ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Index-4
v1.0, January 2010
DMZ
DHCP
address pool 4-20
DNS servers 4-21
domain name 4-20
LDAP server 4-21
lease time 4-21
relay 4-21
server 4-20
WINS server 4-21
DNS proxy 4-22
firewall security 4-18
increasing traffic 10-7
IP addresses 4-20
port 1-5, 4-18
setup settings 4-20
subnet mask 4-20
DNS
automatic configuration of PCs 1-6
dynamic 3-19
looking up an address 11-45
ModeConfig 7-46
proxy 1-6, 2-11, 4-10, 4-22
proxy, VLANs 4-5
queries, auto-rollover 3-11
server IP addresses 2-10, 2-13, 3-9, 4-9, 4-21, 8-10, 8-
27
documentation, online 12-12
documents, reference E-1
domain name
PPPoE 2-13, 3-7
PPTP 2-12, 3-7
SSL VPN 8-6
domain name server, See DNS
domains, for authentication 9-2, 9-10
DoS 1-4, 5-7, 5-28, 5-29, 5-52
downloading, SSL
certificate 2-3
DPD 7-29, 7-57
DSCP 5-37
dual WAN ports (dual-WAN port models)
auto-rollover B-6, B-8, B-10
FQDNs 3-19, 7-1, 7-2, B-1, B-9
load balancing 3-9, 3-10, B-7, B-8, B-10
network, planning B-1
overview 1-3
duplex, half and full 3-23
Dynamic DNS. See DDNS.
Dynamic Host Configuration Protocol. See DHCP. 1-6
DynDNS.org 3-19, 3-21
E
e-commerce 8-1
edge device 7-39, 7-40
eDonkey 2-17, 6-21
EICAR 2-26
e-mail notification server
configuring manually 11-5
settings, using the Setup Wizard 2-23
SMTP server 2-23
e-mails
audio and video files, filtering 6-11
compressed files, filtering 6-11
Distributed Spam Analysis 6-16, 6-17
executable files, filtering 6-11
filter logs 11-8, 11-33, 11-35
protection. See SMTP, POP3, or IMAP.
protocols 6-4
real-time blacklist 6-14
reports 11-39
security settings, using the Setup Wizard 2-18
spam protection 6-11
traffic statistics 11-16
whitelist and blacklist 6-12
embedded objects 6-28
environmental specifications A-3
error messages and log messages, understanding C-1
Ethernet ports 1-10
exceptions, Web access 6-41
exchange mode, IKE policies 7-24, 7-27
exclusions, scanning 6-44
executable files
e-mail filtering 6-11
FTP filtering 6-41
Web filtering 6-28
exposed hosts 3-19, 5-25
Extended Authentication. See XAUTH.