NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual page 476

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
scanning
exclusions
6-44
size exceptions
6-6, 6-23, 6-41
scheduling
blocking traffic
5-39
reports
11-42
Web content filtering
2-22
search criteria, logs
11-35
Secure Hash Algorithm 1. See SHA-1.
Secure Sockets Layer. See SSL (VPN).
security
log messages
C-12
overview
1-5
settings, using the Setup Wizard
security association. See SA.
security lock
1-12
Security Parameters Index. See SPI.
security subscription
HTTP proxy
2-25
update frequency
2-25
update settings, using the Setup Wizard
service blocking
reducing traffic
10-2
rules
5-4
rules, firewall
5-3, 5-4
service licenses
activating
2-27
automatic retrieval
2-29
expiration dates
11-22
trial period
2-27
service logs
11-9, 11-33, 11-35
service numbers, common protocols
service registration card
1-8
Session Initiation Protocol. See SIP.
session limits
configuring
5-23
logging dropped packets
Setup Wizard, initial configuration
severities, syslog
11-9
SHA-1
IKE policies
7-28
ModeConfig
7-45
Index-12
2-16
2-24
5-31
11-14
2-7
v1.0, September 2009
self certificate requests
VPN policies
7-36
shutting down
11-48
signature key length
9-23
Simple Mail Transfer Protocol. See SMTP.
Simple Network Management Protocol. See SNMP.
single WAN port mode
bandwidth capacity
10-1
description (UTM25)
3-10
SIP
5-24
size
e-mail messages
2-19
Web files
2-20
Web objects
2-20
Skype
2-17, 6-21
SMTP
action, infected e-mail
2-18
anti-virus settings
6-6
default port
2-17, 6-4
Distributed Spam Analysis
enabling scanning
2-17
file extension blocking
file name blocking
6-11
keyword blocking
6-10
password-protected attachment blocking
server for e-mail notification
sniffer
12-4
SNMP
attached devices
10-14
community strings
10-15
configuring
10-14
description
1-7
overview
10-14
traps
10-15
trusted hosts
10-15
source MAC filtering
configuring MAC addresses
logging matched packets
reducing traffic
10-5
spam
blocked messages, recent 5 and top 5
Distributed Spam Analysis
logs
11-8, 11-32, 11-34
protection
6-11
9-23
6-17
6-11
6-10
2-23
5-40
11-14
11-18
6-16

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents