NETGEAR UTM5EW-100NAS Appliance Reference Manual page 480

Unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance Reference Manual
scan engine firmware
10-21
scan exceptions
e-mail message size
2-19
Web file or object size
2-20
scan signatures
10-21
scanning
exclusions
6-44
size exceptions
6-6, 6-23, 6-41
scheduling
blocking traffic
5-41
reports
11-42
Web content filtering
2-22
search criteria, logs
11-35
Secure Hash Algorithm 1. See SHA-1.
Secure Sockets Layer. See SSL (VPN).
security
log messages
C-12
overview
1-5
services settings, using the Setup Wizard
security association. See SA.
security lock
1-12
Security Parameters Index. See SPI.
service blocking
reducing traffic
10-2
rules
5-4
rules, firewall
5-3, 5-4
service licenses
activating
2-27
automatic retrieval
2-28
expiration dates
11-22
trial period
2-27
service logs
11-9, 11-33, 11-35
service numbers, common protocols
service registration card
1-8
Session Initiation Protocol. See SIP.
session limits
configuring
5-30
logging dropped packets
Setup Wizard, initial configuration
severities, syslog
11-9
SHA-1
IKE policies
7-29
Index-12
2-16
5-33
11-14
2-7
v1.0, January 2010
ModeConfig
7-46
self certificate requests
VPN policies
7-37
shutting down
11-48
signature key length
9-23
signatures & engine settings
HTTP proxy
2-25
update frequency
2-25
update settings, using the Setup Wizard
Simple Mail Transfer Protocol. See SMTP.
Simple Network Management Protocol. See SNMP.
single WAN port mode
bandwidth capacity
10-2
description (dual-WAN port models)
SIP
5-31
size
e-mail messages
2-19
Web files
2-20
Web objects
2-20
SMTP
action, infected e-mail
2-18
anti-virus settings
6-6
default port
2-17, 6-4
Distributed Spam Analysis
enabling scanning
2-17
file extension blocking
file name blocking
6-11
keyword blocking
6-10
password-protected attachment blocking
server for e-mail notification
sniffer
12-4
SNMP
attached devices
10-14
community strings
10-15
configuring
10-14
description
1-7
overview
10-14
traps
10-15
trusted hosts
10-15
source MAC filtering
configuring MAC addresses
logging matched packets
reducing traffic
10-5
9-23
2-24
3-10
6-17
6-11
6-10
2-23
5-42
11-14

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents