EasyManua.ls Logo

NETGEAR UTM5 User Manual

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
350 East Plumeria Drive
San Jose, CA 95134
USA
April 2012
202-10780-02
1.0
ProSecure Unified Threat
Management (UTM)
Appliance
Reference Manual

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM5 and is the answer not in the manual?

NETGEAR UTM5 Specifications

General IconGeneral
BrandNETGEAR
ModelUTM5
CategoryFirewall
LanguageEnglish

Summary

Chapter 1 Introduction

Key Features and Capabilities

Overview of the UTM appliance's main functionalities and technical attributes.

Hardware Features

Describes the physical components, ports, and LEDs of the UTM models.

Chapter 2 Using the Setup Wizard to Provision the UTM in Your Network

Steps for Initial Connection

Outlines the essential steps for physically connecting and preparing the UTM for initial setup.

Log In to the UTM

Details how to access the UTM's web management interface using a browser and default credentials.

Setup Wizard Step 1 of 10: LAN Settings

Guides through configuring the initial LAN settings, including IP address and DHCP server options.

Setup Wizard Step 2 of 10: WAN Settings

Explains how to configure the UTM's Internet connection settings, including ISP type and login details.

Chapter 3 Manually Configuring Internet and WAN Settings

Automatically Detecting and Connecting the Internet Connections

Describes how to automatically detect and configure WAN port connections for Internet access.

Manually Configure the Internet Connection

Provides instructions for manually configuring Internet connection parameters for DSL or Ethernet interfaces.

Configure the WAN Mode

Details how to set up WAN modes like auto-rollover or load balancing for multi-WAN systems.

Chapter 4 LAN Configuration

Manage Virtual LANs and DHCP Options

Explains how to manage virtual LANs, assign ports, and configure DHCP options for network segmentation.

Configure and Enable the DMZ Port

Guides on setting up a dedicated DMZ port for hosting servers and managing traffic securely.

Manage Routing

Covers the configuration of static routes and routing information protocol for network traffic management.

Chapter 5 Firewall Protection

Use Rules to Block or Allow Specific Kinds of Traffic

Covers creating firewall rules to control inbound and outbound traffic based on services, applications, or users.

Attack Checks, VPN Pass-through, and Multicast Pass-through

Explains how to configure attack checks, VPN pass-through, and multicast pass-through for network security.

Use the Intrusion Prevention System

Details how to configure the Intrusion Prevention System (IPS) to detect and protect against network attacks.

Chapter 6 Content Filtering and Optimizing Scans

Configure Email Protection

Guides on configuring settings to protect the network's email communication from malware and spam.

Configure Web and Services Protection

Details how to configure web protocols, applications, and objects for malware scanning and protection.

Configure HTTPS (SSL) Scanning

Explains how the UTM scans encrypted HTTPS traffic by breaking and rebuilding SSL connections.

Set Exception Rules for Web and Application Access

Covers creating exception rules for users and groups to allow or block web and application access.

Chapter 7 Virtual Private Networking Using IPSec Connections

Use the IPSec VPN Wizard for Client and Gateway Configurations

Guides users through configuring IPSec VPN tunnels for both client and gateway setups using a wizard.

Create Gateway-to-Gateway VPN Tunnels with the Wizard

Provides step-by-step instructions for setting up gateway-to-gateway VPN tunnels using the wizard.

Configure Keep-Alives and Dead Peer Detection

Explains how to configure keep-alive and Dead Peer Detection (DPD) features to maintain VPN tunnel stability.

Configure the PPTP Server

Details how to enable and configure the PPTP server for remote user access via PPTP tunnels.

Chapter 8 Virtual Private Networking Using SSL Connections

SSL VPN Portal Options

Describes the two levels of SSL VPN service for remote users: tunnel and port forwarding.

Use the SSL VPN Wizard for Client Configurations

Facilitates SSL VPN client configuration through a step-by-step wizard for remote access.

Manually Configure and Edit SSL Connections

Covers manual configuration and activation of SSL connections for remote access.

Create the Portal Layout

Describes how to create a custom portal page for remote users to access network resources.

Chapter 9 Managing Users, Authentication, and VPN Certificates

Authentication Process and Options

Explains user authentication methods, including local database, RADIUS, and Active Directory.

Configure Authentication Domains, Groups, and Users

Details the process of setting up authentication domains, groups, and user accounts for network access control.

Active Directories and LDAP Configurations

Provides an overview of how Active Directory and LDAP work for domain authentication.

Manage Digital Certificates for VPN Connections

Covers managing digital certificates for authenticating VPN gateways, clients, and secure web access.

Chapter 10 Network and System Management

Performance Management

Focuses on controlling traffic through the UTM to optimize performance and prevent bottlenecks.

System Management

Covers tasks like changing passwords, managing configuration files, and updating firmware.

Change Passwords and Administrator and Guest Settings

Explains how to modify administrator and guest account settings, including password changes and idle timeouts.

Configure Remote Management Access

Guides on enabling and configuring remote management access via an SSL VPN connection.

Update the Firmware

Describes the process of updating the UTM's firmware from an update server or a downloaded file.

Chapter 11 Monitoring System Access and Performance

Enable the WAN Traffic Meter

Details how to activate traffic metering for WAN ports to monitor or limit data traffic volume.

Configure Logging, Alerts, and Event Notifications

Details how to configure logging options, set up alerts, and manage event notifications for system events.

Monitor Real-Time Traffic, Security, and Statistics

Explains how to use the Dashboard to monitor real-time traffic, security status, and system statistics.

View Status Screens

Provides information on viewing various status screens like System, Network, and VPN connection status.

Query the Logs

Provides instructions on how to query and download system logs for troubleshooting and analysis.

Chapter 12 Troubleshooting and Using Online Support

Basic Functioning

Covers initial checks for power, LEDs, and basic connectivity issues after powering on the UTM.

Troubleshoot the Web Management Interface

Offers solutions for common issues encountered when accessing the UTM's web management interface.

Troubleshoot the ISP Connection

Provides steps to diagnose and resolve problems related to the UTM's Internet connection and ISP communication.

Restore the Default Configuration and Password

Explains how to reset the UTM to its original factory default settings and restore default credentials.

Appendix A xDSL Module for the UTM9S

Configure the xDSL Settings

Details how to configure ADSL or VDSL settings for DSL Internet connection to the ISP.

Automatically Detecting and Connecting the Internet Connection

Describes how to automatically detect and configure WAN port connections for Internet access.

Manually Configure the Internet Connection

Guides on manually setting up Internet connection parameters for DSL interfaces when DHCP auto-configuration fails.

Configure the WAN Mode

Details how to set up WAN modes like auto-rollover or load balancing for multi-WAN systems.

Appendix B Wireless Module for the UTM9S

Overview of the Wireless Module

Provides a general overview of the wireless module's capabilities and features.

Configure the Basic Radio Settings

Guides on configuring basic radio settings such as mode, country, and channel for the wireless module.

Wireless Data Security Options

Covers methods to enhance wireless network security, including MAC address filtering and SSID broadcast control.

Configure the Access Point

Explains how to configure the wireless access point settings, including SSID, security, and timers.

Appendix C Network Planning for Dual WAN Ports (Multiple WAN Port Models Only)

What to Consider Before You Begin

Provides factors to consider when planning a network with dual WAN ports for optimal configuration.

Overview of the Planning Process

Details the steps involved in planning a network using a firewall with dual WAN ports.

Virtual Private Networks

Discusses IP addressing requirements for VPN tunnels in dual WAN configurations, including FQDN usage.

Appendix D ReadyNAS Integration

Supported ReadyNAS Models

Lists the ReadyNAS models that are supported for integration with the UTM.

Install the UTM Add-On on the ReadyNAS

Provides instructions for installing the UTM add-on software onto a NETGEAR ReadyNAS device.

Connect to the ReadyNAS on the UTM

Details the steps to establish a connection between the UTM and the ReadyNAS for quarantine settings.

Appendix E Two-Factor Authentication

Why Do I Need Two-Factor Authentication?

Explains the importance of two-factor authentication for enhancing security against cyber threats.

What Are the Benefits of Two-Factor Authentication?

Outlines the advantages of two-factor authentication, such as enhanced security and regulatory compliance.

NETGEAR Two-Factor Authentication Solutions

Describes NETGEAR's implementation of two-factor authentication using WiKID software.

Appendix F System Logs and Error Messages

System Log Messages

Explains different categories of system log messages, including startup, reboot, and service events.

Content-Filtering and Security Logs

Details log messages generated by the content-filtering and security mechanisms.

Routing Logs

Details log messages generated for LAN-to-WAN, LAN-to-DMZ, and DMZ-to-WAN traffic.

Appendix G Default Settings and Technical Specifications

Default Settings

Lists the UTM's default configuration settings for router login, network, management, and firewall.

Physical and Technical Specifications

Provides detailed physical and technical specifications for the UTM models, including protocols, power, dimensions, and environmental requirements.

Appendix H Notification of Compliance (Wired)

FCC Requirements for Operation in the United States

Outlines the FCC regulations and information for operating the device in the United States.

Canadian Department of Communications Radio Interference Regulations

Details radio interference regulations from the Canadian Department of Communications for digital apparatus.

Related product manuals