ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Chapter 2
Using the Setup Wizard to Provision the UTM in Your Network
Qualified Web Browsers ...........................................................................................2-2
Logging In to the UTM ....................................................................................................2-2
Testing Connectivity ...............................................................................................2-26
Testing HTTP Scanning .........................................................................................2-26
What to Do Next ...........................................................................................................2-29
Chapter 3
viii
v1.0, September 2009