ProSecure Unified Threat Management (UTM) Appliance Reference Manual
ix
v1.0, January 2010
Configuring Secondary WAN Addresses ......................................................................3-17
Configuring Dynamic DNS ............................................................................................3-19
Configuring Advanced WAN Options ............................................................................3-22
Additional WAN-Related Configuration Tasks ........................................................3-24
Chapter 4
LAN Configuration
Managing Virtual LANs and DHCP Options ...................................................................4-1
Managing the UTM’s Port-Based VLANs .................................................................4-2
VLAN DHCP Options ...............................................................................................4-4
Configuring a VLAN Profile ......................................................................................4-6
Configuring Multi-Home LAN IPs on the Default VLAN ................................................ 4-11
Managing Groups and Hosts (LAN Groups) .................................................................4-12
Managing the Network Database ...........................................................................4-13
Changing Group Names in the Network Database ................................................4-16
Setting Up Address Reservation ............................................................................4-17
Configuring and Enabling the DMZ Port .......................................................................4-18
Managing Routing ........................................................................................................4-22
Configuring Static Routes .......................................................................................4-23
Configuring Routing Information Protocol (RIP) .....................................................4-24
Static Route Example .............................................................................................4-27
Chapter 5
Firewall Protection
About Firewall Protection ................................................................................................5-1
Administrator Tips ....................................................................................................5-2
Using Rules to Block or Allow Specific Kinds of Traffic ..................................................5-3
Services-Based Rules ..............................................................................................5-3
Order of Precedence for Rules .............................................................................. 5-11
Setting LAN WAN Rules ........................................................................................5-12
Setting DMZ WAN Rules ........................................................................................5-15
Setting LAN DMZ Rules .........................................................................................5-19
Inbound Rules Examples .......................................................................................5-22
Outbound Rules Example ......................................................................................5-26
Configuring Other Firewall Features .............................................................................5-27
Attack Checks ........................................................................................................5-27
Setting Session Limits ............................................................................................5-30