12
ProSecure Unified Threat Management (UTM) Appliance
Operating Frequency (Channel) Guidelines. . . . . . . . . . . . . . . . . . . . . 549
Wireless Data Security Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 549
Wireless Security Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 551
Before You Change the SSID, WEP, and WPA Settings . . . . . . . . . . .552
Configure and Enable Wireless Security Profiles. . . . . . . . . . . . . . . . . 553
Configure the Access Point . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Restrict Wireless Access by MAC Address . . . . . . . . . . . . . . . . . . . . . 560
View the Access Point Status and Connected Clients . . . . . . . . . . . . . 561
Configure a Wireless Distribution System . . . . . . . . . . . . . . . . . . . . . . . . 563
Configure Advanced Radio Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . .564
Configure Advanced Profile and WMM QoS Priority Settings . . . . . . . . . 566
Advanced Profile Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566
WMM QoS Priority Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568
Test Basic Wireless Connectivity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570
Appendix C Network Planning for Dual WAN Ports
(Multiple WAN Port Models Only)
What to Consider Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571
Cabling and Computer Hardware Requirements . . . . . . . . . . . . . . . . .572
Computer Network Configuration Requirements . . . . . . . . . . . . . . . . . 573
Internet Configuration Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . 573
Overview of the Planning Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .575
Inbound Traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576
Inbound Traffic to a Single WAN Port System . . . . . . . . . . . . . . . . . . .576
Inbound Traffic to a Dual WAN Port System . . . . . . . . . . . . . . . . . . . .577
Virtual Private Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578
VPN Road Warrior (Client-to-Gateway) . . . . . . . . . . . . . . . . . . . . . . . .579
VPN Gateway-to-Gateway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
VPN Telecommuter (Client-to-Gateway through a NAT Router) . . . . . 584
Appendix D ReadyNAS Integration
Supported ReadyNAS Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 587
Install the UTM Add-On on the ReadyNAS . . . . . . . . . . . . . . . . . . . . . . . 588
Connect to the ReadyNAS on the UTM . . . . . . . . . . . . . . . . . . . . . . . . . .590
Appendix E Two-Factor Authentication
Why Do I Need Two-Factor Authentication? . . . . . . . . . . . . . . . . . . . . . . 593
What Are the Benefits of Two-Factor Authentication? . . . . . . . . . . . . . 593
What Is Two-Factor Authentication? . . . . . . . . . . . . . . . . . . . . . . . . . . 594
NETGEAR Two-Factor Authentication Solutions . . . . . . . . . . . . . . . . . . .594
Appendix F System Logs and Error Messages
System Log Messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
System Startup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598
Reboot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598