ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

Administrator Tips

Consider the following operational items:

1.As an option, you can enable remote management if you have to manage distant sites from a central location (see “Configuring VPN Authentication Domains, Groups, and Users” on page 9-1and “Configuring Remote Management Access” on page 10-12).

2.Although rules (see “Using Rules to Block or Allow Specific Kinds of Traffic” on page 5-3) is the basic way of managing the traffic through your system, you can further refine your control using the following features and capabilities of the UTM:

Groups and hosts (see “Managing Groups and Hosts (LAN Groups)” on page 4-12)

Services (see “Services-Based Rules” on page 5-3)

Schedules (see “Setting a Schedule to Block or Allow Specific Traffic” on page 5-39)

Allow or block sites and applications (see “Setting Web Access Exception Rules” on page 6-41)

Source MAC filtering (see “Enabling Source MAC Filtering” on page 5-40)

Port triggering (see “Configuring Port Triggering” on page 5-44)

3.Content filtering is a firewall component. The UTM provides such extensive content filtering options that an entire chapter is dedicated to this subject; see Chapter 6, “Content Filtering and Optimizing Scans.”

4.Some firewall settings might affect the performance of the UTM. For more information, see “Performance Management” on page 10-1.

5.You can monitor blocked content and malware threats in real-time. For more information, see “Monitoring Real-Time Traffic, Security, and Statistics” on page 11-14.

6.The firewall logs can be configured to log and then e-mail denial of access, general attack information, and other information to a specified e-mail address. For information about how to configure logging and notifications, see “Configuring Logging, Alerts, and Event Notifications” on page 11-5.

5-2

Firewall Protection

v1.0, September 2009

Page 116
Image 116
NETGEAR UTM25EW-100NAS, UTM25-100NAS, UTM10EW-100NAS manual Administrator Tips