NETGEAR UTM25EW-100NAS Router User Manual


 
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
x
v1.0, September 2009
Adding Customized Services .................................................................................5-30
Creating Quality of Service (QoS) Profiles .............................................................5-33
Creating Bandwidth Profiles ...................................................................................5-36
Setting a Schedule to Block or Allow Specific Traffic ....................................................5-39
Enabling Source MAC Filtering ....................................................................................5-40
Setting up IP/MAC Bindings .........................................................................................5-42
Configuring Port Triggering ...........................................................................................5-44
Using the Intrusion Prevention System ........................................................................5-47
Chapter 6
Content Filtering and Optimizing Scans
About Content Filtering and Scans .................................................................................6-1
Default E-mail and Web Scan Settings ....................................................................6-2
Configuring E-mail Protection .........................................................................................6-3
Customizing E-mail Protocol Scan Settings .............................................................6-4
Customizing E-mail Anti-Virus and Notification Settings ..........................................6-5
E-mail Content Filtering ............................................................................................6-8
Protecting Against E-mail Spam .............................................................................6-11
Configuring Web and Services Protection ....................................................................6-19
Customizing Web Protocol Scan Settings and Services ........................................6-19
Configuring Web Malware Scans ...........................................................................6-21
Configuring Web Content Filtering .........................................................................6-23
Configuring Web URL Filtering ..............................................................................6-30
HTTPS Scan Settings ............................................................................................6-34
Specifying Trusted Hosts .......................................................................................6-37
Configuring FTP Scans ..........................................................................................6-39
Setting Web Access Exceptions and Scanning Exclusions ..........................................6-41
Setting Web Access Exception Rules ....................................................................6-41
Setting Scanning Exclusions ..................................................................................6-44
Chapter 7
Virtual Private Networking
Using IPsec Connections
Considerations for Dual WAN Port Systems (UTM25 Only) ...........................................7-1
Using the IPsec VPN Wizard for Client and Gateway Configurations ............................7-3
Creating Gateway-to-Gateway VPN Tunnels with the Wizard .................................7-3
Creating a Client to Gateway VPN Tunnel ...............................................................7-8