ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Index-4
v1.0, September 2009
DMZ
DHCP
address pool
4-20
DNS servers
4-21
domain name
4-20
LDAP server
4-21
lease time
4-21
relay
4-21
server
4-20
WINS server
4-21
DNS proxy
4-22
firewall security
4-18
increasing traffic
10-7
IP addresses
4-20
port
1-5
,
4-18
setup settings
4-20
subnet mask
4-20
DNS
automatic configuration of PCs
1-6
dynamic
3-19
looking up an address
11-45
ModeConfig
7-45
proxy
1-6
,
2-11
,
4-10
,
4-22
proxy, VLANs
4-5
queries, auto-rollover
3-11
server IP addresses
2-10
,
2-13
,
3-9
,
4-9
,
4-21
,
8-10
,
8-
27
documentation, online
12-12
documents, reference
E-1
domain name
PPPoE
2-13
,
3-7
PPTP
2-12
,
3-7
SSL VPN
8-6
domain name server,
See
DNS
domains, for authentication
9-2
,
9-10
DoS
1-4
,
5-7
,
5-21
,
5-22
,
5-50
downloading, SSL certificate
2-3
DPD
7-28
,
7-56
DSCP
5-35
dual WAN ports (UTM25)
auto-rollover
B-6
,
B-8
,
B-10
FQDNs
3-19
,
7-1
,
7-2
,
B-1
,
B-9
load balancing
3-9
,
3-10
,
B-7
,
B-8
,
B-10
network, planning
B-1
overview
1-3
duplex, half and full
3-23
Dynamic DNS.
See
DDNS.
Dynamic Host Configuration Protocol.
See
DHCP.
1-6
DynDNS.org
3-19
,
3-21
E
e-commerce
8-1
edge device
7-38
,
7-39
eDonkey
2-17
,
6-21
EICAR
2-26
e-mail notification server
configuring manually
11-5
settings, using the Setup Wizard
2-23
SMTP server
2-23
e-mails
audio and video files, filtering
6-11
compressed files, filtering
6-11
Distributed Spam Analysis
6-16
,
6-17
executable files, filtering
6-11
filter logs
11-8
,
11-33
,
11-35
protection.
See
SMTP, POP3, or IMAP.
protocols
6-4
real-time blacklist
6-14
reports
11-39
security settings, using the Setup Wizard
2-18
spam protection
6-11
traffic statistics
11-16
whitelist and blacklist
6-12
embedded objects
6-28
environmental specifications
A-3
error messages and log messages, understanding
C-1
Ethernet ports
1-9
exceptions, Web access
6-41
exchange mode, IKE policies
7-23
,
7-26
exclusions, scanning
6-44
executable files
e-mail filtering
6-11
FTP filtering
6-41
Web filtering
6-28
exposed hosts
3-19
,
5-28
Extended Authentication.
See
XAUTH.
Содержание UTM10 - ProSecure Unified Threat Management Appliance
Страница 6: ...v1 0 September 2009 vi...
Страница 16: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual xvi v1 0 September 2009...
Страница 114: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual 4 28 LAN Configuration v1 0 September 2009...
Страница 464: ...ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual E 2 Related Documents v1 0 September 2009...