Netgear UTM5 Manual do Utilizador

Consulte online ou descarregue Manual do Utilizador para Routers Netgear UTM5. Netgear UTM5 User's Manual Manual do Utilizador

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 484
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 0
202-10482-02
January 2010
v1.0
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
ProSecure Unified Threat
Management (UTM)
Appliance Reference Manual
Vista de página 0
1 2 3 4 5 6 ... 483 484

Resumo do Conteúdo

Página 1 - Appliance Reference Manual

202-10482-02 January 2010v1.0NETGEAR, Inc.350 East Plumeria DriveSan Jose, CA 95134ProSecure Unified Threat Management (UTM) Appliance Reference Manua

Página 2

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxv1.0, January 2010Managing the Application Level Gateway for SIP Sessions ...

Página 3 - Additional Copyrights

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-14 LAN Configurationv1.0, January 2010The Known PCs and Devices table lists the

Página 4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-15v1.0, January 2010Adding PCs or Devices to the Network Datab

Página 5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-16 LAN Configurationv1.0, January 2010Editing PCs or Devices in the Network Data

Página 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-17v1.0, January 20103. Click the Edit Group Names option arrow

Página 7 - Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-18 LAN Configurationv1.0, January 2010To reserve an IP address, select Reserved

Página 8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-19v1.0, January 2010To enable and configure the DMZ port: 1. S

Página 9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-20 LAN Configurationv1.0, January 2010Table 4-3. DMZ Setup SettingsSetting Descr

Página 10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-21v1.0, January 2010Enable DHCP Server(continued)Primary DNS S

Página 11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-22 LAN Configurationv1.0, January 20103. Click Apply to save your settings.To de

Página 12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-23v1.0, January 2010Configuring Static RoutesTo add a static r

Página 13

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiv1.0, January 2010Creating Gateway-to-Gateway VPN Tunnels with the Wizard ...

Página 14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-24 LAN Configurationv1.0, January 20103. Enter the settings as explained in Tabl

Página 15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-25v1.0, January 2010To enable and configure RIP:1. Select Netw

Página 16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-26 LAN Configurationv1.0, January 2010Table 4-5. RIP Configuration SettingsSetti

Página 17 - About This Manual

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-27v1.0, January 20104. Click Apply to save your settings.Stati

Página 18 - Revision History

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-28 LAN Configurationv1.0, January 2010

Página 19 - Introduction

5-1v1.0, January 2010Chapter 5Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chap

Página 20 - Key Features and Capabilities

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-2 Firewall Protectionv1.0, January 2010Administrator TipsConsider the following

Página 21 - Outbound Load Balancing

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-3v1.0, January 2010Using Rules to Block or Allow Specific Ki

Página 22 - A Powerful, True Firewall

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-4 Firewall Protectionv1.0, January 2010• Quality of Service (QoS) priorities. Ea

Página 23 - Security Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-5v1.0, January 2010Table 5-2. Outbound Rules OverviewSettin

Página 24 - Extensive Protocol Support

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiv1.0, January 2010Viewing the UTM SSL VPN Connection Status ...

Página 25 - Model Comparison

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-6 Firewall Protectionv1.0, January 2010Inbound Rules (Port Forwarding)If you hav

Página 26 - Figure 1-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-7v1.0, January 2010Whether or not DHCP is enabled, how the P

Página 27 - Package Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-8 Firewall Protectionv1.0, January 2010.Table 5-3. Inbound Rules Overview Sett

Página 28 - Hardware Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-9v1.0, January 2010LAN Users The settings that determine whi

Página 29 - Table 1-2. LED Descriptions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-10 Firewall Protectionv1.0, January 2010Log The settings that determines whether

Página 30 - Rear Panel

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-11v1.0, January 2010Order of Precedence for RulesAs you defi

Página 31 - Figure 1-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-12 Firewall Protectionv1.0, January 2010Setting LAN WAN RulesThe default outboun

Página 32 - Figure 1-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-13v1.0, January 2010To make changes to an existing outbound

Página 33 - Using the Rack-Mounting Kit

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-14 Firewall Protectionv1.0, January 2010To create a new outbound LAN WAN service

Página 34 - 1-16 Introduction

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-15v1.0, January 2010To create a new inbound LAN WAN service

Página 35 - Your Network

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiiv1.0, January 2010Updating the Scan Signatures and Scan Engine Firmware ...

Página 36 - Logging In to the UTM

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-16 Firewall Protectionv1.0, January 2010To access the DMZ WAN Rules screen:1. Se

Página 37 - Figure 2-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-17v1.0, January 20102. Click one of the following table butt

Página 38 - Figure 2-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-18 Firewall Protectionv1.0, January 2010DMZ WAN Inbound Services RulesThe Inboun

Página 39

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-19v1.0, January 2010Setting LAN DMZ RulesThe LAN DMZ Rules s

Página 40 - Figure 2-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-20 Firewall Protectionv1.0, January 2010• Up. Moves the rule up one position in

Página 41 - Figure 2-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-21v1.0, January 20102. Enter the settings as explained in Ta

Página 42 - Figure 2-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-22 Firewall Protectionv1.0, January 2010Inbound Rules ExamplesLAN WAN Inbound Ru

Página 43

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-23v1.0, January 2010LAN WAN or DMZ WAN Inbound Rule: Setting

Página 44

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-24 Firewall Protectionv1.0, January 2010To configure the UTM for additional IP a

Página 45 - Figure 2-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-25v1.0, January 20106. In the Send to LAN Server field, ente

Página 46

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxivv1.0, January 2010Troubleshooting the ISP Connection ...

Página 47

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-26 Firewall Protectionv1.0, January 2010Outbound Rules ExampleOutbound rules let

Página 48 - Figure 2-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-27v1.0, January 2010Configuring Other Firewall FeaturesYou c

Página 49

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-28 Firewall Protectionv1.0, January 20102. Click the Attack Checks submenu tab.

Página 50 - Figure 2-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-29v1.0, January 20104. Click Apply to save your settings. LA

Página 51

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-30 Firewall Protectionv1.0, January 2010Setting Session LimitsSession limits all

Página 52 - Figure 2-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-31v1.0, January 20105. Click Apply to save your settings.Man

Página 53 - Figure 2-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-32 Firewall Protectionv1.0, January 20103. Select the Enable SIP checkbox.4. Cli

Página 54

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-33v1.0, January 2010For example, Web servers serve Web pages

Página 55 - Figure 2-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-34 Firewall Protectionv1.0, January 20102. In the Add Customer Service section o

Página 56

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-35v1.0, January 20102. Modify the settings that you wish to

Página 57

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxvv1.0, January 2010Firewall Restart ...

Página 58 - Figure 2-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-36 Firewall Protectionv1.0, January 2010To create a QoS profile:1. Select Networ

Página 59

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-37v1.0, January 20105. Click Apply to save your settings. Th

Página 60 - Verifying Proper Installation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-38 Firewall Protectionv1.0, January 20103. Click Apply to save your changes. The

Página 61 - Figure 2-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-39v1.0, January 2010The screen displays the List of Bandwidt

Página 62 - What to Do Next

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-40 Firewall Protectionv1.0, January 20105. Click Apply to save your settings. Th

Página 63 - Chapter 3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-41v1.0, January 2010Setting a Schedule to Block or Allow Spe

Página 64

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-42 Firewall Protectionv1.0, January 2010• Specific Times. The schedule is active

Página 65 - Figure 3-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-43v1.0, January 20102. In the MAC Filtering Enable section,

Página 66 - Figure 3-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-44 Firewall Protectionv1.0, January 2010Setting up IP/MAC BindingsIP/MAC Binding

Página 67 - Setting the UTM’s MAC Address

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-45v1.0, January 20103. Enter the settings as explained in Ta

Página 68 - Figure 3-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviv1.0, January 2010

Página 69

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-46 Firewall Protectionv1.0, January 20104. Click the Add table button. The new I

Página 70

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-47v1.0, January 2010Note these restrictions on port triggeri

Página 71 - Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-48 Firewall Protectionv1.0, January 20103. Click the Add table button. The new p

Página 72

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-49v1.0, January 2010Using the Intrusion Prevention SystemThe

Página 73

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-50 Firewall Protectionv1.0, January 2010When you enable the IPS, the default IPS

Página 74 - WAN Mode screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-51v1.0, January 2010.Figure 5-31

Página 75

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-52 Firewall Protectionv1.0, January 2010Table 5-11. IPS: Less Familiar Attack Na

Página 76

6-1v1.0, January 2010Chapter 6Content Filtering and Optimizing ScansThis chapter describes how to apply the content filtering features of the UTM and

Página 77 - Figure 3-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-2 Content Filtering and Optimizing Scansv1.0, January 2010Default E-mail and Web

Página 78

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-3v1.0, January 2010Configuring E-mail Pro

Página 79

xviiv1.0, January 2010About This ManualThe NETGEAR® ProSecure™ Unified Threat Management (UTM) Appliance Reference Manual describes how to install, co

Página 80 - Figure 3-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-4 Content Filtering and Optimizing Scansv1.0, January 2010Customizing E-mail Pro

Página 81 - Configuring Dynamic DNS

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-5v1.0, January 2010Customizing E-mail Ant

Página 82 - Figure 3-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-6 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Página 83 - Figure 3-12:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-7v1.0, January 2010Append Safe Stamp (SMT

Página 84 - Figure 3-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-8 Content Filtering and Optimizing Scansv1.0, January 20103. Click Apply to save

Página 85

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-9v1.0, January 2010To configure e-mail co

Página 86

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-10 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Página 87 - LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-11v1.0, January 20103. Click Apply to sav

Página 88 - 4-2 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-12 Content Filtering and Optimizing Scansv1.0, January 20103. Real-time blacklis

Página 89 - Figure 4-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-13v1.0, January 2010To configure the whit

Página 90 - VLAN DHCP Options

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviiiv1.0, January 2010• Scope. This manual is written for the UTM according to th

Página 91 - LAN Configuration 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-14 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Página 92 - Configuring a VLAN Profile

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-15v1.0, January 2010blacklist providers a

Página 93 - Figure 4-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-16 Content Filtering and Optimizing Scansv1.0, January 20102. Click the Add tabl

Página 94 - 4-8 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-17v1.0, January 20103. Enter the settings

Página 95 - LAN Configuration 4-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-18 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Página 96 - 4-10 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-19v1.0, January 2010Configuring Web and S

Página 97 - Figure 4-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-20 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Página 98 - 4-12 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-21v1.0, January 20103. Click Apply to sav

Página 99 - Managing the Network Database

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-22 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Página 100 - Figure 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-23v1.0, January 20103. Click Apply to sav

Página 101 - LAN Configuration 4-15

1-1v1.0, January 2010Chapter 1IntroductionThis chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Managemen

Página 102 - Figure 4-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-24 Content Filtering and Optimizing Scansv1.0, January 2010Several types of Web

Página 103 - LAN Configuration 4-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-25v1.0, January 2010To configure Web cont

Página 104 - 4-18 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-26 Content Filtering and Optimizing Scansv1.0, January 2010.Figure 6-10 [Content

Página 105 - Figure 4-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-27v1.0, January 2010.3. Enter the setting

Página 106 - Table 4-3. DMZ Setup Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-28 Content Filtering and Optimizing Scansv1.0, January 2010Table 6-8. Content Fi

Página 107 - LAN Configuration 4-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-29v1.0, January 2010Select the Web Catego

Página 108 - Managing Routing

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-30 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Página 109 - Configuring Static Routes

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-31v1.0, January 2010To configure Web URL

Página 110 - 4-24 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-32 Content Filtering and Optimizing Scansv1.0, January 20103. Enter the settings

Página 111 - To enable and configure RIP:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-33v1.0, January 20104. Click Apply to sav

Página 112 - 4-26 LAN Configuration

iiv1.0, January 2010© 2009–2010 by NETGEAR, Inc. All rights reserved.TrademarksNETGEAR and the NETGEAR logo are registered trademarks and ProSecure an

Página 113 - Static Route Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-2 Introductionv1.0, January 2010Key Features and CapabilitiesThe UTM provides th

Página 114 - 4-28 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-34 Content Filtering and Optimizing Scansv1.0, January 2010HTTPS Scan SettingsHT

Página 115 - Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-35v1.0, January 2010If one of these is no

Página 116 - Administrator Tips

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-36 Content Filtering and Optimizing Scansv1.0, January 2010To configure the HTTP

Página 117 - Services-Based Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-37v1.0, January 20104. Click Apply to sav

Página 118 - 5-4 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-38 Content Filtering and Optimizing Scansv1.0, January 2010Note that certain sit

Página 119 - Firewall Protection 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-39v1.0, January 20103. Enter the settings

Página 120 - 5-6 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-40 Content Filtering and Optimizing Scansv1.0, January 2010To configure the FTP

Página 121 - Firewall Protection 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-41v1.0, January 20103. Click Apply to sav

Página 122 - 5-8 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-42 Content Filtering and Optimizing Scansv1.0, January 2010To set Web access exc

Página 123 - Firewall Protection 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-43v1.0, January 20103. Enter the settings

Página 124 - 5-10 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-3v1.0, January 2010Dual-WAN Port Models for Increased Reliability o

Página 125 - Order of Precedence for Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-44 Content Filtering and Optimizing Scansv1.0, January 20102. Modify the setting

Página 126 - Setting LAN WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-45v1.0, January 20102. In the Add Scannin

Página 127 - Firewall Protection 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-46 Content Filtering and Optimizing Scansv1.0, January 2010

Página 128 - Figure 5-3

7-1v1.0, January 2010Chapter 7Virtual Private NetworkingUsing IPsec ConnectionsThis chapter describes how to use the IP security (IPsec) virtual priva

Página 129 - Setting DMZ WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-2 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010See “Virtu

Página 130 - Figure 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-3v1.0, January 2010Using the

Página 131 - Figure 5-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-4 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Creating G

Página 132 - Figure 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-5v1.0, January 2010To view th

Página 133 - Setting LAN DMZ Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-6 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Select

Página 134 - Figure 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-7v1.0, January 2010. .This VP

Página 135 - Figure 5-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-4 Introductionv1.0, January 2010A Powerful, True FirewallUnlike simple Internet

Página 136 - Inbound Rules Examples

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-8 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click A

Página 137 - Figure 5-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-9v1.0, January 2010Creating a

Página 138 - Figure 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-10 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010To displa

Página 139 - Firewall Protection 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-11v1.0, January 20103. Select

Página 140 - Outbound Rules Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-12 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Página 141 - Attack Checks

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-13v1.0, January 20102. In the

Página 142 - Figure 5-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-14 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Enter

Página 143 - Firewall Protection 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-15v1.0, January 20105. In the

Página 144 - Setting Session Limits

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-16 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Página 145 - Firewall Protection 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-17v1.0, January 20109. Enter

Página 146 - Adding Customized Services

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-5v1.0, January 2010• Objectionable traffic protection. The UTM prev

Página 147 - Figure 5-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-18 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010In the ex

Página 148 - Figure 5-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-19v1.0, January 2010• Right-c

Página 149 - Firewall Protection 5-35

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-20 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010The VPN c

Página 150 - Figure 5-22

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-21v1.0, January 2010The Activ

Página 151 - Firewall Protection 5-37

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-22 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Managing

Página 152 - Creating Bandwidth Profiles

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-23v1.0, January 2010Managing

Página 153 - Profile screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-24 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Each pol

Página 154 - 5-40 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-25v1.0, January 2010To add or

Página 155 - Figure 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-26 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Figure 7

Página 156 - Enabling Source MAC Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-27v1.0, January 20103. Comple

Página 157 - Figure 5-26

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-6 Introductionv1.0, January 2010Extensive Protocol SupportThe UTM supports the T

Página 158 - Setting up IP/MAC Bindings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-28 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010LocalSele

Página 159 - Figure 5-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-29v1.0, January 2010Authentic

Página 160 - Configuring Port Triggering

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-30 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Página 161 - Figure 5-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-31v1.0, January 20104. Click

Página 162 - Figure 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-32 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Página 163 - Figure 5-30

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-33v1.0, January 2010To delete

Página 164 - 5-50 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-34 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Figure 7-

Página 165 - Figure 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-35v1.0, January 20104. Comple

Página 166 - 5-52 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-36 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Traffic S

Página 167 - Chapter 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-37v1.0, January 2010Integrity

Página 168

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-7v1.0, January 2010• SSL VPN Wizard. The UTM includes the NETGEAR S

Página 169 - Configuring E-mail Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-38 Virtual Private Networking Using IPsec Connectionsv1.0, January 20105. Click

Página 170 - Figure 6-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-39v1.0, January 2010You can e

Página 171 - Figure 6-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-40 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Comple

Página 172

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-41v1.0, January 2010server in

Página 173

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-42 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Comple

Página 174 - E-mail Content Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-43v1.0, January 2010Assigning

Página 175 - Figure 6-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-44 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Página 176

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-45v1.0, January 2010.4. Compl

Página 177

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-46 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010WINS Serv

Página 178

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-47v1.0, January 20105. Click

Página 179 - Figure 6-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-8 Introductionv1.0, January 2010Service Registration Card with License KeysBe su

Página 180

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-48 Virtual Private Networking Using IPsec Connectionsv1.0, January 20108. On the

Página 181 - Figure 6-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-49v1.0, January 2010RemoteIde

Página 182

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-50 Virtual Private Networking Using IPsec Connectionsv1.0, January 20109. Click

Página 183 - Figure 6-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-51v1.0, January 20102. In the

Página 184

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-52 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Página 185

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-53v1.0, January 20105. In the

Página 186 - Figure 6-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-54 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Página 187 - Configuring Web Malware Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-55v1.0, January 20109. Enter

Página 188 - Figure 6-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-56 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Configuri

Página 189

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-57v1.0, January 20104. Enter

Página 190

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-9v1.0, January 2010Package ContentsThe UTM product package contains

Página 191

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-58 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. In the

Página 192

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-59v1.0, January 2010Configuri

Página 193

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-60 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010

Página 194

8-1v1.0, January 2010Chapter 8Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically

Página 195

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-2 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• SSL Port F

Página 196 - Configuring Web URL Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-3v1.0, January 2010The followin

Página 197 - Figure 6-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-4 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: If you

Página 198

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-5v1.0, January 2010SSL VPN Wiza

Página 199

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-6 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note that Fi

Página 200 - HTTPS Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-7v1.0, January 2010SSL VPN Wiza

Página 201 - Figure 6-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-10 Introductionv1.0, January 2010Hardware FeaturesThe front panel ports and LEDs

Página 202 - Figure 6-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-8 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: After

Página 203 - Specifying Trusted Hosts

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-9v1.0, January 2010SSL VPN Wiza

Página 204 - Figure 6-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-10 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Table 8-4.

Página 205 - Configuring FTP Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-11v1.0, January 2010SSL VPN Wiz

Página 206 - Table 6-12. FTP Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-12 Virtual Private Networking Using SSL Connectionsv1.0, January 2010TCP Port Nu

Página 207

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-13v1.0, January 2010SSL VPN Wiz

Página 208 - Figure 6-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-14 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Verify your

Página 209

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-15v1.0, January 20104. Enter th

Página 210 - Setting Scanning Exclusions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-16 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The default

Página 211 - Figure 6-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-17v1.0, January 20103. From the

Página 212

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-11v1.0, January 2010The function of each LED is described in Table

Página 213 - Using IPsec Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-18 Virtual Private Networking Using SSL Connectionsv1.0, January 2010When you de

Página 214

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-19v1.0, January 2010Portal layo

Página 215 - Configurations

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-20 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The List of

Página 216 - Figure 7-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-21v1.0, January 20104. Complete

Página 217 - Figure 7-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-22 Virtual Private Networking Using SSL Connectionsv1.0, January 20105. Click Ap

Página 218 - Figure 7-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-23v1.0, January 2010Adding Serv

Página 219

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-24 Virtual Private Networking Using SSL Connectionsv1.0, January 20104. Click th

Página 220 - Figure 7-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-25v1.0, January 20103. In the A

Página 221 - Figure 7-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-26 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• If you en

Página 222 - Figure 7-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-27v1.0, January 20103. Select t

Página 223

v1.0, January 2010iiiFederal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been gra

Página 224 - Figure 7-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-12 Introductionv1.0, January 2010Rear PanelThe rear panel of the UTM includes a

Página 225 - Figure 7-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-28 Virtual Private Networking Using SSL Connectionsv1.0, January 2010To add an S

Página 226 - Editor menu

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-29v1.0, January 2010Adding New

Página 227 - Figure 7-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-30 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Editing Net

Página 228

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-31v1.0, January 20105. Click Ap

Página 229 - Testing the VPN Connection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-32 Virtual Private Networking Using SSL Connectionsv1.0, January 2010For example

Página 230 - Figure 7-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-33v1.0, January 20102. Make you

Página 231 - Figure 7-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-34 Virtual Private Networking Using SSL Connectionsv1.0, January 2010.3. Select

Página 232 - Figure 7-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-35v1.0, January 2010Add SSL VPN

Página 233 - Viewing the UTM IPsec VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-36 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Apply Polic

Página 234 - Managing IPsec VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-37v1.0, January 20104. Click Ap

Página 235 - Managing IKE Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-13v1.0, January 2010Figure 1-4 shows the product label for the UTM5

Página 236 - Figure 7-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-38 Virtual Private Networking Using SSL Connectionsv1.0, January 2010

Página 237

9-1v1.0, January 2010Chapter 9Managing Users, Authentication, and CertificatesThis chapter describes how to manage users, authentication, and security

Página 238 - Figure 7-21

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-2 Managing Users, Authentication, and Certificatesv1.0, January 2010Configuring

Página 239

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-3v1.0, January 2010To create a

Página 240

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-4 Managing Users, Authentication, and Certificatesv1.0, January 20102. Under the

Página 241

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-5v1.0, January 20104. Click App

Página 242

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-6 Managing Users, Authentication, and Certificatesv1.0, January 20106. If you ch

Página 243 - Managing VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-7v1.0, January 2010Creating and

Página 244 - Figure 7-22

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-8 Managing Users, Authentication, and Certificatesv1.0, January 20103. Click the

Página 245

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-9v1.0, January 20103. Modify th

Página 246 - Figure 7-23

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-14 Introductionv1.0, January 2010Figure 1-6 shows the product label for the UTM2

Página 247

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-10 Managing Users, Authentication, and Certificatesv1.0, January 2010To create a

Página 248

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-11v1.0, January 20103. Enter th

Página 249

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-12 Managing Users, Authentication, and Certificatesv1.0, January 20104. Click Ap

Página 250

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-13v1.0, January 20104. Click Ap

Página 251

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-14 Managing Users, Authentication, and Certificatesv1.0, January 20104. In the D

Página 252 - RADIUS Client Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-15v1.0, January 20103. Click th

Página 253 - Figure 7-24

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-16 Managing Users, Authentication, and Certificatesv1.0, January 20107. Click th

Página 254

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-17v1.0, January 20103. Enter th

Página 255 - Mode Config Operation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-18 Managing Users, Authentication, and Certificatesv1.0, January 2010On the UTM,

Página 256 - Figure 7-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-19v1.0, January 2010The Certifi

Página 257 - Figure 7-26

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-15v1.0, January 2010• Temperature operating limits are not likely t

Página 258 - UTM’s default LAN subnet is

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-20 Managing Users, Authentication, and Certificatesv1.0, January 2010The Trusted

Página 259 - Figure 7-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-21v1.0, January 2010When a secu

Página 260

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-22 Managing Users, Authentication, and Certificatesv1.0, January 20102. In the G

Página 261

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-23v1.0, January 20103. Click th

Página 262

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-24 Managing Users, Authentication, and Certificatesv1.0, January 20105. Copy the

Página 263 - Figure 7-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-25v1.0, January 201010. Click B

Página 264

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-26 Managing Users, Authentication, and Certificatesv1.0, January 2010To view the

Página 265 - Figure 7-29

10-1v1.0, January 2010Chapter 10Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its perform

Página 266

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-2 Network and System Managementv1.0, January 2010• Auto-rollover mode (dual-WAN

Página 267

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-3v1.0, January 2010• ALLOW by schedule, otherwise

Página 268 - Configuring Keepalives

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-16 Introductionv1.0, January 2010

Página 269

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-4 Network and System Managementv1.0, January 2010• QoS Profile. You can define

Página 270 - Figure 7-32

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-5v1.0, January 2010– URL blocking. You can specif

Página 271 - Figure 7-33

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-6 Network and System Managementv1.0, January 2010LAN WAN Inbound Rules and DMZ

Página 272

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-7v1.0, January 2010– Address range. The rule is a

Página 273 - Using SSL Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-8 Network and System Managementv1.0, January 2010e-mail server) and provide pub

Página 274 - Figure 8-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-9v1.0, January 2010For more information about QoS

Página 275 - Figure 8-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-10 Network and System Managementv1.0, January 2010To modify the administrator u

Página 276

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-11v1.0, January 20103. Select the Check to Edit P

Página 277

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-12 Network and System Managementv1.0, January 2010Configuring Remote Management

Página 278

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-13v1.0, January 20104. Click Apply to save your c

Página 279 - Figure 8-4

2-1v1.0, January 2010Chapter 2Using the Setup Wizard to Provision the UTM inYour NetworkUnderstanding the Steps for Initial ConnectionTypically, the U

Página 280

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-14 Network and System Managementv1.0, January 2010Using an SNMP ManagerSimple N

Página 281 - Figure 8-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-15v1.0, January 20102. Enter the settings as expl

Página 282 - Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-16 Network and System Managementv1.0, January 2010The Backup & Restore Sett

Página 283 - Figure 8-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-17v1.0, January 20102. Select Save file, and then

Página 284

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-18 Network and System Managementv1.0, January 2010Reverting to Factory Default

Página 285 - Figure 8-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-19v1.0, January 2010Viewing the Available Firmwar

Página 286

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-20 Network and System Managementv1.0, January 20103. To see which other firmwar

Página 287 - Figure 8-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-21v1.0, January 2010Rebooting Without Changing th

Página 288 - Viewing the UTM SSL VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-22 Network and System Managementv1.0, January 2010The Info section shows the fo

Página 289 - Figure 8-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-23v1.0, January 2010Configuring Automatic Update

Página 290 - Creating the Portal Layout

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-2 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010Q

Página 291 - Figure 8-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-24 Network and System Managementv1.0, January 2010Configuring Date and Time Ser

Página 292 - Figure 8-13

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-25v1.0, January 20103. Click Apply to save your s

Página 293

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-26 Network and System Managementv1.0, January 2010

Página 294

11-1v1.0, January 2010Chapter 11Monitoring System Access and PerformanceThis chapter describes the system monitoring features of the UTM. You can be a

Página 295 - Figure 8-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-2 Monitoring System Access and Performancev1.0, January 2010The Internet Traffi

Página 296

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-3v1.0, January 2010Table 11-1. WAN Tra

Página 297

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-4 Monitoring System Access and Performancev1.0, January 20103. Click Apply to s

Página 298 - Figure 8-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-5v1.0, January 2010Configuring Logging

Página 299

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-6 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Página 300

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-7v1.0, January 2010Figure 11-4

Página 301 - Figure 8-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-3v1.0, January 20103

Página 302

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-8 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Página 303

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-9v1.0, January 2010Enable (continued)S

Página 304

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-10 Monitoring System Access and Performancev1.0, January 20103. Click Apply to

Página 305 - Figure 8-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-11v1.0, January 20103. Enter the setti

Página 306

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-12 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Página 307

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-13v1.0, January 2010Configuring and Ac

Página 308

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-14 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Página 309

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-15v1.0, January 2010Figure 11-7 [Dashb

Página 310

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-16 Monitoring System Access and Performancev1.0, January 2010To clear the stati

Página 311 - Chapter 9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-17v1.0, January 2010Threats (Counts)Th

Página 312 - Configuring Domains

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-4 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 20105

Página 313 - Figure 9-1

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-18 Monitoring System Access and Performancev1.0, January 2010Table 11-7 explain

Página 314 - Figure 9-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-19v1.0, January 2010Table 11-8 explain

Página 315

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-20 Monitoring System Access and Performancev1.0, January 2010Viewing Status Scr

Página 316

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-21v1.0, January 2010Table 11-9 explain

Página 317 - Figure 9-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-22 Monitoring System Access and Performancev1.0, January 2010Table 11-10 on pag

Página 318

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-23v1.0, January 2010Table 11-11 on pag

Página 319 - Configuring User Accounts

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-24 Monitoring System Access and Performancev1.0, January 2010Viewing Active VPN

Página 320 - Figure 9-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-25v1.0, January 20102. Click the IPSec

Página 321 - Table 9-4. Add User Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-26 Monitoring System Access and Performancev1.0, January 20102. Click the SSL V

Página 322 - Setting User Login Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-27v1.0, January 20102. Click the Statu

Página 323 - Figure 9-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-5v1.0, January 2010U

Página 324

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-28 Monitoring System Access and Performancev1.0, January 20102. Click the WAN S

Página 325 - Figure 9-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-29v1.0, January 2010The Connection Sta

Página 326 - Figure 9-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-30 Monitoring System Access and Performancev1.0, January 20102. Click the LAN G

Página 327 - Managing Digital Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-31v1.0, January 2010The Known PCs and

Página 328

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-32 Monitoring System Access and Performancev1.0, January 2010Querying Logs and

Página 329 - Managing CA Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-33v1.0, January 2010• System Logs. The

Página 330 - Managing Self Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-34 Monitoring System Access and Performancev1.0, January 20103. Enter the setti

Página 331 - Figure 9-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-35v1.0, January 2010Log Type(continued

Página 332 - Table 9-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-36 Monitoring System Access and Performancev1.0, January 2010Search Criteria(co

Página 333 - Requests table

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-37v1.0, January 20104. Click one of th

Página 334 - Figure 9-14

v1.0, January 2010ivOpen SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with

Página 335

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-6 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010T

Página 336

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-38 Monitoring System Access and Performancev1.0, January 2010Example: Using Log

Página 337 - Network and System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-39v1.0, January 2010Scheduling and Gen

Página 338 - Features That Reduce Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-40 Monitoring System Access and Performancev1.0, January 2010– The following ap

Página 339

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-41v1.0, January 20103. Enter the setti

Página 340

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-42 Monitoring System Access and Performancev1.0, January 2010Scheduling Reports

Página 341

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-43v1.0, January 20104. Click Apply to

Página 342

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-44 Monitoring System Access and Performancev1.0, January 2010Using the Network

Página 343

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-45v1.0, January 2010Tracing a RouteA t

Página 344

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-46 Monitoring System Access and Performancev1.0, January 2010Using the Realtime

Página 345 - System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-47v1.0, January 2010Gathering Importan

Página 346 - Figure 10-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-7v1.0, January 2010•

Página 347

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-48 Monitoring System Access and Performancev1.0, January 2010To generate the Ne

Página 348 - Figure 10-3

12-1v1.0, January 2010Chapter 12Troubleshooting and Using Online SupportThis chapter provides troubleshooting tips and information for the UTM. After

Página 349

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-2 Troubleshooting and Using Online Supportv1.0, January 2010Basic FunctioningAf

Página 350 - Using an SNMP Manager

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-3v1.0, January 2010LAN or WAN Port LED

Página 351 - Table 10-1. SNMP Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-4 Troubleshooting and Using Online Supportv1.0, January 2010• If your UTM’s IP

Página 352 - Figure 10-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-5v1.0, January 2010• If the computer i

Página 353

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-6 Troubleshooting and Using Online Supportv1.0, January 2010If your UTM is stil

Página 354 - Updating the Firmware

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-7v1.0, January 2010Troubleshooting a T

Página 355 - Figure 10-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-8 Troubleshooting and Using Online Supportv1.0, January 2010Testing the Path fr

Página 356

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-9v1.0, January 2010Restoring the Defau

Página 357

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-8 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010S

Página 358 - Figure 10-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-10 Troubleshooting and Using Online Supportv1.0, January 2010Problems with Date

Página 359

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-11v1.0, January 2010To initiate the su

Página 360 - Figure 10-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-12 Troubleshooting and Using Online Supportv1.0, January 2010To submit a file t

Página 361

Default Settings and Technical Specifications A-1v1.0, January 2010Appendix ADefault Settings and Technical SpecificationsYou can use the Reset button

Página 362

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-2 Default Settings and Technical Specificationsv1.0, January 2010Table A-2 shows

Página 363 - Chapter 11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualDefault Settings and Technical Specifications A-3v1.0, January 2010Table A-3 shows

Página 364 - Figure 11-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-4 Default Settings and Technical Specificationsv1.0, January 2010Table A-4 shows

Página 365

Network Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-1v1.0, January 2010Appendix BNetwork Planning for Dual WAN Ports(Dual-WAN Port Model

Página 366 - Figure 11-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-2 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Página 367 - Figure 11-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-3v1.0, January 2

Página 368

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-9v1.0, January 2010T

Página 369 - Figure 11-4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-4 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Página 370

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-5v1.0, January 2

Página 371

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-6 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Página 372

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-7v1.0, January 2

Página 373 - Table 11-4. Alerts Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-8 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Página 374

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-9v1.0, January 2

Página 375 - Figure 11-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-10 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Página 376

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-11v1.0, January

Página 377

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-12 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Página 378 - Information

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-13v1.0, January

Página 379

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-10 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 380

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-14 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Página 381

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-15v1.0, January

Página 382 - Viewing Status Screens

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-16 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Página 383

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-17v1.0, January

Página 384 - Port section

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-18 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Página 385

System Logs and Error Messages C-1v1.0, January 2010Appendix CSystem Logs and Error MessagesThis appendix explains provides examples and explanations

Página 386 - Viewing Active VPN Users

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-2 System Logs and Error Messagesv1.0, January 2010System Log MessagesThis sectio

Página 387 - Figure 11-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-3v1.0, January 2010Service LogsThis section descr

Página 388 - Figure 11-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-4 System Logs and Error Messagesv1.0, January 2010Login/LogoutThis section descr

Página 389 - Viewing the WAN Ports Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-5v1.0, January 2010WAN StatusThis section describ

Página 390 - Figure 11-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-11v1.0, January 2010

Página 391 - Status Informations

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-6 System Logs and Error Messagesv1.0, January 2010Load-Balancing ModeWhen the WA

Página 392 - Figure 11-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-7v1.0, January 2010PPP LogsThis section describes

Página 393

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-8 System Logs and Error Messagesv1.0, January 2010• PPTP Idle-Timeout Logs• PPP

Página 394 - Querying the Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-9v1.0, January 2010Traffic Metering LogsThis sect

Página 395

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-10 System Logs and Error Messagesv1.0, January 2010Multicast/Broadcast LogsThis

Página 396 - Figure 11-23

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-11v1.0, January 2010Message 2007 Oct 1 00:44:17 [

Página 397

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-12 System Logs and Error Messagesv1.0, January 2010Content Filtering and Securit

Página 398

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-13v1.0, January 2010Spam LogsThis section describ

Página 399

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-14 System Logs and Error Messagesv1.0, January 2010Traffic LogsThis section desc

Página 400

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-15v1.0, January 2010IPS LogsThis section describe

Página 401

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-12 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 402

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-16 System Logs and Error Messagesv1.0, January 2010Routing LogsThis section expl

Página 403 - Figure 11-24

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-17v1.0, January 2010WAN to LAN LogsThis section d

Página 404 - Figure 11-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-18 System Logs and Error Messagesv1.0, January 2010

Página 405 - Using Diagnostics Utilities

Two Factor Authentication D-1v1.0, January 2010Appendix DTwo Factor AuthenticationThis appendix provides an overview of Two-Factor Authentication, and

Página 406

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-2 Two Factor Authenticationv1.0, January 2010• Quick to deploy and manage. The W

Página 407

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTwo Factor Authentication D-3v1.0, January 2010The request-response architecture i

Página 408

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-4 Two Factor Authenticationv1.0, January 20103. The user then proceeds to the Tw

Página 409

Related Documents E-1v1.0, January 2010Appendix ERelated DocumentsThis appendix provides links to reference documents you can use to gain a more compl

Página 410

ProSecure Unified Threat Management (UTM) Appliance Reference ManualE-2 Related Documentsv1.0, January 2010

Página 411 - Chapter 12

Index-1v1.0, January 2010IndexNumerics10BaseT, 100BaseT, and 1000BaseT 3-23AAAA 7-40AC input 1-12access, remote management 10-12action buttons (We

Página 412 - Basic Functioning

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-13v1.0, January 2010

Página 413 - LAN or WAN Port LEDs Not On

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-2v1.0, January 2010Bbacking up, configuration file 10-16bandwidth capacitya

Página 414

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-3v1.0, January 2010managing 10-15restoring 10-17reverting to defaults 10-

Página 415

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-4v1.0, January 2010DMZDHCPaddress pool 4-20DNS servers 4-21domain name 4-

Página 416

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-5v1.0, January 2010Ffactory default settingsreverting to 10-18service licen

Página 417

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-6v1.0, January 2010HTTPaction, infected Web file or object 2-20, 6-22defaul

Página 418

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-7v1.0, January 2010IP header 5-37IP precedence 5-37IP security. See IPsec.

Página 419 - Figure 12-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-8v1.0, January 2010configuring options 11-8e-mail address for sending logs

Página 420 - Using Online Support

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-9v1.0, January 2010planning, dual WAN ports (dual-WAN port models) B-1proto

Página 421 - Figure 12-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-10v1.0, January 2010IPsec VPNautomatically generated (auto) 7-31groups, con

Página 422 - Figure 12-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-11v1.0, January 2010description 5-35examples 5-35shifting traffic mix 10-

Página 423 - Appendix A

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-14 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 424

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-12v1.0, January 2010scan engine firmware 10-21scan exceptionse-mail message

Página 425

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-13v1.0, January 2010spamblocked messages, recent 5 and top 5 11-18Distribut

Página 426

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-14v1.0, January 2010tabs, submenu (Web Management Interface) 2-5TCP flood,

Página 427 - (Dual-WAN Port Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-15v1.0, January 2010VvideoconferencingDMZ port 4-18from restricted address

Página 428

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-16v1.0, January 2010WWANaliases 3-17auto-rollover mode (dual-WAN port model

Página 429

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-15v1.0, January 2010

Página 430

v1.0, January 2010vProduct and Publication DetailsPPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in sou

Página 431

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-16 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 432 - Figure B-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-17v1.0, January 2010

Página 433 - Inbound Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-18 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 434 - Figure B-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-19v1.0, January 2010

Página 435 - Figure B-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-20 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 436 - Figure B-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-21v1.0, January 2010

Página 437 - Figure B-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-22 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 438 - Figure B-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-23v1.0, January 2010

Página 439 - VPN Gateway-to-Gateway

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-24 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 440 - Figure B-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-25v1.0, January 2010

Página 441 - Figure B-16

v1.0, January 2010vi

Página 442 - Figure B-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-26 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 443 - Figure B-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-27v1.0, January 2010

Página 444 - Figure B-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-28 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Página 445 - Appendix C

3-1v1.0, January 2010Chapter 3Manually Configuring Internet and WAN SettingsThis chapter contains the following sections:• “Understanding the Internet

Página 446 - System Log Messages

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-2 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Configure d

Página 447 - Service Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-3v1.0, January 20102. Click the A

Página 448 - IPsec Restart

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-4 Manually Configuring Internet and WAN Settingsv1.0, January 2010The auto-detec

Página 449 - WAN Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-5v1.0, January 2010The WAN Status

Página 450 - Load-Balancing Mode

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-6 Manually Configuring Internet and WAN Settingsv1.0, January 2010To manually co

Página 451 - • PPPoE Idle-Timeout Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-7v1.0, January 20105. If your con

Página 452 - • PPP Authentication Logs

viiv1.0, January 2010ContentsProSecure Unified Threat Management (UTM) Appliance Reference ManualAbout This ManualConventions, Formats, and Scope ...

Página 453 - Unicast Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-8 Manually Configuring Internet and WAN Settingsv1.0, January 20106. Configure t

Página 454 - Invalid Packet Logging

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-9v1.0, January 20108. Click Test

Página 455

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-10 Manually Configuring Internet and WAN Settingsv1.0, January 2010If you want t

Página 456

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-11v1.0, January 2010Classical Rou

Página 457 - Spam Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-12 Manually Configuring Internet and WAN Settingsv1.0, January 2010To configure

Página 458 - E-mail Filter Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-13v1.0, January 2010WAN Failure D

Página 459 - Port Scan Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-14 Manually Configuring Internet and WAN Settingsv1.0, January 20103. Click Appl

Página 460 - Routing Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-15v1.0, January 2010a. Figure 3-9

Página 461 - WAN to DMZ Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-16 Manually Configuring Internet and WAN Settingsv1.0, January 2010b. Click the

Página 462

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-17v1.0, January 2010Configuring S

Página 463 - Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manualviiiv1.0, January 2010Chapter 2 Using the Setup Wizard to Provision the UTM in You

Página 464 - D-2 Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-18 Manually Configuring Internet and WAN Settingsv1.0, January 2010To add a seco

Página 465 - Figure D-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-19v1.0, January 2010Configuring D

Página 466 - Figure D-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-20 Manually Configuring Internet and WAN Settingsv1.0, January 2010The WAN Mode

Página 467 - Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-21v1.0, January 20104. Click the

Página 468 - E-2 Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-22 Manually Configuring Internet and WAN Settingsv1.0, January 20107. Click Appl

Página 469 - Numerics

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-23v1.0, January 20103. Enter the

Página 470

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-24 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Click Appl

Página 471

4-1v1.0, January 2010Chapter 4LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains th

Página 472

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-2 LAN Configurationv1.0, January 2010VLANs have a number of advantages:• It is e

Página 473

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-3v1.0, January 2010When you create a VLAN profile, assign LAN

Página 474

ProSecure Unified Threat Management (UTM) Appliance Reference Manualixv1.0, January 2010Configuring Secondary WAN Addresses ...

Página 475

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-4 LAN Configurationv1.0, January 2010For each VLAN profile, the following fields

Página 476

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-5v1.0, January 2010The UTM delivers the following settings to

Página 477

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-6 LAN Configurationv1.0, January 2010LDAP ServerA Lightweight Directory Access P

Página 478 - Index-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-7v1.0, January 20102. Either select an entry from the VLAN Pro

Página 479 - Index-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-8 LAN Configurationv1.0, January 20103. Enter the settings as explained in Table

Página 480 - Index-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-9v1.0, January 2010Enable DHCP Server(continued)Starting IP Ad

Página 481 - Index-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-10 LAN Configurationv1.0, January 20104. Click Apply to save your settings.Enabl

Página 482 - Index-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-11v1.0, January 2010Configuring Multi-Home LAN IPs on the Defa

Página 483 - Index-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-12 LAN Configurationv1.0, January 20103. In the Add Secondary LAN IPs section of

Página 484 - Index-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-13v1.0, January 2010Some advantages of the Network Database ar

Comentários a estes Manuais

Sem comentários