ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
2-26
Using the Setup Wizard to Provision the UTM in Your Network
v1.0, September 2009
Setup Wizard Step 10 of 10: Saving the Configuration
Click
Apply
to save your settings and automatically restart the system.
Verifying Proper Installation
Test the UTM before deploying it in a live production environment. The following instructions
walk you through a couple of quick tests that are designed to ensure that your UTM is functioning
correctly.
Testing Connectivity
Verify that network traffic can pass through the UTM:
•
Ping an Internet URL.
•
Ping the IP address of a device on either side of the UTM.
Testing HTTP Scanning
If client computers have direct access to the Internet through your LAN, try to download the
eicar.com test file from
http://www.eicar.org/download/eicar.com
.
The eicar.com test file is a legitimate DoS program and is safe to use because it is not a malware
threat and does not include any fragments of malware code. The test file is provided by EICAR, an
organization that unites efforts against computer crime, fraud, and misuse of computers or
networks.
Figure 2-16