ページ1に含まれる内容の要旨
ProSecure Unified Threat
Management UTM10 or
UTM25 Reference Manual
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
202-10482-01
September 2009
v1.0
ページ2に含まれる内容の要旨
© 2009 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and the NETGEAR logo are registered trademarks and ProSecure and ProSafe are trademarks of NETGEAR, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
ページ3に含まれる内容の要旨
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Voluntary Control Council for Interference (VCCI) Statement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipme
ページ4に含まれる内容の要旨
Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentati
ページ5に含まれる内容の要旨
PPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived fr
ページ6に含まれる内容の要旨
vi v1.0, September 2009
ページ7に含まれる内容の要旨
Contents ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual About This Manual Conventions, Formats, and Scope .................................................................................xvii How to Print This Manual ..............................................................................................xviii Revision History .............................................................................................................xviii Chapter 1 Introduction What I
ページ8に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 2 Using the Setup Wizard to Provision the UTM in Your Network Understanding the Steps for Initial Connection ..............................................................2-1 Qualified Web Browsers ...........................................................................................2-2 Logging In to the UTM ....................................................................................................2-2 Unde
ページ9に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Configuring Dynamic DNS ............................................................................................3-19 Configuring Advanced WAN Options ............................................................................3-22 Additional WAN-Related Configuration Tasks ........................................................3-24 Chapter 4 LAN Configuration Managing Virtual LANs and DHCP Options .........................
ページ10に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Adding Customized Services .................................................................................5-30 Creating Quality of Service (QoS) Profiles .............................................................5-33 Creating Bandwidth Profiles ...................................................................................5-36 Setting a Schedule to Block or Allow Specific Traffic ........................................
ページ11に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the Connections and Viewing Status Information .............................................7-16 Testing the VPN Connection ..................................................................................7-16 NETGEAR VPN Client Status and Log Information ...............................................7-17 Viewing the UTM IPsec VPN Connection Status ...................................................7-19 Viewing the UTM
ページ12に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Manually Configuring and Editing SSL Connections ....................................................8-17 Creating the Portal Layout .....................................................................................8-18 Configuring Domains, Groups, and Users .............................................................8-22 Configuring Applications for Port Forwarding .........................................................8-
ページ13に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 11 Monitoring System Access and Performance Enabling the WAN Traffic Meter ................................................................................... 11-1 Configuring Logging, Alerts, and Event Notifications ................................................... 11-5 Configuring the E-mail Notification Server ............................................................. 11-5 Configuring and Activating System, E-ma
ページ14に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the LAN Path to Your UTM ........................................................................12-7 Testing the Path from Your PC to a Remote Device ..............................................12-7 Restoring the Default Configuration and Password ......................................................12-8 Problems with Date and Time ......................................................................................
ページ15に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual WAN Status ............................................................................................................. C-5 Traffic Metering Logs ............................................................................................... C-9 Unicast Logs ........................................................................................................... C-9 Invalid Packet Logging .....................................
ページ16に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1.0, September 2009
ページ17に含まれる内容の要旨
About This Manual ® The NETGEAR ProSecure™ Unified Threat Management UTM10 or UTM25 Reference Manual describes how to install, configure, and troubleshoot a ProSecure Unified Threat Management Appliance UTM10 or UTM25. The information in this manual is intended for readers with intermediate computer and networking skills. Conventions, Formats, and Scope The conventions, formats, and scope of this manual are described in the following paragraphs: • Typographical conventions. This manual uses
ページ18に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Danger: This is a safety warning. Failure to take heed of this notice might result in personal injury or death. • Scope. This manual is written for the UTM according to these specifications: Product Version ProSecure Unified Threat Management Appliance UTM10 or UTM25 Manual Publication Date September 2009 For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR Website in App
ページ19に含まれる内容の要旨
Chapter 1 Introduction This chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Management Appliance UTM10 or UTM25. This chapter contains the following sections: • “What Is the ProSecure Unified Threat Management Appliance UTM10 or UTM25?” on this page. • “Key Features and Capabilities” on page 1-2. • “Service Registration Card with License Keys” on page 1-8. • “Package Contents” on page 1-9. • “Hardware Features” on page 1-9. • “Choosing a Location f
ページ20に含まれる内容の要旨
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Key Features and Capabilities The UTM provides the following key features and capabilities: • For the UTM10, a single 10/100/1000 Mbps Gigabit Ethernet WAN port. For the UTM25, dual 10/100/1000 Mbps Gigabit Ethernet WAN ports for load balancing or failover protection of your Internet connection, providing increased system reliability or increased throughput. • Built-in four-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for