ملخص المحتوى في الصفحة رقم 1
ProSecure Unified Threat
Management UTM10 or
UTM25 Reference Manual
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
202-10482-01
September 2009
v1.0
ملخص المحتوى في الصفحة رقم 2
© 2009 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and the NETGEAR logo are registered trademarks and ProSecure and ProSafe are trademarks of NETGEAR, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
ملخص المحتوى في الصفحة رقم 3
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Voluntary Control Council for Interference (VCCI) Statement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipme
ملخص المحتوى في الصفحة رقم 4
Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentati
ملخص المحتوى في الصفحة رقم 5
PPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived fr
ملخص المحتوى في الصفحة رقم 6
vi v1.0, September 2009
ملخص المحتوى في الصفحة رقم 7
Contents ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual About This Manual Conventions, Formats, and Scope .................................................................................xvii How to Print This Manual ..............................................................................................xviii Revision History .............................................................................................................xviii Chapter 1 Introduction What I
ملخص المحتوى في الصفحة رقم 8
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 2 Using the Setup Wizard to Provision the UTM in Your Network Understanding the Steps for Initial Connection ..............................................................2-1 Qualified Web Browsers ...........................................................................................2-2 Logging In to the UTM ....................................................................................................2-2 Unde
ملخص المحتوى في الصفحة رقم 9
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Configuring Dynamic DNS ............................................................................................3-19 Configuring Advanced WAN Options ............................................................................3-22 Additional WAN-Related Configuration Tasks ........................................................3-24 Chapter 4 LAN Configuration Managing Virtual LANs and DHCP Options .........................
ملخص المحتوى في الصفحة رقم 10
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Adding Customized Services .................................................................................5-30 Creating Quality of Service (QoS) Profiles .............................................................5-33 Creating Bandwidth Profiles ...................................................................................5-36 Setting a Schedule to Block or Allow Specific Traffic ........................................
ملخص المحتوى في الصفحة رقم 11
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the Connections and Viewing Status Information .............................................7-16 Testing the VPN Connection ..................................................................................7-16 NETGEAR VPN Client Status and Log Information ...............................................7-17 Viewing the UTM IPsec VPN Connection Status ...................................................7-19 Viewing the UTM
ملخص المحتوى في الصفحة رقم 12
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Manually Configuring and Editing SSL Connections ....................................................8-17 Creating the Portal Layout .....................................................................................8-18 Configuring Domains, Groups, and Users .............................................................8-22 Configuring Applications for Port Forwarding .........................................................8-
ملخص المحتوى في الصفحة رقم 13
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 11 Monitoring System Access and Performance Enabling the WAN Traffic Meter ................................................................................... 11-1 Configuring Logging, Alerts, and Event Notifications ................................................... 11-5 Configuring the E-mail Notification Server ............................................................. 11-5 Configuring and Activating System, E-ma
ملخص المحتوى في الصفحة رقم 14
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the LAN Path to Your UTM ........................................................................12-7 Testing the Path from Your PC to a Remote Device ..............................................12-7 Restoring the Default Configuration and Password ......................................................12-8 Problems with Date and Time ......................................................................................
ملخص المحتوى في الصفحة رقم 15
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual WAN Status ............................................................................................................. C-5 Traffic Metering Logs ............................................................................................... C-9 Unicast Logs ........................................................................................................... C-9 Invalid Packet Logging .....................................
ملخص المحتوى في الصفحة رقم 16
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1.0, September 2009
ملخص المحتوى في الصفحة رقم 17
About This Manual ® The NETGEAR ProSecure™ Unified Threat Management UTM10 or UTM25 Reference Manual describes how to install, configure, and troubleshoot a ProSecure Unified Threat Management Appliance UTM10 or UTM25. The information in this manual is intended for readers with intermediate computer and networking skills. Conventions, Formats, and Scope The conventions, formats, and scope of this manual are described in the following paragraphs: • Typographical conventions. This manual uses
ملخص المحتوى في الصفحة رقم 18
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Danger: This is a safety warning. Failure to take heed of this notice might result in personal injury or death. • Scope. This manual is written for the UTM according to these specifications: Product Version ProSecure Unified Threat Management Appliance UTM10 or UTM25 Manual Publication Date September 2009 For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR Website in App
ملخص المحتوى في الصفحة رقم 19
Chapter 1 Introduction This chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Management Appliance UTM10 or UTM25. This chapter contains the following sections: • “What Is the ProSecure Unified Threat Management Appliance UTM10 or UTM25?” on this page. • “Key Features and Capabilities” on page 1-2. • “Service Registration Card with License Keys” on page 1-8. • “Package Contents” on page 1-9. • “Hardware Features” on page 1-9. • “Choosing a Location f
ملخص المحتوى في الصفحة رقم 20
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Key Features and Capabilities The UTM provides the following key features and capabilities: • For the UTM10, a single 10/100/1000 Mbps Gigabit Ethernet WAN port. For the UTM25, dual 10/100/1000 Mbps Gigabit Ethernet WAN ports for load balancing or failover protection of your Internet connection, providing increased system reliability or increased throughput. • Built-in four-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for