ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

Index-8

v1.0, September 2009
querying logs 11 -32
search criteria 11 -35
selecting logs 11 -34
specifying logs to send via e-mail 11 -8
syslog server 11 -9
terms in messages C-1
login
default settings A-1
policy
restricting by browser 9-14
restricting by IP address 9-13
time-out
changing 9-16, 10-9
default 2-4
looking up, DNS address 11 -45
M
MAC addresses
blocked, adding 5-40
configuring 3-5
format 3-24
format of 5-41
IP binding 5-42
spoofing 12-6
UTM’s 3-23
main navigation menu (Web Management Interface) 2-5
malware
alert 11 -10
logs 11 -8, 11- 33, 11- 35
outbreak alert 11 -10
outbreak, defining 11 -12
protection 6-5, 6-21
recent 5 and top 5 11 -18
management default settings A-2
maximum transmission unit. See MTU.
MD5
IKE polices 7-28
ModeConfig 7-45
RIP-2 4-26
self certificate requests 9-23
VPN policies 7-36
Media Access Control. See MAC.
memory usage 11 -21
Message-Digest algorithm 5. See MD5.
meter, WAN traffic 11-1
metric, static routes 4-24
MIAS
description 9-2
MIAS-CHAP 8-6, 9-5
MIAS-PAP 8-6, 9-5
Microsoft Internet Authentication Service. See MIAS.
mIRC 2-17, 6-21
misclassification, of URLs 6-30
ModeConfig
assigning addresses 7-42
description 7-42
examples 7-43
pools 7-44
record 7-26
settings 7-44
MSN Messenger 2-17, 6-21
MTU
configuring 3-23
default 3-23
multi-home
IP addresses 4-11
LAN IPs 4-1 2
N
NAS 7-41
NAT
configuring 3-10
description 1-6
features of 1-5
firewall, use with 5-1
mapping, one-to-one 3-10, 5-26
NetBIOS, VPN tunnels 7-34, 7-58
NETGEAR registration server 1-8
network
configuration requirements B-3
database 4-12, 4-13, 11 -31
diagnostic tools 11 -43, 11 -44
planning, dual WAN ports (UTM25) B-1
protocols, supported 1-2
resources, SSL VPN 8-28
statistics report, diagnostics 11 -47
traffic statistics 11 -16