NETGEAR UTM5EW-100NAS Appliance Reference Manual page 472

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
DMZ
DHCP
address pool
4-20
DNS servers
4-21
domain name
4-20
LDAP server
4-21
lease time
4-21
relay
4-21
server
4-20
WINS server
4-21
DNS proxy
4-22
firewall security
4-18
increasing traffic
10-7
IP addresses
4-20
port
1-5, 4-18
setup settings
4-20
subnet mask
4-20
DNS
automatic configuration of PCs
dynamic
3-19
looking up an address
11-45
ModeConfig
7-46
proxy
1-6, 2-11, 4-10, 4-22
proxy, VLANs
4-5
queries, auto-rollover
3-11
server IP addresses
2-10, 2-13, 3-9, 4-9, 4-21, 8-10, 8-
27
documentation, online
12-12
documents, reference
E-1
domain name
PPPoE
2-13, 3-7
PPTP
2-12, 3-7
SSL VPN
8-6
domain name server, See DNS
domains, for authentication
DoS
1-4, 5-7, 5-28, 5-29, 5-52
downloading, SSL certificate
DPD
7-29, 7-57
DSCP
5-37
dual WAN ports (dual-WAN port models)
auto-rollover
B-6, B-8, B-10
FQDNs
3-19, 7-1, 7-2, B-1, B-9
load balancing
3-9, 3-10, B-7, B-8, B-10
network, planning
B-1
overview
1-3
Index-4
1-6
9-2, 9-10
2-3
v1.0, January 2010
duplex, half and full
3-23
Dynamic DNS. See DDNS.
Dynamic Host Configuration Protocol. See DHCP.
DynDNS.org
3-19, 3-21
E
e-commerce
8-1
edge device
7-39, 7-40
eDonkey
2-17, 6-21
EICAR
2-26
e-mail notification server
configuring manually
11-5
settings, using the Setup Wizard
SMTP server
2-23
e-mails
audio and video files, filtering
compressed files, filtering
Distributed Spam Analysis
executable files, filtering
filter logs
11-8, 11-33, 11-35
protection. See SMTP, POP3, or IMAP.
protocols
6-4
real-time blacklist
6-14
reports
11-39
security settings, using the Setup Wizard
spam protection
6-11
traffic statistics
11-16
whitelist and blacklist
6-12
embedded objects
6-28
environmental specifications
error messages and log messages, understanding
Ethernet ports
1-10
exceptions, Web access
6-41
exchange mode, IKE policies
exclusions, scanning
6-44
executable files
e-mail filtering
6-11
FTP filtering
6-41
Web filtering
6-28
exposed hosts
3-19, 5-25
Extended Authentication. See XAUTH.
1-6
2-23
6-11
6-11
6-16, 6-17
6-11
2-18
A-3
C-1
7-24, 7-27

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents