ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Index-2
v1.0, January 2010
B
backing up, configuration file 10-16
bandwidth capacity
auto-rollover mode 10-2
LAN 10-1
load balancing mode 10-1
single WAN port mode 10-2
WAN 10-1
bandwidth limits, logging dropped packets 11-14
bandwidth profiles
assigning to firewall rule 5-38
description 5-38
direction 5-40
shifting traffic mix 10-9
type 5-40
BitTorrent 2-17, 6-21
blacklist
e-mails 6-12
URLs 6-32
blocking
applications (services) 6-21
e-mails 6-14
file extensions 6-8, 6-24, 6-28
file names 6-8
Instant Messaging applications 5-26, 6-21
keywords 6-8, 6-24, 6-28
Peer-to-Peer (P2P) applications 6-21
sites to reduce traffic 10-4
TCP flood 5-28
traffic, scheduling 5-41
traffic, when reaching limit 11-4
UDP flood 5-29
URLs 6-32
using wildcards 6-24, 6-32
Web categories 2-22, 6-24, 6-29
Web objects 6-24, 6-28
browsers
user login policies 9-15
Web Management Interface 2-2
button, Reset 1-12
buttons (Web Management Interface)
action 2-6
help 2-7
table 2-6
C
CA 7-31
cache control, SSL VPN 8-5, 8-21
card, service registration 1-8
categories, Web content 2-22
category 5 cable B-3
Certificate Authority. See CA.
Certificate Revocation List. See CRL.
Certificate Signing Request, See CSR.
certificates
3rd party Web site 6-37
authentication 6-34
CA 9-18
commercial CAs 9-18
CRL 9-19, 9-25
CSR 9-21
exchange 6-34
overview 9-17
self-signed 9-18, 9-20
signature key length 9-23
trusted (CA certificates) 9-19, 9-20
Challenge Handshake Authentication Protocol. See
CHAP.
CHAP. See also RADIUS-CHAP, MIAS-CHAP, or
WiKID-CHAP. 9-2
classical routing mode 3-11
clearing statistics 11-16
clients, infected, identifying 11-38
community strings 10-15
comparison, UTM models 1-7
compatibility, protocols and standards A-2
compliance, regulatory A-3
compressed files
e-mail filtering 6-11
FTP filtering 6-41
Web filtering 6-28
configuration
settings, defaults A-1
using the Setup Wizard 2-7
configuration file
backing up 10-16