Summary of the content on the page No. 1
ProSecure Unified Threat
Management UTM10 or
UTM25 Reference Manual
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
202-10482-01
September 2009
v1.0
Summary of the content on the page No. 2
© 2009 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR and the NETGEAR logo are registered trademarks and ProSecure and ProSafe are trademarks of NETGEAR, Inc. Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. Other brand and product names are registered trademarks or trademarks of their respective holders. Statement of Conditions In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
Summary of the content on the page No. 3
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for compliance with the regulations. Voluntary Control Council for Interference (VCCI) Statement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipme
Summary of the content on the page No. 4
Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions, and the following disclaimer in the documentati
Summary of the content on the page No. 5
PPP Copyright (c) 1989 Carnegie Mellon University. All rights reserved. Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived fr
Summary of the content on the page No. 6
vi v1.0, September 2009
Summary of the content on the page No. 7
Contents ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual About This Manual Conventions, Formats, and Scope .................................................................................xvii How to Print This Manual ..............................................................................................xviii Revision History .............................................................................................................xviii Chapter 1 Introduction What I
Summary of the content on the page No. 8
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 2 Using the Setup Wizard to Provision the UTM in Your Network Understanding the Steps for Initial Connection ..............................................................2-1 Qualified Web Browsers ...........................................................................................2-2 Logging In to the UTM ....................................................................................................2-2 Unde
Summary of the content on the page No. 9
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Configuring Dynamic DNS ............................................................................................3-19 Configuring Advanced WAN Options ............................................................................3-22 Additional WAN-Related Configuration Tasks ........................................................3-24 Chapter 4 LAN Configuration Managing Virtual LANs and DHCP Options .........................
Summary of the content on the page No. 10
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Adding Customized Services .................................................................................5-30 Creating Quality of Service (QoS) Profiles .............................................................5-33 Creating Bandwidth Profiles ...................................................................................5-36 Setting a Schedule to Block or Allow Specific Traffic ........................................
Summary of the content on the page No. 11
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the Connections and Viewing Status Information .............................................7-16 Testing the VPN Connection ..................................................................................7-16 NETGEAR VPN Client Status and Log Information ...............................................7-17 Viewing the UTM IPsec VPN Connection Status ...................................................7-19 Viewing the UTM
Summary of the content on the page No. 12
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Manually Configuring and Editing SSL Connections ....................................................8-17 Creating the Portal Layout .....................................................................................8-18 Configuring Domains, Groups, and Users .............................................................8-22 Configuring Applications for Port Forwarding .........................................................8-
Summary of the content on the page No. 13
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Chapter 11 Monitoring System Access and Performance Enabling the WAN Traffic Meter ................................................................................... 11-1 Configuring Logging, Alerts, and Event Notifications ................................................... 11-5 Configuring the E-mail Notification Server ............................................................. 11-5 Configuring and Activating System, E-ma
Summary of the content on the page No. 14
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Testing the LAN Path to Your UTM ........................................................................12-7 Testing the Path from Your PC to a Remote Device ..............................................12-7 Restoring the Default Configuration and Password ......................................................12-8 Problems with Date and Time ......................................................................................
Summary of the content on the page No. 15
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual WAN Status ............................................................................................................. C-5 Traffic Metering Logs ............................................................................................... C-9 Unicast Logs ........................................................................................................... C-9 Invalid Packet Logging .....................................
Summary of the content on the page No. 16
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1.0, September 2009
Summary of the content on the page No. 17
About This Manual ® The NETGEAR ProSecure™ Unified Threat Management UTM10 or UTM25 Reference Manual describes how to install, configure, and troubleshoot a ProSecure Unified Threat Management Appliance UTM10 or UTM25. The information in this manual is intended for readers with intermediate computer and networking skills. Conventions, Formats, and Scope The conventions, formats, and scope of this manual are described in the following paragraphs: • Typographical conventions. This manual uses
Summary of the content on the page No. 18
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Danger: This is a safety warning. Failure to take heed of this notice might result in personal injury or death. • Scope. This manual is written for the UTM according to these specifications: Product Version ProSecure Unified Threat Management Appliance UTM10 or UTM25 Manual Publication Date September 2009 For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR Website in App
Summary of the content on the page No. 19
Chapter 1 Introduction This chapter provides an overview of the features and capabilities of the ProSecure Unified Threat Management Appliance UTM10 or UTM25. This chapter contains the following sections: • “What Is the ProSecure Unified Threat Management Appliance UTM10 or UTM25?” on this page. • “Key Features and Capabilities” on page 1-2. • “Service Registration Card with License Keys” on page 1-8. • “Package Contents” on page 1-9. • “Hardware Features” on page 1-9. • “Choosing a Location f
Summary of the content on the page No. 20
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual Key Features and Capabilities The UTM provides the following key features and capabilities: • For the UTM10, a single 10/100/1000 Mbps Gigabit Ethernet WAN port. For the UTM25, dual 10/100/1000 Mbps Gigabit Ethernet WAN ports for load balancing or failover protection of your Internet connection, providing increased system reliability or increased throughput. • Built-in four-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for