NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 320

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
4. In the Defined Addresses Status section of the screen, select one of the following radio
buttons:
Deny Login from Defined Addresses. Deny logging in from the IP addresses in the
Defined Addresses table.
Allow Login only from Defined Addresses. Allow logging in from the IP addresses in
the Defined Addresses table.
5. Click Apply to save your settings.
6. In the Add Defined Addresses section of the screen, add an address to the Defined Addresses
table by entering the settings as explained in
Table 9-5. Add Defined Addresses Settings
Setting
Source Address Type Select the type of address from the pull-down menu:
Network Address / IP
Address
Mask Length
7. Click the add table button. The address is added to the Defined Addresses table.
8. Repeat
step 6
and
table.
To delete one or more addresses:
1. In the Defined Addresses table, select the checkbox to the left of the address that you want to
delete or click the select all table button to select all addresses.
2. Click the delete table button.
Configuring Login Restrictions Based on Web Browser
To restrict logging in based on the user's browser:
1. Select Users > Users from the menu. The Users screen displays (see
2. In the Action column of the List of Users table, click the policies table button for the user for
which you want to set login policies. The Policies submenu tabs appear, with the Login
Policies screen in view.
9-14
Description (or Subfield and Description)
• IP Address. A single IP address.
• IP Network. A subnet of IP Addresses. You must enter a netmask length in
the Mask Length field.
Depending on your selection of the Source Address Type pull-down menu,
enter the IP address or the network address.
For a network address, enter the netmask length (0 - 32).
Note: By default, a single IP address is assigned a netmask length of 32.
step 7
for any other addresses that you want to add to the Defined Addresses
v1.0, September 2009
Table 9-5 on page
9-14.
Managing Users, Authentication, and Certificates
Figure 9-5 on page
9-10).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents