350 East Plumeria DriveSan Jose, CA 95134USAOctober 2012202-10780-03v1.0ProSecure Unified Threat Management (UTM) ApplianceReference Manual
10ProSecure Unified Threat Management (UTM) ApplianceConfigure User Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
LAN Configuration100ProSecure Unified Threat Management (UTM) Appliance • When a port receives an untagged packet, this packet is forwarded to a VLAN
LAN Configuration101 ProSecure Unified Threat Management (UTM) ApplianceFigure 54. For each VLAN profile, the following fields display in the VLAN Pr
LAN Configuration102ProSecure Unified Threat Management (UTM) Appliance DHCP ServerThe default VLAN (VLAN 1) has the DHCP server option enabled by def
LAN Configuration103 ProSecure Unified Threat Management (UTM) Applianceconfiguration in auto-rollover mode with route diversity (that is, with two di
LAN Configuration104ProSecure Unified Threat Management (UTM) Appliance 2. Either select an entry from the VLAN Profiles table and click the correspon
LAN Configuration105 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table: Table 21. Edit VLA
LAN Configuration106ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server Select the Enable DHCP Server radio button to enable the UT
LAN Configuration107 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Enable LDAP informationTo enable the DHCP
LAN Configuration108ProSecure Unified Threat Management (UTM) Appliance Note: When you have completed the LAN setup, all outbound traffic is allowed a
LAN Configuration109 ProSecure Unified Threat Management (UTM) ApplianceFigure 57. 3. From the MAC Address for VLANs drop-down list, select Unique. (
11ProSecure Unified Threat Management (UTM) ApplianceView the Active PPTP and L2TP Users . . . . . . . . . . . . . . . . . . . . . . . .501View the Po
LAN Configuration110ProSecure Unified Threat Management (UTM) Appliance The following is an example of correctly configured IP addresses on a multiple
LAN Configuration111 ProSecure Unified Threat Management (UTM) Appliance To edit a secondary LAN IP address:1. On the LAN Multi-homing screen (see th
LAN Configuration112ProSecure Unified Threat Management (UTM) Appliance These are some advantages of the network database:• Generally, you do not need
LAN Configuration113 ProSecure Unified Threat Management (UTM) ApplianceFigure 59. The Known PCs and Devices table lists the entries in the network da
LAN Configuration114ProSecure Unified Threat Management (UTM) Appliance Add Computers or Devices to the Network Database To add computers or devices
LAN Configuration115 ProSecure Unified Threat Management (UTM) ApplianceFigure 60. 2. Modify the settings as explained in Table 22 on page 114.3. Cli
LAN Configuration116ProSecure Unified Threat Management (UTM) Appliance Figure 61. 3. Select the radio button next to the group name that you want to
LAN Configuration117 ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable the DMZ PortThe demilitarized zone (DMZ) is a network tha
LAN Configuration118ProSecure Unified Threat Management (UTM) Appliance Figure 62. 2. Enter the settings as explained in the following table: Table 2
LAN Configuration119 ProSecure Unified Threat Management (UTM) ApplianceDHCPDisable DHCP Server If another device on your network is the DHCP server f
12ProSecure Unified Threat Management (UTM) ApplianceAppendix A xDSL Network Module for the UTM9S and UTM25SxDSL Network Module Configuration Tasks. .
LAN Configuration120ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: For all UTM models except for the U
LAN Configuration121 ProSecure Unified Threat Management (UTM) ApplianceManage Routing• Configure Static Routes• Configure Routing Information Protoco
LAN Configuration122ProSecure Unified Threat Management (UTM) Appliance Figure 64. 3. Enter the settings as explained in the following table: 4. Clic
LAN Configuration123 ProSecure Unified Threat Management (UTM) Appliance To edit a static route that is in the Static Routes table:1. On the Routing
LAN Configuration124ProSecure Unified Threat Management (UTM) Appliance Figure 65. 3. Enter the settings as explained in the following table: Table 2
LAN Configuration125 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.RIP Version By default, the RIP version i
LAN Configuration126ProSecure Unified Threat Management (UTM) Appliance Static Route ExampleIn this example, we assume the following:• The UTM’s prima
12755. Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chapter contains the foll
Firewall Protection128ProSecure Unified Threat Management (UTM) Appliance Administrator TipsConsider the following operational items:1. As an option,
Firewall Protection129 ProSecure Unified Threat Management (UTM) ApplianceA firewall has two default rules, one for inbound traffic and one for outbou
13ProSecure Unified Threat Management (UTM) ApplianceAppendix D Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)What to Consider Bef
Firewall Protection130ProSecure Unified Threat Management (UTM) Appliance WARNING:Allowing inbound services opens security holes in your UTM. Enable o
Firewall Protection131 ProSecure Unified Threat Management (UTM) ApplianceLAN Users The settings that determine which computers on your network are af
Firewall Protection132ProSecure Unified Threat Management (UTM) Appliance QoS Profile The priority assigned to IP packets of this service. The priorit
Firewall Protection133 ProSecure Unified Threat Management (UTM) ApplianceInbound Rules (Port Forwarding)If you have enabled Network Address Translati
Firewall Protection134ProSecure Unified Threat Management (UTM) Appliance • Local computers need to access the local server using the computers’ local
Firewall Protection135 ProSecure Unified Threat Management (UTM) ApplianceTable 28. Inbound rules overviewSetting Description Inbound RulesService(al
Firewall Protection136ProSecure Unified Threat Management (UTM) Appliance LAN Users The settings that determine which computers on your network are af
Firewall Protection137 ProSecure Unified Threat Management (UTM) ApplianceQoS Profile The priority assigned to IP packets of this service. The priorit
Firewall Protection138ProSecure Unified Threat Management (UTM) Appliance Note: Some residential broadband ISP accounts do not allow you to run any se
Firewall Protection139 ProSecure Unified Threat Management (UTM) ApplianceFor any traffic attempting to pass through the firewall, the packet informat
14ProSecure Unified Threat Management (UTM) ApplianceEmail Filter Logs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Firewall Protection140ProSecure Unified Threat Management (UTM) Appliance To change an existing outbound or inbound service rule:In the Action colum
Firewall Protection141 ProSecure Unified Threat Management (UTM) ApplianceFigure 68. 2. Enter the settings as explained in Table 27 on page 130.3. Cl
Firewall Protection142ProSecure Unified Threat Management (UTM) Appliance Figure 69. 2. Enter the settings as explained in Table 28 on page 135.3. Cl
Firewall Protection143 ProSecure Unified Threat Management (UTM) Applianceadding outbound services rules (see Create DMZ WAN Outbound Service Rules on
Firewall Protection144ProSecure Unified Threat Management (UTM) Appliance Create DMZ WAN Outbound Service RulesYou can change the default outbound pol
Firewall Protection145 ProSecure Unified Threat Management (UTM) Appliance To create an inbound DMZ WAN service rule:1. In the DMZ WAN Rules screen,
Firewall Protection146ProSecure Unified Threat Management (UTM) Appliance To access the LAN DMZ Rules screen and to change an existing outbound or inb
Firewall Protection147 ProSecure Unified Threat Management (UTM) ApplianceCreate LAN DMZ Outbound Service RulesYou can change the default outbound pol
Firewall Protection148ProSecure Unified Threat Management (UTM) Appliance Figure 75. 2. Enter the settings as explained in Table 28 on page 135.3. Cl
Firewall Protection149 ProSecure Unified Threat Management (UTM) ApplianceFigure 76. LAN WAN Inbound Rule: Allow Videoconference from Restricted Addre
1511. IntroductionThis chapter provides an overview of the features and capabilities of the NETGEAR ProSecure® Unified Threat Management (UTM) Appli
Firewall Protection150ProSecure Unified Threat Management (UTM) Appliance Figure 77. LAN WAN or DMZ WAN Inbound Rule: Set Up One-to-One NAT MappingIn
Firewall Protection151 ProSecure Unified Threat Management (UTM) ApplianceTip: If you arrange with your ISP to have more than one public IP address fo
Firewall Protection152ProSecure Unified Threat Management (UTM) Appliance 6. In the Send to LAN Server field, enter the local IP address of your web s
Firewall Protection153 ProSecure Unified Threat Management (UTM) ApplianceWARNING:For security, NETGEAR strongly recommends that you avoid creating an
Firewall Protection154ProSecure Unified Threat Management (UTM) Appliance Configure Other Firewall Features• VLAN Rules• Attack Checks, VPN Pass-throu
Firewall Protection155 ProSecure Unified Threat Management (UTM) ApplianceFigure 82. 3. Enter the settings as explained in the following table.Table
Firewall Protection156ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new VLAN rule is added to the VLAN
Firewall Protection157 ProSecure Unified Threat Management (UTM) ApplianceAttack Checks, VPN Pass-through, and Multicast Pass-throughThe Attack Checks
Firewall Protection158ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Configure Multicast Pass-Through To co
Firewall Protection159 ProSecure Unified Threat Management (UTM) ApplianceFigure 84. 2. In the Multicast Pass through section of the screen, select t
Introduction16ProSecure Unified Threat Management (UTM) Appliance carry session traffic, or to maintain a backup connection in case of failure of your
Firewall Protection160ProSecure Unified Threat Management (UTM) Appliance To delete one or more multicast source addresses:1. In the Alternate Netwo
Firewall Protection161 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings.Manage the Application Level Gateway fo
Firewall Protection162ProSecure Unified Threat Management (UTM) Appliance Figure 86. 2. In the ALG section, select the Enable SIP ALG check box.3. In
Firewall Protection163 ProSecure Unified Threat Management (UTM) Appliance• QoS profiles. A Quality of Service (QoS) profile defines the relative prio
Firewall Protection164ProSecure Unified Threat Management (UTM) Appliance To add a customized service:1. Select Network Security > Services. The
Firewall Protection165 ProSecure Unified Threat Management (UTM) Appliance To edit a service:1. In the Custom Services table, click the Edit table bu
Firewall Protection166ProSecure Unified Threat Management (UTM) Appliance Figure 89. 2. Under the Custom Service Group table, click the Add table but
Firewall Protection167 ProSecure Unified Threat Management (UTM) ApplianceCreate IP GroupsAn IP group contains a collection of individual IP addresses
Firewall Protection168ProSecure Unified Threat Management (UTM) Appliance Figure 92. 5. In the IP Address fields, type an IP address.6. Click the Add
Firewall Protection169 ProSecure Unified Threat Management (UTM) ApplianceCreate Quality of Service ProfilesA Quality of Service (QoS) profile defines
Introduction17 ProSecure Unified Threat Management (UTM) Appliance• Depending on the model, bundled with a one-user license of the NETGEAR ProSafe VPN
Firewall Protection170ProSecure Unified Threat Management (UTM) Appliance Figure 93. The screen displays the List of QoS Profiles table with the user
Firewall Protection171 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new QoS profile is added to the Li
Firewall Protection172ProSecure Unified Threat Management (UTM) Appliance When a new connection is established by a device, the device locates the fir
Firewall Protection173 ProSecure Unified Threat Management (UTM) ApplianceFigure 96. 3. Enter the settings as explained in the following table:Table
Firewall Protection174ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new bandwidth profile is added to
Firewall Protection175 ProSecure Unified Threat Management (UTM) Applianceboth downloaded and uploaded traffic. When applied to multiple firewall rule
Firewall Protection176ProSecure Unified Threat Management (UTM) Appliance Figure 98. 3. Enter the settings as explained in the following table:Table
Firewall Protection177 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new traffic meter profile is added
Firewall Protection178ProSecure Unified Threat Management (UTM) Appliance Figure 100. 3. Enter the settings as explained in the following table:Table
Firewall Protection179 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new schedule is added to the List
Introduction18ProSecure Unified Threat Management (UTM) Appliance Wireless FeaturesWireless client connections are supported on the UTM9S and UTM25S w
Firewall Protection180ProSecure Unified Threat Management (UTM) Appliance To enable MAC filtering and add MAC addresses to be permitted or blocked:1
Firewall Protection181 ProSecure Unified Threat Management (UTM) ApplianceSet Up IP/MAC BindingsIP/MAC binding allows you to bind an IP address to a M
Firewall Protection182ProSecure Unified Threat Management (UTM) Appliance Figure 102. 2. Enter the settings as explained in the following table:3. Cl
Firewall Protection183 ProSecure Unified Threat Management (UTM) Appliance To edit an IP/MAC binding:1. In the IP/MAC Bindings table, click the Edit
Firewall Protection184ProSecure Unified Threat Management (UTM) Appliance To add a port-triggering rule:1. Select Network Security > Port Trigger
Firewall Protection185 ProSecure Unified Threat Management (UTM) Appliance To edit a port-triggering rule:1. In the Port Triggering Rules table, clic
Firewall Protection186ProSecure Unified Threat Management (UTM) Appliance Configure Universal Plug and PlayThe Universal Plug and Play (UPnP) feature
Firewall Protection187 ProSecure Unified Threat Management (UTM) ApplianceEnable and Configure the Intrusion Prevention SystemThe intrusion prevention
Firewall Protection188ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: Traffic that passes on the UTM’s
Firewall Protection189 ProSecure Unified Threat Management (UTM) ApplianceFigure 106. IPS, screen 1 of 2
Introduction19 ProSecure Unified Threat Management (UTM) Appliance• SSL VPN provides remote access for mobile users to selected corporate resources wi
Firewall Protection190ProSecure Unified Threat Management (UTM) Appliance Figure 107. IPS, screen 2 of 24. Click Apply to save your settings.The foll
Firewall Protection191 ProSecure Unified Threat Management (UTM) ApplianceNote: To ensure that alerts are emailed to an administrator, you need to con
19266. Content Filtering and Optimizing ScansThis chapter describes how to apply the content-filtering features of the UTM and how to optimize scans
Content Filtering and Optimizing Scans193 ProSecure Unified Threat Management (UTM) ApplianceNote: The UTM can quarantine spam and malware only if you
Content Filtering and Optimizing Scans194ProSecure Unified Threat Management (UTM) Appliance Configure Email Protection• Customize Email Protocol Scan
Content Filtering and Optimizing Scans195 ProSecure Unified Threat Management (UTM) ApplianceNote: For information about web protocols and ports, see
Content Filtering and Optimizing Scans196ProSecure Unified Threat Management (UTM) Appliance Customize Email Antivirus and Notification SettingsWhethe
Content Filtering and Optimizing Scans197 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table
Content Filtering and Optimizing Scans198ProSecure Unified Threat Management (UTM) Appliance Scan ExceptionsThe default maximum size of the email mess
Content Filtering and Optimizing Scans199 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Email Content Filter
2ProSecure Unified Threat Management (UTM) Appliance SupportThank you for choosing NETGEAR.After installing your device, locate the serial number on t
Introduction20ProSecure Unified Threat Management (UTM) Appliance analysis to stop both known and unknown threats. The malware database contains hundr
Content Filtering and Optimizing Scans200ProSecure Unified Threat Management (UTM) Appliance To configure email content filtering: 1. Select Applica
Content Filtering and Optimizing Scans201 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table
Content Filtering and Optimizing Scans202ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Protect Against Emai
Content Filtering and Optimizing Scans203 ProSecure Unified Threat Management (UTM) ApplianceThis order of implementation ensures the optimum balance
Content Filtering and Optimizing Scans204ProSecure Unified Threat Management (UTM) Appliance To configure the whitelist and blacklist:1. Select Appl
Content Filtering and Optimizing Scans205 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table
Content Filtering and Optimizing Scans206ProSecure Unified Threat Management (UTM) Appliance Configure the Real-Time BlacklistBlacklist providers are
Content Filtering and Optimizing Scans207 ProSecure Unified Threat Management (UTM) Appliance To delete a blacklist provider from the real-time black
Content Filtering and Optimizing Scans208ProSecure Unified Threat Management (UTM) Appliance Figure 113. 2. Enter the settings as explained in the fo
Content Filtering and Optimizing Scans209 ProSecure Unified Threat Management (UTM) ApplianceSensitivity From the Sensitivity drop-down list, select t
Introduction21 ProSecure Unified Threat Management (UTM) ApplianceExtensive Protocol SupportThe UTM supports the Transmission Control Protocol/Interne
Content Filtering and Optimizing Scans210ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. The Distributed Spa
Content Filtering and Optimizing Scans211 ProSecure Unified Threat Management (UTM) ApplianceScanning all protocols enhances network security but migh
Content Filtering and Optimizing Scans212ProSecure Unified Threat Management (UTM) Appliance service on your network uses both port 80 and port 8080,
Content Filtering and Optimizing Scans213 ProSecure Unified Threat Management (UTM) Appliance2. In the HTTPS Smart Block Port section of the screen, e
Content Filtering and Optimizing Scans214ProSecure Unified Threat Management (UTM) Appliance Figure 117. The HTTPS Smart Block Profiles table shows a
Content Filtering and Optimizing Scans215 ProSecure Unified Threat Management (UTM) Appliance To change a profile:1. In the Action column of the HTTP
Content Filtering and Optimizing Scans216ProSecure Unified Threat Management (UTM) Appliance Configure Web Malware or Antivirus ScansWhether or not th
Content Filtering and Optimizing Scans217 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table
Content Filtering and Optimizing Scans218ProSecure Unified Threat Management (UTM) Appliance Configure Web Content FilteringIf you want to restrict ac
Content Filtering and Optimizing Scans219 ProSecure Unified Threat Management (UTM) ApplianceNote: You can bypass any type of web blocking for trusted
Introduction22ProSecure Unified Threat Management (UTM) Appliance • SNMP. The UTM supports the Simple Network Management Protocol (SNMP) to let you mo
Content Filtering and Optimizing Scans220ProSecure Unified Threat Management (UTM) Appliance Figure 120. Content filtering, screen 2 of 3
Content Filtering and Optimizing Scans221 ProSecure Unified Threat Management (UTM) ApplianceFigure 121. Content filtering, screen 3 of 32. Enter the
Content Filtering and Optimizing Scans222ProSecure Unified Threat Management (UTM) Appliance Block Files with the Following ExtensionsBy default, the
Content Filtering and Optimizing Scans223 ProSecure Unified Threat Management (UTM) ApplianceSelect the Web Categories You Wish to BlockSelect the Ena
Content Filtering and Optimizing Scans224ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: When the UTM b
Content Filtering and Optimizing Scans225 ProSecure Unified Threat Management (UTM) Appliance To configure web URL filtering:1. Select Application Se
Content Filtering and Optimizing Scans226ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table
Content Filtering and Optimizing Scans227 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.URL(continued)Delete
Content Filtering and Optimizing Scans228ProSecure Unified Threat Management (UTM) Appliance Configure HTTPS Scanning and SSL Certificates• How HTTPS
Content Filtering and Optimizing Scans229 ProSecure Unified Threat Management (UTM) ApplianceDuring SSL authentication, the HTTPS client authenticates
Introduction23 ProSecure Unified Threat Management (UTM) ApplianceService Registration Card with License KeysBe sure to store the license key card tha
Content Filtering and Optimizing Scans230ProSecure Unified Threat Management (UTM) Appliance Configure the HTTPS Scan Settings To configure the HTTPS
Content Filtering and Optimizing Scans231 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Manage SSL Certifica
Content Filtering and Optimizing Scans232ProSecure Unified Threat Management (UTM) Appliance recommends that you replace this digital certificate with
Content Filtering and Optimizing Scans233 ProSecure Unified Threat Management (UTM) Appliance To download the current certificate into your browser:1
Content Filtering and Optimizing Scans234ProSecure Unified Threat Management (UTM) Appliance The Trusted Certificates table contains the trusted certi
Content Filtering and Optimizing Scans235 ProSecure Unified Threat Management (UTM) Appliance To delete an untrusted certificate:1. From the Exceptio
Content Filtering and Optimizing Scans236ProSecure Unified Threat Management (UTM) Appliance Figure 130. 2. Enter the settings as explained in the fo
Content Filtering and Optimizing Scans237 ProSecure Unified Threat Management (UTM) ApplianceConfigure the SSL Settings for HTTPS Scanning To configu
Content Filtering and Optimizing Scans238ProSecure Unified Threat Management (UTM) Appliance Configure FTP Scanning• Customize FTP Antivirus Settings•
Content Filtering and Optimizing Scans239 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Configure FTP Conten
Introduction24ProSecure Unified Threat Management (UTM) Appliance Note: When you reset the UTM to the original factory default settings after you have
Content Filtering and Optimizing Scans240ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings. Configure Applicati
Content Filtering and Optimizing Scans241 ProSecure Unified Threat Management (UTM) Appliance• Private protocols• Social networksControl is set for en
Content Filtering and Optimizing Scans242ProSecure Unified Threat Management (UTM) Appliance To configure an application control profile and enable
Content Filtering and Optimizing Scans243 ProSecure Unified Threat Management (UTM) ApplianceFigure 135. 3. Configure the common settings in the uppe
Content Filtering and Optimizing Scans244ProSecure Unified Threat Management (UTM) Appliance 4. In the lower part of the screen, select the categories
Content Filtering and Optimizing Scans245 ProSecure Unified Threat Management (UTM) Appliance5. In the Active Categories and Individual Applications t
Content Filtering and Optimizing Scans246ProSecure Unified Threat Management (UTM) Appliance 6. Configure the policy as explained in the following tab
Content Filtering and Optimizing Scans247 ProSecure Unified Threat Management (UTM) Appliance7. Click Apply to save the policy settings. The pop-up sc
Content Filtering and Optimizing Scans248ProSecure Unified Threat Management (UTM) Appliance 2. Modify the settings that you wish to change (see the p
Content Filtering and Optimizing Scans249 ProSecure Unified Threat Management (UTM) Appliance• A combination of file extensions and protocols• One URL
Introduction25 ProSecure Unified Threat Management (UTM) Appliance• Rear Panel UTM50 and UTM150• Rear Panel UTM9S and UTM25S• Bottom Panels with Produ
Content Filtering and Optimizing Scans250ProSecure Unified Threat Management (UTM) Appliance 2. Under the File Extension table at the bottom of the sc
Content Filtering and Optimizing Scans251 ProSecure Unified Threat Management (UTM) Appliance• File Extension.Figure 140. Add or edit exceptions: fil
Content Filtering and Optimizing Scans252ProSecure Unified Threat Management (UTM) Appliance • URL Filtering.Figure 142. Add or edit exceptions: URL
Content Filtering and Optimizing Scans253 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/GroupClick the Edit button to open the Applies
Content Filtering and Optimizing Scans254ProSecure Unified Threat Management (UTM) Appliance DomainUser/Group(continued)Local Groups Do the following:
Content Filtering and Optimizing Scans255 ProSecure Unified Threat Management (UTM) ApplianceDomainUser/Group(continued)Custom Groups Do the following
Content Filtering and Optimizing Scans256ProSecure Unified Threat Management (UTM) Appliance Category (and related information)(continued)File Extensi
Content Filtering and Optimizing Scans257 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings. The new exception r
Content Filtering and Optimizing Scans258ProSecure Unified Threat Management (UTM) Appliance Create Custom Categories for Exceptions for Web andApplic
Content Filtering and Optimizing Scans259 ProSecure Unified Threat Management (UTM) Appliance• Application. Figure 145. Custom categories: applicatio
Introduction26ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM25Viewed from left to right, the UTM25 front panel contains the follo
Content Filtering and Optimizing Scans260ProSecure Unified Threat Management (UTM) Appliance • Web Category. Figure 147. Custom categories: web categ
Content Filtering and Optimizing Scans261 ProSecure Unified Threat Management (UTM) ApplianceCategory Type(continued)Application(continued)To remove o
Content Filtering and Optimizing Scans262ProSecure Unified Threat Management (UTM) Appliance 5. Click Apply to save your settings. The new category is
Content Filtering and Optimizing Scans263 ProSecure Unified Threat Management (UTM) ApplianceFigure 148. 2. In the Add Scanning Exclusions section of
26477. Virtual Private NetworkingUsing IPSec, PPTP, or L2TP ConnectionsThis chapter describes how to use the IP security (IPSec) virtual private net
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections265 ProSecure Unified Threat Management (UTM) Appliancebalancing mode if the IP addre
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections266ProSecure Unified Threat Management (UTM) Appliance Use the IPSec VPN Wizard for C
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections267 ProSecure Unified Threat Management (UTM) Appliance• Multiple WAN port models. A
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections268ProSecure Unified Threat Management (UTM) Appliance Figure 153. The VPN Wizard de
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections269 ProSecure Unified Threat Management (UTM) Appliance2. Select the radio buttons an
Introduction27 ProSecure Unified Threat Management (UTM) ApplianceFigure 4. Front panel UTM50Front Panel UTM150Viewed from left to right, the UTM150 f
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections270ProSecure Unified Threat Management (UTM) Appliance Tip: To ensure that tunnels st
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections271 ProSecure Unified Threat Management (UTM) ApplianceFigure 155. b. Locate the pol
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections272ProSecure Unified Threat Management (UTM) Appliance Use the VPN Wizard to Configur
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections273 ProSecure Unified Threat Management (UTM) ApplianceTo display the wizard default
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections274ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections275 ProSecure Unified Threat Management (UTM) ApplianceFigure 158. Note: When you ar
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections276ProSecure Unified Threat Management (UTM) Appliance Use the NETGEAR VPN Client Wiz
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections277 ProSecure Unified Threat Management (UTM) ApplianceFigure 160. 3. Select the A r
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections278ProSecure Unified Threat Management (UTM) Appliance Figure 162. 6. This screen is
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections279 ProSecure Unified Threat Management (UTM) Appliancec. Specify the settings that a
Introduction28ProSecure Unified Threat Management (UTM) Appliance Front Panel UTM9S and UTM25S and Network ModulesViewed from left to right, the UTM9S
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections280ProSecure Unified Threat Management (UTM) Appliance Figure 164. b. Specify the de
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections281 ProSecure Unified Threat Management (UTM) ApplianceConfigure the Authentication S
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections282ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections283 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to use the new
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections284ProSecure Unified Threat Management (UTM) Appliance 8. Click Apply to use the new
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections285 ProSecure Unified Threat Management (UTM) ApplianceFigure 169. 3. Specify the se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections286ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to use the new
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections287 ProSecure Unified Threat Management (UTM) ApplianceTest the Connection and View C
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections288ProSecure Unified Threat Management (UTM) Appliance Perform one of the following t
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections289 ProSecure Unified Threat Management (UTM) ApplianceNETGEAR VPN Client Status and
Introduction29 ProSecure Unified Threat Management (UTM) AppliancexDSL Network ModulesThe following xDSL network modules are available for insertion i
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections290ProSecure Unified Threat Management (UTM) Appliance The Active IPSec SA(s) table l
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections291 ProSecure Unified Threat Management (UTM) ApplianceFigure 178. Manage IPSec VPN a
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections292ProSecure Unified Threat Management (UTM) Appliance Manage IKE PoliciesThe Interne
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections293 ProSecure Unified Threat Management (UTM) ApplianceFigure 179. Each policy contai
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections294ProSecure Unified Threat Management (UTM) Appliance To delete one or more IKE po
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections295 ProSecure Unified Threat Management (UTM) ApplianceFigure 180.
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections296ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections297 ProSecure Unified Threat Management (UTM) ApplianceIdentifier Type From the drop-
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections298ProSecure Unified Threat Management (UTM) Appliance Authentication Method Select o
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections299 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se
3ProSecure Unified Threat Management (UTM) Appliance 202-10780-03(continued)1.0(continued)October 2012(continued)(continued)• Added Appendix C, 3G/4G
Introduction30ProSecure Unified Threat Management (UTM) Appliance Figure 8. Wireless network moduleLED Descriptions, UTM5, UTM10, UTM25, UTM50, and UT
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections300ProSecure Unified Threat Management (UTM) Appliance Manage VPN Policies You can cr
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections301 ProSecure Unified Threat Management (UTM) ApplianceFigure 181. Each policy contai
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections302ProSecure Unified Threat Management (UTM) Appliance To delete one or more VPN po
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections303 ProSecure Unified Threat Management (UTM) ApplianceFigure 182.
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections304ProSecure Unified Threat Management (UTM) Appliance 3. Complete the fields, select
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections305 ProSecure Unified Threat Management (UTM) ApplianceEnable KeepaliveNote: See also
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections306ProSecure Unified Threat Management (UTM) Appliance Encryption Algorithm From the
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections307 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections308ProSecure Unified Threat Management (UTM) Appliance To edit a VPN policy:1. Sele
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections309 ProSecure Unified Threat Management (UTM) ApplianceConfigure XAUTH for VPN Client
Introduction31 ProSecure Unified Threat Management (UTM) ApplianceLAN portsLeft LED Off The LAN port has no link.On (green) The LAN port has detected
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections310ProSecure Unified Threat Management (UTM) Appliance User Database ConfigurationWhe
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections311 ProSecure Unified Threat Management (UTM) Appliance2. Complete the fields and sel
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections312ProSecure Unified Threat Management (UTM) Appliance Assign IP Addresses to Remote
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections313 ProSecure Unified Threat Management (UTM) Appliance To configure Mode Config on
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections314ProSecure Unified Threat Management (UTM) Appliance Figure 185. 3. Complete the f
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections315 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections316ProSecure Unified Threat Management (UTM) Appliance 6. Under the List of IKE Polic
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections317 ProSecure Unified Threat Management (UTM) ApplianceNote: The IKE policy settings
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections318ProSecure Unified Threat Management (UTM) Appliance IKE SA ParametersNote: General
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections319 ProSecure Unified Threat Management (UTM) Appliance8. Click Apply to save your se
Introduction32ProSecure Unified Threat Management (UTM) Appliance LED Descriptions, UTM9S, UTM25S, and their Network ModulesThe following table descri
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections320ProSecure Unified Threat Management (UTM) Appliance Note: Perform these tasks from
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections321 ProSecure Unified Threat Management (UTM) ApplianceFigure 188. 3. Change the nam
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections322ProSecure Unified Threat Management (UTM) Appliance 4. Specify the settings that a
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections323 ProSecure Unified Threat Management (UTM) Appliance7. Specify the settings that a
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections324ProSecure Unified Threat Management (UTM) Appliance Note: This is the name for the
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections325 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to use the new
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections326ProSecure Unified Threat Management (UTM) Appliance 2. Specify the following defau
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections327 ProSecure Unified Threat Management (UTM) ApplianceFigure 195. 3. From the clien
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections328ProSecure Unified Threat Management (UTM) Appliance Configure Keep-Alives and Dead
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections329 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as expla
Introduction33 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM5, UTM10, and UTM25The rear panel of the UTM5, UTM10, and UTM25 includ
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections330ProSecure Unified Threat Management (UTM) Appliance 3. In the IKE SA Parameters se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections331 ProSecure Unified Threat Management (UTM) ApplianceFigure 198. 3. Select the Ena
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections332ProSecure Unified Threat Management (UTM) Appliance To enable the PPTP server an
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections333 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your se
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections334ProSecure Unified Threat Management (UTM) Appliance The List of PPTP Active Users
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections335 ProSecure Unified Threat Management (UTM) ApplianceFigure 201. 2. Enter the sett
Virtual Private Networking Using IPSec, PPTP, or L2TP Connections336ProSecure Unified Threat Management (UTM) Appliance View the Active L2TP Users To
33788. Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically to provide remote acc
Virtual Private Networking Using SSL Connections338ProSecure Unified Threat Management (UTM) Appliance • SSL port forwarding. Like an SSL VPN tunnel,
Virtual Private Networking Using SSL Connections339 ProSecure Unified Threat Management (UTM) Appliance2. Select the SSL VPN Wizard radio button.3. Cl
Introduction34ProSecure Unified Threat Management (UTM) Appliance Viewed from left to right, the rear panel of the UTM5, UTM10, and UTM25 contains the
Virtual Private Networking Using SSL Connections340ProSecure Unified Threat Management (UTM) Appliance WARNING:Do not enter an existing portal layout
Virtual Private Networking Using SSL Connections341 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V
Virtual Private Networking Using SSL Connections342ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 2 of 6 (Domain Settings)Fig
Virtual Private Networking Using SSL Connections343 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing domain name in
Virtual Private Networking Using SSL Connections344ProSecure Unified Threat Management (UTM) Appliance Authentication Type(continued)• WIKID-CHAP. WiK
Virtual Private Networking Using SSL Connections345 ProSecure Unified Threat Management (UTM) AppliancePortal The portal that you selected on the firs
Virtual Private Networking Using SSL Connections346ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V
Virtual Private Networking Using SSL Connections347 ProSecure Unified Threat Management (UTM) ApplianceSSL VPN Wizard Step 3 of 6 (User Settings)Figur
Virtual Private Networking Using SSL Connections348ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in the SSL V
Virtual Private Networking Using SSL Connections349 ProSecure Unified Threat Management (UTM) ApplianceWARNING:Do not enter an existing route for a VP
Introduction35 ProSecure Unified Threat Management (UTM) ApplianceRear Panel UTM9S and UTM25SThe rear panel of the UTM9S and UTM25S includes the cable
Virtual Private Networking Using SSL Connections350ProSecure Unified Threat Management (UTM) Appliance SSL VPN Wizard Step 5 of 6 (Port Forwarding)Not
Virtual Private Networking Using SSL Connections351 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in the SSL V
Virtual Private Networking Using SSL Connections352ProSecure Unified Threat Management (UTM) Appliance Figure 209.
Virtual Private Networking Using SSL Connections353 ProSecure Unified Threat Management (UTM) ApplianceClick Apply to save your settings. If the setti
Virtual Private Networking Using SSL Connections354ProSecure Unified Threat Management (UTM) Appliance Figure 211. 3. To verify access, enter the use
Virtual Private Networking Using SSL Connections355 ProSecure Unified Threat Management (UTM) ApplianceFigure 212. Figure 213. A portal screen displ
Virtual Private Networking Using SSL Connections356ProSecure Unified Threat Management (UTM) Appliance Note: The first time that a user attempts to co
Virtual Private Networking Using SSL Connections357 ProSecure Unified Threat Management (UTM) ApplianceView the UTM SSL VPN Log To query the SSL VPN
Virtual Private Networking Using SSL Connections358ProSecure Unified Threat Management (UTM) Appliance 2. Create authentication domains, user groups,
Virtual Private Networking Using SSL Connections359 ProSecure Unified Threat Management (UTM) ApplianceManually Create or Modify the Portal LayoutThe
Introduction36ProSecure Unified Threat Management (UTM) Appliance Bottom Panels with Product LabelsThe product label on the bottom of the UTM’s enclos
Virtual Private Networking Using SSL Connections360ProSecure Unified Threat Management (UTM) Appliance The List of Layouts table displays the followin
Virtual Private Networking Using SSL Connections361 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and select the check box
Virtual Private Networking Using SSL Connections362ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The new p
Virtual Private Networking Using SSL Connections363 ProSecure Unified Threat Management (UTM) ApplianceConfigure Applications for Port ForwardingPort
Virtual Private Networking Using SSL Connections364ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new applicat
Virtual Private Networking Using SSL Connections365 ProSecure Unified Threat Management (UTM) Appliance2. In the Add New Host Name for Port Forwarding
Virtual Private Networking Using SSL Connections366ProSecure Unified Threat Management (UTM) Appliance Configure the Client IP Address RangeFirst dete
Virtual Private Networking Using SSL Connections367 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings. VPN tunne
Virtual Private Networking Using SSL Connections368ProSecure Unified Threat Management (UTM) Appliance To change the specifications of an existing r
Virtual Private Networking Using SSL Connections369 ProSecure Unified Threat Management (UTM) ApplianceUse Network Resource Objects to Simplify Polici
Introduction37 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25:Figure 14. The following
Virtual Private Networking Using SSL Connections370ProSecure Unified Threat Management (UTM) Appliance To delete one or more network resources:1. Se
Virtual Private Networking Using SSL Connections371 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The new c
Virtual Private Networking Using SSL Connections372ProSecure Unified Threat Management (UTM) Appliance For example, assume the following global policy
Virtual Private Networking Using SSL Connections373 ProSecure Unified Threat Management (UTM) ApplianceView Policies To view the existing policies:1.
Virtual Private Networking Using SSL Connections374ProSecure Unified Threat Management (UTM) Appliance .Figure 224. 3. Select the radio buttons, comp
Virtual Private Networking Using SSL Connections375 ProSecure Unified Threat Management (UTM) ApplianceApply Policy For(continued)Network ResourcePoli
Virtual Private Networking Using SSL Connections376ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The polic
Virtual Private Networking Using SSL Connections377 ProSecure Unified Threat Management (UTM) Appliance To delete one or more SSL VPN policies:1. On
37899. Manage Users, Authentication, and VPN CertificatesThis chapter describes how to manage users, authentication, and security certificates for I
Manage Users, Authentication, and VPN Certificates379 ProSecure Unified Threat Management (UTM) ApplianceThe UTM supports security policies that are b
Introduction38ProSecure Unified Threat Management (UTM) Appliance The following figure shows the product label for the UTM150:Figure 16. The following
Manage Users, Authentication, and VPN Certificates380ProSecure Unified Threat Management (UTM) Appliance Configure Authentication Domains, Groups, and
Manage Users, Authentication, and VPN Certificates381 ProSecure Unified Threat Management (UTM) ApplianceFigure 225. Users with Special Access Privile
Manage Users, Authentication, and VPN Certificates382ProSecure Unified Threat Management (UTM) Appliance Figure 226. The User Portal Login screen disp
Manage Users, Authentication, and VPN Certificates383 ProSecure Unified Threat Management (UTM) ApplianceFigure 227. If you do not use the DC agent in
Manage Users, Authentication, and VPN Certificates384ProSecure Unified Threat Management (UTM) Appliance For information about how to configure and mo
Manage Users, Authentication, and VPN Certificates385 ProSecure Unified Threat Management (UTM) Appliance• An OU is created in the root node (for exam
Manage Users, Authentication, and VPN Certificates386ProSecure Unified Threat Management (UTM) Appliance Figure 228. 4. To verify Jamie Hanson’s user
Manage Users, Authentication, and VPN Certificates387 ProSecure Unified Threat Management (UTM) Appliance6. Select Users > Domains. 7. Click Add. T
Manage Users, Authentication, and VPN Certificates388ProSecure Unified Threat Management (UTM) Appliance Figure 231. 14. Complete the remaining field
Manage Users, Authentication, and VPN Certificates389 ProSecure Unified Threat Management (UTM) ApplianceThe List of Domains table displays the domain
Introduction39 ProSecure Unified Threat Management (UTM) ApplianceThe following figure shows the product label for the UTM25S:Figure 18. Choose a Loca
Manage Users, Authentication, and VPN Certificates390ProSecure Unified Threat Management (UTM) Appliance 3. Enter the settings as explained in the fol
Manage Users, Authentication, and VPN Certificates391 ProSecure Unified Threat Management (UTM) ApplianceAuthentication Type(continued)Note: If you se
Manage Users, Authentication, and VPN Certificates392ProSecure Unified Threat Management (UTM) Appliance Authentication Secret All RADIUS, WiKID, and
Manage Users, Authentication, and VPN Certificates393 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The dom
Manage Users, Authentication, and VPN Certificates394ProSecure Unified Threat Management (UTM) Appliance To delete one or more domains:1. In the Lis
Manage Users, Authentication, and VPN Certificates395 ProSecure Unified Threat Management (UTM) ApplianceCreate and Delete Groups To create a VPN gro
Manage Users, Authentication, and VPN Certificates396ProSecure Unified Threat Management (UTM) Appliance 2. In the Add New Group section of the screen
Manage Users, Authentication, and VPN Certificates397 ProSecure Unified Threat Management (UTM) ApplianceFigure 235. Except for groups that are assoc
Manage Users, Authentication, and VPN Certificates398ProSecure Unified Threat Management (UTM) Appliance Figure 236. 2. Under the Custom Groups table
Manage Users, Authentication, and VPN Certificates399 ProSecure Unified Threat Management (UTM) Appliance3. Complete the fields and make your selectio
4ProSecure Unified Threat Management (UTM) Appliance 202-10780-01 1.0 September 2011 • Added the UTM9S with the following major new features:- xDSL m
Introduction40ProSecure Unified Threat Management (UTM) Appliance Use the Rack-Mounting KitUse the mounting kit for the UTM to install the appliance i
Manage Users, Authentication, and VPN Certificates400ProSecure Unified Threat Management (UTM) Appliance 4. After you have specified all members of th
Manage Users, Authentication, and VPN Certificates401 ProSecure Unified Threat Management (UTM) ApplianceConfigure User AccountsThe UTM supports both
Manage Users, Authentication, and VPN Certificates402ProSecure Unified Threat Management (UTM) Appliance Figure 238. The List of Users table displays
Manage Users, Authentication, and VPN Certificates403 ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the fol
Manage Users, Authentication, and VPN Certificates404ProSecure Unified Threat Management (UTM) Appliance Set User Login PoliciesYou can restrict the a
Manage Users, Authentication, and VPN Certificates405 ProSecure Unified Threat Management (UTM) ApplianceConfigure Login Restrictions Based on IP Addr
Manage Users, Authentication, and VPN Certificates406ProSecure Unified Threat Management (UTM) Appliance 6. In the Add Defined Addresses section of th
Manage Users, Authentication, and VPN Certificates407 ProSecure Unified Threat Management (UTM) ApplianceFigure 242. 4. In the Defined Browsers Statu
Manage Users, Authentication, and VPN Certificates408ProSecure Unified Threat Management (UTM) Appliance Change Passwords and Other User SettingsFor a
Manage Users, Authentication, and VPN Certificates409 ProSecure Unified Threat Management (UTM) Appliance3. Modify the settings as explained in the fo
4122. Use the Setup Wizard to Provision the UTM in Your NetworkThis chapter explains how to log in to the UTM and use the web management interface,
Manage Users, Authentication, and VPN Certificates410ProSecure Unified Threat Management (UTM) Appliance Note: The DC agent does not function with LDA
Manage Users, Authentication, and VPN Certificates411 ProSecure Unified Threat Management (UTM) Appliance To download ProSecure DC Agent software and
Manage Users, Authentication, and VPN Certificates412ProSecure Unified Threat Management (UTM) Appliance 4. On the DC Agent screen (see Figure 244 on
Manage Users, Authentication, and VPN Certificates413 ProSecure Unified Threat Management (UTM) Applianceb. Click the Add table button to add a domain
Manage Users, Authentication, and VPN Certificates414ProSecure Unified Threat Management (UTM) Appliance 2. Add a DC agent on the UTM50:a. Select User
Manage Users, Authentication, and VPN Certificates415 ProSecure Unified Threat Management (UTM) ApplianceConfigure RADIUS VLANsYou can use a RADIUS vi
Manage Users, Authentication, and VPN Certificates416ProSecure Unified Threat Management (UTM) Appliance 3. Click the Add table button. The new VLAN i
Manage Users, Authentication, and VPN Certificates417 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save the session settings.5
Manage Users, Authentication, and VPN Certificates418ProSecure Unified Threat Management (UTM) Appliance To view all or selected users:1. On the Act
Manage Users, Authentication, and VPN Certificates419 ProSecure Unified Threat Management (UTM) ApplianceThe List of Users table displays the followin
Use the Setup Wizard to Provision the UTM in Your Network42ProSecure Unified Threat Management (UTM) Appliance 4. Verify the installation. See Verify
Manage Users, Authentication, and VPN Certificates420ProSecure Unified Threat Management (UTM) Appliance On the UTM, the uploaded digital certificate
Manage Users, Authentication, and VPN Certificates421 ProSecure Unified Threat Management (UTM) Appliance• Active Self Certificates table. Contains th
Manage Users, Authentication, and VPN Certificates422ProSecure Unified Threat Management (UTM) Appliance To upload a digital certificate of a truste
Manage Users, Authentication, and VPN Certificates423 ProSecure Unified Threat Management (UTM) ApplianceGenerate a CSR and Obtain a Self-Signed Certi
Manage Users, Authentication, and VPN Certificates424ProSecure Unified Threat Management (UTM) Appliance 2. In the Generate Self Certificate Request s
Manage Users, Authentication, and VPN Certificates425 ProSecure Unified Threat Management (UTM) ApplianceFigure 256. 5. Copy the contents of the Data
Manage Users, Authentication, and VPN Certificates426ProSecure Unified Threat Management (UTM) Appliance To delete one or more SCRs:1. In the Self C
Manage Users, Authentication, and VPN Certificates427 ProSecure Unified Threat Management (UTM) ApplianceThe Certificate Revocation Lists (CRL) table
4281010. Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its performance and the system m
Network and System Management429 ProSecure Unified Threat Management (UTM) Appliance- Auto-rollover mode (multiple WAN port models only). 1000 Mbps (o
Use the Setup Wizard to Provision the UTM in Your Network43 ProSecure Unified Threat Management (UTM) ApplianceFigure 20. 3. In the User Name field,
Network and System Management430ProSecure Unified Threat Management (UTM) Appliance The following section summarizes the various criteria that you can
Network and System Management431 ProSecure Unified Threat Management (UTM) Appliance• QoS profile. You can define QoS profiles and then apply them to
Network and System Management432ProSecure Unified Threat Management (UTM) Appliance - Web services blocking. You can block web services such as instan
Network and System Management433 ProSecure Unified Threat Management (UTM) ApplianceEach rule lets you specify the desired action for the connections
Network and System Management434ProSecure Unified Threat Management (UTM) Appliance • Users allowed. You can specify that the rule applies to individu
Network and System Management435 ProSecure Unified Threat Management (UTM) ApplianceConfigure Exposed HostsSpecifying an exposed host allows you to se
Network and System Management436ProSecure Unified Threat Management (UTM) Appliance Monitoring Tools for Traffic ManagementThe UTM includes several to
Network and System Management437 ProSecure Unified Threat Management (UTM) Appliance2. In the Action column of the List of Users table, click the Edit
Network and System Management438ProSecure Unified Threat Management (UTM) Appliance Note: For enhanced security, restrict access to as few external IP
Network and System Management439 ProSecure Unified Threat Management (UTM) Appliance2. Select one of the following radio buttons:• Yes. Enable HTTPS r
Use the Setup Wizard to Provision the UTM in Your Network44ProSecure Unified Threat Management (UTM) Appliance Figure 21. Web Management Interface Men
Network and System Management440ProSecure Unified Threat Management (UTM) Appliance Note: If you are unable to connect remotely to the UTM after enabl
Network and System Management441 ProSecure Unified Threat Management (UTM) ApplianceFigure 261.
Network and System Management442ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:3. Click
Network and System Management443 ProSecure Unified Threat Management (UTM) Appliance To configure the SNMPv3 settings:1. Select Administration > S
Network and System Management444ProSecure Unified Threat Management (UTM) Appliance 4. Click Apply to save your settings. The SNMPv3 user profile is a
Network and System Management445 ProSecure Unified Threat Management (UTM) ApplianceThe SNMPv3 Settings table shows the following columns:• User Name.
Network and System Management446ProSecure Unified Threat Management (UTM) Appliance Figure 263. Back Up SettingsThe backup feature saves all UTM setti
Network and System Management447 ProSecure Unified Threat Management (UTM) ApplianceRestore SettingsWARNING:Restore only settings that were backed up
Network and System Management448ProSecure Unified Threat Management (UTM) Appliance WARNING:When you press the hardware Factory Defaults reset button
Network and System Management449 ProSecure Unified Threat Management (UTM) ApplianceFigure 264. Firmware screen, available versionsThe Firmware Reboo
Use the Setup Wizard to Provision the UTM in Your Network45 ProSecure Unified Threat Management (UTM) ApplianceFigure 22. The web management interface
Network and System Management450ProSecure Unified Threat Management (UTM) Appliance To upgrade the UTM’s firmware directly from an update server and
Network and System Management451 ProSecure Unified Threat Management (UTM) ApplianceThe UTM reboots automatically. During the reboot process, the Firm
Network and System Management452ProSecure Unified Threat Management (UTM) Appliance To upgrade the UTM’s firmware from a downloaded file and reboot
Network and System Management453 ProSecure Unified Threat Management (UTM) Appliance3. (Optional) To install the new firmware version and reboot the U
Network and System Management454ProSecure Unified Threat Management (UTM) Appliance Reboot without Changing the Firmware To reboot the UTM without ch
Network and System Management455 ProSecure Unified Threat Management (UTM) ApplianceFigure 267. The Info section onscreen shows the following informat
Network and System Management456ProSecure Unified Threat Management (UTM) Appliance Configure Automatic Update and Frequency Settings To configure th
Network and System Management457 ProSecure Unified Threat Management (UTM) Appliance To set time, date, and NTP servers:1. Select Administration >
Network and System Management458ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save your settings.Note: If you select the defau
Network and System Management459 ProSecure Unified Threat Management (UTM) ApplianceLog StorageAfter you have integrated a ReadyNAS with the UTM—wheth
Use the Setup Wizard to Provision the UTM in Your Network46ProSecure Unified Threat Management (UTM) Appliance • Back. Go to the previous screen (for
Network and System Management460ProSecure Unified Threat Management (UTM) Appliance Figure 269. 2. To connect to the ReadyNAS, select the Yes radio b
Network and System Management461 ProSecure Unified Threat Management (UTM) ApplianceFigure 270. 2. To enable the UTM to quarantine files, select the
4621111. Monitor System Access and PerformanceThis chapter describes the system-monitoring features of the UTM. You can be alerted to important even
Monitor System Access and Performance463 ProSecure Unified Threat Management (UTM) Appliance To monitor traffic limits on each of the WAN ports, and
Monitor System Access and Performance464ProSecure Unified Threat Management (UTM) Appliance Table 114. WAN traffic meter settingsSetting DescriptionE
Monitor System Access and Performance465 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.4. For the multiple W
Monitor System Access and Performance466ProSecure Unified Threat Management (UTM) Appliance Configure Logging, Alerts, and Event Notifications• Config
Monitor System Access and Performance467 ProSecure Unified Threat Management (UTM) ApplianceFigure 273. 6. Enter the settings as explained in the fol
Monitor System Access and Performance468ProSecure Unified Threat Management (UTM) Appliance To configure and activate logs:1. Select Monitoring >
Monitor System Access and Performance469 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:
Use the Setup Wizard to Provision the UTM in Your Network47 ProSecure Unified Threat Management (UTM) ApplianceUse the Setup Wizard to Perform the Ini
Monitor System Access and Performance470ProSecure Unified Threat Management (UTM) Appliance Enable (continued)Select Logs to Send(continued)• Service
Monitor System Access and Performance471 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings, or click Clear Log I
Monitor System Access and Performance472ProSecure Unified Threat Management (UTM) Appliance 3. Click Apply to save the settings. To change the remote
Monitor System Access and Performance473 ProSecure Unified Threat Management (UTM) Appliance To specify the syslog server that is connected to Gatewa
Monitor System Access and Performance474ProSecure Unified Threat Management (UTM) Appliance Figure 275. 2. Enter the settings as explained in the fol
Monitor System Access and Performance475 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Enable Malware Alerts
Monitor System Access and Performance476ProSecure Unified Threat Management (UTM) Appliance Configure and Activate Firewall LogsYou can configure the
Monitor System Access and Performance477 ProSecure Unified Threat Management (UTM) Appliance3. Click Apply to save your settings.Monitor Real-Time Tra
Monitor System Access and Performance478ProSecure Unified Threat Management (UTM) Appliance Figure 277. Dashboard, screen 1 of 3To clear the statistic
Monitor System Access and Performance479 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro
Use the Setup Wizard to Provision the UTM in Your Network48ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 1 of 10: LAN Settings
Monitor System Access and Performance480ProSecure Unified Threat Management (UTM) Appliance Figure 278. Dashboard, screen 2 of 3Threats (Counts)This i
Monitor System Access and Performance481 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Most Recent
Monitor System Access and Performance482ProSecure Unified Threat Management (UTM) Appliance Figure 279. Dashboard, screen 3 of 3The following table ex
Monitor System Access and Performance483 ProSecure Unified Threat Management (UTM) ApplianceMonitor Application Use in Real TimeIf you have enabled ap
Monitor System Access and Performance484ProSecure Unified Threat Management (UTM) Appliance Figure 280. Line chart iconPie chart icon
Monitor System Access and Performance485 ProSecure Unified Threat Management (UTM) Appliance To set the poll interval:1. Click the Stop button.2. Fro
Monitor System Access and Performance486ProSecure Unified Threat Management (UTM) Appliance View Status Screens• View the System Status• View the Acti
Monitor System Access and Performance487 ProSecure Unified Threat Management (UTM) ApplianceView the System Status ScreenTo view the System Status scr
Monitor System Access and Performance488ProSecure Unified Threat Management (UTM) Appliance View the Network Status ScreenTo view the Network Status s
Monitor System Access and Performance489 ProSecure Unified Threat Management (UTM) Applianceavailable wireless access point, and has a Wireless Statis
Use the Setup Wizard to Provision the UTM in Your Network49 ProSecure Unified Threat Management (UTM) ApplianceTable 4. Setup Wizard Step 1: LAN Sett
Monitor System Access and Performance490ProSecure Unified Threat Management (UTM) Appliance View the Router Statistics Screen To view the Router Stat
Monitor System Access and Performance491 ProSecure Unified Threat Management (UTM) ApplianceTo change the poll interval period, enter a new value in t
Monitor System Access and Performance492ProSecure Unified Threat Management (UTM) Appliance The following table explains the fields of the Wireless St
Monitor System Access and Performance493 ProSecure Unified Threat Management (UTM) ApplianceView the Detailed Status ScreenTo view the Detailed Status
Monitor System Access and Performance494ProSecure Unified Threat Management (UTM) Appliance Figure 287. Detailed Status screen sections that are speci
Monitor System Access and Performance495 ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the Detailed St
Monitor System Access and Performance496ProSecure Unified Threat Management (UTM) Appliance Firmware Version (UTM9S and UTM25S only)The firmware on th
Monitor System Access and Performance497 ProSecure Unified Threat Management (UTM) ApplianceMAC Address For the WAN or xDSL ports, this field displays
Monitor System Access and Performance498ProSecure Unified Threat Management (UTM) Appliance View the VLAN Status ScreenThe VLAN Status screen displays
Monitor System Access and Performance499 ProSecure Unified Threat Management (UTM) ApplianceView the xDSL Statistics Screen (UTM9S and UTM25S Only)To
5ContentsChapter 1 IntroductionWhat Is the ProSecure Unified Threat Management (UTM) Appliance? . .15Key Features and Capabilities . . . . . . . . . .
Use the Setup Wizard to Provision the UTM in Your Network50ProSecure Unified Threat Management (UTM) Appliance Enable DHCP Server(continued)Primary DN
Monitor System Access and Performance500ProSecure Unified Threat Management (UTM) Appliance View the VPN Tunnel Connection StatusTo review the status
Monitor System Access and Performance501 ProSecure Unified Threat Management (UTM) ApplianceFigure 292. The active user’s user name, group, and IP add
Monitor System Access and Performance502ProSecure Unified Threat Management (UTM) Appliance The default poll interval is 5 seconds. To change the poll
Monitor System Access and Performance503 ProSecure Unified Threat Management (UTM) ApplianceFigure 295. 2. Select the Status option arrow in the uppe
Monitor System Access and Performance504ProSecure Unified Threat Management (UTM) Appliance View the WAN, xDSL, or USB Port StatusYou can view the sta
Monitor System Access and Performance505 ProSecure Unified Threat Management (UTM) ApplianceDepending on the type of connections, any of the following
Monitor System Access and Performance506ProSecure Unified Threat Management (UTM) Appliance Figure 298. 2. Select the LAN Groups submenu tab. The LAN
Monitor System Access and Performance507 ProSecure Unified Threat Management (UTM) Appliancemanually to add a meaningful name). If the computer or dev
Monitor System Access and Performance508ProSecure Unified Threat Management (UTM) Appliance Overview of the LogsThe UTM generates logs that provide de
Monitor System Access and Performance509 ProSecure Unified Threat Management (UTM) ApplianceYou can query and generate each type of log separately and
Use the Setup Wizard to Provision the UTM in Your Network51 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t
Monitor System Access and Performance510ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:
Monitor System Access and Performance511 ProSecure Unified Threat Management (UTM) ApplianceView All Select one of the following radio buttons:• View
Monitor System Access and Performance512ProSecure Unified Threat Management (UTM) Appliance Search Criteria(continued)Category or CategoriesFrom the d
Monitor System Access and Performance513 ProSecure Unified Threat Management (UTM) Appliance3. Click one of the following action buttons:• Search. Que
Monitor System Access and Performance514ProSecure Unified Threat Management (UTM) Appliance Log ManagementGenerated logs take up space and resources o
Monitor System Access and Performance515 ProSecure Unified Threat Management (UTM) ApplianceQuery the Quarantined Logs To query the quarantine logs:1
Monitor System Access and Performance516ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings as explained in the following table:
Monitor System Access and Performance517 ProSecure Unified Threat Management (UTM) ApplianceView and Manage the Quarantined Spam TableWhen you query t
Monitor System Access and Performance518ProSecure Unified Threat Management (UTM) Appliance After you have selected one or more table entries, take on
Monitor System Access and Performance519 ProSecure Unified Threat Management (UTM) Appliance• Client IP. The client IP address from which the spyware
Use the Setup Wizard to Provision the UTM in Your Network52ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the
Monitor System Access and Performance520ProSecure Unified Threat Management (UTM) Appliance 2. Click the Check your quarantined mail link. The followi
Monitor System Access and Performance521 ProSecure Unified Threat Management (UTM) ApplianceYou can view the reports onscreen, download them to your c
Monitor System Access and Performance522ProSecure Unified Threat Management (UTM) Appliance 2. Select the Enable Application Session Monitoring check
Monitor System Access and Performance523 ProSecure Unified Threat Management (UTM) Appliance2. Enter the settings as explained in the following table:
Monitor System Access and Performance524ProSecure Unified Threat Management (UTM) Appliance 3. The next step depends on whether you want to view the r
Monitor System Access and Performance525 ProSecure Unified Threat Management (UTM) ApplianceFigure 309. Report, screen 2 of 4Note: For information ab
Monitor System Access and Performance526ProSecure Unified Threat Management (UTM) Appliance URL Filtering by Time For the HTTPS and HTTP protocols sep
Monitor System Access and Performance527 ProSecure Unified Threat Management (UTM) ApplianceTop n Categories By Request For all web server protocols c
Monitor System Access and Performance528ProSecure Unified Threat Management (UTM) Appliance Top n Applications by BandwidthA chart and a table with th
Monitor System Access and Performance529 ProSecure Unified Threat Management (UTM) ApplianceSchedule, Email, and Manage Reports To schedule automatic
Use the Setup Wizard to Provision the UTM in Your Network53 ProSecure Unified Threat Management (UTM) ApplianceAustria (PPTP)(continued)My IP Address
Monitor System Access and Performance530ProSecure Unified Threat Management (UTM) Appliance 2. Enter the settings in the Schedule Reports section as e
Monitor System Access and Performance531 ProSecure Unified Threat Management (UTM) ApplianceFigure 311. Report, screen 4 of 4The Report History sectio
Monitor System Access and Performance532ProSecure Unified Threat Management (UTM) Appliance To display the Diagnostics screen, select Monitoring >
Monitor System Access and Performance533 ProSecure Unified Threat Management (UTM) ApplianceTrace a RouteA traceroute lists all routers between the so
Monitor System Access and Performance534ProSecure Unified Threat Management (UTM) Appliance out which applications are using the most bandwidth, which
Monitor System Access and Performance535 ProSecure Unified Threat Management (UTM) ApplianceFigure 314. Diagnostics, screen 3 of 4Gather Important Log
Monitor System Access and Performance536ProSecure Unified Threat Management (UTM) Appliance Perform Maintenance on the USB Device, Reboot the UTM,or S
Monitor System Access and Performance537 ProSecure Unified Threat Management (UTM) ApplianceNote: Rebooting breaks any existing connections either to
5381212. Troubleshoot and Use Online SupportThis chapter provides troubleshooting tips and information for the UTM. After each problem description,
Troubleshoot and Use Online Support539 ProSecure Unified Threat Management (UTM) ApplianceBasic Functioning• Verify the Correct Sequence of Events at
Use the Setup Wizard to Provision the UTM in Your Network54ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t
Troubleshoot and Use Online Support540ProSecure Unified Threat Management (UTM) Appliance If all LEDs are still on more than several minutes minute
Troubleshoot and Use Online Support541 ProSecure Unified Threat Management (UTM) Appliance• Make sure that you are using the correct login information
Troubleshoot and Use Online Support542ProSecure Unified Threat Management (UTM) Appliance To check the WAN IP address: 1. Launch your browser and na
Troubleshoot and Use Online Support543 ProSecure Unified Threat Management (UTM) ApplianceIf your UTM can obtain an IP address, but an attached comput
Troubleshoot and Use Online Support544ProSecure Unified Threat Management (UTM) Appliance - Check that the corresponding Link LEDs are on for your
Troubleshoot and Use Online Support545 ProSecure Unified Threat Management (UTM) ApplianceRestore the Default Configuration and PasswordTo reset the U
Troubleshoot and Use Online Support546ProSecure Unified Threat Management (UTM) Appliance Problems with Date and TimeThe System Date & Time screen
Troubleshoot and Use Online Support547 ProSecure Unified Threat Management (UTM) ApplianceFigure 317. 2. In the Support Key field, enter the support
Troubleshoot and Use Online Support548ProSecure Unified Threat Management (UTM) Appliance Figure 318. 2. Enter the settings as explained in the follo
549AA. xDSL Network Module for the UTM9S and UTM25SThis appendix describes how to configure the DSL interfaces of the NMSDSLA and NMSDSLB network mo
Use the Setup Wizard to Provision the UTM in Your Network55 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the
xDSL Network Module for the UTM9S and UTM25S550ProSecure Unified Threat Management (UTM) AppliancexDSL Network Module Configuration TasksGenerally, si
xDSL Network Module for the UTM9S and UTM25S551ProSecure Unified Threat Management (UTM) Appliance To configure the xDSL settings:1. Select Network C
xDSL Network Module for the UTM9S and UTM25S552ProSecure Unified Threat Management (UTM) ApplianceFigure 321. 4. Either click Auto Detect or, if you
xDSL Network Module for the UTM9S and UTM25S553ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Automatically D
xDSL Network Module for the UTM9S and UTM25S554ProSecure Unified Threat Management (UTM) ApplianceYou can set the failure detection method for the DSL
xDSL Network Module for the UTM9S and UTM25S555ProSecure Unified Threat Management (UTM) Appliance3. Click the Auto Detect button at the bottom of the
xDSL Network Module for the UTM9S and UTM25S556ProSecure Unified Threat Management (UTM) ApplianceFigure 324. Note: The Connection Status screen shou
xDSL Network Module for the UTM9S and UTM25S557ProSecure Unified Threat Management (UTM) ApplianceFigure 325. 2. Click the Edit button in the Action
xDSL Network Module for the UTM9S and UTM25S558ProSecure Unified Threat Management (UTM) Appliance6. If your connection is Point-to-Point Protocol ove
xDSL Network Module for the UTM9S and UTM25S559ProSecure Unified Threat Management (UTM) Appliance8. In the Domain Name Server (DNS) Servers section o
Use the Setup Wizard to Provision the UTM in Your Network56ProSecure Unified Threat Management (UTM) Appliance Enter the settings as explained in the
xDSL Network Module for the UTM9S and UTM25S560ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the SLOT-x ISP
xDSL Network Module for the UTM9S and UTM25S561ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the manual ISP configuration is
xDSL Network Module for the UTM9S and UTM25S562ProSecure Unified Threat Management (UTM) Appliance• Primary WAN mode. The DSL interface (or a WAN inte
xDSL Network Module for the UTM9S and UTM25S563ProSecure Unified Threat Management (UTM) ApplianceWARNING:Changing the WAN mode from classical routing
xDSL Network Module for the UTM9S and UTM25S564ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM9S or UTM25S is configured in auto-rollo
xDSL Network Module for the UTM9S and UTM25S565ProSecure Unified Threat Management (UTM) Applianced. From the corresponding drop-down list on the righ
xDSL Network Module for the UTM9S and UTM25S566ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary interface fails, the default
xDSL Network Module for the UTM9S and UTM25S567ProSecure Unified Threat Management (UTM) Appliance• Continuity of source IP address for secure connect
xDSL Network Module for the UTM9S and UTM25S568ProSecure Unified Threat Management (UTM) Appliance• Round-robin. With round-robin load balancing, new
xDSL Network Module for the UTM9S and UTM25S569ProSecure Unified Threat Management (UTM) ApplianceFigure 334. 3. Configure the protocol binding setti
Use the Setup Wizard to Provision the UTM in Your Network57 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 5 of 10: Email Securi
xDSL Network Module for the UTM9S and UTM25S570ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b
xDSL Network Module for the UTM9S and UTM25S571ProSecure Unified Threat Management (UTM) ApplianceFor more information about firewall rules, see Overv
xDSL Network Module for the UTM9S and UTM25S572ProSecure Unified Threat Management (UTM) Appliance• Subnet Mask. Enter the subnet mask for the seconda
xDSL Network Module for the UTM9S and UTM25S573ProSecure Unified Threat Management (UTM) Appliance To configure DDNS:1. Select Network Config > Dy
xDSL Network Module for the UTM9S and UTM25S574ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper r
xDSL Network Module for the UTM9S and UTM25S575ProSecure Unified Threat Management (UTM) ApplianceNote: You can also configure the failure detection m
xDSL Network Module for the UTM9S and UTM25S576ProSecure Unified Threat Management (UTM) Appliance4. Enter the settings as explained in the following
xDSL Network Module for the UTM9S and UTM25S577ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you h
578BB. Wireless Network Module for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of the NMSWLSN wireless networ
Wireless Network Module for the UTM9S and UTM25S579ProSecure Unified Threat Management (UTM) ApplianceOverview of the Wireless Network Module• Configu
Use the Setup Wizard to Provision the UTM in Your Network58ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t
Wireless Network Module for the UTM9S and UTM25S580ProSecure Unified Threat Management (UTM) ApplianceNote: Failure to follow these guidelines can res
Wireless Network Module for the UTM9S and UTM25S581ProSecure Unified Threat Management (UTM) ApplianceFigure 339. 2. Specify the settings as explaine
Wireless Network Module for the UTM9S and UTM25S582ProSecure Unified Threat Management (UTM) ApplianceMode The wireless modes that you can select depe
Wireless Network Module for the UTM9S and UTM25S583ProSecure Unified Threat Management (UTM) ApplianceWARNING:When you have changed the country settin
Wireless Network Module for the UTM9S and UTM25S584ProSecure Unified Threat Management (UTM) Appliance• In infrastructure mode, wireless devices norma
Wireless Network Module for the UTM9S and UTM25S585ProSecure Unified Threat Management (UTM) ApplianceNote: On the UTM9S or UTM25S, WEP is not support
Wireless Network Module for the UTM9S and UTM25S586ProSecure Unified Threat Management (UTM) ApplianceWireless security profiles, hereafter referred t
Wireless Network Module for the UTM9S and UTM25S587ProSecure Unified Threat Management (UTM) ApplianceBefore You Change the SSID, WEP, and WPA Setting
Wireless Network Module for the UTM9S and UTM25S588ProSecure Unified Threat Management (UTM) ApplianceConfigure and Enable Wireless Profiles To add a
Wireless Network Module for the UTM9S and UTM25S589ProSecure Unified Threat Management (UTM) ApplianceFigure 342. 3. Specify the settings as explaine
Use the Setup Wizard to Provision the UTM in Your Network59 ProSecure Unified Threat Management (UTM) ApplianceAfter you have completed the steps in t
Wireless Network Module for the UTM9S and UTM25S590ProSecure Unified Threat Management (UTM) ApplianceSSID The wireless network name (SSID) for the wi
Wireless Network Module for the UTM9S and UTM25S591ProSecure Unified Threat Management (UTM) ApplianceEncryptionNote: WPA, WPA2, and WPA+WPA2 only.The
Wireless Network Module for the UTM9S and UTM25S592ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The profil
Wireless Network Module for the UTM9S and UTM25S593ProSecure Unified Threat Management (UTM) Appliance To edit a wireless profile:1. On the Wireless
Wireless Network Module for the UTM9S and UTM25S594ProSecure Unified Threat Management (UTM) ApplianceFigure 343. Note: The default wireless profile
Wireless Network Module for the UTM9S and UTM25S595ProSecure Unified Threat Management (UTM) ApplianceWARNING:If you configure the wireless network mo
Wireless Network Module for the UTM9S and UTM25S596ProSecure Unified Threat Management (UTM) ApplianceThe following table explains the fields of the A
Wireless Network Module for the UTM9S and UTM25S597ProSecure Unified Threat Management (UTM) Appliancemixed encryption (TKIP+AES, which is supported i
Wireless Network Module for the UTM9S and UTM25S598ProSecure Unified Threat Management (UTM) Appliance To configure WDS on a peer:1. Configure the sa
Wireless Network Module for the UTM9S and UTM25S599ProSecure Unified Threat Management (UTM) Appliance3. Specify the settings as explained in the foll
6ProSecure Unified Threat Management (UTM) ApplianceWeb Management Interface Menu Layout . . . . . . . . . . . . . . . . . . . . . . . . . 44Use the S
Use the Setup Wizard to Provision the UTM in Your Network60ProSecure Unified Threat Management (UTM) Appliance Scan screen also lets you specify HTML
Wireless Network Module for the UTM9S and UTM25S600ProSecure Unified Threat Management (UTM) ApplianceConfigure WMM QoS Priority SettingsWi-Fi Multime
Wireless Network Module for the UTM9S and UTM25S601ProSecure Unified Threat Management (UTM) ApplianceFigure 347. 3. Select the Enable WMM check box.
Wireless Network Module for the UTM9S and UTM25S602ProSecure Unified Threat Management (UTM) ApplianceTest Basic Wireless ConnectivityAfter you have c
603CC. 3G/4G Dongles for the UTM9S and UTM25SThis appendix describes how to configure the wireless features of a mobile broadband USB adapter (3G/4G
3G/4G Dongles for the UTM9S and UTM25S604ProSecure Unified Threat Management (UTM) Appliance Complete these steps:1. Insert the 3G/4G dongle and con
3G/4G Dongles for the UTM9S and UTM25S605ProSecure Unified Threat Management (UTM) Appliance To configure the WAN ISP settings for the USB interface:
3G/4G Dongles for the UTM9S and UTM25S606ProSecure Unified Threat Management (UTM) Appliance4. Configure the settings as explained in the following t
3G/4G Dongles for the UTM9S and UTM25S607ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save any changes to the USB ISP settings
3G/4G Dongles for the UTM9S and UTM25S608ProSecure Unified Threat Management (UTM) ApplianceConfigure the 3G/4G SettingsThe 3G/4G settings are automat
3G/4G Dongles for the UTM9S and UTM25S609ProSecure Unified Threat Management (UTM) Appliance4. The information in the 3G Status section and SIM Card
Use the Setup Wizard to Provision the UTM in Your Network61 ProSecure Unified Threat Management (UTM) ApplianceEnter the settings as explained in the
3G/4G Dongles for the UTM9S and UTM25S610ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your settings.Note: If you are co
3G/4G Dongles for the UTM9S and UTM25S611ProSecure Unified Threat Management (UTM) ApplianceOverview of the WAN ModesYou cannot configure failure dete
3G/4G Dongles for the UTM9S and UTM25S612ProSecure Unified Threat Management (UTM) ApplianceFor information about how to configure the USB interface a
3G/4G Dongles for the UTM9S and UTM25S613ProSecure Unified Threat Management (UTM) ApplianceFigure 352. 2. In the NAT (Network Address Translation)
3G/4G Dongles for the UTM9S and UTM25S614ProSecure Unified Threat Management (UTM) ApplianceConfigure Load Balancing and Optional Protocol BindingTo u
3G/4G Dongles for the UTM9S and UTM25S615ProSecure Unified Threat Management (UTM) Applianceb. From the corresponding drop-down list on the right, sel
3G/4G Dongles for the UTM9S and UTM25S616ProSecure Unified Threat Management (UTM) Appliance• Destination Network. The Internet locations (based on th
3G/4G Dongles for the UTM9S and UTM25S617ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol binding
3G/4G Dongles for the UTM9S and UTM25S618ProSecure Unified Threat Management (UTM) ApplianceConfigure Dynamic DNSDynamic DNS (DDNS) is an Internet ser
3G/4G Dongles for the UTM9S and UTM25S619ProSecure Unified Threat Management (UTM) ApplianceFigure 356. The WAN Mode section onscreen reports the cur
Use the Setup Wizard to Provision the UTM in Your Network62ProSecure Unified Threat Management (UTM) Appliance Setup Wizard Step 8 of 10: Email Notifi
3G/4G Dongles for the UTM9S and UTM25S620ProSecure Unified Threat Management (UTM) Appliance3. Click the Information option arrow in the upper right o
3G/4G Dongles for the UTM9S and UTM25S621ProSecure Unified Threat Management (UTM) ApplianceAdditional WAN-Related Configuration Tasks• If you have no
622DD. Network Planning for Dual WAN Ports(Multiple WAN Port Models Only)This appendix describes the factors to consider when planning a network usi
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)623ProSecure Unified Threat Management (UTM) ApplianceYour decision has the followi
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)624ProSecure Unified Threat Management (UTM) Appliance4. Prepare to connect the UTM
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)625ProSecure Unified Threat Management (UTM) Appliance- For Windows 2000/XP/Vista,
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)626ProSecure Unified Threat Management (UTM) Appliance• Fully qualified domain name
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)627ProSecure Unified Threat Management (UTM) ApplianceFigure 359. Features such as
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)628ProSecure Unified Threat Management (UTM) ApplianceInbound Traffic to a Single W
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)629ProSecure Unified Threat Management (UTM) ApplianceNote: Load balancing is imple
Use the Setup Wizard to Provision the UTM in Your Network63 ProSecure Unified Threat Management (UTM) ApplianceSetup Wizard Step 9 of 10: Signatures &
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)630ProSecure Unified Threat Management (UTM) ApplianceFor a single WAN gateway conf
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)631ProSecure Unified Threat Management (UTM) ApplianceVPN Road Warrior: Single-Gate
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)632ProSecure Unified Threat Management (UTM) ApplianceFigure 368. The purpose of th
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)633ProSecure Unified Threat Management (UTM) ApplianceVPN Gateway-to-GatewayThe fol
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)634ProSecure Unified Threat Management (UTM) ApplianceFigure 371. The IP addresses
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)635ProSecure Unified Threat Management (UTM) ApplianceFigure 373. The IP addresses
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)636ProSecure Unified Threat Management (UTM) ApplianceThe IP address of the gateway
Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)637ProSecure Unified Threat Management (UTM) ApplianceVPN Telecommuter: Dual-Gatewa
638EE. ReadyNAS IntegrationThis appendix describes how to set up a UTM with a NETGEAR ReadyNAS. This appendix includes the following sections:• Supp
ReadyNAS Integration639ProSecure Unified Threat Management (UTM) ApplianceInstall the UTM Add-On on the ReadyNAS To install the UTM add-on on the Rea
Use the Setup Wizard to Provision the UTM in Your Network64ProSecure Unified Threat Management (UTM) Appliance After you have completed the steps in t
ReadyNAS Integration640ProSecure Unified Threat Management (UTM) ApplianceFigure 379. 7. Click Install.8. Select Add-ons > Installed.Figure 380.
ReadyNAS Integration641ProSecure Unified Threat Management (UTM) Appliance10. Click Save. The status indicator shows green.Figure 381. Connect to the
ReadyNAS Integration642ProSecure Unified Threat Management (UTM) Appliance3. Enter the settings as explained in the following table:4. Click Apply to
ReadyNAS Integration643ProSecure Unified Threat Management (UTM) ApplianceFigure 384.
644FF. Two-Factor AuthenticationThis appendix provides an overview of two-factor authentication, and an example of how to implement the WiKID soluti
Two-Factor Authentication645ProSecure Unified Threat Management (UTM) Appliance• Proven regulatory compliance. Two-factor authentication has been used
Two-Factor Authentication646ProSecure Unified Threat Management (UTM) ApplianceFigure 385. 2. A one-time passcode (something the user has) is generat
Two-Factor Authentication647ProSecure Unified Threat Management (UTM) ApplianceFigure 387.
648GG. System Logs and Error MessagesThis appendix provides examples and explanations of system logs and error message. When applicable, a recommend
System Logs and Error Messages649ProSecure Unified Threat Management (UTM) ApplianceSystem Log Messages• System Startup• Reboot• NTP• Login/Logout• Fi
Use the Setup Wizard to Provision the UTM in Your Network65 ProSecure Unified Threat Management (UTM) ApplianceRegister the UTM with NETGEAR• Use the
System Logs and Error Messages650ProSecure Unified Threat Management (UTM) ApplianceNTPThis section describes log messages generated by the NTP daemon
System Logs and Error Messages651ProSecure Unified Threat Management (UTM) ApplianceFirewall RestartThis section describes logs that are generated whe
System Logs and Error Messages652ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo
System Logs and Error Messages653ProSecure Unified Threat Management (UTM) ApplianceThis section describes the logs that are generated when the WAN mo
System Logs and Error Messages654ProSecure Unified Threat Management (UTM) Appliance• PPTP Idle-Timeout logsExplanation Message 1: Establishment of th
System Logs and Error Messages655ProSecure Unified Threat Management (UTM) Appliance• PPP Authentication logsTraffic Metering LogsThis section describ
System Logs and Error Messages656ProSecure Unified Threat Management (UTM) ApplianceICMP Redirect LogsThis section describes logs that are generated w
System Logs and Error Messages657ProSecure Unified Threat Management (UTM) ApplianceMessage 2007 Oct 1 00:44:17 [UTM] [kernel] [INVALID][ICMP_TYPE][DR
System Logs and Error Messages658ProSecure Unified Threat Management (UTM) ApplianceService LogsThis section describes log messages generated during f
System Logs and Error Messages659ProSecure Unified Threat Management (UTM) Appliance• IPS Logs• Anomaly Behavior Logs• Application LogsThis section de
Use the Setup Wizard to Provision the UTM in Your Network66ProSecure Unified Threat Management (UTM) Appliance Note: If you have used the 30-day trial
System Logs and Error Messages660ProSecure Unified Threat Management (UTM) ApplianceSpam LogsThis section describes logs that are generated when the U
System Logs and Error Messages661ProSecure Unified Threat Management (UTM) ApplianceTraffic LogsThis section describes logs that are generated when th
System Logs and Error Messages662ProSecure Unified Threat Management (UTM) ApplianceIPS LogsThis section describes logs that are generated when traffi
System Logs and Error Messages663ProSecure Unified Threat Management (UTM) ApplianceApplication LogsThis section describes logs that are generated whe
System Logs and Error Messages664ProSecure Unified Threat Management (UTM) ApplianceLAN-to-DMZ LogsThis section describes logs that are generated when
System Logs and Error Messages665ProSecure Unified Threat Management (UTM) ApplianceDMZ-to-LAN LogsThis section describes logs that are generated when
666HH. Default Settings and Technical SpecificationsThis appendix provides the default settings and the physical and technical specifications of the
Default Settings and Technical Specifications667ProSecure Unified Threat Management (UTM) ApplianceWAN connectionsWAN MAC address Use default addressW
Default Settings and Technical Specifications668ProSecure Unified Threat Management (UTM) ApplianceFirewall and network securityInbound LAN WAN rules
Default Settings and Technical Specifications669ProSecure Unified Threat Management (UTM) ApplianceApplication securitySMTP Enabled on port 25Infected
Use the Setup Wizard to Provision the UTM in Your Network67 ProSecure Unified Threat Management (UTM) Appliance To change customer or VAR information
Default Settings and Technical Specifications670ProSecure Unified Threat Management (UTM) ApplianceBlocked keywords for Web traffic NoneEmbedded Objec
Default Settings and Technical Specifications671ProSecure Unified Threat Management (UTM) ApplianceAuthentication algorithm SHA-1Authentication method
Default Settings and Technical Specifications672ProSecure Unified Threat Management (UTM) ApplianceWireless radio and access point settings (UTM9S and
Default Settings and Technical Specifications673ProSecure Unified Threat Management (UTM) AppliancePhysical and Technical SpecificationsThe following
Default Settings and Technical Specifications674ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the IPSec VPN specificati
Default Settings and Technical Specifications675ProSecure Unified Threat Management (UTM) ApplianceThe following table shows the SSL VPN specification
Default Settings and Technical Specifications676ProSecure Unified Threat Management (UTM) ApplianceNote: For default email and web scan settings, see
677II. Notification of Compliance (Wired)NETGEAR Wired ProductsRegulatory Compliance InformationThis section includes user requirements for operatin
Notification of Compliance (Wired)678ProSecure Unified Threat Management (UTM) ApplianceFCC Radio Frequency Interference Warnings & InstructionsTh
Notification of Compliance (Wired)679ProSecure Unified Threat Management (UTM) ApplianceAdditional CopyrightsAES Copyright (c) 2001, Dr. Brian Gladman
Use the Setup Wizard to Provision the UTM in Your Network68ProSecure Unified Threat Management (UTM) Appliance Verify Correct Installation• Test Conne
Notification of Compliance (Wired)680ProSecure Unified Threat Management (UTM) ApplianceMD5 Copyright (C) 1990, RSA Data Security, Inc. All rights re
681JJ. Notification of Compliance (Wireless)NETGEAR Dual Band - WirelessRegulatory Compliance InformationThis section includes user requirements for
ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)682Español [Spanish]Por medio de la presente NETGEAR Inc. decl
ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)683This device is a 2.4 GHz wideband transmission system (tra
ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)684• For product available in the USA market, only channel 1~1
ProSecure Unified Threat Management (UTM) ApplianceNotification of Compliance (Wireless)685Interference Reduction TableThe following table shows the
686IndexNumerics10BASE-T, 100BASE-T, and 1000BASE-T speeds 962.4- and 5-GHz operating frequency, radio 58120- and 40-MHz channel spacing, radio 582332
687ProSecure Unified Threat Management (UTM) ApplianceAppleiPhone and iPad IPSec VPN connections 336Mac SSL VPN connection 377Application Level Gatewa
688ProSecure Unified Threat Management (UTM) ApplianceCCA (certification authority) 232, 300cache control, SSL VPN 341, 361card, service registration
689ProSecure Unified Threat Management (UTM) Appliancetroubleshooting settings 546daylight savings timesettings 55, 457troubleshooting settings 546DC
Use the Setup Wizard to Provision the UTM in Your Network69 ProSecure Unified Threat Management (UTM) ApplianceThe UTM is ready for use. However, the
690ProSecure Unified Threat Management (UTM) AppliancedownloadingDC agent software 410firmware file 451SSL certificate 382DPD (Dead Peer Detection) 29
691ProSecure Unified Threat Management (UTM) ApplianceWAN settings 82–85file extensionsblocking 202, 218, 222setting access exceptions 256file names,
692ProSecure Unified Threat Management (UTM) Appliancescanning process 228trusted hosts 235HTTPS Smart Blockconfiguring 212–215logs 469, 508–510settin
693ProSecure Unified Threat Management (UTM) Applianceport forwarding, SSL VPN 363PPTP server 332reserved 116secondary addressesDSL settings 570LAN se
694ProSecure Unified Threat Management (UTM) ApplianceProSafe VPN Client software 17licensing, electronic 67lifetime, quarantine 461Lightweight Direct
695ProSecure Unified Threat Management (UTM) Appliancerecord 296models, UTM 22modes, wireless 582, 675monitoring default settings 667MPPE (Microsoft P
696ProSecure Unified Threat Management (UTM) Appliancerestoring 545pattern file 454pay plan, 3G/4G service 610PDP (packet data protocol) type, 3G/4G s
697ProSecure Unified Threat Management (UTM) AppliancePPTP (Point-to-Point Tunneling Protocol)requirements 74server settings 331user accounts 401–403W
698ProSecure Unified Threat Management (UTM) Appliancewired products 677–680relay gateway 50, 106, 119Remote Authentication Dial In User Service. See
699ProSecure Unified Threat Management (UTM) Applianceservice provider, 3G/4G 608service registration card 23session expiration length 416Session Init
7ProSecure Unified Threat Management (UTM) ApplianceManage the Network Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .112Change
7033. Manually Configure Internet and WAN SettingsThis chapter contains the following sections:• Internet and WAN Configuration Tasks• Automatically
700ProSecure Unified Threat Management (UTM) Applianceoptions 337settings, configuring manually 359settings, using SSL VPN Wizard 339specifications 67
701ProSecure Unified Threat Management (UTM) Appliancetransfer mode, DSL settings 552Transmission Control Protocol (TCP) 184transmit power, radio 583T
702ProSecure Unified Threat Management (UTM) ApplianceVirtual Private Network Consortium (VPNC) 21, 266virtual private network. See VPN tunnels.virusd
703ProSecure Unified Threat Management (UTM) Applianceconnection speed 97connection type, viewing 496failure detection method 82–85load balancing mode
704ProSecure Unified Threat Management (UTM) Appliancewireless specifications 675WizardsSetup Wizard 47IPSec VPN. See IPSec VPN Wizard.SSL VPN. See SS
Manually Configure Internet and WAN Settings71 ProSecure Unified Threat Management (UTM) ApplianceInternet and WAN Configuration TasksNote: For inform
Manually Configure Internet and WAN Settings72ProSecure Unified Threat Management (UTM) Appliance To configure the WAN ports automatically for conne
Manually Configure Internet and WAN Settings73 ProSecure Unified Threat Management (UTM) ApplianceFigure 38. 3. Click the Auto Detect button at the b
Manually Configure Internet and WAN Settings74ProSecure Unified Threat Management (UTM) Appliance • If the autodetect process does not find a connecti
Manually Configure Internet and WAN Settings75 ProSecure Unified Threat Management (UTM) ApplianceWhat to do next:• If the automatic ISP configuration
Manually Configure Internet and WAN Settings76ProSecure Unified Threat Management (UTM) Appliance Figure 41. 6. If your connection is PPTP or PPPoE,
Manually Configure Internet and WAN Settings77 ProSecure Unified Threat Management (UTM) Appliance7. In the Internet (IP) Address section of the scree
Manually Configure Internet and WAN Settings78ProSecure Unified Threat Management (UTM) Appliance 8. In the Domain Name Server (DNS) Servers section o
Manually Configure Internet and WAN Settings79 ProSecure Unified Threat Management (UTM) Appliance9. Click Apply to save any changes to the WAN ISP se
8ProSecure Unified Threat Management (UTM) ApplianceChapter 6 Content Filtering and Optimizing ScansAbout Content Filtering and Scans. . . . . . . . .
Manually Configure Internet and WAN Settings80ProSecure Unified Threat Management (UTM) Appliance Configure the WAN Mode• Overview of the WAN Modes• C
Manually Configure Internet and WAN Settings81 ProSecure Unified Threat Management (UTM) ApplianceWAN interfaces, the remaining interfaces are disable
Manually Configure Internet and WAN Settings82ProSecure Unified Threat Management (UTM) Appliance WARNING:Changing the WAN mode from classical routing
Manually Configure Internet and WAN Settings83 ProSecure Unified Threat Management (UTM) ApplianceWhen the UTM is configured in auto-rollover mode, it
Manually Configure Internet and WAN Settings84ProSecure Unified Threat Management (UTM) Appliance Note: Ensure that the backup WAN interface is config
Manually Configure Internet and WAN Settings85 ProSecure Unified Threat Management (UTM) ApplianceNote: After the primary WAN interface fails, the def
Manually Configure Internet and WAN Settings86ProSecure Unified Threat Management (UTM) Appliance Configure Load Balancing (Multiple WAN Port Models)
Manually Configure Internet and WAN Settings87 ProSecure Unified Threat Management (UTM) ApplianceThis load-balancing method ensures that a single WAN
Manually Configure Internet and WAN Settings88ProSecure Unified Threat Management (UTM) Appliance Figure 49. 3. Configure the protocol binding settin
Manually Configure Internet and WAN Settings89 ProSecure Unified Threat Management (UTM) Appliance4. Click Apply to save your settings. The protocol b
9ProSecure Unified Threat Management (UTM) ApplianceRADIUS Client and Server Configuration. . . . . . . . . . . . . . . . . . . . . . .310Assign IP Ad
Manually Configure Internet and WAN Settings90ProSecure Unified Threat Management (UTM) Appliance It is important that you ensure that any secondary W
Manually Configure Internet and WAN Settings91 ProSecure Unified Threat Management (UTM) Appliance5. Click the Add table button in the rightmost colum
Manually Configure Internet and WAN Settings92ProSecure Unified Threat Management (UTM) Appliance To configure DDNS:1. Select Network Config > Dy
Manually Configure Internet and WAN Settings93 ProSecure Unified Threat Management (UTM) ApplianceFigure 52. 4. Access the website of the DDNS servic
Manually Configure Internet and WAN Settings94ProSecure Unified Threat Management (UTM) Appliance Set the UTM’s MAC Address and Configure Advanced WAN
Manually Configure Internet and WAN Settings95 ProSecure Unified Threat Management (UTM) ApplianceFigure 53. 4. Enter the settings as explained in th
Manually Configure Internet and WAN Settings96ProSecure Unified Threat Management (UTM) Appliance SpeedIn most cases, the UTM can automatically determ
Manually Configure Internet and WAN Settings97 ProSecure Unified Threat Management (UTM) Appliance5. Click Apply to save your changes.WARNING:Dependin
9844. LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains the following sections:•
LAN Configuration99 ProSecure Unified Threat Management (UTM) ApplianceA virtual LAN (VLAN) is a local area network with a definition that maps workst
Comments to this Manuals