Sign In
Upload
Manuals
Brands
Netgear Manuals
Network Hardware
UTM5EW-100NAS
Netgear UTM5EW-100NAS Manuals
Manuals and User Guides for Netgear UTM5EW-100NAS. We have
1
Netgear UTM5EW-100NAS manual available for free PDF download: Appliance Reference Manual
Netgear UTM5EW-100NAS Appliance Reference Manual (484 pages)
Unified Threat Management
Brand:
Netgear
| Category:
Network Hardware
| Size: 10 MB
Table of Contents
Table of Contents
7
About this Manual
17
Conventions, Formats, and Scope
17
How to Print this Manual
18
Revision History
18
Chapter 1 Introduction
19
What Is the Prosecure Unified Threat Management (UTM) Appliance
19
Key Features and Capabilities
20
Dual-WAN Port Models for Increased Reliability or Outbound Load Balancing
21
Advanced VPN Support for both Ipsec and SSL
21
A Powerful, True Firewall
22
Stream Scanning for Content Filtering
22
Security Features
23
Autosensing Ethernet Connections with Auto Uplink
23
Extensive Protocol Support
24
Easy Installation and Management
24
Maintenance and Support
25
Model Comparison
25
Service Registration Card with License Keys
26
Package Contents
27
Hardware Features
28
Front Panel
28
Rear Panel
30
Bottom Panel with Product Label
30
Choosing a Location for the UTM
32
Using the Rack-Mounting Kit
33
Chapter 2 Using the Setup Wizard to Provision the UTM in Your Network
35
Understanding the Steps for Initial Connection
35
Qualified Web Browsers
36
Logging in to the UTM
36
Understanding the Web Management Interface Menu Layout
39
Using the Setup Wizard to Perform the Initial Configuration
41
Setup Wizard Step 1 of 10: LAN Settings
42
Setup Wizard Step 2 of 10: WAN Settings
45
Setup Wizard Step 3 of 10: System Date and Time
48
Setup Wizard Step 4 of 10: Services
50
Setup Wizard Step 5 of 10: Email Security
52
Setup Wizard Step 6 of 10: Web Security
53
Setup Wizard Step 7 of 10: Web Categories to be Blocked
55
Setup Wizard Step 8 of 10: Email Notification
57
Setup Wizard Step 9 of 10: Signatures & Engine
58
Setup Wizard Step 10 of 10: Saving the Configuration
59
Verifying Proper Installation
60
Testing Connectivity
60
Testing HTTP Scanning
60
Registering the UTM with NETGEAR
60
What to Do Next
62
Chapter 3 Manually Configuring Internet and WAN Settings
63
Understanding the Internet and WAN Configuration Tasks
63
Configuring the Internet Connections
64
Automatically Detecting and Connecting
64
Setting the Utm's MAC Address
67
Manually Configuring the Internet Connection
67
Configuring the WAN Mode (Required for Dual-WAN Port Models Only)
71
Network Address Translation (All Models)
72
Classical Routing (All Models)
73
Configuring Auto-Rollover Mode (Dual-WAN Port Models Only)
73
Configuring Load Balancing and Optional Protocol Binding (Dual-WAN Port Models Only)
76
Configuring Secondary WAN Addresses
79
Configuring Dynamic DNS
81
Configuring Advanced WAN Options
84
Additional WAN-Related Configuration Tasks
86
Chapter 4 LAN Configuration
87
Managing Virtual Lans and DHCP Options
87
Managing the Utm's Port-Based Vlans
88
VLAN DHCP Options
90
Configuring a VLAN Profile
92
Configuring Multi-Home LAN Ips on the Default VLAN
97
Managing Groups and Hosts (LAN Groups)
98
Managing the Network Database
99
Changing Group Names in the Network Database
102
Setting up Address Reservation
103
Configuring and Enabling the DMZ Port
104
Managing Routing
108
Configuring Static Routes
109
Configuring Routing Information Protocol (RIP)
110
Static Route Example
113
Chapter 5 Firewall Protection
115
About Firewall Protection
115
Administrator Tips
116
Using Rules to Block or Allow Specific Kinds of Traffic
117
Services-Based Rules
117
Order of Precedence for Rules
125
Setting LAN WAN Rules
126
Setting DMZ WAN Rules
129
Setting LAN DMZ Rules
133
Inbound Rules Examples
136
Outbound Rules Example
140
Configuring Other Firewall Features
141
Attack Checks
141
Setting Session Limits
144
Managing the Application Level Gateway for SIP Sessions
145
Creating Services, Qos Profiles, and Bandwidth Profiles
146
Adding Customized Services
146
Creating Quality of Service (Qos) Profiles
149
Creating Bandwidth Profiles
152
Setting a Schedule to Block or Allow Specific Traffic
155
Enabling Source MAC Filtering
156
Setting up IP/MAC Bindings
158
Configuring Port Triggering
160
Using the Intrusion Prevention System
163
Chapter 6 Content Filtering and Optimizing Scans
167
About Content Filtering and Scans
167
Default E-Mail and Web Scan Settings
168
Configuring E-Mail Protection
169
Customizing E-Mail Protocol Scan Settings
170
Customizing E-Mail Anti-Virus and Notification Settings
171
E-Mail Content Filtering
174
Protecting against E-Mail Spam
177
Configuring Web and Services Protection
185
Customizing Web Protocol Scan Settings and Services
185
Configuring Web Malware Scans
187
Configuring Web Content Filtering
189
Configuring Web URL Filtering
196
HTTPS Scan Settings
200
Specifying Trusted Hosts
203
Configuring FTP Scans
205
Setting Web Access Exceptions and Scanning Exclusions
207
Setting Web Access Exception Rules
207
Setting Scanning Exclusions
210
Chapter 7 Virtual Private Networking Using Ipsec Connections
213
Considerations for Dual WAN Port Systems (Dual-WAN Port Models Only)
213
Using the Ipsec VPN Wizard for Client and Gateway Configurations
215
Creating Gateway-To-Gateway VPN Tunnels with the Wizard
216
Creating a Client to Gateway VPN Tunnel
221
Testing the Connections and Viewing Status Information
229
Testing the VPN Connection
229
NETGEAR VPN Client Status and Log Information
230
Viewing the UTM Ipsec VPN Connection Status
232
Viewing the UTM Ipsec VPN Log
233
Managing Ipsec VPN Policies
234
Managing IKE Policies
235
Managing VPN Policies
243
Configuring Extended Authentication (XAUTH)
250
Configuring XAUTH for VPN Clients
251
User Database Configuration
252
RADIUS Client Configuration
252
Assigning IP Addresses to Remote Users (Mode Config)
255
Mode Config Operation
255
Configuring Mode Config Operation on the UTM
255
Configuring the Prosafe VPN Client for Mode Config Operation
262
Testing the Mode Config Connection
267
Configuring Keepalives and Dead Peer Detection
267
Configuring Keepalives
268
Configuring Dead Peer Connection
269
Configuring Netbios Bridging with Ipsec VPN
271
Chapter 8 Virtual Private Networking Using SSL Connections
273
Understanding the SSL VPN Portal Options
273
Using the SSL VPN Wizard for Client Configurations
274
SSL VPN Wizard Step 1 of 6: Portal Settings
275
SSL VPN Wizard Step 2 of 6: Domain Settings
277
SSL VPN Wizard Step 3 of 6: User Settings
279
SSL VPN Wizard Step 4 of 6: Client IP Address Range and Routes
281
SSL VPN Wizard Step 5 of 6: Port Forwarding
283
SSL VPN Wizard Step 6 of 6: Verify and Save Your Settings
285
Accessing the New SSL Portal Login Screen
286
Viewing the UTM SSL VPN Connection Status
288
Viewing the UTM SSL VPN Log
288
Manually Configuring and Editing SSL Connections
289
Creating the Portal Layout
290
Configuring Domains, Groups, and Users
294
Configuring Applications for Port Forwarding
294
Configuring the SSL VPN Client
297
Using Network Resource Objects to Simplify Policies
300
Configuring User, Group, and Global Policies
303
Chapter 9 Managing Users, Authentication, and Certificates
311
Configuring VPN Authentication Domains, Groups, and Users
311
Configuring Domains
312
Configuring Groups for VPN Policies
316
Configuring User Accounts
319
Setting User Login Policies
322
Changing Passwords and Other User Settings
326
Managing Digital Certificates
327
Managing CA Certificates
329
Managing Self Certificates
330
Managing the Certificate Revocation List
335
Chapter 10 Network and System Management
337
Performance Management
337
Bandwidth Capacity
337
Features that Reduce Traffic
338
Features that Increase Traffic
341
Using Qos and Bandwidth Assignment to Shift the Traffic MIX
344
Monitoring Tools for Traffic Management
345
System Management
345
Changing Passwords and Administrator Settings
345
Configuring Remote Management Access
348
Using an SNMP Manager
350
Managing the Configuration File
351
Updating the Firmware
354
Updating the Scan Signatures and Scan Engine Firmware
357
Configuring Date and Time Service
360
Chapter 11 Monitoring System Access and Performance
363
Enabling the WAN Traffic Meter
363
Configuring Logging, Alerts, and Event Notifications
367
Configuring the E-Mail Notification Server
367
Configuring and Activating System, E-Mail, and Syslog Logs
368
Configuring and Activating Update Failure and Attack Alerts
372
Configuring and Activating Firewall Logs
375
Monitoring Real-Time Traffic, Security, and Statistics
376
Viewing Status Screens
382
Viewing System Status
382
Viewing Active VPN Users
386
Viewing VPN Tunnel Connection Status
386
Viewing Port Triggering Status
388
Viewing the WAN Ports Status
389
Viewing Attached Devices and the DHCP Log
391
Querying Logs and Generating Reports
394
Querying the Logs
394
Scheduling and Generating Reports
401
Using Diagnostics Utilities
405
Using the Network Diagnostic Tools
406
Using the Realtime Traffic Diagnostics Tool
408
Gathering Important Log Information and Generating a Network Statistics Report
409
Rebooting and Shutting down the UTM
410
Chapter 12 Troubleshooting and Using Online Support
411
Basic Functioning
412
Power LED Not on
412
Test LED Never Turns off
412
LAN or WAN Port Leds Not on
413
Troubleshooting the Web Management Interface
413
When You Enter a URL or IP Address a Time-Out Error Occurs
414
Troubleshooting the ISP Connection
415
Troubleshooting a TCP/IP Network Using a Ping Utility
417
Testing the LAN Path to Your UTM
417
Testing the Path from Your PC to a Remote Device
418
Restoring the Default Configuration and Password
419
Problems with Date and Time
420
Using Online Support
420
Enabling Remote Troubleshooting
420
Sending Suspicious Files to NETGEAR for Analysis
421
Accessing the Knowledge Base and Documentation
422
Appendix A
423
Default Settings and Technical Specifications
423
Appendix B
427
Network Planning for Dual WAN Ports
427
(Dual-WAN Port Models Only)
427
What to Consider before You Begin
427
Cabling and Computer Hardware Requirements
429
Computer Network Configuration Requirements
429
Internet Configuration Requirements
429
Overview of the Planning Process
431
Inbound Traffic
431
Inbound Traffic to a Single WAN Port System
433
Inbound Traffic to a Dual WAN Port System
434
Virtual Private Networks (Vpns
435
VPN Road Warrior (Client-To-Gateway
437
VPN Gateway-To-Gateway
439
VPN Telecommuter (Client-To-Gateway through a NAT Router
442
System Log Messages
446
System Startup
446
Reboot
446
Service Logs
447
Ntp
447
Login/Logout
448
Firewall Restart
448
Ipsec Restart
448
WAN Status
449
Traffic Metering Logs
453
Unicast Logs
453
Invalid Packet Logging
454
Content Filtering and Security Logs
456
Web Filtering and Content Filtering Logs
456
Spam Logs
457
Traffic Logs
458
Virus Logs
458
E-Mail Filter Logs
458
IPS Logs
459
Port Scan Logs
459
Instant Messaging/Peer-To-Peer Logs
459
Routing Logs
460
LAN to WAN Logs
460
LAN to DMZ Logs
460
DMZ to WAN Logs
460
WAN to LAN Logs
461
DMZ to LAN Logs
461
WAN to DMZ Logs
461
Why Do I Need Two-Factor Authentication
463
What Are the Benefits of Two-Factor Authentication
463
What Is Two-Factor Authentication
464
NETGEAR Two-Factor Authentication Solutions
464
V1.0, January
464
Appendix C System Logs and Error Messages
445
Appendix D Two Factor Authentication
463
Appendix E Related Documents
467
Index
469
Advertisement
Advertisement
Related Products
Netgear ProSafe UTM9S
Netgear UTM10 - ProSecure Unified Threat Management Appliance
Netgear UTM25 - ProSecure Unified Threat Management Appliance
Netgear ProSecure UTM150
Netgear UTM5 - ProSecure Unified Threat Management Appliance
Netgear UTM50 - ProSecure Unified Threat Management Appliance
Netgear UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included
Netgear ProSecure UTM25S
NETGEAR ReadyNAS Ultra 4
NETGEAR ReadyNAS Ultra 2 Plus
Netgear Categories
Wireless Router
Switch
Network Router
Adapter
Wireless Access Point
More Netgear Manuals
Login
Sign In
OR
Sign in with Facebook
Sign in with Google
Upload manual
Upload from disk
Upload from URL