ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
ix
v1.0, September 2009
Configuring Dynamic DNS ............................................................................................ 3-19
Configuring Advanced WAN Options ............................................................................3-22
Additional WAN-Related Configuration Tasks ........................................................3-24
Chapter 4
LAN Configuration
Managing Virtual LANs and DHCP Options ................................. ... ... .... ... ... ... ... .... ... ... .. 4-1
Managing the UTM’s Port-Based VLANs ................................................................. 4-2
VLAN DHCP Options ............................. ..................................................................4-4
Configuring a VLAN Profile ............................. .........................................................4-6
Configuring Multi-Home LAN IPs on the Default VLAN ................................................ 4-11
Managing Groups and Hosts (LAN Groups) .................................................................4-12
Managing the Network Database ........................................................................... 4-13
Changing Group Names in the Network Database ................................................4-16
Setting Up Address Reservation ............................................................................4-17
Configuring and Enabling the DMZ Port ....................................................................... 4-18
Managing Routing .... ... ... .... ... ... ....................................................................................4-22
Configuring Static Routes .......................................................................................4-23
Configuring Routing Information Protocol (RIP) .....................................................4-24
Static Route Example ............................................................................................. 4-27
Chapter 5
Firewall Protection
About Firewall Protection ................................................................................................ 5-1
Administrator Tips ..................................... ...............................................................5-2
Using Rules to Block or Allow Specific Kinds of Traffic ............................................. .....5-3
Services-Based Rules .............................................................................................. 5-3
Order of Precedence for Rules ..............................................................................5-10
Setting LAN WAN Rules ....... .... ... ... ... .... ... ... ..........................................................5-11
Setting DMZ WAN Rules ........................................................................................5-14
Setting LAN DMZ Rules ................................................................... ......................5-18
Attack Checks .................................... .... ... ... ... ... ....................................................5-20
Setting Session Limits ............................................................................................ 5-23
Managing the Application Level Gateway for SIP Sessions ..................................5-24
Inbound Rules Examples ....................................... ................................................5-25
Outbound Rules Example ............................................ ... .... ... ... ... ..........................5-29
Creating Services, QoS Profiles, and Bandwidth Profiles .................. ..........................5-30