 467 - Figure 273

Monitor System Access and Performance519 ProSecure Unified Threat Management (UTM) Appliance• Client IP. The client IP address from which the spyware

Strany 468 - Figure 274

Use the Setup Wizard to Provision the UTM in Your Network52ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the

Strany 469

Monitor System Access and Performance520ProSecure Unified Threat Management (UTM) Appliance 2. Click the Check your quarantined mail link. The followi

Strany 470

Monitor System Access and Performance521 ProSecure Unified Threat Management (UTM) ApplianceYou can view the reports onscreen, download them to your c

Strany 471 - Configure Gateway 1 at Site 1

Monitor System Access and Performance522ProSecure Unified Threat Management (UTM) Appliance 2. Select the Enable Application Session Monitoring check

Strany 472 - Configure Gateway 2 at Site 2

Monitor System Access and Performance523 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:

Strany 473

Monitor System Access and Performance524ProSecure Unified Threat Management (UTM) Appliance 3. The next step depends on whether you want to view the r

Strany 474 - Figure 275

Monitor System Access and Performance525 ProSecure Unified Threat Management (UTM) ApplianceFigure 309. Report, screen 2 of 4Note: For information ab

Strany 475

Monitor System Access and Performance526ProSecure Unified Threat Management (UTM) Appliance URL Filtering by Time For the HTTPS and HTTP protocols sep

Strany 476 - Figure 276

Monitor System Access and Performance527 ProSecure Unified Threat Management (UTM) ApplianceTop n Categories By Request For all web server protocols c

Strany 477

Monitor System Access and Performance528ProSecure Unified Threat Management (UTM) Appliance Top n Applications by BandwidthA chart and a table with th

Strany 478

Monitor System Access and Performance529 ProSecure Unified Threat Management (UTM) ApplianceSchedule, Email, and Manage Reports To schedule automatic

Strany 479 -  To set the poll interval:

Use the Setup Wizard to Provision the UTM in Your Network53 ProSecure Unified Threat Management (UTM) ApplianceAustria (PPTP)(continued)My IP Address

Strany 480

Monitor System Access and Performance530ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings in the Schedule Reports section as e

Strany 481 - Dashboard screen:

Monitor System Access and Performance531 ProSecure Unified Threat Management (UTM) ApplianceFigure 311. Report, screen 4 of 4The Report History sectio

Strany 482

Monitor System Access and Performance532ProSecure Unified Threat Management (UTM) Appliance To display the Diagnostics screen, select Monitoring >

Strany 483

Monitor System Access and Performance533 ProSecure Unified Threat Management (UTM) ApplianceTrace a RouteA traceroute lists all routers between the so

Strany 484 - Figure 280

Monitor System Access and Performance534ProSecure Unified Threat Management (UTM) Appliance out which applications are using the most bandwidth, which

Strany 485

Monitor System Access and Performance535 ProSecure Unified Threat Management (UTM) ApplianceFigure 314. Diagnostics, screen 3 of 4Gather Important Log

Strany 486 - View Status Screens

Monitor System Access and Performance536ProSecure Unified Threat Management (UTM) Appliance Perform Maintenance on the USB Device, Reboot the UTM,or S

Strany 487 - View the System Status Screen

Monitor System Access and Performance537 ProSecure Unified Threat Management (UTM) ApplianceNote: Rebooting breaks any existing connections either to

Strany 488

5381212. Troubleshoot and Use Online SupportThis chapter provides troubleshooting tips and information for the UTM. After each problem description,

Strany 489 - Network Status screen:

Troubleshoot and Use Online Support539 ProSecure Unified Threat Management (UTM) ApplianceBasic Functioning• Verify the Correct Sequence of Events at

Strany 490 - Figure 284

Use the Setup Wizard to Provision the UTM in Your Network54ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Strany 491 - Figure 285

Troubleshoot and Use Online Support540ProSecure Unified Threat Management (UTM) Appliance  If all LEDs are still on more than several minutes minute

Strany 492

Troubleshoot and Use Online Support541 ProSecure Unified Threat Management (UTM) Appliance• Make sure that you are using the correct login information

Strany 493 - Figure 286

Troubleshoot and Use Online Support542ProSecure Unified Threat Management (UTM) Appliance  To check the WAN IP address: 1. Launch your browser and na

Strany 494

Troubleshoot and Use Online Support543 ProSecure Unified Threat Management (UTM) ApplianceIf your UTM can obtain an IP address, but an attached comput

Strany 495

Troubleshoot and Use Online Support544ProSecure Unified Threat Management (UTM) Appliance - Check that the corresponding Link LEDs are on for your

Strany 496

Troubleshoot and Use Online Support545 ProSecure Unified Threat Management (UTM) ApplianceRestore the Default Configuration and PasswordTo reset the U

Strany 497

Troubleshoot and Use Online Support546ProSecure Unified Threat Management (UTM) Appliance Problems with Date and TimeThe System Date & Time screen

Strany 498 - View the VLAN Status Screen

Troubleshoot and Use Online Support547 ProSecure Unified Threat Management (UTM) ApplianceFigure 317. 2. In the Support Key field, enter the support

Strany 499 - View the Active VPN Users

Troubleshoot and Use Online Support548ProSecure Unified Threat Management (UTM) Appliance Figure 318. 2. Enter the settings as explained in the follo

Strany 500 - Figure 291

549AA. xDSL Network Module for the UTM9S and UTM25SThis appendix describes how to configure the DSL interfaces of the NMSDSLA and NMSDSLB network mo

Strany 501 - Figure 293

Use the Setup Wizard to Provision the UTM in Your Network55 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the

Strany 502 - Figure 294

xDSL Network Module for the UTM9S and UTM25S550ProSecure Unified Threat Management (UTM) AppliancexDSL Network Module Configuration TasksGenerally, si

Strany 503 - Figure 296

xDSL Network Module for the UTM9S and UTM25S551ProSecure Unified Threat Management (UTM) Appliance To configure the xDSL settings:1. Select Network C

Strany 504 - Figure 297

xDSL Network Module for the UTM9S and UTM25S552ProSecure Unified Threat Management (UTM) ApplianceFigure 321. 4. Either click Auto Detect or, if you

Strany 505 - View Attached Devices

xDSL Network Module for the UTM9S and UTM25S553ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Automatically D

Strany 506 - Figure 299

xDSL Network Module for the UTM9S and UTM25S554ProSecure Unified Threat Management (UTM) ApplianceYou can set the failure detection method for the DSL

Strany 507 - Query and Manage the Logs

xDSL Network Module for the UTM9S and UTM25S555ProSecure Unified Threat Management (UTM) Appliance3. Click the Auto Detect button at the bottom of the

Strany 508 - Overview of the Logs

xDSL Network Module for the UTM9S and UTM25S556ProSecure Unified Threat Management (UTM) ApplianceFigure 324. Note: The Connection Status screen shou

Strany 509 - Query and Download Logs

xDSL Network Module for the UTM9S and UTM25S557ProSecure Unified Threat Management (UTM) ApplianceFigure 325. 2. Click the Edit button in the Action

Strany 510

xDSL Network Module for the UTM9S and UTM25S558ProSecure Unified Threat Management (UTM) Appliance6. If your connection is Point-to-Point Protocol ove

Strany 511

xDSL Network Module for the UTM9S and UTM25S559ProSecure Unified Threat Management (UTM) Appliance8. In the Domain Name Server (DNS) Servers section o

Strany 512

Use the Setup Wizard to Provision the UTM in Your Network56ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the

Strany 513

xDSL Network Module for the UTM9S and UTM25S560ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the SLOT-x ISP

Strany 514 - Log Management

xDSL Network Module for the UTM9S and UTM25S561ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the manual ISP configuration is

Strany 515 - Query the Quarantined Logs

xDSL Network Module for the UTM9S and UTM25S562ProSecure Unified Threat Management (UTM) Appliance• Primary WAN mode. The DSL interface (or a WAN inte

Strany 516

xDSL Network Module for the UTM9S and UTM25S563ProSecure Unified Threat Management (UTM) ApplianceWARNING:Changing the WAN mode from classical routing

Strany 517 - Figure 303

xDSL Network Module for the UTM9S and UTM25S564ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM9S or UTM25S is configured in auto-rollo

Strany 518 - Figure 304

xDSL Network Module for the UTM9S and UTM25S565ProSecure Unified Threat Management (UTM) Applianced. From the corresponding drop-down list on the righ

Strany 519 - Spam Reports for End Users

xDSL Network Module for the UTM9S and UTM25S566ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary interface fails, the default

Strany 520 - Figure 306

xDSL Network Module for the UTM9S and UTM25S567ProSecure Unified Threat Management (UTM) Appliance• Continuity of source IP address for secure connect

Strany 521 - Figure 307

xDSL Network Module for the UTM9S and UTM25S568ProSecure Unified Threat Management (UTM) Appliance• Round-robin. With round-robin load balancing, new

Strany 522 - Report Filtering Options

xDSL Network Module for the UTM9S and UTM25S569ProSecure Unified Threat Management (UTM) ApplianceFigure 334. 3. Configure the protocol binding setti

Strany 523

Use the Setup Wizard to Provision the UTM in Your Network57 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 5 of 10: Email Securi

Strany 524

xDSL Network Module for the UTM9S and UTM25S570ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b

Strany 525

xDSL Network Module for the UTM9S and UTM25S571ProSecure Unified Threat Management (UTM) ApplianceFor more information about firewall rules, see Overv

Strany 526

xDSL Network Module for the UTM9S and UTM25S572ProSecure Unified Threat Management (UTM) Appliance• Subnet Mask. Enter the subnet mask for the seconda

Strany 527

xDSL Network Module for the UTM9S and UTM25S573ProSecure Unified Threat Management (UTM) Appliance To configure DDNS:1. Select Network Config > Dy

Strany 528

xDSL Network Module for the UTM9S and UTM25S574ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper r

Strany 529 - Report screen.)

xDSL Network Module for the UTM9S and UTM25S575ProSecure Unified Threat Management (UTM) ApplianceNote: You can also configure the failure detection m

Strany 530 - Managing Saved Reports

xDSL Network Module for the UTM9S and UTM25S576ProSecure Unified Threat Management (UTM) Appliance4. Enter the settings as explained in the following

Strany 531 - Use Diagnostics Utilities

xDSL Network Module for the UTM9S and UTM25S577ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you h

Strany 532 - Send a Ping Packet

578BB. Wireless Network Module for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of the NMSWLSN wireless networ

Strany 533 - Look Up a DNS Address

Wireless Network Module for the UTM9S and UTM25S579ProSecure Unified Threat Management (UTM) ApplianceOverview of the Wireless Network Module• Configu

Strany 534 - Network Statistics Report

Use the Setup Wizard to Provision the UTM in Your Network58ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Strany 535 - Generate Network Statistics

Wireless Network Module for the UTM9S and UTM25S580ProSecure Unified Threat Management (UTM) ApplianceNote: Failure to follow these guidelines can res

Strany 536 - Reboot and Shut Down the UTM

Wireless Network Module for the UTM9S and UTM25S581ProSecure Unified Threat Management (UTM) ApplianceFigure 339. 2. Specify the settings as explaine

Strany 537

Wireless Network Module for the UTM9S and UTM25S582ProSecure Unified Threat Management (UTM) ApplianceMode The wireless modes that you can select depe

Strany 538

Wireless Network Module for the UTM9S and UTM25S583ProSecure Unified Threat Management (UTM) ApplianceWARNING:When you have changed the country settin

Strany 539 - Basic Functioning

Wireless Network Module for the UTM9S and UTM25S584ProSecure Unified Threat Management (UTM) Appliance• In infrastructure mode, wireless devices norma

Strany 540 - LAN or WAN Port LEDs Not On

Wireless Network Module for the UTM9S and UTM25S585ProSecure Unified Threat Management (UTM) ApplianceNote: On the UTM9S or UTM25S, WEP is not support

Strany 541

Wireless Network Module for the UTM9S and UTM25S586ProSecure Unified Threat Management (UTM) ApplianceWireless security profiles, hereafter referred t

Strany 542

Wireless Network Module for the UTM9S and UTM25S587ProSecure Unified Threat Management (UTM) ApplianceBefore You Change the SSID, WEP, and WPA Setting

Strany 543 - Test the LAN Path to Your UTM

Wireless Network Module for the UTM9S and UTM25S588ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable Wireless Profiles To add a

Strany 544

Wireless Network Module for the UTM9S and UTM25S589ProSecure Unified Threat Management (UTM) ApplianceFigure 342. 3. Specify the settings as explaine

Strany 545 - Figure 316

Use the Setup Wizard to Provision the UTM in Your Network59 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t

Strany 546 - Use Online Support

Wireless Network Module for the UTM9S and UTM25S590ProSecure Unified Threat Management (UTM) ApplianceSSID The wireless network name (SSID) for the wi

Strany 547 - Figure 317

Wireless Network Module for the UTM9S and UTM25S591ProSecure Unified Threat Management (UTM) ApplianceEncryptionNote: WPA, WPA2, and WPA+WPA2 only.The

Strany 548 - Documentation

Wireless Network Module for the UTM9S and UTM25S592ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The profil

Strany 549

Wireless Network Module for the UTM9S and UTM25S593ProSecure Unified Threat Management (UTM) Appliance To edit a wireless profile:1. On the Wireless

Strany 550 - Configure the xDSL Settings

Wireless Network Module for the UTM9S and UTM25S594ProSecure Unified Threat Management (UTM) ApplianceFigure 343. Note: The default wireless profile

Strany 551 - Figure 320

Wireless Network Module for the UTM9S and UTM25S595ProSecure Unified Threat Management (UTM) ApplianceWARNING:If you configure the wireless network mo

Strany 552 - Table 140. xDSL settings

Wireless Network Module for the UTM9S and UTM25S596ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the A

Strany 553 - Internet Connection

Wireless Network Module for the UTM9S and UTM25S597ProSecure Unified Threat Management (UTM) Appliancemixed encryption (TKIP+AES, which is supported i

Strany 554 - Figure 323

Wireless Network Module for the UTM9S and UTM25S598ProSecure Unified Threat Management (UTM) Appliance To configure WDS on a peer:1. Configure the sa

Strany 555

Wireless Network Module for the UTM9S and UTM25S599ProSecure Unified Threat Management (UTM) Appliance3. Specify the settings as explained in the foll

Strany 556 - Figure 324

6ProSecure Unified Threat Management (UTM) ApplianceWeb Management Interface Menu Layout . . . . . . . . . . . . . . . . . . . . . . . . . 44Use the S

Strany 557 - Figure 327

Use the Setup Wizard to Provision the UTM in Your Network60ProSecure Unified Threat Management (UTM) Appliance Scan screen also lets you specify HTML

Strany 558

Wireless Network Module for the UTM9S and UTM25S600ProSecure Unified Threat Management (UTM) ApplianceConfigure WMM QoS Priority SettingsWi-Fi Multime

Strany 559 - Figure 328

Wireless Network Module for the UTM9S and UTM25S601ProSecure Unified Threat Management (UTM) ApplianceFigure 347. 3. Select the Enable WMM check box.

Strany 560 - Figure 329

Wireless Network Module for the UTM9S and UTM25S602ProSecure Unified Threat Management (UTM) ApplianceTest Basic Wireless ConnectivityAfter you have c

Strany 561 - Configure the WAN Mode

603CC. 3G/4G Dongles for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of a mobile broadband USB adapter (3G/4G

Strany 562

3G/4G Dongles for the UTM9S and UTM25S604ProSecure Unified Threat Management (UTM) Appliance Complete these steps:1. Insert the 3G/4G dongle and con

Strany 563 - Configure Classical Routing

3G/4G Dongles for the UTM9S and UTM25S605ProSecure Unified Threat Management (UTM) Appliance To configure the WAN ISP settings for the USB interface:

Strany 564 - Configure Auto-Rollover Mode

3G/4G Dongles for the UTM9S and UTM25S606ProSecure Unified Threat Management (UTM) Appliance4. Configure the settings as explained in the following t

Strany 565 - Figure 331

3G/4G Dongles for the UTM9S and UTM25S607ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save any changes to the USB ISP settings

Strany 566

3G/4G Dongles for the UTM9S and UTM25S608ProSecure Unified Threat Management (UTM) ApplianceConfigure the 3G/4G SettingsThe 3G/4G settings are automat

Strany 567 - Configure Load Balancing

3G/4G Dongles for the UTM9S and UTM25S609ProSecure Unified Threat Management (UTM) Appliance4. The information in the 3G Status section and SIM Card

Strany 568 - Figure 333

Use the Setup Wizard to Provision the UTM in Your Network61 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the

Strany 569 - Figure 334

3G/4G Dongles for the UTM9S and UTM25S610ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Note: If you are co

Strany 570 -  To edit a protocol binding:

3G/4G Dongles for the UTM9S and UTM25S611ProSecure Unified Threat Management (UTM) ApplianceOverview of the WAN ModesYou cannot configure failure dete

Strany 571 - Figure 335

3G/4G Dongles for the UTM9S and UTM25S612ProSecure Unified Threat Management (UTM) ApplianceFor information about how to configure the USB interface a

Strany 572 - Configure Dynamic DNS

3G/4G Dongles for the UTM9S and UTM25S613ProSecure Unified Threat Management (UTM) ApplianceFigure 352. 2. In the NAT (Network Address Translation)

Strany 573 - Figure 336

3G/4G Dongles for the UTM9S and UTM25S614ProSecure Unified Threat Management (UTM) ApplianceConfigure Load Balancing and Optional Protocol BindingTo u

Strany 574 - WAN Options

3G/4G Dongles for the UTM9S and UTM25S615ProSecure Unified Threat Management (UTM) Applianceb. From the corresponding drop-down list on the right, sel

Strany 575 - Figure 338

3G/4G Dongles for the UTM9S and UTM25S616ProSecure Unified Threat Management (UTM) Appliance• Destination Network. The Internet locations (based on th

Strany 576

3G/4G Dongles for the UTM9S and UTM25S617ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol binding

Strany 577

3G/4G Dongles for the UTM9S and UTM25S618ProSecure Unified Threat Management (UTM) ApplianceConfigure Dynamic DNSDynamic DNS (DDNS) is an Internet ser

Strany 578 - UTM9S and UTM25S

3G/4G Dongles for the UTM9S and UTM25S619ProSecure Unified Threat Management (UTM) ApplianceFigure 356. The WAN Mode section onscreen reports the cur

Strany 579 - Configuration Order

Use the Setup Wizard to Provision the UTM in Your Network62ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 8 of 10: Email Notifi

Strany 580

3G/4G Dongles for the UTM9S and UTM25S620ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper right o

Strany 581 - Figure 339

3G/4G Dongles for the UTM9S and UTM25S621ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you have no

Strany 582

622DD. Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)This appendix describes the factors to consider when planning a network usi

Strany 583

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)623ProSecure Unified Threat Management (UTM) ApplianceYour decision has the followi

Strany 584 - Figure 340

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)624ProSecure Unified Threat Management (UTM) Appliance4. Prepare to connect the UTM

Strany 585 - Wireless Security Profiles

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)625ProSecure Unified Threat Management (UTM) Appliance- For Windows 2000/XP/Vista,

Strany 586

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)626ProSecure Unified Threat Management (UTM) Appliance• Fully qualified domain name

Strany 587

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)627ProSecure Unified Threat Management (UTM) ApplianceFigure 359. Features such as

Strany 588 - To add a wireless profile:

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)628ProSecure Unified Threat Management (UTM) ApplianceInbound Traffic to a Single W

Strany 589 - Figure 342

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)629ProSecure Unified Threat Management (UTM) ApplianceNote: Load balancing is imple

Strany 590

Use the Setup Wizard to Provision the UTM in Your Network63 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 9 of 10: Signatures &

Strany 591

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)630ProSecure Unified Threat Management (UTM) ApplianceFor a single WAN gateway conf

Strany 592

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)631ProSecure Unified Threat Management (UTM) ApplianceVPN Road Warrior: Single-Gate

Strany 593 -  To edit a wireless profile:

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)632ProSecure Unified Threat Management (UTM) ApplianceFigure 368. The purpose of th

Strany 594 - Figure 343

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)633ProSecure Unified Threat Management (UTM) ApplianceVPN Gateway-to-GatewayThe fol

Strany 595 - Figure 344

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)634ProSecure Unified Threat Management (UTM) ApplianceFigure 371. The IP addresses

Strany 596

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)635ProSecure Unified Threat Management (UTM) ApplianceFigure 373. The IP addresses

Strany 597 - Figure 345

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)636ProSecure Unified Threat Management (UTM) ApplianceThe IP address of the gateway

Strany 598 - Figure 346

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)637ProSecure Unified Threat Management (UTM) ApplianceVPN Telecommuter: Dual-Gatewa

Strany 599

638EE. ReadyNAS IntegrationThis appendix describes how to set up a UTM with a NETGEAR ReadyNAS. This appendix includes the following sections:• Supp

Strany 600

ReadyNAS Integration639ProSecure Unified Threat Management (UTM) ApplianceInstall the UTM Add-On on the ReadyNAS To install the UTM add-on on the Rea

Strany 601 - Figure 347

Use the Setup Wizard to Provision the UTM in Your Network64ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Strany 602

ReadyNAS Integration640ProSecure Unified Threat Management (UTM) ApplianceFigure 379. 7. Click Install.8. Select Add-ons > Installed.Figure 380.

Strany 603

ReadyNAS Integration641ProSecure Unified Threat Management (UTM) Appliance10. Click Save. The status indicator shows green.Figure 381. Connect to the

Strany 604 -  Complete these steps:

ReadyNAS Integration642ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table:4. Click Apply to

Strany 605 - 2. Select WAN Mode

ReadyNAS Integration643ProSecure Unified Threat Management (UTM) ApplianceFigure 384.

Strany 606 - Table 154. USB ISP settings

644FF. Two-Factor AuthenticationThis appendix provides an overview of two-factor authentication, and an example of how to implement the WiKID soluti

Strany 607 - Figure 350

Two-Factor Authentication645ProSecure Unified Threat Management (UTM) Appliance• Proven regulatory compliance. Two-factor authentication has been used

Strany 608 - Configure the 3G/4G Settings

Two-Factor Authentication646ProSecure Unified Threat Management (UTM) ApplianceFigure 385. 2. A one-time passcode (something the user has) is generat

Strany 609 - Table 155. 3G/4G settings

Two-Factor Authentication647ProSecure Unified Threat Management (UTM) ApplianceFigure 387.

Strany 610

648GG. System Logs and Error MessagesThis appendix provides examples and explanations of system logs and error message. When applicable, a recommend

Strany 611 - Overview of the WAN Modes

System Logs and Error Messages649ProSecure Unified Threat Management (UTM) ApplianceSystem Log Messages• System Startup• Reboot• NTP• Login/Logout• Fi

Strany 612 -  To configure NAT:

Use the Setup Wizard to Provision the UTM in Your Network65 ProSecure Unified Threat Management (UTM) ApplianceRegister the UTM with NETGEAR• Use the

Strany 613

System Logs and Error Messages650ProSecure Unified Threat Management (UTM) ApplianceNTPThis section describes log messages generated by the NTP daemon

Strany 614

System Logs and Error Messages651ProSecure Unified Threat Management (UTM) ApplianceFirewall RestartThis section describes logs that are generated whe

Strany 615 - Figure 354

System Logs and Error Messages652ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo

Strany 616 - Figure 355

System Logs and Error Messages653ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo

Strany 617

System Logs and Error Messages654ProSecure Unified Threat Management (UTM) Appliance• PPTP Idle-Timeout logsExplanation Message 1: Establishment of th

Strany 618

System Logs and Error Messages655ProSecure Unified Threat Management (UTM) Appliance• PPP Authentication logsTraffic Metering LogsThis section describ

Strany 619 - Figure 356

System Logs and Error Messages656ProSecure Unified Threat Management (UTM) ApplianceICMP Redirect LogsThis section describes logs that are generated w

Strany 620 - Figure 357

System Logs and Error Messages657ProSecure Unified Threat Management (UTM) ApplianceMessage 2007 Oct 1 00:44:17 [UTM] [kernel] [INVALID][ICMP_TYPE][DR

Strany 621

System Logs and Error Messages658ProSecure Unified Threat Management (UTM) ApplianceService LogsThis section describes log messages generated during f

Strany 622 - Accounts

System Logs and Error Messages659ProSecure Unified Threat Management (UTM) Appliance• IPS Logs• Anomaly Behavior Logs• Application LogsThis section de

Strany 623

Use the Setup Wizard to Provision the UTM in Your Network66ProSecure Unified Threat Management (UTM) Appliance Note: If you have used the 30-day trial

Strany 624

System Logs and Error Messages660ProSecure Unified Threat Management (UTM) ApplianceSpam LogsThis section describes logs that are generated when the U

Strany 625

System Logs and Error Messages661ProSecure Unified Threat Management (UTM) ApplianceTraffic LogsThis section describes logs that are generated when th

Strany 626

System Logs and Error Messages662ProSecure Unified Threat Management (UTM) ApplianceIPS LogsThis section describes logs that are generated when traffi

Strany 627 - Inbound Traffic

System Logs and Error Messages663ProSecure Unified Threat Management (UTM) ApplianceApplication LogsThis section describes logs that are generated whe

Strany 628 - Figure 362

System Logs and Error Messages664ProSecure Unified Threat Management (UTM) ApplianceLAN-to-DMZ LogsThis section describes logs that are generated when

Strany 629 - Virtual Private Networks

System Logs and Error Messages665ProSecure Unified Threat Management (UTM) ApplianceDMZ-to-LAN LogsThis section describes logs that are generated when

Strany 630 - Figure 365

666HH. Default Settings and Technical SpecificationsThis appendix provides the default settings and the physical and technical specifications of the

Strany 631 - Figure 367

Default Settings and Technical Specifications667ProSecure Unified Threat Management (UTM) ApplianceWAN connectionsWAN MAC address Use default addressW

Strany 632 - Figure 369

Default Settings and Technical Specifications668ProSecure Unified Threat Management (UTM) ApplianceFirewall and network securityInbound LAN WAN rules

Strany 633 - VPN Gateway-to-Gateway

Default Settings and Technical Specifications669ProSecure Unified Threat Management (UTM) ApplianceApplication securitySMTP Enabled on port 25Infected

Strany 634 - Figure 372

Use the Setup Wizard to Provision the UTM in Your Network67 ProSecure Unified Threat Management (UTM) Appliance To change customer or VAR information

Strany 635 - Figure 374

Default Settings and Technical Specifications670ProSecure Unified Threat Management (UTM) ApplianceBlocked keywords for Web traffic NoneEmbedded Objec

Strany 636 - Figure 376

Default Settings and Technical Specifications671ProSecure Unified Threat Management (UTM) ApplianceAuthentication algorithm SHA-1Authentication method

Strany 637 - Figure 377

Default Settings and Technical Specifications672ProSecure Unified Threat Management (UTM) ApplianceWireless radio and access point settings (UTM9S and

Strany 638 - ReadyNAS Integration

Default Settings and Technical Specifications673ProSecure Unified Threat Management (UTM) AppliancePhysical and Technical SpecificationsThe following

Strany 639 - Figure 378

Default Settings and Technical Specifications674ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the IPSec VPN specificati

Strany 640 - 7. Click Install

Default Settings and Technical Specifications675ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the SSL VPN specification

Strany 641 - Figure 382

Default Settings and Technical Specifications676ProSecure Unified Threat Management (UTM) ApplianceNote: For default email and web scan settings, see

Strany 642 - Figure 383

677II. Notification of Compliance (Wired)NETGEAR Wired ProductsRegulatory Compliance InformationThis section includes user requirements for operatin

Strany 643 - Figure 384

Notification of Compliance (Wired)678ProSecure Unified Threat Management (UTM) ApplianceFCC Radio Frequency Interference Warnings & InstructionsTh

Strany 644 - Two-Factor Authentication

Notification of Compliance (Wired)679ProSecure Unified Threat Management (UTM) ApplianceAdditional CopyrightsAES Copyright (c) 2001, Dr. Brian Gladman

Strany 645

Use the Setup Wizard to Provision the UTM in Your Network68ProSecure Unified Threat Management (UTM) Appliance Verify Correct Installation• Test Conne

Strany 646 - Figure 386

Notification of Compliance (Wired)680ProSecure Unified Threat Management (UTM) ApplianceMD5 Copyright (C) 1990, RSA Data Security, Inc. All rights re

Strany 647 - Figure 387

681JJ. Notification of Compliance (Wireless)NETGEAR Dual Band - WirelessRegulatory Compliance InformationThis section includes user requirements for

Strany 648 - Table 161. Log message terms

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)682Español [Spanish]Por medio de la presente NETGEAR Inc. decl

Strany 649 - System Log Messages

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)683This device is a 2.4 GHz wideband transmission system (tra

Strany 650 - Login/Logout

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)684• For product available in the USA market, only channel 1~1

Strany 651 - WAN Status

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)685Interference Reduction TableThe following table shows the

Strany 652 - Load Balancing Mode

686IndexNumerics10BASE-T, 100BASE-T, and 1000BASE-T speeds 962.4- and 5-GHz operating frequency, radio 58120- and 40-MHz channel spacing, radio 582332

Strany 653 - PPP Logs

687ProSecure Unified Threat Management (UTM) ApplianceAppleiPhone and iPad IPSec VPN connections 336Mac SSL VPN connection 377Application Level Gatewa

Strany 654 - • PPTP Idle-Timeout logs

688ProSecure Unified Threat Management (UTM) ApplianceCCA (certification authority) 232, 300cache control, SSL VPN 341, 361card, service registration

Strany 655 - Traffic Metering Logs

689ProSecure Unified Threat Management (UTM) Appliancetroubleshooting settings 546daylight savings timesettings 55, 457troubleshooting settings 546DC

Strany 656 - Invalid Packet Logging

Use the Setup Wizard to Provision the UTM in Your Network69 ProSecure Unified Threat Management (UTM) ApplianceThe UTM is ready for use. However, the

Strany 657

690ProSecure Unified Threat Management (UTM) AppliancedownloadingDC agent software 410firmware file 451SSL certificate 382DPD (Dead Peer Detection) 29

Strany 658 - Service Logs

691ProSecure Unified Threat Management (UTM) ApplianceWAN settings 82–85file extensionsblocking 202, 218, 222setting access exceptions 256file names,

Strany 659

692ProSecure Unified Threat Management (UTM) Appliancescanning process 228trusted hosts 235HTTPS Smart Blockconfiguring 212–215logs 469, 508–510settin

Strany 660 - Spam Logs

693ProSecure Unified Threat Management (UTM) Applianceport forwarding, SSL VPN 363PPTP server 332reserved 116secondary addressesDSL settings 570LAN se

Strany 661 - Email Filter Logs

694ProSecure Unified Threat Management (UTM) ApplianceProSafe VPN Client software 17licensing, electronic 67lifetime, quarantine 461Lightweight Direct

Strany 662 - Anomaly Behavior Logs

695ProSecure Unified Threat Management (UTM) Appliancerecord 296models, UTM 22modes, wireless 582, 675monitoring default settings 667MPPE (Microsoft P

Strany 663 - Routing Logs

696ProSecure Unified Threat Management (UTM) Appliancerestoring 545pattern file 454pay plan, 3G/4G service 610PDP (packet data protocol) type, 3G/4G s

Strany 664 - WAN-to-LAN Logs

697ProSecure Unified Threat Management (UTM) AppliancePPTP (Point-to-Point Tunneling Protocol)requirements 74server settings 331user accounts 401–403W

Strany 665 - WAN-to-DMZ Logs

698ProSecure Unified Threat Management (UTM) Appliancewired products 677–680relay gateway 50, 106, 119Remote Authentication Dial In User Service. See

Strany 666 - Default Settings

699ProSecure Unified Threat Management (UTM) Applianceservice provider, 3G/4G 608service registration card 23session expiration length 416Session Init

Strany 667

7ProSecure Unified Threat Management (UTM) ApplianceManage the Network Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112Change

Strany 668

7033. Manually Configure Internet and WAN SettingsThis chapter contains the following sections:• Internet and WAN Configuration Tasks• Automatically

Strany 669

700ProSecure Unified Threat Management (UTM) Applianceoptions 337settings, configuring manually 359settings, using SSL VPN Wizard 339specifications 67

Strany 670

701ProSecure Unified Threat Management (UTM) Appliancetransfer mode, DSL settings 552Transmission Control Protocol (TCP) 184transmit power, radio 583T

Strany 671

702ProSecure Unified Threat Management (UTM) ApplianceVirtual Private Network Consortium (VPNC) 21, 266virtual private network. See VPN tunnels.virusd

Strany 672

703ProSecure Unified Threat Management (UTM) Applianceconnection speed 97connection type, viewing 496failure detection method 82–85load balancing mode

Strany 673

704ProSecure Unified Threat Management (UTM) Appliancewireless specifications 675WizardsSetup Wizard 47IPSec VPN. See IPSec VPN Wizard.SSL VPN. See SS

Strany 674

Manually Configure Internet and WAN Settings71 ProSecure Unified Threat Management (UTM) ApplianceInternet and WAN Configuration TasksNote: For inform

Strany 675 - UTM9S and UTM25S:

Manually Configure Internet and WAN Settings72ProSecure Unified Threat Management (UTM) Appliance  To configure the WAN ports automatically for conne

Strany 676

Manually Configure Internet and WAN Settings73 ProSecure Unified Threat Management (UTM) ApplianceFigure 38. 3. Click the Auto Detect button at the b

Strany 677 - NETGEAR Wired Products

Manually Configure Internet and WAN Settings74ProSecure Unified Threat Management (UTM) Appliance • If the autodetect process does not find a connecti

Strany 678

Manually Configure Internet and WAN Settings75 ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the automatic ISP configuration

Strany 679 - Additional Copyrights

Manually Configure Internet and WAN Settings76ProSecure Unified Threat Management (UTM) Appliance Figure 41. 6. If your connection is PPTP or PPPoE,

Strany 680

Manually Configure Internet and WAN Settings77 ProSecure Unified Threat Management (UTM) Appliance7. In the Internet (IP) Address section of the scree

Strany 681 - NETGEAR Dual Band - Wireless

Manually Configure Internet and WAN Settings78ProSecure Unified Threat Management (UTM) Appliance 8. In the Domain Name Server (DNS) Servers section o

Strany 682

Manually Configure Internet and WAN Settings79 ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the WAN ISP se

Strany 683 - FCC Caution

8ProSecure Unified Threat Management (UTM) ApplianceChapter 6 Content Filtering and Optimizing ScansAbout Content Filtering and Scans. . . . . . . . .

Strany 684

Manually Configure Internet and WAN Settings80ProSecure Unified Threat Management (UTM) Appliance Configure the WAN Mode• Overview of the WAN Modes• C

Strany 685 - Interference Reduction Table

Manually Configure Internet and WAN Settings81 ProSecure Unified Threat Management (UTM) ApplianceWAN interfaces, the remaining interfaces are disable

Strany 686 - Numerics

Manually Configure Internet and WAN Settings82ProSecure Unified Threat Management (UTM) Appliance WARNING:Changing the WAN mode from classical routing

Strany 687

Manually Configure Internet and WAN Settings83 ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM is configured in auto-rollover mode, it

Strany 688

Manually Configure Internet and WAN Settings84ProSecure Unified Threat Management (UTM) Appliance Note: Ensure that the backup WAN interface is config

Strany 689

Manually Configure Internet and WAN Settings85 ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary WAN interface fails, the def

Strany 690

Manually Configure Internet and WAN Settings86ProSecure Unified Threat Management (UTM) Appliance Configure Load Balancing (Multiple WAN Port Models)

Strany 691

Manually Configure Internet and WAN Settings87 ProSecure Unified Threat Management (UTM) ApplianceThis load-balancing method ensures that a single WAN

Strany 692

Manually Configure Internet and WAN Settings88ProSecure Unified Threat Management (UTM) Appliance Figure 49. 3. Configure the protocol binding settin

Strany 693

Manually Configure Internet and WAN Settings89 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b

Strany 694

9ProSecure Unified Threat Management (UTM) ApplianceRADIUS Client and Server Configuration. . . . . . . . . . . . . . . . . . . . . . .310Assign IP Ad

Strany 695

Manually Configure Internet and WAN Settings90ProSecure Unified Threat Management (UTM) Appliance It is important that you ensure that any secondary W

Strany 696

Manually Configure Internet and WAN Settings91 ProSecure Unified Threat Management (UTM) Appliance5. Click the Add table button in the rightmost colum

Strany 697

Manually Configure Internet and WAN Settings92ProSecure Unified Threat Management (UTM) Appliance  To configure DDNS:1. Select Network Config > Dy

Strany 698

Manually Configure Internet and WAN Settings93 ProSecure Unified Threat Management (UTM) ApplianceFigure 52. 4. Access the website of the DDNS servic

Strany 699

Manually Configure Internet and WAN Settings94ProSecure Unified Threat Management (UTM) Appliance Set the UTM’s MAC Address and Configure Advanced WAN

Strany 700

Manually Configure Internet and WAN Settings95 ProSecure Unified Threat Management (UTM) ApplianceFigure 53. 4. Enter the settings as explained in th

Strany 701

Manually Configure Internet and WAN Settings96ProSecure Unified Threat Management (UTM) Appliance SpeedIn most cases, the UTM can automatically determ

Strany 702

Manually Configure Internet and WAN Settings97 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your changes.WARNING:Dependin

Strany 703

9844. LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains the following sections:•

Strany 704

LAN Configuration99 ProSecure Unified Threat Management (UTM) ApplianceA virtual LAN (VLAN) is a local area network with a definition that maps workst

Komentáře k této Příručce

Žádné komentáře