ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Index-6
v1.0, September 2009
enabling scanning 2-17, 6-20
proxy, for HTTPS scanning 6-34, 6-37
proxy, security subscription update 2-25
trusted hosts 6-37
HTTPS
action, infected Web file or object 2-20, 6-22
default port 2-17, 6-20
enabling scanning 2-17, 6-20
scanning process 6-34
trusted hosts 6-37
HyperText Markup Language. See HTML.
I
ICMP
time-out 5-24
type 5-32
IGP 4-24
IKE policies
exchange mode 7-23, 7-26
ISAKMP identifier 7-23, 7-27
managing 7-22
ModeConfig 7-26, 7-46
XAUTH 7-29
IMAP
action, infected e-mail 2-19
anti-virus settings 6-6
default port 2-17, 6-4
enabling scanning 2-17
file extension blocking 6-11
file name blocking 6-11
password-protected attachment blocking 6-10
inbound rules
default 5-3
DMZ to WAN 5-17
examples 5-25
increasing traffic 10-5
LAN to DMZ 5-20
LAN to WAN 5-13
order of precedence 5-10
overview 5-6
settings 5-8
increasing traffic
DMZ port 10-7
exposed hosts 10-8
overview 10-5
port forwarding 5-7, 10-5
port triggering 10-7
VPN tunnels 10-8
initial configuration, Setup Wizard 2-7
initial connection 2-1
Installation Guide 2-1
installation, verifying 2-26
Instant Messaging
blocked applications, recent 5 and top 5 11-18
blocking applications 5-29, 6-21
logs 11-8, 11-33, 11-35
traffic statistics 11-16
interface specifications A-3
Interior Gateway Protoco
l
. See IGP.
Internet
configuration requirements B-3
connecting to 3-1
connection, default settings A-1
form, connection information B-4
Internet Key Exchange. See IKE (policies).
Internet Message Access Protocol. See IMAP.
Internet Service Provider. See ISP.
Intrusion Prevention System. See IPS.
IP addresses
auto-generated 12-3
default 2-9, 4-8
DHCP, address pool 2-9, 4-9, 4-20
DMZ port 4-20
DNS servers 3-9, 4-9, 4-21
gateway, ISP 2-13, 3-8
LAN, multi-home 4-11, 4-12
MAC binding 5-42
port forwarding, SSL VPN 8-23
reserved 4-17
secondary LAN 4-11
secondary WAN 3-17
static or permanent 2-13, 3-4, 3-8
subnet mask, default 2-9, 4-8
subnet mask, DMZ port 4-20
WAN aliases 3-17
IP header 5-35
IP precedence 5-35
IP security. See IPsec.