Sign In
Upload
Manuals
Brands
Netgear Manuals
Network Hardware
ProSecure UTM150
Netgear ProSecure UTM150 Manuals
Manuals and User Guides for Netgear ProSecure UTM150. We have
5
Netgear ProSecure UTM150 manuals available for free PDF download: Reference Manual, Installationsanleitung, Installation Manual
NETGEAR ProSecure UTM150 Reference Manual (645 pages)
ProSecure Unified Threat Management Appliance
Brand:
NETGEAR
| Category:
Firewall
| Size: 29.99 MB
Table of Contents
Technical Support
2
Revision History
3
Table of Contents
5
Chapter 1 Introduction
14
What Is the Prosecure Unified Threat Management (UTM) Appliance
14
Key Features and Capabilities
15
Multiple WAN Port Models for Increased Reliability or Outbound Load Balancing
16
Wireless Features
16
DSL Features
16
Advanced VPN Support for both Ipsec and SSL
17
A Powerful, True Firewall
17
Stream Scanning for Content Filtering
17
Security Features
18
Autosensing Ethernet Connections with Auto Uplink
19
Extensive Protocol Support
19
Easy Installation and Management
20
Maintenance and Support
20
Model Comparison
21
Service Registration Card with License Keys
21
Package Contents
23
Hardware Features
23
Front Panel UTM5 and UTM10
24
Front Panel UTM25
24
Front Panel UTM50
25
Front Panel UTM150
26
Front Panel UTM9S and Modules
26
LED Descriptions, UTM5, UTM10, UTM25, UTM50, and UTM150
28
LED Descriptions, UTM9S and Modules
29
Rear Panel UTM5, UTM10, and UTM25
31
Rear Panel UTM50 and UTM150
32
Rear Panel UTM9S
32
Bottom Panels with Product Labels
33
Choose a Location for the UTM
36
Use the Rack-Mounting Kit
37
Chapter 2 Using the Setup Wizard to Provision the UTM in Your
38
Steps for Initial Connection
38
Qualified Web Browsers
39
Requirements for Entering IP Addresses
39
Log in to the UTM
39
Web Management Interface Menu Layout
41
Use the Setup Wizard to Perform the Initial Configuration
43
Setup Wizard Step 1 of 10: LAN Settings
44
Setup Wizard Step 2 of 10: WAN Settings
47
Setup Wizard Step 3 of 10: System Date and Time
50
Setup Wizard Step 4 of 10: Services
51
Setup Wizard Step 5 of 10: Email Security
53
Setup Wizard Step 6 of 10: Web Security
54
Setup Wizard Step 7 of 10: Web Categories to be Blocked
56
Setup Wizard Step 8 of 10: Email Notification
58
Setup Wizard Step 9 of 10: Signatures & Engine
59
Setup Wizard Step 10 of 10: Saving the Configuration
60
Verify Correct Installation
60
Test Connectivity
61
Test HTTP Scanning
61
Register the UTM with NETGEAR
61
Electronic Licensing
63
Automatic Retrieval of Licenses after a Factory Default Reset
63
What to Do Next
64
Chapter 3 Manually Configuring Internet and WAN Settings
65
Internet and WAN Configuration Tasks
65
Automatically Detecting and Connecting the Internet Connections
66
Set the Utm's MAC Address
70
Manually Configure the Internet Connection
70
Configure the WAN Mode
74
Configure Network Address Translation (All Models)
76
Configure Classical Routing (All Models)
76
Configure Auto-Rollover Mode and the Failure Detection Method (Multiple WAN Port Models)
77
Configure Load Balancing and Optional Protocol Binding
80
Configure Secondary WAN Addresses
84
Configure Dynamic DNS
85
Configure Advanced WAN Options
89
Additional WAN-Related Configuration Tasks
91
Chapter 4 LAN Configuration
92
Manage Virtual Lans and DHCP Options
92
Port-Based Vlans
93
Assign and Manage VLAN Profiles
94
VLAN DHCP Options
95
Configure a VLAN Profile
96
Configure VLAN MAC Addresses and Advanced LAN Settings
102
Configure Multihome LAN Ips on the Default VLAN
103
Manage Groups and Hosts (LAN Groups)
105
Manage the Network Database
106
Change Group Names in the Network Database
109
Set up Address Reservation
110
Configure and Enable the DMZ Port
111
Manage Routing
115
Configure Static Routes
115
Configure Routing Information Protocol
117
Static Route Example
119
Chapter 5 Firewall Protection
120
About Firewall Protection
120
Administrator Tips
121
Use Rules to Block or Allow Specific Kinds of Traffic
121
Service-Based Rules
122
Order of Precedence for Rules
130
Set LAN WAN Rules
130
Set DMZ WAN Rules
134
Set LAN DMZ Rules
137
Inbound Rule Examples
140
Outbound Rule Example
144
Configure Other Firewall Features
145
VLAN Rules
145
Attack Checks, VPN Pass-Through, and Multicast Pass-Through
148
Set Session Limits
151
Manage the Application Level Gateway for SIP Sessions
152
Create Services, Qos Profiles, and Bandwidth Profiles
153
Add Customized Services
154
Create Service Groups
156
Create IP Groups
158
Create Quality of Service Profiles
160
Create Bandwidth Profiles
162
Create Traffic Meter Profiles
166
Set a Schedule to Block or Allow Specific Traffic
168
Enable Source MAC Filtering
170
Set up IP/MAC Bindings
172
Configure Port Triggering
174
Configure Universal Plug and Play
177
Use the Intrusion Prevention System
178
Chapter 6 Content Filtering and Optimizing Scans
183
About Content Filtering and Scans
183
Default Email and Web Scan Settings
184
Configure Email Protection
185
Customize Email Protocol Scan Settings
185
Customize Email Antivirus and Notification Settings
186
Email Content Filtering
190
Protect against Email Spam
193
Configure Web and Services Protection
201
Customize Web Protocol Scan Settings
201
Configure Web Malware Scans
202
Configure Web Content Filtering
204
Configure Web URL Filtering
211
Configure HTTPS (SSL) Scanning
215
Manage Digital Certificates for HTTPS Scans
218
Specify Trusted Hosts
223
Configure FTP Scanning
224
Configure Application Control
226
Set Exception Rules for Web and Application Access
234
Create Custom Categories for Exceptions for Web and
235
Create Custom Categories for Exceptions for Web and Application Access
243
Set Scanning Exclusions for IP Addresses and Ports
247
Chapter 7 Virtual Private Networking Using Ipsec Connections
249
Considerations for Dual WAN Port Systems
249
(Multiple WAN Port Models Only)
249
Use the Ipsec VPN Wizard for Client and Gateway Configurations
251
Create Gateway-To-Gateway VPN Tunnels with the Wizard
251
Create a Client-To-Gateway VPN Tunnel
255
Test the Connection and View Connection and Status Information
270
Test the NETGEAR VPN Client Connection
270
NETGEAR VPN Client Status and Log Information
272
View the UTM Ipsec VPN Connection Status
272
View the UTM Ipsec VPN Log
273
Manage Ipsec VPN Policies
274
Manage IKE Policies
274
Manage VPN Policies
282
Configure Extended Authentication (XAUTH)
290
Configure XAUTH for VPN Clients
291
User Database Configuration
292
RADIUS Client Configuration
292
Assign IP Addresses to Remote Users (Mode Config)
294
Mode Config Operation
294
Configure Mode Config Operation on the UTM
295
Configure the Prosafe VPN Client for Mode Config Operation
301
Test the Mode Config Connection
308
Modify or Delete a Mode Config Record
309
Configure Keep-Alives and Dead Peer Detection
310
Configure Keep-Alives
310
Configure Dead Peer Detection
311
Configure Netbios Bridging with Ipsec VPN
312
Configure the PPTP Server
313
View the Active PPTP Users
315
Configure the L2TP Server
316
View the Active L2TP Users
318
Chapter 8 Virtual Private Networking Using SSL Connections
319
SSL VPN Portal Options
319
Use the SSL VPN Wizard for Client Configurations
320
SSL VPN Wizard Step 1 of 6 (Portal Settings)
321
SSL VPN Wizard Step 2 of 6 (Domain Settings)
323
SSL VPN Wizard Step 3 of 6 (User Settings)
328
SSL VPN Wizard Step 4 of 6 (Client Addresses and Routes)
329
SSL VPN Wizard Step 5 of 6 (Port Forwarding)
330
SSL VPN Wizard Step 6 of 6 (Verify and Save Your Settings)
332
Access the New SSL Portal Login Screen
333
View the UTM SSL VPN Connection Status
335
View the UTM SSL VPN Log
335
Manually Configure and Edit SSL Connections
336
Create the Portal Layout
337
Configure Domains, Groups, and Users
341
Configure Applications for Port Forwarding
341
Configure the SSL VPN Client
344
Use Network Resource Objects to Simplify Policies
347
Configure User, Group, and Global Policies
349
View Policies
351
Chapter 9 Managing Users, Authentication, and VPN Certificates
356
Authentication Process and Options
356
Configure Authentication Domains, Groups, and Users
358
Login Portals
358
Active Directories and LDAP Configurations
362
Configure Domains
365
Configure Groups
372
Configure Custom Groups
375
Configure User Accounts
378
Set User Login Policies
381
Change Passwords and Other User Settings
385
DC Agent
387
Configure RADIUS Vlans
393
Configure Global User Settings
394
View and Log out Active Users
395
Manage Digital Certificates for VPN Connections
397
VPN Certificates Screen
398
Manage CA Certificates
399
Manage Self-Signed Certificates
400
Manage the Certificate Revocation List
404
Chapter 10 Network and System Management
405
Performance Management
405
Bandwidth Capacity
405
Features that Reduce Traffic
406
Content Filtering
408
Features that Increase Traffic
409
Port Triggering
411
Use Qos and Bandwidth Assignments to Shift the Traffic MIX
412
Monitoring Tools for Traffic Management
412
System Management
412
Change Passwords and Administrator and Guest Settings
413
Configure Remote Management Access
415
Use a Simple Network Management Protocol Manager
417
Manage the Configuration File
418
Update the Firmware
421
Update the Scan Signatures and Scan Engine Firmware
426
Configure Date and Time Service
428
Connect to a Readynas and Configure Quarantine Settings
430
Log Storage
430
Connect to a Readynas
431
Configure the Quarantine Settings
432
Chapter 11 Monitoring System Access and Performance
434
Enable the WAN Traffic Meter
434
Configure Logging, Alerts, and Event Notifications
438
Configure the Email Notification Server
438
Configure and Activate System, Email, and Syslog Logs
439
How to Send Syslogs over a VPN Tunnel between Sites
443
Configure and Activate Update Failure and Attack Alerts
445
Configure and Activate Firewall Logs
448
Monitor Real-Time Traffic, Security, and Statistics
449
Monitor Application Use in Real-Time
455
View Status Screens
458
View the System Status
458
View the Active VPN Users
469
View the VPN Tunnel Connection Status
470
View the PPTP and L2TP Server Status
471
View the Port Triggering Status
472
View the WAN Ports Status
474
View Attached Devices and the DHCP Leases
475
Query the Logs
478
Query and Download Logs
479
Example: Use the Logs to Identify Infected Clients
484
Log Management
484
Query the Quarantine Logs
485
Query the Quarantined Logs
485
View and Manage the Quarantined Spam Table
488
View and Manage the Quarantined Infected Files Table
489
Spam Reports for End Users
490
View, Schedule, and Generate Reports
491
Enable Application Session Monitoring
492
Report Filtering Options
493
Use Report Templates and View Reports Onscreen
495
Schedule, Email, and Manage Reports
500
Use Diagnostics Utilities
502
Use the Network Diagnostic Tools
503
Use the Real-Time Traffic Diagnostics Tool
504
Gather Important Log Information and Generate a Network Statistics Report
506
Chapter 12 Troubleshooting and Using Online Support
508
Basic Functioning
509
Power LED Not on
509
Test LED Never Turns off
509
LAN or WAN Port Leds Not on
510
Troubleshoot the Web Management Interface
510
When You Enter a URL or IP Address, a Time-Out Error Occurs
511
Troubleshoot the ISP Connection
511
Troubleshoot a TCP/IP Network Using a Ping Utility
513
Test the LAN Path to Your UTM
513
Test the Path from Your PC to a Remote Device
514
Restore the Default Configuration and Password
514
Problems with Date and Time
515
Use Online Support
516
Enable Remote Troubleshooting
516
Send Suspicious Files to NETGEAR for Analysis
517
Access the Knowledge Base and Documentation
517
Appendix A Xdsl Module for the UTM9S
518
Xdsl Module Configuration Tasks
518
Configure the Xdsl Settings
519
Automatically Detecting and Connecting the Internet Connection
521
Set the Utm's MAC Address
524
Manually Configure the Internet Connection
524
Configure the WAN Mode
528
Configure Network Address Translation
529
Configure Classical Routing
530
Configure Auto-Rollover Mode and the Failure Detection Method
530
Configure Load Balancing and Optional Protocol Binding
533
Configure Secondary WAN Addresses
537
Configure Dynamic DNS
539
Configure Advanced WAN Options
541
Additional WAN-Related Configuration Tasks
543
Appendix B Wireless Module for the UTM9S
544
Overview of the Wireless Module
544
Configuration Order
545
Wireless Equipment Placement and Range Guidelines
545
Configure the Basic Radio Settings
546
Operating Frequency (Channel) Guidelines
549
Wireless Data Security Options
549
Wireless Security Profile
551
Before You Change the SSID, WEP, and WPA Settings
552
Configure and Enable Wireless Security Profiles
553
Configure the Access Point
557
Restrict Wireless Access by MAC Address
560
View the Access Point Status and Connected Clients
561
Configure a Wireless Distribution System
563
Configure Advanced Radio Settings
564
Configure Advanced Profile and WMM Qos Priority Settings
566
Advanced Profile Settings
566
WMM Qos Priority Settings
568
Test Basic Wireless Connectivity
570
Appendix C Network Planning for Dual WAN Ports
571
(Multiple WAN Port Models Only)
571
What to Consider before You Begin
571
Cabling and Computer Hardware Requirements
572
Computer Network Configuration Requirements
573
Internet Configuration Requirements
573
Overview of the Planning Process
575
Inbound Traffic
576
Inbound Traffic to a Single WAN Port System
576
Inbound Traffic to a Dual WAN Port System
577
Virtual Private Networks
578
VPN Road Warrior (Client-To-Gateway)
579
VPN Gateway-To-Gateway
582
VPN Telecommuter (Client-To-Gateway through a NAT Router)
584
Appendix D Readynas Integration
587
Supported Readynas Models
587
Install the UTM Add-On on the Readynas
588
Connect to the Readynas on the UTM
590
Appendix E Two-Factor Authentication
593
Why Do I Need Two-Factor Authentication
593
What Are the Benefits of Two-Factor Authentication
593
What Is Two-Factor Authentication
594
NETGEAR Two-Factor Authentication Solutions
594
Appendix F System Logs and Error Messages
597
System Log Messages
598
System Startup
598
Reboot
598
Service Logs
598
Ntp
599
Login/Logout
599
Firewall Restart
600
Ipsec Restart
600
WAN Status
600
Traffic Metering Logs
604
Unicast, Multicast, and Broadcast Logs
604
Invalid Packet Logging
605
Content-Filtering and Security Logs
607
Web Filtering and Content-Filtering Logs
607
Spam Logs
609
Traffic Logs
609
Virus Logs
610
Email Filter Logs
610
IPS Logs
611
Port Scan Logs
611
Application Logs
611
Routing Logs
612
LAN-To-WAN Logs
612
LAN-To-DMZ Logs
612
DMZ-To-WAN Logs
612
WAN-To-LAN Logs
613
DMZ-To-LAN Logs
613
WAN-To-DMZ Logs
613
Appendix G Default Settings and Technical Specifications
614
Default Settings
614
Physical and Technical Specifications
616
Appendix H Notification of Compliance (Wired)
620
Appendix I Notification of Compliance (Wireless)
625
Index
629
Advertisement
Netgear ProSecure UTM150 Reference Manual (631 pages)
ProSecure Unified Threat Management (UTM) Appliance
Brand:
Netgear
| Category:
Network Hardware
| Size: 31.89 MB
Table of Contents
Revision History
2
Technical Support
2
Table of Contents
4
Chapter 1 Introduction
13
What Is the Prosecure Unified Threat Management (UTM) Appliance
13
Key Features and Capabilities
14
Multiple WAN Port Models for Increased Reliability or Outbound Load Balancing
15
Wireless Features
15
DSL Features
15
Advanced VPN Support for both Ipsec and SSL
16
A Powerful, True Firewall
16
Stream Scanning for Content Filtering
16
Security Features
17
Autosensing Ethernet Connections with Auto Uplink
17
Extensive Protocol Support
18
Easy Installation and Management
18
Maintenance and Support
19
Model Comparison
19
Service Registration Card with License Keys
20
Package Contents
21
Hardware Features
22
Front Panel UTM5 and UTM10
22
Front Panel UTM25
23
Front Panel UTM50
24
Front Panel UTM150
24
Front Panel UTM9S and Modules
25
LED Descriptions, UTM5, UTM10, UTM25, UTM50, and UTM150
27
LED Descriptions, UTM9S and Modules
28
Rear Panel UTM5, UTM10, and UTM25
30
Rear Panel UTM50 and UTM150
31
Rear Panel UTM9S
31
Bottom Panels with Product Labels
32
Choose a Location for the UTM
35
Use the Rack-Mounting Kit
36
Chapter 2 Using the Setup Wizard to Provision the UTM in Your
37
Steps for Initial Connection
37
Qualified Web Browsers
38
Requirements for Entering IP Addresses
38
Log in to the UTM
38
Web Management Interface Menu Layout
40
Use the Setup Wizard to Perform the Initial Configuration
42
Setup Wizard Step 1 of 10: LAN Settings
43
Setup Wizard Step 2 of 10: WAN Settings
46
Setup Wizard Step 3 of 10: System Date and Time
49
Setup Wizard Step 4 of 10: Services
51
Setup Wizard Step 5 of 10: Email Security
53
Setup Wizard Step 6 of 10: Web Security
55
Setup Wizard Step 7 of 10: Web Categories to be Blocked
57
Setup Wizard Step 8 of 10: Email Notification
59
Setup Wizard Step 9 of 10: Signatures & Engine
60
Setup Wizard Step 10 of 10: Saving the Configuration
61
Verify Correct Installation
61
Test Connectivity
62
Test HTTP Scanning
62
Register the UTM with NETGEAR
62
Electronic Licensing
64
What to Do Next
64
Chapter 3 Manually Configuring Internet and WAN Settings
66
Internet and WAN Configuration Tasks
67
Automatically Detecting and Connecting the Internet Connections
67
Set the Utm's MAC Address
71
Manually Configure the Internet Connection
71
Configure the WAN Mode
75
Configure Network Address Translation (All Models)
77
Configure Classical Routing (All Models)
77
Configure Auto-Rollover Mode and the Failure Detection Method (Multiple WAN Port Models)
78
Configure Load Balancing and Optional Protocol Binding
81
Configure Secondary WAN Addresses
85
Configure Dynamic DNS
87
Configure Advanced WAN Options
90
Additional WAN-Related Configuration Tasks
92
Chapter 4 LAN Configuration
93
Manage Virtual Lans and DHCP Options
93
Port-Based Vlans
94
Assign and Manage VLAN Profiles
95
VLAN DHCP Options
96
Configure a VLAN Profile
98
Configure VLAN MAC Addresses and Advanced LAN Settings
103
Configure Multihome LAN Ips on the Default VLAN
104
Manage Groups and Hosts (LAN Groups)
106
Manage the Network Database
107
Change Group Names in the Network Database
110
Set up Address Reservation
111
Configure and Enable the DMZ Port
112
Manage Routing
115
Configure Static Routes
116
Configure Routing Information Protocol
118
Static Route Example
120
Chapter 5 Firewall Protection
121
About Firewall Protection
121
Administrator Tips
122
Use Rules to Block or Allow Specific Kinds of Traffic
122
Service-Based Rules
123
Order of Precedence for Rules
130
Set LAN WAN Rules
130
Set DMZ WAN Rules
133
Set LAN DMZ Rules
136
Inbound Rule Examples
139
Outbound Rule Example
143
Configure Other Firewall Features
144
VLAN Rules
144
Attack Checks, VPN Pass-Through, and Multicast Pass-Through
146
Set Session Limits
150
Manage the Application Level Gateway for SIP Sessions
151
Create Services, Qos Profiles, and Bandwidth Profiles
152
Add Customized Services
152
Create Service Groups
154
Create IP Groups
156
Create Quality of Service Profiles
158
Create Bandwidth Profiles
160
Set a Schedule to Block or Allow Specific Traffic
163
Enable Source MAC Filtering
164
Set up IP/MAC Bindings
166
Configure Port Triggering
168
Configure Universal Plug and Play
171
Use the Intrusion Prevention System
172
Chapter 6 Content Filtering and Optimizing Scans
175
About Content Filtering and Scans
175
Default Email and Web Scan Settings
176
Configure Email Protection
178
Customize Email Protocol Scan Settings
178
Customize Email Antivirus and Notification Settings
179
Email Content Filtering
183
Protect against Email Spam
186
Configure Web and Services Protection
194
Customize Web Protocol Scan Settings and Services (Web Applications)
194
Configure Web Malware Scans
197
Configure Web Content Filtering
199
Configure Web URL Filtering
206
HTTPS Scan Settings
209
Manage Digital Certificates for HTTPS Scans
213
Specify Trusted Hosts
218
Configure FTP Scans
219
Set Web Access Exception Rules
221
Create Custom Groups for Web Access Exceptions
228
Create Custom Categories for Web Access Exceptions
231
Set Scanning Exclusions
235
Chapter 7 Virtual Private Networking Using Ipsec Connections
237
Considerations for Dual WAN Port Systems (Multiple WAN Port Models Only)
237
Use the Ipsec VPN Wizard for Client and Gateway Configurations
239
Create Gateway-To-Gateway VPN Tunnels with the Wizard
239
Create a Client-To-Gateway VPN Tunnel
243
Test the Connection and View Connection and Status Information
258
Test the NETGEAR VPN Client Connection
258
NETGEAR VPN Client Status and Log Information
260
View the UTM Ipsec VPN Connection Status
260
View the UTM Ipsec VPN Log
261
Manage Ipsec VPN Policies
262
Manage IKE Policies
262
Manage VPN Policies
269
Configure Extended Authentication (XAUTH)
277
Configure XAUTH for VPN Clients
277
User Database Configuration
278
RADIUS Client Configuration
279
Assign IP Addresses to Remote Users (Mode Config)
281
Mode Config Operation
281
Configure Mode Config Operation on the UTM
281
Configure the Prosafe VPN Client for Mode Config Operation
288
Test the Mode Config Connection
295
Modify or Delete a Mode Config Record
296
Configure Keep-Alives and Dead Peer Detection
297
Configure Keep-Alives
297
Configure Dead Peer Detection
298
Configure Netbios Bridging with Ipsec VPN
299
Configure the PPTP Server (UTM9S Only)
300
View the Active PPTP Users
302
Configure the L2TP Server (UTM9S Only)
303
View the Active L2TP Users
304
Chapter 8 Virtual Private Networking Using SSL Connections
306
SSL VPN Portal Options
306
Use the SSL VPN Wizard for Client Configurations
307
SSL VPN Wizard Step 1 of 6 (Portal Settings)
308
SSL VPN Wizard Step 2 of 6 (Domain Settings)
310
SSL VPN Wizard Step 3 of 6 (User Settings)
314
SSL VPN Wizard Step 4 of 6 (Client Addresses and Routes)
316
SSL VPN Wizard Step 5 of 6 (Port Forwarding)
317
SSL VPN Wizard Step 6 of 6 (Verify and Save Your Settings)
319
Access the New SSL Portal Login Screen
320
View the UTM SSL VPN Connection Status
322
View the UTM SSL VPN Log
322
Manually Configure and Edit SSL Connections
323
Create the Portal Layout
324
Configure Domains, Groups, and Users
328
Configure Applications for Port Forwarding
328
Configure the SSL VPN Client
331
Use Network Resource Objects to Simplify Policies
334
Configure User, Group, and Global Policies
336
Chapter 9 Managing Users, Authentication, and VPN Certificates
343
Authentication Process and Options
343
Configure Authentication Domains, Groups, and Users
345
Login Portals
345
Active Directories and LDAP Configurations
349
Configure Domains
353
Configure Groups
359
Configure User Accounts
362
Set User Login Policies
365
Change Passwords and Other User Settings
369
DC Agent
370
Configure RADIUS Vlans
376
Configure Global User Settings
377
View and Log out Active Users
378
Manage Digital Certificates for VPN Connections
381
VPN Certificates Screen
382
Manage CA Certificates
382
Manage Self-Signed Certificates
384
Manage the Certificate Revocation List
388
Chapter 10 Network and System Management
389
Performance Management
389
Bandwidth Capacity
389
Features that Reduce Traffic
390
Content Filtering
392
Features that Increase Traffic
393
Port Triggering
395
Use Qos and Bandwidth Assignments to Shift the Traffic MIX
396
Monitoring Tools for Traffic Management
396
System Management
397
Change Passwords and Administrator and Guest Settings
397
Configure Remote Management Access
399
Use a Simple Network Management Protocol Manager
401
Manage the Configuration File
403
Update the Firmware
405
Update the Scan Signatures and Scan Engine Firmware
410
Configure Date and Time Service
412
Connect to a Readynas and Configure Quarantine Settings (UTM9S Only)
414
Log Storage
414
Connect to a Readynas
415
Configure the Quarantine Settings
416
Chapter 11 Monitoring System Access and Performance
418
Enable the WAN Traffic Meter
419
Configure Logging, Alerts, and Event Notifications
422
Configure the Email Notification Server
422
Configure and Activate System, Email, and Syslog Logs
423
How to Send Syslogs over a VPN Tunnel between Sites
427
Configure and Activate Update Failure and Attack Alerts
429
Configure and Activate Firewall Logs
432
Monitor Real-Time Traffic, Security, and Statistics
433
View Status Screens
439
View the System Status
439
View the Active VPN Users
451
View the VPN Tunnel Connection Status
452
View the PPTP and L2TP Server Status (UTM9S Only)
453
View the Port Triggering Status
454
View the WAN Ports Status
456
View Attached Devices and the DHCP Log
457
Query the Logs
460
Query and Download Logs
461
Example: Use the Logs to Identify Infected Clients
466
Log Management
466
Query the Quarantine Logs (UTM9S Only)
467
Query the Quarantined Logs
467
View and Manage the Quarantined Spam Table
470
View and Manage the Quarantined Infected Files Table
471
Spam Reports for End Users
472
View, Schedule, and Generate Reports
473
Report Filtering Options
474
Use Report Templates and View Reports Onscreen
476
Schedule, Email, and Manage Reports
480
Use Diagnostics Utilities
482
Use the Network Diagnostic Tools
483
(All UTM Models Except the UTM9S)
483
Use the Network Diagnostic Tools (UTM9S)
484
Use the Real-Time Traffic Diagnostics Tool (All UTM Models Except the UTM9S)
486
Use the Real-Time Traffic Diagnostics Tool (UTM9S)
487
Gather Important Log Information and Generate a Network Statistics Report (All Models)
488
Chapter 12 Troubleshooting and Using Online Support
491
Basic Functioning
492
Power LED Not on
492
Test LED Never Turns off
492
LAN or WAN Port Leds Not on
493
Troubleshoot the Web Management Interface
493
When You Enter a URL or IP Address, a Time-Out Error Occurs
494
Troubleshoot the ISP Connection
494
Troubleshoot a TCP/IP Network Using a Ping Utility
496
Test the LAN Path to Your UTM
496
Test the Path from Your PC to a Remote Device
497
Restore the Default Configuration and Password
498
Problems with Date and Time
499
Use Online Support
499
Enable Remote Troubleshooting
499
Send Suspicious Files to NETGEAR for Analysis
500
Access the Knowledge Base and Documentation
501
Appendix A Xdsl Module for the UTM9S
502
Xdsl Module Configuration Tasks
502
Configure the Xdsl Settings
503
Automatically Detecting and Connecting the Internet Connection
505
Set the Utm's MAC Address
508
Manually Configure the Internet Connection
508
Configure the WAN Mode
512
Configure Network Address Translation
513
Configure Classical Routing
514
Configure Auto-Rollover Mode and the Failure Detection Method
514
Configure Load Balancing and Optional Protocol Binding
517
Configure Secondary WAN Addresses
521
Configure Dynamic DNS
523
Configure Advanced WAN Options
526
Additional WAN-Related Configuration Tasks
528
Appendix B Wireless Module for the UTM9S
529
Overview of the Wireless Module
529
Configuration Order
530
Wireless Equipment Placement and Range Guidelines
530
Configure the Basic Radio Settings
531
Operating Frequency (Channel) Guidelines
534
Wireless Data Security Options
534
Wireless Security Profile
536
Before You Change the SSID, WEP, and WPA Settings
537
Configure and Enable Wireless Security Profiles
538
Configure the Access Point
542
Restrict Wireless Access by MAC Address
545
View the Access Point Status and Connected Clients
546
Configure a Wireless Distribution System
548
Configure Advanced Radio Settings
549
Configure Advanced Profile and WMM Qos Priority Settings
551
Advanced Profile Settings
551
WMM Qos Priority Settings
553
Test Basic Wireless Connectivity
554
Appendix C Network Planning for Dual WAN Ports
556
(Multiple WAN Port Models Only)
556
What to Consider before You Begin
556
Cabling and Computer Hardware Requirements
557
Computer Network Configuration Requirements
558
Internet Configuration Requirements
558
Overview of the Planning Process
560
Inbound Traffic
561
Inbound Traffic to a Single WAN Port System
562
Inbound Traffic to a Dual WAN Port System
562
Virtual Private Networks
563
VPN Road Warrior (Client-To-Gateway)
564
VPN Gateway-To-Gateway
567
VPN Telecommuter (Client-To-Gateway through a NAT Router)
569
Appendix D Readynas Integration
572
Supported Readynas Models
572
Install the UTM9S Add-On on the Readynas
573
Connect to the Readynas on the UTM9S
575
Appendix E Two-Factor Authentication
578
Why Do I Need Two-Factor Authentication
578
What Are the Benefits of Two-Factor Authentication
578
What Is Two-Factor Authentication
579
NETGEAR Two-Factor Authentication Solutions
579
Appendix F System Logs and Error Messages
582
System Log Messages
583
System Startup
583
Reboot
583
Service Logs
583
Ntp
584
Login/Logout
584
Firewall Restart
585
Ipsec Restart
585
WAN Status
585
Traffic Metering Logs
589
Unicast, Multicast, and Broadcast Logs
589
Invalid Packet Logging
590
Content-Filtering and Security Logs
592
Web Filtering and Content-Filtering Logs
592
Spam Logs
594
Traffic Logs
595
Virus Logs
595
Email Filter Logs
595
IPS Logs
596
Port Scan Logs
596
Application Logs
596
Routing Logs
597
LAN-To-WAN Logs
597
LAN-To-DMZ Logs
597
DMZ-To-WAN Logs
597
WAN-To-LAN Logs
598
DMZ-To-LAN Logs
598
WAN-To-DMZ Logs
598
Appendix G Default Settings and Technical Specifications
599
Default Settings
599
Physical and Technical Specifications
601
Appendix H Notification of Compliance (Wired)
605
Appendix I Notification of Compliance (Wireless)
609
Regulatory Compliance Information
609
Fcc Declaration of Conformity
611
Industry Canada
612
Index
614
Netgear ProSecure UTM150 Installation Manual (2 pages)
ProSecure Unified Threat Management (UTM) Appliance
Brand:
Netgear
| Category:
Network Hardware
| Size: 0.19 MB
Advertisement
Netgear ProSecure UTM150 Installation Manual (2 pages)
ProSecure Unified Threat Management (UTM) Appliance
Brand:
Netgear
| Category:
Network Hardware
| Size: 0.25 MB
(German) Netgear ProSecure UTM150 Installationsanleitung (2 pages)
ProSecure Unified Threat Management (UTM) Appliance
Brand:
Netgear
| Category:
Network Hardware
| Size: 0.33 MB
Advertisement
Related Products
Netgear ProSafe UTM9S
Netgear UTM10 - ProSecure Unified Threat Management Appliance
Netgear UTM25 - ProSecure Unified Threat Management Appliance
Netgear UTM5 - ProSecure Unified Threat Management Appliance
Netgear UTM50 - ProSecure Unified Threat Management Appliance
Netgear UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included
Netgear UTM5EW-100NAS
Netgear ProSecure UTM25S
NETGEAR ProSecure UTM9S
NETGEAR ProSecure
Netgear Categories
Wireless Router
Switch
Network Router
Adapter
Wireless Access Point
More Netgear Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL