ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Index-8
v1.0, September 2009
querying logs 11-32
search criteria 11-35
selecting logs 11-34
specifying logs to send via e-mail 11-8
syslog server 11-9
terms in messages C-1
login
default settings A-1
policy
restricting by browser 9-14
restricting by IP address 9-13
time-out
changing 9-16, 10-9
default 2-4
looking up, DNS address 11-45
M
MAC addresses
blocked, adding 5-40
configuring 3-5
format 3-24
format of 5-41
IP binding 5-42
spoofing 12-6
UTM’s 3-23
main navigation menu (Web Management Interface) 2-5
malware
alert 11-10
logs 11-8, 11-33, 11-35
outbreak alert 11-10
outbreak, defining 11-12
protection 6-5, 6-21
recent 5 and top 5 11-18
management default settings A-2
maximum transmission unit. See MTU.
MD5
IKE polices 7-28
ModeConfig 7-45
RIP-2 4-26
self certificate requests 9-23
VPN policies 7-36
Media Access Control. See MAC.
memory usage 11-21
Message-Digest algorithm 5. See MD5.
meter, WAN traffic 11-1
metric, static routes 4-24
MIAS
description 9-2
MIAS-CHAP 8-6, 9-5
MIAS-PAP 8-6, 9-5
Microsoft Internet Authentication Service. See MIAS.
mIRC 2-17, 6-21
misclassification, of URLs 6-30
ModeConfig
assigning addresses 7-42
description 7-42
examples 7-43
pools 7-44
record 7-26
settings 7-44
MSN Messenger 2-17, 6-21
MTU
configuring
3-23
default 3-23
multi-home
IP addresses 4-11
LAN IPs 4-12
N
NAS 7-41
NAT
configuring 3-10
description 1-6
features of 1-5
firewall, use with 5-1
mapping, one-to-one 3-10, 5-26
NetBIOS, VPN tunnels 7-34, 7-58
NETGEAR registration server 1-8
network
configuration requirements B-3
database 4-12, 4-13, 11-31
diagnostic tools 11-43, 11-44
planning, dual WAN ports (UTM25) B-1
protocols, supported 1-2
resources, SSL VPN 8-28
statistics report, diagnostics 11-47
traffic statistics 11-16