ProSecure Unified Threat Management (UTM) Appliance Reference Manual
xiv
v1.0, January 2010
Troubleshooting the ISP Connection ............................................................................12-5
Troubleshooting a TCP/IP Network Using a Ping Utility ...............................................12-7
Testing the LAN Path to Your UTM ........................................................................12-7
Testing the Path from Your PC to a Remote Device ..............................................12-8
Restoring the Default Configuration and Password ......................................................12-9
Problems with Date and Time .....................................................................................12-10
Using Online Support .................................................................................................12-10
Enabling Remote Troubleshooting .......................................................................12-10
Sending Suspicious Files to NETGEAR for Analysis ........................................... 12-11
Accessing the Knowledge Base and Documentation ...........................................12-12
Appendix A
Default Settings and Technical Specifications
Appendix B
Network Planning for Dual WAN Ports
(Dual-WAN Port Models Only)
What to Consider Before You Begin .............................................................................. B-1
Cabling and Computer Hardware Requirements .................................................... B-3
Computer Network Configuration Requirements .................................................... B-3
Internet Configuration Requirements ...................................................................... B-3
Overview of the Planning Process ................................................................................. B-5
Inbound Traffic ............................................................................................................... B-7
Inbound Traffic to a Single WAN Port System ........................................................ B-7
Inbound Traffic to a Dual WAN Port System ........................................................... B-8
Virtual Private Networks (VPNs) .................................................................................... B-9
VPN Road Warrior (Client-to-Gateway) .................................................................B-11
VPN Gateway-to-Gateway .................................................................................... B-13
VPN Telecommuter (Client-to-Gateway Through a NAT Router) .......................... B-16
Appendix C
System Logs and Error Messages
System Log Messages .................................................................................................. C-2
System Startup ........................................................................................................ C-2
Reboot ..................................................................................................................... C-2
Service Logs ........................................................................................................... C-3
NTP ......................................................................................................................... C-3
Login/Logout ........................................................................................................... C-4