Netgear UTM5 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Směrovače Netgear UTM5. Netgear UTM5 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 484
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
202-10482-02
January 2010
v1.0
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
ProSecure Unified Threat
Management (UTM)
Appliance Reference Manual
Zobrazit stránku 0
1 2 3 4 5 6 ... 483 484

Shrnutí obsahu

Strany 1 - Appliance Reference Manual

202-10482-02 January 2010v1.0NETGEAR, Inc.350 East Plumeria DriveSan Jose, CA 95134ProSecure Unified Threat Management (UTM) Appliance Reference Manua

Strany 2

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxv1.0, January 2010Managing the Application Level Gateway for SIP Sessions ...

Strany 3 - Additional Copyrights

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-14 LAN Configurationv1.0, January 2010The Known PCs and Devices table lists the

Strany 4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-15v1.0, January 2010Adding PCs or Devices to the Network Datab

Strany 5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-16 LAN Configurationv1.0, January 2010Editing PCs or Devices in the Network Data

Strany 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-17v1.0, January 20103. Click the Edit Group Names option arrow

Strany 7 - Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-18 LAN Configurationv1.0, January 2010To reserve an IP address, select Reserved

Strany 8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-19v1.0, January 2010To enable and configure the DMZ port: 1. S

Strany 9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-20 LAN Configurationv1.0, January 2010Table 4-3. DMZ Setup SettingsSetting Descr

Strany 10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-21v1.0, January 2010Enable DHCP Server(continued)Primary DNS S

Strany 11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-22 LAN Configurationv1.0, January 20103. Click Apply to save your settings.To de

Strany 12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-23v1.0, January 2010Configuring Static RoutesTo add a static r

Strany 13

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiv1.0, January 2010Creating Gateway-to-Gateway VPN Tunnels with the Wizard ...

Strany 14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-24 LAN Configurationv1.0, January 20103. Enter the settings as explained in Tabl

Strany 15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-25v1.0, January 2010To enable and configure RIP:1. Select Netw

Strany 16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-26 LAN Configurationv1.0, January 2010Table 4-5. RIP Configuration SettingsSetti

Strany 17 - About This Manual

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-27v1.0, January 20104. Click Apply to save your settings.Stati

Strany 18 - Revision History

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-28 LAN Configurationv1.0, January 2010

Strany 19 - Introduction

5-1v1.0, January 2010Chapter 5Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chap

Strany 20 - Key Features and Capabilities

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-2 Firewall Protectionv1.0, January 2010Administrator TipsConsider the following

Strany 21 - Outbound Load Balancing

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-3v1.0, January 2010Using Rules to Block or Allow Specific Ki

Strany 22 - A Powerful, True Firewall

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-4 Firewall Protectionv1.0, January 2010• Quality of Service (QoS) priorities. Ea

Strany 23 - Security Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-5v1.0, January 2010Table 5-2. Outbound Rules OverviewSettin

Strany 24 - Extensive Protocol Support

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiv1.0, January 2010Viewing the UTM SSL VPN Connection Status ...

Strany 25 - Model Comparison

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-6 Firewall Protectionv1.0, January 2010Inbound Rules (Port Forwarding)If you hav

Strany 26 - Figure 1-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-7v1.0, January 2010Whether or not DHCP is enabled, how the P

Strany 27 - Package Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-8 Firewall Protectionv1.0, January 2010.Table 5-3. Inbound Rules Overview Sett

Strany 28 - Hardware Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-9v1.0, January 2010LAN Users The settings that determine whi

Strany 29 - Table 1-2. LED Descriptions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-10 Firewall Protectionv1.0, January 2010Log The settings that determines whether

Strany 30 - Rear Panel

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-11v1.0, January 2010Order of Precedence for RulesAs you defi

Strany 31 - Figure 1-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-12 Firewall Protectionv1.0, January 2010Setting LAN WAN RulesThe default outboun

Strany 32 - Figure 1-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-13v1.0, January 2010To make changes to an existing outbound

Strany 33 - Using the Rack-Mounting Kit

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-14 Firewall Protectionv1.0, January 2010To create a new outbound LAN WAN service

Strany 34 - 1-16 Introduction

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-15v1.0, January 2010To create a new inbound LAN WAN service

Strany 35 - Your Network

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiiv1.0, January 2010Updating the Scan Signatures and Scan Engine Firmware ...

Strany 36 - Logging In to the UTM

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-16 Firewall Protectionv1.0, January 2010To access the DMZ WAN Rules screen:1. Se

Strany 37 - Figure 2-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-17v1.0, January 20102. Click one of the following table butt

Strany 38 - Figure 2-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-18 Firewall Protectionv1.0, January 2010DMZ WAN Inbound Services RulesThe Inboun

Strany 39

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-19v1.0, January 2010Setting LAN DMZ RulesThe LAN DMZ Rules s

Strany 40 - Figure 2-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-20 Firewall Protectionv1.0, January 2010• Up. Moves the rule up one position in

Strany 41 - Figure 2-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-21v1.0, January 20102. Enter the settings as explained in Ta

Strany 42 - Figure 2-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-22 Firewall Protectionv1.0, January 2010Inbound Rules ExamplesLAN WAN Inbound Ru

Strany 43

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-23v1.0, January 2010LAN WAN or DMZ WAN Inbound Rule: Setting

Strany 44

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-24 Firewall Protectionv1.0, January 2010To configure the UTM for additional IP a

Strany 45 - Figure 2-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-25v1.0, January 20106. In the Send to LAN Server field, ente

Strany 46

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxivv1.0, January 2010Troubleshooting the ISP Connection ...

Strany 47

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-26 Firewall Protectionv1.0, January 2010Outbound Rules ExampleOutbound rules let

Strany 48 - Figure 2-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-27v1.0, January 2010Configuring Other Firewall FeaturesYou c

Strany 49

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-28 Firewall Protectionv1.0, January 20102. Click the Attack Checks submenu tab.

Strany 50 - Figure 2-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-29v1.0, January 20104. Click Apply to save your settings. LA

Strany 51

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-30 Firewall Protectionv1.0, January 2010Setting Session LimitsSession limits all

Strany 52 - Figure 2-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-31v1.0, January 20105. Click Apply to save your settings.Man

Strany 53 - Figure 2-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-32 Firewall Protectionv1.0, January 20103. Select the Enable SIP checkbox.4. Cli

Strany 54

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-33v1.0, January 2010For example, Web servers serve Web pages

Strany 55 - Figure 2-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-34 Firewall Protectionv1.0, January 20102. In the Add Customer Service section o

Strany 56

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-35v1.0, January 20102. Modify the settings that you wish to

Strany 57

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxvv1.0, January 2010Firewall Restart ...

Strany 58 - Figure 2-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-36 Firewall Protectionv1.0, January 2010To create a QoS profile:1. Select Networ

Strany 59

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-37v1.0, January 20105. Click Apply to save your settings. Th

Strany 60 - Verifying Proper Installation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-38 Firewall Protectionv1.0, January 20103. Click Apply to save your changes. The

Strany 61 - Figure 2-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-39v1.0, January 2010The screen displays the List of Bandwidt

Strany 62 - What to Do Next

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-40 Firewall Protectionv1.0, January 20105. Click Apply to save your settings. Th

Strany 63 - Chapter 3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-41v1.0, January 2010Setting a Schedule to Block or Allow Spe

Strany 64

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-42 Firewall Protectionv1.0, January 2010• Specific Times. The schedule is active

Strany 65 - Figure 3-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-43v1.0, January 20102. In the MAC Filtering Enable section,

Strany 66 - Figure 3-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-44 Firewall Protectionv1.0, January 2010Setting up IP/MAC BindingsIP/MAC Binding

Strany 67 - Setting the UTM’s MAC Address

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-45v1.0, January 20103. Enter the settings as explained in Ta

Strany 68 - Figure 3-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviv1.0, January 2010

Strany 69

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-46 Firewall Protectionv1.0, January 20104. Click the Add table button. The new I

Strany 70

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-47v1.0, January 2010Note these restrictions on port triggeri

Strany 71 - Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-48 Firewall Protectionv1.0, January 20103. Click the Add table button. The new p

Strany 72

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-49v1.0, January 2010Using the Intrusion Prevention SystemThe

Strany 73

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-50 Firewall Protectionv1.0, January 2010When you enable the IPS, the default IPS

Strany 74 - WAN Mode screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-51v1.0, January 2010.Figure 5-31

Strany 75

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-52 Firewall Protectionv1.0, January 2010Table 5-11. IPS: Less Familiar Attack Na

Strany 76

6-1v1.0, January 2010Chapter 6Content Filtering and Optimizing ScansThis chapter describes how to apply the content filtering features of the UTM and

Strany 77 - Figure 3-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-2 Content Filtering and Optimizing Scansv1.0, January 2010Default E-mail and Web

Strany 78

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-3v1.0, January 2010Configuring E-mail Pro

Strany 79

xviiv1.0, January 2010About This ManualThe NETGEAR® ProSecure™ Unified Threat Management (UTM) Appliance Reference Manual describes how to install, co

Strany 80 - Figure 3-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-4 Content Filtering and Optimizing Scansv1.0, January 2010Customizing E-mail Pro

Strany 81 - Configuring Dynamic DNS

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-5v1.0, January 2010Customizing E-mail Ant

Strany 82 - Figure 3-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-6 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strany 83 - Figure 3-12:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-7v1.0, January 2010Append Safe Stamp (SMT

Strany 84 - Figure 3-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-8 Content Filtering and Optimizing Scansv1.0, January 20103. Click Apply to save

Strany 85

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-9v1.0, January 2010To configure e-mail co

Strany 86

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-10 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strany 87 - LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-11v1.0, January 20103. Click Apply to sav

Strany 88 - 4-2 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-12 Content Filtering and Optimizing Scansv1.0, January 20103. Real-time blacklis

Strany 89 - Figure 4-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-13v1.0, January 2010To configure the whit

Strany 90 - VLAN DHCP Options

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviiiv1.0, January 2010• Scope. This manual is written for the UTM according to th

Strany 91 - LAN Configuration 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-14 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strany 92 - Configuring a VLAN Profile

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-15v1.0, January 2010blacklist providers a

Strany 93 - Figure 4-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-16 Content Filtering and Optimizing Scansv1.0, January 20102. Click the Add tabl

Strany 94 - 4-8 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-17v1.0, January 20103. Enter the settings

Strany 95 - LAN Configuration 4-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-18 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Strany 96 - 4-10 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-19v1.0, January 2010Configuring Web and S

Strany 97 - Figure 4-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-20 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strany 98 - 4-12 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-21v1.0, January 20103. Click Apply to sav

Strany 99 - Managing the Network Database

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-22 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strany 100 - Figure 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-23v1.0, January 20103. Click Apply to sav

Strany 101 - LAN Configuration 4-15

1-1v1.0, January 2010Chapter 1IntroductionThis chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Managemen

Strany 102 - Figure 4-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-24 Content Filtering and Optimizing Scansv1.0, January 2010Several types of Web

Strany 103 - LAN Configuration 4-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-25v1.0, January 2010To configure Web cont

Strany 104 - 4-18 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-26 Content Filtering and Optimizing Scansv1.0, January 2010.Figure 6-10 [Content

Strany 105 - Figure 4-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-27v1.0, January 2010.3. Enter the setting

Strany 106 - Table 4-3. DMZ Setup Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-28 Content Filtering and Optimizing Scansv1.0, January 2010Table 6-8. Content Fi

Strany 107 - LAN Configuration 4-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-29v1.0, January 2010Select the Web Catego

Strany 108 - Managing Routing

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-30 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Strany 109 - Configuring Static Routes

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-31v1.0, January 2010To configure Web URL

Strany 110 - 4-24 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-32 Content Filtering and Optimizing Scansv1.0, January 20103. Enter the settings

Strany 111 - To enable and configure RIP:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-33v1.0, January 20104. Click Apply to sav

Strany 112 - 4-26 LAN Configuration

iiv1.0, January 2010© 2009–2010 by NETGEAR, Inc. All rights reserved.TrademarksNETGEAR and the NETGEAR logo are registered trademarks and ProSecure an

Strany 113 - Static Route Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-2 Introductionv1.0, January 2010Key Features and CapabilitiesThe UTM provides th

Strany 114 - 4-28 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-34 Content Filtering and Optimizing Scansv1.0, January 2010HTTPS Scan SettingsHT

Strany 115 - Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-35v1.0, January 2010If one of these is no

Strany 116 - Administrator Tips

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-36 Content Filtering and Optimizing Scansv1.0, January 2010To configure the HTTP

Strany 117 - Services-Based Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-37v1.0, January 20104. Click Apply to sav

Strany 118 - 5-4 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-38 Content Filtering and Optimizing Scansv1.0, January 2010Note that certain sit

Strany 119 - Firewall Protection 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-39v1.0, January 20103. Enter the settings

Strany 120 - 5-6 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-40 Content Filtering and Optimizing Scansv1.0, January 2010To configure the FTP

Strany 121 - Firewall Protection 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-41v1.0, January 20103. Click Apply to sav

Strany 122 - 5-8 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-42 Content Filtering and Optimizing Scansv1.0, January 2010To set Web access exc

Strany 123 - Firewall Protection 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-43v1.0, January 20103. Enter the settings

Strany 124 - 5-10 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-3v1.0, January 2010Dual-WAN Port Models for Increased Reliability o

Strany 125 - Order of Precedence for Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-44 Content Filtering and Optimizing Scansv1.0, January 20102. Modify the setting

Strany 126 - Setting LAN WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-45v1.0, January 20102. In the Add Scannin

Strany 127 - Firewall Protection 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-46 Content Filtering and Optimizing Scansv1.0, January 2010

Strany 128 - Figure 5-3

7-1v1.0, January 2010Chapter 7Virtual Private NetworkingUsing IPsec ConnectionsThis chapter describes how to use the IP security (IPsec) virtual priva

Strany 129 - Setting DMZ WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-2 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010See “Virtu

Strany 130 - Figure 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-3v1.0, January 2010Using the

Strany 131 - Figure 5-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-4 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Creating G

Strany 132 - Figure 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-5v1.0, January 2010To view th

Strany 133 - Setting LAN DMZ Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-6 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Select

Strany 134 - Figure 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-7v1.0, January 2010. .This VP

Strany 135 - Figure 5-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-4 Introductionv1.0, January 2010A Powerful, True FirewallUnlike simple Internet

Strany 136 - Inbound Rules Examples

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-8 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click A

Strany 137 - Figure 5-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-9v1.0, January 2010Creating a

Strany 138 - Figure 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-10 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010To displa

Strany 139 - Firewall Protection 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-11v1.0, January 20103. Select

Strany 140 - Outbound Rules Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-12 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strany 141 - Attack Checks

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-13v1.0, January 20102. In the

Strany 142 - Figure 5-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-14 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Enter

Strany 143 - Firewall Protection 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-15v1.0, January 20105. In the

Strany 144 - Setting Session Limits

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-16 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Strany 145 - Firewall Protection 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-17v1.0, January 20109. Enter

Strany 146 - Adding Customized Services

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-5v1.0, January 2010• Objectionable traffic protection. The UTM prev

Strany 147 - Figure 5-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-18 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010In the ex

Strany 148 - Figure 5-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-19v1.0, January 2010• Right-c

Strany 149 - Firewall Protection 5-35

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-20 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010The VPN c

Strany 150 - Figure 5-22

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-21v1.0, January 2010The Activ

Strany 151 - Firewall Protection 5-37

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-22 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Managing

Strany 152 - Creating Bandwidth Profiles

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-23v1.0, January 2010Managing

Strany 153 - Profile screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-24 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Each pol

Strany 154 - 5-40 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-25v1.0, January 2010To add or

Strany 155 - Figure 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-26 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Figure 7

Strany 156 - Enabling Source MAC Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-27v1.0, January 20103. Comple

Strany 157 - Figure 5-26

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-6 Introductionv1.0, January 2010Extensive Protocol SupportThe UTM supports the T

Strany 158 - Setting up IP/MAC Bindings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-28 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010LocalSele

Strany 159 - Figure 5-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-29v1.0, January 2010Authentic

Strany 160 - Configuring Port Triggering

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-30 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strany 161 - Figure 5-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-31v1.0, January 20104. Click

Strany 162 - Figure 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-32 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Strany 163 - Figure 5-30

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-33v1.0, January 2010To delete

Strany 164 - 5-50 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-34 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Figure 7-

Strany 165 - Figure 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-35v1.0, January 20104. Comple

Strany 166 - 5-52 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-36 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Traffic S

Strany 167 - Chapter 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-37v1.0, January 2010Integrity

Strany 168

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-7v1.0, January 2010• SSL VPN Wizard. The UTM includes the NETGEAR S

Strany 169 - Configuring E-mail Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-38 Virtual Private Networking Using IPsec Connectionsv1.0, January 20105. Click

Strany 170 - Figure 6-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-39v1.0, January 2010You can e

Strany 171 - Figure 6-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-40 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Comple

Strany 172

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-41v1.0, January 2010server in

Strany 173

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-42 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Comple

Strany 174 - E-mail Content Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-43v1.0, January 2010Assigning

Strany 175 - Figure 6-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-44 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Strany 176

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-45v1.0, January 2010.4. Compl

Strany 177

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-46 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010WINS Serv

Strany 178

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-47v1.0, January 20105. Click

Strany 179 - Figure 6-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-8 Introductionv1.0, January 2010Service Registration Card with License KeysBe su

Strany 180

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-48 Virtual Private Networking Using IPsec Connectionsv1.0, January 20108. On the

Strany 181 - Figure 6-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-49v1.0, January 2010RemoteIde

Strany 182

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-50 Virtual Private Networking Using IPsec Connectionsv1.0, January 20109. Click

Strany 183 - Figure 6-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-51v1.0, January 20102. In the

Strany 184

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-52 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strany 185

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-53v1.0, January 20105. In the

Strany 186 - Figure 6-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-54 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Strany 187 - Configuring Web Malware Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-55v1.0, January 20109. Enter

Strany 188 - Figure 6-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-56 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Configuri

Strany 189

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-57v1.0, January 20104. Enter

Strany 190

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-9v1.0, January 2010Package ContentsThe UTM product package contains

Strany 191

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-58 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. In the

Strany 192

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-59v1.0, January 2010Configuri

Strany 193

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-60 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010

Strany 194

8-1v1.0, January 2010Chapter 8Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically

Strany 195

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-2 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• SSL Port F

Strany 196 - Configuring Web URL Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-3v1.0, January 2010The followin

Strany 197 - Figure 6-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-4 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: If you

Strany 198

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-5v1.0, January 2010SSL VPN Wiza

Strany 199

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-6 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note that Fi

Strany 200 - HTTPS Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-7v1.0, January 2010SSL VPN Wiza

Strany 201 - Figure 6-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-10 Introductionv1.0, January 2010Hardware FeaturesThe front panel ports and LEDs

Strany 202 - Figure 6-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-8 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: After

Strany 203 - Specifying Trusted Hosts

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-9v1.0, January 2010SSL VPN Wiza

Strany 204 - Figure 6-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-10 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Table 8-4.

Strany 205 - Configuring FTP Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-11v1.0, January 2010SSL VPN Wiz

Strany 206 - Table 6-12. FTP Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-12 Virtual Private Networking Using SSL Connectionsv1.0, January 2010TCP Port Nu

Strany 207

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-13v1.0, January 2010SSL VPN Wiz

Strany 208 - Figure 6-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-14 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Verify your

Strany 209

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-15v1.0, January 20104. Enter th

Strany 210 - Setting Scanning Exclusions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-16 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The default

Strany 211 - Figure 6-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-17v1.0, January 20103. From the

Strany 212

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-11v1.0, January 2010The function of each LED is described in Table

Strany 213 - Using IPsec Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-18 Virtual Private Networking Using SSL Connectionsv1.0, January 2010When you de

Strany 214

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-19v1.0, January 2010Portal layo

Strany 215 - Configurations

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-20 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The List of

Strany 216 - Figure 7-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-21v1.0, January 20104. Complete

Strany 217 - Figure 7-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-22 Virtual Private Networking Using SSL Connectionsv1.0, January 20105. Click Ap

Strany 218 - Figure 7-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-23v1.0, January 2010Adding Serv

Strany 219

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-24 Virtual Private Networking Using SSL Connectionsv1.0, January 20104. Click th

Strany 220 - Figure 7-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-25v1.0, January 20103. In the A

Strany 221 - Figure 7-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-26 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• If you en

Strany 222 - Figure 7-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-27v1.0, January 20103. Select t

Strany 223

v1.0, January 2010iiiFederal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been gra

Strany 224 - Figure 7-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-12 Introductionv1.0, January 2010Rear PanelThe rear panel of the UTM includes a

Strany 225 - Figure 7-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-28 Virtual Private Networking Using SSL Connectionsv1.0, January 2010To add an S

Strany 226 - Editor menu

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-29v1.0, January 2010Adding New

Strany 227 - Figure 7-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-30 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Editing Net

Strany 228

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-31v1.0, January 20105. Click Ap

Strany 229 - Testing the VPN Connection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-32 Virtual Private Networking Using SSL Connectionsv1.0, January 2010For example

Strany 230 - Figure 7-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-33v1.0, January 20102. Make you

Strany 231 - Figure 7-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-34 Virtual Private Networking Using SSL Connectionsv1.0, January 2010.3. Select

Strany 232 - Figure 7-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-35v1.0, January 2010Add SSL VPN

Strany 233 - Viewing the UTM IPsec VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-36 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Apply Polic

Strany 234 - Managing IPsec VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-37v1.0, January 20104. Click Ap

Strany 235 - Managing IKE Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-13v1.0, January 2010Figure 1-4 shows the product label for the UTM5

Strany 236 - Figure 7-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-38 Virtual Private Networking Using SSL Connectionsv1.0, January 2010

Strany 237

9-1v1.0, January 2010Chapter 9Managing Users, Authentication, and CertificatesThis chapter describes how to manage users, authentication, and security

Strany 238 - Figure 7-21

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-2 Managing Users, Authentication, and Certificatesv1.0, January 2010Configuring

Strany 239

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-3v1.0, January 2010To create a

Strany 240

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-4 Managing Users, Authentication, and Certificatesv1.0, January 20102. Under the

Strany 241

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-5v1.0, January 20104. Click App

Strany 242

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-6 Managing Users, Authentication, and Certificatesv1.0, January 20106. If you ch

Strany 243 - Managing VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-7v1.0, January 2010Creating and

Strany 244 - Figure 7-22

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-8 Managing Users, Authentication, and Certificatesv1.0, January 20103. Click the

Strany 245

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-9v1.0, January 20103. Modify th

Strany 246 - Figure 7-23

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-14 Introductionv1.0, January 2010Figure 1-6 shows the product label for the UTM2

Strany 247

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-10 Managing Users, Authentication, and Certificatesv1.0, January 2010To create a

Strany 248

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-11v1.0, January 20103. Enter th

Strany 249

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-12 Managing Users, Authentication, and Certificatesv1.0, January 20104. Click Ap

Strany 250

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-13v1.0, January 20104. Click Ap

Strany 251

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-14 Managing Users, Authentication, and Certificatesv1.0, January 20104. In the D

Strany 252 - RADIUS Client Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-15v1.0, January 20103. Click th

Strany 253 - Figure 7-24

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-16 Managing Users, Authentication, and Certificatesv1.0, January 20107. Click th

Strany 254

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-17v1.0, January 20103. Enter th

Strany 255 - Mode Config Operation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-18 Managing Users, Authentication, and Certificatesv1.0, January 2010On the UTM,

Strany 256 - Figure 7-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-19v1.0, January 2010The Certifi

Strany 257 - Figure 7-26

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-15v1.0, January 2010• Temperature operating limits are not likely t

Strany 258 - UTM’s default LAN subnet is

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-20 Managing Users, Authentication, and Certificatesv1.0, January 2010The Trusted

Strany 259 - Figure 7-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-21v1.0, January 2010When a secu

Strany 260

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-22 Managing Users, Authentication, and Certificatesv1.0, January 20102. In the G

Strany 261

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-23v1.0, January 20103. Click th

Strany 262

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-24 Managing Users, Authentication, and Certificatesv1.0, January 20105. Copy the

Strany 263 - Figure 7-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-25v1.0, January 201010. Click B

Strany 264

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-26 Managing Users, Authentication, and Certificatesv1.0, January 2010To view the

Strany 265 - Figure 7-29

10-1v1.0, January 2010Chapter 10Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its perform

Strany 266

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-2 Network and System Managementv1.0, January 2010• Auto-rollover mode (dual-WAN

Strany 267

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-3v1.0, January 2010• ALLOW by schedule, otherwise

Strany 268 - Configuring Keepalives

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-16 Introductionv1.0, January 2010

Strany 269

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-4 Network and System Managementv1.0, January 2010• QoS Profile. You can define

Strany 270 - Figure 7-32

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-5v1.0, January 2010– URL blocking. You can specif

Strany 271 - Figure 7-33

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-6 Network and System Managementv1.0, January 2010LAN WAN Inbound Rules and DMZ

Strany 272

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-7v1.0, January 2010– Address range. The rule is a

Strany 273 - Using SSL Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-8 Network and System Managementv1.0, January 2010e-mail server) and provide pub

Strany 274 - Figure 8-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-9v1.0, January 2010For more information about QoS

Strany 275 - Figure 8-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-10 Network and System Managementv1.0, January 2010To modify the administrator u

Strany 276

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-11v1.0, January 20103. Select the Check to Edit P

Strany 277

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-12 Network and System Managementv1.0, January 2010Configuring Remote Management

Strany 278

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-13v1.0, January 20104. Click Apply to save your c

Strany 279 - Figure 8-4

2-1v1.0, January 2010Chapter 2Using the Setup Wizard to Provision the UTM inYour NetworkUnderstanding the Steps for Initial ConnectionTypically, the U

Strany 280

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-14 Network and System Managementv1.0, January 2010Using an SNMP ManagerSimple N

Strany 281 - Figure 8-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-15v1.0, January 20102. Enter the settings as expl

Strany 282 - Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-16 Network and System Managementv1.0, January 2010The Backup & Restore Sett

Strany 283 - Figure 8-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-17v1.0, January 20102. Select Save file, and then

Strany 284

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-18 Network and System Managementv1.0, January 2010Reverting to Factory Default

Strany 285 - Figure 8-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-19v1.0, January 2010Viewing the Available Firmwar

Strany 286

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-20 Network and System Managementv1.0, January 20103. To see which other firmwar

Strany 287 - Figure 8-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-21v1.0, January 2010Rebooting Without Changing th

Strany 288 - Viewing the UTM SSL VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-22 Network and System Managementv1.0, January 2010The Info section shows the fo

Strany 289 - Figure 8-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-23v1.0, January 2010Configuring Automatic Update

Strany 290 - Creating the Portal Layout

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-2 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010Q

Strany 291 - Figure 8-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-24 Network and System Managementv1.0, January 2010Configuring Date and Time Ser

Strany 292 - Figure 8-13

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-25v1.0, January 20103. Click Apply to save your s

Strany 293

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-26 Network and System Managementv1.0, January 2010

Strany 294

11-1v1.0, January 2010Chapter 11Monitoring System Access and PerformanceThis chapter describes the system monitoring features of the UTM. You can be a

Strany 295 - Figure 8-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-2 Monitoring System Access and Performancev1.0, January 2010The Internet Traffi

Strany 296

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-3v1.0, January 2010Table 11-1. WAN Tra

Strany 297

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-4 Monitoring System Access and Performancev1.0, January 20103. Click Apply to s

Strany 298 - Figure 8-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-5v1.0, January 2010Configuring Logging

Strany 299

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-6 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Strany 300

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-7v1.0, January 2010Figure 11-4

Strany 301 - Figure 8-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-3v1.0, January 20103

Strany 302

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-8 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Strany 303

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-9v1.0, January 2010Enable (continued)S

Strany 304

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-10 Monitoring System Access and Performancev1.0, January 20103. Click Apply to

Strany 305 - Figure 8-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-11v1.0, January 20103. Enter the setti

Strany 306

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-12 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Strany 307

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-13v1.0, January 2010Configuring and Ac

Strany 308

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-14 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Strany 309

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-15v1.0, January 2010Figure 11-7 [Dashb

Strany 310

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-16 Monitoring System Access and Performancev1.0, January 2010To clear the stati

Strany 311 - Chapter 9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-17v1.0, January 2010Threats (Counts)Th

Strany 312 - Configuring Domains

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-4 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 20105

Strany 313 - Figure 9-1

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-18 Monitoring System Access and Performancev1.0, January 2010Table 11-7 explain

Strany 314 - Figure 9-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-19v1.0, January 2010Table 11-8 explain

Strany 315

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-20 Monitoring System Access and Performancev1.0, January 2010Viewing Status Scr

Strany 316

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-21v1.0, January 2010Table 11-9 explain

Strany 317 - Figure 9-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-22 Monitoring System Access and Performancev1.0, January 2010Table 11-10 on pag

Strany 318

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-23v1.0, January 2010Table 11-11 on pag

Strany 319 - Configuring User Accounts

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-24 Monitoring System Access and Performancev1.0, January 2010Viewing Active VPN

Strany 320 - Figure 9-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-25v1.0, January 20102. Click the IPSec

Strany 321 - Table 9-4. Add User Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-26 Monitoring System Access and Performancev1.0, January 20102. Click the SSL V

Strany 322 - Setting User Login Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-27v1.0, January 20102. Click the Statu

Strany 323 - Figure 9-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-5v1.0, January 2010U

Strany 324

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-28 Monitoring System Access and Performancev1.0, January 20102. Click the WAN S

Strany 325 - Figure 9-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-29v1.0, January 2010The Connection Sta

Strany 326 - Figure 9-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-30 Monitoring System Access and Performancev1.0, January 20102. Click the LAN G

Strany 327 - Managing Digital Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-31v1.0, January 2010The Known PCs and

Strany 328

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-32 Monitoring System Access and Performancev1.0, January 2010Querying Logs and

Strany 329 - Managing CA Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-33v1.0, January 2010• System Logs. The

Strany 330 - Managing Self Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-34 Monitoring System Access and Performancev1.0, January 20103. Enter the setti

Strany 331 - Figure 9-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-35v1.0, January 2010Log Type(continued

Strany 332 - Table 9-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-36 Monitoring System Access and Performancev1.0, January 2010Search Criteria(co

Strany 333 - Requests table

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-37v1.0, January 20104. Click one of th

Strany 334 - Figure 9-14

v1.0, January 2010ivOpen SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with

Strany 335

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-6 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010T

Strany 336

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-38 Monitoring System Access and Performancev1.0, January 2010Example: Using Log

Strany 337 - Network and System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-39v1.0, January 2010Scheduling and Gen

Strany 338 - Features That Reduce Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-40 Monitoring System Access and Performancev1.0, January 2010– The following ap

Strany 339

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-41v1.0, January 20103. Enter the setti

Strany 340

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-42 Monitoring System Access and Performancev1.0, January 2010Scheduling Reports

Strany 341

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-43v1.0, January 20104. Click Apply to

Strany 342

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-44 Monitoring System Access and Performancev1.0, January 2010Using the Network

Strany 343

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-45v1.0, January 2010Tracing a RouteA t

Strany 344

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-46 Monitoring System Access and Performancev1.0, January 2010Using the Realtime

Strany 345 - System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-47v1.0, January 2010Gathering Importan

Strany 346 - Figure 10-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-7v1.0, January 2010•

Strany 347

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-48 Monitoring System Access and Performancev1.0, January 2010To generate the Ne

Strany 348 - Figure 10-3

12-1v1.0, January 2010Chapter 12Troubleshooting and Using Online SupportThis chapter provides troubleshooting tips and information for the UTM. After

Strany 349

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-2 Troubleshooting and Using Online Supportv1.0, January 2010Basic FunctioningAf

Strany 350 - Using an SNMP Manager

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-3v1.0, January 2010LAN or WAN Port LED

Strany 351 - Table 10-1. SNMP Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-4 Troubleshooting and Using Online Supportv1.0, January 2010• If your UTM’s IP

Strany 352 - Figure 10-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-5v1.0, January 2010• If the computer i

Strany 353

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-6 Troubleshooting and Using Online Supportv1.0, January 2010If your UTM is stil

Strany 354 - Updating the Firmware

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-7v1.0, January 2010Troubleshooting a T

Strany 355 - Figure 10-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-8 Troubleshooting and Using Online Supportv1.0, January 2010Testing the Path fr

Strany 356

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-9v1.0, January 2010Restoring the Defau

Strany 357

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-8 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010S

Strany 358 - Figure 10-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-10 Troubleshooting and Using Online Supportv1.0, January 2010Problems with Date

Strany 359

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-11v1.0, January 2010To initiate the su

Strany 360 - Figure 10-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-12 Troubleshooting and Using Online Supportv1.0, January 2010To submit a file t

Strany 361

Default Settings and Technical Specifications A-1v1.0, January 2010Appendix ADefault Settings and Technical SpecificationsYou can use the Reset button

Strany 362

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-2 Default Settings and Technical Specificationsv1.0, January 2010Table A-2 shows

Strany 363 - Chapter 11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualDefault Settings and Technical Specifications A-3v1.0, January 2010Table A-3 shows

Strany 364 - Figure 11-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-4 Default Settings and Technical Specificationsv1.0, January 2010Table A-4 shows

Strany 365

Network Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-1v1.0, January 2010Appendix BNetwork Planning for Dual WAN Ports(Dual-WAN Port Model

Strany 366 - Figure 11-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-2 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strany 367 - Figure 11-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-3v1.0, January 2

Strany 368

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-9v1.0, January 2010T

Strany 369 - Figure 11-4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-4 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strany 370

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-5v1.0, January 2

Strany 371

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-6 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strany 372

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-7v1.0, January 2

Strany 373 - Table 11-4. Alerts Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-8 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strany 374

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-9v1.0, January 2

Strany 375 - Figure 11-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-10 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strany 376

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-11v1.0, January

Strany 377

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-12 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strany 378 - Information

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-13v1.0, January

Strany 379

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-10 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 380

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-14 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strany 381

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-15v1.0, January

Strany 382 - Viewing Status Screens

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-16 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strany 383

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-17v1.0, January

Strany 384 - Port section

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-18 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strany 385

System Logs and Error Messages C-1v1.0, January 2010Appendix CSystem Logs and Error MessagesThis appendix explains provides examples and explanations

Strany 386 - Viewing Active VPN Users

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-2 System Logs and Error Messagesv1.0, January 2010System Log MessagesThis sectio

Strany 387 - Figure 11-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-3v1.0, January 2010Service LogsThis section descr

Strany 388 - Figure 11-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-4 System Logs and Error Messagesv1.0, January 2010Login/LogoutThis section descr

Strany 389 - Viewing the WAN Ports Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-5v1.0, January 2010WAN StatusThis section describ

Strany 390 - Figure 11-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-11v1.0, January 2010

Strany 391 - Status Informations

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-6 System Logs and Error Messagesv1.0, January 2010Load-Balancing ModeWhen the WA

Strany 392 - Figure 11-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-7v1.0, January 2010PPP LogsThis section describes

Strany 393

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-8 System Logs and Error Messagesv1.0, January 2010• PPTP Idle-Timeout Logs• PPP

Strany 394 - Querying the Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-9v1.0, January 2010Traffic Metering LogsThis sect

Strany 395

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-10 System Logs and Error Messagesv1.0, January 2010Multicast/Broadcast LogsThis

Strany 396 - Figure 11-23

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-11v1.0, January 2010Message 2007 Oct 1 00:44:17 [

Strany 397

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-12 System Logs and Error Messagesv1.0, January 2010Content Filtering and Securit

Strany 398

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-13v1.0, January 2010Spam LogsThis section describ

Strany 399

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-14 System Logs and Error Messagesv1.0, January 2010Traffic LogsThis section desc

Strany 400

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-15v1.0, January 2010IPS LogsThis section describe

Strany 401

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-12 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 402

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-16 System Logs and Error Messagesv1.0, January 2010Routing LogsThis section expl

Strany 403 - Figure 11-24

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-17v1.0, January 2010WAN to LAN LogsThis section d

Strany 404 - Figure 11-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-18 System Logs and Error Messagesv1.0, January 2010

Strany 405 - Using Diagnostics Utilities

Two Factor Authentication D-1v1.0, January 2010Appendix DTwo Factor AuthenticationThis appendix provides an overview of Two-Factor Authentication, and

Strany 406

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-2 Two Factor Authenticationv1.0, January 2010• Quick to deploy and manage. The W

Strany 407

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTwo Factor Authentication D-3v1.0, January 2010The request-response architecture i

Strany 408

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-4 Two Factor Authenticationv1.0, January 20103. The user then proceeds to the Tw

Strany 409

Related Documents E-1v1.0, January 2010Appendix ERelated DocumentsThis appendix provides links to reference documents you can use to gain a more compl

Strany 410

ProSecure Unified Threat Management (UTM) Appliance Reference ManualE-2 Related Documentsv1.0, January 2010

Strany 411 - Chapter 12

Index-1v1.0, January 2010IndexNumerics10BaseT, 100BaseT, and 1000BaseT 3-23AAAA 7-40AC input 1-12access, remote management 10-12action buttons (We

Strany 412 - Basic Functioning

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-13v1.0, January 2010

Strany 413 - LAN or WAN Port LEDs Not On

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-2v1.0, January 2010Bbacking up, configuration file 10-16bandwidth capacitya

Strany 414

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-3v1.0, January 2010managing 10-15restoring 10-17reverting to defaults 10-

Strany 415

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-4v1.0, January 2010DMZDHCPaddress pool 4-20DNS servers 4-21domain name 4-

Strany 416

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-5v1.0, January 2010Ffactory default settingsreverting to 10-18service licen

Strany 417

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-6v1.0, January 2010HTTPaction, infected Web file or object 2-20, 6-22defaul

Strany 418

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-7v1.0, January 2010IP header 5-37IP precedence 5-37IP security. See IPsec.

Strany 419 - Figure 12-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-8v1.0, January 2010configuring options 11-8e-mail address for sending logs

Strany 420 - Using Online Support

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-9v1.0, January 2010planning, dual WAN ports (dual-WAN port models) B-1proto

Strany 421 - Figure 12-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-10v1.0, January 2010IPsec VPNautomatically generated (auto) 7-31groups, con

Strany 422 - Figure 12-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-11v1.0, January 2010description 5-35examples 5-35shifting traffic mix 10-

Strany 423 - Appendix A

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-14 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 424

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-12v1.0, January 2010scan engine firmware 10-21scan exceptionse-mail message

Strany 425

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-13v1.0, January 2010spamblocked messages, recent 5 and top 5 11-18Distribut

Strany 426

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-14v1.0, January 2010tabs, submenu (Web Management Interface) 2-5TCP flood,

Strany 427 - (Dual-WAN Port Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-15v1.0, January 2010VvideoconferencingDMZ port 4-18from restricted address

Strany 428

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-16v1.0, January 2010WWANaliases 3-17auto-rollover mode (dual-WAN port model

Strany 429

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-15v1.0, January 2010

Strany 430

v1.0, January 2010vProduct and Publication DetailsPPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in sou

Strany 431

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-16 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 432 - Figure B-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-17v1.0, January 2010

Strany 433 - Inbound Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-18 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 434 - Figure B-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-19v1.0, January 2010

Strany 435 - Figure B-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-20 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 436 - Figure B-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-21v1.0, January 2010

Strany 437 - Figure B-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-22 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 438 - Figure B-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-23v1.0, January 2010

Strany 439 - VPN Gateway-to-Gateway

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-24 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 440 - Figure B-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-25v1.0, January 2010

Strany 441 - Figure B-16

v1.0, January 2010vi

Strany 442 - Figure B-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-26 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 443 - Figure B-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-27v1.0, January 2010

Strany 444 - Figure B-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-28 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strany 445 - Appendix C

3-1v1.0, January 2010Chapter 3Manually Configuring Internet and WAN SettingsThis chapter contains the following sections:• “Understanding the Internet

Strany 446 - System Log Messages

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-2 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Configure d

Strany 447 - Service Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-3v1.0, January 20102. Click the A

Strany 448 - IPsec Restart

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-4 Manually Configuring Internet and WAN Settingsv1.0, January 2010The auto-detec

Strany 449 - WAN Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-5v1.0, January 2010The WAN Status

Strany 450 - Load-Balancing Mode

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-6 Manually Configuring Internet and WAN Settingsv1.0, January 2010To manually co

Strany 451 - • PPPoE Idle-Timeout Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-7v1.0, January 20105. If your con

Strany 452 - • PPP Authentication Logs

viiv1.0, January 2010ContentsProSecure Unified Threat Management (UTM) Appliance Reference ManualAbout This ManualConventions, Formats, and Scope ...

Strany 453 - Unicast Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-8 Manually Configuring Internet and WAN Settingsv1.0, January 20106. Configure t

Strany 454 - Invalid Packet Logging

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-9v1.0, January 20108. Click Test

Strany 455

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-10 Manually Configuring Internet and WAN Settingsv1.0, January 2010If you want t

Strany 456

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-11v1.0, January 2010Classical Rou

Strany 457 - Spam Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-12 Manually Configuring Internet and WAN Settingsv1.0, January 2010To configure

Strany 458 - E-mail Filter Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-13v1.0, January 2010WAN Failure D

Strany 459 - Port Scan Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-14 Manually Configuring Internet and WAN Settingsv1.0, January 20103. Click Appl

Strany 460 - Routing Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-15v1.0, January 2010a. Figure 3-9

Strany 461 - WAN to DMZ Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-16 Manually Configuring Internet and WAN Settingsv1.0, January 2010b. Click the

Strany 462

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-17v1.0, January 2010Configuring S

Strany 463 - Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manualviiiv1.0, January 2010Chapter 2 Using the Setup Wizard to Provision the UTM in You

Strany 464 - D-2 Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-18 Manually Configuring Internet and WAN Settingsv1.0, January 2010To add a seco

Strany 465 - Figure D-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-19v1.0, January 2010Configuring D

Strany 466 - Figure D-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-20 Manually Configuring Internet and WAN Settingsv1.0, January 2010The WAN Mode

Strany 467 - Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-21v1.0, January 20104. Click the

Strany 468 - E-2 Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-22 Manually Configuring Internet and WAN Settingsv1.0, January 20107. Click Appl

Strany 469 - Numerics

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-23v1.0, January 20103. Enter the

Strany 470

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-24 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Click Appl

Strany 471

4-1v1.0, January 2010Chapter 4LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains th

Strany 472

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-2 LAN Configurationv1.0, January 2010VLANs have a number of advantages:• It is e

Strany 473

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-3v1.0, January 2010When you create a VLAN profile, assign LAN

Strany 474

ProSecure Unified Threat Management (UTM) Appliance Reference Manualixv1.0, January 2010Configuring Secondary WAN Addresses ...

Strany 475

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-4 LAN Configurationv1.0, January 2010For each VLAN profile, the following fields

Strany 476

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-5v1.0, January 2010The UTM delivers the following settings to

Strany 477

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-6 LAN Configurationv1.0, January 2010LDAP ServerA Lightweight Directory Access P

Strany 478 - Index-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-7v1.0, January 20102. Either select an entry from the VLAN Pro

Strany 479 - Index-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-8 LAN Configurationv1.0, January 20103. Enter the settings as explained in Table

Strany 480 - Index-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-9v1.0, January 2010Enable DHCP Server(continued)Starting IP Ad

Strany 481 - Index-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-10 LAN Configurationv1.0, January 20104. Click Apply to save your settings.Enabl

Strany 482 - Index-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-11v1.0, January 2010Configuring Multi-Home LAN IPs on the Defa

Strany 483 - Index-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-12 LAN Configurationv1.0, January 20103. In the Add Secondary LAN IPs section of

Strany 484 - Index-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-13v1.0, January 2010Some advantages of the Network Database ar

Komentáře k této Příručce

Žádné komentáře