Thank you for choosing NETGEAR.
After installing your device, locate the serial number on the label of your product and use it to register your product
at https://my.netgear.com. You must register your product before you can use NETGEAR telephone support.
NETGEAR recommends registering your product through the UTM’s Registration screen (see Register the UTM
with NETGEAR on page 65). You can also register your product through the NETGEAR website. For product
updates and web support, visit http://support.netgear.com.
Phone (US & Canada only): 1-888-NETGEAR.
Phone (Other Countries): Check the list of phone numbers at
202-10780-02 2.0May 2012•Updated the main navigatio n menus and configuration
202-10780-02 1.0April 2012•Added new features for all UTM models:
1.0
(continued)
October 2012
(continued)
(continued)
•Added Appendix C, 3G/4G Dongles for the UTM9S and
UTM25S.
•Added many more default values to Appendix H, Default
Settings and Technical Specifications.
menus for many figures in the manual to show consistency
in the presentation of the web management interface
(GUI).
•Updated the outbound rules overview (see Table 27) and
inbound rules overview (Table 28).
•Updated Features That Reduce Traffic and Features That
Increase Traffic.
- Application control (see Configure Application Control)
- Traffic metering for LAN usage (see Create Traffic
Meter Profiles)
- The use of custom user groups in firewall rules (see
Overview of Rules to Block or Allow Specific Kinds of
Traffic and VLAN Rules)
Application control and traffic metering also affect the way
that firewall rules are implemented (see Overview of Rules
to Block or Allow Specific Kinds of Traffic)
•Added support of the following features for all UTM models
(these features were previously supported on the UTM9S
only):
- ReadyNAS integration, quarantine options, and
quarantine logs (see Connect to a ReadyNAS and
Configure Quarantine Settings, Query and Manage the
Quarantine Logs, and Appendix E, ReadyNAS
Integration)
- PPTP server (see Configure the PPTP Server)
- L2TP server (see Configure the L2TP Server)
•Revised the following existing features:
- Firewall scheduling (see Set a Schedule to Block or
Allow Specific Traffic and Overview of Rules to Block or
Allow Specific Kinds of Traffic)
- IPS (see Enable and Configure the Intrusion
Prevention System)
- System status, dashboard, and report functions (see
Chapter 11, Monitor System Access and Performance)
- Diagnostics (see Use Diagnostics Utilities)
•Reorganized the web managem en t in terface (GUI) menus
(for example, the Email Notification configuration menu
link has been moved to the Monitoring main menu; the
Custom Groups configuration menu link has been moved
to the Users main menu)
202-10780-01 1.0September 2011 •Added the UTM9S with the foll owing major new features:
- xDSL module (see Chapter 1, Introduction and Chapter
3, Manually Configure Internet and WAN Settings)
- Wireless module (see Chapter 1, Introduction and
Appendix B, Wireless Network Module for the UTM9S
and UTM25S)
- ReadyNAS integration, quarantine options, and
quarantine logs (see Connect to a ReadyNAS and
Configure Quarantine Settings, Query and Manage the
Quarantine Logs, and Appendix E, ReadyNAS
Integration)
- PPTP server (see Configure the PPTP Server)
- L2TP server (see Configure the L2TP Server)
•Updated the VPN client sections with the new VPN client
(see Chapter 7, Virtual Private Networking
Using IPSec, PPTP, or L2TP Connections)
202-10674-02 1.0March 2011•Added the UTM150.
•Removed the platform-specific chapters and sections
because the UTM5, UTM10, and UTM25 now support the
same web management interface menu layout that was
already supported on the UTM50. The major cha nges for
the UTM5, UTM10, and UTM25 are documented in
Chapter 3, Manually Configure Internet and WAN Settings,
and in the following sections:
- Set Exception Rules for Web and Application Access
- Configure Authentication Domains, Groups, and Users
•Added new features (for all UTM models). The major new
features are documented in the following sections:
- Electronic Licensing
- VLAN Rules
- Create Service Groups
- Create IP Groups
- Manage SSL Certificates for HTTPS Scanning
- Update the Firmware
- View, Schedule, and Generate Reports
202-10674-01 1.0September 2010 •Added the UTM50 and UTM5 0-specific chapters and
sections.
•Revised the DMZ WAN and LAN DMZ default policies.
•Added the Requirements for Entering IP Addresses
section.
•Added a note about the processing of normal email traffic
in the Configure Distributed Spam Analysis section.
•Updated the NTP section.
202-10482-02 1.0January 2010Updated the web management interface screens, made the
manual platform-independent, added a model comparison
table, and removed performance specifications (see marketing
documentation for such specifications).
202-10482-01 1.0September 2009 Initial publication of this reference manual.
4
Contents
Chapter 1Introduction
What Is the ProSecure Unified Threat Management (UTM) Appliance? . .15
Appendix INotification of Compliance (Wired)
Appendix JNotification of Compliance (Wireless)
Index
14
1. Introduction
This chapter provides an overview of the features and capabilities of the NETGEAR ProSecure®
Unified Threat Management (UTM) Appliance. This chapter contains the following sections:
•What Is the ProSecure Unified Threat Management (UTM) Appliance?
•Key Features and Capabilities
•Service Registration Card with License Keys
•Package Contents
•Hardware Features
•Choose a Location for the UTM
Note: For more information about the topics covered in this manual, visit the
Support website at http://support.netgear.com.
1
Note: Firmware updates with new features and bug fixes are made
available from time to time at downloadcenter.netgear.com. Some
products can regularly check the site and download new firmware,
or you can check for and download new firmware manually. If the
features or behavior of your product do not match what is described
in this guide, you might need to update your firmware.
What Is the ProSecure Unified Threat Management (UTM)
Appliance?
The ProSecure Unified Threat Management (UTM) Appliance, hereafter referred to as the
UTM, connects your local area network (LAN) to the Internet through one or two external
broadband access devices such as cable modems, DSL modems, satellite dishes, or
wireless ISP radio antennas, or a combination of those. Dual wide area network (WAN) port s
allow you to increase the effective data rate to the Internet by utilizing both WAN ports to
carry session traffic, or to maintain a backup connection in case of failure of your primary
Internet connection.
As a complete security solution, the UTM combines a powerful, flexib le firewall with a content
scan engine that uses NETGEAR Stream Scanning technology to protect your network from
denial of service (DoS) attacks or distributed DoS (DDoS) attacks, unwanted traffic, traffic
with objectionable content, spam, phishing, and web-borne threats such as spyware, viruses,
and other malware threats.
The UTM provides advanced IPSec and SSL VPN technologies for secure and simple
remote connections. The use of Gigabit Ethernet LAN and WAN ports ensures high data
transfer speeds.
The UTM is a plug-and-play device that can be installed and configured within minutes.
Key Features and Capabilities
•Multiple WAN Port Models for Increased Reliability or Outbound Load Balancing
•Wireless Features
•DSL Features
•Advanced VPN Support for Both IPSec and SSL
•A Powerful, True Firewall
•Stream Scanning for Content Filtering
•Security Features
•Autosensing Ethernet Connections with Auto Uplink
•Extensive Protocol Support
•Easy Installation and Management
•Maintenance and Support
•Model Comparison
The UTM provides the following key features and capabilities:
•For the single WAN port models, a single 10/100/1000 Mbps Gigabit Ethernet WAN port.
For the multiple WAN port models, dual or quad 10/100/1000 Mbps Gigabit Ethernet
WAN ports for load balancing or failover protection of your Internet connection, providing
increased system reliability or increased data rate.
•Built-in four- or six-port 10/100/1000 Mbps Gigabit Ethernet LAN switch for fast data
transfer between local network resources.
•Wireless network module (UTM9S and UTM25S only) for either 2.4-GHz or 5-GHz
wireless modes.
•xDSL network module (UTM9S and UTM25S only) for ADSL and VDSL.
•3G/4G dongle (UTM9S and UTM25S only) for wireless connection to an ISP.
•Depending on the model, bundled with a one-user license of the NETGEAR ProSafe
VPN Client software (VPN01L).
•Advanced stateful packet inspection (SPI) firewall with multi-NAT support.
•Patent-pending S tream Scanning technology that enables scanning of real-t ime protocols
such as HTTP.
•Comprehensive web and email security, covering six major network protocols: HTTP,
HTTPS, FTP, SMTP, POP3, and IMAP.
•Malware database containing hundreds of thousands of signatures of spyware, viruses,
and other malware threats.
•Very frequently updated malware signatures, hourly if necessary. The UTM can
automatically check for new malware signatures as frequently as every 15 minutes.
•Multiple antispam technologies to provide extensive protection against unwanted mail.
•Application control for multiple categories of applications and individual applications to
safeguard data, protect users, and enhance productivity.
•Easy, web-based wizard setup for installation and management.
•SNMP manageable with support for SNMPv1, SNMPv2, and SNMPv3.
•Support for the NETGEAR Network Management System NMS200.
•Front panel LEDs for easy monitoring of status and activity.
•Flash memory for firmware upgrade.
•Internal universal switching power supply.
Multiple WAN Port Models for Increased Reliability or
Outbound Load Balancing
The UTM product line offers models with two broadband WAN ports. The second WAN port
allows you to connect a second broadband Internet line that can be configured on a mutually
exclusive basis to:
•Provide backup and rollover if one line is inoperable, ensuring that you are never
disconnected.
•Load balance, or use both Internet lines simultaneously for outgoing traffic. A UTM with
dual WAN port s balances users between the two line s f or maximum bandwidth efficiency.
See Appendix D, Network Planning for Dual WAN Port s (Multiple W AN Port Models Only) for
the planning factors to consider when implementing the following capabilities with dual WAN
port gateways:
Wireless client connections are supported on the UTM9S and UTM25S with an NMWLSN
wireless network module installed. The UTM9S and UTM25S support the following wireless
features:
•2.4-GHz radio and 5-GHz radio. Either 2.4-GHz band support with 802.11b/g/n/ wireless
modes or 5-GHz band support with 802.11a/n wireless modes.
•Wireless security profiles. Support for up to four wireless security profiles, each with it s
own SSID.
•WMM QoS priority. Wi-Fi Multimedia (WMM) Quality of Service (QoS) priority settings to
map one of four queues to each Differentiated Services Code Point (DSCP) value.
•Wireless Distribution System (WDS). WDS enables expansion of a wireless network
through two or more access points that are interconnected.
•Access control. The Media Access Control (MAC) address filtering feature can ensure
that only trusted wireless stations can use the UTM to gain access to your LAN.
•Hidden mode. The SSID is not broadcast, assuring that only clients configured with the
correct SSID can connect.
•Secure and economical operation. Adjustable power output allows more secure or
economical operation.
•3G/4G dongle. Mobile broadband USB adapter for a wireless connection to an ISP.
DSL Features
DSL is supported on the UTM9S and UTM25S with an NMVDSLA or NMVDSLB DSL
network module installed. The UTM9S and UTM25S support the following types of DSL
connections:
•ADSL, ADSL2, and ADSL2+
•VDSL and VDSL2
Annex A, Annex B, and Annex M are supported to accommodate PPPoE, PPPoA, and IPoA
ISP connections.
Advanced VPN Support for Both IPSec and SSL
The UTM supports IPSec and SSL virtual private network (VPN) connections.
•IPSec VPN delivers full network access between a central office and branch offices, or
between a central office and telecommuters. Remote access by telecommuters requires
the installation of VPN client software on the remote computer.
-IPSec VPN with broad protocol support for secure connection to other IPSec
gateways and clients.
-Depending on the model, bundled with a one-user license of the NETGEAR ProSafe
•SSL VPN provides remote access for mobile users to selected corporate resources
without requiring a preinstalled VPN client on their computers.
-Uses the familiar Secure Sockets Layer (SSL) protocol, commonly used for
e-commerce transactions, to provide client-free access with customizable user
portals and support for a wide variety of user repositories.
-Allows browser-based, platform-independent remote access through a number of
popular browsers, such as Microsoft Internet Explorer, Mozilla Firefox, and Apple
Safari.
-Provides granular access to corporate resources based on user type or group
membership.
A Powerful, True Firewall
Unlike simple NA T routers, the UTM is a true firewall, using st ateful packet inspection (SPI) to
defend against hacker attacks. Its firewall features have the following capabilities:
•DoS protection. Automatically detects and thwarts (distributed) denial of service (DoS)
attacks such as Ping of Death and SYN flood.
•Secure firewall. Blocks unwanted traffic from the Internet to your LAN.
•Schedule policies. Permits scheduling of firewall policies by day and time.
•Logs security incidents. Logs security events such as blocked incoming traffic, port
scans, attacks, and administrator logins. You can configure the firewall to email the log to
you at specified intervals. You can also configure the firewall to send immediate alert
messages to your email address or email pager whenever a significant event occurs.
Stream Scanning for Content Filtering
Stream Scanning is based on the simple observation that network traffic travels in streams.
The UTM scan engine starts receiving and analyzing traf fic as the stream enters the network.
As soon as a number of bytes are available, scanning starts. The scan engine continues to
scan more bytes as they become available, while at the same time another thread starts to
deliver the bytes that have been scanned.
This multithreaded approach, in which the receiving, scanning, and delivering processes
occur concurrently, ensures that network performance remains unimpeded. The result is that
file scanning is up to five times faster than with traditional antivirus solutions—a performance
advantage that you really notice.
Stream Scanning also enables organizations to withstand massive spikes in traffic, as in the
event of a malware outbreak. The scan engine has the following capabilities:
•Real-time protection. The patent-pending Stream Scanning technology enables
scanning of previously undefended real-time protocols, such as HTTP. Network activities
susceptible to latency (for example, web browsing) are no longer brought to a standstill.
•Comprehensive protection. Provides both web and email security, covering six major
network protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP. The UTM uses
enterprise-class scan engines employing both signature-based and distributed spam
analysis to stop both known and unknown threats. The malware database contains
hundreds of thousands of signatures of spyware, viruses, and other malware.
•Objectionable traffic protection. The UTM prevents objectionable content from
reaching your computers. You can control access to the Internet content by screening for
web services, web addresses, and keywords within web addresses. You can log and
report attempts to access objectionable Internet sites.
•Application control. The UTM provides application control for entire categories of
applications, individual applications, or a combination of both. You can either globally
allow or block applications or configure custom application control profiles for groups of
users, individual users, or a combination of both. The UTM supports multiple applications.
•Automatic signature updates. Malware signatures are updated as frequently as every
hour, and the UTM can check automatically for new signatures as frequently as every 15
minutes.
Security Features
The UTM is equipped with several features designed to maintain security:
•Computers hidden by NAT. NAT opens a temporary path to the Internet for requests
originating from the local network. Requests originating from outside the LAN are
discarded, preventing users outside the LAN from finding and directly accessing the
computers on the LAN.
•Port forwarding with NAT. Although NAT prevents Internet locations from directly
accessing the computers on the LAN, the UTM allows you to direct incoming traffic to
specific computers based on the service port number of the incoming request. You can
specify forwarding of single ports or ranges of ports.
•DMZ port. Incoming traffic from the Internet is usually discarded by the UTM unless the
traffic is a response to one of your local computers or a service for which you have
configured an inbound rule. Instead of discarding this traffic, you can use the dedicated
demilitarized zone (DMZ) port to forward the traffic to one computer on your network.
Autosensing Ethernet Connections with Auto Uplink
With its internal four- or six-port 10/100/1000 Mbps switch and single or dual
(model-dependant) 10/100/1000 WAN ports, the UTM can connect to either a 10-Mbps
standard Ethernet network, a 100-Mbps Fast Ethernet network, or a 1000-Mbps Gigabit
Ethernet network. The four LAN and one or two WAN interface s are autosensing and capable
of full-duplex or half-duplex operation.
TM
The UTM incorporates Auto Uplink
whether the Ethernet cable plugged into the port should have a normal connection such as to
a computer or an uplink connection such as to a switch or hub. Tha t port then configures it self
correctly. This feature eliminates the need for you to think about crossover cables, as Auto
Uplink accommodates either type of cable to make the right connection.
technology. Each Ethernet port automatically senses
The UTM supports the T ransmission Control Protocol/Internet Proto col (TCP/IP) and Routing
Information Protocol (RIP). For further information about TCP/IP, see Internet Configuration
Requirements on page 624. The UTM provides the following protocol support:
•IP address sharing by NAT. The UTM allows many networked computers to share an
Internet account using only a single IP address, which might be statically or dynamically
assigned by your Internet service provider (ISP). This technique, known as Network
Address Translation (NAT), allows the use of an inexpensive single-user ISP account.
•Automatic configuration of attached computers by DHCP. The UTM dynamically
assigns network configuration information, including IP, gateway, and Domain Name
Server (DNS) addresses, to attached computers on the LAN using the Dynamic Host
Configuration Protocol (DHCP). This feature greatly simplifies configuration of computers
on your local network.
•DNS proxy. When DHCP is enabled and no DNS addresses are specified, the firewall
provides its own address as a DNS server to the attached computers. The firewall obt ains
actual DNS addresses from the ISP during connection setup and forwards DNS request s
from the LAN.
•PPP over Ethernet (PPPoE). PPPoE is a protocol for connecting remote hosts to the
Internet over a DSL connection by simulating a dial-up connection.
•Quality of Service (QoS). The UTM supports QoS, including traffic prioritization and
traffic classification with Type of Service (ToS) and Differentiated Services Code Point
(DSCP) marking.
Easy Installation and Management
You can install, configure, and operate the UTM within minutes after connecting it to the
network. The following features simplify installation and management tasks:
•Browser-based management. Browser-based configuration allows you to easily
configure the UTM from almost any type of operating system, such as Windows,
Macintosh, or Linux. A user-friendly Setup Wizard is provided, and online help
documentation is built into the browser-based web management interface.
•Autodetection of ISP. The UTM automatically senses the type of Internet connection,
asking you only for the information required for your type of ISP account.
•IPSec VPN Wizard. The UTM includes the NETGEAR IPSec VPN Wizard so you can
easily configure IPSec VPN tunnels according to the recommendations of the Virtual
Private Network Consortium (VPNC). This ensures that the IPSec VPN tunnels are
interoperable with other VPNC-compliant VPN routers and clients.
•SSL VPN Wizard. The UTM includes the NETGEAR SSL VPN Wizard so you can easily
configure SSL connections over VPN according to the recommendations of the VPNC.
This ensures that the SSL connections are interoperable with other VPNC-compliant
VPN routers and clients.
•SNMP. The UTM supports the Simple Network Management Protocol (SNMP) to let you
monitor and manage log resources from an SNMP-compliant system manager. The
SNMP system configuration lets you change the system variables for MIB2.
•Diagnostic functions. The UTM incorporates built-in diagnostic functions such as ping,
traceroute, DNS lookup, and remote reboot.
•Remote management. The UTM allows you to log in to the web management interface
from a remote location on the Internet. For security, you can limit remote management
access to a specified remote IP address or range of addresses.
•Visual monitoring. The UTM’s front panel LEDs provide an easy way to monitor its
status and activity.
Maintenance and Support
NETGEAR offers the following features to help you maximize your use of the UTM:
•Flash memory for firmware upgrades.
•Technical support seven days a week, 24 hours a day. Information about support is
available on the NETGEAR ProSecure website at
http://prosecure.netgear.com/support/index.php.
Model Comparison
The following table compares the UTM models to show the differences. For performance
specifications and sizing guidelines, see NETGEAR’s marketing documentation at
FeatureUTM5UTM9SUTM10UTM25UTM25S UTM50UTM150
Network Modules and Broadband Adapters
xDSL network module with RJ11 port
Wireless network module
3G/4G USB dongle
Deployment
VLAN support
Dual WAN auto-rollover mode
Dual WAN load balancing mode
Single WAN mode
Service Registration Card with License Keys
Be sure to store the license key card that came with your UTM (see a sample card in the
following figure) in a secure location. If you do not use electronic licensing (see Electronic
Licensing on page 67), you need these service license keys to activate your product during
the initial setup. The service license keys are assigned to the serial number of your product.
Note: When you reset the UTM to the original factory default settings after
you have entered the license keys to activate the UTM (se e Register
the UTM with NETGEAR on page 65), the license keys are erased.
The license keys and the different types of licenses that are
available for the UTM are no longer displayed on the Registration
screen. However, af ter you have reconfigured the UTM to connect to
the Internet and to the NETGEAR registration server, the UTM
retrieves and restores all registration information based on its MAC
address and hardware serial number . You do not need to reenter the
license keys and reactivate the UTM.
Package Contents
The UTM product package contains the following items:
-ProSafe VPN Client software (VPN01L) (depends on the UTM model)
•Service Registration Card with license keys
If any of the parts are incorrect, missing, or damaged, contact your NETGEAR dealer. Keep
the carton, including the original packing materials, in case you need to return the product for
repair.
Hardware Features
•Front Panel UTM5 and UTM10
•Front Panel UTM25
•Front Panel UTM50
•Front Panel UTM150
•Front Panel UTM9S and UTM25S and Network Modules
•LED Descriptions, UTM5, UTM10, UTM25, UTM50, and UTM150
•LED Descriptions, UTM9S, UTM25S, and their Network Modules
The front panels contain ports an d LEDs; the rear panels contain port s, connectors, and other
components; and the bottom panels contain product labels.
Front Panel UTM5 and UTM10
Viewed from left to right, the UTM5 and UTM10 front panel contains the following ports:
•One nonfunctioning USB port. This port is included for future management
enhancements. The port is currently not operable on the UTM.
•LAN Ethernet ports. Four switched N-way automatic speed negotiating, Auto MDI/MDIX,
Gigabit Ethernet ports with RJ-45 connectors.
•WAN Ethernet port. One independent N-way automatic speed negotiating, Auto
MDI/MDIX, Gigabit Ethernet ports with RJ-45 connectors.
The front panel also contains three groups of status indicator light-emitting diodes (LEDs),
including Power and Test LEDs, LAN LEDs, and WAN LEDs, all of which are explained in
detail in Table 2 on page 30. In addition, the front panel provides some LED explanation to
the left of the LAN ports.
Viewed from left to right, the UTM25 front panel contains the following ports:
•One nonfunctioning USB port. This port is included for future management
enhancements. The port is currently not operable on the UTM.
•LAN Ethernet ports. Four switched N-way automatic speed negotiating, Auto MDI/MDIX,
Gigabit Ethernet ports with RJ-45 connectors.
•WAN Ethernet ports. Two independent N-way automatic speed negotiating, Auto
MDI/MDIX, Gigabit Ethernet ports with RJ-45 connectors.
The front panel also contains three groups of st atus indicator LEDs, including Powe r and Test
LEDs, LAN LEDs, and WAN LEDs, all of which are explained in detail in Table 2 on page 30.
In addition, the front panel provides some LED explanation to the left of the LAN ports.
Figure 3. Front panel UTM25
Front Panel UTM50
Viewed from left to right, the UTM50 front panel contains the following ports:
•One nonfunctioning USB port. This port is included for future management
enhancements. The port is currently not operable on the UTM.
•LAN Ethernet ports. Six switched N-way automatic speed negotiating, Auto MDI/MDIX,
Gigabit Ethernet ports with RJ-45 connectors.
•WAN Ethernet ports. Two independent N-way automatic speed negotiating, Auto
MDI/MDIX, Gigabit Ethernet ports with RJ-45 connectors.
The front panel also contains three groups of st atus indicator LEDs, including Powe r and Test
LEDs, LAN LEDs, and WAN LEDs, all of which are explained in detail in Table 2 on page 30.
In addition, the front panel provides some LED explanation to the right of the WAN ports.
Viewed from left to right, the UTM150 front panel contains the following ports:
•One nonfunctioning USB port. This port is included for future management
enhancements. The port is currently not operable on the UTM.
•LAN Ethernet ports. Four switched N-way automatic speed negotiating, Auto MDI/MDIX,
Gigabit Ethernet ports with RJ-45 connectors.
•WAN Ethernet ports. Four independent N-way automatic speed negotiating, Auto
MDI/MDIX, Gigabit Ethernet ports with RJ-45 connectors.
The front panel also contains three group s of status indicator LEDs, including Power and Test
LEDs, LAN LEDs, and WAN LEDs, all of which are explained in d et a il in Table 2 on page 30.
In addition, the front panel provides some LED explanation to the right of the WAN ports.
Viewed from left to right, the UTM9S and UTM25S front panel contains the following ports
and slots:
•One USB port that can accept a 3G/4G dongle for wireless connectivity to an ISP. The
port is currently operable on the UTM9S and UTM25S only.
•LAN Ethernet ports. Four switched N-way automatic speed negotiating, Auto MDI/MDIX,
Gigabit Ethernet ports with RJ-45 connectors.
•WAN Ethernet ports. Two independent N-way automatic speed negotiating, Auto
MDI/MDIX, Gigabit Ethernet ports with RJ-45 connectors.
The front panel also contains three groups of st atus indicator LEDs, including Powe r and Test
LEDs, LAN LEDs, and WAN LEDs, all of which are explained in detail in Table 3 on page 32.
Some LED explanation is provided on the front panel below the LAN and WAN ports.
The following xDSL network modules are available for insertion in one of the UTM9S or
UTM25S slots:
•NMSDSLA. VDSL/ADSL2+ network module, Annex A.
•NMSDSLB. VDSL/ADSL2+ network module, Annex B.
Note: In previous releases for the UTM9S, these network modules were
referred to as the UTM9SDSLA and UTM9SDSLB. The UTM9SDSLA
is identical to the NMSDSLA, and the UTM9SDSLB is identical to the
NMSDSLB.
The xDSL network module provides one RJ-11 port for connection to a telephone line. The
two LEDs are explained in Table 3 on page 32.
Figure 7. xDSL network module
Wireless Network Modules
The wireless network module (NMSWLSN) can be inserted in one of the UTM9S and
UTM25S slots. The wireless network module does not provide any ports. The antennas are
detachable. The two LEDs are explained in Table 3 on page 32.
Note: In previous releases for the UTM9S, this network module was referred to
as the UTM9SWLSN. The UTM9SWLSN is identical to the NMSWLSN.
Table 3. LED descriptions UTM9S and UTM25S (continued)
LEDActivityDescription
Right LEDOffThe WAN port is operating at 10 Mbps.
On (amber)The WAN port is operating at 100 Mbps.
On (green)The WAN port is operating at 1000 Mbps.
Active LEDOffThe WAN port either is not enabled or has no link to the Internet.
On (green)The WAN port has a valid Internet connection.
Wireless network module
Module
Status LED
Wireless
Link LED
xDSL network modules
Module
Status LED
Link LEDOffThe xDSL port has no Internet connection.
OffThe module is not enabled.
On (green)The module is enabled.
OffThe wireless access point is not enabled.
On (green)The wireless access point is enabled in 2.4-GHz operating mode.
Blinking (green)There is wireless activity in 2.4-GHz operating mode.
On (yellow)The wireless access point is enabled in 5-GHz operating mode.
Blinking (yellow)There is wireless activity in 5-GHz operating mode.
OffThe module is enabled or has a link to the telephone line.
On (green)The module either is not enabled or has no link to the telephone line.
On (green)The xDSL port functions in ADSL mode.
On (yellow)The xDSL port functions in VDSL mode.
Rear Panel UTM5, UTM10, and UTM25
The rear panel of the UTM5, UTM10, and UTM25 includes the cable lock receptacle, the
console port, the Factory Defaults reset button, and the AC power connection.
Figure 9. Rear panel of the UTM5, UTM10, and UTM25
Viewed from left to right, the rear panel of the UTM5, UTM10, and UTM25 contains the
following components:
1. Cable security lock receptacle.
2. Console port. Port for connecting to an optional console terminal. The port has a DB9 male
connector. The default baud rate is 9600 K. The pinouts are (2) Tx, (3) Rx, (5) and (7) Gnd.
3. Factory Defaults Reset button. Using a sharp object, press and hold this button for about
8 seconds until the front panel Test LED flashes to reset the UTM to factory d efault settings.
Configuration changes are lost, and the default password is restored.
4. AC power receptacle. Universal AC input (100–240 VAC, 50–60 Hz).
Rear Panel UTM50 and UTM150
The rear panel of the UTM50 and UTM150 includes the cable lock receptacle, the console
port, the Factory Defaults reset button, and the AC power connection.
Figure 10. Rear panel of the UTM50 and UTM150
Viewed from left to right, the rear panel of the UTM50 and UTM150 contains the following
components:
1. Console port. Port for connecting to an optional console terminal. The port has a DB9
male connector. The default baud rate is 9600 K. The pinouts are (2) Tx, (3) Rx, (5) and
(7) Gnd.
2. Factory Defaults reset button. Using a sharp object, press and hold this button for about
8 seconds until the front panel Test LED flashes to reset the UTM to factory d efault settings.
Configuration changes are lost, and the default password is restored.
3. Cable security lock receptacle.
4. AC power receptacle. Universal AC input (100–240 VAC, 50–60 Hz).
The rear panel of the UTM9S and UTM25S includes the cable lock receptacle, the console
port and console switch, the Factory Defaults reset button, the AC power connection, and the
power switch.
Figure 11. Rear panel of the UTM9S and UTM25S
Viewed from left to right, the rear panel of the UTM9S and UTM25S contains the following
components:
1. Cable security lock receptacle.
2. Factory Defaults Reset button. Using a sharp object, press and hold this button for about
8 seconds until the front panel Test LED flashes to reset the UTM to factory default settings.
Configuration changes are lost, and the default password is restored.
3. Console switch to select the console connection: Main Board (left position), Slot 1 (middle
position), or Slot 2 (right position).
4. Console port (9600,N,8,1). Port for connecting to an optional console terminal . The port has
a DB9 male connector. The default baud rate is 9600 K. The pinouts are (2) Tx, (3) Rx, (5)
and (7) Gnd.
5. AC power receptacle. Universal AC input (100–240 VAC, 50–60 Hz).
The following figure shows the product label for the UTM25S:
Figure 18.
Choose a Location for the UTM
The UTM is suitable for use in an office environment where it can be freestanding (on its
runner feet) or mounted into a standard 19-inch equipment rack. Alternatively, you can
rack-mount the UTM in a wiring closet or equipment room. A rack-mounting kit, containing
two mounting brackets and four screws, is provided in th e p ackage for the multiple WAN port
models.
Consider the following when deciding where to position the UTM:
•The unit is accessible, and cables can be connected easily.
•Cabling is away from sources of electrical noise. These include lift shafts, microwave
ovens, and air-conditioning units.
•Water or moisture cannot enter the case of the unit.
•Airflow around the unit and through the vents in the side of the case is not restricted.
Provide a minimum of 25-mm or 1-inch clearance.
•The air is as free of dust as possible.
•Temperature operating limits are not likely to be exceeded. Install the unit in a clean,
air-conditioned environment. For information about the recommended operating
temperatures for the UTM, see Appendix H, Default Settings and Technical
Specifications.
Note: For the UTM9S and UTM25S, see also Wireless Equipment
Use the mounting kit for the UTM to install the appliance in a rack. (A mounting kit is provided
in the package for the multiple WAN port models.) Attach the mounting brackets using the
hardware that is supplied with the mounting kit.
Figure 19.
Before mounting the UTM in a rack, verify that:
•You have the correct screws (supplied with the installation kit).
•The rack onto which you will mount the UTM is suitably located.
Introduction
40
2. Use the Setup Wizard to Provision the
UTM in Your Network
This chapter explains how to log in to the UTM and use the web management interface, how to
use the Setup Wizard to provision the UTM in your network, and how to register the UTM with
NETGEAR. The chapter contains the following sections:
•Steps for Initial Connection
•Log In to the UTM
•Web Management Interface Menu Layout
•Use the Setup Wizard to Perform the Initial Configuration
•Register the UTM with NETGEAR
•Verify Correct Installation
•What to Do Next
2
Steps for Initial Connection
•Qualified Web Browsers
•Requirements for Entering IP Addresses
Typically, the UTM is installed as a network gateway to function as a combined LAN switch,
firewall, and content scan engine to protect the network from all incoming and outgoing
malware threats.
Generally, five steps are required to complete the basic and security configuration of your
UTM:
1. Connect the UTM physically to your network. Connect the cables and restart your
network according to the instructions in the Installation Guide. See the ProSecure
Unified Threat Management UTM Installation Guide for complete steps. A PDF of the
Installation Guide is on the NETGEAR website at
2. Log in to the UTM. After logging in, you are ready to set up and configure your UTM. See
Log In to the UTM on page 42.
3. Use the Setup Wizard to configure basic connections and s ecurity. During this phase,
you connect the UTM to one or more ISPs (more than one ISP applies to multiple WAN port
models only). See Use the Setup Wizard to Perform the Initial Configuration on page 47.
4. Verify the installation. See Verify Correct Installation on page 68.
5. Register the UTM. See Register the UTM with NETGEAR on page 65.
Each of these tasks is described separately in this chapter. The configuration of the WAN
mode (required for multiple WAN port models), Dynamic DNS, and other WAN options is
described in Chapter 3, Manually Configure Internet and WAN Settings.
The configuration of LAN, firewall, scanning, VPN, management, and monitoring features is
described in later chapters.
Qualified Web Browsers
To configure the UTM, you need to use a web browser such as Microsoft Internet Explorer 6
or later, Mo zilla Firefox 3 or later, or Apple Safari 3 or later with JavaScript, cookies, and SSL
enabled.
Although these web browsers are qualified for use with the UTM’s web management
interface, SSL VPN users should choose a browser that supports JavaScript, Java, cookies,
SSL, and ActiveX to take advantage of the full suite of applications. Java is required only for
the SSL VPN portal, not for the web management interface.
Requirements for Entering IP Addresses
The fourth octet of an IP address needs to be between 1 and 254 (both inclusive). This
requirement applies to any IP address that you enter on a screen of the web management
interface.
Log In to the UTM
To connect to the UTM, your computer needs to be configured to obtain an IP address
automatically from the UTM through DHCP.
To connect and log in to the UTM:
1. Start any of the qualified web browsers, as explained in the previous section, Qualified
Web Browsers.
2. In the address field, enter https://192.168.1.1. The NETGEAR Configuration Manager Login
screen displays in the browser. (The following figure shows the screen for the UTM50.) This
screen also provides the User Portal Login Link. For general information about the User
Portal Login Link, see Access the New SSL VPN Portal on page 353; for platform-specific
information, see Login Portals on page 380.
Note: The UTM factory default IP address is 192.168.1.1. If you change
the IP address, you need to use the IP address that you assigned to
the UTM to log in to the UTM.
Use the Setup Wizard to Provision the UTM in Y our Network
The web management interface menu consists of the following components:
•1st level: Main navigation menu links. The main navigation menu in the orange bar
across the top of the web management interface provides access to all the configuration
functions of the UTM, and remains constant. When you select a main navigation menu
link, the letters are displayed in white against an orange background.
•2nd level: Configuration menu links. The configuration menu links in the gray bar
(immediately below the main navigation menu bar) change according to the main
navigation menu link that you select. When you select a configuration menu link, the
letters are displayed in white against a gray background.
•3rd level: Submenu tabs. Each config uration menu item has one or more submenu tabs
that are listed below the gray menu bar. When you select a submenu tab, the text is
displayed in white against a blue background.
•Option arrows. If there are additional screens for the submenu item, links to the screens
display on the right side in blue letters against a white background, preceded by a white
arrow in a blue circle.
The bottom of each screen provides action buttons. The nature of the screen determines
which action buttons are shown. The following figure shows an example:
Figure 23.
Any of the following action buttons might display on screen (this list might not be complete):
•Apply. Save and apply the configuration.
•Reset. Cancel the changes and reset the configuration to the current values.
•Test. Test the configuration before you decide whether to save and apply the
configuration.
•Auto Detect. Enable the UTM to detect the configuration automatically and suggest
values for the configuration.
•Next. Go to the next screen (for wizards).
Use the Setup Wizard to Provision the UTM in Y our Network
When a screen includes a table, table buttons display to let you configure the table entries.
The nature of the screen determines which table buttons are shown. The following figure
shows an example:
Figure 24.
Any of the following table buttons might display on screen:
•Select All. Select all entries in the table.
•Delete. Delete the selected entry or entries from the table.
•Enable. Enable the selected entry or entries in the table.
•Disable. Disable the selected entry or entries in the table.
•Add. Add an entry to the table.
•Edit. Edit the selected entry.
•Up. Move up the selected entry in the table.
•Down. Move down the selected entry in the table.
•Apply. Apply the selected entry.
Almost all screens and sections of screens have an accompanying help screen. To open the
help screen, click the (question mark) icon.
Use the Setup Wizard to Provision the UTM in Y our Network
Use the Setup Wizard to Perform the Initial Configuration
•Setup Wizard Step 1 of 10: LAN Settings
•Setup Wizard Step 2 of 10: WAN Settings
•Setup Wizard Step 3 of 10: System Date and Time
•Setup Wizard Step 4 of 10: Services
•Setup Wizard Step 5 of 10: Email Security
•Setup Wizard Step 6 of 10: Web Security
•Setup Wizard Step 7 of 10: Web Categories to Be Blocked
•Setup Wizard Step 8 of 10: Email Notification
•Setup Wizard Step 9 of 10: Signatures & Engine
•Setup Wizard Step 10 of 10: Saving the Configuration
The Setup Wizard facilitates the initial configuration of the UTM by taking you through 10
screens, the last of which allows you to save the configuration. If you prefer to perform the
initial WAN setup manually, see Chapter 3, Manually Configure Internet and WAN Settings.
To start the Setup Wizard:
1. Select Wizards from the main navigation menu. The Welcome to the Netgear
Configuration Wizard screen displays:
Figure 25.
2. Select the Setup Wizard radio button.
3. Click Next. The first Setup Wizard screen displays.
The following sections explain the 9 configuration screens of the Setup Wizard. On the 10th
screen, you can save your configuration.
The tables in the following sections explain the buttons and fields of the Setup Wizard
screens. Additional information about the settings in the Setup Wizard screens is provided in
other chapters that explain manual configuration; each of the following sections provides a
specific link to a section in another chapter.
Use the Setup Wizard to Provision the UTM in Y our Network
Table 4. Setup Wizard Step 1: LAN Settings screen settings
SettingDescription
LAN TCP/IP Setup
IP AddressEnter the IP address of the UTM’s default VLAN (the factory default address is
192.168.1.1).
Note: Always make sure that the LAN port IP address and DMZ port IP address are in
different subnets.
Note: If you change the LAN IP address of the UTM’s default VLAN while being
connected through the browser, you are disconnected. You then need to open a new
connection to the new IP address and log in again. For example, if you change the
default IP address from 192.168.1.1 to 10.0.0.1, you now need to enter https://10.0.0.1
in your browser to reconnect to the web management interface.
Subnet MaskEnter the IP subnet mask. The subnet mask specifies the network number portion of an
IP address. The UTM automatically calculates the subnet mask based on the IP
address that you assign. Unless you are implementing subnetting, use 255.255.255.0
as the subnet mask (computed by the UTM).
DHCP
Disable DHCP Server If another device on your network is the DHCP server for the default VLAN, or if you will
configure the network settin gs o f al l of your computers manually, select the Disable DHCP Server radio button to disable the DHCP server. By default, this radio button is
not selected, and the DHCP server is enabled.
Enable DHCP ServerSelect the Enable DHCP Server radio button to enable the UTM to function as a
Dynamic Host Configuration Protocol (DHCP) server, providing TCP/IP configuration
for all computers connected to the default VLAN. Enter the following settings.
Domain NameThis setting is optional. Enter the domain name of the UTM.
Starting IP
Address
Ending IP
Address
Enter the starting IP address. This address specifies the first of the
contiguous addresses in the IP address pool. Any new DHCP client
joining the LAN is assigned an IP address between this address and
the ending IP address. The IP address 192.168.1.2 is the default
starting address.
Enter the ending IP address. This address specifies the last of the
contiguous addresses in the IP address pool. Any new DHCP client
joining the LAN is assigned an IP address between the starting IP
address and this IP address. The IP address 192.168.1.100 is the
default ending address.
Note: The starting and ending DHCP IP addresses should be in the
same network as the LAN TCP/IP address of the UTM (that is, the IP
address in the LAN TCP/IP Setup section as described earlier in this
table).
Use the Setup Wizard to Provision the UTM in Y our Network
DHCP RelaySelect the DHCP Relay radio button to use the UTM as a DHCP relay agent for a
Enable LDAP
information
Primary DNS
Server
Secondary DNS
Server
WINS ServerThis setting is optional. Enter a WINS server IP address to specify
Lease TimeEnter a lease time. This specifies the duration for which IP addresses
DHCP server somewhere else on your network. Enter the following setting:
Relay GatewayThe IP address of the DHCP server for which the UTM serves as a
Select the Enable LDAP information check box to enable the DHCP server to provide
Lightweight Directory Access Protocol (LDAP) server information. Enter the following
settings.
Note: The LDAP settings that you specify as part of the VLAN profile are used only for
SSL VPN and UTM authentication, but not for web and email security.
LDAP ServerThe IP address or name of the LDAP server.
This setting is optional. If an IP address is specified, the UTM
provides this address as the primary DNS server IP address. If no
address is specified, the UTM provides its own LAN IP address as
the primary DNS server IP address.
This setting is optional. If an IP address is specified, the UTM
provides this address as the secondary DNS server IP address.
the Windows NetBIOS server, if one is present in your network.
are leased to clients.
relay.
Search BaseThe search objects that specify the location in the directory tree from
which the LDAP search begins. You can specify multiple search
objects, separated by commas. The search objects include:
•CN (for common name)
•OU (for organizational unit)
•O (for organization)
•C (for country)
•DC (for domain)
For example, to search the Netgear.net domain for all last names of
Johnson, you would enter:
cn=Johnson,dc=Netgear,dc=net
PortThe port number for the LDAP server. The default setting is 0 (zero).
DNS Proxy
Enable DNS ProxyThis setting is optional. Select the Enable DNS Proxy radio button to enable the UTM
to provide a LAN IP address for DNS address name resolution. This radio button is
selected by default.
Note: When the DNS Proxy option is disabled, all DHCP clients receive the DNS IP
addresses of the ISP but without the DNS proxy IP address.
Use the Setup Wizard to Provision the UTM in Y our Network
This setting is optional. To ensure that traffic is routed only to VLANs for which
inter-VLAN routing is enabled, select the Enable Inter VLAN Routing check box. This
setting is disabled by default. When the Enable Inter VLAN Routing check box is not
selected, traffic from this VLAN is not routed to other VLANs, and traffic from other
VLANs is not routed to this VLAN.
Note: For information about inter-VLAN firewall rules, see VLAN Rules on page 154.
After you have completed the steps in the Setup Wizard, you can ch ange the LAN settings by
selecting Network Config > LAN Settings > Edit LAN Profile. For more information about
these LAN settings, see VLAN DHCP Options on page 101.
Setup Wizard Step 2 of 10: WAN Settings
Figure 27.
Use the Setup Wizard to Provision the UTM in Y our Network
Enter the settings as explained in the following table, and then click Next to go the following
screen.
Note: Instead of manually entering the settings, you can also click the
Auto Detect action button at the bottom of the screen. The
autodetect process probes the WAN port for a range of connection
methods and suggests one that your ISP is most likely to support.
Table 5. Setup Wizard Step 2: WAN Settings screen settings
SettingDescription
ISP Login
Does your Internet
connection require a
login?
ISP Ty pe
What type of ISP
connection do you
use?
Austria (PPTP)If your ISP is Austria Telecom or any other ISP that uses PPTP for login, select this
If you need to enter login information every time you connect to the Internet through
your ISP, select the Yes radio button. Otherwise, select the No radio button, which is
the default setting, and skip the ISP Type section. If you select the Yes radio button,
enter the following settings.
LoginThe login name that your ISP has assigned to you.
PasswordThe password that your ISP has assigned to you.
If your connection is PPPoE or PPTP, then you need to log in. Select the Yes radio
button. Based on the connection that you select, the text fields that require data entry
are highlighted. If your ISP has not assigned any login information, then select the No
radio button and skip this section. If you select the Yes radio button, enter the following
settings.
radio button and enter the following settings:
Account NameThe account name is also known as the host name or system
name. Enter the valid account name for the PPTP connection
(usually your email ID assigned by your ISP). Some ISPs
require you to enter your full email address here.
Domain NameYour domain name or workgroup name assigned by your ISP,
or your ISP’s domain name. You can leave this field blank.
Idle TimeoutSelect the Keep Connected radio button to keep the
connection always on. To log out after the connection is idle
for a period:
1. Select the Idle Timeout radio button.
2. In the time-out field, enter the number of minutes to wait
before disconnecting.
This is useful if your ISP charges you based on the period that
you are logged in.
Use the Setup Wizard to Provision the UTM in Y our Network
Other (PPPoE)If you have installed login software such as WinPoET or Ethernet, then your connection
My IP AddressThe IP address assigned by the ISP to make the connection
with the ISP server.
Server IP AddressThe IP address of the PPTP server.
type is PPPoE. Select this radio button and enter the following settings:
Account NameThe valid account name for the PPPoE connection.
Domain NameThe name of your ISP’s domain or your domain name if your
ISP has assigned one. You can leave this field blank.
Idle TimeoutSelect the Keep Connected radio button to keep the
connection always on. To log out after the connection is idle
for a period:
1. Select the Idle Timeout radio button.
2. In the time-out field, enter the number of minutes to wait
before disconnecting.
This is useful if your ISP charges you based on the period that
you are logged in.
Note: When you use a PPPoE connection and select the Idle
Timeout radio button, you cannot configure load balancing
(see Configure Load Balancing (Multiple WAN Port Models)
on page 86). To use load balancing on a PPPoE connection,
select the Keep Connected radio button.
Connection ResetSelect the Connection Reset check box to specify a time
when the PPPoE WAN connection is reset, that is, the
connection is disconnected momentarily and then
reestablished. Then, specify the disconnect time and delay.
Disconnect TimeSpecify the hour and minutes when the connection should be
disconnected.
DelaySpecify the period in seconds after which the connection
should be reestablished.
Internet (IP) Address
Click the Current IP Address link to see the currently assigned IP address.
Get Dynamically from
ISP
If your ISP has not assigned you a static IP address, select the Get dynamically from ISP radio button. The ISP automatically assigns an IP address to the UTM using DHCP
network protocol.
Client IdentifierSelect the Client Identifier check box if your ISP requires the
client identifier information to assign an IP address using
DHCP.
Vendor Class Identifier Select the Vendor Class Identifier check box if your ISP
requires the vendor class identifier information to assign an IP
address using DHCP.
Use the Setup Wizard to Provision the UTM in Y our Network
SettingDescription
Use Static IP Address If your ISP has assigned you a fixed (static or permanent) IP address, select the Use
Static IP Address radio button and enter the following settings.
IP AddressThe static IP address assigned to you. This address identifies
the UTM to your ISP.
Subnet MaskThe subnet mask, which is usually provided by your ISP.
Gateway IP AddressThe IP address of the ISP’s gateway, which is usually
provided by your ISP.
Domain Name Server (DNS) Servers
Get Automatically from
ISP
Use These DNS
Servers
If your ISP has not assigned any Domain Name Servers (DNS) addresses, select the
Get Automatically from ISP radio button.
If your ISP has assigned DNS addresses to you, select the Use These DNS Servers
radio button. Make sure that you fill in valid DNS server IP addresses in the fields.
Incorrect DNS entries might cause connectivity issues.
Primary DNS ServerThe IP address of the primary DNS server.
Secondary DNS Serve The IP address of the secondary DNS server.
After you have completed the steps in the Set up Wizard, you can change to the W AN settings
by selecting Network Config > WAN Settings. Then click the Edit button in the Action
column of the WAN interface for which you want to change the settings.
For more information about these WAN settings, see Manually Configure the Internet
Connection on page 75.
Setup Wizard Step 3 of 10: System Date and Time
Figure 28.
Use the Setup Wizard to Provision the UTM in Y our Network
Enter the settings as explained in the following table, and then click Next to go the following
screen.
Table 6. Setup Wizard Step 3: System Date and Time screen settings
SettingDescription
Set Time, Date, and NTP Servers
Date/TimeFrom the drop-down list, select the local time zone in which the UTM operates. The
correct time zone is required in order for scheduling to work correctly. The UTM
includes a real-time clock (RTC), which it uses for scheduling.
Automatically Adjust for
Daylight Savings Time
NTP Server (default or
custom)
If daylight savings time is supported in your region, select the Automatically Adjust for Daylight Savings Time check box.
From the drop-down list, select an NTP server:
•Use Default NTP Servers. The UTM’s RTC is updated regularly by contacting a
default NETGEAR NTP server on the Internet.
•Use Custom NTP Servers. The UTM’s RTC is updated regularly by contacting
one of the two NTP servers (primary and backup), both of which you need to
specify in the fields that become available with this selection.
Note: If you select this option but leave either the Server 1 or Server 2 field blank, both
fields are set to the default NETGEAR NTP servers.
Note: A list of public NTP servers is available at
http://support.ntp.org/bin/view/Servers/WebHome.
Server 1 Name / IP
Address
Server 2 Name / IP
Address
Enter the IP address or host name of the primary NTP server.
Enter the IP address or host name of the backup NTP server.
After you have completed the steps in the Setup Wizard, you can change the date and time
by selecting Administration > System Date & Time. For more information about these
settings, see Configure Date and Time Service on page 456.
Setup Wizard Step 4 of 10: Services
Figure 29.
Use the Setup Wizard to Provision the UTM in Y our Network
To disable any of these services, clear the
corresponding check box. You can change the
standard service port or add another port in the
corresponding Ports to Scan field.
HTTPHTTP scanning is enabled by default
on standard service port 80.
HTTPSHT TPS scann ing is disabled by
default.
FTPFTP scanning is enabled by default
on standard service port 21.
To disable HTTP scanning, clear the corresponding
check box. You can change the standard service port
or add another port in the corresponding Ports to Scan
field.
To enable HTTPS scanning, select the corresponding
check box. You can change the standard service port
(443) or add another port in the corresponding Ports to
Scan field.
To disable FTP scanning, clear the corresponding
check box. You cannot change the standard service
port in the corresponding Ports to Scan field.
To enable scanning of encrypted emails, you need to configure the
SSL settings (see Configure HTTPS Scanning and SSL Certificates
on page 228).
After you have completed the steps in the Setup Wizard, you can change the security
services by selecting Application Security > Services. For more information about these
settings, see Customize Email Protocol Scan Settings on page 194 and Customize Web
Protocol Scan Settings on page 210.
Use the Setup Wizard to Provision the UTM in Y our Network
SMTPFrom the SMTP drop-down list, select one of the following actions to be
taken when an infected email is detected:
•Block infected email. This is the default setting. The email is
blocked, and a log entry is created.
•Delete attachment. The email is not blocked, but the attachment
is deleted, and a log entry is created.
•Log only. Only a log entry is created. The email is not blocked,
and the attachment is not deleted.
•Quarantine attachment. The email is not blocked, but the
attachment is quarantined on a ReadyNAS, and a log entry is
created (see the Note on page 193).
•Quarantine infected email. The email is quarantin ed on a
ReadyNAS, and a log entry is created (see the Note on page 193).
POP3From the POP3 drop-down list, select one of the following actions to be
taken when an infected email is detected:
•Delete attachment. This is the default setting. The email is n ot
blocked, but the attachment is deleted, and a log entry is created.
•Log only. Only a log entry is created. The email is not blocked,
and the attachment is not deleted.
•Quarantine attachment. The email is not blocked, but the
attachment is quarantined on a ReadyNAS, and a log entry is
created (see the Note on page 193).
To disable antivirus
scanning, clear the
corresponding check
box.
Use the Setup Wizard to Provision the UTM in Y our Network
IMAPFrom the IMAP drop-down list, select one of the following actions to be
taken when an infected email is detected:
•Delete attachment. This is the default setting. The email is not
blocked, but the attachment is deleted, and a log entry is created.
•Log only. Only a log entry is created. The email is not blocked,
and the attachment is not deleted.
•Quarantine attachment. The email is not blocked, but the
attachment is quarantined on a ReadyNAS, and a log entry is
created (see the Note on page 193).
Scan Exceptions
The default maximum size of the file or message that is scanned is 2048 KB, but you can define a maximum size
of up to 10240 KB. However, setting the maximum size to a high value might affect the UTM’s performance (see
Performance Management on page 428).
From the drop-down list, select one of the following actions to be taken when the file or message exceeds the
maximum size:
•Skip. The file is not scanned but skipped, leaving the end user vulnerable. This is the default setting.
•Block. The file is blocked and does not reach the end user.
To disable antivirus
scanning, clear the
corresponding check
box.
After you have completed the steps in the Setup Wizard, you can change the email security
settings by selecting Application Security > Email Anti-Virus. The Email Anti-Virus screen
also lets you specify notification settings and email alert settings. For more information about
these settings, see Customize Email Antivirus and Notification Settings on page 196.
Setup Wizard Step 6 of 10: Web Security
Figure 31.
Enter the settings as explained in the following table, and then click Next to go the following
screen.
Use the Setup Wizard to Provision the UTM in Y our Network
Table 9. Setup Wizard Step 6: Web Security screen settings
SettingDescription
Action
HTTPFrom the HTTP drop-down list, select one of the following actions to be
taken when an infected web file or object is detected:
•Delete file. This is the default setting. The web file or obj ect is
deleted, and a log entry is created.
•Log only. Only a log entry is created. The web file or object is not
deleted.
•Quarantine file. The web file or object is quarantined, and a log
entry is created (see the Note on page 193).
Select the Streaming check box to enable streaming of partially
downloaded and scanned HTTP file parts to the user. This method
allows the user to experience more transparent web downloading.
Streaming is enabled by default.
HTTPSFrom the HTTPS drop-down list, select one of the following actions to
be taken when an infected web file or object is detected:
•Delete file. This is the default setting. The web file or obj ect is
deleted, and a log entry is created.
•Log only. Only a log entry is created. The web file or object is not
deleted.
•Quarantine file. The web file or object is quarantined, and a log
entry is created (see the Note on page 193).
Select the Streaming check box to enable streaming of partially
downloaded and scanned HTTPS file parts to the user. This method
allows the user to experience more transparent web downloading.
Streaming is enabled by default.
To disable antivirus
scanning, clear the
corresponding check
box.
FTPFrom the FTP drop-down list, select one of the following actions to be
taken when an infected web file or object is detected:
•Delete file. This is the default setting. The FTP file or object is
deleted, and a log entry is created.
•Log only. Only a log entry is created. The FTP file or object is not
deleted.
•Quarantine file. The FTP file or object is quarantined, and a log
entry is created (see the Note on page 193).
Scan Exceptions
The default maximum size of the file or obj ect that is scanned is 2048 KB, but you can define a maximum size of
up to 10240 KB. However, setting the maximum size to a high value might affect the UTM’s performance (see
Performance Management on page 428).
From the drop-down list, select one of the following actions to be taken when the file or message exceeds the
maximum size:
•Skip. The file is not scanned but skipped, leaving the end user vu lnerable. This is the default setting.
•Block. The file is blocked and does reach the end user.
After you have completed the steps in the Setup Wizard, you can change the web security
settings by selecting Application Security > HTTP/HTTPS > Malware Scan. The Malware
Use the Setup Wizard to Provision the UTM in Y our Network
Scan screen also lets you specify HTML scanning and notification settings. For more
information about these settings, see Configure Web Malware or Antivirus Scans on
page 216.
Setup Wizard Step 7 of 10: Web Categories to Be Blocked
Figure 32.
Use the Setup Wizard to Provision the UTM in Y our Network
Enter the settings as explained in the following table, and then click Next to go the following
screen.
Table 10. Setup Wizard Step 7: Web Categories to be blocked screen settings
SettingDescription
Blocked Web Categories
Select the Enable Blocking check box to enable blocking of web categories. (By default, this check box is
selected.)
Select the check boxes of any web categories that you want to block. Use the action buttons at the top of the
section in the following way:
•Allow All. All web categories are allowed.
•Block All. All web categories are blo cked.
•Set to Defaults. Blocking and allowing of web categories are returned to their default settings. See
Table 41 on page 193 for information about the web categories that are blocked by default. Categories that
are preceded by a green square are allowed by default; categories that ar e preceded by a pink square are
blocked by default.
Blocked Categories Scheduled Days
Make one of the following selections:
•Select the All Days radio button to enable content filterin g to be active all days of the week.
•Select the Specific Days radio button to enable content filte ring to be acti ve on th e days tha t are speci fied
by the check boxes.
Blocked Categories Time of Day
Make one of the following selections:
•Select the All Day radio button to enable content filteri ng to be active all 24 hours of each selected day.
•Select the Specific Times radio button to enable content filtering to be a ctive during the time that is
specified by the Start Time and End Time fields for each day that content filtering is a ctive.
After you have completed the steps in th e Setup Wizard, you can change th e content-filtering
settings by selecting Application Security>HTTP/HTTPS>Content Filtering. The
Content Filtering screen lets you specify additional filtering tasks and notification se ttings. For
more information about these settings, see Configure Web Content Filtering on p ag e 218.
Use the Setup Wizard to Provision the UTM in Y our Network
Show as mail senderA descriptive name of the sender for email identification purposes. For example,
enter UTM_Notifications@netgear.com.
SMTP serverThe IP address and port number or Internet name and port number of your ISP’s
outgoing email SMTP server. The default port number is 25.
Note: If you leave this field blank, the UTM cannot send email notifications.
This server requires
authentication
Send notifications toThe email address to which the notifications should be sent. Typically, this is the
If the SMTP server requires authentication, select the This server requires authentication check box, and enter the user name and password.
User nameThe user name for SMTP server authentication.
PasswordThe password for SMTP server authentication.
email address of the administrator.
After you have completed the steps in the Setup Wizard, you can change the administrator
email notification settings by selecting Network Config > Email Notification. For more
information about these settings, see Configure the Email Notification Server on page 466.
Use the Setup Wizard to Provision the UTM in Y our Network
UpdateFrom the drop-down list, select one of the following options:
•Never. The pattern and firmware files are never automatically updated.
•Scan engine and Signatures. The pattern and firmware files are
automatically updated according to the settings in the Update Frequency
section onscreen (see explanations later in this table).
Update FromSet the update source server by selecting one of the following radio buttons:
•Default update server. Files are updated from the default NETGEAR update
server.
•Server address. Files are updated from the server that you specify. Enter the
IP address or host name of the update server in the Server address field.
Use the Setup Wizard to Provision the UTM in Y our Network
Specify the frequency with which the UTM checks for file updates:
•Weekly. From the drop-down lists, select the weekday, hour, and minutes that the updates occur.
•Daily. From the drop-down lists, select the hour and minutes that the updates occur.
•Every. From the drop-down list, select the frequency with which the updates occur. The range is from 15
minutes to 12 hours.
HTTPS Proxy Settings
EnableIf computers on the network connect to the Internet through a proxy server, select
the Enable check box to specify and enable a proxy server. Enter the following
settings.
Proxy serverThe IP address and port number of the proxy server.
User nameThe user name for proxy server authentication.
PasswordThe password for proxy server authentication.
After you have completed the steps in the Setup Wizard , you can cha nge the signatures and
engine settings by selecting Administration > System Update > Signatures & Engine. For
more information about these settings, see Update the Scan Signatures and Scan Engine
Firmware on page 454.
Setup Wizard Step 10 of 10: Saving the Configuration
Figure 35.
Click Apply to save your settings and automatically restart the system.
Use the Setup Wizard to Provision the UTM in Y our Network
•Use the Web Management Interface to Activate Licenses
•Electronic Licensing
•Automatic Retrieval of Licenses after a Factory Default Reset
Use the Web Management Interface to Activate Licenses
To receive threat management component updates and technical support, you need to
register your UTM with NETGEAR. The UTM comes with four 30-day trial licenses:
•Web protection
•Email protection
•Support and maintenance
•Application control and IPS
The service license keys are provided with the product package (see Service Registration
Card with License Keys on page 23). For electronic licensing, you do not need the service
license keys (see Electronic Licensing on page 67).
Activating the service licenses initiates their terms of use. Activate
the licenses only when you are ready to start using this unit. If your
unit has never been registered before, you can use the 30-day trial
period for all four types of licenses to perform the initial testing and
configuration. To use the trial period, do not click Register in Step
of the following procedure, but click Trial instead.
If your UTM is connected to the Internet, you can activate the service licenses:
1. Select Support > Registration. The Registration screen displays (see Figure 36 on
page 66).
2. Enter the license key in the Registration Key field.
3. Fill out the customer and va lu e -a d de d r es e ll e r ( VAR) fields.
To activate the 30-day trial period for a license, do not click
Register but click Trial instead. For more information, see the
Important information at the beginning of this section.
Use the Setup Wizard to Provision the UTM in Y our Network
To change customer or VAR information after you have registered the UTM:
1. Make the changes on the Registration screen.
2. Click Update Info. The new data is saved by the registration and update server.
To retrieve and display the registered information:
Click Retrieve Info. The re g i s t e r e d d a ta is r e t r i e v e d f r o m t h e registration and update server.
Electronic Licensing
If you have purchased the UTM with a 1- or 3-year license, you can use the electronic
licensing option. When the UTM is connected to the Internet, you need to enter only your
customer information and optional value-added reseller (VAR) information on the Register
screen but do not need to enter the license numbers. When you click Register, the UTM
automatically downloads and activates the license keys because the serial number of the
UTM is linked to the license.
If you have purchased a license from a VAR (either directly or over the web) after purchase of
the UTM, the VAR should email you the license keys or provide them to you in another way.
To register and activate the license keys, follow the regular registration procedure that is
explained in the previous section.
Automatic Retrieval of Licenses after a Factory Default Reset
When you reset the UTM to the original factory default settings after you have entered the
license keys to activate the UTM, the license keys are erased. The license keys and the
different types of licenses that are available for the UTM are no longer displayed on the
Registration screen. However , after you have reco nfigured the UTM to connect to the Internet
and to the NETGEAR registration server, the UTM can retrieve and restore all registration
information based on its MAC address and hardware serial number. You do not need to
reenter the license keys and reactivate the UTM.
To let the UTM automatically retrieve and restore all registration information:
1. Select Support > Registration. The Registration screen displays (see Figure 36 on
page 66).
2. Click Retrieve Info.
Note: In the unlikely situation that you have been directed to use a
nondefault update server, you first need to enter the update server
address in the Server address field on the Signatures & Engine
screen and click Apply (see Update the Scan Signatures and Scan
Engine Firmware on page 454) before you can let the UTM
automatically retrieve and restore all registration information.
Use the Setup Wizard to Provision the UTM in Y our Network
Test the UTM before deploying it in a live production environment. The following instructions
walk you through a couple of quick tests that are designed to ensure that your UTM is
functioning correctly.
Test Connectivity
Verify that network traffic can pass through the UTM:
1. Ping an Internet URL.
2. Ping the IP address of a device on either side of the UTM.
Test HTTP Scanning
Verify that the UTM scans HTTP traffic correctly:
1. Log in to the UTM web management interface, and then verify that HTTP scanning is
enabled. HTTP scanning is enabled by default (see Setup Wizard Step 4 of 10: Services
on page 55).
2. Take note of the web securit y settings for HTTP (see Setup Wizard Step 6 of 10: Web
Security on page 58).
3. If client computers have direct access to the Internet through your LAN, try to download the
eicar.com test file from http://www.eicar.org/download/eicar.com.
The eicar.com test file is a legitimate denial of service (DoS) attack and is safe to use
because it is not a malware threat and does not include any fragments of malware code.
The test file is provided by EICAR, an organization that unites efforts against computer
crime, fraud, and misuse of computers or networks.
4. Check the downloaded eicar.com test file, and note the attached malware information file.
What to Do Next
You have completed setting up the UTM to the network. The UTM is now ready to scan the
protocols and services that you specified and perform automatic updates based on the
update source and frequency that you specified.
If you need to change the settings, or to view reports or logs, log in to the UTM web
management interface, using the default IP address or the IP address that you assigned to
the UTM in Setup Wizard Step 1 of 10: LAN Settings on page 48.
Use the Setup Wizard to Provision the UTM in Y our Network
The UTM is ready for use. However, the following sections describe important tasks that you
might want to address before you deploy the UTM in your network:
•Configure the WAN Mode (required if you want to use multiple WAN ports)
•Configure Authentication Domains, Groups, and Users
•Manage Digital Certificates for VPN Connections
•Use the IPSec VPN Wizard for Client and Gateway Configurations
•Build a Portal Using the SSL VPN Wizard
Use the Setup Wizard to Provision the UTM in Y our Network
69
3. Manually Configure Internet and WAN
Settings
This chapter contains the following sections:
•Internet and WAN Configuration Tasks
•Automatically Detecting and Connecting the Internet Connections
•Manually Configure the Internet Connection
•Configure the WAN Mode
•Configure Secondary WAN Addresses
•Configure Dynamic DNS
•Set the UTM’s MAC Address and Configure Advanced WAN Options
•Additional WAN-Related Configuration Tasks
Note: The initial Internet configuration of the UTM is described in
Chapter 2, Use the Setup Wizard to Provision the UTM in Your
Network. If you used the Setup Wizard to configure your Internet
settings, you need this chapter only to configure WAN features such
as multiple WAN connections (not applicable to the single WAN port
models) and dynamic DNS, and to configure secondary WAN
addresses and advanced WAN options.
3
Note: The Wireless Settings configuration menu is shown on the UTM9S
and UTM25S only, accessible under the Network Config main
navigation menu.
Note: For information about configuring the DSL interface of the UTM9S
and UTM25S, see Appendix A, xDSL Network Module for the
UTM9S and UTM25S. The information in this chapter also applies to
the WAN interfaces of the UTM9S and UTM25S.
Generally, five steps, three of which are optional, are required to complete the WAN Internet
connection of your UTM.
Complete these steps:
1. Configure the Internet connections to your ISPs. During this phase, you connect to
your ISPs. See Automatically Detecting and Connecting the Internet Connections on
page 71 or Manually Configure the Internet Connection on page 75.
2. Configure the WAN mode (required for multiple WAN port models). For all models,
select either NAT or classical routing. For the multiple WAN port models, select dedicated
(single WAN) mode, auto-rollover mode, or load balancing mode. For load balancing, you
can also select any necessary protocol bindings. See Configure the WAN Mode on page 80.
3. Configure secondary WAN addresses on the WAN ports (optional). Configure aliases
for each WAN port. See Configure Secondary WAN Addresses on page 89.
4. Configure Dynamic DNS on the WAN ports (optional). Configure your fully qualified
domain names during this phase (if necessary). See Configure Dynamic DNS on page 91.
5. Configure the WAN options (optional). Optionally, you can enable each WAN port to
respond to a ping, and you can change the factory default MTU size and port speed.
However, these are advanced features, and changing them is not usually required. See Set
the UTM’s MAC Address and Configure Advanced WAN Options on page 94.
Each of these tasks is detailed separately in this chapter.
Note: For information about how to configure the WAN meters, see Enable
the WAN Traffic Meter on page 462.
Automatically Detecting and Connecting the Internet
Connections
To set up your UTM for secure Internet connections, the web management interface provides
the option to detect the network connections and configure the WAN port or ports
automatically. You can also configure the Internet connections and ports manually (see
Manually Configure the Internet Connection on page 75).
To configure the WAN ports automatically for connection to the Internet:
1. Select Network Config > WAN Settings. The WAN screen displays. (The following
figure shows the UTM50.)
Figure 37.
The UTM5 and UTM10 screens show one WAN interface; the UTM25 and UTM50
screens show two WAN interfaces; the UTM150 screen shows four WAN interfaces; the
UTM9S and UTM25S screens show two WAN interfaces, a slot (SLOT-1 or SLOT-2) in
which a xDSL network module can be installed, and a USB port in which a 3G/4G dongle
can be installed.
The WAN Settings table displays the following fields:
•WAN. The WAN interface.
•Status. The status of the WAN interface (UP or DOWN).
•WAN IP. The IP address of the WAN interface.
•Failure Detection Method. The failure detection method that is active for the WAN
interface. The following methods can be displayed:
- None
- WAN DNS (WAN DNS servers)
- Custom DNS (the IP address of the configured DNS server is displayed)
- Ping (the configured IP address is displayed)
You can set the failure detection method for each WAN interface on its corresponding
WAN Advanced Options screen (see Configure Auto-Rollover Mode and the Failure
Detection Method (Multiple WAN Port Models) on page 82).
•Action. The Edit button provides access to the WAN ISP Settings screen (se e Step 2)
for the corresponding WAN interface; the Status button provides access to the
Connection Status screen (see Step 6) for the corresponding WAN interface.
2. Click the Edit button in the Action column of the WAN interface or slot for which you want to
configure the connection to the Internet automatically. The WAN ISP Settings screen
displays.
The following figure shows the WAN1 ISP Settings screen of the UTM50 as an example:
DHCP (Dynamic IP)No data is required.
PPPoELogin, password, account name, and domain name.
PPTPLogin, password, account name, your IP address, and the server IP address.
Fixed (Static) IP IP address, subnet mask, and gateway IP address, and related data supplied
by your ISP.
•If the autodetect process does not find a connection, you are prompted to check the
physical connection between your UTM and the cable or DSL modem, satellite dish,
or wireless ISP radio antenna, or to check your UTM’s MAC address. For more
information, see Set the UTM’s MAC Address and Configure Advanced WAN Options
on page 94 and Troubleshoot the ISP Connection on page 541.
4. Click Apply to save your changes.
5. Click Test to evaluate your entries. The UTM attempts to make a connection according to
the settings that you entered.
6. To verify the connection:
a. Return to the WAN screen by selecting Network Config > WAN Settings.
b. Click the Status button in the Action column for the WAN interface that you just
configured to display the Connection Status pop-up screen.
Figure 39.
Note: The Connection Status screen should show a valid IP address and
gateway. For more information about the Connection Status screen,
see View the WAN, xDSL, or USB Port Status on page 504.
•If the automatic ISP configuration is successful:
You are connected to the Internet through the W AN interface that you just configured. For
the multiple WAN port models, continue with the configuration process for the other WAN
interfaces. If you are done with the configuration of WAN interfaces, continue with
Configure the WAN Mode on page 80.
•If the automatic ISP configuration fails:
You can attempt a manual configuration as described in Manually Configure the Internet
Connection on page 75 or you might need to change the MAC address as described in
Set the UTM’s MAC Address and Configure Advanced WAN Options on page 94. For
information about troubleshooting, see Troubleshoot the ISP Connection on page 541.
Manually Configure the Internet Connection
Unless your ISP automatically assigns your configuration through DHCP, you need to obtain
configuration parameters from your ISP to establish an Internet connection manually. The
necessary parameters for various connection types are listed in Table 13 on page 74.
To configure the WAN ISP settings for an interface manually:
1. Select Network Config > WAN Settings. The WAN screen displays (see Figure 37 on
page 72, which shows the UTM50).
2. Click the Edit button in the Action column of the WAN interface for which you want to
configure the connection to the Internet. The WAN ISP Settings screen displays (see
Figure 38 on page 73, which shows the WAN1 ISP Settings screen as an example).
3. Locate the ISP Login section onscreen:
Figure 40.
In the ISP Login section, select one of the following options:
•If your ISP requires an initial login to establish an Internet connection, select Yes.
(The default is No.)
•If a login is not required, select No, and ignore the Login and Password fields.
4. If you selected Yes, enter the login name in the Login field and the password in the
Password field. This information is provided by your ISP.
5. In the ISP Type section of the screen, select the type of ISP connection that you use from
the two listed options. By default, Other (PPPoE) is selected, as shown in the following
figure:
6. If your connection is PPTP or PPPoE, your ISP requires an initial login. Enter the settings as
explained in the following table:
Table 14. PPTP and PPPoE settings
SettingDescription
Austria (PPTP) If your ISP is Austria Telecom or any other ISP that uses PPTP for login, select this radio
button, and enter the following settings:
Account Name The account name is also known as the host name or system name.
Enter the account name for the PPTP connection (usually your email ID
assigned by your ISP). Some ISPs require you to enter your full email
address here.
Domain NameYour domain name or workgroup name assigned by your ISP, or your
ISP’s domain name. You can leave this field blank.
Idle TimeoutSelect the Keep Connected radio button to keep the connection always
on. To log out after the connection is idle for a period:
1. Select the Idle Timeout radio button.
2. In the time-out field, enter the number of minutes to wait before
disconnecting.
This is useful if your ISP charges you based on the period that you are
logged in.
My IP AddressThe IP address assigned by the ISP to make the connection with the
Other (PPPoE) If you have installed login software, then your connection type is PPPoE. Select this radio
button, and enter the following settings:
Account Name The account name for the PPPoE connection.
Domain NameThe name of your ISP’s domain or your domain name if your ISP has
you assigned one. You can leave this field blank.
Idle TimeoutSelect the Keep Connected radio button to keep the connection always
on. To log out after the connection is idle for a period:
1. Select the Idle Timeout radio button.
2. In the time-out field, enter the number of minutes to wait before
disconnecting.
This is useful if your ISP charges you based on the period that you are
logged in.
Note: When you use a PPPoE connection and select the Idle Timeout
radio button, you cannot configure load balancing (see Configure Load
Balancing (Multiple WAN Port Models) on page 86). To use load
balancing on a PPPoE connection, select the Keep Connected radio
button. When you have configured load balancing, the Idle Timeout
radio button and time-out field are masked out.
Connection
Reset
Select the Connection Reset check box to specify a time when the
PPPoE WAN connection is reset, that is, the connection is disconnected
momentarily and then reestablished. Then, specify the disconnect time
and delay.
Disconnect
Time
DelaySpecify the period in seconds after which the connection
Specify the hour and minutes when the connection should
be disconnected.
should be reestablished.
7. In the Internet (IP) Address section of the screen (see the following figure), configure the IP
address settings as explained in the following table. Click the Current IP Address link to
see the currently assigned IP address.
If your ISP has not assigned you a static IP address, select the Get Dynamically from ISP radio button. The ISP automatically assigns an IP address to the UTM using DHCP
network protocol.
Client IdentifierIf your ISP requires the client identifier information to assign an
IP address using DHCP, select the Client Identifier check box.
Vendor Class Identifier If your ISP requires the vendor class identifier information to
assign an IP address using DHCP, select the Vendor Class Identifier check box.
If your ISP has assigned you a fixed (static or permanent) IP address, select the Use Static IP Address radio button, and enter the following settings:
IP AddressStatic IP address assigned to you. This address identifies the
UTM to your ISP.
Subnet MaskThe subnet mask is usually provided by your ISP.
Gateway IP AddressThe IP address of the ISP’s gateway is usually provided by
your ISP.
8. In the Domain Name Server (DNS) Servers section of the screen (see the following figure),
specify the DNS settings as explained in the following table.
Figure 43.
Table 16. DNS server settings
SettingDescription
Get Automatically
from ISP
Use These DNS
Servers
If your ISP has not assigned any Domain Name Server (DNS) addresses, select the
Get Automatically from ISP radio button.
If your ISP has assigned DNS addresses, select the Use These DNS Servers radio
button. Make sure that you fill in valid DNS server IP addresses in the fields. Incorrect
DNS entries might cause connectivity issues.
Primary DNS ServerThe IP address of the primary DNS server.
Secondary DNS ServerThe IP address of the secondary DNS server.
9. Click Apply to save any changes to the WAN ISP settings. (Or click Reset to discard any
changes and revert to the previous settings.)
10. Click Test to evaluate your entries. The UTM attempts to make a connection according to
the settings that you entered.
11. To verify the connection:
a. Return to the WAN screen by selecting Network Config > WAN Settings.
b. Click the Status button in the Action column for the WAN interface that you just
configured to display the Connection Status pop-up screen.
Figure 44.
Note: The Connection Status screen should show a valid IP address and
gateway. For more information about the Connection Stat us screen,
see View the WAN, xDSL, or USB Port Status on page 504.
What to do next:
•If the manual ISP configuration is successful:
You are connected to the Internet through the W AN interface that you just configured. For
the multiple WAN port models, continue with the configuration process for the other WAN
interfaces. If you are done with the configuration of WAN interfaces, continue with
Configure the WAN Mode on page 80.
•If the manual ISP configuration fails:
Y ou might need to change the MAC address as de scribed in Set the UTM’s MAC Address
and Configure Advanced WAN Options on page 94. For information about
troubleshooting, see Troubleshoot the ISP Connection on page 541.
•Configure Auto-Rollover Mode and the Failure Detection Method (Multiple WAN Port
Models)
•Configure Load Balancing and Optional Protocol Binding (Multiple WAN Port Models)
Overview of the WAN Modes
For the multiple WAN port models, the UTM can be configured on a mutually exclusive basis
for either auto-rollover (for increased system reliability) or load balancing (for maximum
bandwidth efficiency). If you do not select load balancing, you need to specify one WAN
interface as the primary interface.
Note: For the UTM9S and UTM25S only, you can also use a DSL or USB
interface for load balancing mode, primary WAN mode, and
auto-rollover mode. However , in auto-rollover mode, a USB interface
can function only as a rollover interface.
For information about how to configure the DSL WAN interface, see
Appendix A, xDSL Network Module for the UTM9S and UTM25S.
For information about how to configure the USB W AN interface, see
Appendix C, 3G/4G Dongles for the UTM9S and UTM25S.
•Load balancing mode. The UTM distributes the outbound traffic equally among the
WAN interfaces that are functional. Depending on the UTM model, you can configure up
to four WAN interfaces. The UTM support s weighted load balancing and round-robin load
balancing (see Configure Load Balancing and Optional Protocol Binding (Multiple WAN
Port Models) on page 85).
Note: Scenarios could arise when load balancing needs to be bypassed
for certain traffic or applications. If cert ain traffic needs to travel on a
specific WAN interface, configure protocol binding rules for that
WAN interface. The rule should match the desired traffic.
•Primary WAN mode. The selected WAN interface is made the primary interface. The
other interfaces are disabled.
•Auto-rollover mode. A WAN interface is defined as the primary link, and another
interface needs to be defined as the rollover link. If the UTM model has more than two
WAN interfaces, the remaining interfaces are disabled. As long as the primary link is up,
all traffic is sent over the primary link. When the primary link goes down, the rollover link
is brought up to send the traffic. When the primary link comes back up, traffic
automatically rolls back to the original primary link.
If you want to use a redundant ISP link for backup purposes, select the WAN interface
that needs to function as the primary link for this mode. Ensure that the backup WAN
interface has also been configured and that you configure the WAN failure detection
method on the WAN Advanced Options screen to support auto-rollover (see Configure
Auto-Rollover Mode and the Failure Detection Method (Multiple WAN Port Models) on
page 82).
Whichever WAN mode you select for the multiple WAN port models, you also need to select
either NAT or classical routing, as explained in the following sections.
Note: NAT and classical routing also apply to the single WAN port models.
When you change the W AN mode, the WAN interface or interfaces
restart. If you change from primary WAN mode to load balancing
mode, or the other way around, the interface through which you
can access the UTM might change. Take note of the IP addresses
of the interfaces before you change the WAN mode.
Network Address Translation (NAT) allows all computers on your LAN to share a single public
Internet IP address. From the Internet, there is only a single device (the UTM) and a single IP
address. Computers on your LAN can use any private IP address range, and these IP
addresses are not visible from the Internet.
Note the following about NAT:
•The UTM uses NA T to select the corre ct computer (on your LAN) to receive any incoming
data.
•If you have only a single public Internet IP address, you need to use NAT (the default
setting).
•If your ISP has provided you with multiple public IP addresses, you can use one address
as the primary shared address for Internet access by your computers, and you can map
incoming traffic on the other public IP addresses to specific computers on your LAN. This
one-to-one inbound mapping is configured using an inbound firewall rule.
Changing the WAN mode from classical routing to NAT causes all
LAN WAN and DMZ WAN inbound rules to revert to default
settings.
To configure NAT:
1. Select Network Config > WAN Settings > WAN Mode. The WAN Mode screen
displays (see Figure 45 on page 83).
2. In the NAT (Network Address Translation) section of the screen, select the NAT radio button.
3. Click Apply to save your settings.
Configure Classical Routing (All Models)
In classical routing mode, the UTM performs routing, but without NAT. To gain Internet
access, each computer on your LAN needs to have a valid static Internet IP address.
If your ISP has allocated a number of static IP addresses to you, and yo u have assigned one
of these addresses to each computer, you can choose classical routing. Or, you can use
classical routing for routing private IP addresses within a campus environment.
To view the status of the WAN ports, you can view the Router Status screen (see View the
System Status on page 486).
Changing the WAN mode from NAT to classical routing causes all
LAN WAN and DMZ WAN inbound rules to revert to default
settings.
To configure classical routing:
1. Select Network Config > WAN Settings > WAN Mode. The WAN Mode screen
displays (see Figure 45 on page 83).
2. In the NAT (Network Address Translation) section of the screen, select the Classical
Routing radio button.
3. Click Apply to save your settings.
Configure Auto-Rollover Mode and the Failure Detection
Method (Multiple WAN Port Models)
To use a redundant ISP link for backup purposes, ensure that the backup WAN interface has
already been configured. Then select the WAN interface that should function as the primary
link for this mode, and configure the W AN failu re detection method on the W AN Mode screen
to support auto-rollover.
When the UTM is configured in auto-rollover mode, it uses the selected WAN failure
detection method to detect the status of the primary link connection at regular intervals. Link
failure is detected in one of the following ways:
•DNS queries sent to a DNS server
•Ping request sent to an IP address
•None (no failure detection is performed)
From the primary WAN interface, DNS queries or ping requests are sent to the specified IP
address. If replies are not received after a specified number of retries, the primary WAN
interface is considered down, and a rollover to the backup WAN interface occurs. When the
primary WAN interface comes back up, another rollover occurs from the backup WAN
interface back to the primary WAN interface. The WAN failure detection method that you
select applies only to the primary WAN interface, that is, it monitors the primary link only.
Configure Auto-Rollover Mode
To configure auto-rollover mode:
1. Select Network Config > WAN Settings > WAN Mode. The WAN Mode screen
displays:
Figure 45.
2. In the Load Balancing Settings section of the screen, configure the following settings:
a. Select the Primary WAN Mode radio button.
b. From the corresponding drop-down list on the right, select a WAN interface to
function as the primary WAN interface. The other WAN interface or interfaces
become disabled.
c. Select the Auto Rollover check box.
d. From the corresponding drop-down list on the right, select a WAN interface to
Select a failure detection method from the drop-down list. DNS queries or pings are sent through the WAN
interface that is being monitored. The retry interval and number of failover attempts determine how quickly
the UTM switches from the primary link to the backup link in case the primary link fails, or when the primary
link comes back up, switches back from the backup link to the primary link.
WAN DNSDNS queries are sent to the DNS server that is configured in the Domain Name
Server (DNS) Servers section of the WAN ISP screen (see Manually Configure the
Internet Connection on page 75).
Custom DNSDNS queries are sent to the specified DNS server.
PingPings are sent to a server with a public IP address. This server should not reject the
ping request and should not consider ping traffic to be abusive.
IP AddressThe IP address of the ping server.
Retry Interval isThe retry interval in seconds. The DNS query or ping is sent periodically after every
test period. The default test period is 30 seconds.
Failover afterThe number of failover attempts. The primary WAN interface is considered down
after the specified number of queries have failed to elicit a reply. The backup
interface is brought up after this situation has occurred. The failover default is
four failures.
Note: After the primary WAN interface fails, the default time to roll over is
2 minutes. The minimum test period is 30 seconds, and the
minimum number of tests is 4.
5. Click Apply to save your settings.
Note: You can configure the UTM to generate a WAN status log and email
this log to a specified address (see Configure Logging, Alerts, and
Event Notifications on page 466).
Configure Load Balancing and Optional Protocol Binding
(Multiple WAN Port Models)
To use multiple ISP links simultaneously, configure load balancing. In load balancing mode,
any WAN port carries any outbound protocol unless protocol binding is configured.
When a protocol is bound to a particular WAN port, all outgoing traffic of that protocol is
directed to the bound WAN port. For example, if the HTTPS protocol is bound to the WAN1
port and the FTP protocol is bound to the WAN2 port, then the UTM automatically routes all
outbound HTTPS traffic from the computers on the LAN through the W AN1 port. All outbound
FTP traffic is routed through the WAN2 port.
Protocol binding addresses two issues:
•Segregation of traffic between links that are not of the same speed.
High-volume traffic can be routed through the WAN port connected to a high-speed link,
and low-volume traffic can be routed through the WAN port connected to the low-speed
link.
•Continuity of source IP address for secure connections.
Some services, particularly HTTPS, cease to respond when a client’s source IP address
changes shortly after a session has been established.
Configure Load Balancing (Multiple WAN Port Models)
To configure load balancing:
1. Select Network Config > WAN Settings > WAN Mode. The WAN Mode screen
displays:
Figure 47.
Note: You cannot configure load balancing when you use a PPPoE
connection and have selected the Idle Timeout radio button on the
WAN ISP Settings screen (single WA N port models) or on one of the
WAN ISP Settings screens (multiple W AN port models); to use load
balancing on a PPPoE connection, select the Keep Connected
radio button. For more information, see Figure 41 on page 76 and
the accompanying PPPoE information in Table 14 on page 76.
2. In the Load Balancing Settings section of the screen, con figure the following settings:
a. Select the Load Balancing Mode radio button.
b. From the corresponding drop-down list on the right, select one of the following load
balancing methods:
•Weighted LB. With weighted load balancing, balance weights are calculated
based on WAN link speed and available WAN bandwidth. This is the default
setting and the most efficient load-balancing algorithm.
•Round-robin. With round-robin load balancing, new traffic connections are sent
over a WAN link in a serial method irrespective of bandwidth or link speed. For
example on a UTM150, if the WAN1, WAN2, and WAN3 interfaces are active in
round-robin load balancing mode, an HTTP request could first be sent over the
WAN1 interface, then a new FTP session could start on the WAN2 interface, and
then any new connection to the Internet could be made on the WAN3 interface.
3. Configure the protocol binding settings as explained in the following table:
Table 18. Add Protocol Binding screen settings
SettingDescription
ServiceFrom the drop-down list, select a service or application to be covered by this rule. If the
service or application does not appear in the list, you need to define it using the Services
screen (see Outbound Rules (Service Blocking) on page 129).
Local GatewayFrom the drop-down list, select one of the WAN interfaces.
Source Network The source network settings determine which computers on your network are affected by
this rule. Select one of the following options from the drop-down list:
AnyAll devices on your LAN.
Single addressIn the Start IP field, enter the IP address to which the rule is applied.
Address RangeIn the Start IP field and End IP field, enter the IP addresses for the
range to which the rule is applied.
Group 1–Group 8If this option is selected, the rule is applied to the devices that are
assigned to the selected group.
Note: You can also assign a customized name to a group (see
Change Group Names in the Network Database on page 115).
Destination
Network
The destination network settings determine which Internet locations (based on their IP
address) are covered by the rule. Select one of the following options from the drop-down
list:
AnyAll Internet IP address.
Single addressIn the Start IP field, enter the IP address to which the rule is applied.
Address rangeIn the Start IP field and End IP field, enter the IP addresses for the
4. Click Apply to save your settings. The protocol binding rule is added to the Protocol
Bindings table. The rule is automatically enabled, which is indicated by the ! status icon, a
green circle.
To edit a protocol binding:
1. On the Protocol Bindings screen (see Figure 48 on page 87), in the Protocol Bindings
table, click the Edit table button to the right of the binding that you want to edit. The Edit
Protocol Binding screen displays. This screen shows the same fields as the Add Prot o c o l
Bind i ng scre en (see the previous figure).
2. Modify the settings as explained in the previous table.
3. Click Apply to save your settings.
To enable, disable, or delete one or more protocol bindings:
1. On the Protocol Bindings screen (see Figure 48 on page 87), select the check box to the
left of each protocol binding that you want to enable, disable, or delete, or click the
Select All table button to select all bindings.
2. Click one of the following table buttons:
•Enable. Enables the binding or bindings. The ! status icon changes fr om a gray circle
to a green circle, indicating that the selected binding or bindings are enabled. (By
default, when a binding is added to the table, it is automatically enabled.)
•Disable. Disables the binding or bindings. The ! status icon changes from a green
circle to a gray circle, indicating that the selected binding or bindings are disabled.
•Delete. Deletes the binding or bindings.
Configure Secondary WAN Addresses
You can set up a single WAN port to be accessed through multiple IP addresses by adding
aliases to the port. An alias is a secondary WAN address. One advantage is, for example,
that you can assign different virtual IP addresses to a web server and an FTP server, even
though both servers use the same physical IP address. You can add several secondary IP
addresses to a single WAN port.
After you have configured secondary W AN addresses, t hese addresses are displayed o n the
following firewall rule screens:
•In the WAN Destination IP Address drop-down lists of the following inbound firewall rule
screens:
-Add LAN WAN Inbound Service screen
-Add DMZ WAN Inbound Service screen
•In the NAT IP drop-down lists of the following outbound firewall rule screens:
-Add LAN WAN Outbound Service screen
-Add DMZ WAN Outbound Service screen
For more information about firewall rules, see Overview of Rules to Block or Allow Specific
It is important that you ensure that any secondary WAN addresses are different from the
primary WAN, LAN, and DMZ IP addresses that are already configured on the UTM.
However, primary and secondary WAN addresses can be in the same subnet. The following
is an example of correctly configured IP addresses on a multiple WAN port model:
•Primary WAN1 IP address. 10.121.0.1 with subnet 255.255.255.0
•Secondary WAN1 IP address. 10.121.26.1 with subnet 255.255.255.0
•Primary WAN2 IP address. 10.216.75.1 with subnet 255.255.255.0
•Secondary WAN2 IP address. 10.216.82.1 with subnet 255.255.255.0
•DMZ IP address. 192.168.10.1 with subnet 255.255.255.0
•Primary LAN IP address. 192.168.1.1 with subnet 255.255.255.0
•Secondary LAN IP address. 192.168.2.1 with subnet 255.255.255.0
To add a secondary WAN address to a WAN interface:
1. Select Network Config > WAN Settings. The WAN screen displays (see Figure 37 on
page 72).
2. Click the Edit button in the Action column of the WAN interface for which you want to add a
secondary address. The WAN ISP Settings screen displays (see Figure 37 on page 72,
which shows the WAN1 ISP Settings screen as an example).
3. Click the Secondary Addresses option arrow at the upper right of the screen. The WAN
Secondary Addresses screen displays for the WAN interface that you selected (see the
following figure, which shows the WAN1 Secondary Addresses screen as an example, and
which includes one entry in the List of Secondary WAN addresses table).
Figure 50.
The List of Secondary WAN addresses table displays the secondary WAN IP addresses
added for the selected WAN interface.
4. In the Add WAN Secondary Addresses section of the screen, enter the following settings:
•IP Address. Enter the secondary address that you want to assign to the WAN
interface.
•Subnet Mask. Enter the subnet mask for the secondary IP address.
5. Click the Add table button in the rightmost column to add the secondary IP address to the
List of Secondary WAN addresses table.
Repeat Step 4 and Step 5 for each secondary IP address that you want to add to the List
of Secondary WAN addresses table.
To delete one or more secondary addresses:
1. In the List of Secondary WAN addresses table, select the check box to the left of each
address that you want to delete, or click the Select All table button to select all
addresses.
2. Click the Delete table button.
Configure Dynamic DNS
Dynamic DNS (DDNS) is an Internet service that allows devices with varying public IP
addresses to be located using Internet domain names. To use DDNS, you need to set up an
account with a DDNS provider such as DynDNS.org, TZO.com, Oray .net, or 3322.org. (Links
to DynDNS, TZO, Oray, and 3322 are provided for your convenience as option arrows on the
DDNS configuration screens.) The UTM firmware includes software that notifies DDNS
servers of changes in the WAN IP address, so that the services running on this network can
be accessed by others on the Internet.
If your network has a permanently assigned IP address, you can register a domain name and
have that name linked with your IP address by public Domain Name Servers (DNS).
However, if your Internet account uses a dynamically assigned IP address, you do not know
in advance what your IP address will be, and the address can change frequently—hence, the
need for a commercial DDNS service, which allows you to register an extension to its
domain, and forwards DNS requests for the resulting fully qualified domain name (FQDN) to
your frequently changing IP address.
After you have configured your account information on the UTM, when your ISP-assigned IP
address changes, your UTM automatically contacts your DDNS service provider, logs in to
your account, and registers your new IP address.
Consider the following:
•For auto-rollover mode, you need an FQDN to implement features such as exposed host s
and virtual private networks regardless of whether you have a fixed or dynamic IP
address.
•For load balancing mode, you might still need an FQDN either for convenience or if you
have a dynamic IP address.
Note: If your ISP assigns a private WAN IP address such a s 192.168.x.x or
10.x.x.x, the DDNS service does not work because private
addresses are not routed on the Internet.
4. Access the website of the DDNS service provider, and register for an account (for example,
for DynDNS.org, go to http://www .dyndns.com/).
5. Configure the DDNS service settings as explained in the following table:
Table 19. DNS service settings
SettingDescription
WAN (Dynamic DNS Status: ...)
or
WAN1 (Dynamic DNS Status: ...)
Change DNS to
(DynDNS, TZO,
Oray, or 3322)
WAN2 (Dynamic DNS Status: ...)
or
WAN3 (Dynamic DNS Status: ...)
or
WAN4 (Dynamic DNS Status: ...)
Select the Yes radio button to enable the DDNS service. The fields that display onscreen
depend on the DDNS service provider that you have selected. Enter the following
settings:
Host and Domain NameThe host and domain name for the DDNS service.
Username or
User Email Address
Password or User KeyThe password that is used for DDNS server authentica ti o n.
Use wildcardsIf your DDNS provider allows the use of wildcards in resolving
Update every 30 daysIf your WAN IP address does not often change, you might
The user name or email address for DDNS server
authentication.
your URL, you can select the Use wildcards check box to
activate this feature. For example, the wildcard feature
causes *.yourhost.dyndns.org to be aliased to the same IP
address as yourhost.dyndns.org.
need to force a periodic update to the DDNS service to
prevent your account from expiring. If the Update every 30 days check box displays, select it to enable a periodic
update.
See the information for WAN or WAN1 about how to enter the settings. You can select different DDNS
services for different WAN interfaces.
Set the UTM’s MAC Address and Configure Advanced
WAN Options
The advanced options include configuring the maximum transmission unit (MTU) size, the
port speed, and the UTM’s MAC address, and setting a rate limit on the traffic that is
forwarded by the UTM.
Note: You can also configure the failure detection method for the
auto-rollover mode on the WAN Advanced Options screen for the
corresponding WAN interface. This procedure is discussed in
Configure the Failure Detection Method on page 84.
Each computer or router on your network has a unique 48-bit local
Ethernet address. This is also referred to as the computer’s Media
Access Control (MAC) address. The default, on the WAN Advanced
Options screen, is Use Default Address. If your ISP requires MAC
authentication and another MAC address has been previously
registered with your ISP, then you need to enter that address on the
Advanced Options screen for the DSL interface.
To configure advanced WAN options:
1. Select Network Config > WAN Settings.
2. Click the Edit button in the Action column of the WAN interface for which you want to
configure the advanced options. The WAN ISP Settings screen displays (see Figure 38 on
page 73, which shows the WAN1 ISP Settings screen of the UTM50 as an example).
3. Click the Advanced optio n arrow in the upper right of the screen. The WAN Advanced
Options screen displays for the WAN interface that you selected. (The following figure shows
the WAN1 Advanced Options screen of the UTM50 as an example.)
4. Enter the settings as explained in the following table:
Table 20. Advanced WAN settings
SettingDescription
MTU Size
Make one of the following selections:
DefaultSelect the Default radio button for the normal maximum transmit unit (MTU)
value. For most Ethernet networks, this value is 1500 bytes, or 1492 bytes for
PPPoE connections.
CustomSelect the Custom radio button, and enter an MTU value in the Bytes field. For
some ISPs, you might need to reduce the MTU. This is rarely required, and
should not be done unless you are sure that it is necessary for your ISP
connection.
In most cases, the UTM can automatically determine the connection speed of the WAN port of the device
(modem or router) that provides the WAN connection. If you cannot establish an Internet connection, you
might need to select the port speed manually. If you know the Ethernet port speed of the modem or router,
select it from the drop-down list. Use the half-duplex settings only if the full-duplex settings do not function
correctly.
Select one of the following speeds from the drop-down list:
•AutoSense. Speed autosensing. This is the default setting, which can sense all Ethernet speeds and
duplex modes, including 1000BASE-T speed at full duplex.
•10BaseT Half_Duplex. Ethernet speed at half du plex.
•10BaseT Full_Duplex. Eth ernet speed at full duplex.
•100BaseT Half_Duplex. Fast Ethernet speed at half duplex.
•100BaseT Full_Duplex. Fast Ethernet speed at full duplex.
•1000BaseT Full_Duplex. Gigabit Ethernet.
Router’s MAC Address
Make one of the following selections:
Use Default AddressEach computer or router on your network has a unique 32-bit local Ethernet
address. This is also referred to as the computer’s Media Access Control (MAC)
address. To use the UTM’s own MAC address, select the Use Default Address
radio button.
Use this computer’s MAC
Address
Use this MAC AddressSelect the Use this MAC Address radio button, and manually enter the MAC
Failure Detection Method
See Configure the Failure Detection Method on page 84, including Table 17 on page 84.
Upload/Download Settings
These settings rate-limit the traffic that is forwarded by the UTM.
Select the Use this computer’s MAC Address radio button to allow the UTM to
use the MAC address of the computer yo u are now using to access the web
management interface. This setting is useful if your ISP requires MAC
authentication.
address in the field next to the radio button. You would typically enter the MAC
address that your ISP is requiring for MAC authentication.
Note: The format for the MAC address is 01:23:45:67:89:AB (numbers
0–9 and either uppercase or lowercase letters A–F). If you enter a MAC
address, the existing entry is overwritten.
WAN Connection TypeFrom the drop-down list, select the type of connection that the UTM uses to
connect to the Internet: DSL, ADSL, Cable Modem, T1, T3, or Other.
From the drop-down list, select the maximum upload speed that is provided by
your ISP. You can select from 56 Kbps to 1 Gbp s, or you can select Custom
and enter the speed in Kbps in the field below the drop-down list.
From the drop-down list, select the maximum download speed that is provided
by your ISP. You can select from 56 Kbps to 1 Gbps, or you can select Custom
and enter the speed in Kbps in the field below the drop-down list.
5. Click Apply to save your changes.
Depending on the changes that you made, when you click Apply,
the UTM restarts, or services such as HTTP and SMTP might
restart.
If you want to configure the advanced settings for an additional WA N interface, select another
WAN interface and repeat these steps.
Additional WAN-Related Configuration Tasks
•To register the UTM with NETGEAR, see Register the UTM with NETGEAR on page 65.
•To test connectivity, see Test Connectivity on page 68.
•If you want the ability to manage the UTM remotely, enable remote management (see
Configure Remote Management Access on page 438). If you enable remote
management, NETGEAR strongly recommend that you change your password (see
Change Passwords and Administrator and Guest Settings on page 436).
•You can set up the traffic meter for each WAN interface. See Enable the WAN Traffic
Meter on page 462.
Manually Configure Internet and W AN Settings
97
4. LAN Configuration
This chapter describes how to configure the advanced LAN features of your UTM. This chapter
contains the following sections:
•Manage Virtual LANs and DHCP Options
•Configure Multihome LAN IP Addresses on the Default VLAN
•Manage Groups and Hosts (LAN Groups)
•Configure and Enable the DMZ Port
•Manage Routing
Note: The initial LAN configuration of the UTM’s default VLAN 1 is
described in Chapter 2, Use the Setup Wizard to Provision the UTM
in Your Network.
4
Note: The Wireless Settings configuration menu is shown on the UTM9S
and UTM25S only, accessible under the Network Config main
navigation menu.
Manage Virtual LANs and DHCP Options
•Port-Based VLANs
•Assign and Manage VLAN Profiles
•VLAN DHCP Options
•Configure a VLAN Profile
•Configure VLAN MAC Addresses and Advanced LAN Settings
A local area network (LAN) can generally be defined as a broadcast domain. Hubs, bridges,
or switches in the same physical segment or segments connect all end node devices.
Endpoints can communicate with each other without the need for a router. Routers connect
LANs together, routing the traffic to the appropriate port.
A virtual LAN (VLAN) is a local area network with a definition that maps workstations on
some basis other than geographic location (for example, by department, type of user, or
primary application). To enable traffic to flow between VLANs, traffic needs to go through a
router, just as if the VLANs were on two separate LANs.
A VLAN is a group of computers, servers, and other network resources that behave as if they
were connected to a single network segment—even though they might not be. For example,
all marketing personnel might be spread throughout a building. Yet if they are all assigned to
a single VLAN, they can share resources and bandwidth as if they were connected to the
same segment. The resources of other departments can be invisible to the marketing VLAN
members, accessible to all, or accessible only to specified individuals, depending on how the
IT manager has set up the VLANs.
VLANs have a number of advantages:
•It is easy to set up network segmentation. Users who communicate most frequently with
each other can be grouped into common VLANs, regardless of physical location. Each
group’s traffic is contained largely within the VLAN, reducing extraneous traffic and
improving the efficiency of the whole network.
•They are easy to manage. The addition of nodes, as well as moves and other changes,
can be dealt with quickly and conveniently from a management interface rather than from
the wiring closet.
•They provide increased performance. VLANs free up bandwidth by limiting node-to-node
and broadcast traffic throughout the network.
•They ensure enhanced network security. VLANs create virtual boundaries that can be
crossed only through a router. So standard, router-based security measures can be used
to restrict access to each VLAN.
Port-Based VLANs
The UTM supports port-based VLANs. Port-based VLANs help to confine broadcast traf fic to
the LAN ports. Even though a LAN port can be a member of more than one VLAN, the port
can have only one VLAN ID as its port VLAN identifier (PVID). By default, all four LAN ports
of the UTM are assigned to the default VLAN, or VLAN 1. Therefore, by default, all four LAN
ports have the default PVID 1. However, you can assign another PVID to a LAN port by
selecting a VLAN profile from the drop-down list on the LAN Setup screen.
After you have created a VLAN profile and assigned one or more ports to the profile, you
need to enable the profile to activate it.
The UTM’s default VLAN cannot be deleted. All u nt agged traf f ic is routed throu gh the defa ult
VLAN (VLAN1), which you need to assign to at least one LAN port.
Note the following about VLANs and PVIDs:
•One physical port is assigned to at least one VLAN.
•One physical port can be assigned to multiple VLANs.
•When one port is assigned to multiple VLANs, the port is used as a trunk port to connect
•When a port receives an untagged packet, this packet is forwarded to a VLAN based on
the PVID.
•When a port receives a tagged packet, this packet is forwarded to a VLAN based on the
ID that is extracted from the tagged packet.
When you create a VLAN profile, assign LAN ports to the VLAN, and enable the VLAN, the
LAN ports that are members of the VLAN can send and receive both tagged and untagged
packets. Untagged packets that enter these LAN ports are assigned to the default PVID 1;
packets that leave these LAN ports with the same default PVID 1 are untagged. All other
packets are tagged according to the VLAN ID that you assigned to the VLAN when you
created the VLAN profile.
This is a typical scenario for a configuration with an IP phone that has two Ethernet ports, one
of which is connected to the UTM, the other one to another device:
Packets coming from the IP phone to the UTM LAN port a re tagged. Packet s passing through
the IP phone from the connected device to the UTM LAN port are untagged. When you
assign the UTM LAN port to a VLAN, packets entering and leaving the port are tagged with
the VLAN ID. However, untagged packets entering the UTM LAN port are forwarded to the
default VLAN with PVID 1; packets that leave the LAN port with the same default PVID 1 are
untagged.
Note: The configuration of the DHCP options for the default VLAN is
explained in Chapter 2, Use the Setup Wizard to Provision the UTM
in Your Network. For information about how to add and edit a VLAN
profile, including its DHCP options, see Configure a VLAN Profile on
page 103.
Assign and Manage VLAN Profiles
To assign VLAN profiles to the LAN ports and manage VLAN profiles:
1. Select Network Config > LAN Settings. The LAN submenu tabs display, with the LAN
Setup screen in view. The following figure shows the LAN Setup screen for the UTM25
with four LAN ports, and the default VLAN profile and another VLAN profile as
examples. Note that the LAN Setup screen for the UTM50 (not shown in this manual)
has six LAN ports in the Default VLAN section.
LAN Configuration
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.