NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 468

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
DMZ
DHCP
address pool
4-20
DNS servers
4-21
domain name
4-20
LDAP server
4-21
lease time
4-21
relay
4-21
server
4-20
WINS server
4-21
DNS proxy
4-22
firewall security
4-18
increasing traffic
10-7
IP addresses
4-20
port
1-5, 4-18
setup settings
4-20
subnet mask
4-20
DNS
automatic configuration of PCs
dynamic
3-19
looking up an address
11-45
ModeConfig
7-45
proxy
1-6, 2-11, 4-10, 4-22
proxy, VLANs
4-5
queries, auto-rollover
3-11
server IP addresses
2-10, 2-13, 3-9, 4-9, 4-21, 8-10, 8-
27
documentation, online
12-12
documents, reference
E-1
domain name
PPPoE
2-13, 3-7
PPTP
2-12, 3-7
SSL VPN
8-6
domain name server, See DNS
domains, for authentication
DoS
1-4, 5-7, 5-21, 5-22, 5-50
downloading, SSL certificate
DPD
7-28, 7-56
DSCP
5-35
dual WAN ports (UTM25)
auto-rollover
B-6, B-8, B-10
FQDNs
3-19, 7-1, 7-2, B-1, B-9
load balancing
3-9, 3-10, B-7, B-8, B-10
network, planning
B-1
overview
1-3
Index-4
1-6
9-2, 9-10
2-3
v1.0, September 2009
duplex, half and full
3-23
Dynamic DNS. See DDNS.
Dynamic Host Configuration Protocol. See DHCP.
DynDNS.org
3-19, 3-21
E
e-commerce
8-1
edge device
7-38, 7-39
eDonkey
2-17, 6-21
EICAR
2-26
e-mail notification server
configuring manually
11-5
settings, using the Setup Wizard
SMTP server
2-23
e-mails
audio and video files, filtering
compressed files, filtering
Distributed Spam Analysis
executable files, filtering
filter logs
11-8, 11-33, 11-35
protection. See SMTP, POP3, or IMAP.
protocols
6-4
real-time blacklist
6-14
reports
11-39
security settings, using the Setup Wizard
spam protection
6-11
traffic statistics
11-16
whitelist and blacklist
6-12
embedded objects
6-28
environmental specifications
error messages and log messages, understanding
Ethernet ports
1-9
exceptions, Web access
6-41
exchange mode, IKE policies
exclusions, scanning
6-44
executable files
e-mail filtering
6-11
FTP filtering
6-41
Web filtering
6-28
exposed hosts
3-19, 5-28
Extended Authentication. See XAUTH.
1-6
2-23
6-11
6-11
6-16, 6-17
6-11
2-18
A-3
C-1
7-23, 7-26

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents