202-10482-02 January 2010v1.0NETGEAR, Inc.350 East Plumeria DriveSan Jose, CA 95134ProSecure Unified Threat Management (UTM) Appliance Reference Manua
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxv1.0, January 2010Managing the Application Level Gateway for SIP Sessions ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-14 LAN Configurationv1.0, January 2010The Known PCs and Devices table lists the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-15v1.0, January 2010Adding PCs or Devices to the Network Datab
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-16 LAN Configurationv1.0, January 2010Editing PCs or Devices in the Network Data
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-17v1.0, January 20103. Click the Edit Group Names option arrow
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-18 LAN Configurationv1.0, January 2010To reserve an IP address, select Reserved
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-19v1.0, January 2010To enable and configure the DMZ port: 1. S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-20 LAN Configurationv1.0, January 2010Table 4-3. DMZ Setup SettingsSetting Descr
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-21v1.0, January 2010Enable DHCP Server(continued)Primary DNS S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-22 LAN Configurationv1.0, January 20103. Click Apply to save your settings.To de
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-23v1.0, January 2010Configuring Static RoutesTo add a static r
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiv1.0, January 2010Creating Gateway-to-Gateway VPN Tunnels with the Wizard ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-24 LAN Configurationv1.0, January 20103. Enter the settings as explained in Tabl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-25v1.0, January 2010To enable and configure RIP:1. Select Netw
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-26 LAN Configurationv1.0, January 2010Table 4-5. RIP Configuration SettingsSetti
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-27v1.0, January 20104. Click Apply to save your settings.Stati
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-28 LAN Configurationv1.0, January 2010
5-1v1.0, January 2010Chapter 5Firewall ProtectionThis chapter describes how to use the firewall features of the UTM to protect your network. This chap
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-2 Firewall Protectionv1.0, January 2010Administrator TipsConsider the following
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-3v1.0, January 2010Using Rules to Block or Allow Specific Ki
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-4 Firewall Protectionv1.0, January 2010• Quality of Service (QoS) priorities. Ea
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-5v1.0, January 2010Table 5-2. Outbound Rules OverviewSettin
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiv1.0, January 2010Viewing the UTM SSL VPN Connection Status ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-6 Firewall Protectionv1.0, January 2010Inbound Rules (Port Forwarding)If you hav
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-7v1.0, January 2010Whether or not DHCP is enabled, how the P
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-8 Firewall Protectionv1.0, January 2010.Table 5-3. Inbound Rules Overview Sett
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-9v1.0, January 2010LAN Users The settings that determine whi
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-10 Firewall Protectionv1.0, January 2010Log The settings that determines whether
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-11v1.0, January 2010Order of Precedence for RulesAs you defi
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-12 Firewall Protectionv1.0, January 2010Setting LAN WAN RulesThe default outboun
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-13v1.0, January 2010To make changes to an existing outbound
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-14 Firewall Protectionv1.0, January 2010To create a new outbound LAN WAN service
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-15v1.0, January 2010To create a new inbound LAN WAN service
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxiiiv1.0, January 2010Updating the Scan Signatures and Scan Engine Firmware ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-16 Firewall Protectionv1.0, January 2010To access the DMZ WAN Rules screen:1. Se
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-17v1.0, January 20102. Click one of the following table butt
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-18 Firewall Protectionv1.0, January 2010DMZ WAN Inbound Services RulesThe Inboun
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-19v1.0, January 2010Setting LAN DMZ RulesThe LAN DMZ Rules s
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-20 Firewall Protectionv1.0, January 2010• Up. Moves the rule up one position in
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-21v1.0, January 20102. Enter the settings as explained in Ta
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-22 Firewall Protectionv1.0, January 2010Inbound Rules ExamplesLAN WAN Inbound Ru
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-23v1.0, January 2010LAN WAN or DMZ WAN Inbound Rule: Setting
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-24 Firewall Protectionv1.0, January 2010To configure the UTM for additional IP a
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-25v1.0, January 20106. In the Send to LAN Server field, ente
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxivv1.0, January 2010Troubleshooting the ISP Connection ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-26 Firewall Protectionv1.0, January 2010Outbound Rules ExampleOutbound rules let
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-27v1.0, January 2010Configuring Other Firewall FeaturesYou c
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-28 Firewall Protectionv1.0, January 20102. Click the Attack Checks submenu tab.
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-29v1.0, January 20104. Click Apply to save your settings. LA
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-30 Firewall Protectionv1.0, January 2010Setting Session LimitsSession limits all
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-31v1.0, January 20105. Click Apply to save your settings.Man
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-32 Firewall Protectionv1.0, January 20103. Select the Enable SIP checkbox.4. Cli
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-33v1.0, January 2010For example, Web servers serve Web pages
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-34 Firewall Protectionv1.0, January 20102. In the Add Customer Service section o
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-35v1.0, January 20102. Modify the settings that you wish to
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxvv1.0, January 2010Firewall Restart ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-36 Firewall Protectionv1.0, January 2010To create a QoS profile:1. Select Networ
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-37v1.0, January 20105. Click Apply to save your settings. Th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-38 Firewall Protectionv1.0, January 20103. Click Apply to save your changes. The
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-39v1.0, January 2010The screen displays the List of Bandwidt
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-40 Firewall Protectionv1.0, January 20105. Click Apply to save your settings. Th
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-41v1.0, January 2010Setting a Schedule to Block or Allow Spe
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-42 Firewall Protectionv1.0, January 2010• Specific Times. The schedule is active
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-43v1.0, January 20102. In the MAC Filtering Enable section,
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-44 Firewall Protectionv1.0, January 2010Setting up IP/MAC BindingsIP/MAC Binding
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-45v1.0, January 20103. Enter the settings as explained in Ta
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-46 Firewall Protectionv1.0, January 20104. Click the Add table button. The new I
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-47v1.0, January 2010Note these restrictions on port triggeri
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-48 Firewall Protectionv1.0, January 20103. Click the Add table button. The new p
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-49v1.0, January 2010Using the Intrusion Prevention SystemThe
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-50 Firewall Protectionv1.0, January 2010When you enable the IPS, the default IPS
ProSecure Unified Threat Management (UTM) Appliance Reference ManualFirewall Protection 5-51v1.0, January 2010.Figure 5-31
ProSecure Unified Threat Management (UTM) Appliance Reference Manual5-52 Firewall Protectionv1.0, January 2010Table 5-11. IPS: Less Familiar Attack Na
6-1v1.0, January 2010Chapter 6Content Filtering and Optimizing ScansThis chapter describes how to apply the content filtering features of the UTM and
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-2 Content Filtering and Optimizing Scansv1.0, January 2010Default E-mail and Web
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-3v1.0, January 2010Configuring E-mail Pro
xviiv1.0, January 2010About This ManualThe NETGEAR® ProSecure™ Unified Threat Management (UTM) Appliance Reference Manual describes how to install, co
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-4 Content Filtering and Optimizing Scansv1.0, January 2010Customizing E-mail Pro
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-5v1.0, January 2010Customizing E-mail Ant
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-6 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-7v1.0, January 2010Append Safe Stamp (SMT
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-8 Content Filtering and Optimizing Scansv1.0, January 20103. Click Apply to save
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-9v1.0, January 2010To configure e-mail co
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-10 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-11v1.0, January 20103. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-12 Content Filtering and Optimizing Scansv1.0, January 20103. Real-time blacklis
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-13v1.0, January 2010To configure the whit
ProSecure Unified Threat Management (UTM) Appliance Reference Manualxviiiv1.0, January 2010• Scope. This manual is written for the UTM according to th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-14 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-15v1.0, January 2010blacklist providers a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-16 Content Filtering and Optimizing Scansv1.0, January 20102. Click the Add tabl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-17v1.0, January 20103. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-18 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-19v1.0, January 2010Configuring Web and S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-20 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-21v1.0, January 20103. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-22 Content Filtering and Optimizing Scansv1.0, January 20102. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-23v1.0, January 20103. Click Apply to sav
1-1v1.0, January 2010Chapter 1IntroductionThis chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Managemen
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-24 Content Filtering and Optimizing Scansv1.0, January 2010Several types of Web
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-25v1.0, January 2010To configure Web cont
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-26 Content Filtering and Optimizing Scansv1.0, January 2010.Figure 6-10 [Content
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-27v1.0, January 2010.3. Enter the setting
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-28 Content Filtering and Optimizing Scansv1.0, January 2010Table 6-8. Content Fi
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-29v1.0, January 2010Select the Web Catego
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-30 Content Filtering and Optimizing Scansv1.0, January 20104. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-31v1.0, January 2010To configure Web URL
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-32 Content Filtering and Optimizing Scansv1.0, January 20103. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-33v1.0, January 20104. Click Apply to sav
iiv1.0, January 2010© 2009–2010 by NETGEAR, Inc. All rights reserved.TrademarksNETGEAR and the NETGEAR logo are registered trademarks and ProSecure an
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-2 Introductionv1.0, January 2010Key Features and CapabilitiesThe UTM provides th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-34 Content Filtering and Optimizing Scansv1.0, January 2010HTTPS Scan SettingsHT
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-35v1.0, January 2010If one of these is no
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-36 Content Filtering and Optimizing Scansv1.0, January 2010To configure the HTTP
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-37v1.0, January 20104. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-38 Content Filtering and Optimizing Scansv1.0, January 2010Note that certain sit
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-39v1.0, January 20103. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-40 Content Filtering and Optimizing Scansv1.0, January 2010To configure the FTP
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-41v1.0, January 20103. Click Apply to sav
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-42 Content Filtering and Optimizing Scansv1.0, January 2010To set Web access exc
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-43v1.0, January 20103. Enter the settings
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-3v1.0, January 2010Dual-WAN Port Models for Increased Reliability o
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-44 Content Filtering and Optimizing Scansv1.0, January 20102. Modify the setting
ProSecure Unified Threat Management (UTM) Appliance Reference ManualContent Filtering and Optimizing Scans 6-45v1.0, January 20102. In the Add Scannin
ProSecure Unified Threat Management (UTM) Appliance Reference Manual6-46 Content Filtering and Optimizing Scansv1.0, January 2010
7-1v1.0, January 2010Chapter 7Virtual Private NetworkingUsing IPsec ConnectionsThis chapter describes how to use the IP security (IPsec) virtual priva
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-2 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010See “Virtu
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-3v1.0, January 2010Using the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-4 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Creating G
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-5v1.0, January 2010To view th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-6 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Select
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-7v1.0, January 2010. .This VP
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-4 Introductionv1.0, January 2010A Powerful, True FirewallUnlike simple Internet
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-8 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click A
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-9v1.0, January 2010Creating a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-10 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010To displa
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-11v1.0, January 20103. Select
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-12 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-13v1.0, January 20102. In the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-14 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Enter
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-15v1.0, January 20105. In the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-16 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-17v1.0, January 20109. Enter
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-5v1.0, January 2010• Objectionable traffic protection. The UTM prev
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-18 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010In the ex
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-19v1.0, January 2010• Right-c
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-20 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010The VPN c
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-21v1.0, January 2010The Activ
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-22 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Managing
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-23v1.0, January 2010Managing
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-24 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Each pol
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-25v1.0, January 2010To add or
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-26 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010.Figure 7
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-27v1.0, January 20103. Comple
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-6 Introductionv1.0, January 2010Extensive Protocol SupportThe UTM supports the T
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-28 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010LocalSele
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-29v1.0, January 2010Authentic
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-30 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-31v1.0, January 20104. Click
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-32 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-33v1.0, January 2010To delete
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-34 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Figure 7-
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-35v1.0, January 20104. Comple
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-36 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Traffic S
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-37v1.0, January 2010Integrity
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-7v1.0, January 2010• SSL VPN Wizard. The UTM includes the NETGEAR S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-38 Virtual Private Networking Using IPsec Connectionsv1.0, January 20105. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-39v1.0, January 2010You can e
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-40 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Comple
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-41v1.0, January 2010server in
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-42 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. Comple
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-43v1.0, January 2010Assigning
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-44 Virtual Private Networking Using IPsec Connectionsv1.0, January 20102. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-45v1.0, January 2010.4. Compl
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-46 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010WINS Serv
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-47v1.0, January 20105. Click
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-8 Introductionv1.0, January 2010Service Registration Card with License KeysBe su
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-48 Virtual Private Networking Using IPsec Connectionsv1.0, January 20108. On the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-49v1.0, January 2010RemoteIde
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-50 Virtual Private Networking Using IPsec Connectionsv1.0, January 20109. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-51v1.0, January 20102. In the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-52 Virtual Private Networking Using IPsec Connectionsv1.0, January 20104. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-53v1.0, January 20105. In the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-54 Virtual Private Networking Using IPsec Connectionsv1.0, January 20107. Click
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-55v1.0, January 20109. Enter
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-56 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010Configuri
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-57v1.0, January 20104. Enter
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-9v1.0, January 2010Package ContentsThe UTM product package contains
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-58 Virtual Private Networking Using IPsec Connectionsv1.0, January 20103. In the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using IPsec Connections 7-59v1.0, January 2010Configuri
ProSecure Unified Threat Management (UTM) Appliance Reference Manual7-60 Virtual Private Networking Using IPsec Connectionsv1.0, January 2010
8-1v1.0, January 2010Chapter 8Virtual Private NetworkingUsing SSL ConnectionsThe UTM provides a hardware-based SSL VPN solution designed specifically
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-2 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• SSL Port F
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-3v1.0, January 2010The followin
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-4 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: If you
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-5v1.0, January 2010SSL VPN Wiza
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-6 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note that Fi
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-7v1.0, January 2010SSL VPN Wiza
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-10 Introductionv1.0, January 2010Hardware FeaturesThe front panel ports and LEDs
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-8 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Note: After
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-9v1.0, January 2010SSL VPN Wiza
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-10 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Table 8-4.
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-11v1.0, January 2010SSL VPN Wiz
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-12 Virtual Private Networking Using SSL Connectionsv1.0, January 2010TCP Port Nu
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-13v1.0, January 2010SSL VPN Wiz
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-14 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Verify your
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-15v1.0, January 20104. Enter th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-16 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The default
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-17v1.0, January 20103. From the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-11v1.0, January 2010The function of each LED is described in Table
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-18 Virtual Private Networking Using SSL Connectionsv1.0, January 2010When you de
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-19v1.0, January 2010Portal layo
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-20 Virtual Private Networking Using SSL Connectionsv1.0, January 2010The List of
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-21v1.0, January 20104. Complete
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-22 Virtual Private Networking Using SSL Connectionsv1.0, January 20105. Click Ap
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-23v1.0, January 2010Adding Serv
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-24 Virtual Private Networking Using SSL Connectionsv1.0, January 20104. Click th
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-25v1.0, January 20103. In the A
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-26 Virtual Private Networking Using SSL Connectionsv1.0, January 2010• If you en
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-27v1.0, January 20103. Select t
v1.0, January 2010iiiFederal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been gra
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-12 Introductionv1.0, January 2010Rear PanelThe rear panel of the UTM includes a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-28 Virtual Private Networking Using SSL Connectionsv1.0, January 2010To add an S
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-29v1.0, January 2010Adding New
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-30 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Editing Net
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-31v1.0, January 20105. Click Ap
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-32 Virtual Private Networking Using SSL Connectionsv1.0, January 2010For example
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-33v1.0, January 20102. Make you
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-34 Virtual Private Networking Using SSL Connectionsv1.0, January 2010.3. Select
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-35v1.0, January 2010Add SSL VPN
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-36 Virtual Private Networking Using SSL Connectionsv1.0, January 2010Apply Polic
ProSecure Unified Threat Management (UTM) Appliance Reference ManualVirtual Private Networking Using SSL Connections 8-37v1.0, January 20104. Click Ap
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-13v1.0, January 2010Figure 1-4 shows the product label for the UTM5
ProSecure Unified Threat Management (UTM) Appliance Reference Manual8-38 Virtual Private Networking Using SSL Connectionsv1.0, January 2010
9-1v1.0, January 2010Chapter 9Managing Users, Authentication, and CertificatesThis chapter describes how to manage users, authentication, and security
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-2 Managing Users, Authentication, and Certificatesv1.0, January 2010Configuring
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-3v1.0, January 2010To create a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-4 Managing Users, Authentication, and Certificatesv1.0, January 20102. Under the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-5v1.0, January 20104. Click App
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-6 Managing Users, Authentication, and Certificatesv1.0, January 20106. If you ch
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-7v1.0, January 2010Creating and
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-8 Managing Users, Authentication, and Certificatesv1.0, January 20103. Click the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-9v1.0, January 20103. Modify th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-14 Introductionv1.0, January 2010Figure 1-6 shows the product label for the UTM2
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-10 Managing Users, Authentication, and Certificatesv1.0, January 2010To create a
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-11v1.0, January 20103. Enter th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-12 Managing Users, Authentication, and Certificatesv1.0, January 20104. Click Ap
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-13v1.0, January 20104. Click Ap
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-14 Managing Users, Authentication, and Certificatesv1.0, January 20104. In the D
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-15v1.0, January 20103. Click th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-16 Managing Users, Authentication, and Certificatesv1.0, January 20107. Click th
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-17v1.0, January 20103. Enter th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-18 Managing Users, Authentication, and Certificatesv1.0, January 2010On the UTM,
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-19v1.0, January 2010The Certifi
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIntroduction 1-15v1.0, January 2010• Temperature operating limits are not likely t
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-20 Managing Users, Authentication, and Certificatesv1.0, January 2010The Trusted
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-21v1.0, January 2010When a secu
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-22 Managing Users, Authentication, and Certificatesv1.0, January 20102. In the G
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-23v1.0, January 20103. Click th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-24 Managing Users, Authentication, and Certificatesv1.0, January 20105. Copy the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManaging Users, Authentication, and Certificates 9-25v1.0, January 201010. Click B
ProSecure Unified Threat Management (UTM) Appliance Reference Manual9-26 Managing Users, Authentication, and Certificatesv1.0, January 2010To view the
10-1v1.0, January 2010Chapter 10Network and System ManagementThis chapter describes the tools for managing the network traffic to optimize its perform
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-2 Network and System Managementv1.0, January 2010• Auto-rollover mode (dual-WAN
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-3v1.0, January 2010• ALLOW by schedule, otherwise
ProSecure Unified Threat Management (UTM) Appliance Reference Manual1-16 Introductionv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-4 Network and System Managementv1.0, January 2010• QoS Profile. You can define
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-5v1.0, January 2010– URL blocking. You can specif
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-6 Network and System Managementv1.0, January 2010LAN WAN Inbound Rules and DMZ
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-7v1.0, January 2010– Address range. The rule is a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-8 Network and System Managementv1.0, January 2010e-mail server) and provide pub
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-9v1.0, January 2010For more information about QoS
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-10 Network and System Managementv1.0, January 2010To modify the administrator u
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-11v1.0, January 20103. Select the Check to Edit P
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-12 Network and System Managementv1.0, January 2010Configuring Remote Management
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-13v1.0, January 20104. Click Apply to save your c
2-1v1.0, January 2010Chapter 2Using the Setup Wizard to Provision the UTM inYour NetworkUnderstanding the Steps for Initial ConnectionTypically, the U
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-14 Network and System Managementv1.0, January 2010Using an SNMP ManagerSimple N
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-15v1.0, January 20102. Enter the settings as expl
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-16 Network and System Managementv1.0, January 2010The Backup & Restore Sett
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-17v1.0, January 20102. Select Save file, and then
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-18 Network and System Managementv1.0, January 2010Reverting to Factory Default
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-19v1.0, January 2010Viewing the Available Firmwar
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-20 Network and System Managementv1.0, January 20103. To see which other firmwar
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-21v1.0, January 2010Rebooting Without Changing th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-22 Network and System Managementv1.0, January 2010The Info section shows the fo
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-23v1.0, January 2010Configuring Automatic Update
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-2 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010Q
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-24 Network and System Managementv1.0, January 2010Configuring Date and Time Ser
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork and System Management 10-25v1.0, January 20103. Click Apply to save your s
ProSecure Unified Threat Management (UTM) Appliance Reference Manual10-26 Network and System Managementv1.0, January 2010
11-1v1.0, January 2010Chapter 11Monitoring System Access and PerformanceThis chapter describes the system monitoring features of the UTM. You can be a
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-2 Monitoring System Access and Performancev1.0, January 2010The Internet Traffi
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-3v1.0, January 2010Table 11-1. WAN Tra
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-4 Monitoring System Access and Performancev1.0, January 20103. Click Apply to s
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-5v1.0, January 2010Configuring Logging
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-6 Monitoring System Access and Performancev1.0, January 20102. Enter the settin
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-7v1.0, January 2010Figure 11-4
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-3v1.0, January 20103
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-8 Monitoring System Access and Performancev1.0, January 20102. Enter the settin
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-9v1.0, January 2010Enable (continued)S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-10 Monitoring System Access and Performancev1.0, January 20103. Click Apply to
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-11v1.0, January 20103. Enter the setti
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-12 Monitoring System Access and Performancev1.0, January 20104. Click Apply to
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-13v1.0, January 2010Configuring and Ac
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-14 Monitoring System Access and Performancev1.0, January 20104. Click Apply to
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-15v1.0, January 2010Figure 11-7 [Dashb
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-16 Monitoring System Access and Performancev1.0, January 2010To clear the stati
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-17v1.0, January 2010Threats (Counts)Th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-4 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 20105
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-18 Monitoring System Access and Performancev1.0, January 2010Table 11-7 explain
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-19v1.0, January 2010Table 11-8 explain
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-20 Monitoring System Access and Performancev1.0, January 2010Viewing Status Scr
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-21v1.0, January 2010Table 11-9 explain
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-22 Monitoring System Access and Performancev1.0, January 2010Table 11-10 on pag
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-23v1.0, January 2010Table 11-11 on pag
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-24 Monitoring System Access and Performancev1.0, January 2010Viewing Active VPN
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-25v1.0, January 20102. Click the IPSec
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-26 Monitoring System Access and Performancev1.0, January 20102. Click the SSL V
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-27v1.0, January 20102. Click the Statu
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-5v1.0, January 2010U
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-28 Monitoring System Access and Performancev1.0, January 20102. Click the WAN S
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-29v1.0, January 2010The Connection Sta
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-30 Monitoring System Access and Performancev1.0, January 20102. Click the LAN G
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-31v1.0, January 2010The Known PCs and
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-32 Monitoring System Access and Performancev1.0, January 2010Querying Logs and
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-33v1.0, January 2010• System Logs. The
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-34 Monitoring System Access and Performancev1.0, January 20103. Enter the setti
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-35v1.0, January 2010Log Type(continued
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-36 Monitoring System Access and Performancev1.0, January 2010Search Criteria(co
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-37v1.0, January 20104. Click one of th
v1.0, January 2010ivOpen SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved.Redistribution and use in source and binary forms, with
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-6 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010T
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-38 Monitoring System Access and Performancev1.0, January 2010Example: Using Log
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-39v1.0, January 2010Scheduling and Gen
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-40 Monitoring System Access and Performancev1.0, January 2010– The following ap
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-41v1.0, January 20103. Enter the setti
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-42 Monitoring System Access and Performancev1.0, January 2010Scheduling Reports
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-43v1.0, January 20104. Click Apply to
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-44 Monitoring System Access and Performancev1.0, January 2010Using the Network
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-45v1.0, January 2010Tracing a RouteA t
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-46 Monitoring System Access and Performancev1.0, January 2010Using the Realtime
ProSecure Unified Threat Management (UTM) Appliance Reference ManualMonitoring System Access and Performance 11-47v1.0, January 2010Gathering Importan
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-7v1.0, January 2010•
ProSecure Unified Threat Management (UTM) Appliance Reference Manual11-48 Monitoring System Access and Performancev1.0, January 2010To generate the Ne
12-1v1.0, January 2010Chapter 12Troubleshooting and Using Online SupportThis chapter provides troubleshooting tips and information for the UTM. After
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-2 Troubleshooting and Using Online Supportv1.0, January 2010Basic FunctioningAf
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-3v1.0, January 2010LAN or WAN Port LED
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-4 Troubleshooting and Using Online Supportv1.0, January 2010• If your UTM’s IP
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-5v1.0, January 2010• If the computer i
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-6 Troubleshooting and Using Online Supportv1.0, January 2010If your UTM is stil
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-7v1.0, January 2010Troubleshooting a T
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-8 Troubleshooting and Using Online Supportv1.0, January 2010Testing the Path fr
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-9v1.0, January 2010Restoring the Defau
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-8 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010S
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-10 Troubleshooting and Using Online Supportv1.0, January 2010Problems with Date
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTroubleshooting and Using Online Support 12-11v1.0, January 2010To initiate the su
ProSecure Unified Threat Management (UTM) Appliance Reference Manual12-12 Troubleshooting and Using Online Supportv1.0, January 2010To submit a file t
Default Settings and Technical Specifications A-1v1.0, January 2010Appendix ADefault Settings and Technical SpecificationsYou can use the Reset button
ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-2 Default Settings and Technical Specificationsv1.0, January 2010Table A-2 shows
ProSecure Unified Threat Management (UTM) Appliance Reference ManualDefault Settings and Technical Specifications A-3v1.0, January 2010Table A-3 shows
ProSecure Unified Threat Management (UTM) Appliance Reference ManualA-4 Default Settings and Technical Specificationsv1.0, January 2010Table A-4 shows
Network Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-1v1.0, January 2010Appendix BNetwork Planning for Dual WAN Ports(Dual-WAN Port Model
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-2 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-3v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-9v1.0, January 2010T
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-4 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-5v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-6 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-7v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-8 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-9v1.0, January 2
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-10 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-11v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-12 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-13v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-10 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-14 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-15v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-16 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualNetwork Planning for Dual WAN Ports (Dual-WAN Port Models Only) B-17v1.0, January
ProSecure Unified Threat Management (UTM) Appliance Reference ManualB-18 Network Planning for Dual WAN Ports (Dual-WAN Port Models Only)v1.0, January
System Logs and Error Messages C-1v1.0, January 2010Appendix CSystem Logs and Error MessagesThis appendix explains provides examples and explanations
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-2 System Logs and Error Messagesv1.0, January 2010System Log MessagesThis sectio
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-3v1.0, January 2010Service LogsThis section descr
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-4 System Logs and Error Messagesv1.0, January 2010Login/LogoutThis section descr
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-5v1.0, January 2010WAN StatusThis section describ
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-11v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-6 System Logs and Error Messagesv1.0, January 2010Load-Balancing ModeWhen the WA
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-7v1.0, January 2010PPP LogsThis section describes
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-8 System Logs and Error Messagesv1.0, January 2010• PPTP Idle-Timeout Logs• PPP
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-9v1.0, January 2010Traffic Metering LogsThis sect
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-10 System Logs and Error Messagesv1.0, January 2010Multicast/Broadcast LogsThis
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-11v1.0, January 2010Message 2007 Oct 1 00:44:17 [
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-12 System Logs and Error Messagesv1.0, January 2010Content Filtering and Securit
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-13v1.0, January 2010Spam LogsThis section describ
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-14 System Logs and Error Messagesv1.0, January 2010Traffic LogsThis section desc
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-15v1.0, January 2010IPS LogsThis section describe
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-12 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-16 System Logs and Error Messagesv1.0, January 2010Routing LogsThis section expl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualSystem Logs and Error Messages C-17v1.0, January 2010WAN to LAN LogsThis section d
ProSecure Unified Threat Management (UTM) Appliance Reference ManualC-18 System Logs and Error Messagesv1.0, January 2010
Two Factor Authentication D-1v1.0, January 2010Appendix DTwo Factor AuthenticationThis appendix provides an overview of Two-Factor Authentication, and
ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-2 Two Factor Authenticationv1.0, January 2010• Quick to deploy and manage. The W
ProSecure Unified Threat Management (UTM) Appliance Reference ManualTwo Factor Authentication D-3v1.0, January 2010The request-response architecture i
ProSecure Unified Threat Management (UTM) Appliance Reference ManualD-4 Two Factor Authenticationv1.0, January 20103. The user then proceeds to the Tw
Related Documents E-1v1.0, January 2010Appendix ERelated DocumentsThis appendix provides links to reference documents you can use to gain a more compl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualE-2 Related Documentsv1.0, January 2010
Index-1v1.0, January 2010IndexNumerics10BaseT, 100BaseT, and 1000BaseT 3-23AAAA 7-40AC input 1-12access, remote management 10-12action buttons (We
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-13v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-2v1.0, January 2010Bbacking up, configuration file 10-16bandwidth capacitya
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-3v1.0, January 2010managing 10-15restoring 10-17reverting to defaults 10-
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-4v1.0, January 2010DMZDHCPaddress pool 4-20DNS servers 4-21domain name 4-
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-5v1.0, January 2010Ffactory default settingsreverting to 10-18service licen
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-6v1.0, January 2010HTTPaction, infected Web file or object 2-20, 6-22defaul
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-7v1.0, January 2010IP header 5-37IP precedence 5-37IP security. See IPsec.
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-8v1.0, January 2010configuring options 11-8e-mail address for sending logs
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-9v1.0, January 2010planning, dual WAN ports (dual-WAN port models) B-1proto
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-10v1.0, January 2010IPsec VPNautomatically generated (auto) 7-31groups, con
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-11v1.0, January 2010description 5-35examples 5-35shifting traffic mix 10-
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-14 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-12v1.0, January 2010scan engine firmware 10-21scan exceptionse-mail message
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-13v1.0, January 2010spamblocked messages, recent 5 and top 5 11-18Distribut
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-14v1.0, January 2010tabs, submenu (Web Management Interface) 2-5TCP flood,
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-15v1.0, January 2010VvideoconferencingDMZ port 4-18from restricted address
ProSecure Unified Threat Management (UTM) Appliance Reference ManualIndex-16v1.0, January 2010WWANaliases 3-17auto-rollover mode (dual-WAN port model
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-15v1.0, January 2010
v1.0, January 2010vProduct and Publication DetailsPPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved.Redistribution and use in sou
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-16 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-17v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-18 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-19v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-20 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-21v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-22 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-23v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-24 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-25v1.0, January 2010
v1.0, January 2010vi
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-26 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference ManualUsing the Setup Wizard to Provision the UTM in Your Network 2-27v1.0, January 2010
ProSecure Unified Threat Management (UTM) Appliance Reference Manual2-28 Using the Setup Wizard to Provision the UTM in Your Networkv1.0, January 2010
3-1v1.0, January 2010Chapter 3Manually Configuring Internet and WAN SettingsThis chapter contains the following sections:• “Understanding the Internet
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-2 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Configure d
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-3v1.0, January 20102. Click the A
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-4 Manually Configuring Internet and WAN Settingsv1.0, January 2010The auto-detec
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-5v1.0, January 2010The WAN Status
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-6 Manually Configuring Internet and WAN Settingsv1.0, January 2010To manually co
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-7v1.0, January 20105. If your con
viiv1.0, January 2010ContentsProSecure Unified Threat Management (UTM) Appliance Reference ManualAbout This ManualConventions, Formats, and Scope ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-8 Manually Configuring Internet and WAN Settingsv1.0, January 20106. Configure t
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-9v1.0, January 20108. Click Test
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-10 Manually Configuring Internet and WAN Settingsv1.0, January 2010If you want t
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-11v1.0, January 2010Classical Rou
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-12 Manually Configuring Internet and WAN Settingsv1.0, January 2010To configure
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-13v1.0, January 2010WAN Failure D
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-14 Manually Configuring Internet and WAN Settingsv1.0, January 20103. Click Appl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-15v1.0, January 2010a. Figure 3-9
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-16 Manually Configuring Internet and WAN Settingsv1.0, January 2010b. Click the
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-17v1.0, January 2010Configuring S
ProSecure Unified Threat Management (UTM) Appliance Reference Manualviiiv1.0, January 2010Chapter 2 Using the Setup Wizard to Provision the UTM in You
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-18 Manually Configuring Internet and WAN Settingsv1.0, January 2010To add a seco
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-19v1.0, January 2010Configuring D
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-20 Manually Configuring Internet and WAN Settingsv1.0, January 2010The WAN Mode
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-21v1.0, January 20104. Click the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-22 Manually Configuring Internet and WAN Settingsv1.0, January 20107. Click Appl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualManually Configuring Internet and WAN Settings 3-23v1.0, January 20103. Enter the
ProSecure Unified Threat Management (UTM) Appliance Reference Manual3-24 Manually Configuring Internet and WAN Settingsv1.0, January 20104. Click Appl
4-1v1.0, January 2010Chapter 4LAN ConfigurationThis chapter describes how to configure the advanced LAN features of your UTM. This chapter contains th
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-2 LAN Configurationv1.0, January 2010VLANs have a number of advantages:• It is e
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-3v1.0, January 2010When you create a VLAN profile, assign LAN
ProSecure Unified Threat Management (UTM) Appliance Reference Manualixv1.0, January 2010Configuring Secondary WAN Addresses ...
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-4 LAN Configurationv1.0, January 2010For each VLAN profile, the following fields
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-5v1.0, January 2010The UTM delivers the following settings to
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-6 LAN Configurationv1.0, January 2010LDAP ServerA Lightweight Directory Access P
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-7v1.0, January 20102. Either select an entry from the VLAN Pro
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-8 LAN Configurationv1.0, January 20103. Enter the settings as explained in Table
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-9v1.0, January 2010Enable DHCP Server(continued)Starting IP Ad
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-10 LAN Configurationv1.0, January 20104. Click Apply to save your settings.Enabl
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-11v1.0, January 2010Configuring Multi-Home LAN IPs on the Defa
ProSecure Unified Threat Management (UTM) Appliance Reference Manual4-12 LAN Configurationv1.0, January 20103. In the Add Secondary LAN IPs section of
ProSecure Unified Threat Management (UTM) Appliance Reference ManualLAN Configuration 4-13v1.0, January 2010Some advantages of the Network Database ar
Comments to this Manuals