ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Network Access Server. See NAS.
Network Address Translation. See NAT.
Network Time Protocol. See NTP.
newsgroups
6-24
NT Domain
8-6, 9-2, 9-5
NTP
servers, settings
2-15, 10-25
troubleshooting
12-9
number of
concurrent sessions
1-2
concurrent users
1-2
VPN tunnels
1-2
O
objects, embedded
6-28
one-time passcode. See OTP.
online
documentation
12-12
support
12-10
online games, DMZ port
4-18
option arrow (Web Management Interface)
Oray.net
3-19, 3-21
order of precedence, firewall rules
OTP
D-1, D-2
outbound rules
default
5-3
DMZ to WAN
5-16
examples
5-29
LAN to DMZ
5-19
LAN to WAN
5-12
order of precedence
5-10
overview
5-4
reducing traffic
10-2
service blocking
5-4
settings
5-5
outbreak
IPS, defining
11-12
malware, defining
11-12
P
package contents, UTM
1-9
2-5
5-10
v1.0, September 2009
packets, accepted and dropped
PAP. See also RADIUS-PAP, MIAS-PAP, or WiKID-
PAP.
9-2
Password Authentication Protocol. See PAP.
password-protected attachments
passwords
changing
9-16, 10-9
default
2-3
restoring
12-8
pattern file
10-21
Peer-to-Peer (P2P)
blocked applications, recent 5 and top 5
blocking applications
6-21
logs
11-8, 11-33, 11-35
traffic statistics
11-16
Perfect Forward Secrecy. See PFS.
performance management
permanent IP address
2-13, 3-4, 3-8
PFS
7-37, 7-45
phishing
6-16
physical specifications
A-2
pinging
auto-rollover
3-11
checking connections
11-44
failover attempts
3-13
responding on Internet ports
responding on LAN ports
retry interval
3-13
troubleshooting TCP/IP
using the ping utility
11-44
placement, location
1-14
Point-to-Point Tunneling Protocol, See PPTP
policies
IKE
exchange mode
7-23, 7-26
ISAKMP identifier
7-23, 7-27
managing
7-22
ModeConfig
7-26, 7-46
XAUTH
7-29
IPsec VPN
automatically generated (auto)
groups, configuring
managing
7-21
11-14
6-8
11-18
10-1
5-21
5-22
12-6
7-30
9-6
Index-9