Netgear STM150 User Manual

Browse online or download User Manual for Routers Netgear STM150. Netgear STM150 User's Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 704
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
350 East Plumeria Drive
San Jose, CA 95134
USA
October 2012
202-10780-03
v1.0
ProSecure Unified Threat
Management (UTM)
Appliance
Reference Manual
Page view 0
1 2 3 4 5 6 ... 703 704

Summary of Contents

Page 1

350 East Plumeria DriveSan Jose, CA 95134USAOctober 2012202-10780-03v1.0ProSecure Unified Threat Management (UTM) ApplianceReference Manual

Page 2 - Revision History

10ProSecure Unified Threat Management (UTM) ApplianceConfigure User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401

Page 3

LAN Configuration100ProSecure Unified Threat Management (UTM) Appliance • When a port receives an untagged packet, this packet is forwarded to a VLAN

Page 4

LAN Configuration101 ProSecure Unified Threat Management (UTM) ApplianceFigure 54. For each VLAN profile, the following fields display in the VLAN Pr

Page 5 - Contents

LAN Configuration102ProSecure Unified Threat Management (UTM) Appliance DHCP ServerThe default VLAN (VLAN 1) has the DHCP server option enabled by def

Page 6 - Chapter 4 LAN Configuration

LAN Configuration103 ProSecure Unified Threat Management (UTM) Applianceconfiguration in auto-rollover mode with route diversity (that is, with two di

Page 7 - Chapter 5 Firewall Protection

LAN Configuration104ProSecure Unified Threat Management (UTM) Appliance 2. Either select an entry from the VLAN Profiles table and click the correspon

Page 8

LAN Configuration105 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table: Table 21. Edit VLA

Page 9

LAN Configuration106ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server Select the Enable DHCP Server radio button to enable the UT

Page 10

LAN Configuration107 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Enable LDAP informationTo enable the DHCP

Page 11

LAN Configuration108ProSecure Unified Threat Management (UTM) Appliance Note: When you have completed the LAN setup, all outbound traffic is allowed a

Page 12

LAN Configuration109 ProSecure Unified Threat Management (UTM) ApplianceFigure 57. 3. From the MAC Address for VLANs drop-down list, select Unique. (

Page 13

11ProSecure Unified Threat Management (UTM) ApplianceView the Active PPTP and L2TP Users . . . . . . . . . . . . . . . . . . . . . . . .501View the Po

Page 14

LAN Configuration110ProSecure Unified Threat Management (UTM) Appliance The following is an example of correctly configured IP addresses on a multiple

Page 15 - Introduction

LAN Configuration111 ProSecure Unified Threat Management (UTM) Appliance To edit a secondary LAN IP address:1. On the LAN Multi-homing screen (see th

Page 16 - Key Features and Capabilities

LAN Configuration112ProSecure Unified Threat Management (UTM) Appliance These are some advantages of the network database:• Generally, you do not need

Page 17 - Outbound Load Balancing

LAN Configuration113 ProSecure Unified Threat Management (UTM) ApplianceFigure 59. The Known PCs and Devices table lists the entries in the network da

Page 18 - DSL Features

LAN Configuration114ProSecure Unified Threat Management (UTM) Appliance Add Computers or Devices to the Network Database To add computers or devices

Page 19 - A Powerful, True Firewall

LAN Configuration115 ProSecure Unified Threat Management (UTM) ApplianceFigure 60. 2. Modify the settings as explained in Table 22 on page 114.3. Cli

Page 20 - Security Features

LAN Configuration116ProSecure Unified Threat Management (UTM) Appliance Figure 61. 3. Select the radio button next to the group name that you want to

Page 21 - Extensive Protocol Support

LAN Configuration117 ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable the DMZ PortThe demilitarized zone (DMZ) is a network tha

Page 22 - Model Comparison

LAN Configuration118ProSecure Unified Threat Management (UTM) Appliance Figure 62. 2. Enter the settings as explained in the following table: Table 2

Page 23

LAN Configuration119 ProSecure Unified Threat Management (UTM) ApplianceDHCPDisable DHCP Server If another device on your network is the DHCP server f

Page 24 - Hardware Features

12ProSecure Unified Threat Management (UTM) ApplianceAppendix A xDSL Network Module for the UTM9S and UTM25SxDSL Network Module Configuration Tasks. .

Page 25 - Front Panel UTM5 and UTM10

LAN Configuration120ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: For all UTM models except for the U

Page 26 - Front Panel UTM50

LAN Configuration121 ProSecure Unified Threat Management (UTM) ApplianceManage Routing• Configure Static Routes• Configure Routing Information Protoco

Page 27 - Front Panel UTM150

LAN Configuration122ProSecure Unified Threat Management (UTM) Appliance Figure 64. 3. Enter the settings as explained in the following table: 4. Clic

Page 28

LAN Configuration123 ProSecure Unified Threat Management (UTM) Appliance To edit a static route that is in the Static Routes table:1. On the Routing

Page 29 - Wireless Network Modules

LAN Configuration124ProSecure Unified Threat Management (UTM) Appliance Figure 65. 3. Enter the settings as explained in the following table: Table 2

Page 30

LAN Configuration125 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.RIP Version By default, the RIP version i

Page 31

LAN Configuration126ProSecure Unified Threat Management (UTM) Appliance Static Route ExampleIn this example, we assume the following:• The UTM’s prima

Page 32

12755. Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chapter contains the foll

Page 33

Firewall Protection128ProSecure Unified Threat Management (UTM) Appliance Administrator TipsConsider the following operational items:1. As an option,

Page 34 - Rear Panel UTM50 and UTM150

Firewall Protection129 ProSecure Unified Threat Management (UTM) ApplianceA firewall has two default rules, one for inbound traffic and one for outbou

Page 35 - Rear Panel UTM9S and UTM25S

13ProSecure Unified Threat Management (UTM) ApplianceAppendix D Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)What to Consider Bef

Page 36 - Figure 13

Firewall Protection130ProSecure Unified Threat Management (UTM) Appliance WARNING:Allowing inbound services opens security holes in your UTM. Enable o

Page 37 - Figure 15

Firewall Protection131 ProSecure Unified Threat Management (UTM) ApplianceLAN Users The settings that determine which computers on your network are af

Page 38 - Figure 17

Firewall Protection132ProSecure Unified Threat Management (UTM) Appliance QoS Profile The priority assigned to IP packets of this service. The priorit

Page 39 - Choose a Location for the UTM

Firewall Protection133 ProSecure Unified Threat Management (UTM) ApplianceInbound Rules (Port Forwarding)If you have enabled Network Address Translati

Page 40 - Use the Rack-Mounting Kit

Firewall Protection134ProSecure Unified Threat Management (UTM) Appliance • Local computers need to access the local server using the computers’ local

Page 41 - UTM in Your Network

Firewall Protection135 ProSecure Unified Threat Management (UTM) ApplianceTable 28. Inbound rules overviewSetting Description Inbound RulesService(al

Page 42 - Log In to the UTM

Firewall Protection136ProSecure Unified Threat Management (UTM) Appliance LAN Users The settings that determine which computers on your network are af

Page 43 - Figure 20

Firewall Protection137 ProSecure Unified Threat Management (UTM) ApplianceQoS Profile The priority assigned to IP packets of this service. The priorit

Page 44 - Figure 21

Firewall Protection138ProSecure Unified Threat Management (UTM) Appliance Note: Some residential broadband ISP accounts do not allow you to run any se

Page 45

Firewall Protection139 ProSecure Unified Threat Management (UTM) ApplianceFor any traffic attempting to pass through the firewall, the packet informat

Page 46 - Figure 24

14ProSecure Unified Threat Management (UTM) ApplianceEmail Filter Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 47 - Figure 25

Firewall Protection140ProSecure Unified Threat Management (UTM) Appliance  To change an existing outbound or inbound service rule:In the Action colum

Page 48 - Figure 26

Firewall Protection141 ProSecure Unified Threat Management (UTM) ApplianceFigure 68. 2. Enter the settings as explained in Table 27 on page 130.3. Cl

Page 49

Firewall Protection142ProSecure Unified Threat Management (UTM) Appliance Figure 69. 2. Enter the settings as explained in Table 28 on page 135.3. Cl

Page 50

Firewall Protection143 ProSecure Unified Threat Management (UTM) Applianceadding outbound services rules (see Create DMZ WAN Outbound Service Rules on

Page 51 - Figure 27

Firewall Protection144ProSecure Unified Threat Management (UTM) Appliance Create DMZ WAN Outbound Service RulesYou can change the default outbound pol

Page 52

Firewall Protection145 ProSecure Unified Threat Management (UTM) Appliance To create an inbound DMZ WAN service rule:1. In the DMZ WAN Rules screen,

Page 53

Firewall Protection146ProSecure Unified Threat Management (UTM) Appliance To access the LAN DMZ Rules screen and to change an existing outbound or inb

Page 54 - Connection on page 75

Firewall Protection147 ProSecure Unified Threat Management (UTM) ApplianceCreate LAN DMZ Outbound Service RulesYou can change the default outbound pol

Page 55 - Figure 29

Firewall Protection148ProSecure Unified Threat Management (UTM) Appliance Figure 75. 2. Enter the settings as explained in Table 28 on page 135.3. Cl

Page 56

Firewall Protection149 ProSecure Unified Threat Management (UTM) ApplianceFigure 76. LAN WAN Inbound Rule: Allow Videoconference from Restricted Addre

Page 57 - Figure 30

1511. IntroductionThis chapter provides an overview of the features and capabilities of the NETGEAR ProSecure® Unified Threat Management (UTM) Appli

Page 58 - Figure 31

Firewall Protection150ProSecure Unified Threat Management (UTM) Appliance Figure 77. LAN WAN or DMZ WAN Inbound Rule: Set Up One-to-One NAT MappingIn

Page 59

Firewall Protection151 ProSecure Unified Threat Management (UTM) ApplianceTip: If you arrange with your ISP to have more than one public IP address fo

Page 60 - Figure 32

Firewall Protection152ProSecure Unified Threat Management (UTM) Appliance 6. In the Send to LAN Server field, enter the local IP address of your web s

Page 61

Firewall Protection153 ProSecure Unified Threat Management (UTM) ApplianceWARNING:For security, NETGEAR strongly recommends that you avoid creating an

Page 62 - Figure 33

Firewall Protection154ProSecure Unified Threat Management (UTM) Appliance Configure Other Firewall Features• VLAN Rules• Attack Checks, VPN Pass-throu

Page 63 - Figure 34

Firewall Protection155 ProSecure Unified Threat Management (UTM) ApplianceFigure 82. 3. Enter the settings as explained in the following table.Table

Page 64 - Firmware on page 454

Firewall Protection156ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new VLAN rule is added to the VLAN

Page 65 - Register the UTM with NETGEAR

Firewall Protection157 ProSecure Unified Threat Management (UTM) ApplianceAttack Checks, VPN Pass-through, and Multicast Pass-throughThe Attack Checks

Page 66 - Figure 36

Firewall Protection158ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Configure Multicast Pass-Through To co

Page 67 - Electronic Licensing

Firewall Protection159 ProSecure Unified Threat Management (UTM) ApplianceFigure 84. 2. In the Multicast Pass through section of the screen, select t

Page 68 - What to Do Next

Introduction16ProSecure Unified Threat Management (UTM) Appliance carry session traffic, or to maintain a backup connection in case of failure of your

Page 69

Firewall Protection160ProSecure Unified Threat Management (UTM) Appliance  To delete one or more multicast source addresses:1. In the Alternate Netwo

Page 70

Firewall Protection161 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Manage the Application Level Gateway fo

Page 71 - Connections

Firewall Protection162ProSecure Unified Threat Management (UTM) Appliance Figure 86. 2. In the ALG section, select the Enable SIP ALG check box.3. In

Page 72 - Figure 37

Firewall Protection163 ProSecure Unified Threat Management (UTM) Appliance• QoS profiles. A Quality of Service (QoS) profile defines the relative prio

Page 73 - Figure 38

Firewall Protection164ProSecure Unified Threat Management (UTM) Appliance  To add a customized service:1. Select Network Security > Services. The

Page 74 - Figure 39

Firewall Protection165 ProSecure Unified Threat Management (UTM) Appliance To edit a service:1. In the Custom Services table, click the Edit table bu

Page 75 - Figure 40

Firewall Protection166ProSecure Unified Threat Management (UTM) Appliance Figure 89. 2. Under the Custom Service Group table, click the Add table but

Page 76 - Figure 41

Firewall Protection167 ProSecure Unified Threat Management (UTM) ApplianceCreate IP GroupsAn IP group contains a collection of individual IP addresses

Page 77 - Figure 42

Firewall Protection168ProSecure Unified Threat Management (UTM) Appliance Figure 92. 5. In the IP Address fields, type an IP address.6. Click the Add

Page 78 - Figure 43

Firewall Protection169 ProSecure Unified Threat Management (UTM) ApplianceCreate Quality of Service ProfilesA Quality of Service (QoS) profile defines

Page 79 - Figure 44

Introduction17 ProSecure Unified Threat Management (UTM) Appliance• Depending on the model, bundled with a one-user license of the NETGEAR ProSafe VPN

Page 80

Firewall Protection170ProSecure Unified Threat Management (UTM) Appliance Figure 93. The screen displays the List of QoS Profiles table with the user

Page 81

Firewall Protection171 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new QoS profile is added to the Li

Page 82

Firewall Protection172ProSecure Unified Threat Management (UTM) Appliance When a new connection is established by a device, the device locates the fir

Page 83

Firewall Protection173 ProSecure Unified Threat Management (UTM) ApplianceFigure 96. 3. Enter the settings as explained in the following table:Table

Page 84 - Figure 46

Firewall Protection174ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new bandwidth profile is added to

Page 85 - (Multiple WAN Port Models)

Firewall Protection175 ProSecure Unified Threat Management (UTM) Applianceboth downloaded and uploaded traffic. When applied to multiple firewall rule

Page 86 - Figure 47

Firewall Protection176ProSecure Unified Threat Management (UTM) Appliance Figure 98. 3. Enter the settings as explained in the following table:Table

Page 87 - Figure 48

Firewall Protection177 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new traffic meter profile is added

Page 88 - Figure 49

Firewall Protection178ProSecure Unified Threat Management (UTM) Appliance Figure 100. 3. Enter the settings as explained in the following table:Table

Page 89

Firewall Protection179 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new schedule is added to the List

Page 90 - Figure 50

Introduction18ProSecure Unified Threat Management (UTM) Appliance Wireless FeaturesWireless client connections are supported on the UTM9S and UTM25S w

Page 91

Firewall Protection180ProSecure Unified Threat Management (UTM) Appliance  To enable MAC filtering and add MAC addresses to be permitted or blocked:1

Page 92 - Figure 51

Firewall Protection181 ProSecure Unified Threat Management (UTM) ApplianceSet Up IP/MAC BindingsIP/MAC binding allows you to bind an IP address to a M

Page 93 - Figure 52

Firewall Protection182ProSecure Unified Threat Management (UTM) Appliance Figure 102. 2. Enter the settings as explained in the following table:3. Cl

Page 94

Firewall Protection183 ProSecure Unified Threat Management (UTM) Appliance To edit an IP/MAC binding:1. In the IP/MAC Bindings table, click the Edit

Page 95 - Figure 53

Firewall Protection184ProSecure Unified Threat Management (UTM) Appliance  To add a port-triggering rule:1. Select Network Security > Port Trigger

Page 96

Firewall Protection185 ProSecure Unified Threat Management (UTM) Appliance To edit a port-triggering rule:1. In the Port Triggering Rules table, clic

Page 97

Firewall Protection186ProSecure Unified Threat Management (UTM) Appliance Configure Universal Plug and PlayThe Universal Plug and Play (UPnP) feature

Page 98

Firewall Protection187 ProSecure Unified Threat Management (UTM) ApplianceEnable and Configure the Intrusion Prevention SystemThe intrusion prevention

Page 99 - Port-Based VLANs

Firewall Protection188ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: Traffic that passes on the UTM’s

Page 100 - LAN Configuration

Firewall Protection189 ProSecure Unified Threat Management (UTM) ApplianceFigure 106. IPS, screen 1 of 2

Page 101 - VLAN DHCP Options

Introduction19 ProSecure Unified Threat Management (UTM) Appliance• SSL VPN provides remote access for mobile users to selected corporate resources wi

Page 102 - DNS Proxy

Firewall Protection190ProSecure Unified Threat Management (UTM) Appliance Figure 107. IPS, screen 2 of 24. Click Apply to save your settings.The foll

Page 103 - Configure a VLAN Profile

Firewall Protection191 ProSecure Unified Threat Management (UTM) ApplianceNote: To ensure that alerts are emailed to an administrator, you need to con

Page 104 - Figure 56

19266. Content Filtering and Optimizing ScansThis chapter describes how to apply the content-filtering features of the UTM and how to optimize scans

Page 105

Content Filtering and Optimizing Scans193 ProSecure Unified Threat Management (UTM) ApplianceNote: The UTM can quarantine spam and malware only if you

Page 106

Content Filtering and Optimizing Scans194ProSecure Unified Threat Management (UTM) Appliance Configure Email Protection• Customize Email Protocol Scan

Page 107

Content Filtering and Optimizing Scans195 ProSecure Unified Threat Management (UTM) ApplianceNote: For information about web protocols and ports, see

Page 108 -  To edit a VLAN profile:

Content Filtering and Optimizing Scans196ProSecure Unified Threat Management (UTM) Appliance Customize Email Antivirus and Notification SettingsWhethe

Page 109 - Figure 57

Content Filtering and Optimizing Scans197 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Page 110 - Figure 58

Content Filtering and Optimizing Scans198ProSecure Unified Threat Management (UTM) Appliance Scan ExceptionsThe default maximum size of the email mess

Page 111

Content Filtering and Optimizing Scans199 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Email Content Filter

Page 112 - Manage the Network Database

2ProSecure Unified Threat Management (UTM) Appliance SupportThank you for choosing NETGEAR.After installing your device, locate the serial number on t

Page 113 - Figure 59

Introduction20ProSecure Unified Threat Management (UTM) Appliance analysis to stop both known and unknown threats. The malware database contains hundr

Page 114

Content Filtering and Optimizing Scans200ProSecure Unified Threat Management (UTM) Appliance  To configure email content filtering: 1. Select Applica

Page 115 - Figure 60

Content Filtering and Optimizing Scans201 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Page 116 - Set Up Address Reservation

Content Filtering and Optimizing Scans202ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Protect Against Emai

Page 117

Content Filtering and Optimizing Scans203 ProSecure Unified Threat Management (UTM) ApplianceThis order of implementation ensures the optimum balance

Page 118 - Figure 62

Content Filtering and Optimizing Scans204ProSecure Unified Threat Management (UTM) Appliance  To configure the whitelist and blacklist:1. Select Appl

Page 119

Content Filtering and Optimizing Scans205 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Page 120

Content Filtering and Optimizing Scans206ProSecure Unified Threat Management (UTM) Appliance Configure the Real-Time BlacklistBlacklist providers are

Page 121 - Manage Routing

Content Filtering and Optimizing Scans207 ProSecure Unified Threat Management (UTM) Appliance To delete a blacklist provider from the real-time black

Page 122 - Figure 64

Content Filtering and Optimizing Scans208ProSecure Unified Threat Management (UTM) Appliance Figure 113. 2. Enter the settings as explained in the fo

Page 123

Content Filtering and Optimizing Scans209 ProSecure Unified Threat Management (UTM) ApplianceSensitivity From the Sensitivity drop-down list, select t

Page 124 - Figure 65

Introduction21 ProSecure Unified Threat Management (UTM) ApplianceExtensive Protocol SupportThe UTM supports the Transmission Control Protocol/Interne

Page 125

Content Filtering and Optimizing Scans210ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. The Distributed Spa

Page 126 - Static Route Example

Content Filtering and Optimizing Scans211 ProSecure Unified Threat Management (UTM) ApplianceScanning all protocols enhances network security but migh

Page 127 - Firewall Protection

Content Filtering and Optimizing Scans212ProSecure Unified Threat Management (UTM) Appliance service on your network uses both port 80 and port 8080,

Page 128 - Administrator Tips

Content Filtering and Optimizing Scans213 ProSecure Unified Threat Management (UTM) Appliance2. In the HTTPS Smart Block Port section of the screen, e

Page 129

Content Filtering and Optimizing Scans214ProSecure Unified Threat Management (UTM) Appliance Figure 117. The HTTPS Smart Block Profiles table shows a

Page 130

Content Filtering and Optimizing Scans215 ProSecure Unified Threat Management (UTM) Appliance To change a profile:1. In the Action column of the HTTP

Page 131

Content Filtering and Optimizing Scans216ProSecure Unified Threat Management (UTM) Appliance Configure Web Malware or Antivirus ScansWhether or not th

Page 132

Content Filtering and Optimizing Scans217 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table

Page 133

Content Filtering and Optimizing Scans218ProSecure Unified Threat Management (UTM) Appliance Configure Web Content FilteringIf you want to restrict ac

Page 134

Content Filtering and Optimizing Scans219 ProSecure Unified Threat Management (UTM) ApplianceNote: You can bypass any type of web blocking for trusted

Page 135 - . On the single WAN port

Introduction22ProSecure Unified Threat Management (UTM) Appliance • SNMP. The UTM supports the Simple Network Management Protocol (SNMP) to let you mo

Page 136

Content Filtering and Optimizing Scans220ProSecure Unified Threat Management (UTM) Appliance Figure 120. Content filtering, screen 2 of 3

Page 137

Content Filtering and Optimizing Scans221 ProSecure Unified Threat Management (UTM) ApplianceFigure 121. Content filtering, screen 3 of 32. Enter the

Page 138 - Order of Precedence for Rules

Content Filtering and Optimizing Scans222ProSecure Unified Threat Management (UTM) Appliance Block Files with the Following ExtensionsBy default, the

Page 139 - Configure LAN WAN Rules

Content Filtering and Optimizing Scans223 ProSecure Unified Threat Management (UTM) ApplianceSelect the Web Categories You Wish to BlockSelect the Ena

Page 140

Content Filtering and Optimizing Scans224ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: When the UTM b

Page 141 - Figure 68

Content Filtering and Optimizing Scans225 ProSecure Unified Threat Management (UTM) Appliance To configure web URL filtering:1. Select Application Se

Page 142 - Configure DMZ WAN Rules

Content Filtering and Optimizing Scans226ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table

Page 143 - Figure 70

Content Filtering and Optimizing Scans227 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.URL(continued)Delete

Page 144 - Figure 71

Content Filtering and Optimizing Scans228ProSecure Unified Threat Management (UTM) Appliance Configure HTTPS Scanning and SSL Certificates• How HTTPS

Page 145 - Configure LAN DMZ Rules

Content Filtering and Optimizing Scans229 ProSecure Unified Threat Management (UTM) ApplianceDuring SSL authentication, the HTTPS client authenticates

Page 146 - Figure 73

Introduction23 ProSecure Unified Threat Management (UTM) ApplianceService Registration Card with License KeysBe sure to store the license key card tha

Page 147 - Figure 74

Content Filtering and Optimizing Scans230ProSecure Unified Threat Management (UTM) Appliance Configure the HTTPS Scan Settings To configure the HTTPS

Page 148 - Examples of Firewall Rules

Content Filtering and Optimizing Scans231 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Manage SSL Certifica

Page 149 - Figure 76

Content Filtering and Optimizing Scans232ProSecure Unified Threat Management (UTM) Appliance recommends that you replace this digital certificate with

Page 150 - Figure 77

Content Filtering and Optimizing Scans233 ProSecure Unified Threat Management (UTM) Appliance To download the current certificate into your browser:1

Page 151 - Figure 78

Content Filtering and Optimizing Scans234ProSecure Unified Threat Management (UTM) Appliance The Trusted Certificates table contains the trusted certi

Page 152 - Figure 79

Content Filtering and Optimizing Scans235 ProSecure Unified Threat Management (UTM) Appliance To delete an untrusted certificate:1. From the Exceptio

Page 153 - Outbound Rule Example

Content Filtering and Optimizing Scans236ProSecure Unified Threat Management (UTM) Appliance Figure 130. 2. Enter the settings as explained in the fo

Page 154 - VLAN Rules

Content Filtering and Optimizing Scans237 ProSecure Unified Threat Management (UTM) ApplianceConfigure the SSL Settings for HTTPS Scanning To configu

Page 155 - Figure 82

Content Filtering and Optimizing Scans238ProSecure Unified Threat Management (UTM) Appliance Configure FTP Scanning• Customize FTP Antivirus Settings•

Page 156 -  To edit a VLAN rule:

Content Filtering and Optimizing Scans239 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Configure FTP Conten

Page 157 - Figure 83

Introduction24ProSecure Unified Threat Management (UTM) Appliance Note: When you reset the UTM to the original factory default settings after you have

Page 158

Content Filtering and Optimizing Scans240ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. Configure Applicati

Page 159 - Figure 84

Content Filtering and Optimizing Scans241 ProSecure Unified Threat Management (UTM) Appliance• Private protocols• Social networksControl is set for en

Page 160 - Set Session Limits

Content Filtering and Optimizing Scans242ProSecure Unified Threat Management (UTM) Appliance  To configure an application control profile and enable

Page 161 - VPN Scanning

Content Filtering and Optimizing Scans243 ProSecure Unified Threat Management (UTM) ApplianceFigure 135. 3. Configure the common settings in the uppe

Page 162 - Traffic Meter Profiles

Content Filtering and Optimizing Scans244ProSecure Unified Threat Management (UTM) Appliance 4. In the lower part of the screen, select the categories

Page 163 - Add Customized Services

Content Filtering and Optimizing Scans245 ProSecure Unified Threat Management (UTM) Appliance5. In the Active Categories and Individual Applications t

Page 164 - Figure 87

Content Filtering and Optimizing Scans246ProSecure Unified Threat Management (UTM) Appliance 6. Configure the policy as explained in the following tab

Page 165 - Create Service Groups

Content Filtering and Optimizing Scans247 ProSecure Unified Threat Management (UTM) Appliance7. Click Apply to save the policy settings. The pop-up sc

Page 166 -  To edit a service group:

Content Filtering and Optimizing Scans248ProSecure Unified Threat Management (UTM) Appliance 2. Modify the settings that you wish to change (see the p

Page 167 - Create IP Groups

Content Filtering and Optimizing Scans249 ProSecure Unified Threat Management (UTM) Appliance• A combination of file extensions and protocols• One URL

Page 168 -  To delete an IP group:

Introduction25 ProSecure Unified Threat Management (UTM) Appliance• Rear Panel UTM50 and UTM150• Rear Panel UTM9S and UTM25S• Bottom Panels with Produ

Page 169 -  To create a QoS profile:

Content Filtering and Optimizing Scans250ProSecure Unified Threat Management (UTM) Appliance 2. Under the File Extension table at the bottom of the sc

Page 170 - Figure 94

Content Filtering and Optimizing Scans251 ProSecure Unified Threat Management (UTM) Appliance• File Extension.Figure 140. Add or edit exceptions: fil

Page 171 - Create Bandwidth Profiles

Content Filtering and Optimizing Scans252ProSecure Unified Threat Management (UTM) Appliance • URL Filtering.Figure 142. Add or edit exceptions: URL

Page 172 - Figure 95

Content Filtering and Optimizing Scans253 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/GroupClick the Edit button to open the Applies

Page 173 - Figure 96

Content Filtering and Optimizing Scans254ProSecure Unified Threat Management (UTM) Appliance DomainUser/Group(continued)Local Groups Do the following:

Page 174 - Create Traffic Meter Profiles

Content Filtering and Optimizing Scans255 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/Group(continued)Custom Groups Do the following

Page 175 - Figure 97

Content Filtering and Optimizing Scans256ProSecure Unified Threat Management (UTM) Appliance Category (and related information)(continued)File Extensi

Page 176 - Figure 98

Content Filtering and Optimizing Scans257 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings. The new exception r

Page 177 - Figure 99

Content Filtering and Optimizing Scans258ProSecure Unified Threat Management (UTM) Appliance Create Custom Categories for Exceptions for Web andApplic

Page 178 - Figure 100

Content Filtering and Optimizing Scans259 ProSecure Unified Threat Management (UTM) Appliance• Application. Figure 145. Custom categories: applicatio

Page 179 - Enable Source MAC Filtering

Introduction26ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM25Viewed from left to right, the UTM25 front panel contains the follo

Page 180 - Figure 101

Content Filtering and Optimizing Scans260ProSecure Unified Threat Management (UTM) Appliance • Web Category. Figure 147. Custom categories: web categ

Page 181 - Set Up IP/MAC Bindings

Content Filtering and Optimizing Scans261 ProSecure Unified Threat Management (UTM) ApplianceCategory Type(continued)Application(continued)To remove o

Page 182 - Figure 102

Content Filtering and Optimizing Scans262ProSecure Unified Threat Management (UTM) Appliance 5. Click Apply to save your settings. The new category is

Page 183 - Configure Port Triggering

Content Filtering and Optimizing Scans263 ProSecure Unified Threat Management (UTM) ApplianceFigure 148. 2. In the Add Scanning Exclusions section of

Page 184 - Figure 103

26477. Virtual Private NetworkingUsing IPSec, PPTP, or L2TP ConnectionsThis chapter describes how to use the IP security (IPSec) virtual private net

Page 185 - Figure 104

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections265 ProSecure Unified Threat Management (UTM) Appliancebalancing mode if the IP addre

Page 186 - Figure 105

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections266ProSecure Unified Threat Management (UTM) Appliance Use the IPSec VPN Wizard for C

Page 187

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections267 ProSecure Unified Threat Management (UTM) Appliance• Multiple WAN port models. A

Page 188

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections268ProSecure Unified Threat Management (UTM) Appliance Figure 153. The VPN Wizard de

Page 189

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections269 ProSecure Unified Threat Management (UTM) Appliance2. Select the radio buttons an

Page 190

Introduction27 ProSecure Unified Threat Management (UTM) ApplianceFigure 4. Front panel UTM50Front Panel UTM150Viewed from left to right, the UTM150 f

Page 191

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections270ProSecure Unified Threat Management (UTM) Appliance Tip: To ensure that tunnels st

Page 192

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections271 ProSecure Unified Threat Management (UTM) ApplianceFigure 155. b. Locate the pol

Page 193

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections272ProSecure Unified Threat Management (UTM) Appliance Use the VPN Wizard to Configur

Page 194 - Configure Email Protection

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections273 ProSecure Unified Threat Management (UTM) ApplianceTo display the wizard default

Page 195 - Figure 108

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections274ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your se

Page 196 - Figure 109

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections275 ProSecure Unified Threat Management (UTM) ApplianceFigure 158. Note: When you ar

Page 197

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections276ProSecure Unified Threat Management (UTM) Appliance Use the NETGEAR VPN Client Wiz

Page 198

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections277 ProSecure Unified Threat Management (UTM) ApplianceFigure 160. 3. Select the A r

Page 199 - Email Content Filtering

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections278ProSecure Unified Threat Management (UTM) Appliance Figure 162. 6. This screen is

Page 200 - Figure 110

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections279 ProSecure Unified Threat Management (UTM) Appliancec. Specify the settings that a

Page 201

Introduction28ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM9S and UTM25S and Network ModulesViewed from left to right, the UTM9S

Page 202 - Protect Against Email Spam

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections280ProSecure Unified Threat Management (UTM) Appliance Figure 164. b. Specify the de

Page 203

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections281 ProSecure Unified Threat Management (UTM) ApplianceConfigure the Authentication S

Page 204 - Figure 111

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections282ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the

Page 205

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections283 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to use the new

Page 206 - Figure 112

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections284ProSecure Unified Threat Management (UTM) Appliance 8. Click Apply to use the new

Page 207

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections285 ProSecure Unified Threat Management (UTM) ApplianceFigure 169. 3. Specify the se

Page 208 - Figure 113

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections286ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to use the new

Page 209

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections287 ProSecure Unified Threat Management (UTM) ApplianceTest the Connection and View C

Page 210

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections288ProSecure Unified Threat Management (UTM) Appliance Perform one of the following t

Page 211 - Figure 114

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections289 ProSecure Unified Threat Management (UTM) ApplianceNETGEAR VPN Client Status and

Page 212 - Configure HTTPS Smart Block

Introduction29 ProSecure Unified Threat Management (UTM) AppliancexDSL Network ModulesThe following xDSL network modules are available for insertion i

Page 213 - Figure 116

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections290ProSecure Unified Threat Management (UTM) Appliance The Active IPSec SA(s) table l

Page 214 - Figure 117

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections291 ProSecure Unified Threat Management (UTM) ApplianceFigure 178. Manage IPSec VPN a

Page 215 -  To change a profile:

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections292ProSecure Unified Threat Management (UTM) Appliance Manage IKE PoliciesThe Interne

Page 216 - Figure 118

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections293 ProSecure Unified Threat Management (UTM) ApplianceFigure 179. Each policy contai

Page 217

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections294ProSecure Unified Threat Management (UTM) Appliance  To delete one or more IKE po

Page 218

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections295 ProSecure Unified Threat Management (UTM) ApplianceFigure 180.

Page 219

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections296ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select

Page 220

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections297 ProSecure Unified Threat Management (UTM) ApplianceIdentifier Type From the drop-

Page 221

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections298ProSecure Unified Threat Management (UTM) Appliance Authentication Method Select o

Page 222

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections299 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Page 223

3ProSecure Unified Threat Management (UTM) Appliance 202-10780-03(continued)1.0(continued)October 2012(continued)(continued)• Added Appendix C, 3G/4G

Page 224 - Configure Web URL Filtering

Introduction30ProSecure Unified Threat Management (UTM) Appliance Figure 8. Wireless network moduleLED Descriptions, UTM5, UTM10, UTM25, UTM50, and UT

Page 225 - Figure 122

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections300ProSecure Unified Threat Management (UTM) Appliance Manage VPN Policies You can cr

Page 226

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections301 ProSecure Unified Threat Management (UTM) ApplianceFigure 181. Each policy contai

Page 227

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections302ProSecure Unified Threat Management (UTM) Appliance  To delete one or more VPN po

Page 228 - How HTTPS Scanning Works

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections303 ProSecure Unified Threat Management (UTM) ApplianceFigure 182.

Page 229 - Figure 124

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections304ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select

Page 230 - Figure 125

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections305 ProSecure Unified Threat Management (UTM) ApplianceEnable KeepaliveNote: See also

Page 231 - Figure 126

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections306ProSecure Unified Threat Management (UTM) Appliance Encryption Algorithm From the

Page 232

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections307 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Page 233

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections308ProSecure Unified Threat Management (UTM) Appliance  To edit a VPN policy:1. Sele

Page 234

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections309 ProSecure Unified Threat Management (UTM) ApplianceConfigure XAUTH for VPN Client

Page 235 -  To specify trusted hosts:

Introduction31 ProSecure Unified Threat Management (UTM) ApplianceLAN portsLeft LED Off The LAN port has no link.On (green) The LAN port has detected

Page 236 - Figure 130

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections310ProSecure Unified Threat Management (UTM) Appliance User Database ConfigurationWhe

Page 237 - Figure 131

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections311 ProSecure Unified Threat Management (UTM) Appliance2. Complete the fields and sel

Page 238 - Configure FTP Scanning

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections312ProSecure Unified Threat Management (UTM) Appliance Assign IP Addresses to Remote

Page 239 - To configure the FTP filters:

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections313 ProSecure Unified Threat Management (UTM) Appliance To configure Mode Config on

Page 240 - Configure Application Control

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections314ProSecure Unified Threat Management (UTM) Appliance Figure 185. 3. Complete the f

Page 241

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections315 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se

Page 242 - Figure 134

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections316ProSecure Unified Threat Management (UTM) Appliance 6. Under the List of IKE Polic

Page 243 - Figure 135

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections317 ProSecure Unified Threat Management (UTM) ApplianceNote: The IKE policy settings

Page 244

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections318ProSecure Unified Threat Management (UTM) Appliance IKE SA ParametersNote: General

Page 245

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections319 ProSecure Unified Threat Management (UTM) Appliance8. Click Apply to save your se

Page 246

Introduction32ProSecure Unified Threat Management (UTM) Appliance LED Descriptions, UTM9S, UTM25S, and their Network ModulesThe following table descri

Page 247

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections320ProSecure Unified Threat Management (UTM) Appliance Note: Perform these tasks from

Page 248

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections321 ProSecure Unified Threat Management (UTM) ApplianceFigure 188. 3. Change the nam

Page 249 - Figure 138

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections322ProSecure Unified Threat Management (UTM) Appliance 4. Specify the settings that a

Page 250

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections323 ProSecure Unified Threat Management (UTM) Appliance7. Specify the settings that a

Page 251 - • HTTPS Smart Block

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections324ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the

Page 252 - • Web Category

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections325 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to use the new

Page 253

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections326ProSecure Unified Threat Management (UTM) Appliance 2. Specify the following defau

Page 254

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections327 ProSecure Unified Threat Management (UTM) ApplianceFigure 195. 3. From the clien

Page 255

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections328ProSecure Unified Threat Management (UTM) Appliance Configure Keep-Alives and Dead

Page 256

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections329 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as expla

Page 257

Introduction33 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM5, UTM10, and UTM25The rear panel of the UTM5, UTM10, and UTM25 includ

Page 258 - Application Access

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections330ProSecure Unified Threat Management (UTM) Appliance 3. In the IKE SA Parameters se

Page 259 - • Application

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections331 ProSecure Unified Threat Management (UTM) ApplianceFigure 198. 3. Select the Ena

Page 260

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections332ProSecure Unified Threat Management (UTM) Appliance  To enable the PPTP server an

Page 261

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections333 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your se

Page 262

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections334ProSecure Unified Threat Management (UTM) Appliance The List of PPTP Active Users

Page 263 - Figure 148

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections335 ProSecure Unified Threat Management (UTM) ApplianceFigure 201. 2. Enter the sett

Page 264 - Virtual Private Networking

Virtual Private Networking Using IPSec, PPTP, or L2TP Connections336ProSecure Unified Threat Management (UTM) Appliance View the Active L2TP Users To

Page 265

33788. Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically to provide remote acc

Page 266 - Configurations

Virtual Private Networking Using SSL Connections338ProSecure Unified Threat Management (UTM) Appliance • SSL port forwarding. Like an SSL VPN tunnel,

Page 267 - Figure 152

Virtual Private Networking Using SSL Connections339 ProSecure Unified Threat Management (UTM) Appliance2. Select the SSL VPN Wizard radio button.3. Cl

Page 268 - Figure 153

Introduction34ProSecure Unified Threat Management (UTM) Appliance Viewed from left to right, the rear panel of the UTM5, UTM10, and UTM25 contains the

Page 269

Virtual Private Networking Using SSL Connections340ProSecure Unified Threat Management (UTM) Appliance WARNING:Do not enter an existing portal layout

Page 270 - Figure 154

Virtual Private Networking Using SSL Connections341 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V

Page 271 - Figure 156

Virtual Private Networking Using SSL Connections342ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 2 of 6 (Domain Settings)Fig

Page 272 - Figure 157

Virtual Private Networking Using SSL Connections343 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing domain name in

Page 273

Virtual Private Networking Using SSL Connections344ProSecure Unified Threat Management (UTM) Appliance Authentication Type(continued)• WIKID-CHAP. WiK

Page 274

Virtual Private Networking Using SSL Connections345 ProSecure Unified Threat Management (UTM) AppliancePortal The portal that you selected on the firs

Page 275 - Figure 158

Virtual Private Networking Using SSL Connections346ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V

Page 276 - Figure 159

Virtual Private Networking Using SSL Connections347 ProSecure Unified Threat Management (UTM) ApplianceSSL VPN Wizard Step 3 of 6 (User Settings)Figur

Page 277 - Figure 161

Virtual Private Networking Using SSL Connections348ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V

Page 278 - Figure 163

Virtual Private Networking Using SSL Connections349 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing route for a VP

Page 279

Introduction35 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM9S and UTM25SThe rear panel of the UTM9S and UTM25S includes the cable

Page 280 - Figure 164

Virtual Private Networking Using SSL Connections350ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 5 of 6 (Port Forwarding)Not

Page 281 - Figure 166

Virtual Private Networking Using SSL Connections351 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V

Page 282 - Figure 167

Virtual Private Networking Using SSL Connections352ProSecure Unified Threat Management (UTM) Appliance Figure 209.

Page 283 - Figure 168

Virtual Private Networking Using SSL Connections353 ProSecure Unified Threat Management (UTM) ApplianceClick Apply to save your settings. If the setti

Page 284

Virtual Private Networking Using SSL Connections354ProSecure Unified Threat Management (UTM) Appliance Figure 211. 3. To verify access, enter the use

Page 285 - Figure 169

Virtual Private Networking Using SSL Connections355 ProSecure Unified Threat Management (UTM) ApplianceFigure 212. Figure 213. A portal screen displ

Page 286 - Figure 170

Virtual Private Networking Using SSL Connections356ProSecure Unified Threat Management (UTM) Appliance Note: The first time that a user attempts to co

Page 287 - Information

Virtual Private Networking Using SSL Connections357 ProSecure Unified Threat Management (UTM) ApplianceView the UTM SSL VPN Log To query the SSL VPN

Page 288 - Figure 175

Virtual Private Networking Using SSL Connections358ProSecure Unified Threat Management (UTM) Appliance 2. Create authentication domains, user groups,

Page 289 - Figure 177

Virtual Private Networking Using SSL Connections359 ProSecure Unified Threat Management (UTM) ApplianceManually Create or Modify the Portal LayoutThe

Page 290 - View the UTM IPSec VPN Log

Introduction36ProSecure Unified Threat Management (UTM) Appliance Bottom Panels with Product LabelsThe product label on the bottom of the UTM’s enclos

Page 291 - Figure 178

Virtual Private Networking Using SSL Connections360ProSecure Unified Threat Management (UTM) Appliance The List of Layouts table displays the followin

Page 292 - Manage IKE Policies

Virtual Private Networking Using SSL Connections361 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and select the check box

Page 293 - Figure 179

Virtual Private Networking Using SSL Connections362ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new p

Page 294

Virtual Private Networking Using SSL Connections363 ProSecure Unified Threat Management (UTM) ApplianceConfigure Applications for Port ForwardingPort

Page 295 - Figure 180

Virtual Private Networking Using SSL Connections364ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new applicat

Page 296

Virtual Private Networking Using SSL Connections365 ProSecure Unified Threat Management (UTM) Appliance2. In the Add New Host Name for Port Forwarding

Page 297

Virtual Private Networking Using SSL Connections366ProSecure Unified Threat Management (UTM) Appliance Configure the Client IP Address RangeFirst dete

Page 298

Virtual Private Networking Using SSL Connections367 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings. VPN tunne

Page 299 -  To edit an IKE policy:

Virtual Private Networking Using SSL Connections368ProSecure Unified Threat Management (UTM) Appliance  To change the specifications of an existing r

Page 300 - Manage VPN Policies

Virtual Private Networking Using SSL Connections369 ProSecure Unified Threat Management (UTM) ApplianceUse Network Resource Objects to Simplify Polici

Page 301 - Figure 181

Introduction37 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25:Figure 14. The following

Page 302

Virtual Private Networking Using SSL Connections370ProSecure Unified Threat Management (UTM) Appliance  To delete one or more network resources:1. Se

Page 303 - Figure 182

Virtual Private Networking Using SSL Connections371 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new c

Page 304

Virtual Private Networking Using SSL Connections372ProSecure Unified Threat Management (UTM) Appliance For example, assume the following global policy

Page 305

Virtual Private Networking Using SSL Connections373 ProSecure Unified Threat Management (UTM) ApplianceView Policies To view the existing policies:1.

Page 306

Virtual Private Networking Using SSL Connections374ProSecure Unified Threat Management (UTM) Appliance .Figure 224. 3. Select the radio buttons, comp

Page 307

Virtual Private Networking Using SSL Connections375 ProSecure Unified Threat Management (UTM) ApplianceApply Policy For(continued)Network ResourcePoli

Page 308 -  To edit a VPN policy:

Virtual Private Networking Using SSL Connections376ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The polic

Page 309

Virtual Private Networking Using SSL Connections377 ProSecure Unified Threat Management (UTM) Appliance To delete one or more SSL VPN policies:1. On

Page 310 - User Database Configuration

37899. Manage Users, Authentication, and VPN CertificatesThis chapter describes how to manage users, authentication, and security certificates for I

Page 311

Manage Users, Authentication, and VPN Certificates379 ProSecure Unified Threat Management (UTM) ApplianceThe UTM supports security policies that are b

Page 312 - Mode Config Operation

Introduction38ProSecure Unified Threat Management (UTM) Appliance The following figure shows the product label for the UTM150:Figure 16. The following

Page 313 - Figure 184

Manage Users, Authentication, and VPN Certificates380ProSecure Unified Threat Management (UTM) Appliance Configure Authentication Domains, Groups, and

Page 314 - Figure 185

Manage Users, Authentication, and VPN Certificates381 ProSecure Unified Threat Management (UTM) ApplianceFigure 225. Users with Special Access Privile

Page 315 - Config Records table

Manage Users, Authentication, and VPN Certificates382ProSecure Unified Threat Management (UTM) Appliance Figure 226. The User Portal Login screen disp

Page 316 - Figure 186

Manage Users, Authentication, and VPN Certificates383 ProSecure Unified Threat Management (UTM) ApplianceFigure 227. If you do not use the DC agent in

Page 317

Manage Users, Authentication, and VPN Certificates384ProSecure Unified Threat Management (UTM) Appliance For information about how to configure and mo

Page 318

Manage Users, Authentication, and VPN Certificates385 ProSecure Unified Threat Management (UTM) Appliance• An OU is created in the root node (for exam

Page 319

Manage Users, Authentication, and VPN Certificates386ProSecure Unified Threat Management (UTM) Appliance Figure 228. 4. To verify Jamie Hanson’s user

Page 320 - Figure 187

Manage Users, Authentication, and VPN Certificates387 ProSecure Unified Threat Management (UTM) Appliance6. Select Users > Domains. 7. Click Add. T

Page 321 - Figure 189

Manage Users, Authentication, and VPN Certificates388ProSecure Unified Threat Management (UTM) Appliance Figure 231. 14. Complete the remaining field

Page 322 - Figure 190

Manage Users, Authentication, and VPN Certificates389 ProSecure Unified Threat Management (UTM) ApplianceThe List of Domains table displays the domain

Page 323

Introduction39 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25S:Figure 18. Choose a Loca

Page 324 - Figure 191

Manage Users, Authentication, and VPN Certificates390ProSecure Unified Threat Management (UTM) Appliance 3. Enter the settings as explained in the fol

Page 325 - Figure 192

Manage Users, Authentication, and VPN Certificates391 ProSecure Unified Threat Management (UTM) ApplianceAuthentication Type(continued)Note: If you se

Page 326 - Figure 194

Manage Users, Authentication, and VPN Certificates392ProSecure Unified Threat Management (UTM) Appliance Authentication Secret All RADIUS, WiKID, and

Page 327 - Figure 195

Manage Users, Authentication, and VPN Certificates393 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The dom

Page 328 - Configure Keep-Alives

Manage Users, Authentication, and VPN Certificates394ProSecure Unified Threat Management (UTM) Appliance  To delete one or more domains:1. In the Lis

Page 329 - Configure Dead Peer Detection

Manage Users, Authentication, and VPN Certificates395 ProSecure Unified Threat Management (UTM) ApplianceCreate and Delete Groups To create a VPN gro

Page 330

Manage Users, Authentication, and VPN Certificates396ProSecure Unified Threat Management (UTM) Appliance 2. In the Add New Group section of the screen

Page 331 - Configure the PPTP Server

Manage Users, Authentication, and VPN Certificates397 ProSecure Unified Threat Management (UTM) ApplianceFigure 235. Except for groups that are assoc

Page 332 - Figure 199

Manage Users, Authentication, and VPN Certificates398ProSecure Unified Threat Management (UTM) Appliance Figure 236. 2. Under the Custom Groups table

Page 333 - View the Active PPTP Users

Manage Users, Authentication, and VPN Certificates399 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and make your selectio

Page 334 - Configure the L2TP Server

4ProSecure Unified Threat Management (UTM) Appliance 202-10780-01 1.0 September 2011 • Added the UTM9S with the following major new features:- xDSL m

Page 335 - Figure 201

Introduction40ProSecure Unified Threat Management (UTM) Appliance Use the Rack-Mounting KitUse the mounting kit for the UTM to install the appliance i

Page 336 - View the Active L2TP Users

Manage Users, Authentication, and VPN Certificates400ProSecure Unified Threat Management (UTM) Appliance 4. After you have specified all members of th

Page 337 - Using SSL Connections

Manage Users, Authentication, and VPN Certificates401 ProSecure Unified Threat Management (UTM) ApplianceConfigure User AccountsThe UTM supports both

Page 338 - Figure 203

Manage Users, Authentication, and VPN Certificates402ProSecure Unified Threat Management (UTM) Appliance Figure 238. The List of Users table displays

Page 339 - Figure 204

Manage Users, Authentication, and VPN Certificates403 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the fol

Page 340

Manage Users, Authentication, and VPN Certificates404ProSecure Unified Threat Management (UTM) Appliance Set User Login PoliciesYou can restrict the a

Page 341

Manage Users, Authentication, and VPN Certificates405 ProSecure Unified Threat Management (UTM) ApplianceConfigure Login Restrictions Based on IP Addr

Page 342 - Figure 205

Manage Users, Authentication, and VPN Certificates406ProSecure Unified Threat Management (UTM) Appliance 6. In the Add Defined Addresses section of th

Page 343 - WARNING:

Manage Users, Authentication, and VPN Certificates407 ProSecure Unified Threat Management (UTM) ApplianceFigure 242. 4. In the Defined Browsers Statu

Page 344

Manage Users, Authentication, and VPN Certificates408ProSecure Unified Threat Management (UTM) Appliance Change Passwords and Other User SettingsFor a

Page 345

Manage Users, Authentication, and VPN Certificates409 ProSecure Unified Threat Management (UTM) Appliance3. Modify the settings as explained in the fo

Page 346

4122. Use the Setup Wizard to Provision the UTM in Your NetworkThis chapter explains how to log in to the UTM and use the web management interface,

Page 347 - Figure 206

Manage Users, Authentication, and VPN Certificates410ProSecure Unified Threat Management (UTM) Appliance Note: The DC agent does not function with LDA

Page 348 - Figure 207

Manage Users, Authentication, and VPN Certificates411 ProSecure Unified Threat Management (UTM) Appliance To download ProSecure DC Agent software and

Page 349

Manage Users, Authentication, and VPN Certificates412ProSecure Unified Threat Management (UTM) Appliance 4. On the DC Agent screen (see Figure 244 on

Page 350 - Figure 208

Manage Users, Authentication, and VPN Certificates413 ProSecure Unified Threat Management (UTM) Applianceb. Click the Add table button to add a domain

Page 351

Manage Users, Authentication, and VPN Certificates414ProSecure Unified Threat Management (UTM) Appliance 2. Add a DC agent on the UTM50:a. Select User

Page 352 - Figure 209

Manage Users, Authentication, and VPN Certificates415 ProSecure Unified Threat Management (UTM) ApplianceConfigure RADIUS VLANsYou can use a RADIUS vi

Page 353 - Access the New SSL VPN Portal

Manage Users, Authentication, and VPN Certificates416ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new VLAN i

Page 354 - Figure 211

Manage Users, Authentication, and VPN Certificates417 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save the session settings.5

Page 355 - Figure 213

Manage Users, Authentication, and VPN Certificates418ProSecure Unified Threat Management (UTM) Appliance  To view all or selected users:1. On the Act

Page 356 - Figure 214

Manage Users, Authentication, and VPN Certificates419 ProSecure Unified Threat Management (UTM) ApplianceThe List of Users table displays the followin

Page 357 - View the UTM SSL VPN Log

Use the Setup Wizard to Provision the UTM in Your Network42ProSecure Unified Threat Management (UTM) Appliance 4. Verify the installation. See Verify

Page 358

Manage Users, Authentication, and VPN Certificates420ProSecure Unified Threat Management (UTM) Appliance On the UTM, the uploaded digital certificate

Page 359 - Figure 216

Manage Users, Authentication, and VPN Certificates421 ProSecure Unified Threat Management (UTM) Appliance• Active Self Certificates table. Contains th

Page 360 - Figure 217

Manage Users, Authentication, and VPN Certificates422ProSecure Unified Threat Management (UTM) Appliance  To upload a digital certificate of a truste

Page 361

Manage Users, Authentication, and VPN Certificates423 ProSecure Unified Threat Management (UTM) ApplianceGenerate a CSR and Obtain a Self-Signed Certi

Page 362 -  To edit a portal layout:

Manage Users, Authentication, and VPN Certificates424ProSecure Unified Threat Management (UTM) Appliance 2. In the Generate Self Certificate Request s

Page 363 - Add Servers and Port Numbers

Manage Users, Authentication, and VPN Certificates425 ProSecure Unified Threat Management (UTM) ApplianceFigure 256. 5. Copy the contents of the Data

Page 364 - Add a Host Name

Manage Users, Authentication, and VPN Certificates426ProSecure Unified Threat Management (UTM) Appliance  To delete one or more SCRs:1. In the Self C

Page 365 - Configure the SSL VPN Client

Manage Users, Authentication, and VPN Certificates427 ProSecure Unified Threat Management (UTM) ApplianceThe Certificate Revocation Lists (CRL) table

Page 366 - Figure 219

4281010. Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its performance and the system m

Page 367

Network and System Management429 ProSecure Unified Threat Management (UTM) Appliance- Auto-rollover mode (multiple WAN port models only). 1000 Mbps (o

Page 368 - Figure 220

Use the Setup Wizard to Provision the UTM in Your Network43 ProSecure Unified Threat Management (UTM) ApplianceFigure 20. 3. In the User Name field,

Page 369 - Add New Network Resources

Network and System Management430ProSecure Unified Threat Management (UTM) Appliance The following section summarizes the various criteria that you can

Page 370 - Figure 222

Network and System Management431 ProSecure Unified Threat Management (UTM) Appliance• QoS profile. You can define QoS profiles and then apply them to

Page 371

Network and System Management432ProSecure Unified Threat Management (UTM) Appliance - Web services blocking. You can block web services such as instan

Page 372 - Global Default Policy

Network and System Management433 ProSecure Unified Threat Management (UTM) ApplianceEach rule lets you specify the desired action for the connections

Page 373 - Add a Policy

Network and System Management434ProSecure Unified Threat Management (UTM) Appliance • Users allowed. You can specify that the rule applies to individu

Page 374 - Figure 224

Network and System Management435 ProSecure Unified Threat Management (UTM) ApplianceConfigure Exposed HostsSpecifying an exposed host allows you to se

Page 375

Network and System Management436ProSecure Unified Threat Management (UTM) Appliance Monitoring Tools for Traffic ManagementThe UTM includes several to

Page 376 -  To edit an SSL VPN policy:

Network and System Management437 ProSecure Unified Threat Management (UTM) Appliance2. In the Action column of the List of Users table, click the Edit

Page 377 - For More SSL VPN Information

Network and System Management438ProSecure Unified Threat Management (UTM) Appliance Note: For enhanced security, restrict access to as few external IP

Page 378 - Certificates

Network and System Management439 ProSecure Unified Threat Management (UTM) Appliance2. Select one of the following radio buttons:• Yes. Enable HTTPS r

Page 379

Use the Setup Wizard to Provision the UTM in Your Network44ProSecure Unified Threat Management (UTM) Appliance Figure 21. Web Management Interface Men

Page 380 - Login Portals

Network and System Management440ProSecure Unified Threat Management (UTM) Appliance Note: If you are unable to connect remotely to the UTM after enabl

Page 381 - Figure 225

Network and System Management441 ProSecure Unified Threat Management (UTM) ApplianceFigure 261.

Page 382 - Figure 226

Network and System Management442ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:3. Click

Page 383 - Figure 227

Network and System Management443 ProSecure Unified Threat Management (UTM) Appliance To configure the SNMPv3 settings:1. Select Administration > S

Page 384 - How an Active Directory Works

Network and System Management444ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The SNMPv3 user profile is a

Page 385

Network and System Management445 ProSecure Unified Threat Management (UTM) ApplianceThe SNMPv3 Settings table shows the following columns:• User Name.

Page 386 - 5. Log in to the UTM

Network and System Management446ProSecure Unified Threat Management (UTM) Appliance Figure 263. Back Up SettingsThe backup feature saves all UTM setti

Page 387 - Figure 230

Network and System Management447 ProSecure Unified Threat Management (UTM) ApplianceRestore SettingsWARNING:Restore only settings that were backed up

Page 388 - Configure Domains

Network and System Management448ProSecure Unified Threat Management (UTM) Appliance WARNING:When you press the hardware Factory Defaults reset button

Page 389 - Figure 233

Network and System Management449 ProSecure Unified Threat Management (UTM) ApplianceFigure 264. Firmware screen, available versionsThe Firmware Reboo

Page 390

Use the Setup Wizard to Provision the UTM in Your Network45 ProSecure Unified Threat Management (UTM) ApplianceFigure 22. The web management interface

Page 391

Network and System Management450ProSecure Unified Threat Management (UTM) Appliance  To upgrade the UTM’s firmware directly from an update server and

Page 392

Network and System Management451 ProSecure Unified Threat Management (UTM) ApplianceThe UTM reboots automatically. During the reboot process, the Firm

Page 393

Network and System Management452ProSecure Unified Threat Management (UTM) Appliance  To upgrade the UTM’s firmware from a downloaded file and reboot

Page 394 - Configure Groups

Network and System Management453 ProSecure Unified Threat Management (UTM) Appliance3. (Optional) To install the new firmware version and reboot the U

Page 395 - Create and Delete Groups

Network and System Management454ProSecure Unified Threat Management (UTM) Appliance Reboot without Changing the Firmware To reboot the UTM without ch

Page 396 - Edit Groups

Network and System Management455 ProSecure Unified Threat Management (UTM) ApplianceFigure 267. The Info section onscreen shows the following informat

Page 397 - Configure Custom Groups

Network and System Management456ProSecure Unified Threat Management (UTM) Appliance Configure Automatic Update and Frequency Settings To configure th

Page 398 - Figure 237

Network and System Management457 ProSecure Unified Threat Management (UTM) Appliance To set time, date, and NTP servers:1. Select Administration >

Page 399

Network and System Management458ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: If you select the defau

Page 400

Network and System Management459 ProSecure Unified Threat Management (UTM) ApplianceLog StorageAfter you have integrated a ReadyNAS with the UTM—wheth

Page 401 - Configure User Accounts

Use the Setup Wizard to Provision the UTM in Your Network46ProSecure Unified Threat Management (UTM) Appliance • Back. Go to the previous screen (for

Page 402 - Figure 239

Network and System Management460ProSecure Unified Threat Management (UTM) Appliance Figure 269. 2. To connect to the ReadyNAS, select the Yes radio b

Page 403

Network and System Management461 ProSecure Unified Threat Management (UTM) ApplianceFigure 270. 2. To enable the UTM to quarantine files, select the

Page 404 - Set User Login Policies

4621111. Monitor System Access and PerformanceThis chapter describes the system-monitoring features of the UTM. You can be alerted to important even

Page 405 - Figure 241

Monitor System Access and Performance463 ProSecure Unified Threat Management (UTM) Appliance To monitor traffic limits on each of the WAN ports, and

Page 406

Monitor System Access and Performance464ProSecure Unified Threat Management (UTM) Appliance Table 114. WAN traffic meter settingsSetting DescriptionE

Page 407 - Figure 242

Monitor System Access and Performance465 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.4. For the multiple W

Page 408 - Figure 243

Monitor System Access and Performance466ProSecure Unified Threat Management (UTM) Appliance Configure Logging, Alerts, and Event Notifications• Config

Page 409 - DC Agent

Monitor System Access and Performance467 ProSecure Unified Threat Management (UTM) ApplianceFigure 273. 6. Enter the settings as explained in the fol

Page 410

Monitor System Access and Performance468ProSecure Unified Threat Management (UTM) Appliance  To configure and activate logs:1. Select Monitoring >

Page 411 - Figure 245

Monitor System Access and Performance469 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:

Page 412 -  To edit a DC agent:

Use the Setup Wizard to Provision the UTM in Your Network47 ProSecure Unified Threat Management (UTM) ApplianceUse the Setup Wizard to Perform the Ini

Page 413 - Figure 246

Monitor System Access and Performance470ProSecure Unified Threat Management (UTM) Appliance Enable (continued)Select Logs to Send(continued)• Service

Page 414 - Figure 248

Monitor System Access and Performance471 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings, or click Clear Log I

Page 415 - Configure RADIUS VLANs

Monitor System Access and Performance472ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save the settings. To change the remote

Page 416 - Figure 250

Monitor System Access and Performance473 ProSecure Unified Threat Management (UTM) Appliance To specify the syslog server that is connected to Gatewa

Page 417 - View and Log Out Active Users

Monitor System Access and Performance474ProSecure Unified Threat Management (UTM) Appliance Figure 275. 2. Enter the settings as explained in the fol

Page 418 - Figure 252

Monitor System Access and Performance475 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Enable Malware Alerts

Page 419

Monitor System Access and Performance476ProSecure Unified Threat Management (UTM) Appliance Configure and Activate Firewall LogsYou can configure the

Page 420 - VPN Certificates Screen

Monitor System Access and Performance477 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Monitor Real-Time Tra

Page 421 - Manage CA Certificates

Monitor System Access and Performance478ProSecure Unified Threat Management (UTM) Appliance Figure 277. Dashboard, screen 1 of 3To clear the statistic

Page 422 - Figure 254

Monitor System Access and Performance479 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro

Page 423

Use the Setup Wizard to Provision the UTM in Your Network48ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 1 of 10: LAN Settings

Page 424

Monitor System Access and Performance480ProSecure Unified Threat Management (UTM) Appliance Figure 278. Dashboard, screen 2 of 3Threats (Counts)This i

Page 425 - Figure 256

Monitor System Access and Performance481 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Most Recent

Page 426 -  To delete one or more SCRs:

Monitor System Access and Performance482ProSecure Unified Threat Management (UTM) Appliance Figure 279. Dashboard, screen 3 of 3The following table ex

Page 427 -  To delete one or more CRLs:

Monitor System Access and Performance483 ProSecure Unified Threat Management (UTM) ApplianceMonitor Application Use in Real TimeIf you have enabled ap

Page 428 - Network and System Management

Monitor System Access and Performance484ProSecure Unified Threat Management (UTM) Appliance Figure 280. Line chart iconPie chart icon

Page 429 - Features That Reduce Traffic

Monitor System Access and Performance485 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro

Page 430

Monitor System Access and Performance486ProSecure Unified Threat Management (UTM) Appliance View Status Screens• View the System Status• View the Acti

Page 431 - Content Filtering

Monitor System Access and Performance487 ProSecure Unified Threat Management (UTM) ApplianceView the System Status ScreenTo view the System Status scr

Page 432 - Source MAC Filtering

Monitor System Access and Performance488ProSecure Unified Threat Management (UTM) Appliance View the Network Status ScreenTo view the Network Status s

Page 433

Monitor System Access and Performance489 ProSecure Unified Threat Management (UTM) Applianceavailable wireless access point, and has a Wireless Statis

Page 434 - Configure the DMZ Port

Use the Setup Wizard to Provision the UTM in Your Network49 ProSecure Unified Threat Management (UTM) ApplianceTable 4. Setup Wizard Step 1: LAN Sett

Page 435 - Assign Bandwidth Profiles

Monitor System Access and Performance490ProSecure Unified Threat Management (UTM) Appliance View the Router Statistics Screen To view the Router Stat

Page 436 - System Management

Monitor System Access and Performance491 ProSecure Unified Threat Management (UTM) ApplianceTo change the poll interval period, enter a new value in t

Page 437 - Figure 259

Monitor System Access and Performance492ProSecure Unified Threat Management (UTM) Appliance The following table explains the fields of the Wireless St

Page 438 - Figure 260

Monitor System Access and Performance493 ProSecure Unified Threat Management (UTM) ApplianceView the Detailed Status ScreenTo view the Detailed Status

Page 439

Monitor System Access and Performance494ProSecure Unified Threat Management (UTM) Appliance Figure 287. Detailed Status screen sections that are speci

Page 440

Monitor System Access and Performance495 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Detailed St

Page 441 - Figure 261

Monitor System Access and Performance496ProSecure Unified Threat Management (UTM) Appliance Firmware Version (UTM9S and UTM25S only)The firmware on th

Page 442

Monitor System Access and Performance497 ProSecure Unified Threat Management (UTM) ApplianceMAC Address For the WAN or xDSL ports, this field displays

Page 443 - Table 109. SNMPv3 settings

Monitor System Access and Performance498ProSecure Unified Threat Management (UTM) Appliance View the VLAN Status ScreenThe VLAN Status screen displays

Page 444 - SNMPv3 settings (continued)

Monitor System Access and Performance499 ProSecure Unified Threat Management (UTM) ApplianceView the xDSL Statistics Screen (UTM9S and UTM25S Only)To

Page 445 - Manage the Configuration File

5ContentsChapter 1 IntroductionWhat Is the ProSecure Unified Threat Management (UTM) Appliance? . .15Key Features and Capabilities . . . . . . . . . .

Page 446 - Back Up Settings

Use the Setup Wizard to Provision the UTM in Your Network50ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server(continued)Primary DN

Page 447 - Restore Settings

Monitor System Access and Performance500ProSecure Unified Threat Management (UTM) Appliance View the VPN Tunnel Connection StatusTo review the status

Page 448 - Update the Firmware

Monitor System Access and Performance501 ProSecure Unified Threat Management (UTM) ApplianceFigure 292. The active user’s user name, group, and IP add

Page 449

Monitor System Access and Performance502ProSecure Unified Threat Management (UTM) Appliance The default poll interval is 5 seconds. To change the poll

Page 450

Monitor System Access and Performance503 ProSecure Unified Threat Management (UTM) ApplianceFigure 295. 2. Select the Status option arrow in the uppe

Page 451

Monitor System Access and Performance504ProSecure Unified Threat Management (UTM) Appliance View the WAN, xDSL, or USB Port StatusYou can view the sta

Page 452

Monitor System Access and Performance505 ProSecure Unified Threat Management (UTM) ApplianceDepending on the type of connections, any of the following

Page 453

Monitor System Access and Performance506ProSecure Unified Threat Management (UTM) Appliance Figure 298. 2. Select the LAN Groups submenu tab. The LAN

Page 454

Monitor System Access and Performance507 ProSecure Unified Threat Management (UTM) Appliancemanually to add a meaningful name). If the computer or dev

Page 455 - Figure 267

Monitor System Access and Performance508ProSecure Unified Threat Management (UTM) Appliance Overview of the LogsThe UTM generates logs that provide de

Page 456

Monitor System Access and Performance509 ProSecure Unified Threat Management (UTM) ApplianceYou can query and generate each type of log separately and

Page 457 - Figure 268

Use the Setup Wizard to Provision the UTM in Your Network51 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t

Page 458 - Settings

Monitor System Access and Performance510ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:

Page 459 - Connect to a ReadyNAS

Monitor System Access and Performance511 ProSecure Unified Threat Management (UTM) ApplianceView All Select one of the following radio buttons:• View

Page 460 - Figure 269

Monitor System Access and Performance512ProSecure Unified Threat Management (UTM) Appliance Search Criteria(continued)Category or CategoriesFrom the d

Page 461 - Figure 270

Monitor System Access and Performance513 ProSecure Unified Threat Management (UTM) Appliance3. Click one of the following action buttons:• Search. Que

Page 462 - Performance

Monitor System Access and Performance514ProSecure Unified Threat Management (UTM) Appliance Log ManagementGenerated logs take up space and resources o

Page 463 - Figure 271

Monitor System Access and Performance515 ProSecure Unified Threat Management (UTM) ApplianceQuery the Quarantined Logs To query the quarantine logs:1

Page 464

Monitor System Access and Performance516ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:

Page 465 - Figure 272

Monitor System Access and Performance517 ProSecure Unified Threat Management (UTM) ApplianceView and Manage the Quarantined Spam TableWhen you query t

Page 466

Monitor System Access and Performance518ProSecure Unified Threat Management (UTM) Appliance After you have selected one or more table entries, take on

Page 467 - Figure 273

Monitor System Access and Performance519 ProSecure Unified Threat Management (UTM) Appliance• Client IP. The client IP address from which the spyware

Page 468 - Figure 274

Use the Setup Wizard to Provision the UTM in Your Network52ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the

Page 469

Monitor System Access and Performance520ProSecure Unified Threat Management (UTM) Appliance 2. Click the Check your quarantined mail link. The followi

Page 470

Monitor System Access and Performance521 ProSecure Unified Threat Management (UTM) ApplianceYou can view the reports onscreen, download them to your c

Page 471 - Configure Gateway 1 at Site 1

Monitor System Access and Performance522ProSecure Unified Threat Management (UTM) Appliance 2. Select the Enable Application Session Monitoring check

Page 472 - Configure Gateway 2 at Site 2

Monitor System Access and Performance523 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:

Page 473

Monitor System Access and Performance524ProSecure Unified Threat Management (UTM) Appliance 3. The next step depends on whether you want to view the r

Page 474 - Figure 275

Monitor System Access and Performance525 ProSecure Unified Threat Management (UTM) ApplianceFigure 309. Report, screen 2 of 4Note: For information ab

Page 475

Monitor System Access and Performance526ProSecure Unified Threat Management (UTM) Appliance URL Filtering by Time For the HTTPS and HTTP protocols sep

Page 476 - Figure 276

Monitor System Access and Performance527 ProSecure Unified Threat Management (UTM) ApplianceTop n Categories By Request For all web server protocols c

Page 477

Monitor System Access and Performance528ProSecure Unified Threat Management (UTM) Appliance Top n Applications by BandwidthA chart and a table with th

Page 478

Monitor System Access and Performance529 ProSecure Unified Threat Management (UTM) ApplianceSchedule, Email, and Manage Reports To schedule automatic

Page 479 -  To set the poll interval:

Use the Setup Wizard to Provision the UTM in Your Network53 ProSecure Unified Threat Management (UTM) ApplianceAustria (PPTP)(continued)My IP Address

Page 480

Monitor System Access and Performance530ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings in the Schedule Reports section as e

Page 481 - Dashboard screen:

Monitor System Access and Performance531 ProSecure Unified Threat Management (UTM) ApplianceFigure 311. Report, screen 4 of 4The Report History sectio

Page 482

Monitor System Access and Performance532ProSecure Unified Threat Management (UTM) Appliance To display the Diagnostics screen, select Monitoring >

Page 483

Monitor System Access and Performance533 ProSecure Unified Threat Management (UTM) ApplianceTrace a RouteA traceroute lists all routers between the so

Page 484 - Figure 280

Monitor System Access and Performance534ProSecure Unified Threat Management (UTM) Appliance out which applications are using the most bandwidth, which

Page 485

Monitor System Access and Performance535 ProSecure Unified Threat Management (UTM) ApplianceFigure 314. Diagnostics, screen 3 of 4Gather Important Log

Page 486 - View Status Screens

Monitor System Access and Performance536ProSecure Unified Threat Management (UTM) Appliance Perform Maintenance on the USB Device, Reboot the UTM,or S

Page 487 - View the System Status Screen

Monitor System Access and Performance537 ProSecure Unified Threat Management (UTM) ApplianceNote: Rebooting breaks any existing connections either to

Page 488

5381212. Troubleshoot and Use Online SupportThis chapter provides troubleshooting tips and information for the UTM. After each problem description,

Page 489 - Network Status screen:

Troubleshoot and Use Online Support539 ProSecure Unified Threat Management (UTM) ApplianceBasic Functioning• Verify the Correct Sequence of Events at

Page 490 - Figure 284

Use the Setup Wizard to Provision the UTM in Your Network54ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Page 491 - Figure 285

Troubleshoot and Use Online Support540ProSecure Unified Threat Management (UTM) Appliance  If all LEDs are still on more than several minutes minute

Page 492

Troubleshoot and Use Online Support541 ProSecure Unified Threat Management (UTM) Appliance• Make sure that you are using the correct login information

Page 493 - Figure 286

Troubleshoot and Use Online Support542ProSecure Unified Threat Management (UTM) Appliance  To check the WAN IP address: 1. Launch your browser and na

Page 494

Troubleshoot and Use Online Support543 ProSecure Unified Threat Management (UTM) ApplianceIf your UTM can obtain an IP address, but an attached comput

Page 495

Troubleshoot and Use Online Support544ProSecure Unified Threat Management (UTM) Appliance - Check that the corresponding Link LEDs are on for your

Page 496

Troubleshoot and Use Online Support545 ProSecure Unified Threat Management (UTM) ApplianceRestore the Default Configuration and PasswordTo reset the U

Page 497

Troubleshoot and Use Online Support546ProSecure Unified Threat Management (UTM) Appliance Problems with Date and TimeThe System Date & Time screen

Page 498 - View the VLAN Status Screen

Troubleshoot and Use Online Support547 ProSecure Unified Threat Management (UTM) ApplianceFigure 317. 2. In the Support Key field, enter the support

Page 499 - View the Active VPN Users

Troubleshoot and Use Online Support548ProSecure Unified Threat Management (UTM) Appliance Figure 318. 2. Enter the settings as explained in the follo

Page 500 - Figure 291

549AA. xDSL Network Module for the UTM9S and UTM25SThis appendix describes how to configure the DSL interfaces of the NMSDSLA and NMSDSLB network mo

Page 501 - Figure 293

Use the Setup Wizard to Provision the UTM in Your Network55 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the

Page 502 - Figure 294

xDSL Network Module for the UTM9S and UTM25S550ProSecure Unified Threat Management (UTM) AppliancexDSL Network Module Configuration TasksGenerally, si

Page 503 - Figure 296

xDSL Network Module for the UTM9S and UTM25S551ProSecure Unified Threat Management (UTM) Appliance To configure the xDSL settings:1. Select Network C

Page 504 - Figure 297

xDSL Network Module for the UTM9S and UTM25S552ProSecure Unified Threat Management (UTM) ApplianceFigure 321. 4. Either click Auto Detect or, if you

Page 505 - View Attached Devices

xDSL Network Module for the UTM9S and UTM25S553ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Automatically D

Page 506 - Figure 299

xDSL Network Module for the UTM9S and UTM25S554ProSecure Unified Threat Management (UTM) ApplianceYou can set the failure detection method for the DSL

Page 507 - Query and Manage the Logs

xDSL Network Module for the UTM9S and UTM25S555ProSecure Unified Threat Management (UTM) Appliance3. Click the Auto Detect button at the bottom of the

Page 508 - Overview of the Logs

xDSL Network Module for the UTM9S and UTM25S556ProSecure Unified Threat Management (UTM) ApplianceFigure 324. Note: The Connection Status screen shou

Page 509 - Query and Download Logs

xDSL Network Module for the UTM9S and UTM25S557ProSecure Unified Threat Management (UTM) ApplianceFigure 325. 2. Click the Edit button in the Action

Page 510

xDSL Network Module for the UTM9S and UTM25S558ProSecure Unified Threat Management (UTM) Appliance6. If your connection is Point-to-Point Protocol ove

Page 511

xDSL Network Module for the UTM9S and UTM25S559ProSecure Unified Threat Management (UTM) Appliance8. In the Domain Name Server (DNS) Servers section o

Page 512

Use the Setup Wizard to Provision the UTM in Your Network56ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the

Page 513

xDSL Network Module for the UTM9S and UTM25S560ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the SLOT-x ISP

Page 514 - Log Management

xDSL Network Module for the UTM9S and UTM25S561ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the manual ISP configuration is

Page 515 - Query the Quarantined Logs

xDSL Network Module for the UTM9S and UTM25S562ProSecure Unified Threat Management (UTM) Appliance• Primary WAN mode. The DSL interface (or a WAN inte

Page 516

xDSL Network Module for the UTM9S and UTM25S563ProSecure Unified Threat Management (UTM) ApplianceWARNING:Changing the WAN mode from classical routing

Page 517 - Figure 303

xDSL Network Module for the UTM9S and UTM25S564ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM9S or UTM25S is configured in auto-rollo

Page 518 - Figure 304

xDSL Network Module for the UTM9S and UTM25S565ProSecure Unified Threat Management (UTM) Applianced. From the corresponding drop-down list on the righ

Page 519 - Spam Reports for End Users

xDSL Network Module for the UTM9S and UTM25S566ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary interface fails, the default

Page 520 - Figure 306

xDSL Network Module for the UTM9S and UTM25S567ProSecure Unified Threat Management (UTM) Appliance• Continuity of source IP address for secure connect

Page 521 - Figure 307

xDSL Network Module for the UTM9S and UTM25S568ProSecure Unified Threat Management (UTM) Appliance• Round-robin. With round-robin load balancing, new

Page 522 - Report Filtering Options

xDSL Network Module for the UTM9S and UTM25S569ProSecure Unified Threat Management (UTM) ApplianceFigure 334. 3. Configure the protocol binding setti

Page 523

Use the Setup Wizard to Provision the UTM in Your Network57 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 5 of 10: Email Securi

Page 524

xDSL Network Module for the UTM9S and UTM25S570ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b

Page 525

xDSL Network Module for the UTM9S and UTM25S571ProSecure Unified Threat Management (UTM) ApplianceFor more information about firewall rules, see Overv

Page 526

xDSL Network Module for the UTM9S and UTM25S572ProSecure Unified Threat Management (UTM) Appliance• Subnet Mask. Enter the subnet mask for the seconda

Page 527

xDSL Network Module for the UTM9S and UTM25S573ProSecure Unified Threat Management (UTM) Appliance To configure DDNS:1. Select Network Config > Dy

Page 528

xDSL Network Module for the UTM9S and UTM25S574ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper r

Page 529 - Report screen.)

xDSL Network Module for the UTM9S and UTM25S575ProSecure Unified Threat Management (UTM) ApplianceNote: You can also configure the failure detection m

Page 530 - Managing Saved Reports

xDSL Network Module for the UTM9S and UTM25S576ProSecure Unified Threat Management (UTM) Appliance4. Enter the settings as explained in the following

Page 531 - Use Diagnostics Utilities

xDSL Network Module for the UTM9S and UTM25S577ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you h

Page 532 - Send a Ping Packet

578BB. Wireless Network Module for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of the NMSWLSN wireless networ

Page 533 - Look Up a DNS Address

Wireless Network Module for the UTM9S and UTM25S579ProSecure Unified Threat Management (UTM) ApplianceOverview of the Wireless Network Module• Configu

Page 534 - Network Statistics Report

Use the Setup Wizard to Provision the UTM in Your Network58ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Page 535 - Generate Network Statistics

Wireless Network Module for the UTM9S and UTM25S580ProSecure Unified Threat Management (UTM) ApplianceNote: Failure to follow these guidelines can res

Page 536 - Reboot and Shut Down the UTM

Wireless Network Module for the UTM9S and UTM25S581ProSecure Unified Threat Management (UTM) ApplianceFigure 339. 2. Specify the settings as explaine

Page 537

Wireless Network Module for the UTM9S and UTM25S582ProSecure Unified Threat Management (UTM) ApplianceMode The wireless modes that you can select depe

Page 538

Wireless Network Module for the UTM9S and UTM25S583ProSecure Unified Threat Management (UTM) ApplianceWARNING:When you have changed the country settin

Page 539 - Basic Functioning

Wireless Network Module for the UTM9S and UTM25S584ProSecure Unified Threat Management (UTM) Appliance• In infrastructure mode, wireless devices norma

Page 540 - LAN or WAN Port LEDs Not On

Wireless Network Module for the UTM9S and UTM25S585ProSecure Unified Threat Management (UTM) ApplianceNote: On the UTM9S or UTM25S, WEP is not support

Page 541

Wireless Network Module for the UTM9S and UTM25S586ProSecure Unified Threat Management (UTM) ApplianceWireless security profiles, hereafter referred t

Page 542

Wireless Network Module for the UTM9S and UTM25S587ProSecure Unified Threat Management (UTM) ApplianceBefore You Change the SSID, WEP, and WPA Setting

Page 543 - Test the LAN Path to Your UTM

Wireless Network Module for the UTM9S and UTM25S588ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable Wireless Profiles To add a

Page 544

Wireless Network Module for the UTM9S and UTM25S589ProSecure Unified Threat Management (UTM) ApplianceFigure 342. 3. Specify the settings as explaine

Page 545 - Figure 316

Use the Setup Wizard to Provision the UTM in Your Network59 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t

Page 546 - Use Online Support

Wireless Network Module for the UTM9S and UTM25S590ProSecure Unified Threat Management (UTM) ApplianceSSID The wireless network name (SSID) for the wi

Page 547 - Figure 317

Wireless Network Module for the UTM9S and UTM25S591ProSecure Unified Threat Management (UTM) ApplianceEncryptionNote: WPA, WPA2, and WPA+WPA2 only.The

Page 548 - Documentation

Wireless Network Module for the UTM9S and UTM25S592ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The profil

Page 549

Wireless Network Module for the UTM9S and UTM25S593ProSecure Unified Threat Management (UTM) Appliance To edit a wireless profile:1. On the Wireless

Page 550 - Configure the xDSL Settings

Wireless Network Module for the UTM9S and UTM25S594ProSecure Unified Threat Management (UTM) ApplianceFigure 343. Note: The default wireless profile

Page 551 - Figure 320

Wireless Network Module for the UTM9S and UTM25S595ProSecure Unified Threat Management (UTM) ApplianceWARNING:If you configure the wireless network mo

Page 552 - Table 140. xDSL settings

Wireless Network Module for the UTM9S and UTM25S596ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the A

Page 553 - Internet Connection

Wireless Network Module for the UTM9S and UTM25S597ProSecure Unified Threat Management (UTM) Appliancemixed encryption (TKIP+AES, which is supported i

Page 554 - Figure 323

Wireless Network Module for the UTM9S and UTM25S598ProSecure Unified Threat Management (UTM) Appliance To configure WDS on a peer:1. Configure the sa

Page 555

Wireless Network Module for the UTM9S and UTM25S599ProSecure Unified Threat Management (UTM) Appliance3. Specify the settings as explained in the foll

Page 556 - Figure 324

6ProSecure Unified Threat Management (UTM) ApplianceWeb Management Interface Menu Layout . . . . . . . . . . . . . . . . . . . . . . . . . 44Use the S

Page 557 - Figure 327

Use the Setup Wizard to Provision the UTM in Your Network60ProSecure Unified Threat Management (UTM) Appliance Scan screen also lets you specify HTML

Page 558

Wireless Network Module for the UTM9S and UTM25S600ProSecure Unified Threat Management (UTM) ApplianceConfigure WMM QoS Priority SettingsWi-Fi Multime

Page 559 - Figure 328

Wireless Network Module for the UTM9S and UTM25S601ProSecure Unified Threat Management (UTM) ApplianceFigure 347. 3. Select the Enable WMM check box.

Page 560 - Figure 329

Wireless Network Module for the UTM9S and UTM25S602ProSecure Unified Threat Management (UTM) ApplianceTest Basic Wireless ConnectivityAfter you have c

Page 561 - Configure the WAN Mode

603CC. 3G/4G Dongles for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of a mobile broadband USB adapter (3G/4G

Page 562

3G/4G Dongles for the UTM9S and UTM25S604ProSecure Unified Threat Management (UTM) Appliance Complete these steps:1. Insert the 3G/4G dongle and con

Page 563 - Configure Classical Routing

3G/4G Dongles for the UTM9S and UTM25S605ProSecure Unified Threat Management (UTM) Appliance To configure the WAN ISP settings for the USB interface:

Page 564 - Configure Auto-Rollover Mode

3G/4G Dongles for the UTM9S and UTM25S606ProSecure Unified Threat Management (UTM) Appliance4. Configure the settings as explained in the following t

Page 565 - Figure 331

3G/4G Dongles for the UTM9S and UTM25S607ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save any changes to the USB ISP settings

Page 566

3G/4G Dongles for the UTM9S and UTM25S608ProSecure Unified Threat Management (UTM) ApplianceConfigure the 3G/4G SettingsThe 3G/4G settings are automat

Page 567 - Configure Load Balancing

3G/4G Dongles for the UTM9S and UTM25S609ProSecure Unified Threat Management (UTM) Appliance4. The information in the 3G Status section and SIM Card

Page 568 - Figure 333

Use the Setup Wizard to Provision the UTM in Your Network61 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the

Page 569 - Figure 334

3G/4G Dongles for the UTM9S and UTM25S610ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Note: If you are co

Page 570 -  To edit a protocol binding:

3G/4G Dongles for the UTM9S and UTM25S611ProSecure Unified Threat Management (UTM) ApplianceOverview of the WAN ModesYou cannot configure failure dete

Page 571 - Figure 335

3G/4G Dongles for the UTM9S and UTM25S612ProSecure Unified Threat Management (UTM) ApplianceFor information about how to configure the USB interface a

Page 572 - Configure Dynamic DNS

3G/4G Dongles for the UTM9S and UTM25S613ProSecure Unified Threat Management (UTM) ApplianceFigure 352. 2. In the NAT (Network Address Translation)

Page 573 - Figure 336

3G/4G Dongles for the UTM9S and UTM25S614ProSecure Unified Threat Management (UTM) ApplianceConfigure Load Balancing and Optional Protocol BindingTo u

Page 574 - WAN Options

3G/4G Dongles for the UTM9S and UTM25S615ProSecure Unified Threat Management (UTM) Applianceb. From the corresponding drop-down list on the right, sel

Page 575 - Figure 338

3G/4G Dongles for the UTM9S and UTM25S616ProSecure Unified Threat Management (UTM) Appliance• Destination Network. The Internet locations (based on th

Page 576

3G/4G Dongles for the UTM9S and UTM25S617ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol binding

Page 577

3G/4G Dongles for the UTM9S and UTM25S618ProSecure Unified Threat Management (UTM) ApplianceConfigure Dynamic DNSDynamic DNS (DDNS) is an Internet ser

Page 578 - UTM9S and UTM25S

3G/4G Dongles for the UTM9S and UTM25S619ProSecure Unified Threat Management (UTM) ApplianceFigure 356. The WAN Mode section onscreen reports the cur

Page 579 - Configuration Order

Use the Setup Wizard to Provision the UTM in Your Network62ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 8 of 10: Email Notifi

Page 580

3G/4G Dongles for the UTM9S and UTM25S620ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper right o

Page 581 - Figure 339

3G/4G Dongles for the UTM9S and UTM25S621ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you have no

Page 582

622DD. Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)This appendix describes the factors to consider when planning a network usi

Page 583

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)623ProSecure Unified Threat Management (UTM) ApplianceYour decision has the followi

Page 584 - Figure 340

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)624ProSecure Unified Threat Management (UTM) Appliance4. Prepare to connect the UTM

Page 585 - Wireless Security Profiles

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)625ProSecure Unified Threat Management (UTM) Appliance- For Windows 2000/XP/Vista,

Page 586

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)626ProSecure Unified Threat Management (UTM) Appliance• Fully qualified domain name

Page 587

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)627ProSecure Unified Threat Management (UTM) ApplianceFigure 359. Features such as

Page 588 - To add a wireless profile:

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)628ProSecure Unified Threat Management (UTM) ApplianceInbound Traffic to a Single W

Page 589 - Figure 342

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)629ProSecure Unified Threat Management (UTM) ApplianceNote: Load balancing is imple

Page 590

Use the Setup Wizard to Provision the UTM in Your Network63 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 9 of 10: Signatures &

Page 591

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)630ProSecure Unified Threat Management (UTM) ApplianceFor a single WAN gateway conf

Page 592

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)631ProSecure Unified Threat Management (UTM) ApplianceVPN Road Warrior: Single-Gate

Page 593 -  To edit a wireless profile:

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)632ProSecure Unified Threat Management (UTM) ApplianceFigure 368. The purpose of th

Page 594 - Figure 343

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)633ProSecure Unified Threat Management (UTM) ApplianceVPN Gateway-to-GatewayThe fol

Page 595 - Figure 344

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)634ProSecure Unified Threat Management (UTM) ApplianceFigure 371. The IP addresses

Page 596

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)635ProSecure Unified Threat Management (UTM) ApplianceFigure 373. The IP addresses

Page 597 - Figure 345

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)636ProSecure Unified Threat Management (UTM) ApplianceThe IP address of the gateway

Page 598 - Figure 346

Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)637ProSecure Unified Threat Management (UTM) ApplianceVPN Telecommuter: Dual-Gatewa

Page 599

638EE. ReadyNAS IntegrationThis appendix describes how to set up a UTM with a NETGEAR ReadyNAS. This appendix includes the following sections:• Supp

Page 600

ReadyNAS Integration639ProSecure Unified Threat Management (UTM) ApplianceInstall the UTM Add-On on the ReadyNAS To install the UTM add-on on the Rea

Page 601 - Figure 347

Use the Setup Wizard to Provision the UTM in Your Network64ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t

Page 602

ReadyNAS Integration640ProSecure Unified Threat Management (UTM) ApplianceFigure 379. 7. Click Install.8. Select Add-ons > Installed.Figure 380.

Page 603

ReadyNAS Integration641ProSecure Unified Threat Management (UTM) Appliance10. Click Save. The status indicator shows green.Figure 381. Connect to the

Page 604 -  Complete these steps:

ReadyNAS Integration642ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table:4. Click Apply to

Page 605 - 2. Select WAN Mode

ReadyNAS Integration643ProSecure Unified Threat Management (UTM) ApplianceFigure 384.

Page 606 - Table 154. USB ISP settings

644FF. Two-Factor AuthenticationThis appendix provides an overview of two-factor authentication, and an example of how to implement the WiKID soluti

Page 607 - Figure 350

Two-Factor Authentication645ProSecure Unified Threat Management (UTM) Appliance• Proven regulatory compliance. Two-factor authentication has been used

Page 608 - Configure the 3G/4G Settings

Two-Factor Authentication646ProSecure Unified Threat Management (UTM) ApplianceFigure 385. 2. A one-time passcode (something the user has) is generat

Page 609 - Table 155. 3G/4G settings

Two-Factor Authentication647ProSecure Unified Threat Management (UTM) ApplianceFigure 387.

Page 610

648GG. System Logs and Error MessagesThis appendix provides examples and explanations of system logs and error message. When applicable, a recommend

Page 611 - Overview of the WAN Modes

System Logs and Error Messages649ProSecure Unified Threat Management (UTM) ApplianceSystem Log Messages• System Startup• Reboot• NTP• Login/Logout• Fi

Page 612 -  To configure NAT:

Use the Setup Wizard to Provision the UTM in Your Network65 ProSecure Unified Threat Management (UTM) ApplianceRegister the UTM with NETGEAR• Use the

Page 613

System Logs and Error Messages650ProSecure Unified Threat Management (UTM) ApplianceNTPThis section describes log messages generated by the NTP daemon

Page 614

System Logs and Error Messages651ProSecure Unified Threat Management (UTM) ApplianceFirewall RestartThis section describes logs that are generated whe

Page 615 - Figure 354

System Logs and Error Messages652ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo

Page 616 - Figure 355

System Logs and Error Messages653ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo

Page 617

System Logs and Error Messages654ProSecure Unified Threat Management (UTM) Appliance• PPTP Idle-Timeout logsExplanation Message 1: Establishment of th

Page 618

System Logs and Error Messages655ProSecure Unified Threat Management (UTM) Appliance• PPP Authentication logsTraffic Metering LogsThis section describ

Page 619 - Figure 356

System Logs and Error Messages656ProSecure Unified Threat Management (UTM) ApplianceICMP Redirect LogsThis section describes logs that are generated w

Page 620 - Figure 357

System Logs and Error Messages657ProSecure Unified Threat Management (UTM) ApplianceMessage 2007 Oct 1 00:44:17 [UTM] [kernel] [INVALID][ICMP_TYPE][DR

Page 621

System Logs and Error Messages658ProSecure Unified Threat Management (UTM) ApplianceService LogsThis section describes log messages generated during f

Page 622 - Accounts

System Logs and Error Messages659ProSecure Unified Threat Management (UTM) Appliance• IPS Logs• Anomaly Behavior Logs• Application LogsThis section de

Page 623

Use the Setup Wizard to Provision the UTM in Your Network66ProSecure Unified Threat Management (UTM) Appliance Note: If you have used the 30-day trial

Page 624

System Logs and Error Messages660ProSecure Unified Threat Management (UTM) ApplianceSpam LogsThis section describes logs that are generated when the U

Page 625

System Logs and Error Messages661ProSecure Unified Threat Management (UTM) ApplianceTraffic LogsThis section describes logs that are generated when th

Page 626

System Logs and Error Messages662ProSecure Unified Threat Management (UTM) ApplianceIPS LogsThis section describes logs that are generated when traffi

Page 627 - Inbound Traffic

System Logs and Error Messages663ProSecure Unified Threat Management (UTM) ApplianceApplication LogsThis section describes logs that are generated whe

Page 628 - Figure 362

System Logs and Error Messages664ProSecure Unified Threat Management (UTM) ApplianceLAN-to-DMZ LogsThis section describes logs that are generated when

Page 629 - Virtual Private Networks

System Logs and Error Messages665ProSecure Unified Threat Management (UTM) ApplianceDMZ-to-LAN LogsThis section describes logs that are generated when

Page 630 - Figure 365

666HH. Default Settings and Technical SpecificationsThis appendix provides the default settings and the physical and technical specifications of the

Page 631 - Figure 367

Default Settings and Technical Specifications667ProSecure Unified Threat Management (UTM) ApplianceWAN connectionsWAN MAC address Use default addressW

Page 632 - Figure 369

Default Settings and Technical Specifications668ProSecure Unified Threat Management (UTM) ApplianceFirewall and network securityInbound LAN WAN rules

Page 633 - VPN Gateway-to-Gateway

Default Settings and Technical Specifications669ProSecure Unified Threat Management (UTM) ApplianceApplication securitySMTP Enabled on port 25Infected

Page 634 - Figure 372

Use the Setup Wizard to Provision the UTM in Your Network67 ProSecure Unified Threat Management (UTM) Appliance To change customer or VAR information

Page 635 - Figure 374

Default Settings and Technical Specifications670ProSecure Unified Threat Management (UTM) ApplianceBlocked keywords for Web traffic NoneEmbedded Objec

Page 636 - Figure 376

Default Settings and Technical Specifications671ProSecure Unified Threat Management (UTM) ApplianceAuthentication algorithm SHA-1Authentication method

Page 637 - Figure 377

Default Settings and Technical Specifications672ProSecure Unified Threat Management (UTM) ApplianceWireless radio and access point settings (UTM9S and

Page 638 - ReadyNAS Integration

Default Settings and Technical Specifications673ProSecure Unified Threat Management (UTM) AppliancePhysical and Technical SpecificationsThe following

Page 639 - Figure 378

Default Settings and Technical Specifications674ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the IPSec VPN specificati

Page 640 - 7. Click Install

Default Settings and Technical Specifications675ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the SSL VPN specification

Page 641 - Figure 382

Default Settings and Technical Specifications676ProSecure Unified Threat Management (UTM) ApplianceNote: For default email and web scan settings, see

Page 642 - Figure 383

677II. Notification of Compliance (Wired)NETGEAR Wired ProductsRegulatory Compliance InformationThis section includes user requirements for operatin

Page 643 - Figure 384

Notification of Compliance (Wired)678ProSecure Unified Threat Management (UTM) ApplianceFCC Radio Frequency Interference Warnings & InstructionsTh

Page 644 - Two-Factor Authentication

Notification of Compliance (Wired)679ProSecure Unified Threat Management (UTM) ApplianceAdditional CopyrightsAES Copyright (c) 2001, Dr. Brian Gladman

Page 645

Use the Setup Wizard to Provision the UTM in Your Network68ProSecure Unified Threat Management (UTM) Appliance Verify Correct Installation• Test Conne

Page 646 - Figure 386

Notification of Compliance (Wired)680ProSecure Unified Threat Management (UTM) ApplianceMD5 Copyright (C) 1990, RSA Data Security, Inc. All rights re

Page 647 - Figure 387

681JJ. Notification of Compliance (Wireless)NETGEAR Dual Band - WirelessRegulatory Compliance InformationThis section includes user requirements for

Page 648 - Table 161. Log message terms

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)682Español [Spanish]Por medio de la presente NETGEAR Inc. decl

Page 649 - System Log Messages

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)683This device is a 2.4 GHz wideband transmission system (tra

Page 650 - Login/Logout

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)684• For product available in the USA market, only channel 1~1

Page 651 - WAN Status

ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)685Interference Reduction TableThe following table shows the

Page 652 - Load Balancing Mode

686IndexNumerics10BASE-T, 100BASE-T, and 1000BASE-T speeds 962.4- and 5-GHz operating frequency, radio 58120- and 40-MHz channel spacing, radio 582332

Page 653 - PPP Logs

687ProSecure Unified Threat Management (UTM) ApplianceAppleiPhone and iPad IPSec VPN connections 336Mac SSL VPN connection 377Application Level Gatewa

Page 654 - • PPTP Idle-Timeout logs

688ProSecure Unified Threat Management (UTM) ApplianceCCA (certification authority) 232, 300cache control, SSL VPN 341, 361card, service registration

Page 655 - Traffic Metering Logs

689ProSecure Unified Threat Management (UTM) Appliancetroubleshooting settings 546daylight savings timesettings 55, 457troubleshooting settings 546DC

Page 656 - Invalid Packet Logging

Use the Setup Wizard to Provision the UTM in Your Network69 ProSecure Unified Threat Management (UTM) ApplianceThe UTM is ready for use. However, the

Page 657

690ProSecure Unified Threat Management (UTM) AppliancedownloadingDC agent software 410firmware file 451SSL certificate 382DPD (Dead Peer Detection) 29

Page 658 - Service Logs

691ProSecure Unified Threat Management (UTM) ApplianceWAN settings 82–85file extensionsblocking 202, 218, 222setting access exceptions 256file names,

Page 659

692ProSecure Unified Threat Management (UTM) Appliancescanning process 228trusted hosts 235HTTPS Smart Blockconfiguring 212–215logs 469, 508–510settin

Page 660 - Spam Logs

693ProSecure Unified Threat Management (UTM) Applianceport forwarding, SSL VPN 363PPTP server 332reserved 116secondary addressesDSL settings 570LAN se

Page 661 - Email Filter Logs

694ProSecure Unified Threat Management (UTM) ApplianceProSafe VPN Client software 17licensing, electronic 67lifetime, quarantine 461Lightweight Direct

Page 662 - Anomaly Behavior Logs

695ProSecure Unified Threat Management (UTM) Appliancerecord 296models, UTM 22modes, wireless 582, 675monitoring default settings 667MPPE (Microsoft P

Page 663 - Routing Logs

696ProSecure Unified Threat Management (UTM) Appliancerestoring 545pattern file 454pay plan, 3G/4G service 610PDP (packet data protocol) type, 3G/4G s

Page 664 - WAN-to-LAN Logs

697ProSecure Unified Threat Management (UTM) AppliancePPTP (Point-to-Point Tunneling Protocol)requirements 74server settings 331user accounts 401–403W

Page 665 - WAN-to-DMZ Logs

698ProSecure Unified Threat Management (UTM) Appliancewired products 677–680relay gateway 50, 106, 119Remote Authentication Dial In User Service. See

Page 666 - Default Settings

699ProSecure Unified Threat Management (UTM) Applianceservice provider, 3G/4G 608service registration card 23session expiration length 416Session Init

Page 667

7ProSecure Unified Threat Management (UTM) ApplianceManage the Network Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112Change

Page 668

7033. Manually Configure Internet and WAN SettingsThis chapter contains the following sections:• Internet and WAN Configuration Tasks• Automatically

Page 669

700ProSecure Unified Threat Management (UTM) Applianceoptions 337settings, configuring manually 359settings, using SSL VPN Wizard 339specifications 67

Page 670

701ProSecure Unified Threat Management (UTM) Appliancetransfer mode, DSL settings 552Transmission Control Protocol (TCP) 184transmit power, radio 583T

Page 671

702ProSecure Unified Threat Management (UTM) ApplianceVirtual Private Network Consortium (VPNC) 21, 266virtual private network. See VPN tunnels.virusd

Page 672

703ProSecure Unified Threat Management (UTM) Applianceconnection speed 97connection type, viewing 496failure detection method 82–85load balancing mode

Page 673

704ProSecure Unified Threat Management (UTM) Appliancewireless specifications 675WizardsSetup Wizard 47IPSec VPN. See IPSec VPN Wizard.SSL VPN. See SS

Page 674

Manually Configure Internet and WAN Settings71 ProSecure Unified Threat Management (UTM) ApplianceInternet and WAN Configuration TasksNote: For inform

Page 675 - UTM9S and UTM25S:

Manually Configure Internet and WAN Settings72ProSecure Unified Threat Management (UTM) Appliance  To configure the WAN ports automatically for conne

Page 676

Manually Configure Internet and WAN Settings73 ProSecure Unified Threat Management (UTM) ApplianceFigure 38. 3. Click the Auto Detect button at the b

Page 677 - NETGEAR Wired Products

Manually Configure Internet and WAN Settings74ProSecure Unified Threat Management (UTM) Appliance • If the autodetect process does not find a connecti

Page 678

Manually Configure Internet and WAN Settings75 ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the automatic ISP configuration

Page 679 - Additional Copyrights

Manually Configure Internet and WAN Settings76ProSecure Unified Threat Management (UTM) Appliance Figure 41. 6. If your connection is PPTP or PPPoE,

Page 680

Manually Configure Internet and WAN Settings77 ProSecure Unified Threat Management (UTM) Appliance7. In the Internet (IP) Address section of the scree

Page 681 - NETGEAR Dual Band - Wireless

Manually Configure Internet and WAN Settings78ProSecure Unified Threat Management (UTM) Appliance 8. In the Domain Name Server (DNS) Servers section o

Page 682

Manually Configure Internet and WAN Settings79 ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the WAN ISP se

Page 683 - FCC Caution

8ProSecure Unified Threat Management (UTM) ApplianceChapter 6 Content Filtering and Optimizing ScansAbout Content Filtering and Scans. . . . . . . . .

Page 684

Manually Configure Internet and WAN Settings80ProSecure Unified Threat Management (UTM) Appliance Configure the WAN Mode• Overview of the WAN Modes• C

Page 685 - Interference Reduction Table

Manually Configure Internet and WAN Settings81 ProSecure Unified Threat Management (UTM) ApplianceWAN interfaces, the remaining interfaces are disable

Page 686 - Numerics

Manually Configure Internet and WAN Settings82ProSecure Unified Threat Management (UTM) Appliance WARNING:Changing the WAN mode from classical routing

Page 687

Manually Configure Internet and WAN Settings83 ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM is configured in auto-rollover mode, it

Page 688

Manually Configure Internet and WAN Settings84ProSecure Unified Threat Management (UTM) Appliance Note: Ensure that the backup WAN interface is config

Page 689

Manually Configure Internet and WAN Settings85 ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary WAN interface fails, the def

Page 690

Manually Configure Internet and WAN Settings86ProSecure Unified Threat Management (UTM) Appliance Configure Load Balancing (Multiple WAN Port Models)

Page 691

Manually Configure Internet and WAN Settings87 ProSecure Unified Threat Management (UTM) ApplianceThis load-balancing method ensures that a single WAN

Page 692

Manually Configure Internet and WAN Settings88ProSecure Unified Threat Management (UTM) Appliance Figure 49. 3. Configure the protocol binding settin

Page 693

Manually Configure Internet and WAN Settings89 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b

Page 694

9ProSecure Unified Threat Management (UTM) ApplianceRADIUS Client and Server Configuration. . . . . . . . . . . . . . . . . . . . . . .310Assign IP Ad

Page 695

Manually Configure Internet and WAN Settings90ProSecure Unified Threat Management (UTM) Appliance It is important that you ensure that any secondary W

Page 696

Manually Configure Internet and WAN Settings91 ProSecure Unified Threat Management (UTM) Appliance5. Click the Add table button in the rightmost colum

Page 697

Manually Configure Internet and WAN Settings92ProSecure Unified Threat Management (UTM) Appliance  To configure DDNS:1. Select Network Config > Dy

Page 698

Manually Configure Internet and WAN Settings93 ProSecure Unified Threat Management (UTM) ApplianceFigure 52. 4. Access the website of the DDNS servic

Page 699

Manually Configure Internet and WAN Settings94ProSecure Unified Threat Management (UTM) Appliance Set the UTM’s MAC Address and Configure Advanced WAN

Page 700

Manually Configure Internet and WAN Settings95 ProSecure Unified Threat Management (UTM) ApplianceFigure 53. 4. Enter the settings as explained in th

Page 701

Manually Configure Internet and WAN Settings96ProSecure Unified Threat Management (UTM) Appliance SpeedIn most cases, the UTM can automatically determ

Page 702

Manually Configure Internet and WAN Settings97 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your changes.WARNING:Dependin

Page 703

9844. LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains the following sections:•

Page 704

LAN Configuration99 ProSecure Unified Threat Management (UTM) ApplianceA virtual LAN (VLAN) is a local area network with a definition that maps workst

Comments to this Manuals

No comments