ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Index-16
v1.0, September 2009
DDNS
3-19
description
3-9
settings
3-12
VPN IPsec
7-1
bandwidth capacity
10-1
classical routing
3-10
connection speed and type
3-24
failure detection method (UTM25)
3-9
,
3-11
,
3-13
interfaces, primary and backup
3-11
LEDs
1-11
,
12-3
load balancing mode (UTM25)
configuring
3-14
DDNS
3-19
description
3-10
settings
3-14
VPN IPsec
7-1
mode status
11-23
NAT, configuring
3-10
ports
1-2
,
1-9
secondary IP addresses
3-17
settings, auto-detecting
2-12
,
3-3
settings, using the Setup Wizard
2-11
single port mode (UTM25)
3-10
status
3-4
,
11-23
,
11-28
traffic meter (or counter)
11-1
warning, SSL certificate
2-3
Web
audio and video files, filtering
6-28
categories
blocked, recent 5 and top 5
11-18
blocking
2-22
,
6-24
,
6-29
compressed files, filtering
6-28
executable files, filtering
6-28
objects, blocking
6-24
,
6-28
reports
11-39
security settings, using the Setup Wizard
2-19
statistics
11-16
Web Management Interface
description
2-5
troubleshooting
12-3
Web protection.
See
HTTP,
See
HTTPS,
See
FTP.
whitelist
e-mails
6-12
URLs
6-32
WiKID
authentication, overview
D-1
description
9-2
WiKID-CHAP
8-6
,
9-5
WiKID-PAP
8-6
,
9-4
wildcards
keywords blocking
6-24
URL blocking
6-32
WinPoET
2-13
,
3-7
WINS server
DHCP
2-10
,
4-9
,
4-21
ModeConfig
7-45
wizard.
See
Setup Wizard,
See
IPsec VPN Wizard,
See
SSL VPN Wizard.
X
XAUTH
configuring
7-37
edge device
7-38
,
7-39
IKE policies
7-29
IPsec host
7-38
,
7-39
Y
Yahoo Messenger
2-17
,
6-21