ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
xiv
v1.0, September 2009
Testing the LAN Path to Your UTM ........................................................................12-7
Testing the Path from Your PC to a Remote Device ..............................................12-7
Restoring the Default Configuration and Password ......................................................12-8
Problems with Date and Time .......................................................................................12-9
Using Online Support .................................................................................................12-10
Enabling Remote Troubleshooting ....................................................................... 12-10
Sending Suspicious Files to NETGEAR for Analysis .......................................... .12-11
Accessing the Knowledge Base and Documentation ...........................................12-12
Appendix A
Default Settings and Technical Specifications
Appendix B
Network Planning for Dual WAN Ports
(UTM25 Only)
What to Consider Before You Begin .............................................................................. B-1
Cabling and Computer Hardware Requirements ................................... ................. B-3
Computer Network Configuration Requirements ......... ... .... ... ... ... .... ... ... ... ....... ... ... . B-3
Internet Configuration Requirements ...................................................................... B-3
Overview of the Planning Process ................................................................................. B-5
Inbound Traffic ............................................................................................................... B-7
Inbound Traffic to a Single WAN Port System .......................... .............................. B-7
Inbound Traffic to a Dual WAN Port System ........................................................... B-8
Virtual Private Networks (VPNs) .................................................................................... B-9
VPN Road Warrior (Client-to-Gateway) ....................... ..........................................B-11
VPN Gateway-to-Gateway .................................................................................... B-13
VPN Telecommuter (Client-to-Gateway Through a NAT Router) ..........................B-16
Appendix C
System Logs and Error Messages
System Log Messages ................ .................................................................................. C-2
System Startup ........................................................................................................ C-2
Reboot ..................................................................................................................... C-2
Service Logs ......... ... .... ........................................................................................... C-3
NTP ......................................................................................................................... C-3
Login/Logout ........................................................................................................... C-4
Firewall Restart ...................................... ................................................................. C-4
IPsec Restart ........................................................................................................... C-4