ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
x
v1.0, September 2009
Adding Customized Services .............................................. ...................................5-30
Creating Quality of Service (QoS) Profiles .............................................................5-33
Creating Bandwidth Profiles ................................................................................... 5-36
Setting a Schedule to Block or Allow Specific Traffic ....................................................5-39
Enabling Source MAC Filtering ....................................................................................5-40
Setting up IP/MAC Bindings ..................... ....................................................................5-42
Configuring Port Triggering ...........................................................................................5-44
Using the Intrusion Prevention System ........................................................................5-47
Chapter 6
Content Filtering and Optimizing Scans
About Content Filtering and Scans ................................................................................. 6-1
Default E-mail and Web Scan Settings .................................................................... 6-2
Configuring E-mail Protection ............................................................................. ............6-3
Customizing E-mail Protocol Scan Settings .............................................................6-4
Customizing E-mail Anti-Virus and Notification Settings .......................................... 6-5
E-mail Content Filtering ............................................................................................ 6-8
Protecting Against E-mail Spam ............................................................................. 6-11
Configuring Web and Services Protection .................................................................... 6-19
Customizing Web Protocol Scan Settings and Services ........................................6-19
Configuring Web Malware Scans ........................................................................... 6-21
Configuring Web Content Filtering ......................................................................... 6-23
Configuring Web URL Filtering ..............................................................................6-30
HTTPS Scan Settings ..................................... .......................................................6-34
Specifying Trusted Hosts ............................. ..........................................................6-37
Configuring FTP Scans ............................................................. .............................6-39
Setting Web Access Exceptions and Scanning Exclusions ..........................................6-41
Setting Web Access Exception Rules .................................................................... 6-41
Setting Scanning Exclusions .................................................................................. 6-44
Chapter 7
Virtual Private Networking
Using IPsec Connections
Considerations for Dual WAN Port Systems (UTM25 Only) ...........................................7-1
Using the IPsec VPN Wizard for Client and Gateway Configurations ............................ 7-3
Creating Gateway-to-Gateway VPN Tunnels with the Wizard ................................. 7-3
Creating a Client to Gateway VPN Tunnel ............................................................... 7-8