NETGEAR UTM25EW-100NAS Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 480 Seiten
- 6.28 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Router
Netgear RBK852 - Orbi WiFi 6-systeem AX6000
143 Seiten 2.54 mb -
Router
Netgear Nighthawk AC1900 - R7000
22 Seiten 2.87 mb -
Router
Netgear Nighthawk X4S AC2600 Model R7800
2 Seiten 1.53 mb -
Router
Netgear C3700
2 Seiten 0.53 mb -
Router
Netgear Orbi RBK23
1 Seiten 2.47 mb -
Router
Netgear XR500 - Nighthawk Pro Gaming
2 Seiten 1.63 mb -
Router
Netgear WNR1000 - N150 Wireless Router
44 Seiten 1.16 mb -
Router
Netgear R7000P - Nighthawk
2 Seiten 1.22 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung NETGEAR UTM25EW-100NAS an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von NETGEAR UTM25EW-100NAS, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung NETGEAR UTM25EW-100NAS die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung NETGEAR UTM25EW-100NAS. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung NETGEAR UTM25EW-100NAS sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts NETGEAR UTM25EW-100NAS
- Den Namen des Produzenten und das Produktionsjahr des Geräts NETGEAR UTM25EW-100NAS
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts NETGEAR UTM25EW-100NAS
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von NETGEAR UTM25EW-100NAS zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von NETGEAR UTM25EW-100NAS und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service NETGEAR finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von NETGEAR UTM25EW-100NAS zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts NETGEAR UTM25EW-100NAS, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von NETGEAR UTM25EW-100NAS widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
202-10482-01 September 2009 v1.0 NETGEAR , Inc. 350 East Plumeria Drive San Jose, CA 95134 ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual[...]
-
Seite 2
ii v1.0, September 2009 © 2009 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR and the NETGEAR l ogo are registered trademarks and ProSecure and ProSafe are trademarks of NETGEAR, Inc. Microsoft, W i ndows, and W i ndows NT are re gistered trademarks of Mi crosoft Corporation. Other brand and product names are regist ered trademarks or t[...]
-
Seite 3
v1.0, September 2009 iii Federal Of fice for T elecommuni cations Ap provals has been notified of the placing of this equipment on the market and has been granted the righ t to test the series for compliance with the regul at ions. V olunt ary Control Council for Inte rference (VCCI) St atement This equipment is in the second category (information [...]
-
Seite 4
v1.0, Septembe r 2009 iv Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must reta in the above copyright notice, thi s list of conditions, and[...]
-
Seite 5
v1.0, September 2009 v Product and Publication Det ails PPP Copyright (c) 1989 Carnegie Mellon University . All rights reserved. Redistribution and use in source and binary forms are permitted provide d that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other ma[...]
-
Seite 6
v1.0, Septembe r 2009 vi[...]
-
Seite 7
vii v1.0, September 2009 Content s ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual About This Manual Conventions, Formats, and Scope ........................ .................... ................ ................... .. xvii How to Print This Manual ................ ............. ................ ................ ............. ..[...]
-
Seite 8
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al viii v1.0, September 2009 Chapter 2 Using the Setup Wizard to Provision t he UTM in Y our Network Understanding the S teps for Initial Connection ........ ................. ............. ................ ........ 2-1 Qualified Web Browsers .. ............. ................ ......[...]
-
Seite 9
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al ix v1.0, September 2009 Configuring Dynamic DNS .. ................ ................ ............. ................ ................ ............. 3-19 Configuring Advanced W AN Options .................. ................ .................... ................... ... 3-22 Addition[...]
-
Seite 10
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al x v1.0, September 2009 Adding Customized Services ............. .... ... ... ............. ................ ................ ............. 5-30 Creating Quality of Service (QoS) Profiles ...................... .................... ................ ... 5-33 Creating Bandwidth Prof[...]
-
Seite 11
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xi v1.0, September 2009 T esting the Connec tions and Viewing S tatus Information ............. ................ ................ 7-16 T esting the VPN Connection .................. ... ... ... ... .... ............. ... ... ... .... ... ... ............. ... 7-16 NETGEAR VPN Cli[...]
-
Seite 12
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xii v1.0, September 2009 Manually Configuring and Editing SSL Connections .......... ... .... ... ... ... .... ... ... ... ... .... ... ... 8-17 Creating the Portal Layout .............. ................ ................ ............. ................ .......... 8-18 Configuring [...]
-
Seite 13
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xiii v1.0, September 2009 Chapter 1 1 Monitoring Syst em Access and Perfo rmance Enabling the W AN Tr affic Meter ................... ................ ................... ................... .......... 1 1-1 Configuring Logging, Alerts, and Event Notifications ...... ............[...]
-
Seite 14
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xiv v1.0, September 2009 T esting the LAN Path to Y our UTM . ................ ............. ................ ................ .......... 12-7 T esting the Pat h from Y our PC to a Remote Dev ice . ................ ............. ................ 12-7 Restoring the Default Configu[...]
-
Seite 15
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xv v1.0, September 2009 W AN S tatus ........ ... ... .... ... ... ... .... ............. ... ... ... ... .... ... ............. ... ... .... ... ... ............. ... . C-5 T r affic Metering Logs ............. .... ... ... ... .... ... ............. ... ... ... .... ... ... ...[...]
-
Seite 16
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xvi v1.0, September 2009[...]
-
Seite 17
xvii v1.0, September 2009 About This Manual The NETGEAR ® Pr oSecur e™ Unified Threat Management UTM10 or UTM25 Refe r ence Manual describes how to install, configure, and troubl eshoot a ProSecure Unif ied Threat Management Appliance UTM10 or UTM25. The information in this manual is intended for readers with intermediate computer and networking[...]
-
Seite 18
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al xviii v1.0, September 2009 • Scope . This manual is written for the UTM according to these specifications: For more information abou t network, Internet, firewall, and VP N technologies, c lick the links to the NETGEAR W ebsite in Appendix E, “Related Documents .” How to Pr[...]
-
Seite 19
1-1 v1.0, September 2009 Chapter 1 Introduction This chapter provides an overvi ew of the features and capabilities of the ProSecure Unified Threat Management Appliance UTM10 or UTM25. This chapter contains the following sections: • “What Is the ProSecure Unified Threat Management App liance UTM10 or UTM 25? ” on this page. • “Key Feature[...]
-
Seite 20
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-2 Introduction v1.0, September 2009 Key Features and Cap abilities The UTM provides the following key features and capabilities: • For the UTM10, a single 10/10 0/1000 Mbps Gigabit Ethernet W AN port. For t he UTM25, dual 10/100/1000 Mbps Gig ab it Eth ernet W AN ports for lo[...]
-
Seite 21
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-3 v1.0, September 2009 Dual W AN Port s for Increased Reliability or Outbound Load Bala ncing (UTM25 Only) The UTM25 has two broadban d W AN ports. The seco nd W AN port allows you to connect a second broadb and Internet line that can be co nfigured on a mutually-e[...]
-
Seite 22
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-4 Introduction v1.0, September 2009 A Powerful, T rue Firewall Unlike simple Internet sharing NA T routers, the UTM is a true firewall, using stateful packet inspection (SPI) to defend against hacker atta cks. Its firewall features have the following capabilities: • DoS prote[...]
-
Seite 23
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-5 v1.0, September 2009 • Objectionable traffic protection . The UTM prevents ob jectionable content from reaching your computers. Y ou can c ontrol access to the In ternet content by screening for W eb servic es, W eb addresses, and keywords within W eb addresse [...]
-
Seite 24
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-6 Introduction v1.0, September 2009 Extensive Protocol Support The UTM supports the T ransmission Control Protocol/Internet Protoco l (TCP/IP) and Routing Information Protocol (RIP). For further information about TCP/IP , see “Internet Config ura tion Requirements” on page [...]
-
Seite 25
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-7 v1.0, September 2009 • SSL VPN W izard . The UTM includes the NETGEAR SSL VPN W izard to easily configure SSL connections over VPN according to the r ecommendations of the VP NC to ensure the SSL connections are interoperable with other VPNC-compliant VPN route[...]
-
Seite 26
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-8 Introduction v1.0, September 2009 Service Registration Card with License Keys Be sure to store the license key card that came wi th your UTM in a se cu re location. Y ou do need these keys to activate your product during the initial setup. Figure 1-1 Note: When you reset the [...]
-
Seite 27
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-9 v1.0, September 2009 Package Content s The UTM product package co ntains the following items: • ProSecure Unified Threat Management Appliance UTM10 or UTM25 . • One AC power cable. • Rubber feet (4). • One rack-mounting k it (UTM25 only). • Pr oSecur e [...]
-
Seite 28
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-10 Introduction v1.0, September 2009 The front panel also contains three groups of status indicator light-emitting diodes (LEDs), including Power and T est LEDs, LAN LEDs, and W AN LEDs, all of which are explained in Ta b l e 1 - 1 . The function of each LED is described in Ta [...]
-
Seite 29
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-11 v1.0, September 2009 LAN Ports Left LED Off The LAN port has no link. On (Green) The LAN port has detected a link with a connected Ethernet device. Blink (Green) Data is being transmitted or received by the LAN port. Right LED Off The LAN port is operating at 10[...]
-
Seite 30
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-12 Introduction v1.0, September 2009 Rear Panel The rear panel of the UTM includes a cable lock receptacle, a console port, a reset button, and an AC power connection. V iewed from left to right, the rear pa nel contains the fo llowing components: 1. Cable security lock recepta[...]
-
Seite 31
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Introduction 1-13 v1.0, September 2009 Figure 1-4 shows the product label for the UTM10. Figure 1-5 shows the product label for the UTM25. Figure 1-4 Figure 1-5[...]
-
Seite 32
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 1-14 Introduction v1.0, September 2009 Choosing a Location for the UTM The UTM is suitable for use in an of fice enviro nment where it can be free- standing (on its runner feet) or mounted into a standard 19-inch eq u ipment rack. Alternatively , you can rack-mount the UTM in a w[...]
-
Seite 33
2-1 v1.0, September 2009 Chapter 2 Using the Setup Wizard to Provision the UTM in Y our Network Underst anding the Step s for Initial Connection T ypically , the UTM is installed as a network ga teway to function as a combined LAN switch, firewall, and content scan engine in or de r to pr otect the network from all in coming and outgoing malware th[...]
-
Seite 34
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-2 Using the Setup Wizard to Provision th e UTM in Your Network v1.0, September 2009 Qualified W e b Browsers T o configure the UTM, you must use a W eb brow ser such as Microsoft Internet Explorer 6 or higher , Mozilla Firefox 4 or hig her , or Apple Sa fari 3 or higher with Ja[...]
-
Seite 35
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-3 v1.0, September 2009 3. In the User field, type admin . Use lower case letters. 4. In the Password field, type password . Here too, use lower case letters. Figure 2-1 Note: The first time that you remotely connect [...]
-
Seite 36
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-4 Using the Setup Wizard to Provision th e UTM in Your Network v1.0, September 2009 5. Click Login. The W eb Management Interface appears, displaying the System Status screen. ( Figure 2-2 on page 2-4 shows the top part of the UTM25’ s screen. For information about this scree[...]
-
Seite 37
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-5 v1.0, September 2009 Underst anding the Web Ma nagement Interface Me nu Layout Figure 2-3 shows the menu at the top of the UTM25’ s W eb Management Interf ace. The UTM10’ s W eb Management Interf ace layout is [...]
-
Seite 38
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-6 Using the Setup Wizard to Provision th e UTM in Your Network v1.0, September 2009 The bottom of each screen provid es action buttons. The nature of the screen determines which action buttons are shown. Figure 2-4 shows an example. Any of the following action buttons might be [...]
-
Seite 39
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-7 v1.0, September 2009 Almost all screens and sections of screens have an accompanyning help scre en. T o open the help screen, c lick the ques tion mark icon. ( ). Using the Setup Wizard to Perf orm the Initial Conf[...]
-
Seite 40
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-8 Using the Setup Wizard to Provision th e UTM in Your Network v1.0, September 2009 Setup Wizard S tep 1 of 10: LAN Settings Enter the settings as explained in T able 2 -1 o n page 2-9 , then click Next to go the following screen. Figure 2-7 Note: In this first step, you are ac[...]
-
Seite 41
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-9 v1.0, September 2009 T able 2-1. Setup Wizard S tep 1: LAN Settings Setting Description (or Subfield and Des cription) LAN TCP/IP Setup IP Address Enter the IP address of the UT M’s default VLAN (the factory defa[...]
-
Seite 42
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-10 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Enable DHCP Server (continued) Primary DNS Server This is optional. If an IP addre ss is specified, the UTM provi des this address as th e primary DNS server IP address. If n o address is spec[...]
-
Seite 43
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-11 v1.0, September 2009 Setup Wizard S tep 2 of 10: W AN Settings Enter the settings as explained in T able 2 -2 o n page 2-1 2 , then click Next to go t he following screen. DNS Proxy Enable DNS Proxy This is option[...]
-
Seite 44
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-12 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Note: Click the Auto Detect action button at the bottom of the menu. The auto-dete ct process probes the W AN port for a range of connection methods and suggests one that your ISP is most like[...]
-
Seite 45
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-13 v1.0, September 2009 Austria (PPTP) (continued) Idle T imeout Select the Keep Connected radio button to keep the connection always on. T o log out after the connection is idle for a period of time, select the Idle[...]
-
Seite 46
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-14 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Setup Wizard S tep 3 of 10: System Date and Time Enter the settings as explained in T able 2 -3 o n page 2-1 5 , then click Next to go t he following screen. Use These DNS Servers If your ISP [...]
-
Seite 47
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-15 v1.0, September 2009 T able 2-3. Setup Wizard Step 3: Sy stem Date and T ime Settings Setting Description (or Subfield and Des c ri pti on ) Set Time, Date and NTP Servers Date/T ime From the pull-down men u, sele[...]
-
Seite 48
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-16 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Setup Wizard S tep 4 of 10: Security Services Enter the settings as explained in T able 2 -4 o n page 2-1 7 , then click Next to go t he following screen. Figure 2-10 Note: After you have comp[...]
-
Seite 49
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-17 v1.0, September 2009 T able 2-4. Setup Wizard S tep 4: Se curity Services Settings Setting Description (or Sub field and Description) Email SMTP SMTP scanning is enab led by default on standard service port 25. T [...]
-
Seite 50
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-18 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Setup Wizard S tep 5 of 10: Email Security Enter the settings as explained in Ta b l e 2 - 5 , then click Next to go the following screen. Figure 2-1 1 Note: After you have completed the steps[...]
-
Seite 51
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-19 v1.0, September 2009 Setup Wizard S tep 6 of 10: Web Security Enter the settings as explained in T able 2 -6 o n page 2-2 0 , then click Next to go t he following screen. IMAP From the IMAP pull-down menu , speci [...]
-
Seite 52
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-20 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Note: After you have completed the steps in th e Setup W izard, you can make changes to the W eb security settings by selecting Application Security > HTTP/HTTPS > Malware Scan . The Mal[...]
-
Seite 53
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-21 v1.0, September 2009 Setup Wizard S tep 7 of 10: Web Categories to Be Blocked Figure 2-13[...]
-
Seite 54
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-22 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 7 , then click Next to go the following screen. Note: After you have completed the steps in th e Setup W izard, you can make changes to the cont[...]
-
Seite 55
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-23 v1.0, September 2009 Setup Wizard S tep 8 of 10: Ad ministrator Email Notification Settings Enter the settings as explained in Ta b l e 2 - 8 , then click Next to go the following screen. Figure 2-14 Note: After y[...]
-
Seite 56
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-24 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Setup Wizard S tep 9 of 10: Secu rity Subscription Up date Settings Enter the settings as explained in T able 2 -9 o n page 2-2 5 , then click Next to go t he following screen. This server req[...]
-
Seite 57
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-25 v1.0, September 2009 Note: After you have completed the steps in th e Setup W izard, you can make changes to the security subscription upda te settings by selecting Administration > System Update > Signatur [...]
-
Seite 58
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-26 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 Setup Wizard S tep 10 of 10 : Saving the Configuration Click Apply to save your settings and auto matically restart the system. V erifying Proper Inst allation T est the UTM before deploying i[...]
-
Seite 59
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-27 v1.0, September 2009 V erify that the UTM properly scans HTTP traffic: 1. Log on to the UTM W eb Management Interface, and the n verify that HTTP scanning is enabled. For information about how to enable HTTP scann[...]
-
Seite 60
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-28 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009 If your UTM is connected to the Intern et, you can activate the service licenses: 1. Select Support > Registration . The Registration sc re en disp lays. 2. Enter the license key in the Reg[...]
-
Seite 61
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Using the Setup Wizard to Prov is ion the UTM in Your Network 2-29 v1.0, September 2009 What to Do Next Y ou have completed setting up and deploying the UTM to the network. Th e UTM is now ready to scan the protocols and services that you specif ied and perform automatic up dates[...]
-
Seite 62
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 2-30 Using the Setup Wizard to Pr ovision the UTM in Your Netw ork v1.0, September 2009[...]
-
Seite 63
3-1 v1.0, September 2009 Chapter 3 Manually Configuring Internet and W AN Settings This chapter contains the following sections: • “Understanding the Internet and W AN Configuration T asks on this page. • “Configuring the Internet Connection s” on page 3-2 . • “Configuring the W AN Mod e (Required for the UTM25’ s Dual W AN Mode)”[...]
-
Seite 64
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-2 Manually Configuring Interne t and WAN Settings v1.0, September 2009 4. Configure dynamic DNS on the W AN ports (optional) . Configure yo ur fully qualified domain names during this phase (if required). See “Configuri ng Dynamic DNS ” on page 3-19 . 5. Configure the W AN [...]
-
Seite 65
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-3 v1.0, September 2009 2. Click the Auto Detect action button at the b ottom of the menu. The auto-det ect process probes the W AN port fo r a range of connection meth ods and suggests one that your ISP is most likely to support. [...]
-
Seite 66
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-4 Manually Configuring Interne t and WAN Settings v1.0, September 2009 The auto-detect process will retu rn one of the following results: • If the auto-detect process is successful, a stat us bar at the top of the menu displays the results (see the red text in Figure 3-2 on p[...]
-
Seite 67
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-5 v1.0, September 2009 The W AN Status window should show a valid IP address and gateway . If the configuration was not successful, skip ahead to “Manually Configuring the Internet Connection ” on this page , or see “T roubl[...]
-
Seite 68
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-6 Manually Configuring Interne t and WAN Settings v1.0, September 2009 T o manually configure the W AN1 ISP (UTM25) or W AN ISP (UTM10) settings: 1. On the UTM25, select Network Configuration > W AN Settings > W AN1 ISP Settings . The W AN Settings tabs appear , with the [...]
-
Seite 69
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-7 v1.0, September 2009 5. If your connection is PPTP or PPPoE, your ISP requires an initial login. Enter the settings as explained in Ta b l e 3 - 2 . T able 3-2. PPTP and PPPoE Settings Setting Description (or Subfield an d Des c[...]
-
Seite 70
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-8 Manually Configuring Interne t and WAN Settings v1.0, September 2009 6. Configure the Internet (IP) Ad dress settings as explained in Ta b l e 3 - 3 . Click the Current IP Address link to see the currently assigned IP address. 7. Configure the Domain Name Server (D NS) server[...]
-
Seite 71
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-9 v1.0, September 2009 8. Click T est to evaluate your entries. The UTM attempts to make a connection accordin g to the settings that you entered. 9. Click Apply to save any changes to the W AN1 ISP settings (UTM25) or W AN ISP se[...]
-
Seite 72
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-10 Manually Configuring Interne t and WAN Settings v1.0, September 2009 • Load Balancing Mode . The UTM distributes the outbound traffic equally among the W AN interfaces that are functional. • Single W AN Port Mode . The selected W AN interface is made primary and the othe[...]
-
Seite 73
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-11 v1.0, September 2009 If your ISP has allocated a number of static IP addresses to you, and you have assigned one of these addresses to each PC, you can choose classica l routing. Or , you ca n us e classical routing for routing[...]
-
Seite 74
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-12 Manually Configuring Interne t and WAN Settings v1.0, September 2009 T o configure the dual-W AN ports for auto-ro llover mode: 1. Select Network Config > W AN Settings from the menu, then click the WA N M o d e tab. The W AN Mode screen displays. 2. Enter the settings as[...]
-
Seite 75
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-13 v1.0, September 2009 W AN Failure Detection Method Select one of the following de te ction failure methods: DNS lookup using W AN DNS Servers DNS queri es are sent to the DNS se rve r configured on the WAN ISP p ages (see “Co[...]
-
Seite 76
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-14 Manually Configuring Interne t and WAN Settings v1.0, September 2009 3. Click Apply to save your settings. When a rollover occu rs, you can configure the UTM to generate a notificati on e-mail to a specified address (see “Configuring and Activating System, E-mail, and Sysl[...]
-
Seite 77
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-15 v1.0, September 2009 a. Figure 3-9 shows one example in the Prot ocol Binding table. Config ure the protocol binding settings as explained in Ta b l e 3 - 6 . Figure 3-9 T able 3-6. Protocol Binding Settings (UTM25 Only) Settin[...]
-
Seite 78
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-16 Manually Configuring Interne t and WAN Settings v1.0, September 2009 b. Click the add table button in the rightmost column to add the protocol binding rule to the Protocol Binding table. The rule is automati cally enabled, which is indicated by the “!” status icon that d[...]
-
Seite 79
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-17 v1.0, September 2009 Configuring Secondary W AN Addresses A single W AN Ethernet port can be accessed through multiple IP addresses by adding aliases to the port. An alias is a secondary W AN address. On e advantage is, for exa[...]
-
Seite 80
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-18 Manually Configuring Interne t and WAN Settings v1.0, September 2009 2. Click the Secondary Addresses option arrow . On the UTM25, the W AN1 Secondary Addresses screen displays (see Figure 3-10 , which shows the UTM2 5 screen with so me examples in the List of Secondary W AN[...]
-
Seite 81
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-19 v1.0, September 2009 Configuring Dynamic DNS Dynamic DNS (DDNS) is an Internet servic e that allows devices with varying public IP addresse s to be located using Intern et domain names. T o use DDNS, you must set up an account [...]
-
Seite 82
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-20 Manually Configuring Interne t and WAN Settings v1.0, September 2009 The W AN Mode section on screen reports th e currently configured W AN mode. (For the UTM25, for example, Single Port W AN1, Load Balancing, or Auto Rollover .) Only those options that match the configured [...]
-
Seite 83
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-21 v1.0, September 2009 4. Click the Information option arro w in the upper right corner of a DNS screen for registration information. 5. Access the W eb site of the DDNS service provider and register for an account (for example, [...]
-
Seite 84
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-22 Manually Configuring Interne t and WAN Settings v1.0, September 2009 Configuring Advanced W AN Options The advanced opti ons include configuratio n of the maximum transmission unit (MTU) size, po rt speed, UTM’ s MAC address, and se tting a rate-limit on the traffic that i[...]
-
Seite 85
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Manually Configuring In ternet and WAN Settings 3-23 v1.0, September 2009 3. Enter the default informatio n settings as explained in Ta b l e 3 - 8 . T able 3-8. Advanced W AN Settings Setting Description (or Subfield and Des cription) MTU Size Make one of the following sele cti [...]
-
Seite 86
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 3-24 Manually Configuring Interne t and WAN Settings v1.0, September 2009 4. Click Apply to save your changes. Additional W AN-Relate d Configuration T asks • If you want the ability to manage the UTM remotely , enable remo te management (see “Configuring Remote Management Ac[...]
-
Seite 87
4-1 v1.0, September 2009 Chapter 4 LAN Configuration This chapter describes how to configure the adva nced LAN features of your UTM. This chapter contains the following sections: • “Managing V irtual LANs and DHCP Options ” on this page. • “Configuring Multi-Home LAN IPs on the Default VLAN” on page 4-1 1 . • “Managing Groups and Ho[...]
-
Seite 88
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-2 LAN Configuration v1.0, September 2009 VLANs have a number of advantages: • It is easy to set up network segmentation. Users who communicate most frequently with each other can be grouped into common VLANs, rega rdless of physical location. Each group’ s traffic is contai[...]
-
Seite 89
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-3 v1.0, September 2009 When you create a VLAN profile, assign LAN ports to the VLAN, and enable the VLAN, the LAN ports that are member of the VLAN can send and receive both tagged and untagged packets. Untagged packets that en ter these LAN ports are assigned[...]
-
Seite 90
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-4 LAN Configuration v1.0, September 2009 For each VLAN profile, the following fields are displayed in the VLAN Profiles table: • Checkbox . Allows you to select the VLAN profile in the table. • S tatus Icon . Indicates the status of the VLAN profile: – Green circle: the V[...]
-
Seite 91
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-5 v1.0, September 2009 The UTM delivers the following settings to any LAN device that requests DHCP: • An IP addr ess from the range that you have defined • Subnet mask • Gateway IP address (the UTM’ s LAN IP addre ss) • Primary DNS server (the UTM?[...]
-
Seite 92
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-6 LAN Configuration v1.0, September 2009 LDAP Server A Lightweight Directory Access Protocol (LDAP) server allows a user to query and modify directory services that run over TCP/IP . For exam ple, clients can query email addres ses, contact information, and othe r s ervice info[...]
-
Seite 93
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-7 v1.0, September 2009 2. Either select an entry from the VLAN Pr ofiles table by clicki ng the corresponding edit table button or add a new VLAN profile by clicking the add table button under the VLAN P rofiles table. The Edit VLAN Profile screen displays (se[...]
-
Seite 94
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-8 LAN Configuration v1.0, September 2009 T able 4-1. VLAN Profile Settings Setting Description (or Subfield an d Des c ripti on ) VLAN Profile Profile Name Enter a unique name for the VLAN pro file. Note : Y ou can also change the profile na me of the default VLAN. VLAN ID Ente[...]
-
Seite 95
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-9 v1.0, September 2009 Enable DHCP Server Select the Enable DHCP Server radio button to e nable the UTM to function as a Dynamic Host Configuration Protoc ol (DHCP) server , providing TCP/IP configuration for all computers connect ed to the VLAN. Enter the fol[...]
-
Seite 96
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-10 LAN Configuration v1.0, September 2009 4. Click Apply to save your settings. Enable LDAP information Select the Enable LDAP in formation checkb ox to enable the DHCP server to provide Lightweight Directory Access Prot ocol (LDAP) server information. Enter the settings be low[...]
-
Seite 97
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-11 v1.0, September 2009 Configuring Multi-Home LA N IPs on the Default VLAN If you have computers usin g different IP networks in the LAN, (for example, 172.16.2.0 or 10.0.0.0), you can add aliases to the LAN ports and give computer s on those networks access [...]
-
Seite 98
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-12 LAN Configuration v1.0, September 2009 3. In the Add Secondary LAN IPs section of the screen, enter the following settings: • IP Address . Enter the secondary address that yo u want to assign to t he LAN ports. • Subnet Mask . Enter the subnet mask fo r the secondary IP [...]
-
Seite 99
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-13 v1.0, September 2009 Some advantages of the Network Database are: • Generally , you do not need to enter either IP address or MAC addresses. Instead, you can just select the name of the desired PC or device. • There is no need to reserve an IP addres s [...]
-
Seite 100
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-14 LAN Configuration v1.0, September 2009 The Known PCs and Devices table lists the entries in the Network Database. For each PC or device, the following fields are display ed : • Checkbox . Allows you to select the PC or device in the table. • Name . The name of the PC or [...]
-
Seite 101
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-15 v1.0, September 2009 Adding PCs or Devices to the Network Dat abase T o add PCs or devices manua lly to the Network Database: 1. In the Add Known PCs and Devices section of the LAN Groups screen (see Figure 4-5 on page 4- 14 ), enter the settings as explain[...]
-
Seite 102
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-16 LAN Configuration v1.0, September 2009 Editing PCs or Devices in the Network Dat abase T o edit PCs or de vic es manua lly in the Network Database: 1. In the Known PCs and Devices table of the LAN Groups screen (see Figure 4-5 on page 4-14 ), click the edit table button of a[...]
-
Seite 103
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-17 v1.0, September 2009 2. Click the Edit Group Names opti on arrow at the right of the LAN submenu tabs. The Network Database Group Names screen displays. ( Figure 4-7 shows some examples.) 3. Select the radio button next to any group name to enable editing. [...]
-
Seite 104
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-18 LAN Configuration v1.0, September 2009 T o reserve an IP address, select Reserved (DHCP Client) from the IP Address T ype pull-down menu on the LAN Groups screen a s described in “Adding PCs or Devices to the Networ k Database” on page 4-15 or on the Edit Groups and Host[...]
-
Seite 105
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-19 v1.0, September 2009 T o enable and conf igure the DMZ port: 1. Select Network Config > DMZ Setup from the menu. The DMZ Setup screen displays. 2. Enter the settings as explained in T able 4 -3 o n page 4-2 0 . Figure 4-8[...]
-
Seite 106
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-20 LAN Configuration v1.0, September 2009 T able 4-3. DMZ Setup Settings Setting Description (or Sub field and Description) DMZ Port Setup Do you want to enable DMZ Port? Select one of the foll owing radio bu ttons: • Ye s . Enables you to configure the DMZ port settings. Ent[...]
-
Seite 107
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-21 v1.0, September 2009 Enable DHCP Server (continued) Primary DNS Server This is optional. If an IP address is specified, the UTM provides this address as the primary DNS server IP address. If no address is specified, the UTM provides its own LAN IP address a[...]
-
Seite 108
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-22 LAN Configuration v1.0, September 2009 3. Click Apply to save your settings. T o define the DMZ W AN Rules and LAN DMZ Rules, see “Setting DMZ W AN Rules” on page 5-14 and “Setting LAN DMZ Rules” on page 5-18 , respectively . Managing Routing Stat ic Routes provide a[...]
-
Seite 109
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-23 v1.0, September 2009 Configuring St atic Routes T o add a static route to the S tatic Route table: 1. Select Network Config > Routing from the menu. The Routing screen displays. 2. Click the add table button under the Static Routes table. The Add S tatic[...]
-
Seite 110
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-24 LAN Configuration v1.0, September 2009 3. Enter the settings as explained in Ta b l e 4 - 4 . 4. Click Apply to save your settings. The new static rout e is added to the S tatic Route table. T o edit a static route that is in the Static Route table: 1. Select its entry from [...]
-
Seite 111
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-25 v1.0, September 2009 T o enable and configure RIP: 1. Select Network Configuration > Routing from the menu. 2. Click the RIP Configuration option arrow at the rig ht of the Routing submenu tab. The RIP Configuration screen displays. 3. Enter the settings[...]
-
Seite 112
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-26 LAN Configuration v1.0, September 2009 T able 4-5. RIP Configuration Settings Setting Description (or Subfie ld and Description) RIP RIP Directi on From the RIP Direction pull-down menu , select the direct ion in which the UTM sends and receives RIP packet s: • None . The [...]
-
Seite 113
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al LAN Configuration 4-27 v1.0, September 2009 4. Click Apply to save your settings. S t atic Route Example In this example, we assume the following: • The UTM’ s primary Internet access is through a cable modem to a n ISP . • The UTM is o n a local LAN with IP address is 192 [...]
-
Seite 114
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 4-28 LAN Configuration v1.0, September 2009[...]
-
Seite 115
5-1 v1.0, September 2009 Chapter 5 Firewall Protection This chapter describes how to use the firewall featur es of the UTM to protect your network. This chapter contains the following sections: • “About Firewall Protection ” on this page. • “Using Rules to Block or Allow Sp ecific Kinds of Traf fic ” on page 5-3 . • “Creating Servic[...]
-
Seite 116
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-2 Firewall Pr otection v1.0, September 2009 Administrator T ip s Consider the following operational items: 1. As an option, you can en able remote manageme nt if you have to manage distant sites from a central location (see “Configuring VPN Authentication Do mains, Groups, an[...]
-
Seite 117
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-3 v1.0, September 2009 Using Rules to Block or Allo w S pecific Kinds of T raffic Firewall rules are used to block or allow specific traf fic passing thro ugh from one sid e to the other . Y ou can configure up to 800 rules on the UTM. Inbound rules (W AN to[...]
-
Seite 118
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-4 Firewall Pr otection v1.0, September 2009 • Quality of Service (QoS) priorities . Each service has its own nativ e priority that impacts its quality of performance and tole rance for jitter or delays. Y ou can change the QoS priority , which changes the traffic mi x through[...]
-
Seite 119
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-5 v1.0, September 2009 T able 5-2. Outbound Rules Overview Setting Description (or Subfie ld and Description) Service The service or application to be covered by this rule. If the service or applicatio n does not appear in the list, you must defi ne it using[...]
-
Seite 120
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-6 Firewall Pr otection v1.0, September 2009 Inbound Rules (Port Forwarding) If you have enabled Network Address T ranslation (NA T), your network presents only one IP address to the Internet and outside users cannot directly address any of your local computers. However , by def[...]
-
Seite 121
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-7 v1.0, September 2009 Whether or not DHCP is enable d, how the PCs accesse s the server ’ s LAN address impacts the inbound rules. For example: • If your external IP address is assigned dy namically by your ISP (DHCP en abled), the IP address might chan[...]
-
Seite 122
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-8 Firewall Pr otection v1.0, September 2009 . T able 5-3. Inbound Rules Overview Setting Description (or Subfie ld and Description) Service The service or application to be covered by this rule. If the service or applicatio n does not appear in the list, you must defi ne it usi[...]
-
Seite 123
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-9 v1.0, September 2009 W AN Users The settings that determine which Internet locations are covered by the rule, based on their IP address. The options are: • Any . All Internet IP address are covered by this rule. • Single address. Enter the required add[...]
-
Seite 124
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-10 Firewall Pr otection v1.0, September 2009 Order of Precedence for Rules As you define new rules, they are added to the tabl es in the Rules screen as the last item in the list, as shown in the LAN W AN Rules screen example in Figure 5-1 . For any traffic attempting to pass t[...]
-
Seite 125
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-11 v1.0, September 2009 disposition of a packet. For example, you should place the most stri ct rules at the top (those with the most specific services or addresses). The up and down table buttons in the Action col umn allows you to relocate a defined rule t[...]
-
Seite 126
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-12 Firewall Pr otection v1.0, September 2009 T o make changes to an existing o utbound or inbound service rul e: In the Action column to the right of to the rule, click on of the following table buttons: • edit . Allows you to make any changes to the rule definition of an exi[...]
-
Seite 127
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-13 v1.0, September 2009 T o create a new outbound LAN W AN service rule: 1. In the LAN W AN Rules screen, click the add table button under the Outbound Services table. The Add LAN W AN Outbound Service screen displays. 2. Enter the settings as explained in T[...]
-
Seite 128
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-14 Firewall Pr otection v1.0, September 2009 T o create a new inbound LAN W AN service rule: 1. In the LAN W AN Rules screen, click the add table button under the Inbound Serv ices table. The Add LAN W AN Inbound Service screen displays. 2. Enter the settings as explained in T [...]
-
Seite 129
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-15 v1.0, September 2009 T o access the DMZ W A N Rules screen: 1. Select Network Security > Firewall from the menu. The Firewall submenu tabs appear . 2. Click the DMZ W AN Rules submenu tab. The DMZ W AN Rules screen displays. ( Figure 5-5 shows a rule i[...]
-
Seite 130
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-16 Firewall Pr otection v1.0, September 2009 2. Click one of the fo llowi ng table buttons: • disable . Disables the rule or rules. The “!” stat us icon changes from a green circle to a grey circle, indicating that the rule is or ru les are disabled. (By default, when a r[...]
-
Seite 131
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-17 v1.0, September 2009 DMZ W AN Inbound Services Rules The Inbound Ser vic es tab le lis ts al l existing rules for inbound traf fi c. If you ha ve not defined any rules, no rules are listed. By de fault, all inbound traf fic (from the Internet to the DMZ) [...]
-
Seite 132
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-18 Firewall Pr otection v1.0, September 2009 Setting LAN DMZ Rules The LAN DMZ Rules screen allows you to create rules that define the movement of traffic between the LAN and the DMZ. Th e default outbound and inbound policies are to allow all traffic between the local LAN and [...]
-
Seite 133
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-19 v1.0, September 2009 • up . Moves the rule up one position in the table rank . • down . Moves the rule down one position in the table rank. T o delete or disable one or more rules: 1. Select the checkbox to the left of the rule that you want to delete[...]
-
Seite 134
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-20 Firewall Pr otection v1.0, September 2009 2. Enter the settings as explained in T able 5 -2 o n page 5-5 . 3. Click Apply . The new rule is now adde d to the Outbound Services table. The rule is automatically enabled. LAN DMZ Inbound Services Rules The Inbound Ser vic es tab[...]
-
Seite 135
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-21 v1.0, September 2009 2. Click the Attack Checks submenu tab. The Attack Checks screen displays. 3. Enter the settings as explained in Ta b l e 5 - 4 . Figure 5-1 1 T able 5-4. Attack Checks Sett ings Setting Description (or Subfie ld and Description) W AN[...]
-
Seite 136
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-22 Firewall Pr otection v1.0, September 2009 4. Click Apply to save your settings. LAN Security Checks. Block UDP flood Select the Block UDP flood checkbox to prevent the UTM from accepting more than 20 simultaneous, active UDP connections from a single d evice on the LAN. By d[...]
-
Seite 137
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-23 v1.0, September 2009 Setting Session Limit s Session limits allows you to specify the total number of sessions that are allowed, per user , over an IP connection across the UTM. The Session Limit feature is disabled by de fault. T o enable and configure t[...]
-
Seite 138
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-24 Firewall Pr otection v1.0, September 2009 5. Click Apply to save your settings. Managing the Application Le vel Gateway for SIP Sessions The Application Level Gateway (A LG) facilitates multimedia sessi ons such as voice over IP (V oIP) sessions that use the Session Initiati[...]
-
Seite 139
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-25 v1.0, September 2009 3. Select the Enable SIP checkbox. 4. Click Apply to save your settings. Inbound Rules Examples LAN W AN Inbound Rule: Hosting A Local Public W eb Server If you host a public W eb server on your local network, you can define a rule to[...]
-
Seite 140
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-26 Firewall Pr otection v1.0, September 2009 LAN W AN Inbound Rule: Allowing Vid eoconference from Restricted Addresses If you want to allow incoming vi deoconferencing to be initiated from a restricted range of outside IP addresses, such as from a branch of fice , you can crea[...]
-
Seite 141
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-27 v1.0, September 2009 • W eb server PC on the UTM’ s LAN – LAN IP address: 192.168.1.2 – DMZ IP Address: 192.168.10.2 – Access to W eb server is (simulated) public IP address: 10.1.0.52 T o configure the UTM for additional IP addresses: 1. Select[...]
-
Seite 142
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-28 Firewall Pr otection v1.0, September 2009 4. From the Service pull-down menu, select HTTP for a W eb server . 5. From the Action pull-down menu, select ALLOW Always . 6. In the Send to LAN Server field, enter the loca l IP address of your W eb serve r PC (192.168.1.2 in this[...]
-
Seite 143
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-29 v1.0, September 2009 Outbound Rules Example Outbound rules let you prevent users from using applications such as Instant Messenger , Real Audio, or other non-essential sites. LAN W AN Outbound Rule: Blocking Inst ant Messenger If you want to block Instant[...]
-
Seite 144
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-30 Firewall Pr otection v1.0, September 2009 Creating Services, QoS Profiles, and Bandwid th Profiles When you create inbound and outbou nd firewall rules, you use firewall objects such as services, QoS profiles, bandwidth profiles, and schedules to narrow down the firewall rul[...]
-
Seite 145
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-31 v1.0, September 2009 For example, W eb servers serve W eb pages, time servers serve time and date information, and game hosts serve da ta about other players’ mov e s. When a computer on the Internet sends a request for service to a server computer , th[...]
-
Seite 146
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-32 Firewall Pr otection v1.0, September 2009 2. In the Add Customer Service section of the screen, enter the settings as explained in Ta b l e 5 - 6 . 3. Click Apply to save your settings. The new custom ser vice is added to th e Custom Services table. T o edit a service: 1. In[...]
-
Seite 147
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-33 v1.0, September 2009 2. Modify the settings that you wish to change (see T able 5-6 on page 5-32 ). 3. Click Apply to save your changes. The modified servic e is displayed in th e Custom Services table. Creating Quality of Service (QoS) Profiles A quality[...]
-
Seite 148
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-34 Firewall Pr otection v1.0, September 2009 T o create a QoS profile: 1. Select Network Security > Firewall Objects from the menu. The Firewall Objects submenu tabs appear , with the Services screen in view . 2. Click the QoS Profiles submenu tab. The QoS Profiles screen di[...]
-
Seite 149
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-35 v1.0, September 2009 5. Click Apply to save your settings. The new QoS profile is added to the List of QoS Profiles table. T o edit a QoS profile: 1. In the List of QoS Profiles table, click the edit table button to the right of the QoS profile that you w[...]
-
Seite 150
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-36 Firewall Pr otection v1.0, September 2009 3. Click Apply to save your changes. The modified QoS pr ofile is displayed in the List of QoS Profiles table. Creating Bandwid th Profiles Bandwidth profiles d etermine the way in which da ta is communicated with the hosts. The purp[...]
-
Seite 151
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-37 v1.0, September 2009 The screen displays the List of Bandwidth Profiles table with the user -defined profiles. 3. Under the List of Bandwidth Profiles table, click the add tabl e button. The Add Bandwidt h Profile screen displays. 4. Enter the settings as[...]
-
Seite 152
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-38 Firewall Pr otection v1.0, September 2009 5. Click Apply to save your settings. The new bandwidt h profile is added to the List of Bandwidth Profil es table. 6. In the Bandwidth Profiles section of the screen, select the Ye s radio bu tton under Enable Bandwidth Profiles? (B[...]
-
Seite 153
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-39 v1.0, September 2009 Setting a Schedule to Block or Allow S pecific T raffic Schedules define the timeframe s under which fi rewall rule s may be applied. Three schedules, Schedule 1, Schedule 2 and Schedule3 can b e defined, and any on e of these can be [...]
-
Seite 154
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-40 Firewall Pr otection v1.0, September 2009 • Specific Times . The schedule is active only on specific hours of the se lected day or days. T o the right of the radio buttons, specify the Start T ime and End T ime fields (Hour , Minute, AM/PM) during which the schedule is in [...]
-
Seite 155
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-41 v1.0, September 2009 2. In the MAC Filtering Enab le section, select the Ye s radio button. 3. In the same section, select one of the followi ng options from the pull-down menu (next to Policy for MAC Addresses listed below): • Block . T raffic coming f[...]
-
Seite 156
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-42 Firewall Pr otection v1.0, September 2009 Setting up IP/MAC Bindings IP/MAC Binding allows you to bind an IP addr ess to a MAC address and vice-versa. Some PCs or devices are configured with static addresses. T o prevent users from changing their static IP addresses, the IP/[...]
-
Seite 157
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-43 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 5 - 9 . Figure 5-27 T able 5-9. IP/MAC Binding Settings Setting Description (or Subfield and Description) Email IP/MAC Violations Do you want to enable E-mail Logs for IP/MAC Binding Viol[...]
-
Seite 158
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-44 Firewall Pr otection v1.0, September 2009 4. Click the add table button. The new IP/MAC rule is added to the IP/MAC Bindings table. 5. Click Apply to save your changes. T o edit an IP/MAC binding: 1. In the IP/MAC Bindings table, click the edit table button t o the right of [...]
-
Seite 159
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-45 v1.0, September 2009 Note these restrictions on port triggering: • Only one PC can use a port trig gering application at any time. • After a PC has finished using a port triggering application, there is a short time-out period before the application c[...]
-
Seite 160
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-46 Firewall Pr otection v1.0, September 2009 3. Click the add table button. The new port triggering rule is added to the Port T riggering Rules table. T o edit a port triggering rule: 1. In the Port T riggering Rules table, click the edit table butt on to the right of the port [...]
-
Seite 161
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-47 v1.0, September 2009 Using the Intrusion Prevention System The Intrusion Prevention System (IPS) of the UTM monitors all network traffic to detect, in real- time, network attacks and port scans and to protect your network from such intrusions. Y ou can se[...]
-
Seite 162
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-48 Firewall Pr otection v1.0, September 2009 When you en able the IPS, the default IPS configuration goes into ef fect. The default IPS configuration is the configuratio n that the Advanced (IPS) scree n returns to when you click the Reset button. T o modify th e default IPS co[...]
-
Seite 163
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Firewall Protection 5-49 v1.0, September 2009 . Figure 5-31[...]
-
Seite 164
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 5-50 Firewall Pr otection v1.0, September 2009 T able 5-1 1. IPS: Less Familiar Att ack Names Attack Name Description (or Subfield and Description) Web web-misc Detects some specific Web att a ck tools, such as the fingerprintin g tool and the password-cracking tool. web-attacks [...]
-
Seite 165
6-1 v1.0, September 2009 Chapter 6 Content Filtering and Optimizing Scans This chapter describes how to apply the content filtering features of the UTM and how to optimize scans to protect you r network. This chapter contains the following sections: • “About Content Filtering and Scans” on this page. • “Configuring E-mail Protection” on[...]
-
Seite 166
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-2 Content Filtering and Optim izing Scans v1.0, September 2009 Default E-mail and W eb Scan Settings For most network environm ents, the default sca n se ttings and actions that are shown in Ta b l e 6 - 1 work well but you can adjust these to th e needs of your specific enviro[...]
-
Seite 167
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-3 v1.0, September 2009 Configuring E-mail Protection The UTM lets you configure the following settin gs to protect the network’ s e-mail communication: • The e-mail protocols that are scanned for malware threats. • Actions that are [...]
-
Seite 168
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-4 Content Filtering and Optim izing Scans v1.0, September 2009 Customizing E-mail Prot ocol Scan Settings T o configure the e-mail protocols and ports to scan: 1. Select Application Security > Services from the menu. The Services screen displays ( Figure 6-1 shows the upper [...]
-
Seite 169
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-5 v1.0, September 2009 Customizing E-mail Anti-V irus and Notification Settings Whether or not the UTM detects an e-mail virus, yo u can configure it to take a variety of actions (some of the default actions are listed in T able 6-1 on pa[...]
-
Seite 170
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-6 Content Filtering and Optim izing Scans v1.0, September 2009 2. Enter the settings as explained in Ta b l e 6 - 2 . T able 6-2. E-mail Anti-Virus and Notification Settin gs Setting Description (or Subf ie ld a nd Desc r ipt ion) Action SMTP From the SMTP pull-down menu, speci[...]
-
Seite 171
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-7 v1.0, September 2009 Append Safe S tamp (SMTP and POP3) For SMTP and POP3 e-mail messages, se lect this checkbox to insert a default safe stamp message at the end of an e-mail. The safe stamp insertion serves as a security confirmation [...]
-
Seite 172
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-8 Content Filtering and Optim izing Scans v1.0, September 2009 3. Click Apply to save your settings. E-mail Content Filtering The UTM provides several options to filter unwant ed co ntent from e-mails. Y ou can filter content from e-mails based on keywords in the subject line ,[...]
-
Seite 173
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-9 v1.0, September 2009 T o configure e-mail content filtering: 1. Select Application Security > Email Filters from the menu. The Email Filters screen displays. Figure 6-3[...]
-
Seite 174
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-10 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Enter the settings as explained in Ta b l e 6 - 3 . T able 6-3. E-mail Filter Settings Setting Description (or Subfield and Description) Filter by Subject Key words Keywords Enter keywords that should be detect [...]
-
Seite 175
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-11 v1.0, September 2009 3. Click Apply to save your settings. Protecting Against E-mail S p am The UTM integrates multiple anti-sp am technologies to provide comprehensive p rotection against unwanted e-mail. Y ou can enable all or a comb[...]
-
Seite 176
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-12 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Real-time blacklist . E-mails from known spam sources that are collected by blacklist providers are blocked. 4. Distributed Spam Analysis . E-mails that are detected as spam by the NETG EAR Spam Classification C[...]
-
Seite 177
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-13 v1.0, September 2009 T o configure the whitelist and blacklist: 1. Select Application Security > Anti-Spam from the menu. The Anti-Spam submenu tabs appear , with the Whitelist/Bla cklist screen in view . Figure 6-4[...]
-
Seite 178
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-14 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Enter the settings as explained in Ta b l e 6 - 3 . Configuring the Real-time Blacklist Blacklist providers are organizations that collect IP addresses of verified open SMTP relays that might be used by spammers[...]
-
Seite 179
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-15 v1.0, September 2009 blacklist providers and are made av ailable to the public in the form of real-time blacklists (RBLs). By accessing these RBLs, the UTM can block spam originating from known spam sources. By default, the UTM comes w[...]
-
Seite 180
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-16 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Click the add table button in the Add column. The new blacklist provider is added to the real- time blacklist, and it is disabl ed by default. T o delete a blacklist provider from the real-time blacklist: 1. In [...]
-
Seite 181
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-17 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 6 - 5 . Figure 6-6 T able 6-5. Distributed Sp am Analysis Settings Setting Description (or Subfield and Description ) Distributed Sp am Analysis SMTP Select the SMTP c[...]
-
Seite 182
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-18 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. The Distributed Spam Analysis section and the Anti-Spam Engine Settings section each have their own Apply and Reset buttons to enable you to make changes to these sections sepa[...]
-
Seite 183
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-19 v1.0, September 2009 Configuring W eb and Services Protection The UTM lets you config ure the following settings to protect the network’ s Internet and W eb services communication: • The W eb protocols, instant messaging services, [...]
-
Seite 184
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-20 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Enter the settings as explained in Ta b l e 6 - 5 . Figure 6-7 T able 6-6. Web Protocol, Inst ant Messaging, and Peer-to-Peer Settings Setting Description (or Subfie ld an d Des c ri pti on ) Web HTTP Select the[...]
-
Seite 185
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-21 v1.0, September 2009 3. Click Apply to save your settings Configuring Web Malware Scans Whether or not the UTM detects W eb-bas ed malware threats, you can configure it to ta ke a variety of actions (some of the default actions are lis[...]
-
Seite 186
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-22 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Enter the settings as explained in Ta b l e 6 - 2 . Figure 6-8 T able 6-7. Malware Scan Settings Setting Description (or Su bfield and Description) Action HTTP and HTTPS Action From the HTTP or HTTPS pull-down m[...]
-
Seite 187
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-23 v1.0, September 2009 3. Click Apply to save your settings. Configuring Web Content Filtering If you want to restrict internal LAN users from a ccess to certain types of information and objects on the Internet, use the UTM’ s content [...]
-
Seite 188
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-24 Content Filtering and Optimizin g Scans v1.0, September 2009 Several types of W eb content blocking are available: • File extension blocking . Y ou can block files based on the ir extension. Such f iles can include, executable files, audio and vide o files, and compressed [...]
-
Seite 189
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-25 v1.0, September 2009 T o configure W eb content filtering: 1. Select Application Security > HTTP/HTTPS from the menu. Th e HT TP/HTTPS submenu tabs appear , with the Malware Sca n screen in view . 2. Click the Content Filtering subm[...]
-
Seite 190
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-26 Content Filtering and Optimizin g Scans v1.0, September 2009 . Figure 6-10 [Content Filtering, screen 2 of 3][...]
-
Seite 191
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-27 v1.0, September 2009 . 3. Enter the settings as explained in T able 6 -8 o n page 6-2 8 . Figure 6-1 1 [Content Filtering, scr een 3 of 3][...]
-
Seite 192
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-28 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 6-8. Content Filtering Settings Setting Description (or Subfield an d Des c ripti on ) Content Filtering Log HTTP T raffic Select this checkbox to log HTTP traffic. For information about how to view the logg[...]
-
Seite 193
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-29 v1.0, September 2009 Select the Web Categories Y ou Wish to Block Select the Enable Blocking checkbox to en able blocking of Web categories. By default, this checkbox is deselected. Select the checkboxes of any Web categories that yo u[...]
-
Seite 194
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-30 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. Configuring Web URL Filtering If you want to allow or block internal LAN user s from access to certain sites on the Internet, use the UTM’ s W eb URL filtering. Y ou can crea[...]
-
Seite 195
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-31 v1.0, September 2009 T o configure W eb URL filtering: 1. Select Application Security > HTTP/HTTPS from the menu. Th e HT TP/HTTPS submenu tabs appear , with the Malware Sca n screen in view . 2. Click the URL Filtering submenu tab.[...]
-
Seite 196
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-32 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Enter the settings as explained in Ta b l e 6 - 9 . T able 6-9. URL Filtering Settings Setting Description (or Sub field and Description) Whitelist Enable Select this checkbox to bypass scanni ng of the URLs tha[...]
-
Seite 197
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-33 v1.0, September 2009 4. Click Apply to save your settings. URL This field contains the URLs that are blocked. T o add a URL to this field, use the Add URL field or the Import from File tool (see below). Y ou can add a maximum of 200 UR[...]
-
Seite 198
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-34 Content Filtering and Optimizin g Scans v1.0, September 2009 HTTPS Scan Settings HTTPS traffic is encrypted traf fic that cannot be scanned otherwise the data stream would not be secure. However , the UTM can scan HTTPS traffi c that is transmit ted through an HTTP proxy , t[...]
-
Seite 199
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-35 v1.0, September 2009 If one of these is not satisfied, a security aler t message appears in the browser window (see Figure 6-14 ). However , even when a certific ate is trusted or still valid, or when the name of a certificate does mat[...]
-
Seite 200
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-36 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the HTTPS scan settings: 1. Select Application Security > HTTP/HTTPS from the menu. Th e HT TP/HTTPS submenu tabs appear , with the Malware Sca n screen in view . 2. Click the HTTPS Settings submen[...]
-
Seite 201
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-37 v1.0, September 2009 4. Click Apply to save your settings. S pecifying T rusted Host s Y ou can specify trusted hosts for which the UT M bypasses HTTPS traffic scanning and security certificate authentication. The securi ty certificate[...]
-
Seite 202
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-38 Content Filtering and Optimizin g Scans v1.0, September 2009 T o completely bypass the scanning of the https://example.com si te, you must add all three hosts to the trusted hosts list because different files from th ese three hosts are also downloaded when a user attempts t[...]
-
Seite 203
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-39 v1.0, September 2009 4. Click Apply to save your settings. Configuring FTP Scans Some malware threats are specific ally developed to spread through the FTP protocol. By default, the UTM scans FTP traffic, but you can specify how the UT[...]
-
Seite 204
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-40 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the FTP scan settings: 1. Select Application Security > FTP from the menu. The FTP screen displays. 2. Enter the settings as explained in Ta b l e 6 - 1 2 . Figure 6-17 T able 6-12. FTP Scan Settin[...]
-
Seite 205
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-41 v1.0, September 2009 3. Click Apply to save your settings. Setting W eb Access Exception s and Scanning Exclusions After you have specified which content the UTM f ilters, you can set exception rules for users of certain LAN groups. Si[...]
-
Seite 206
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-42 Content Filtering and Optimizin g Scans v1.0, September 2009 T o set W eb access exception rules: 1. Select Application Security > Block/Accept Exceptions from the menu. The Block/Accept Exceptions screen displays. This screen shows the Exceptions table, which is empty if[...]
-
Seite 207
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-43 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 6 - 1 3 . 4. Click Apply to save your settings. The new exception ru le is added to th e Exceptions table. 5. Select the checkbox to the le ft of the rule that you wan[...]
-
Seite 208
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-44 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Modify the settings that you wish to change (see T able 6 -13 on page 6-43 ). 3. Click Apply to save your changes. The modified excep tion rule is displayed in the Exceptions table. T o delete or disable one or [...]
-
Seite 209
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Content Filtering and Optimi zing Scans 6-45 v1.0, September 2009 2. In the Add Scanning Exclusions section of the scr een, specify an exclusion rule as explained in Ta b l e 6 - 1 4 . 3. In the Add column, click the add table button to add the exclus ion rule to the Scanning Exc[...]
-
Seite 210
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 6-46 Content Filtering and Optimizin g Scans v1.0, September 2009[...]
-
Seite 211
7-1 v1.0, September 2009 Chapter 7 V irtual Private Networking Using IPsec Connections This chapter describes how to use the IP security (IPsec) virtual private networking (VPN) features of the UTM to provide secure, encrypted comm unications between your local network and a remote network or computer . This ch apter contains the following sections[...]
-
Seite 212
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-2 Virtual Private Networking Using IPsec Connections v1.0, September 2009 The diagrams and t able below show how the W AN mode selection relates to VPN configuration. Ta b l e 7 - 1 summarizes the W AN addressing requirements (FQDN or IP address) for a VPN tunnel in either dual[...]
-
Seite 213
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7- 3 v1.0, September 2009 Using the IPsec VPN Wizard for Client and Gateway Configurations Y ou can use the IPsec VPN W izard to configure mu ltiple gat eway or client VPN tunnel policies. The section below provides wizard and NE[...]
-
Seite 214
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-4 Virtual Private Networking Using IPsec Connections v1.0, September 2009 T o view the wizard default settings, click the VPN Wizard Default V alues option arrow at the top right of the screen. A popup window appears (see Figure 7-5 on page 7-5 ) displaying the wizard default v[...]
-
Seite 215
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7- 5 v1.0, September 2009 3. Select the radio buttons and comple te the field s and as exp lained Ta b l e 7 - 2 . Figure 7-5 T able 7-2. (IPsec) VPN Wizar d Setti ngs for a Ga teway-to-Gateway T unnel Setting Description (or Sub[...]
-
Seite 216
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-6 Virtual Private Networking Using IPsec Connections v1.0, September 2009 . . This VPN tunnel will use following local W AN Interface (UTM25 only) For the UTM25 only , select one of the two ra dio buttons ( WA N 1 or WA N 2 ) to specify which local W AN interface the VPN tunnel[...]
-
Seite 217
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7- 7 v1.0, September 2009 4. Click Apply to save your settings. The IPsec VPN polic y is now added to the List of VPN Policies table on the VPN Policies screen. By default, the VPN policy is enabled. 5. Configure a VPN policy on [...]
-
Seite 218
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-8 Virtual Private Networking Using IPsec Connections v1.0, September 2009 Creating a Client to Gateway VPN T unnel Follow the steps in the fo llowing sections to configure a VP N client tunnel: • “Using the VPN W izard Configure the Gate way for a Client T unnel” on page [...]
-
Seite 219
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7- 9 v1.0, September 2009 T o display the wizard de fault settings, click the VPN W izard Default V alues option arrow at the top right of the screen. A popup window appears (see Figure 7-5 on page 7-5 ), displaying the wizard de[...]
-
Seite 220
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-10 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 3. Select the radio buttons and comple te the field s and as exp lained Ta b l e 7 - 3 . . T able 7-3. (IPsec) VPN Wizard Settings for a Client-to-Gate way T unnel Setting Description (or Subf ield and[...]
-
Seite 221
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-11 v1.0, September 2009 4. Click Apply to save your settings. The IPsec VPN polic y is now added to the List of VPN Policies table on the VPN Policies screen. By default, the VPN policy is enabled. Using the NETGEAR VPN Client [...]
-
Seite 222
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-12 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 2. In the upper left of the Policy Editor window , click the New Connection icon (the first icon on the left) to open a new connection. Give the ne w connection a name; in this example, we are using UT[...]
-
Seite 223
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-13 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 7 - 4 . 4. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu. T able 7-4. Security Policy Edit[...]
-
Seite 224
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-14 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 5. In the left frame, click My Identity . The screen adjusts. 6. Enter the settings as explained in Ta b l e 7 - 5 . Figure 7-13 T able 7-5. Security Policy Ed itor: My Identity Settings Setting Descri[...]
-
Seite 225
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-15 v1.0, September 2009 7. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu. 8. In the left frame, click Security Policy . The screen adjusts. ID T ype From the pul[...]
-
Seite 226
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-16 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 9. Enter the settings as explained in Ta b l e 7 - 6 . 10. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu 11 . Close the VPN ProSafe VPN[...]
-
Seite 227
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-17 v1.0, September 2009 In the example that is shown in Figure 7-15 , you should receive the message “Successfully connected to My ConnectionsU TM_SJ” within 30 seconds. The VPN client icon in the system tray should say On[...]
-
Seite 228
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-18 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 • Right-click the VPN Client icon in the system tray and select Connection Monitor . Figure 7-16 Figure 7-17[...]
-
Seite 229
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-19 v1.0, September 2009 The VPN client system tray icon provides a vari ety of status indications, which are listed b elow . V iewing the UTM IPsec VPN Connection St atus T o review the status of current IPsec VPN tunnels: 1. S[...]
-
Seite 230
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-20 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 The Active IPsec SAs table lists each active conn ection with the informa tion that is described in Ta b l e 7 - 8 . The default poll interval is 5 seconds. T o change the poll interval period, enter a[...]
-
Seite 231
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-21 v1.0, September 2009 Managing IPsec VPN Policies After you have used the VPN W izard to set up a VPN tunnel, a VPN policy and an IKE policy are stored in separate policy tables. The name that you selected as the VPN tunnel c[...]
-
Seite 232
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-22 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Managing IKE Policies The Internet Key Exchange (IKE) protocol perfo rms negotiations between the two VPN gateways, and provides au tomatic managemen t of the keys that are used for IP sec connectio ns[...]
-
Seite 233
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-23 v1.0, September 2009 . Each policy contains the data that are explained in Ta b l e 7 - 9 These fields are explained in more detail in Ta b l e 7 - 1 0 . T o delete one or more IKE polices: 1. Select the checkbox to the left[...]
-
Seite 234
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-24 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 T o add or edit an IKE policy , see “Manually Adding or Editing an IKE Policy on this page. Manually Adding or Editing an IKE Policy T o manually add an IKE policy: 1. Select VPN > IPSec VPN from [...]
-
Seite 235
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-25 v1.0, September 2009 . Figure 7-21[...]
-
Seite 236
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-26 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 3. Complete the fields, select the radio buttons , and make your selections from the pu ll-down menus as explained Ta b l e 7 - 1 0 . T able 7-10. Add IKE Policy Settings Item Description (or Subfield [...]
-
Seite 237
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-27 v1.0, September 2009 Local Select Local Gateway (UTM25 only) For the UTM25 only , sele ct a radio button to specify the W AN1 or W AN2 interface. Identifier T ype From the pull-down menu, select one of th e following ISAKMP [...]
-
Seite 238
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-28 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Authentication Algorithm From the pull-down me nu, se lect one of the following two algorith ms to use in the VPN header for the authentication process: • SHA-1 . Hash algorithm that produces a 160-b[...]
-
Seite 239
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-29 v1.0, September 2009 4. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table. T o edit an IKE policy: 1. Select VPN > IPSec VPN from the menu. The IPsec VPN submenu tabs appear with[...]
-
Seite 240
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-30 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 4. Click Apply to save your changes. The modified IKE policy is displayed in the List of IKE Policies table. Managing VPN Policies Y ou can create two types of VPN policies. When you use the VPN Wizard[...]
-
Seite 241
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-31 v1.0, September 2009 2. Click the VPN Policies submenu tab. The VPN Policies screen display . ( Figure 7-22 shows some examples.) Each policy contains the data that are explained in Ta b l e 7 - 1 1 . These fields are explai[...]
-
Seite 242
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-32 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 T o delete one or more VPN polices: 1. Select the checkbox to the left of the polic y that you want to delete or click the select all table button to select all VPN pol icies. 2. Click the delete table[...]
-
Seite 243
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-33 v1.0, September 2009 Figure 7-23[...]
-
Seite 244
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-34 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 4. Complete the fields, select the radio buttons an d checkbox es, and make your se le ctions from the pull-down men us as explained Ta b l e 7 - 1 2 . T able 7-12. Add VPN Policy Settings Item Descrip[...]
-
Seite 245
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-35 v1.0, September 2009 T raffic Selection Local IP From the pull-down menu, select th e address or addre sses that are part of the VPN tunnel on the UTM: • Any . All PCs and devices on the network. Note : Y ou cannot select [...]
-
Seite 246
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-36 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Integrity Algorithm From the pull-down menu, se le ct one of the following two algori thms to be used in the VPN header for the authentication process: • SHA-1 . Hash algorithm that produces a 160-bi[...]
-
Seite 247
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-37 v1.0, September 2009 5. Click Apply to save your settings. The VPN policy is added to the List of VPN Poli cies table. T o edit a VPN policy: 1. Select VPN > IPSec VPN from the menu. The IPsec VPN submenu tabs appear with[...]
-
Seite 248
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-38 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Y ou can enable XAUTH when you manually add or edit an IKE policy . T wo types of XAU TH are available: • Edge Device . The UTM is used as a VPN concentrator on which one or more gateway tunnels term[...]
-
Seite 249
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-39 v1.0, September 2009 4. Complete the fields, select the radio buttons , and make your selections from the pu ll-down menus as explained Ta b l e 7 - 1 3 . 5. Click Apply to save your settings. User Dat abase Configuration Wh[...]
-
Seite 250
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-40 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 server in the network when a user requests access to network resources. During the establishment of a VPN connection, the VPN gateway can interru pt the process with an XAUTH request. At tha t point, t[...]
-
Seite 251
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-41 v1.0, September 2009 3. Complete the fields and select the radio buttons as explained Ta b l e 7 - 1 4 . 4. Click Apply to save your settings. Ta b l e 7 - 1 4 . RADIUS Client Settings Item Description (or Subfield an d Des [...]
-
Seite 252
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-42 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Assigning IP Addresses to Re mote Users (Mode Config) T o simplify the process of connecting remote VP N clients to the UTM, use the Mode Config feature to assign IP addresses to remote users, includin[...]
-
Seite 253
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-43 v1.0, September 2009 2. Click the Mode Config submenu tab. The Mode Config screen displays. As an example, the screen shows two Mode Co nfig records with the names EMEA Sales and NA Sales: • For EMEA Sales, a first pool (1[...]
-
Seite 254
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-44 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 . 4. Complete the fields, selec t the checkbox, and ma ke your selections from the pull-down menus as explained Ta b l e 7 - 1 5 . Figure 7-26 T able 7-15. Add Mode Config Record Settings Item Descript[...]
-
Seite 255
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-45 v1.0, September 2009 WINS Server If there is a WINS server on the local network, enter its IP address in the Primary field. Y ou can enter the IP ad dress of a second WINS server in the Secondary field. DNS Server Enter the [...]
-
Seite 256
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-46 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 5. Click Apply to save your settings. The new Mode Config record is added to the List of Mode Config Records table. Continue the Mode Config con figuration procedure by configuring an IKE policy . 6. S[...]
-
Seite 257
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-47 v1.0, September 2009 8. On the Add IKE Policy screen, complete the fi elds, select the radio buttons, and m ak e your selections from the pull-down menus as explained Ta b l e 7 - 1 6 . Note: The settings that are explained [...]
-
Seite 258
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-48 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Remote Identifier T ype From the pull-down menu, select FQDN . Note : Mode Config requires that the remote end is defined by a FQDN. Identifier Enter the FQDN for the re mote end . This must be a FQDN [...]
-
Seite 259
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-49 v1.0, September 2009 9. Click Apply to save your settings. The IKE policy is added to the List of IKE Policies table. Configuring the ProSafe VPN Client for Mode Config Operation From a client PC running NETGEAR ProSafe VP N[...]
-
Seite 260
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-50 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 2. In the upper left of the Policy Editor window , click the New Connection icon (the first icon on the left) to open a new connection. Give the ne w connection a name; in this example, we are using Mo[...]
-
Seite 261
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-51 v1.0, September 2009 4. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu. Use Select the Use checkbox. T hen, from the pull-down menu, select Secure Gateway T un[...]
-
Seite 262
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-52 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 5. In the left frame, click My Identity . The screen adjusts. 6. Enter the settings as explained in Ta b l e 7 - 1 8 . Figure 7-29 T able 7-18. Security Pol icy Editor: My Identity , Mode Config Sett i[...]
-
Seite 263
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-53 v1.0, September 2009 7. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu. 8. In the left frame, click Security Policy . The screen adjusts. ID T ype From the pul[...]
-
Seite 264
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-54 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 9. Enter the settings as explained in Ta b l e 7 - 1 9 . 10. Click on the disk icon to save the configuration, or select File > Save from the Security Policy Editor menu. 11 . Close the VPN ProSafe [...]
-
Seite 265
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-55 v1.0, September 2009 Configuring Keep alives The Keepalive feature maintains the IPSec SA by sending periodic ping requests to a host across the tunnel and monito ring the re plies. T o configure the Keepalive feature on a c[...]
-
Seite 266
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-56 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 4. Enter the settings as explained in Ta b l e 7 - 2 0 . 5. Click Apply to save your settings. Configuring Dead Peer Connection The Dead Peer Detect ion (DPD) feature mainta ins the IKE SA by exchangin[...]
-
Seite 267
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using IPsec Connections 7-57 v1.0, September 2009 3. In the IKE SA Parameters section of the screen, locate the DPD fields. 4. Select the radio button and complete the fields as explained Ta b l e 7 - 2 1 . 5. Click Apply to save your settings. Figure 7[...]
-
Seite 268
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 7-58 Virtual Private Networking Us ing IPsec Con nections v1.0, September 2009 Configuring NetBIOS Br idging with IPsec VPN W indows networks use the Network Basic Inpu t/Output System (NetBIOS) for several basic network services such as naming and neig hborhood device discovery [...]
-
Seite 269
8-1 v1.0, September 2009 Chapter 8 V irtual Private Networking Using SSL Connections The UTM provides a hardware-based SSL VPN solutio n designed specifically to provide remote access for mobile users to their corporate resources, bypassing the need for a pre-installed VPN client on their computers. Using the familiar Secure Sockets Layer (SSL) pro[...]
-
Seite 270
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-2 Virtual Private Networking Using SSL Connections v1.0, September 2009 • SSL Port Forwarding . Like an SSL VPN tunnel , port forwar ding is a W eb-based client that installs transparently and then creates a virtua l, encrypted tunnel to the remote network. However , port for[...]
-
Seite 271
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL Connections 8-3 v1.0, September 2009 The following sections explain the five configuration screens of the SSL VPN W izard. On the sixth screen, you can save your SSL VPN policy . The tables in the following sections explain th e buttons and fi[...]
-
Seite 272
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-4 Virtual Private Networking Using SSL Connections v1.0, September 2009 Note: After you have completed the steps in the SSL VPN Wizard, you can make changes to the portal set tings by selecting VPN > SSL VPN > Portal Layout . For more information about portal settings, se[...]
-
Seite 273
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL Connections 8-5 v1.0, September 2009 SSL VPN Wizard S tep 2 of 6: Domain Settings Note that Figu re 8-3 contains some examples. Ente r the settings as explained in Ta b l e 8 - 2 o n page 8-6 , then click Next to go the following screen. Activ[...]
-
Seite 274
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-6 Virtual Private Networking Using SSL Connections v1.0, September 2009 Note: If you leave the Do main Name field blank, the SSL VPN W izard uses the default domain name geardomain. Y ou must enter a name other than geardomain in the Domain Name field so the SSL VPN W iza rd ca[...]
-
Seite 275
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL Connections 8-7 v1.0, September 2009 SSL VPN Wizard S tep 3 of 6: User Settings Note that Figu re 8-4 contains some examples. Ente r the settings as explained in Ta b l e 8 - 3 o n page 8-8 , then click Next to go the following screen. Portal [...]
-
Seite 276
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-8 Virtual Private Networking Using SSL Connections v1.0, September 2009 Note: After you have completed the steps in the SSL VPN Wizard, you can make changes to the user settings by selecting Users > Users . For more inform ation about user settings, see “Configuring User A[...]
-
Seite 277
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL Connections 8-9 v1.0, September 2009 SSL VPN Wizard S tep 4 of 6: C lient IP Address Range and Routes Note that Figu re 8-5 contains some examples. Ente r the settings as explained in Ta b l e 8 - 4 o n page 8-10 , then click Next to go the fo[...]
-
Seite 278
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-10 Virtual Private Networking Using SSL Connections v1.0, September 2009 T able 8-4. SSL VPN Wizard S tep 4: Client IP Address Rang e and Routes Settings Item Description (or Subfie ld a nd Descr ipt ion ) Client IP Address Range Enable Full Tunnel Support Select this checkbox [...]
-
Seite 279
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-11 v1.0, September 2009 SSL VPN Wizard S tep 5 of 6: Port Forwarding Note that Figu re 8-6 contains some examples. Ente r the settings as explained in Ta b l e 8 - 5 , then click Next to go the following screen. Figure 8-6 Note:[...]
-
Seite 280
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-12 Virtual Private Networking Using SSL Connections v1.0, September 2009 TCP Port NumberAction The TCP port number of th e application th at is accessed through the SSL VPN tunnel. Below are some commonly used TCP applications and port numbers. FTP Data (usually not needed) 20 [...]
-
Seite 281
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-13 v1.0, September 2009 SSL VPN Wizard S tep 6 of 6: V erify and Save Y our Settings Figure 8-7[...]
-
Seite 282
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-14 Virtual Private Networking Using SSL Connections v1.0, September 2009 V erify your settings; if you need to make any changes, click the Back acti on button (if needed several times) to return to the screen on which you want to make changes. Click Apply to save your settings.[...]
-
Seite 283
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-15 v1.0, September 2009 4. Enter the user name and password that you ju st created with the help of the SSL VP N W izard 5. Click Login . The default User Port al screen di sp la ys . Figure 8-8 Figure 8-9[...]
-
Seite 284
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-16 Virtual Private Networking Using SSL Connections v1.0, September 2009 The default User Portal screen displays a simple menu that provides the SSL user with the following menu selections: • VPN T unnel . Provides full network connectivity . • Port Forwarding . Provides ac[...]
-
Seite 285
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-17 v1.0, September 2009 3. From the Log T ype pull-down menu, select SSL VPN . The SSL VPN logs display . Manually Configuring and Editing SSL Connections T o manually configure and activate SSL connections , perform the followi[...]
-
Seite 286
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-18 Virtual Private Networking Using SSL Connections v1.0, September 2009 When you define the SSL VPN policies that determine netw ork resource access for your SSL VPN users, you can define g lobal policies, group policies, or indiv idual policies. Because you must assign an aut[...]
-
Seite 287
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-19 v1.0, September 2009 Portal layouts are applied by selecting one from the available portal layouts in the configuratio n of a domain. When you have completed yo ur portal layout, you can apply the p ortal layout to one or mor[...]
-
Seite 288
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-20 Virtual Private Networking Using SSL Connections v1.0, September 2009 The List of Layou ts table displays the followi ng fields: • Layout Name . The descriptive name of the portal. • Description . The banner message that is displayed at the top of the portal (see Figure [...]
-
Seite 289
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-21 v1.0, September 2009 4. Complete the fields and select the checkboxes as expl a ine d Ta b l e 8 - 6 . Ta b l e 8 - 6 . Add Portal Layout Settings Item Descrip tion (or Subfield an d Description) Port al Layout and Theme Name[...]
-
Seite 290
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-22 Virtual Private Networking Using SSL Connections v1.0, September 2009 5. Click Ap ply to save your settings. The new portal layout is added to t he List of Layouts table. T o display the new portal layout. Configuring Domains, Group s, and Users Remote users connec ting to t[...]
-
Seite 291
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-23 v1.0, September 2009 Adding Servers and Port Numbers T o configure port forwa rding, you must define the IP addresses of the internal s ervers and the port number for TCP applications that are available to remote users. T o a[...]
-
Seite 292
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-24 Virtual Private Networking Using SSL Connections v1.0, September 2009 4. Click the Add table button. The new application entry is added to the List of Configured Applications for Port Forwarding table. Re mote users can now secure ly access network applications once they hav[...]
-
Seite 293
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-25 v1.0, September 2009 3. In the Add New Host Name for Port Forwarding section of the screen, specify information in the following fields: • Local Server IP Address . The IP address of an internal server or host computer that[...]
-
Seite 294
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-26 Virtual Private Networking Using SSL Connections v1.0, September 2009 • If you enable split tunnel support and you assign an enti rely different subnet to the VPN tunnel clients than the subnet that is used by the local network, you must add a client route to ensure that a[...]
-
Seite 295
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-27 v1.0, September 2009 3. Select the checkbox and complete the fields as explained Ta b l e 8 - 8 . 4. Click Apply to save your settings. VPN tunnel client s are now able to connect to the UTM and receive a virtual IP address i[...]
-
Seite 296
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-28 Virtual Private Networking Using SSL Connections v1.0, September 2009 T o add an SSL VPN tunnel client r oute: 1. Select VPN > SSL VPN from the menu. The SSL VPN s subm enu tabs appear , with the Policies screen in view . 2. Click the SSL VPN Client submenu tab. The SSL V[...]
-
Seite 297
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-29 v1.0, September 2009 Adding New Network Resources T o define a netw ork resource: 1. Select VPN > SSL VPN from the menu. The SSL VPN s subm enu tabs appear , with the Policies screen in view . 2. Click the Resources submen[...]
-
Seite 298
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-30 Virtual Private Networking Using SSL Connections v1.0, September 2009 Editing Network Resources to S pecify Addresses 1. Select VPN > SSL VPN from the menu. The SSL VPN s subm enu tabs appear , with the Policies screen in view . 2. Click the Resources submenu tab. The Res[...]
-
Seite 299
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-31 v1.0, September 2009 5. Click Apply to save your settings. The new configuration is added to the Defined Resource Addresses table. T o delete a configuration from the Defined Resource Addresses table, click the delete table b[...]
-
Seite 300
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-32 Virtual Private Networking Using SSL Connections v1.0, September 2009 For example, a policy that is configured for a si ngle IP address takes precedence over a po licy that is configured for a range of addresses. And a policy tha t applies to a range of IP address es takes p[...]
-
Seite 301
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-33 v1.0, September 2009 2. Make your selection from the follo win g Query options: • Click Glo bal to view all global policies. • Click Gr oup to view group policies, and choo se the relevant group’ s name from the pull- d[...]
-
Seite 302
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-34 Virtual Private Networking Using SSL Connections v1.0, September 2009 . 3. Select the radio buttons, complete the fields , and make yo ur selection from the pull-down menus as explained Ta b l e 8 - 1 0 . Figure 8-19 Ta b l e 8 - 1 0 . Add Polic y Settings Item Descrip tion [...]
-
Seite 303
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-35 v1.0, September 2009 Add SSL VPN Policies Apply Policy For Select one of the following radio buttons to specify how the policy is applied: • Network Resource . The policy is appl ied to a network resource that you have defi[...]
-
Seite 304
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-36 Virtual Private Networking Using SSL Connections v1.0, September 2009 Apply Policy For (continued) IP Network Policy Name A descriptive name of the SSL VPN policy for identification and management purpose s. IP Address The network IP address to which th e SSL VPN policy is a[...]
-
Seite 305
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Virtual Private Networking Using SSL C onnections 8-37 v1.0, September 2009 4. Click Apply to save your settings. The policy is adde d to the List of SSL VPN Policies table on the Policies screen. The new poli cy goes into ef fect immediately . Note: In addition to configuring SS[...]
-
Seite 306
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 8-38 Virtual Private Networking Using SSL Connections v1.0, September 2009[...]
-
Seite 307
9-1 v1.0, September 2009 Chapter 9 Managing Users, Authenti cation, and Certificates This chapter describes how to manage users, auth entication, and security ce rtificates for IPsec VPN and SSL VPN. This chapter contains the following sections: • “Configuring VPN Authenticati on Domains, Grou ps, and Users ” on th is page. • “Managing Di[...]
-
Seite 308
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-2 Managing Users, Authen tication, and Certificates v1.0, September 2009 Configuring Domains The domain determines the authentication method to be us ed for associated users. For SSL connections, the domain al so determines the portal layout that is presented, which in turn det[...]
-
Seite 309
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-3 v1.0, September 2009 T o create a domain: 1. Select Users > Domains from the menu. The Doma ins screen displays. Figure 9-1 shows the UTM’ s default domain—geardomain—and, as an example, another domain in the List of [...]
-
Seite 310
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-4 Managing Users, Authen tication, and Certificates v1.0, September 2009 2. Under the List of Domains table, click the add table button. The Add Do main screen displa ys. 3. Enter the settings as explained in Ta b l e 9 - 2 . Figure 9-2 T able 9-2. Add Domain Settings Setting D[...]
-
Seite 311
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-5 v1.0, September 2009 4. Click Apply to save your settings. The domain is added to the List of Domains table. 5. If you use local authentication, make su re that it is not disabled: select the No radio button in the Local Authe[...]
-
Seite 312
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-6 Managing Users, Authen tication, and Certificates v1.0, September 2009 6. If you change local authentication, click Apply in the Domain screen to save your settings. T o delete one or more domains: 1. In the List of Domains table, select the check box to the left of the domai[...]
-
Seite 313
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-7 v1.0, September 2009 Creating and Deleting Group s T o create a VPN group: 1. Select Users > Groups from the menu. The Groups screen displays. Figure 9-3 shows the UTM’ s default group—geardomain—and, as an exampl e, [...]
-
Seite 314
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-8 Managing Users, Authen tication, and Certificates v1.0, September 2009 3. Click the add table button. The new group is added to the List of Gro ups table. T o delete one or more groups: 1. In the List of Groups table, select the checkbox to the left of the group that you want[...]
-
Seite 315
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-9 v1.0, September 2009 3. Modify the idle timeout period in minutes in the Idle T i meout field. For a group that is associated with a domain that uses the LDAP authentication method , configure the LDAP attributes (in fields 1 [...]
-
Seite 316
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-10 Managing Users, Authentication , and Certificates v1.0, September 2009 T o create an individual user account: 1. Select Users > Users from the menu. The Users screen displays. Figure 9-5 shows the UTM’ s default users—admin and guest—and, as an exampl e, several oth[...]
-
Seite 317
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-11 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 9 - 4 . Figure 9-6 T able 9-4. Add User Settings Setting Description (or Subf ield and Description) User Name A descriptive (alphanumeric) name o f the user [...]
-
Seite 318
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-12 Managing Users, Authentication , and Certificates v1.0, September 2009 4. Click Apply to save your settings. The user is added to the List of Users table. T o delete one or more users: 1. In the List of Users table, select the checkbox to the left of the user that you want t[...]
-
Seite 319
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-13 v1.0, September 2009 4. Click Apply to save your settings. Configuring Login Restrictions Bas ed on IP Address T o restrict logging in based on IP address: 1. Select Users > Users from the menu. The Users screen displays ([...]
-
Seite 320
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-14 Managing Users, Authentication , and Certificates v1.0, September 2009 4. In the Defined Addresses Status section of the screen, select one of the following radio buttons: • Deny Login fr om Defined Addr esses . Deny logging in from the IP addresses in the Defined Addresse[...]
-
Seite 321
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-15 v1.0, September 2009 3. Click the by Client Browser su bmenu tab. The by Client Browser s creen displays. Figure 9-9 shows a browser in the Defined Browsers table as an example. 4. In the Defined Bro wsers S tatus section of [...]
-
Seite 322
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-16 Managing Users, Authentication , and Certificates v1.0, September 2009 7. Click the add table button. The browser is added to the Defined Browsers table. 8. Repeat step 6 and step 7 for any ot her browsers that you want t o add to the Defined Browsers table. T o delete one o[...]
-
Seite 323
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-17 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 9 - 6 . 4. Click Apply to save your settings. Managing Digit al Certificates The UTM uses digital certificates (also known as X 509 certificates) duri ng the[...]
-
Seite 324
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-18 Managing Users, Authentication , and Certificates v1.0, September 2009 On the UTM, the uploaded digital certificate is checked for validity and purpose. The digital certificate is accepted when it passes the validity te st and the purpose ma tches its use. The check for the [...]
-
Seite 325
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-19 v1.0, September 2009 The Certificates screen contains four tables that are explained in detail in the following sections: • T rusted Certificates (CA C ertificate) table . Contains the trusted dig ital certificates that wer[...]
-
Seite 326
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-20 Managing Users, Authentication , and Certificates v1.0, September 2009 The T rusted Certificates (CA Certificates) table lis ts the digital certificates of CAs and contains the following fields: • CA Identity (Subject Name) . The organization or person to whom the digital [...]
-
Seite 327
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-21 v1.0, September 2009 When a security alert is generated, the user can decide wh ether or not to trust the host. Generating a CSR and Obt aining a Self Certificate from a CA T o use a self ce rtificate, you must first request [...]
-
Seite 328
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-22 Managing Users, Authentication , and Certificates v1.0, September 2009 2. In the Generate Self Certificate Request section of the screen, enter the settings as explained in Ta b l e 9 - 7 . Figure 9-13 [Certificates, scree n 2 of 3] Ta b l e 9 - 7 . Generate Self Certificat [...]
-
Seite 329
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-23 v1.0, September 2009 3. Click the generate table button. A new SCR is created and added to the Self Certificate Requests table. 4. In the Self Certificate Re quests table, click the view table button in the Action column to v[...]
-
Seite 330
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-24 Managing Users, Authentication , and Certificates v1.0, September 2009 5. Copy the contents of the Data to supply to CA text box into a text file, including all of the data contained from “----BEGIN CER TIFICA TE REQUEST ---” to “---END CER TIFICA TE REQUEST ---”. 6.[...]
-
Seite 331
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Managing Users, Authentica tion, and Certificates 9-25 v1.0, September 2009 10. Click Br owse and navigate to the digital certificate file from the CA that you just stored on your computer . 11 . Click the upload table button. If the verif ication pro cess on the UTM approves the[...]
-
Seite 332
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 9-26 Managing Users, Authentication , and Certificates v1.0, September 2009 T o view the currently-loaded CRLs and upload a new CRL: 1. Select VPN > Certificates from the menu. The Certificates sc reen displays. Figure 9-15 shows the bottom section of the screen with Certifica[...]
-
Seite 333
10-1 v1.0, September 2009 Chapter 10 Network and System Management This chapter describes the tools fo r managing the network traffic to optimize its performance and the syst em manageme nt features o f the UTM . This chapter contains the following sections: • “Performance Management ” on this page . • “System Management” on page 10-9 .[...]
-
Seite 334
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-2 Network and System Management v1.0, September 2009 Using the dual W AN ports in load bal ancing mo de increases the bandwidth capacity of the W AN side of the UTM, but there is no backup in ca se one of the W AN ports fail. When such as failure occurs, the traffic that would[...]
-
Seite 335
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Management 10- 3 v1.0, September 2009 When you define ou tbound firewall rules, you can further refine their application according to the following criteria: • Services . Y o u can specify the services or applications to be covered by an outbound rule. If the[...]
-
Seite 336
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-4 Network and System Management v1.0, September 2009 Content Filtering If you want to reduce tra ffic by preventing undesired e-mails from reac hing their destinations or b y preventing access to certain sites on the Internet, you can use the UTM’ s content filtering feature[...]
-
Seite 337
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Management 10- 5 v1.0, September 2009 – W eb object blocking . Y ou can block the fo llowing W eb co mponent types: embedded objects (ActiveX, Java, Flash), proxies, and cookies, and you can di sable Java scripts. For more information, see “Configuring W eb[...]
-
Seite 338
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-6 Network and System Management v1.0, September 2009 Each rule lets you specify the desired actio n for the connections covered by the rule: •B L O C K a l w a y s • BLOCK by schedul e, otherwise Allow • ALLOW always • ALLOW by schedule, otherwise Block The section bel[...]
-
Seite 339
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Management 10- 7 v1.0, September 2009 – Groups . The rule is applied to a group of PCs. (Y ou can configure groups for LAN W AN outbound rules but n ot for DMZ W AN outbound rules.) The Known PCs and Devices table is an automaticall y-mai ntained list of all [...]
-
Seite 340
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-8 Network and System Management v1.0, September 2009 LAN port) can be dedicated as a hardware DMZ po rt to safely provide services to the Internet without compromising security on your LAN. By default, the DMZ po rt and both inbound and outbound DMZ traffic are disabled. Enabl[...]
-
Seite 341
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Management 10- 9 v1.0, September 2009 For more information ab out QoS profiles, see “Creating Quality of Service (QoS) Profiles” on page 5-33 . Assigning Bandwid th Profiles By applying a Q oS profile, the W AN ban dwidth does not ch ange. Y ou change the W[...]
-
Seite 342
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-10 Network and System Management v1.0, September 2009 T o modify the administrator user acc ount settings, includ ing the password: 1. Select Users > Users from the menu. The Users screen displays. Figure 10-1 shows the UTM’ s default users—admin an d guest—and , as a[...]
-
Seite 343
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-11 v1.0, September 2009 3. Select the Check to Edit Password checkbox. The password fields become active. 4. Enter the old password, ent er the new password, and then confirm th e new password. 5. As an option, you can chan ge th e idle timeout f[...]
-
Seite 344
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-12 Network and System Management v1.0, September 2009 Configuring Remote Management Ac cess An administrator can configure, upgrade, and chec k the status of the UTM over the Internet via a Secure Sockets Layer (SSL) VPN connection. T o configure the UTM for remote managemen t[...]
-
Seite 345
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-13 v1.0, September 2009 4. Click Apply to save your changes. When remote management is en abled, you must use an SSL connection to access the UTM from the Internet. Y ou must enter https:// (not http:// ) and type the UTM’ s W AN IP address in [...]
-
Seite 346
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-14 Network and System Management v1.0, September 2009 Using an SNMP Manager Simple Network Management Protocol (SNMP) fo rms part of the Internet Protocol Suite as defined by the Internet Engineerin g T ask Force (IETF). SNMP is used in network ma nagement systems to monitor n[...]
-
Seite 347
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-15 v1.0, September 2009 2. Enter the settings as explained in T able 10-1 . 3. Click Apply to save your settings. Managing the Configuration File The configuration settings of the UT M are stored in a configuration f ile on the UTM. This file can[...]
-
Seite 348
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-16 Network and System Management v1.0, September 2009 The Backup & Restore Settings screen lets you: • back up and save a co py of the current settings • restore saved settings from the backed-up file • revert to the factory default settings. T o display the Backup &[...]
-
Seite 349
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-17 v1.0, September 2009 2. Select Save file , and then click OK . 3. Open the folder where you have saved the backup file, and then verify that it has been saved successfully . Note the fol lo wing: • If your br owser is not configured to save [...]
-
Seite 350
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-18 Network and System Management v1.0, September 2009 Reverting to Factory Default Settin gs T o reset the UTM to the original factory default settings, you can use on e of the following two methods: • Using a sharp object, press and hold the Reset button on the rear panel o[...]
-
Seite 351
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-19 v1.0, September 2009 Vie wing the A vailable Firmware V ersions T o view the current version o f the firmware that your UTM is running an d the other available firmware versions: 1. Select Administration > System Update from the menu. The S[...]
-
Seite 352
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-20 Network and System Management v1.0, September 2009 3. T o see which other firmware versions are available, click Query under the Firmware Download section to allow the UT M to connect to the NETGE AR update server . The Firmware Download section shows the availa ble firmwar[...]
-
Seite 353
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-21 v1.0, September 2009 Rebooting Without Changing the Firmware T o reboot the UTM without changing the firmware: 1. In the Firmware Reboot section of the Firmware screen (see Figure 10-6 on page 10-19 ), select the active firmware version by cli[...]
-
Seite 354
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-22 Network and System Management v1.0, September 2009 The Info section shows the following information fields for the scan engine firmware and patte rn file: • Current V ersion . The version of the files. • Last Updated . The date of the most recent update. T o immediat el[...]
-
Seite 355
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-23 v1.0, September 2009 Configuring Automatic Up date and Frequency Settings T o configure the update settings and frequency settings for auto matic downloading of the scan engine firmware and pattern file: 1. Locate the Update Se ttings, Frequen[...]
-
Seite 356
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-24 Network and System Management v1.0, September 2009 Configuring Date and T ime Service Configure date, time and NTP server designations on the System Date & T ime screen. Network T ime Pro t o col (NTP) is a protocol that is used to synchronize comp uter clock times in a[...]
-
Seite 357
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network and System Managem ent 10-25 v1.0, September 2009 3. Click Apply to save your settings. Automatically Adjust for Daylight Savings Time If daylight savings time is suppor ted in your region, select the Automatically Adjust for Daylight Savings T ime checkbox. NTP Server (d[...]
-
Seite 358
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 10-26 Network and System Management v1.0, September 2009[...]
-
Seite 359
11-1 v1.0, September 2009 Chapter 1 1 Monitoring System Access and Performance This chapter describes the system monitoring features of the UTM. Y ou can be alerted to important events such as a W AN port rollover , W AN traffic limits reached, login failures, and attacks. Y ou can also view status information about the fire wall, W AN ports, LAN p[...]
-
Seite 360
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-2 Monitoring System Access and Performanc e v1.0, September 2009 The Internet T raffic S tatistics section in the lowe r part of the screen displays statistics on Internet traffic via the W AN port. If you have no t enabled the traf fic meter , these statistics a re not availa[...]
-
Seite 361
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring System Access a nd Performance 11-3 v1.0, September 2009 T able 1 1-1. W AN T raffic Meter Settings Setting Description (or Sub field and Description) Enable T raffic Meter Do you want to enable T raffic Metering on W AN1? (UTM25) or Do you want to enable T raffic Mete[...]
-
Seite 362
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-4 Monitoring System Access and Performanc e v1.0, September 2009 3. Click Apply to save your settings. 4. For the UTM25 only , click the W AN2 T raffic Meter submenu tab. The W AN2 T raffic Meter screen displays. This screen is identical to the W AN1 Traf fic Meter screen (see[...]
-
Seite 363
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring System Access a nd Performance 11-5 v1.0, September 2009 Configuring Logging, Alert s , and Event Notifications By default, the UTM logs security-related even ts such as accepted and dropped packets on different segments of your LAN, denied incomi ng and outgoing servi[...]
-
Seite 364
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-6 Monitoring System Access and Performanc e v1.0, September 2009 2. Enter the settings as explained in Ta b l e 1 1 - 2 . 3. Click T est to ensure that the connection to the server and e-mail addre ss succeeds. 4. Click Apply to save your settings. Configuring and Activating S[...]
-
Seite 365
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring System Access a nd Performance 11-7 v1.0, September 2009 Figure 1 1-4[...]
-
Seite 366
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-8 Monitoring System Access and Performanc e v1.0, September 2009 2. Enter the settings as explained in Ta b l e 1 1 - 2 . T able 1 1-3. E-mail and Syslog Setting s Setting Description (or Subfield and Description ) System Logs Opti on Select the checkboxes to specify which sys[...]
-
Seite 367
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring System Access a nd Performance 11-9 v1.0, September 2009 Enable (continued) Select Logs to Send (continued) • IPS Logs . All IPS events. • SSL VPN Logs . All SSL VPN events. • IPSEC VPN Logs . All IPsec VPN events. • Content Filter Lo gs . All attempts to acce [...]
-
Seite 368
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-10 Monitoring System Access and Performanc e v1.0, September 2009 3. Click Apply to save your settings or click Clear Log Information to clear the selected logs. Configuring and Activating Up date Failure and Attack Alert s Y ou can configure the UTM to send an e-mail aler t w[...]
-
Seite 369
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-11 v1.0, September 2009 3. Enter the settings as explained in Ta b l e 1 1 - 4 . Figure 1 1-5 T able 1 1-4. Alerts Se ttings Setting Description (or Subfield an d Des c ripti on ) Enable Update Failure Alerts Select this checkbox[...]
-
Seite 370
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-12 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Apply to save your settings. Enable Malware Alerts (continued) Subject Enter the subject line for the e-ma il alert. Th e default text is “[Malware alert]”. Message Enter the content for the e-mail [...]
-
Seite 371
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-13 v1.0, September 2009 Configuring and Activating Firewall Logs Y ou can configure the logging optio ns for each network segment. For example, the UTM can log accepted packets for LAN-to-W AN tr affic, dropped packets for W AN- [...]
-
Seite 372
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-14 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Apply to save your settings. Monitoring Real-T ime T raffic, Security , and St atistics When you start up the UTM, the de fault screen that displays is the Dashboard screen, which lets you monitor the r[...]
-
Seite 373
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-15 v1.0, September 2009 Figure 1 1-7 [Dashboard, screen 1 of 3][...]
-
Seite 374
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-16 Monitoring System Access and Performanc e v1.0, September 2009 T o clear the statistics, click Clear statistics . T o set the poll interval: 1. Click the stop button. 2. From the Poll Interval pull-down menu, select a new interval (the minimum is 5 seconds, the maximum is 5[...]
-
Seite 375
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-17 v1.0, September 2009 Threat s (Count s ) This is a graphic that shows the relative number of th reats and access violations over the last week, using different colors for the various applications. Note : IMBlock stands for ins[...]
-
Seite 376
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-18 Monitoring System Access and Performanc e v1.0, September 2009 T able 1 1-7 explains the fields of the Most Recent 5 and T op 5 sections of the Dashboard screen. T able 1 1-7. Dashboard: Most Recent 5 and T op 5 Information Category Most Recent 5 Description T op 5 Descript[...]
-
Seite 377
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-19 v1.0, September 2009 T able 1 1-8 explains the fields of the Service Statistics section of the Dashboard screen. Figure 1 1-9 [Dashboard, screen 3 of 3] T able 1 1-8. Dashboard: Service St atistics Informatio n Item Descriptio[...]
-
Seite 378
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-20 Monitoring System Access and Performanc e v1.0, September 2009 V iewing St atus Screens The UTM provides real-time informa tion in a variety of status screens that are described in the following sections: • “V iewing System Status ” on this page. • “V iewing Activ[...]
-
Seite 379
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-21 v1.0, September 2009 T able 1 1-9 explains the fields of the Status and System Information sections of the System Status screen. Figure 1 1-10 [System St atus, screen 1 of 3] T able 1 1-9. System St atus: St atus and System In[...]
-
Seite 380
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-22 Monitoring System Access and Performanc e v1.0, September 2009 T able 1 1-10 on page 1 1-23 explains the UTM25 fields of the W AN1 Configuration, W AN2 Configuration, and LAN Port sections of the Syst em Status screen. On the UTM10 System S tatus screen, there is only a W A[...]
-
Seite 381
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-23 v1.0, September 2009 T able 1 1-1 1 on page 11-2 4 explains the Interface Statistics section of the System S tatus screen. T able 1 1-10. System St atus: W AN Configuration and LAN Port Information Setting Description (or Sub [...]
-
Seite 382
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-24 Monitoring System Access and Performanc e v1.0, September 2009 V iewing Active VPN Users The Active Users screen displays a list of admini strators , IPsec VPN, and SSL VPN users that are currently logged into the UTM. T o display the list of active VPN users: Select Monito[...]
-
Seite 383
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-25 v1.0, September 2009 2. Click the IPSec VPN Connection S tatus submenu tab. The IPSec VPN Conn ec tio n S tatus screen displays. The Active IPsec SAs table lists each active conn ection with the informa tion that is described [...]
-
Seite 384
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-26 Monitoring System Access and Performanc e v1.0, September 2009 2. Click the SSL VPN Connection S tatus submen u tab. The SSL VPN Connection Status screen displays. The active user ’ s user name, group, and IP ad dres s are listed in the table with a timestamp indicating t[...]
-
Seite 385
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-27 v1.0, September 2009 2. Click the St a t u s option arrow at the top right of the Port T rig gering screen.The Port T rigge ring Status screen appears in a popup window . The Port T riggering Status screen displa ys the inform[...]
-
Seite 386
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-28 Monitoring System Access and Performanc e v1.0, September 2009 2. Click the WA N St a t u s option arrow at the top right of the W AN1 ISP Settings screen (UTM25) or W AN1 ISP Settings screen (UTM10). The Connection Status screen appears in a popup windo w . Figure 1 1-18 F[...]
-
Seite 387
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-29 v1.0, September 2009 The Connection Status screen displays the information that is described in T a ble 1 1-14 . Depending on the type o f connections, any of the following buttons may be displayed on the Connection Status scr[...]
-
Seite 388
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-30 Monitoring System Access and Performanc e v1.0, September 2009 2. Click the LAN Groups submenu tab. The LAN Groups screen displays ( Figure 1 1-21 shows some examples in the Known PCs and Devices table). Figure 1 1-20 Figure 1 1-21[...]
-
Seite 389
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-31 v1.0, September 2009 The Known PCs and Devices table contains a list of all known PCs and network devices that are assigned dynamic IP addresses by the UTM, or have been discovered by other means. Collectively , these entries [...]
-
Seite 390
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-32 Monitoring System Access and Performanc e v1.0, September 2009 Querying Logs and Generating Report s The extensive logging and reportin g functions of the UTM let you perform the following tasks that help you to monitor the protection of th e network and the performance of [...]
-
Seite 391
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-33 v1.0, September 2009 • System Logs . The system event logs that you have specified on the Email and Syslog screen (see “Configuring and Activating Syst em, E-mail, and S yslog Logs” on page 11-6 ). However , by default, [...]
-
Seite 392
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-34 Monitoring System Access and Performanc e v1.0, September 2009 3. Enter the settings as explained in T able 1 1-15 . Figure 1 1-23 T able 1 1-15. Logs Query Settings Setting Description (or Subf ield and Description) Log T ype Select one of the following log typ es from the[...]
-
Seite 393
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-35 v1.0, September 2009 Log T yp e (continued) • Service Logs . All events that are related to th e status of scanning and filtering services that are part of the Applicat ion Security main navigation menu. These events include[...]
-
Seite 394
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-36 Monitoring System Access and Performanc e v1.0, September 2009 Search Criteria (continued) Client IP T he client IP address that is queried. This field is avail able for the follo wing logs : T raffic, S pam, M alware, C ontent f ilters, Port Scan, IPS, Inst ant Messaging/P[...]
-
Seite 395
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-37 v1.0, September 2009 4. Click one of the fo llowi ng action buttons: • Search . Query the log according to the search crite ria that you specifie d and view the log through the W eb Mana gem ent Interface, that is, on screen[...]
-
Seite 396
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-38 Monitoring System Access and Performanc e v1.0, September 2009 Example: Using Logs to Identify Infected Clie nt s Y ou can use the UTM logs to he lp identify potentially infected c lients on the network. For example, clients that are genera ting abnormally high volumes of H[...]
-
Seite 397
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-39 v1.0, September 2009 Scheduling and Generat ing Report s The UTM lets you sched ule and generate three types of reports: • Email Reports . For each protocol (SMTP , POP3, and IM AP), the report shows, the following informati[...]
-
Seite 398
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-40 Monitoring System Access and Performanc e v1.0, September 2009 – The following ap plication incident are shown p er day , both in tables and graphics: • Number of instant messaging application violations, top 10 violating instant messaging applications by count, and top[...]
-
Seite 399
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-41 v1.0, September 2009 3. Enter the settings as explained in T able 1 1-16 . 4. Click Generate . After a few minutes, the report is ad ded to the Report List, which can con tain a maximum of five saved reports. (T o dele te a a [...]
-
Seite 400
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-42 Monitoring System Access and Performanc e v1.0, September 2009 Scheduling Report s T o schedu le au tomatic genera tio n and e-mailing of re ports: 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear , with the Email and Sy[...]
-
Seite 401
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-43 v1.0, September 2009 4. Click Apply to save your settings. Using Diagnostics Utilities The UTM provides diagn ostic tools that help you an alyze traf fic conditions and the status of the network. T wo sets of tools are availab[...]
-
Seite 402
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-44 Monitoring System Access and Performanc e v1.0, September 2009 Using the Network Diagnostic T ools This section discusses the Network Diagnostics sec tion and the Perform a DNS Lookup section of the Diagno sti cs screen . Sending a Ping Packet Use the Ping utility to send a[...]
-
Seite 403
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-45 v1.0, September 2009 T racing a Route A traceroute lists all routers between the source (the UTM) an d the destination IP addre ss. T o send a traceroute: 1. Locate the Network Diagnostics s ection on the Diagnostics screen. 2[...]
-
Seite 404
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-46 Monitoring System Access and Performanc e v1.0, September 2009 Using the Realtime T r affic Diagnostics T ool This section discusses the Realtime T raffic Diag nostics section and the Perform a DNS L ookup section of the Diagnostics screen. Y ou can use the Realtime Traf fi[...]
-
Seite 405
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Monitoring Syst em Acce ss an d Per fo rma nc e 11-47 v1.0, September 2009 Gathering Import ant Log Information and Generating a Network St atistics Report When you request support, NETGEAR T echnical Support might ask you to collect the debu g logs and other information from you[...]
-
Seite 406
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 11-48 Monitoring System Access and Performanc e v1.0, September 2009 T o generate the Network Statistic Report: 1. Locate the Network S tatistics Report section on the Diagnostics screen. 2. Click Generate Network S tatistics . The network statistics report is sent as an e-mail t[...]
-
Seite 407
12-1 v1.0, September 2009 Chapter 12 T roubleshooting and Using Online Support This chapter provides troubleshooting tips and information for the UTM. After each problem description, instructions are prov ided to help you diagnose and solve the problem. For the common problems listed, go to the section indicated. •I s t h e U T M o n ? Go to “B[...]
-
Seite 408
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-2 Troubleshooting and Using Online Support v1.0, September 2009 Basic Functioning After you turn on power to the UTM, the following sequen ce of events should occur: 1. When power is first applied, ve rify that the PWR LED is on. 2. After approximately two minutes, verify that[...]
-
Seite 409
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Troubleshooting and Using Online Supp ort 12-3 v1.0, September 2009 LAN or W AN Port LEDs Not On If either the LAN LEDs or W AN LEDs do not light when the Ethern et connectio n is made, ch eck the following: • Make sure that the Ethernet cable conne ctions ar e secure at the UT[...]
-
Seite 410
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-4 Troubleshooting and Using Online Support v1.0, September 2009 • If your UTM’ s IP address has been changed and you do not know the current IP address, clear the UTM’ s configuration to factory defa ults. This sets the UTM’ s IP address to 192.168.1.1 . This procedure[...]
-
Seite 411
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Troubleshooting and Using Online Supp ort 12-5 v1.0, September 2009 • If the computer is configured correctly , but still not working, ensure that the UTM is connected and turned on. Connect to the W e b Management Interface and check the UTM’ s settings. If you cannot connec[...]
-
Seite 412
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-6 Troubleshooting and Using Online Support v1.0, September 2009 If your UTM is still unable to ob tain an IP addr ess from the ISP , the problem might be one of the following: • Y our ISP might require a l ogin program. Ask your ISP whether they require PPP over Ethe rnet (P[...]
-
Seite 413
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Troubleshooting and Using Online Supp ort 12-7 v1.0, September 2009 T e sting the LAN Path to Y our UTM Y ou can ping the UTM from your PC to verify that the LAN path to the UTM is set up correctly . T o ping the UTM from a PC running W indows 95 or later: 1. From the W indows to[...]
-
Seite 414
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-8 Troubleshooting and Using Online Support v1.0, September 2009 If the path is functioning correctly , replies as in the previous section are di splayed. If you do not receive replies: • Check that your PC has the IP address of yo ur UTM listed as the default gateway . If th[...]
-
Seite 415
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Troubleshooting and Using Online Supp ort 12-9 v1.0, September 2009 b. Click the default button. The UTM reboots. During the re boot process, the Backup & Restore Settings screen remains visible. The reboot process is complete after seve ral minutes when the T est LED on the [...]
-
Seite 416
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-10 Troubleshooting and Using Online Support v1.0, September 2009 • T ime is off by one hour . Cause: The UTM does no t automatically sense Daylight Sav i ng s T ime. Check the T ime Zone menu, and select or des elect the check box marked “Adju st for Daylight Savings T ime[...]
-
Seite 417
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Troubleshooting and Using Online Supp ort 12-11 v1.0, September 2009 If NETGEAR T echnical Support cannot access the UTM remotely , they might ask you to save a log file to your computer and then e-mail it to NETGEAR for analysis (see “Gathe ring Important Log Information” on[...]
-
Seite 418
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al 12-12 Troubleshooting and Using Online Support v1.0, September 2009 3. Click Submit . Accessing the Knowledge Base and Document ation T o access NETGEAR’ s Knowledge Bas e for the UTM, select Support > Knowledge Base from the menu. T o access NETGEAR’ s documentation libra[...]
-
Seite 419
Default Settings and Technical Specifications A-1 v1.0, September 2009 Appendix A Default Settings and T echnical S pecifications Y ou can use the reset button located on the rear pane l to reset all settings to their factory defaults. This is called a hard reset (for more information, see “Reverting to Factory Default Settings” on page 10-18 )[...]
-
Seite 420
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al A-2 Default Settings and Technical Specifications v1.0, September 2009 Ta b l e A - 2 shows the physical and techni cal specifications for the UTM. (continued) DHCP server Enabled DHCP starting IP address 192.168.1.2 DHCP starting IP address 192.168.1.100 Management T ime zone GM[...]
-
Seite 421
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Default Settings and Technical Specifications A-3 v1.0, September 2009 Ta b l e A - 3 shows the IPsec VPN specifications for the UTM. Environmental S pecifications Operati n g te mp eratures C 0 º to 45º F 32º to 1 13º S torage temperatures C -20º to 70º F -4º to 158º Ope[...]
-
Seite 422
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al A-4 Default Settings and Technical Specifications v1.0, September 2009 Ta b l e A - 4 shows the SSL VPN specifications for the UTM. IPsec authentication types Local User database, RADIUS P AP , RADIUS CHAP IPsec certificates supported CA digital certificate, Self digital certific[...]
-
Seite 423
Network Planning for Dual WAN Port s (UTM25 Only) B-1 v1.0, September 2009 Appendix B Network Planning for Dual W AN Port s (UTM25 Only) This appendix describes the factor s to consider when planning a network using a firewall such as the UTM25 that has dual W AN ports. This appendix does not apply to the UTM10. This appendix contains the following[...]
-
Seite 424
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-2 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 • Protocol binding – For auto-rollover mod e, protocol binding does not app ly . – For load balancing mod e, decide which protocols should b e bound to a specifi c W AN port. – Y ou can also add you[...]
-
Seite 425
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-3 v1.0, September 2009 • Y ou can choose a variety of W AN options if th e factory default settings are not suitable for your installation. These options include enab ling a W AN port to respond to a ping, and setting MTU size[...]
-
Seite 426
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-4 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 Where Do I Get The Intern et Configuration Information? There are several ways you can gather the required Internet connection information. • Y our ISPs provide all the inform ation needed to conn ect to [...]
-
Seite 427
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-5 v1.0, September 2009 • ISP DNS Server Addresses: If you were given DNS server addresses, fill in the following: Primary DNS Server IP Addres s: ______ .______._ _____ .______ Secondary DNS Server IP Address: ______ .______._[...]
-
Seite 428
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-6 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 These various types of traffic and auto-rollover or lo ad balancing all interact to make the planning process more challenging: • Inbound T raffic . Unrequested incoming traffic can be directed to a PC on[...]
-
Seite 429
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-7 v1.0, September 2009 • Dual W AN Ports in Load Balancing Mode . Load balancing for an UTM with dual W AN ports is similar to a single W AN gateway configur ation when you specify the IP address. Each IP address is either fix[...]
-
Seite 430
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-8 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 In the single W AN c ase, the W AN’ s Internet address is either fixed IP or a FQDN if the IP address is dynamic. Inbound T raffic to a Dual W AN Port System The IP address range of the UTM’ s W AN port[...]
-
Seite 431
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-9 v1.0, September 2009 V irtual Private Networks (VPNs) When implementing virtual private network (VPN) tunnels, a mechanis m must be used for determining the IP addresses of the tunnel end po ints. The addressing of the firewal[...]
-
Seite 432
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-10 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 For a single W AN gateway configuration, use a FQDN when the IP address is dynamic and either an FQDN or the IP address itself when the IP addr ess is fixed. The situation is different in dual- W AN port g[...]
-
Seite 433
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-11 v1.0, September 2009 VPN Road W arrior (Client-to-Gateway) The following situations exemplify the requirements for a remote PC client with no firewall to establish a VPN tunnel with a gate way VPN firewall such as an UTM: •[...]
-
Seite 434
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-12 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 The IP addresses of the W AN ports can be either fixed or dynamic, but you must always use a FQDN because the active W AN port could be either W AN1 or W AN2 (that is, the IP a ddress of the active W AN po[...]
-
Seite 435
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-13 v1.0, September 2009 VPN Road W arrior: Dual Gateway W AN Ports for Load Balancing In a dual-W AN port load balancin g gateway configuration, the remo te PC initiates the VPN tunnel with the appropriate gateway W AN port (tha[...]
-
Seite 436
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-14 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 The IP address of the gateway W AN ports can be either fixed or dynamic. If an IP address is dynamic, you must use a FQDN. If an IP address is fixed, an FQDN is optional. VPN Gateway-to-Gateway: Dual Gatew[...]
-
Seite 437
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-15 v1.0, September 2009 After a rollover of a gateway W AN port, the prev iously inactive gateway W AN port becomes the active port (port W AN_A2 in Figure B-15 ) and one of the gateways must re-establish the VPN tunnel. The pur[...]
-
Seite 438
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-16 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 VPN T elecommuter (Client-to-Gat eway Through a NA T Router) The following situations exemplify the requirements for a remote PC client connected to the Internet with a dynamic IP address through a NA T ro[...]
-
Seite 439
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Network Planning for Dual WAN Port s (UTM25 Only) B-17 v1.0, September 2009 VPN T elecommuter: Dual Gateway W AN Port s for Improved Reliability In a dual-W AN port auto-rollover ga teway configuration, the remote PC client initiat es the VPN tunnel with the ac tive gateway W AN [...]
-
Seite 440
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al B-18 Network Planning for Dual WAN Ports (UTM25 Only) v1.0, September 2009 The purpose of the FQDN is to toggle the domain name of th e gateway between the IP ad dresses of the active W AN port that is, W AN1 and W AN2) so that the remote PC client can determine the gateway IP ad[...]
-
Seite 441
System Logs and Error Messa ges C-1 v1.0, September 2009 Appendix C System Logs and Error Messages This appendix explains pro vides examples and ex planations of system l ogs and error message. When applicab le, a recomm ended action is pro vided. This appendix contains the following sections: • “System Log Messages” on page C-2 . • “Cont[...]
-
Seite 442
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-2 System Logs and Erro r Messages v1.0, September 2009 System Log Messages This section describes log messages that be long to one of the following categories: • Logs that are generated by traf fic that is meant for the UTM. • Logs that are generated by traffic that is rout[...]
-
Seite 443
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-3 v1.0, September 2009 Service Logs This section describes log messages generated duri ng firmware updates and other service-related events. NTP This section describes log messages generated by the NTP daemon during synchronization with the NTP s[...]
-
Seite 444
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-4 System Logs and Erro r Messages v1.0, September 2009 Login/Logout This section describes logs that are generated by the administrative interfaces of the device. Firewall Rest art This section describes logs that are genera ted when the firewall restarts. IPsec Rest art This s[...]
-
Seite 445
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-5 v1.0, September 2009 W AN S t atus This section describes the logs that are genera ted by the W AN component. If there are two ISP links for Internet co nnectivity , the router can be configured either in auto-rollover mode or load balancing mo[...]
-
Seite 446
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-6 System Logs and Erro r Messages v1.0, September 2009 Load-Balancing Mode When the W AN mode is config ured for load balancing, bo th the W AN ports are active simultaneously and the traffic is balanced be tween them. If one W AN link goes down, all the traffic is diverted to [...]
-
Seite 447
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-7 v1.0, September 2009 PPP Logs This section describes the W AN PP P connection logs. The PPP type can be configured through the W eb Management Interface (see “Manually Configuring the In ternet Connection” on page 3-5 ). • PPPoE Idle-T im[...]
-
Seite 448
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-8 System Logs and Erro r Messages v1.0, September 2009 • PPTP Idle-T imeout Logs • PPP Authentication Logs T able C-1 1. System Logs: W AN St atus, PPTP Idle-T imeout Message 1 Message 2 Message 3 Message 4 Message 5 Message 6 Message 7 Message 8 Message 9 Nov 29 1 1:19:02 [...]
-
Seite 449
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-9 v1.0, September 2009 T raffic Metering Logs This section describes logs that are genera te d when the traffic meter has reached a limit. Unicast Logs This section describes logs that are genera ted when the UTM processes unicast packets. ICMP R[...]
-
Seite 450
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-10 System Logs and Error Messages v1.0, September 2009 Multicast/Broadcast Logs This section describes logs that are generated when the UTM pr ocesses multicast and broadcast packets. Invalid Packet Logging This section describes logs that are genera ted when the UTM processes [...]
-
Seite 451
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-11 v1.0, September 2009 Message 2007 Oct 1 00:44:17 [UTM] [kernel] [INV ALID][BAD_CHECKSUM] DROP] SRC= 192.168.20.10 DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899 Explanation Bad checksu m. Recommended Action None Message 2007 Oct 1 00:44:17 [UTM] [...]
-
Seite 452
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-12 System Logs and Error Messages v1.0, September 2009 Content Filtering and Security Logs This section describes the log messa ges that are generated by the content filtering and security mechanisms. We b Filtering and Content Filtering Logs This section describes logs that ar[...]
-
Seite 453
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-13 v1.0, September 2009 S p am Logs This section describes logs that are generate d when the UTM filters spam e-mail messages. Message 20 09-0 8-01 00:00:01 HTT P 192.1 68.1.3 192.168.35.165 http://192.168.35.165/testcases /file s/virus/normal/%b[...]
-
Seite 454
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-14 System Logs and Error Messages v1.0, September 2009 T raffic Logs This section describes logs that are genera te d when the UTM processes W eb and e-mail traffic. V irus Logs This section describes logs that are genera ted when the UTM detects viruses. E-mail Filter Logs Thi[...]
-
Seite 455
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-15 v1.0, September 2009 IPS Logs This section describes logs that are ge nerated when traffic matches IPS rules. Port Scan Logs This section describes logs that ar e generated when ports are scanned. Inst ant Messaging/ Peer-to-Peer Logs This sec[...]
-
Seite 456
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-16 System Logs and Error Messages v1.0, September 2009 Routing Logs This section explains the logging messages for each network segment such as LAN to W AN for debugging purposes. These logs might gene rate a significant volume of messages. LAN to W AN Logs This section describ[...]
-
Seite 457
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al System Logs and Error Message s C-17 v1.0, September 2009 W AN to LAN Logs This section describes logs that are genera te d when the UTM processes W AN to LAN traffic. DMZ to LAN Logs This section describes logs that are genera te d when the UTM processes DMZ to LAN traffic. W AN[...]
-
Seite 458
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al C-18 System Logs and Error Messages v1.0, September 2009[...]
-
Seite 459
Two Factor Authen tic at ion D-1 v1.0, September 2009 Appendix D T wo Factor Authentication This appendix provides an ov erview of T wo-Fa ctor Authenticati on, and an example of how to implement the W iKID solution. This appendix contains the following sections: • “Why do I need T wo-Factor Authent ication? ” on thi s page. • “NETGEAR T [...]
-
Seite 460
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al D-2 Two Factor Authentication v1.0, September 2009 • Quick to deploy and manage . The W iKID solution integrates seamlessly with the NETGEAR SSL and VPN firewall products. • Proven r egulatory compliance . T wo-Factor Authentication has been used as a mandatory authentication[...]
-
Seite 461
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Two Factor Auth en tic at ion D-3 v1.0, September 2009 The request-response architecture is capable of self-service initialization by end-users, dramatically reducing implementa tion and maintenance costs. Here is an example of how W iKID works. 1. The user launches the W iKID to[...]
-
Seite 462
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al D-4 Two Factor Authentication v1.0, September 2009 3. The user then proceeds to the T wo-Factor Auth entication login page and enters the generated one-time passcode as the lo gin password. Note: The one-time passcode is time synchronized to the authenticatio n server so that the[...]
-
Seite 463
Related Documents E-1 v1.0, September 2009 Appendix E Related Document s This appendix provides links to reference documents yo u c an use to gain a more complete understanding of the technolog ies used in your NET GEAR product. Document Link Using Microsof t Vista and Windows XP to Manage Wireless Network Connections http://documentation.netgear .[...]
-
Seite 464
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al E-2 Related Documents v1.0, September 2009[...]
-
Seite 465
Index-1 v1.0, September 2009 Index Numerics 10BaseT , 100BaseT , and 1000BaseT 3-23 A AAA 7-39 AC input 1-12 access, remote management 10-12 action buttons (W eb Management Interface) 2-6 activating, ser vice licenses 1-8 , 2-27 Active Directory 8-6 , 9-2 , 9-5 Active LED (UTM25 only) 1-1 1 ActiveX 6-24 , 6-28 ActiveX web cache cle ane r , SSL VPN [...]
-
Seite 466
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-2 v1.0, September 2009 B backing up, configuration file 10-16 bandwidth capacity auto-rollover mode 10-1 LAN 10-1 load balancing mode 10-1 single W AN port mode 10-1 WA N 10-1 bandwidth limits, lo gging dropped packets 11 - 1 4 bandwidth profiles assigning to firewall rule [...]
-
Seite 467
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-3 v1.0, September 2009 configuration file backing up 10-16 managing 10-15 restoring 10-17 reverting to defaults 10-18 configuration menu (W eb Management Interface) 2-5 connection requirements 2-1 speed and type, W AN 3-24 console port 1-12 content filtering audio and video[...]
-
Seite 468
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-4 v1.0, September 2009 DMZ DHCP address pool 4-20 DNS servers 4-21 domain name 4-20 LDAP server 4-21 lease time 4-21 relay 4-21 server 4-20 WINS server 4-21 DNS proxy 4-22 firewall security 4-18 increasing tr affic 10-7 IP addresses 4-20 port 1-5 , 4-18 setup settings 4-20 [...]
-
Seite 469
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-5 v1.0, September 2009 F factory default settings reverting to 10-18 service license s, automatic re trieval 2-29 failover attempt s DNS lookup 3-13 pinging 3-13 failover protection.. See auto-rollover mode (UTM25). failure detection method (UTM25) 3-9 , 3-1 1 , 3-13 file e[...]
-
Seite 470
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-6 v1.0, September 2009 enabling scanning 2-17 , 6-20 proxy , for HTTPS scanning 6-34 , 6-37 proxy , security subscription update 2-25 trusted hosts 6-37 HTTPS action, infected W e b file or object 2-20 , 6-22 default port 2-17 , 6-20 enabling scanning 2-17 , 6-20 scanning p[...]
-
Seite 471
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-7 v1.0, September 2009 IP/MAC binding 5-42 IPS alerts 11 - 1 0 attacks categories 5-48 recent 5 and top 5 11 - 1 8 description 5-47 logs 11 - 9 , 11 - 3 3 , 11 - 3 5 outbreak alerts 11 - 1 0 defining 11 - 1 2 IPsec hosts, XAUTH 7-38 , 7-39 IPsec VPN W i zard client-to-gatew[...]
-
Seite 472
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-8 v1.0, September 2009 querying logs 11 - 3 2 search criteria 11 - 3 5 selecting logs 11 - 3 4 specifying logs to send via e-mail 11 - 8 syslog server 11 - 9 terms in messages C-1 login default settings A-1 policy restricting by browser 9-14 restricting by IP address 9-13 t[...]
-
Seite 473
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-9 v1.0, September 2009 Network Access Server . See NAS. Network Address T ranslation. See NA T . Network T i me Protocol. See NTP . newsgroups 6-24 NT Domain 8-6 , 9-2 , 9-5 NTP servers, settings 2- 15 , 10-25 troubleshooting 12-9 number of concurrent sessions 1-2 concurren[...]
-
Seite 474
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-10 v1.0, September 2009 manually generated (manual) 7-30 SSL VPN managing 8-31 settings 8-34 policy hierarchy 8-31 pools, ModeConfig 7-44 POP3 action, infected e-mail 2-18 anti-virus settings 6-6 default port 2-17 , 6-4 Distributed Spam Analysis 6-17 enabling scanning 2-17 [...]
-
Seite 475
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-11 v1.0, September 2009 quality of service. See QoS. question mark icon (W eb Management Interface) 2-7 R rack mounting kit 1-14 RADIUS backup server 7-41 description 9-2 NAS 7-41 primary server 7-41 RADIUS-CHAP 7-29 , 7-38 , 7-39 , 8-6 , 9-4 RADIUS-MSCHAP(v2) 8-6 , 9-4 RAD[...]
-
Seite 476
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-12 v1.0, September 2009 scanning exclusions 6-44 size exceptions 6-6 , 6-23 , 6-41 scheduling blocking traffic 5-39 reports 11 - 4 2 W eb content filtering 2-22 search criteria, logs 11 - 3 5 Secure Hash Algorithm 1. See SHA-1. Secure Sockets Layer . See SSL (VPN). security[...]
-
Seite 477
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-13 v1.0, September 2009 real-time black list (RBL ) 6-14 whitelist and blacklist 6-12 Spamcop 6-15 Spamhaus 6-15 specifications, physic al and technical A-2 speed ports 3-23 uploading and downloading 3-24 SPI 1-2 , 1-4 , 5-1 , 7-35 split tunnel 8-25 spoofing, MAC addresses [...]
-
Seite 478
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-14 v1.0, September 2009 technical specification s A-2 Te s t L E D 1-10 , 12-2 testing connectivity 2-26 HTTP scanning 2-26 time daylight savings, troubleshooting 12-10 settings 2-15 , 10-24 troubleshooting 12-9 time-out error , troubleshooting 12-4 sessions 5-24 tips, fire[...]
-
Seite 479
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-15 v1.0, September 2009 V irtual Private Network Consortium. See VPNC. virtual private network. See VPN (tunnel). virus database 10-21 logs. See malware, l ogs, protection 6-5 , 6-21 signature files 10-21 VLAN advantages 4-2 default 2-8 description 4-1 DHCP address pool 4-9[...]
-
Seite 480
ProSecure Unified Threat Manage ment UTM10 or UTM25 Reference Manu al Index-16 v1.0, September 2009 DDNS 3-19 description 3-9 settings 3-12 VPN IPsec 7-1 bandwidth capacity 10-1 classical rout i n g 3-10 connection speed and type 3-24 failure detection method (UTM25) 3-9 , 3-1 1 , 3-13 interfaces, primary and backup 3-1 1 LEDs 1-1 1 , 12-3 load bal[...]