Netgear UTM5 Instrukcja Użytkownika

Przeglądaj online lub pobierz Instrukcja Użytkownika dla Routery Netgear UTM5. Netgear UTM5 User's Manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 484
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 0
202-10482-02
January 2010
v1.0
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
ProSecure Unified Threat
Management (UTM)
Appliance Reference Manual
Przeglądanie stron 0
1 2 3 4 5 6 ... 483 484

Podsumowanie treści

Strona 1 - Appliance Reference Manual

202-10482-02 January 2010v1.0NETGEAR, Inc.350 East Plumeria DriveSan Jose, CA 95134ProSecure Unified Threat Management (UTM) Appliance Reference Manua

Strona 2

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxv1.0, January 2010Managing the Application Level Gateway for SIP Sessions ...

Strona 3 - Additional Copyrights

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-14 LAN Configurationv1.0, January 2010The Known PCs and Devices table lists the

Strona 4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-15v1.0, January 2010Adding PCs or Devices to the Network Datab

Strona 5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-16 LAN Configurationv1.0, January 2010Editing PCs or Devices in the Network Data

Strona 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-17v1.0, January 20103. Click the Edit Group Names option arrow

Strona 7 - Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-18 LAN Configurationv1.0, January 2010To reserve an IP address, select Reserved

Strona 8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-19v1.0, January 2010To enable and configure the DMZ port: 1. S

Strona 9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-20 LAN Configurationv1.0, January 2010Table 4-3. DMZ Setup SettingsSetting Descr

Strona 10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-21v1.0, January 2010Enable DHCP Server(continued)Primary DNS S

Strona 11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-22 LAN Configurationv1.0, January 20103. Click Apply to save your settings.To de

Strona 12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-23v1.0, January 2010Configuring Static RoutesTo add a static r

Strona 13

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiv1.0, January 2010Creating Gateway-to-Gateway VPN Tunnels with the Wizard ...

Strona 14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-24 LAN Configurationv1.0, January 20103. Enter the settings as explained in Tabl

Strona 15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-25v1.0, January 2010To enable and configure RIP:1. Select Netw

Strona 16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-26 LAN Configurationv1.0, January 2010Table 4-5. RIP Configuration SettingsSetti

Strona 17 - About This Manual

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-27v1.0, January 20104. Click Apply to save your settings.Stati

Strona 18 - Revision History

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-28 LAN Configurationv1.0, January 2010

Strona 19 - Introduction

5-1v1.0, January 2010Chapter 5Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chap

Strona 20 - Key Features and Capabilities

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-2 Firewall Protectionv1.0, January 2010Administrator TipsConsider the following

Strona 21 - Outbound Load Balancing

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-3v1.0, January 2010Using Rules to Block or Allow Specific Ki

Strona 22 - A Powerful, True Firewall

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-4 Firewall Protectionv1.0, January 2010• Quality of Service (QoS) priorities. Ea

Strona 23 - Security Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-5v1.0, January 2010Table 5-2. Outbound Rules OverviewSettin

Strona 24 - Extensive Protocol Support

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiv1.0, January 2010Viewing the UTM SSL VPN Connection Status ...

Strona 25 - Model Comparison

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-6 Firewall Protectionv1.0, January 2010Inbound Rules (Port Forwarding)If you hav

Strona 26 - Figure 1-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-7v1.0, January 2010Whether or not DHCP is enabled, how the P

Strona 27 - Package Contents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-8 Firewall Protectionv1.0, January 2010.Table 5-3. Inbound Rules Overview Sett

Strona 28 - Hardware Features

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-9v1.0, January 2010LAN Users The settings that determine whi

Strona 29 - Table 1-2. LED Descriptions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-10 Firewall Protectionv1.0, January 2010Log The settings that determines whether

Strona 30 - Rear Panel

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-11v1.0, January 2010Order of Precedence for RulesAs you defi

Strona 31 - Figure 1-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-12 Firewall Protectionv1.0, January 2010Setting LAN WAN RulesThe default outboun

Strona 32 - Figure 1-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-13v1.0, January 2010To make changes to an existing outbound

Strona 33 - Using the Rack-Mounting Kit

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-14 Firewall Protectionv1.0, January 2010To create a new outbound LAN WAN service

Strona 34 - 1-16 Introduction

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-15v1.0, January 2010To create a new inbound LAN WAN service

Strona 35 - Your Network

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiiv1.0, January 2010Updating the Scan Signatures and Scan Engine Firmware ...

Strona 36 - Logging In to the UTM

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-16 Firewall Protectionv1.0, January 2010To access the DMZ WAN Rules screen:1. Se

Strona 37 - Figure 2-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-17v1.0, January 20102. Click one of the following table butt

Strona 38 - Figure 2-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-18 Firewall Protectionv1.0, January 2010DMZ WAN Inbound Services RulesThe Inboun

Strona 39

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-19v1.0, January 2010Setting LAN DMZ RulesThe LAN DMZ Rules s

Strona 40 - Figure 2-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-20 Firewall Protectionv1.0, January 2010• Up. Moves the rule up one position in

Strona 41 - Figure 2-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-21v1.0, January 20102. Enter the settings as explained in Ta

Strona 42 - Figure 2-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-22 Firewall Protectionv1.0, January 2010Inbound Rules ExamplesLAN WAN Inbound Ru

Strona 43

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-23v1.0, January 2010LAN WAN or DMZ WAN Inbound Rule: Setting

Strona 44

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-24 Firewall Protectionv1.0, January 2010To configure the UTM for additional IP a

Strona 45 - Figure 2-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-25v1.0, January 20106. In the Send to LAN Server field, ente

Strona 46

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxivv1.0, January 2010Troubleshooting the ISP Connection ...

Strona 47

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-26 Firewall Protectionv1.0, January 2010Outbound Rules ExampleOutbound rules let

Strona 48 - Figure 2-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-27v1.0, January 2010Configuring Other Firewall FeaturesYou c

Strona 49

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-28 Firewall Protectionv1.0, January 20102. Click the Attack Checks submenu tab.

Strona 50 - Figure 2-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-29v1.0, January 20104. Click Apply to save your settings. LA

Strona 51

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-30 Firewall Protectionv1.0, January 2010Setting Session LimitsSession limits all

Strona 52 - Figure 2-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-31v1.0, January 20105. Click Apply to save your settings.Man

Strona 53 - Figure 2-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-32 Firewall Protectionv1.0, January 20103. Select the Enable SIP checkbox.4. Cli

Strona 54

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-33v1.0, January 2010For example, Web servers serve Web pages

Strona 55 - Figure 2-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-34 Firewall Protectionv1.0, January 20102. In the Add Customer Service section o

Strona 56

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-35v1.0, January 20102. Modify the settings that you wish to

Strona 57

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxvv1.0, January 2010Firewall Restart ...

Strona 58 - Figure 2-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-36 Firewall Protectionv1.0, January 2010To create a QoS profile:1. Select Networ

Strona 59

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-37v1.0, January 20105. Click Apply to save your settings. Th

Strona 60 - Verifying Proper Installation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-38 Firewall Protectionv1.0, January 20103. Click Apply to save your changes. The

Strona 61 - Figure 2-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-39v1.0, January 2010The screen displays the List of Bandwidt

Strona 62 - What to Do Next

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-40 Firewall Protectionv1.0, January 20105. Click Apply to save your settings. Th

Strona 63 - Chapter 3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-41v1.0, January 2010Setting a Schedule to Block or Allow Spe

Strona 64

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-42 Firewall Protectionv1.0, January 2010• Specific Times. The schedule is active

Strona 65 - Figure 3-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-43v1.0, January 20102. In the MAC Filtering Enable section,

Strona 66 - Figure 3-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-44 Firewall Protectionv1.0, January 2010Setting up IP/MAC BindingsIP/MAC Binding

Strona 67 - Setting the UTM’s MAC Address

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-45v1.0, January 20103. Enter the settings as explained in Ta

Strona 68 - Figure 3-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviv1.0, January 2010

Strona 69

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-46 Firewall Protectionv1.0, January 20104. Click the Add table button. The new I

Strona 70

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-47v1.0, January 2010Note these restrictions on port triggeri

Strona 71 - Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-48 Firewall Protectionv1.0, January 20103. Click the Add table button. The new p

Strona 72

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-49v1.0, January 2010Using the Intrusion Prevention SystemThe

Strona 73

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-50 Firewall Protectionv1.0, January 2010When you enable the IPS, the default IPS

Strona 74 - WAN Mode screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-51v1.0, January 2010.Figure 5-31

Strona 75

ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-52 Firewall Protectionv1.0, January 2010Table 5-11. IPS: Less Familiar Attack Na

Strona 76

6-1v1.0, January 2010Chapter 6Content Filtering and Optimizing ScansThis chapter describes how to apply the content filtering features of the UTM and

Strona 77 - Figure 3-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-2 Content Filtering and Optimizing Scansv1.0, January 2010Default E-mail and Web

Strona 78

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-3v1.0, January 2010Configuring E-mail Pro

Strona 79

xviiv1.0, January 2010About This ManualThe NETGEAR® ProSecure™ Unified Threat Management (UTM) Appliance Reference Manual describes how to install, co

Strona 80 - Figure 3-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-4 Content Filtering and Optimizing Scansv1.0, January 2010Customizing E-mail Pro

Strona 81 - Configuring Dynamic DNS

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-5v1.0, January 2010Customizing E-mail Ant

Strona 82 - Figure 3-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-6 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strona 83 - Figure 3-12:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-7v1.0, January 2010Append Safe Stamp (SMT

Strona 84 - Figure 3-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-8 Content Filtering and Optimizing Scansv1.0, January 20103. Click Apply to save

Strona 85

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-9v1.0, January 2010To configure e-mail co

Strona 86

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-10 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strona 87 - LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-11v1.0, January 20103. Click Apply to sav

Strona 88 - 4-2 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-12 Content Filtering and Optimizing Scansv1.0, January 20103. Real-time blacklis

Strona 89 - Figure 4-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-13v1.0, January 2010To configure the whit

Strona 90 - VLAN DHCP Options

ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviiiv1.0, January 2010• Scope. This manual is written for the UTM according to th

Strona 91 - LAN Configuration 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-14 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strona 92 - Configuring a VLAN Profile

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-15v1.0, January 2010blacklist providers a

Strona 93 - Figure 4-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-16 Content Filtering and Optimizing Scansv1.0, January 20102. Click the Add tabl

Strona 94 - 4-8 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-17v1.0, January 20103. Enter the settings

Strona 95 - LAN Configuration 4-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-18 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Strona 96 - 4-10 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-19v1.0, January 2010Configuring Web and S

Strona 97 - Figure 4-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-20 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strona 98 - 4-12 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-21v1.0, January 20103. Click Apply to sav

Strona 99 - Managing the Network Database

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-22 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings

Strona 100 - Figure 4-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-23v1.0, January 20103. Click Apply to sav

Strona 101 - LAN Configuration 4-15

1-1v1.0, January 2010Chapter 1IntroductionThis chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Managemen

Strona 102 - Figure 4-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-24 Content Filtering and Optimizing Scansv1.0, January 2010Several types of Web

Strona 103 - LAN Configuration 4-17

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-25v1.0, January 2010To configure Web cont

Strona 104 - 4-18 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-26 Content Filtering and Optimizing Scansv1.0, January 2010.Figure 6-10 [Content

Strona 105 - Figure 4-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-27v1.0, January 2010.3. Enter the setting

Strona 106 - Table 4-3. DMZ Setup Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-28 Content Filtering and Optimizing Scansv1.0, January 2010Table 6-8. Content Fi

Strona 107 - LAN Configuration 4-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-29v1.0, January 2010Select the Web Catego

Strona 108 - Managing Routing

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-30 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav

Strona 109 - Configuring Static Routes

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-31v1.0, January 2010To configure Web URL

Strona 110 - 4-24 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-32 Content Filtering and Optimizing Scansv1.0, January 20103. Enter the settings

Strona 111 - To enable and configure RIP:

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-33v1.0, January 20104. Click Apply to sav

Strona 112 - 4-26 LAN Configuration

iiv1.0, January 2010© 2009–2010 by NETGEAR, Inc. All rights reserved.TrademarksNETGEAR and the NETGEAR logo are registered trademarks and ProSecure an

Strona 113 - Static Route Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-2 Introductionv1.0, January 2010Key Features and CapabilitiesThe UTM provides th

Strona 114 - 4-28 LAN Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-34 Content Filtering and Optimizing Scansv1.0, January 2010HTTPS Scan SettingsHT

Strona 115 - Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-35v1.0, January 2010If one of these is no

Strona 116 - Administrator Tips

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-36 Content Filtering and Optimizing Scansv1.0, January 2010To configure the HTTP

Strona 117 - Services-Based Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-37v1.0, January 20104. Click Apply to sav

Strona 118 - 5-4 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-38 Content Filtering and Optimizing Scansv1.0, January 2010Note that certain sit

Strona 119 - Firewall Protection 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-39v1.0, January 20103. Enter the settings

Strona 120 - 5-6 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-40 Content Filtering and Optimizing Scansv1.0, January 2010To configure the FTP

Strona 121 - Firewall Protection 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-41v1.0, January 20103. Click Apply to sav

Strona 122 - 5-8 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-42 Content Filtering and Optimizing Scansv1.0, January 2010To set Web access exc

Strona 123 - Firewall Protection 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-43v1.0, January 20103. Enter the settings

Strona 124 - 5-10 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-3v1.0, January 2010Dual-WAN Port Models for Increased Reliability o

Strona 125 - Order of Precedence for Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-44 Content Filtering and Optimizing Scansv1.0, January 20102. Modify the setting

Strona 126 - Setting LAN WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-45v1.0, January 20102. In the Add Scannin

Strona 127 - Firewall Protection 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-46 Content Filtering and Optimizing Scansv1.0, January 2010

Strona 128 - Figure 5-3

7-1v1.0, January 2010Chapter 7Virtual Private NetworkingUsing IPsec ConnectionsThis chapter describes how to use the IP security (IPsec) virtual priva

Strona 129 - Setting DMZ WAN Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-2 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010See “Virtu

Strona 130 - Figure 5-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-3v1.0, January 2010Using the

Strona 131 - Figure 5-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-4 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Creating G

Strona 132 - Figure 5-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-5v1.0, January 2010To view th

Strona 133 - Setting LAN DMZ Rules

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-6 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Select

Strona 134 - Figure 5-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-7v1.0, January 2010. .This VP

Strona 135 - Figure 5-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-4 Introductionv1.0, January 2010A Powerful, True FirewallUnlike simple Internet

Strona 136 - Inbound Rules Examples

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-8 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click A

Strona 137 - Figure 5-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-9v1.0, January 2010Creating a

Strona 138 - Figure 5-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-10 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010To displa

Strona 139 - Firewall Protection 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-11v1.0, January 20103. Select

Strona 140 - Outbound Rules Example

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-12 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strona 141 - Attack Checks

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-13v1.0, January 20102. In the

Strona 142 - Figure 5-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-14 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Enter

Strona 143 - Firewall Protection 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-15v1.0, January 20105. In the

Strona 144 - Setting Session Limits

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-16 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Strona 145 - Firewall Protection 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-17v1.0, January 20109. Enter

Strona 146 - Adding Customized Services

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-5v1.0, January 2010• Objectionable traffic protection. The UTM prev

Strona 147 - Figure 5-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-18 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010In the ex

Strona 148 - Figure 5-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-19v1.0, January 2010• Right-c

Strona 149 - Firewall Protection 5-35

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-20 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010The VPN c

Strona 150 - Figure 5-22

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-21v1.0, January 2010The Activ

Strona 151 - Firewall Protection 5-37

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-22 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Managing

Strona 152 - Creating Bandwidth Profiles

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-23v1.0, January 2010Managing

Strona 153 - Profile screen displays

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-24 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Each pol

Strona 154 - 5-40 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-25v1.0, January 2010To add or

Strona 155 - Figure 5-25

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-26 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Figure 7

Strona 156 - Enabling Source MAC Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-27v1.0, January 20103. Comple

Strona 157 - Figure 5-26

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-6 Introductionv1.0, January 2010Extensive Protocol SupportThe UTM supports the T

Strona 158 - Setting up IP/MAC Bindings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-28 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010LocalSele

Strona 159 - Figure 5-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-29v1.0, January 2010Authentic

Strona 160 - Configuring Port Triggering

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-30 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strona 161 - Figure 5-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-31v1.0, January 20104. Click

Strona 162 - Figure 5-29

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-32 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Strona 163 - Figure 5-30

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-33v1.0, January 2010To delete

Strona 164 - 5-50 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-34 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Figure 7-

Strona 165 - Figure 5-31

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-35v1.0, January 20104. Comple

Strona 166 - 5-52 Firewall Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-36 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Traffic S

Strona 167 - Chapter 6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-37v1.0, January 2010Integrity

Strona 168

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-7v1.0, January 2010• SSL VPN Wizard. The UTM includes the NETGEAR S

Strona 169 - Configuring E-mail Protection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-38 Virtual Private Networking Using IPsec Connectionsv1.0, January 20105. Click

Strona 170 - Figure 6-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-39v1.0, January 2010You can e

Strona 171 - Figure 6-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-40 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Comple

Strona 172

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-41v1.0, January 2010server in

Strona 173

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-42 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Comple

Strona 174 - E-mail Content Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-43v1.0, January 2010Assigning

Strona 175 - Figure 6-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-44 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click

Strona 176

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-45v1.0, January 2010.4. Compl

Strona 177

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-46 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010WINS Serv

Strona 178

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-47v1.0, January 20105. Click

Strona 179 - Figure 6-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-8 Introductionv1.0, January 2010Service Registration Card with License KeysBe su

Strona 180

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-48 Virtual Private Networking Using IPsec Connectionsv1.0, January 20108. On the

Strona 181 - Figure 6-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-49v1.0, January 2010RemoteIde

Strona 182

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-50 Virtual Private Networking Using IPsec Connectionsv1.0, January 20109. Click

Strona 183 - Figure 6-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-51v1.0, January 20102. In the

Strona 184

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-52 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click

Strona 185

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-53v1.0, January 20105. In the

Strona 186 - Figure 6-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-54 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click

Strona 187 - Configuring Web Malware Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-55v1.0, January 20109. Enter

Strona 188 - Figure 6-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-56 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Configuri

Strona 189

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-57v1.0, January 20104. Enter

Strona 190

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-9v1.0, January 2010Package ContentsThe UTM product package contains

Strona 191

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-58 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. In the

Strona 192

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-59v1.0, January 2010Configuri

Strona 193

ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-60 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010

Strona 194

8-1v1.0, January 2010Chapter 8Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically

Strona 195

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-2 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• SSL Port F

Strona 196 - Configuring Web URL Filtering

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-3v1.0, January 2010The followin

Strona 197 - Figure 6-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-4 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: If you

Strona 198

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-5v1.0, January 2010SSL VPN Wiza

Strona 199

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-6 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note that Fi

Strona 200 - HTTPS Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-7v1.0, January 2010SSL VPN Wiza

Strona 201 - Figure 6-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-10 Introductionv1.0, January 2010Hardware FeaturesThe front panel ports and LEDs

Strona 202 - Figure 6-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-8 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: After

Strona 203 - Specifying Trusted Hosts

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-9v1.0, January 2010SSL VPN Wiza

Strona 204 - Figure 6-16

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-10 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Table 8-4.

Strona 205 - Configuring FTP Scans

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-11v1.0, January 2010SSL VPN Wiz

Strona 206 - Table 6-12. FTP Scan Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-12 Virtual Private Networking Using SSL Connectionsv1.0, January 2010TCP Port Nu

Strona 207

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-13v1.0, January 2010SSL VPN Wiz

Strona 208 - Figure 6-19

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-14 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Verify your

Strona 209

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-15v1.0, January 20104. Enter th

Strona 210 - Setting Scanning Exclusions

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-16 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The default

Strona 211 - Figure 6-20

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-17v1.0, January 20103. From the

Strona 212

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-11v1.0, January 2010The function of each LED is described in Table

Strona 213 - Using IPsec Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-18 Virtual Private Networking Using SSL Connectionsv1.0, January 2010When you de

Strona 214

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-19v1.0, January 2010Portal layo

Strona 215 - Configurations

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-20 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The List of

Strona 216 - Figure 7-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-21v1.0, January 20104. Complete

Strona 217 - Figure 7-4

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-22 Virtual Private Networking Using SSL Connectionsv1.0, January 20105. Click Ap

Strona 218 - Figure 7-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-23v1.0, January 2010Adding Serv

Strona 219

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-24 Virtual Private Networking Using SSL Connectionsv1.0, January 20104. Click th

Strona 220 - Figure 7-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-25v1.0, January 20103. In the A

Strona 221 - Figure 7-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-26 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• If you en

Strona 222 - Figure 7-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-27v1.0, January 20103. Select t

Strona 223

v1.0, January 2010iiiFederal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been gra

Strona 224 - Figure 7-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-12 Introductionv1.0, January 2010Rear PanelThe rear panel of the UTM includes a

Strona 225 - Figure 7-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-28 Virtual Private Networking Using SSL Connectionsv1.0, January 2010To add an S

Strona 226 - Editor menu

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-29v1.0, January 2010Adding New

Strona 227 - Figure 7-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-30 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Editing Net

Strona 228

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-31v1.0, January 20105. Click Ap

Strona 229 - Testing the VPN Connection

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-32 Virtual Private Networking Using SSL Connectionsv1.0, January 2010For example

Strona 230 - Figure 7-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-33v1.0, January 20102. Make you

Strona 231 - Figure 7-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-34 Virtual Private Networking Using SSL Connectionsv1.0, January 2010.3. Select

Strona 232 - Figure 7-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-35v1.0, January 2010Add SSL VPN

Strona 233 - Viewing the UTM IPsec VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-36 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Apply Polic

Strona 234 - Managing IPsec VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-37v1.0, January 20104. Click Ap

Strona 235 - Managing IKE Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-13v1.0, January 2010Figure 1-4 shows the product label for the UTM5

Strona 236 - Figure 7-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-38 Virtual Private Networking Using SSL Connectionsv1.0, January 2010

Strona 237

9-1v1.0, January 2010Chapter 9Managing Users, Authentication, and CertificatesThis chapter describes how to manage users, authentication, and security

Strona 238 - Figure 7-21

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-2 Managing Users, Authentication, and Certificatesv1.0, January 2010Configuring

Strona 239

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-3v1.0, January 2010To create a

Strona 240

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-4 Managing Users, Authentication, and Certificatesv1.0, January 20102. Under the

Strona 241

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-5v1.0, January 20104. Click App

Strona 242

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-6 Managing Users, Authentication, and Certificatesv1.0, January 20106. If you ch

Strona 243 - Managing VPN Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-7v1.0, January 2010Creating and

Strona 244 - Figure 7-22

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-8 Managing Users, Authentication, and Certificatesv1.0, January 20103. Click the

Strona 245

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-9v1.0, January 20103. Modify th

Strona 246 - Figure 7-23

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-14 Introductionv1.0, January 2010Figure 1-6 shows the product label for the UTM2

Strona 247

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-10 Managing Users, Authentication, and Certificatesv1.0, January 2010To create a

Strona 248

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-11v1.0, January 20103. Enter th

Strona 249

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-12 Managing Users, Authentication, and Certificatesv1.0, January 20104. Click Ap

Strona 250

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-13v1.0, January 20104. Click Ap

Strona 251

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-14 Managing Users, Authentication, and Certificatesv1.0, January 20104. In the D

Strona 252 - RADIUS Client Configuration

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-15v1.0, January 20103. Click th

Strona 253 - Figure 7-24

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-16 Managing Users, Authentication, and Certificatesv1.0, January 20107. Click th

Strona 254

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-17v1.0, January 20103. Enter th

Strona 255 - Mode Config Operation

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-18 Managing Users, Authentication, and Certificatesv1.0, January 2010On the UTM,

Strona 256 - Figure 7-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-19v1.0, January 2010The Certifi

Strona 257 - Figure 7-26

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-15v1.0, January 2010• Temperature operating limits are not likely t

Strona 258 - UTM’s default LAN subnet is

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-20 Managing Users, Authentication, and Certificatesv1.0, January 2010The Trusted

Strona 259 - Figure 7-27

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-21v1.0, January 2010When a secu

Strona 260

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-22 Managing Users, Authentication, and Certificatesv1.0, January 20102. In the G

Strona 261

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-23v1.0, January 20103. Click th

Strona 262

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-24 Managing Users, Authentication, and Certificatesv1.0, January 20105. Copy the

Strona 263 - Figure 7-28

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-25v1.0, January 201010. Click B

Strona 264

ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-26 Managing Users, Authentication, and Certificatesv1.0, January 2010To view the

Strona 265 - Figure 7-29

10-1v1.0, January 2010Chapter 10Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its perform

Strona 266

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-2 Network and System Managementv1.0, January 2010• Auto-rollover mode (dual-WAN

Strona 267

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-3v1.0, January 2010• ALLOW by schedule, otherwise

Strona 268 - Configuring Keepalives

ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-16 Introductionv1.0, January 2010

Strona 269

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-4 Network and System Managementv1.0, January 2010• QoS Profile. You can define

Strona 270 - Figure 7-32

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-5v1.0, January 2010– URL blocking. You can specif

Strona 271 - Figure 7-33

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-6 Network and System Managementv1.0, January 2010LAN WAN Inbound Rules and DMZ

Strona 272

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-7v1.0, January 2010– Address range. The rule is a

Strona 273 - Using SSL Connections

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-8 Network and System Managementv1.0, January 2010e-mail server) and provide pub

Strona 274 - Figure 8-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-9v1.0, January 2010For more information about QoS

Strona 275 - Figure 8-2

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-10 Network and System Managementv1.0, January 2010To modify the administrator u

Strona 276

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-11v1.0, January 20103. Select the Check to Edit P

Strona 277

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-12 Network and System Managementv1.0, January 2010Configuring Remote Management

Strona 278

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-13v1.0, January 20104. Click Apply to save your c

Strona 279 - Figure 8-4

2-1v1.0, January 2010Chapter 2Using the Setup Wizard to Provision the UTM inYour NetworkUnderstanding the Steps for Initial ConnectionTypically, the U

Strona 280

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-14 Network and System Managementv1.0, January 2010Using an SNMP ManagerSimple N

Strona 281 - Figure 8-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-15v1.0, January 20102. Enter the settings as expl

Strona 282 - Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-16 Network and System Managementv1.0, January 2010The Backup & Restore Sett

Strona 283 - Figure 8-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-17v1.0, January 20102. Select Save file, and then

Strona 284

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-18 Network and System Managementv1.0, January 2010Reverting to Factory Default

Strona 285 - Figure 8-7

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-19v1.0, January 2010Viewing the Available Firmwar

Strona 286

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-20 Network and System Managementv1.0, January 20103. To see which other firmwar

Strona 287 - Figure 8-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-21v1.0, January 2010Rebooting Without Changing th

Strona 288 - Viewing the UTM SSL VPN Log

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-22 Network and System Managementv1.0, January 2010The Info section shows the fo

Strona 289 - Figure 8-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-23v1.0, January 2010Configuring Automatic Update

Strona 290 - Creating the Portal Layout

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-2 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010Q

Strona 291 - Figure 8-12

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-24 Network and System Managementv1.0, January 2010Configuring Date and Time Ser

Strona 292 - Figure 8-13

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-25v1.0, January 20103. Click Apply to save your s

Strona 293

ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-26 Network and System Managementv1.0, January 2010

Strona 294

11-1v1.0, January 2010Chapter 11Monitoring System Access and PerformanceThis chapter describes the system monitoring features of the UTM. You can be a

Strona 295 - Figure 8-14

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-2 Monitoring System Access and Performancev1.0, January 2010The Internet Traffi

Strona 296

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-3v1.0, January 2010Table 11-1. WAN Tra

Strona 297

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-4 Monitoring System Access and Performancev1.0, January 20103. Click Apply to s

Strona 298 - Figure 8-15

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-5v1.0, January 2010Configuring Logging

Strona 299

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-6 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Strona 300

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-7v1.0, January 2010Figure 11-4

Strona 301 - Figure 8-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-3v1.0, January 20103

Strona 302

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-8 Monitoring System Access and Performancev1.0, January 20102. Enter the settin

Strona 303

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-9v1.0, January 2010Enable (continued)S

Strona 304

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-10 Monitoring System Access and Performancev1.0, January 20103. Click Apply to

Strona 305 - Figure 8-18

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-11v1.0, January 20103. Enter the setti

Strona 306

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-12 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Strona 307

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-13v1.0, January 2010Configuring and Ac

Strona 308

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-14 Monitoring System Access and Performancev1.0, January 20104. Click Apply to

Strona 309

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-15v1.0, January 2010Figure 11-7 [Dashb

Strona 310

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-16 Monitoring System Access and Performancev1.0, January 2010To clear the stati

Strona 311 - Chapter 9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-17v1.0, January 2010Threats (Counts)Th

Strona 312 - Configuring Domains

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-4 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 20105

Strona 313 - Figure 9-1

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-18 Monitoring System Access and Performancev1.0, January 2010Table 11-7 explain

Strona 314 - Figure 9-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-19v1.0, January 2010Table 11-8 explain

Strona 315

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-20 Monitoring System Access and Performancev1.0, January 2010Viewing Status Scr

Strona 316

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-21v1.0, January 2010Table 11-9 explain

Strona 317 - Figure 9-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-22 Monitoring System Access and Performancev1.0, January 2010Table 11-10 on pag

Strona 318

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-23v1.0, January 2010Table 11-11 on pag

Strona 319 - Configuring User Accounts

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-24 Monitoring System Access and Performancev1.0, January 2010Viewing Active VPN

Strona 320 - Figure 9-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-25v1.0, January 20102. Click the IPSec

Strona 321 - Table 9-4. Add User Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-26 Monitoring System Access and Performancev1.0, January 20102. Click the SSL V

Strona 322 - Setting User Login Policies

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-27v1.0, January 20102. Click the Statu

Strona 323 - Figure 9-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-5v1.0, January 2010U

Strona 324

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-28 Monitoring System Access and Performancev1.0, January 20102. Click the WAN S

Strona 325 - Figure 9-9

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-29v1.0, January 2010The Connection Sta

Strona 326 - Figure 9-10

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-30 Monitoring System Access and Performancev1.0, January 20102. Click the LAN G

Strona 327 - Managing Digital Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-31v1.0, January 2010The Known PCs and

Strona 328

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-32 Monitoring System Access and Performancev1.0, January 2010Querying Logs and

Strona 329 - Managing CA Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-33v1.0, January 2010• System Logs. The

Strona 330 - Managing Self Certificates

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-34 Monitoring System Access and Performancev1.0, January 20103. Enter the setti

Strona 331 - Figure 9-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-35v1.0, January 2010Log Type(continued

Strona 332 - Table 9-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-36 Monitoring System Access and Performancev1.0, January 2010Search Criteria(co

Strona 333 - Requests table

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-37v1.0, January 20104. Click one of th

Strona 334 - Figure 9-14

v1.0, January 2010ivOpen SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with

Strona 335

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-6 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010T

Strona 336

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-38 Monitoring System Access and Performancev1.0, January 2010Example: Using Log

Strona 337 - Network and System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-39v1.0, January 2010Scheduling and Gen

Strona 338 - Features That Reduce Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-40 Monitoring System Access and Performancev1.0, January 2010– The following ap

Strona 339

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-41v1.0, January 20103. Enter the setti

Strona 340

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-42 Monitoring System Access and Performancev1.0, January 2010Scheduling Reports

Strona 341

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-43v1.0, January 20104. Click Apply to

Strona 342

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-44 Monitoring System Access and Performancev1.0, January 2010Using the Network

Strona 343

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-45v1.0, January 2010Tracing a RouteA t

Strona 344

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-46 Monitoring System Access and Performancev1.0, January 2010Using the Realtime

Strona 345 - System Management

ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-47v1.0, January 2010Gathering Importan

Strona 346 - Figure 10-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-7v1.0, January 2010•

Strona 347

ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-48 Monitoring System Access and Performancev1.0, January 2010To generate the Ne

Strona 348 - Figure 10-3

12-1v1.0, January 2010Chapter 12Troubleshooting and Using Online SupportThis chapter provides troubleshooting tips and information for the UTM. After

Strona 349

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-2 Troubleshooting and Using Online Supportv1.0, January 2010Basic FunctioningAf

Strona 350 - Using an SNMP Manager

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-3v1.0, January 2010LAN or WAN Port LED

Strona 351 - Table 10-1. SNMP Settings

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-4 Troubleshooting and Using Online Supportv1.0, January 2010• If your UTM’s IP

Strona 352 - Figure 10-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-5v1.0, January 2010• If the computer i

Strona 353

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-6 Troubleshooting and Using Online Supportv1.0, January 2010If your UTM is stil

Strona 354 - Updating the Firmware

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-7v1.0, January 2010Troubleshooting a T

Strona 355 - Figure 10-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-8 Troubleshooting and Using Online Supportv1.0, January 2010Testing the Path fr

Strona 356

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-9v1.0, January 2010Restoring the Defau

Strona 357

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-8 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010S

Strona 358 - Figure 10-7

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-10 Troubleshooting and Using Online Supportv1.0, January 2010Problems with Date

Strona 359

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-11v1.0, January 2010To initiate the su

Strona 360 - Figure 10-8

ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-12 Troubleshooting and Using Online Supportv1.0, January 2010To submit a file t

Strona 361

Default Settings and Technical Specifications A-1v1.0, January 2010Appendix ADefault Settings and Technical SpecificationsYou can use the Reset button

Strona 362

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-2 Default Settings and Technical Specificationsv1.0, January 2010Table A-2 shows

Strona 363 - Chapter 11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualDefault Settings and Technical Specifications A-3v1.0, January 2010Table A-3 shows

Strona 364 - Figure 11-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-4 Default Settings and Technical Specificationsv1.0, January 2010Table A-4 shows

Strona 365

Network Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-1v1.0, January 2010Appendix BNetwork Planning for Dual WAN Ports(Dual-WAN Port Model

Strona 366 - Figure 11-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-2 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strona 367 - Figure 11-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-3v1.0, January 2

Strona 368

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-9v1.0, January 2010T

Strona 369 - Figure 11-4

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-4 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strona 370

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-5v1.0, January 2

Strona 371

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-6 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strona 372

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-7v1.0, January 2

Strona 373 - Table 11-4. Alerts Settings

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-8 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2

Strona 374

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-9v1.0, January 2

Strona 375 - Figure 11-6

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-10 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strona 376

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-11v1.0, January

Strona 377

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-12 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strona 378 - Information

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-13v1.0, January

Strona 379

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-10 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 380

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-14 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strona 381

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-15v1.0, January

Strona 382 - Viewing Status Screens

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-16 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strona 383

ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-17v1.0, January

Strona 384 - Port section

ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-18 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January

Strona 385

System Logs and Error Messages C-1v1.0, January 2010Appendix CSystem Logs and Error MessagesThis appendix explains provides examples and explanations

Strona 386 - Viewing Active VPN Users

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-2 System Logs and Error Messagesv1.0, January 2010System Log MessagesThis sectio

Strona 387 - Figure 11-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-3v1.0, January 2010Service LogsThis section descr

Strona 388 - Figure 11-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-4 System Logs and Error Messagesv1.0, January 2010Login/LogoutThis section descr

Strona 389 - Viewing the WAN Ports Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-5v1.0, January 2010WAN StatusThis section describ

Strona 390 - Figure 11-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-11v1.0, January 2010

Strona 391 - Status Informations

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-6 System Logs and Error Messagesv1.0, January 2010Load-Balancing ModeWhen the WA

Strona 392 - Figure 11-21

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-7v1.0, January 2010PPP LogsThis section describes

Strona 393

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-8 System Logs and Error Messagesv1.0, January 2010• PPTP Idle-Timeout Logs• PPP

Strona 394 - Querying the Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-9v1.0, January 2010Traffic Metering LogsThis sect

Strona 395

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-10 System Logs and Error Messagesv1.0, January 2010Multicast/Broadcast LogsThis

Strona 396 - Figure 11-23

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-11v1.0, January 2010Message 2007 Oct 1 00:44:17 [

Strona 397

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-12 System Logs and Error Messagesv1.0, January 2010Content Filtering and Securit

Strona 398

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-13v1.0, January 2010Spam LogsThis section describ

Strona 399

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-14 System Logs and Error Messagesv1.0, January 2010Traffic LogsThis section desc

Strona 400

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-15v1.0, January 2010IPS LogsThis section describe

Strona 401

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-12 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 402

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-16 System Logs and Error Messagesv1.0, January 2010Routing LogsThis section expl

Strona 403 - Figure 11-24

ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-17v1.0, January 2010WAN to LAN LogsThis section d

Strona 404 - Figure 11-25

ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-18 System Logs and Error Messagesv1.0, January 2010

Strona 405 - Using Diagnostics Utilities

Two Factor Authentication D-1v1.0, January 2010Appendix DTwo Factor AuthenticationThis appendix provides an overview of Two-Factor Authentication, and

Strona 406

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-2 Two Factor Authenticationv1.0, January 2010• Quick to deploy and manage. The W

Strona 407

ProSecure Unified Threat Management (UTM) Appliance Reference ManualTwo Factor Authentication D-3v1.0, January 2010The request-response architecture i

Strona 408

ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-4 Two Factor Authenticationv1.0, January 20103. The user then proceeds to the Tw

Strona 409

Related Documents E-1v1.0, January 2010Appendix ERelated DocumentsThis appendix provides links to reference documents you can use to gain a more compl

Strona 410

ProSecure Unified Threat Management (UTM) Appliance Reference ManualE-2 Related Documentsv1.0, January 2010

Strona 411 - Chapter 12

Index-1v1.0, January 2010IndexNumerics10BaseT, 100BaseT, and 1000BaseT 3-23AAAA 7-40AC input 1-12access, remote management 10-12action buttons (We

Strona 412 - Basic Functioning

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-13v1.0, January 2010

Strona 413 - LAN or WAN Port LEDs Not On

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-2v1.0, January 2010Bbacking up, configuration file 10-16bandwidth capacitya

Strona 414

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-3v1.0, January 2010managing 10-15restoring 10-17reverting to defaults 10-

Strona 415

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-4v1.0, January 2010DMZDHCPaddress pool 4-20DNS servers 4-21domain name 4-

Strona 416

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-5v1.0, January 2010Ffactory default settingsreverting to 10-18service licen

Strona 417

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-6v1.0, January 2010HTTPaction, infected Web file or object 2-20, 6-22defaul

Strona 418

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-7v1.0, January 2010IP header 5-37IP precedence 5-37IP security. See IPsec.

Strona 419 - Figure 12-1

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-8v1.0, January 2010configuring options 11-8e-mail address for sending logs

Strona 420 - Using Online Support

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-9v1.0, January 2010planning, dual WAN ports (dual-WAN port models) B-1proto

Strona 421 - Figure 12-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-10v1.0, January 2010IPsec VPNautomatically generated (auto) 7-31groups, con

Strona 422 - Figure 12-3

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-11v1.0, January 2010description 5-35examples 5-35shifting traffic mix 10-

Strona 423 - Appendix A

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-14 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 424

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-12v1.0, January 2010scan engine firmware 10-21scan exceptionse-mail message

Strona 425

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-13v1.0, January 2010spamblocked messages, recent 5 and top 5 11-18Distribut

Strona 426

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-14v1.0, January 2010tabs, submenu (Web Management Interface) 2-5TCP flood,

Strona 427 - (Dual-WAN Port Models Only)

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-15v1.0, January 2010VvideoconferencingDMZ port 4-18from restricted address

Strona 428

ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-16v1.0, January 2010WWANaliases 3-17auto-rollover mode (dual-WAN port model

Strona 429

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-15v1.0, January 2010

Strona 430

v1.0, January 2010vProduct and Publication DetailsPPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in sou

Strona 431

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-16 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 432 - Figure B-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-17v1.0, January 2010

Strona 433 - Inbound Traffic

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-18 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 434 - Figure B-5

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-19v1.0, January 2010

Strona 435 - Figure B-6

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-20 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 436 - Figure B-8

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-21v1.0, January 2010

Strona 437 - Figure B-9

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-22 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 438 - Figure B-11

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-23v1.0, January 2010

Strona 439 - VPN Gateway-to-Gateway

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-24 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 440 - Figure B-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-25v1.0, January 2010

Strona 441 - Figure B-16

v1.0, January 2010vi

Strona 442 - Figure B-17

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-26 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 443 - Figure B-19

ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-27v1.0, January 2010

Strona 444 - Figure B-20

ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-28 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010

Strona 445 - Appendix C

3-1v1.0, January 2010Chapter 3Manually Configuring Internet and WAN SettingsThis chapter contains the following sections:• “Understanding the Internet

Strona 446 - System Log Messages

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-2 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Configure d

Strona 447 - Service Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-3v1.0, January 20102. Click the A

Strona 448 - IPsec Restart

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-4 Manually Configuring Internet and WAN Settingsv1.0, January 2010The auto-detec

Strona 449 - WAN Status

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-5v1.0, January 2010The WAN Status

Strona 450 - Load-Balancing Mode

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-6 Manually Configuring Internet and WAN Settingsv1.0, January 2010To manually co

Strona 451 - • PPPoE Idle-Timeout Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-7v1.0, January 20105. If your con

Strona 452 - • PPP Authentication Logs

viiv1.0, January 2010ContentsProSecure Unified Threat Management (UTM) Appliance Reference ManualAbout This ManualConventions, Formats, and Scope ...

Strona 453 - Unicast Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-8 Manually Configuring Internet and WAN Settingsv1.0, January 20106. Configure t

Strona 454 - Invalid Packet Logging

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-9v1.0, January 20108. Click Test

Strona 455

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-10 Manually Configuring Internet and WAN Settingsv1.0, January 2010If you want t

Strona 456

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-11v1.0, January 2010Classical Rou

Strona 457 - Spam Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-12 Manually Configuring Internet and WAN Settingsv1.0, January 2010To configure

Strona 458 - E-mail Filter Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-13v1.0, January 2010WAN Failure D

Strona 459 - Port Scan Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-14 Manually Configuring Internet and WAN Settingsv1.0, January 20103. Click Appl

Strona 460 - Routing Logs

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-15v1.0, January 2010a. Figure 3-9

Strona 461 - WAN to DMZ Logs

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-16 Manually Configuring Internet and WAN Settingsv1.0, January 2010b. Click the

Strona 462

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-17v1.0, January 2010Configuring S

Strona 463 - Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manualviiiv1.0, January 2010Chapter 2 Using the Setup Wizard to Provision the UTM in You

Strona 464 - D-2 Two Factor Authentication

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-18 Manually Configuring Internet and WAN Settingsv1.0, January 2010To add a seco

Strona 465 - Figure D-2

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-19v1.0, January 2010Configuring D

Strona 466 - Figure D-3

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-20 Manually Configuring Internet and WAN Settingsv1.0, January 2010The WAN Mode

Strona 467 - Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-21v1.0, January 20104. Click the

Strona 468 - E-2 Related Documents

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-22 Manually Configuring Internet and WAN Settingsv1.0, January 20107. Click Appl

Strona 469 - Numerics

ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-23v1.0, January 20103. Enter the

Strona 470

ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-24 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Click Appl

Strona 471

4-1v1.0, January 2010Chapter 4LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains th

Strona 472

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-2 LAN Configurationv1.0, January 2010VLANs have a number of advantages:• It is e

Strona 473

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-3v1.0, January 2010When you create a VLAN profile, assign LAN

Strona 474

ProSecure Unified Threat Management (UTM) Appliance Reference Manualixv1.0, January 2010Configuring Secondary WAN Addresses ...

Strona 475

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-4 LAN Configurationv1.0, January 2010For each VLAN profile, the following fields

Strona 476

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-5v1.0, January 2010The UTM delivers the following settings to

Strona 477

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-6 LAN Configurationv1.0, January 2010LDAP ServerA Lightweight Directory Access P

Strona 478 - Index-10

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-7v1.0, January 20102. Either select an entry from the VLAN Pro

Strona 479 - Index-11

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-8 LAN Configurationv1.0, January 20103. Enter the settings as explained in Table

Strona 480 - Index-12

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-9v1.0, January 2010Enable DHCP Server(continued)Starting IP Ad

Strona 481 - Index-13

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-10 LAN Configurationv1.0, January 20104. Click Apply to save your settings.Enabl

Strona 482 - Index-14

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-11v1.0, January 2010Configuring Multi-Home LAN IPs on the Defa

Strona 483 - Index-15

ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-12 LAN Configurationv1.0, January 20103. In the Add Secondary LAN IPs section of

Strona 484 - Index-16

ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-13v1.0, January 2010Some advantages of the Network Database ar

Komentarze do niniejszej Instrukcji

Brak uwag