Index
A
- Active Directory Connector
- configuring / Configuring Active Directory Connector
- AD Server IP or Hostname / Configuring Active Directory Connector
- Port / Configuring Active Directory Connector
- Authentication Login / Configuring Active Directory Connector
- Authentication Password / Configuring Active Directory Connector
- Active Directory Domain / Configuring Active Directory Connector
- Active Directory Organization / Configuring Active Directory Connector
- Active Directory Login Monitor Agent
- about / The Active Directory Login Monitor Agent
- URL / The Active Directory Login Monitor Agent
- NGFW IP / The Active Directory Login Monitor Agent
- Domain / The Active Directory Login Monitor Agent
- Secret Key / The Active Directory Login Monitor Agent
- Prefix / The Active Directory Login Monitor Agent
- Exempt IP's / The Active Directory Login Monitor Agent
- Exempt Users / The Active Directory Login Monitor Agent
- Ad Blocker / Untangle NGFW modules
- about / Utilizing Untangle Ad Blocker
- working / How it works
- settings / Understanding the settings of Untangle Ad Blocker
- scan history, reviewing / Reviewing the scan history
- Lab-based training / Lab-based training
- Ad Blocker, settings
- Status / Status
- Ad Filters / Ad Filters
- Cookie filters / Cookie filters
- Pass Lists / Pass Lists
- Additional internal interfaces / Common uses of additional interfaces
- Additional WAN interfaces / Common uses of additional interfaces
- addressed interfaces
- about / Addressed interfaces
- IPv4, configuration settings / Addressed interfaces
- IPv6, configuration settings / Addressed interfaces
- DHCP, configuration settings / Addressed interfaces
- Address Resolution Protocol (ARP) / Setting up interface tests
- Ad Filters, Ad Blocker / Ad Filters
- administration notifications
- URL / Reviewing the GUI
- administration options, Untangle NGFW
- about / Untangle NGFW administration options
- troubleshooting, URL / Untangle NGFW administration options
- Web browser from LAN / Untangle NGFW administration options
- Web browser from WAN / Untangle NGFW administration options
- SSH used / Untangle NGFW administration options
- administration settings
- configuring / Configuring the administration settings
- administrators accounts, managing / Managing the administrator accounts
- remote administration settings, configuring / Configuring the remote administration settings
- Untangle NGFW public address, configuring / Configuring the public address of Untangle NGFW
- regional settings, configuring / Configuring the regional settings
- Untangle NGFW protocols processing, configuring / Configuring Untangle NGFW processing of protocols
- support settings / Understating the available support settings
- Untangle NGFW skins, changing / Changing Untangle NGFW skins
- administrative controls / Types of controls
- administrators accounts, administration settings
- configuring / Managing the administrator accounts
- admin password, initial configuration wizard
- Advanced Configuration and Power Interface (ACPI) / Understanding the boot options
- advanced options, Web Filter
- about / Other advanced options
- Advanced Programmable Interrupt Controller (APIC) / Understanding the boot options
- Adware / Types of attacks
- Android 4.0+
- OpenVPN connect, URL / Using OpenVPN with non-Windows clients
- anomaly based method, malicious activities / Identification methods
- Anonymizer
- about / The cat and mouse game
- anti-spam programs
- working / How anti-spam programs work
- DNS Black Listing (DNSBL) / How anti-spam programs work
- Heuristic/Signature-based content filtering / How anti-spam programs work
- Reputation control / How anti-spam programs work
- Collaborative content filtering / How anti-spam programs work
- Sender Policy Framework (SPF) / How anti-spam programs work
- MX callbacks / How anti-spam programs work
- White listing / How anti-spam programs work
- antivirus programs
- working / How the antivirus programs work
- appliances, Untangle NGFW
- about / Untangle NGFW appliances
- Application Control / Untangle NGFW modules
- about / Untangle Application Control
- Lite version / Untangle Application Control Lite
- Lite signatures / Adding Application Control Lite signatures
- Lite status / Application Control Lite Status
- paid version / The paid version of Application Control
- status / The Application Control status
- applications, blocking / Blocking applications/protocols
- protocols, blocking / Blocking applications/protocols
- controls, blocking / Blocking applications/protocols
- matchers / Blocking applications/protocols
- scanning history, reviewing / Reviewing the scanning history
- settings, configuring / Configuring and testing Application Control settings
- settings, testing / Configuring and testing Application Control settings
- Application Control Lite / Untangle NGFW modules
- applications, Application Control
- applications, Untangle
- Web Filter Lite / Untangle NGFW modules
- Web Filter / Untangle NGFW modules
- Virus Blocker Lite / Untangle NGFW modules
- Virus Blocker / Untangle NGFW modules
- Spam Blocker Lite / Untangle NGFW modules
- Spam Blocker / Untangle NGFW modules
- Phish Blocker / Untangle NGFW modules
- Web Cache / Untangle NGFW modules
- Bandwidth Control / Untangle NGFW modules
- HTTPS Inspector / Untangle NGFW modules
- Application Control Lite / Untangle NGFW modules
- Application Control / Untangle NGFW modules
- Captive Portal / Untangle NGFW modules
- Firewall / Untangle NGFW modules
- Intrusion Prevention / Untangle NGFW modules
- Ad Blocker / Untangle NGFW modules
- architecture, Untangle NGFW
- ARP test / Setting up interface tests
- attacks, types
- about / Types of attacks
- malware / Types of attacks
- phishing / Types of attacks
- spear-phishing / Types of attacks
- whaling / Types of attacks
- spam / Types of attacks
- Denial of Service (DoS) / Types of attacks
- Distributed Denial of Service (DDoS) / Types of attacks
- Smurf attack / Types of attacks
- Man-in-the-middle / Types of attacks
- privileges escalation / Types of attacks
- Xmas attack / Types of attacks
- URL hijacking / Types of attacks
- Typo squatting / Types of attacks
- authentication, IKE phase / How the IPsec VPN works
- authentication, VPN
- about / Understanding VPN
- automatic upgrade settings, initial configuration wizard
- configuring / Step 6 – configuring the automatic upgrade settings
B
- Backdoor / Types of attacks
- Backup and restore
- entire Untangle NGFW configurations / Backing up and restoring all Untangle NGFW configurations
- individual settings / Backing up and restoring individual settings
- Bandwidth Control / Untangle NGFW modules
- about / Bandwidth Control
- working / How does Bandwidth Control work?
- settings / Settings
- rules / Bandwidth Control rules, Rules
- setup wizard / Bandwidth Control setup wizard
- Bandwidth Monitor tool / Bandwidth Monitor
- penalty box / The penalty box
- quotas / Quotas
- scan history, reviewing / Reviewing the scan history
- Bandwidth Monitor, Bandwidth Control
- about / Bandwidth Monitor
- block lists, Web Filter
- about / Block lists
- category-based website blocking / Category-based website blocking
- individual websites, blocking / Blocking individual websites
- files and MIME types, blocking / Blocking certain files and MIME types
- boot options
- about / Understanding the boot options
- default boot / Understanding the boot options
- safe video mode / Understanding the boot options
- kern video mode / Understanding the boot options
- hardware safe mode / Understanding the boot options
- recovery mode / Understanding the boot options
- Botnet / Types of attacks
- box, Untangle NGFW
- building / Building your Untangle NGFW box
- Branding Manager / Untangle NGFW modules
- about / Branding Manager
- bridged interfaces
- about / Bridged interfaces
- Standard bridge mode / Bridged interfaces
- DMZ Bridge / Bridged interfaces
- Additional Port / Bridged interfaces
- Bypass rules / Bypass rules
C
- Cache Bypass, Web Cache
- about / Cache Bypass
- caching history, Web Cache
- reviewing / Reviewing the caching history
- captive page, Captive Portal
- customizing / Customizing the captive page
- Captive Portal / Untangle NGFW modules
- about / Untangle's Captive Portal
- working / The working of Captive Portal
- configuring / Configuring Captive Portal
- traffic capture rules, setting / Setting traffic capture rules
- common traffic capture rules / Common traffic capture rules
- passed hosts, configuring / Configuring the passed hosts
- captive page, customizing / Customizing the captive page
- user authentication method, setting / Setting the user authentication method
- events, reviewing / Reviewing Captive Portal events
- cat and mouse game
- about / The cat and mouse game
- category-based website blocking
- about / Category-based website blocking
- certificate authority (CA) / The certificate authority
- Certificate Signing Request (CSR) / The server certificate
- Challenge Handshake Authentication Protocol (CHAP) / Connecting Untangle to a RADIUS server
- change log
- reviewing / Reviewing the change log
- child racks, Policy manager / Parent and child racks
- CIA triad
- confidentiality / The CIA triad
- integrity / The CIA triad
- availability / The CIA triad
- client-to-site VPN connection
- creating / Lab-based training
- clients
- configuring, to trust Untangle's root CA / Configuring clients to trust Untangle's root CA
- Common Name (CN) field / The server certificate
- Commtouch engine / Protect your network from viruses
- Computer Antivirus Research Organization (CARO) / How the antivirus programs work
- conditions list
- confidentiality, VPN
- about / Understanding VPN
- Configuration Backup / Untangle NGFW modules
- configuration backup
- about / Configuration backup
- configurations, Untangle NGFW
- Backup and restore / Backing up and restoring all Untangle NGFW configurations
- connection details, OpenVPN
- reviewing / Reviewing the connection details
- connection events, IPsec VPN
- reviewing / Reviewing the connection events
- Connection test / Troubleshooting
- Connectivity test / Troubleshooting
- Content Delivery Networks (CDN) / HTTPS' advanced options
- controls, types
- technical / Types of controls
- management / Types of controls
- operational / Types of controls
- Cookie Filters, Ad Blocker / Cookie filters
- counter measures, IPS
- about / Counter measures
- course
- URL / Understanding VPN
D
- data integrity, VPN
- about / Understanding VPN
- Data Loss Prevention (DLP) / Introducing Untangle NGFW
- default boot, boot option / Understanding the boot options
- defense in depth
- about / Defense in depth
- layered defense / Defense in depth
- multiple tools / Defense in depth
- update all your systems and programs / Defense in depth
- Don't use the administrator account for daily activities / Defense in depth
- Read and learn / Defense in depth
- Think like an attacker / Defense in depth
- Follow up / Defense in depth
- Demilitarized Zone (DMZ) / Common uses of additional interfaces
- Denial of Service (DoS) / Types of attacks
- DHCP
- options, URL / Addressed interfaces
- advanced options / DNS and DHCP advanced options
- DHCP, configuration settings
- about / Addressed interfaces
- Enable DHCP Serving / Addressed interfaces
- Range Start / Addressed interfaces
- Range End / Addressed interfaces
- Lease Duration / Addressed interfaces
- Gateway Override / Addressed interfaces
- Netmask Override / Addressed interfaces
- DNS Override / Addressed interfaces
- DHCP Options / Addressed interfaces
- DHCP, initial configuration wizard
- automatic configurations, acquiring from / Acquiring automatic configurations from DHCP
- DHCP service, Untangle NGFW
- about / The Untangle NGFW DHCP service
- Diffie-Hellman group, IKE phase 1 / How the IPsec VPN works
- Diffie-Hellman group, IKE Phase 2 / How the IPsec VPN works
- Directory Connector / Untangle NGFW modules
- about / Directory Connector
- User Notification API / The User Notification API
- reports / Directory Connector reports
- Distributed Denial of Service (DDoS) / Types of attacks
- Distributed Intelligence Architecture (DIA) / Technical details
- DMZ Bridge / Bridged interfaces
- DNS Black Listing (DNSBL) / How anti-spam programs work
- dnsmasq command formats
- DNS service, Untangle NGFW
- about / The Untangle NGFW DNS service
- advanced options / DNS and DHCP advanced options
- DNS test / Troubleshooting, Setting up interface tests
- DoS attacks
- about / Protecting against DoS attacks
- shield, managing / Managing the shield
- shield events, reviewing / Reviewing the shield events
- Lab-based training / Lab-based training
- Download test / Troubleshooting
- Dynamic DNS / Configuring the Untangle NGFW hostname
E
- e-mail scanning
- testing / Testing e-mail scanning
- e-mail settings, Untangle NGFW
- configuring / Configuring the e-mail settings of Untangle NGFW
- outgoing e-mail server, configuring / Configuring the outgoing e-mail server
- trusted senders, configuring / Configuring trusted senders
- Untangle NGFW quarantine, managing / Managing the Untangle NGFW quarantine
- Untangle quarantine web application, accessing / Accessing Untangle's quarantine web application
- local directory, managing / Managing the local directory of Untangle NGFW
- education
- Untangle for / Using Untangle in education
- encryption, IKE phase 1 / How the IPsec VPN works
- encryption, IKE Phase 2 / How the IPsec VPN works
- European Institute for Computer Antivirus Research (EICAR) / How the antivirus programs work
- event log, Virus Blocker
- Web Event Log / Reviewing the scan history
- Email Event Log / Reviewing the scan history
- FTP Event Log / Reviewing the scan history
- events, Captive Portal
- reviewing / Reviewing Captive Portal events
- events, firewall application
- reviewing / Reviewing the events of the Firewall application
- events, Policy manager
- reviewing / Reviewing the Policy Manager events
- events, shield
- sessions / Reviewing the shield events
- Top ten shield-blocked hosts (by hits) / Reviewing the shield events
- Top ten shield-blocked users (by hits) / Reviewing the shield events
- events, WAN Failover
- reviewing / Reviewing the WAN Failover events
F
- Filter rules
- about / Filter rules
- firewall / Introducing Untangle NGFW, Untangle NGFW modules
- firewall application
- about / Understanding Untangle's Firewall application
- technical details / Technical details
- settings / Firewall settings
- events, reviewing / Reviewing the events of the Firewall application
- reports / Reviewing the events of the Firewall application
- Lab-based training / Lab-based training
- First Community Federal Credit Union (FCFCU) / Using Untangle in nonprofit organizations
- FTP scanning
- testing / Testing FTP scanning
- FTP traffic settings
- scanning / Scanning FTP traffic settings
- fully qualified domain name (FQDN) / Configuring the Untangle NGFW hostname
G
- Gateway Override / Configuring Untangle NGFW high availability
- Get / Using SNMP
- GNU General Public License (GNU GPL) / Introducing Untangle, Inc.
- government
- Untangle for / Using Untangle in government organizations
- GPO
- used, for deploying certificate / Deploying the root CA certificate using GPO
- Group Policy Object (GPO) / UNLS
- groups, remote clients
- Group Name / Understanding remote client groups
- Full Tunnel / Understanding remote client groups
- Push DNS / Understanding remote client groups
- Push DNS server / Understanding remote client groups
- Push DNS Custom 1 / Understanding remote client groups
- Push DNS Custom 2 / Understanding remote client groups
- Push DNS Domain / Understanding remote client groups
- GUI
- reviewing / Reviewing the GUI
H
- hard disk, Untangle NGFW
- preparing / Step 7 – preparing the hard disk
- hardware rating summary, Untangle NGFW
- reviewing / Step 6 – reviewing the hardware rating summary
- hardware safe mode, boot option / Understanding the boot options
- hashing, IKE phase 1 / How the IPsec VPN works
- hashing, IKE Phase 2 / How the IPsec VPN works
- healthcare
- Untangle for / Using Untangle in healthcare
- Heuristic/Signature-based content filtering / How anti-spam programs work
- high availability, Untangle NGFW
- configuring / Configuring Untangle NGFW high availability
- Enable VRRP / Configuring Untangle NGFW high availability
- VRRP ID / Configuring Untangle NGFW high availability
- VRRP Priority / Configuring Untangle NGFW high availability
- VRRP Aliases / Configuring Untangle NGFW high availability
- history, Application Control
- reviewing / Reviewing the scanning history
- about / Reviewing the scanning history
- Sessions / Reviewing the scanning history
- Top Ten Blocked Applications (by Hits) / Reviewing the scanning history
- Top Ten Flagged Applications (by Hits) / Reviewing the scanning history
- Top Ten Detected Applications (by Hits) / Reviewing the scanning history
- Top Ten Blocked Protochains (by Hits) / Reviewing the scanning history
- Top Ten Flagged Protochains (by Hits) / Reviewing the scanning history
- Top Ten Detected Protochains (by Hits) / Reviewing the scanning history
- Top Ten Blocked Hosts (by Hits) / Reviewing the scanning history
- Top Ten Flagged Hosts (by Hits) / Reviewing the scanning history
- Top Ten Detected Hosts (by Hits) / Reviewing the scanning history
- Top Ten Blocked Users (by Hits) / Reviewing the scanning history
- Top Ten Flagged Users (by Hits) / Reviewing the scanning history
- Top Ten Detected Users (by Hits) / Reviewing the scanning history
- Top Bandwidth Applications / Reviewing the scanning history
- Top Bandwidth Protochains / Reviewing the scanning history
- history, Web Filter
- reviewing / Reviewing the history
- hostname, Untangle NGFW
- configuring / Configuring the Untangle NGFW hostname
- Hot Spot Shield
- about / The cat and mouse game
- HTTPS
- and Untangle / Untangle and HTTPS
- HTTPS$ Certificate Issuer / Configuring HTTPS Inspector
- HTTPS$ Certificate Subject / Configuring HTTPS Inspector
- HTTPS$ SNI Host Name / Configuring HTTPS Inspector
- HTTPS, Web Filter
- advanced options / HTTPS' advanced options
- HTTPS Inspector / Untangle NGFW modules
- about / Utilizing HTTPS Inspector
- working / Working of HTTPS Inspector
- configuring / Configuring HTTPS Inspector
- matchers / Configuring HTTPS Inspector
- HTTPS$ SNI Host Name / Configuring HTTPS Inspector
- HTTPS$ Certificate Subject / Configuring HTTPS Inspector
- HTTPS$ Certificate Issuer / Configuring HTTPS Inspector
- inspect activity, reviewing / Reviewing the inspect activity
- settings, configuring / Configuring HTTPS Inspector settings
- functionality, testing / Testing the functionality of Web Filter
- HTTPS sessions
- about / Configuring traffic allocation
- HTTP test / Setting up interface tests
I
- IC Control
- identification methods
- about / Identification methods
- IDS
- versus IPS / IDS versus IPS
- IKE phase 1
- about / How the IPsec VPN works
- hashing / How the IPsec VPN works
- authentication / How the IPsec VPN works
- Diffie-Hellman group / How the IPsec VPN works
- lifetime / How the IPsec VPN works
- encryption / How the IPsec VPN works
- IKE Phase 2
- about / How the IPsec VPN works
- lifetime / How the IPsec VPN works
- hashing / How the IPsec VPN works
- Diffie-Hellman group / How the IPsec VPN works
- encryption / How the IPsec VPN works
- image
- writing / Writing your image
- individual settings
- Backup and restore / Backing up and restoring individual settings
- individual websites
- blocking / Blocking individual websites
- information security
- CIA triad / The CIA triad
- attacks, types / Types of attacks
- controls, types / Types of controls
- controls, URL / Types of controls
- defense in depth / Defense in depth
- initial configuration wizard
- about / The initial configuration wizard
- wizard language, selecting / Step 1 – selecting the wizard language
- admin password, setting / Step 2 – setting the admin password and server's time zone
- server time zone, setting / Step 2 – setting the admin password and server's time zone
- network cards, mapping / Step 3 – mapping the network cards
- Internet connection, configuring / Step 4 – configuring the Internet connection
- automatic configurations, acquiring from DHCP / Acquiring automatic configurations from DHCP
- interface settings, manual configuration / Manually configuring the interface settings
- Untangle NGFW operation mode, configuring / Step 5 – configuring the Untangle NGFW operation mode
- router operation mode / Understanding the router operation mode
- transparent bridge operation mode / Understanding the transparent bridge operation mode
- automatic upgrade settings, configuring / Step 6 – configuring the automatic upgrade settings
- finishing / Step 7 – finishing the initial configuration wizard
- inspect activity, HTTPS Inspector
- reviewing / Reviewing the inspect activity
- inspected sessions / Reviewing the inspect activity
- ignored sessions / Reviewing the inspect activity
- untrusted sessions / Reviewing the inspect activity
- abandoned sessions / Reviewing the inspect activity
- installation wizard language, Untangle NGFW
- interfaces, Untangle NGFW
- managing / Managing Untangle NGFW interfaces
- Additional WAN interfaces / Common uses of additional interfaces
- Additional internal interfaces / Common uses of additional interfaces
- Demilitarized Zone (DMZ) / Common uses of additional interfaces
- Additional NICs for existing networks / Common uses of additional interfaces
- configuring / Configuring Untangle NGFW interfaces
- Edit / Configuring Untangle NGFW interfaces
- Remap Interfaces / Configuring Untangle NGFW interfaces
- Refresh / Configuring Untangle NGFW interfaces
- Add Tagged VLAN Interface / Configuring Untangle NGFW interfaces
- Test Connectivity / Configuring Untangle NGFW interfaces
- Ping Test / Configuring Untangle NGFW interfaces
- configuration types / Configuring Untangle NGFW interfaces
- addressed interfaces / Configuring Untangle NGFW interfaces, Addressed interfaces
- bridged interfaces / Configuring Untangle NGFW interfaces, Bridged interfaces
- disabled interfaces / Configuring Untangle NGFW interfaces
- VLANs / Configuring Untangle NGFW interfaces, VLANs
- interface settings, initial configuration wizard
- manual configuration / Manually configuring the interface settings
- interface tests, WAN Failover
- setting up / Setting up interface tests
- ping test / Setting up interface tests
- ARP test / Setting up interface tests
- DNS test / Setting up interface tests
- HTTP test / Setting up interface tests
- Internet connection, initial configuration wizard
- configuring / Step 4 – configuring the Internet connection
- Internet Content (IC)
- about / Introducing Untangle, Inc.
- Internet Key Exchange (IKE) / How the IPsec VPN works
- Intrusion Prevention / Untangle NGFW modules
- iOS
- OpenVPN connect, URL / Using OpenVPN with non-Windows clients
- IPS
- Untangle NGFW used / Intrusion prevention using Untangle NGFW
- versus IDS / IDS versus IPS
- counter measures / Counter measures
- technical details / Technical details
- settings / Intrusion Prevention settings
- scan history / Reviewing the scan history
- Lab-based training / Lab-based training
- IPS, settings
- IPsec tunnels
- creating / Creating IPsec tunnels
- settings / Creating IPsec tunnels
- IPsec tunnels, settings
- Enable / Creating IPsec tunnels
- Description / Creating IPsec tunnels
- Connection Type / Creating IPsec tunnels
- Auto Mode / Creating IPsec tunnels
- Interface / Creating IPsec tunnels
- External IP / Creating IPsec tunnels
- Remote Host / Creating IPsec tunnels
- Local Network / Creating IPsec tunnels
- Local IP / Creating IPsec tunnels
- Remote Network / Creating IPsec tunnels
- Shared Secret / Creating IPsec tunnels
- Perfect Forward Secrecy (PFS) / Creating IPsec tunnels
- Dead Peer Detection (DPD) Interval / Creating IPsec tunnels
- DPD Timeout / Creating IPsec tunnels
- Authentication and SA/Key Exchange / Creating IPsec tunnels
- IPSec VPN / Untangle NGFW modules
- IPsec VPN
- about / IPsec VPN
- working / How the IPsec VPN works
- configuring / Configuring Untangle's IPsec VPN
- IPsec tunnels, creating / Creating IPsec tunnels
- connection events, reviewing / Reviewing the connection events
- Lab-based training / Lab-based training
- IPv4, configuration settings
- Config Type / Addressed interfaces
- about / Addressed interfaces
- Address / Addressed interfaces
- Netmask / Addressed interfaces
- Gateway / Addressed interfaces
- Primary DNS / Addressed interfaces
- Secondary DNS / Addressed interfaces
- Address Override / Addressed interfaces
- Netmask Override / Addressed interfaces
- Gateeway Override / Addressed interfaces
- Primary DNS Override / Addressed interfaces
- Secondary DNS Override / Addressed interfaces
- Renew DHCP Lease / Addressed interfaces
- Username / Addressed interfaces
- Password / Addressed interfaces
- Use Peer DNS / Addressed interfaces
- IPv4 Aliases / Addressed interfaces
- IPv4 Options-NAT traffic exiting this interface (and bridged peers) / Addressed interfaces
- IPv4 Options-NAT traffic coming from this interface (and bridged peers) / Addressed interfaces
- IPv6, configuration settings
- about / Addressed interfaces
- Config Type / Addressed interfaces
- Address / Addressed interfaces
- Prefix / Addressed interfaces
- Gateway / Addressed interfaces
- Primary DNS / Addressed interfaces
- Secondary DNS / Addressed interfaces
- IPv6 Aliases / Addressed interfaces
- IPv6 Options-Send Router Advertisements / Addressed interfaces
- IT regulatory compliance
J
- JavaScript Object Notation (JSON) file / Backing up and restoring individual settings
K
- kern video mode, boot option / Understanding the boot options
- Keylogger / Types of attacks
- keymaps, Untangle NGFW
- configuring / Step 4 – configuring the keymaps
- Kiwi
L
- L7-Filter Open project / Untangle Application Control
- lab
- setting up / Setting up your lab
- Lab-based training
- about / Lab-based training
- Web Filter settings, configuring / Configuring Web Filter settings
- Web Filter functionality, testing / Testing the functionality of Web Filter, Testing the functionality of Web Filter
- HTTPS Inspector settings, configuring / Configuring HTTPS Inspector settings
- Application Control settings, configuring / Configuring and testing Application Control settings
- Application Control settings, testing / Configuring and testing Application Control settings
- Lab-based training, AD Blocker
- about / Lab-based training
- Lab-based training, Bandwidth Control
- reviewing / Lab-based training
- Lab-based training, DoS attacks
- about / Lab-based training
- Lab-based training, firewall application
- about / Lab-based training
- Lab-based training, IPS / Lab-based training
- Lab-based training, IPsec VPN / Lab-based training
- Lab-based training, OpenVPN
- about / Lab-based training
- Lab-based training, Spam Blocker
- about / Lab-based training
- incoming spam blocking, testing / Testing the blocking of incoming spam
- outgoing spam blocking, testing / Testing the blocking of outgoing spam
- spam messages marking, testing / Testing the marking of spam message functionality
- quarantine functionality, testing / Testing the quarantine functionality
- quarantine, accessing / Accessing the quarantine
- user quarantines, administrative management / Administrative management of users' quarantines
- Lab-based training, Web Cache / Lab-based training
- Lab-based training Virus Blocker
- about / Lab-based training
- web scanning, testing / Testing web scanning
- e-mail scanning, testing / Testing e-mail scanning
- FTP scanning, testing / Testing FTP scanning
- Layer 2 Tunneling Protocol (L2TP) / How the IPsec VPN works
- options, configuring / Configuring L2TP options
- Enable L2TP Server / Configuring L2TP options
- Listen addresses / Configuring L2TP options
- Address pool / Configuring L2TP options
- Custom DNS / Configuring L2TP options
- IPsec Secret / Configuring L2TP options
- Configure Local Directory / Configuring L2TP options
- license agreement
- about / License agreement
- license details
- licensing, Untangle
- about / Licensing Untangle
- lifetime, IKE phase 1 / How the IPsec VPN works
- lifetime, IKE Phase 2 / How the IPsec VPN works
- Linux
- lists, Web Filter
- allowing / Allowing lists
- Lite signatures, Application Control
- Lite status, Application Control
- about / Application Control Lite Status
- Lite version, Application Control
- Live Support / Untangle NGFW modules
- about / Live Support
- Local Area Network (LAN) / Configuring Untangle NGFW high availability
- local directory, Untangle NGFW
M
- malicious activities
- detecting / Identification methods
- malware, types
- about / Types of attacks
- virus / Types of attacks
- worm / Types of attacks
- Rootkit / Types of attacks
- Spyware / Types of attacks
- Keylogger / Types of attacks
- Backdoor / Types of attacks
- Trojan horses / Types of attacks
- Botnet / Types of attacks
- Adware / Types of attacks
- Man-in-the-middle / Types of attacks
- managed services provider (MSP) / Untangle for SMB
- Multipurpose Internet Mail Extensions Types (MIME Types)
N
- network
- protecting, from viruses / Protect your network from viruses
- Network Access Translation (NAT)
- network address translation (NAT) / Introducing Untangle NGFW, Manually configuring the interface settings
- network cards, initial configuration wizard
- mapping / Step 3 – mapping the network cards
- Network Cards tab, options
- Maximum Transmission Unit (MTU) / Configuring advanced network options
- Ethernet Media / Configuring advanced network options
- network options, advanced
- configuring / Configuring advanced network options
- Enable SIP NAT Helper / Configuring advanced network options
- Send ICMP Redirects / Configuring advanced network options
- Enable STP (Spanning Tree) on bridgeS / Configuring advanced network options
- DHCP Authoritative / Configuring advanced network options
- network services, Untangle NGFW
- about / Untangle NGFW network services
- Network Time Protocol (NTP) / Configuring the regional settings
- NG firewall / Introducing Untangle NGFW
- NICs
- for existing networks / Common uses of additional interfaces
- non-for-profit
- Untangle for / Using Untangle in nonprofit organizations
- non-Windows clients
- OpenVPN, using with / Using OpenVPN with non-Windows clients
O
- OpenVPN / Untangle NGFW modules
- about / OpenVPN
- working / How OpenVPN works
- server settings, configuring / Configuring Untangle's OpenVPN server settings
- remote clients settings, configuring / Configuring Untangle's OpenVPN remote client settings
- remote access clients, using / Using OpenVPN remote access clients
- using, with non-Windows clients / Using OpenVPN with non-Windows clients
- using, for site-to-site connection / Using OpenVPN for site-to-site connection
- connection details, reviewing / Reviewing the connection details
- troubleshooting / Troubleshooting Untangle's OpenVPN
- Lab-based training / Lab-based training
- OpenVPN client
- using, with Windows OS / Using an OpenVPN client with Windows OS
- operation mode, Untangle NGFW
- configuring / Step 5 – configuring the Untangle NGFW operation mode
- organization unit (OU) / Configuring Active Directory Connector
- Orthopedic Associates of Grand Rapids (OGAR) / Using Untangle in healthcare
- outgoing e-mail server, Untangle NGFW
- configuring / Configuring the outgoing e-mail server
- Outlook Web App (OWA) / Common traffic capture rules
P
- packages, Untangle
- about / Untangle packages
- Packet test / Troubleshooting
- paid version, Application Control
- parent racks, Policy manager / Parent and child racks
- passed hosts, Captive Portal
- configuring / Configuring the passed hosts
- Pass Lists, Ad Blocker / Pass Lists
- Password Authentication Protocol (PAP) / Connecting Untangle to a RADIUS server
- PAT (Port Address Translation) / NAT rules
- penalty box, Bandwidth Control
- about / The penalty box
- Phish Blocker / Untangle NGFW modules
- about / No more phishing
- technical details / Technical details of Untangle Phish Blocker
- settings / Phish Blocker settings
- scan history, reviewing / Reviewing the scan history
- reports / Reviewing the scan history
- Phish Blocker, settings
- Scan SMTP / Phish Blocker settings
- Action / Phish Blocker settings
- phishing
- about / Types of attacks, No more phishing
- Ping test / Troubleshooting
- ping test / Setting up interface tests
- placement options
- about / Untangle placement options
- point-to-point protocol over Ethernet (PPPoE) / Manually configuring the interface settings
- policies, Policy manager
- configuring / Configuring Policy Manager policies
- policy based method, malicious activities / Identification methods
- Policy Manager / Untangle NGFW modules
- about / Untangle's Policy Manager
- policies / Configuring Policy Manager policies
- child racks / Parent and child racks
- parent racks / Parent and child racks
- rules, configuring / Configuring Policy Manager rules
- events, reviewing / Reviewing the Policy Manager events
- port forwarding
- about / Port forward rules
- URL / Port forward rules
- PPPoE / Addressed interfaces
- preshared key (PSK) / Understanding VPN
- privileges escalation / Types of attacks
- PROCERA networks Network Application Visibility Library (NAVL) / Untangle Application Control
- protocols, Application Control
- protocols, Untangle NGFW
- processing, configuring / Configuring Untangle NGFW processing of protocols
- proxy / Introducing Untangle NGFW
- public address, Untangle NGFW
- configuring / Configuring the public address of Untangle NGFW
- IP address from External interface / Configuring the public address of Untangle NGFW
- Hostname / Configuring the public address of Untangle NGFW
- Manually Specified Address / Configuring the public address of Untangle NGFW
Q
- Quality of Service (QoS) / How does Bandwidth Control work?
- Quality of Service (QoS) rules
- about / QoS rules
- seven priorities / The seven priorities
- settings, configuring / Configuring the QoS settings
- configuring / Configuring the QoS rules
- status, reviewing / Reviewing the QoS status
- quarantine, Untangle NGFW
- managing / Managing the Untangle NGFW quarantine
- web application, accessing / Accessing Untangle's quarantine web application
- Quota Clients / Bandwidth Control setup wizard
- Quota Exceeded Priority / Bandwidth Control setup wizard
- Quota Expiration / Bandwidth Control setup wizard
- quotas, Bandwidth Control
- about / Quotas
- Quota Size / Bandwidth Control setup wizard
R
- RADIUS server
- Untangle, connecting / Connecting Untangle to a RADIUS server
- RADIUS Server IP or Hostname / Connecting Untangle to a RADIUS server
- Port / Connecting Untangle to a RADIUS server
- Shared Secret / Connecting Untangle to a RADIUS server
- Authentication Method / Connecting Untangle to a RADIUS server
- recovery mode, boot option / Understanding the boot options
- regional settings, administration settings
- configuring / Configuring the regional settings
- remote access clients, OpenVPN
- remote administration settings
- configuring / Configuring the remote administration settings
- remote clients, OpenVPN
- settings / Configuring Untangle's OpenVPN remote client settings
- creating / Creating a remote client
- groups / Understanding remote client groups
- exported networks / Defining the exported networks
- remote desktop (RD) / The Active Directory Login Monitor Agent
- reports / Untangle NGFW modules
- about / Untangle's Reports
- settings / Configuring the settings of Untangle's Reports
- daily reports / Configuring the settings of Untangle's Reports
- weekly reports / Configuring the settings of Untangle's Reports
- monthly reports / Configuring the settings of Untangle's Reports
- generation time / Configuring the settings of Untangle's Reports
- data retention / Configuring the settings of Untangle's Reports
- viewing / Viewing Untangle's Reports
- reports, AD Blocker
- reviewing / Reviewing the scan history
- Blocked Ads / Reviewing the scan history
- Blocked Cookies / Reviewing the scan history
- Top Blocked Ad Sites / Reviewing the scan history
- Top ten blocked cookies / Reviewing the scan history
- reports, Captive Portal
- Usage / Reviewing Captive Portal events
- Top Captive Portal Users / Reviewing Captive Portal events
- Top Blocked Clients / Reviewing Captive Portal events
- reports, Directory Connector
- AD Events / Directory Connector reports
- Top AD Users / Directory Connector reports
- Total Sessions / Directory Connector reports
- Sessions / Directory Connector reports
- reports, firewall application
- sessions / Reviewing the events of the Firewall application
- Top ten Firewall flagging rules (by hits) / Reviewing the events of the Firewall application
- Top ten Firewall flagged hosts (by hits) / Reviewing the events of the Firewall application
- Top ten Firewall flagged users (by hits) / Reviewing the events of the Firewall application
- Top ten Firewall blocking rules (by hits) / Reviewing the events of the Firewall application
- Top ten Firewall blocked hosts (by hits) / Reviewing the events of the Firewall application
- Top ten Firewall blocked users (by hits) / Reviewing the events of the Firewall application
- reports, IPS settings
- about / Reports
- reports, OpenVPN
- Bandwidth usage / Reviewing the connection details
- top users / Reviewing the connection details
- reports, Phish Blocker
- Total Email / Reviewing the scan history
- Daily Phish Rate / Reviewing the scan history
- Top Ten Phishing Victims / Reviewing the scan history
- reports, Policy
- Sessions By Policy / Reviewing the Policy Manager events
- Traffic By Policy / Reviewing the Policy Manager events
- Top Policies By Sessions / Reviewing the Policy Manager events
- Top policies By Bandwidth / Reviewing the Policy Manager events
- reports, Spam Blocker
- reports, Virus Blocker
- Viruses Blocked / Reviewing the scan history
- Top Viruses Detected / Reviewing the scan history
- Top Email Viruses Detected / Reviewing the scan history
- Top Web Viruses Detected / Reviewing the scan history
- Top FTP Viruses Detected / Reviewing the scan history
- reports, Web Filter
- Web Usage / Reviewing the history
- Total Web Usage / Reviewing the history
- Top Web Browsing Hosts (by Hits) / Reviewing the history
- Top Web Browsing Hosts (by Size) / Reviewing the history
- Top Web Browsing Users (by Hits) / Reviewing the history
- Top Web Browsing Users (by Size) / Reviewing the history
- Top Categories of Violations (by Hits) / Reviewing the history
- Top Categories of Blocked Violations (by Hits) / Reviewing the history
- Top Websites (by Hits) / Reviewing the history
- Top Websites (by Size) / Reviewing the history
- Top Host Violators (by Hits) / Reviewing the history
- Top User Violators (by Hits) / Reviewing the history
- Top Violations / Reviewing the history
- Top Blocked Violations / Reviewing the history
- reports application, WAN Balancer
- about / Reviewing the WAN Balancer status
- bandwidth usage / Reviewing the WAN Balancer status
- active sessions / Reviewing the WAN Balancer status
- sessions, by WAN / Reviewing the WAN Balancer status
- traffic, by WAN / Reviewing the WAN Balancer status
- total sessions, by WAN / Reviewing the WAN Balancer status
- bandwidth, by WAN interface / Reviewing the WAN Balancer status
- reports application, WAN Failover
- WAN availability / Reviewing the WAN Failover events
- WAN interfaces' downtime / Reviewing the WAN Failover events
- WAN interfaces' failure / Reviewing the WAN Failover events
- reputation based method, malicious activities / Identification methods
- root CA
- trusting, clients configured for / Configuring clients to trust Untangle's root CA
- manual method / The manual method
- certificate deploying, GPO used / Deploying the root CA certificate using GPO
- Rootkit / Types of attacks
- route
- setting / Untangle NGFW as a router
- router
- Untangle NGFW as / Untangle NGFW as a router
- router operation mode
- route rules, WAN Balancer
- setting / Setting Route Rules
- RSYSLOG
- Rufus
- about / Writing your image
- URL / Writing your image
- rules, Bandwidth Control
- about / Rules
- rules, Policy manager
- configuring / Configuring Policy Manager rules
- rules, Untangle NGFW
- about / Understanding Untangle NGFW rules
- Enable checkbox / Understanding Untangle NGFW rules
- Description / Understanding Untangle NGFW rules
- Conditions / Understanding Untangle NGFW rules
- Action / Understanding Untangle NGFW rules
- port forward rules / Port forward rules
- Network Access Translation (NAT) rules / NAT rules
- Bypass rules / Bypass rules
- Quality of Service (QoS) rules / QoS rules
- Filter rules / Filter rules
- troubleshooting / Troubleshooting
S
- safe video mode, boot option / Understanding the boot options
- scan history, AD Blocker
- reviewing / Reviewing the scan history
- scan history, Bandwidth Control
- reviewing / Reviewing the scan history
- scan history, IPS
- reviewing / Reviewing the scan history
- attacks / Reviewing the scan history
- Top attacks (by hits) / Reviewing the scan history
- scan history, Phish Blocker
- reviewing / Reviewing the scan history
- scan history, Spam Blocker
- reviewing / Reviewing the scan history
- spam blocker event log / The spam blocker event log
- tarpit event log / The tarpit event log
- scan history, Virus Blocker
- reviewing / Reviewing the scan history
- Secure Sockets Layer (SSL) / How OpenVPN works
- security gateway / Introducing Untangle NGFW
- Sender Policy Framework (SPF) / How anti-spam programs work
- server
- registering / Registering your server
- server certificate
- about / The server certificate
- server information
- about / Server information
- Server Name Indication (SNI) / HTTPS' advanced options
- server settings, OpenVPN
- configuring / Configuring Untangle's OpenVPN server settings
- Site Name / Configuring Untangle's OpenVPN server settings
- Site URL / Configuring Untangle's OpenVPN server settings
- Server Enabled / Configuring Untangle's OpenVPN server settings
- Address Space / Configuring Untangle's OpenVPN server settings
- server time zone, initial configuration wizard
- server time zone, Untangle NGFW
- configuring / Step 5 – configuring the server's time zone
- services, Untangle
- reports / Untangle NGFW modules
- Policy Manager / Untangle NGFW modules
- Directory Connector / Untangle NGFW modules
- WAN Failover / Untangle NGFW modules
- WAN Balancer / Untangle NGFW modules
- OpenVPN / Untangle NGFW modules
- IPSec VPN / Untangle NGFW modules
- Configuration Backup / Untangle NGFW modules
- Branding Manager / Untangle NGFW modules
- Live Support / Untangle NGFW modules
- services ports, Untangle NGFW
- configuring / Configuring Untangle NGFW Services ports
- settings, firewall application
- about / Firewall settings
- shield
- managing / Managing the shield
- events, reviewing / Reviewing the shield events
- Shield module / Untangle NGFW modules
- signature based method, malicious activities / Identification methods
- site-to-site connection
- OpenVPN, using for / Using OpenVPN for site-to-site connection
- skins, Untangle NGFW
- changing / Changing Untangle NGFW skins
- URL / Changing Untangle NGFW skins
- SMB
- Untangle for / Untangle for SMB
- SMTP traffic
- scan, configuring / Configuring the scanning of the SMTP traffic
- Smurf attack / Types of attacks
- SNMP
- using / Using SNMP
- community / Using SNMP
- system contact / Using SNMP
- system location / Using SNMP
- enable traps / Using SNMP
- host / Using SNMP
- port / Using SNMP
- spam
- about / Types of attacks
- Spam Blocker / Untangle NGFW modules
- technical details / Understanding the technical details of Untangle Spam Blocker
- settings / Spam Blocker settings
- scan history, reviewing / Reviewing the scan history
- reports / Reports
- issues / Common issues with Spam Blocker
- Lab-based training / Lab-based training
- Spam Blocker, settings
- Scan SMTP / Spam Blocker settings
- Strength / Spam Blocker settings
- Action / Spam Blocker settings
- Drop Super Spam / Spam Blocker settings
- Super Spam Score / Spam Blocker settings
- Advanced SMTP Configuration / Spam Blocker settings
- Enable tarpitting / Spam Blocker settings
- Add email headers / Spam Blocker settings
- Close connection on scan failure / Spam Blocker settings
- Scan outbound (WAN) SMTP / Spam Blocker settings
- CPU Load Limit / Spam Blocker settings
- Message Size Limit / Spam Blocker settings
- spam blocker event log / The spam blocker event log
- Spam Blocker Lite / Untangle NGFW modules
- spear-phishing
- about / Types of attacks
- Spyware / Types of attacks
- SSL-based VPN
- creating / How OpenVPN works
- SSL certificates
- certificate authority (CA) / The certificate authority
- server certificate / The server certificate
- stateful firewall / Introducing Untangle NGFW
- Status, Ad Blocker / Status
- status, Application Control
- about / The Application Control status
- status, IPS settings / Status
- status, WAN Balancer
- reviewing / Reviewing the WAN Balancer status
- status, Web Cache
- about / Status
- sticky sessions / Configuring traffic allocation
- Subject DN / The server certificate
- summary reports
- about / Syslog and summary reports
- support settings, administration settings / Understating the available support settings
- syslog
- about / Syslog and summary reports
- system information
- reviewing / Reviewing system information and license details
- system locale, Untangle NGFW
- configuring / Step 3 – configuring the system locale
T
- tarpit event log / The tarpit event log
- technical details, firewall application
- about / Technical details
- technical details, IPS
- about / Technical details
- technical details, Web Filter
- about / Technical details
- tests, WAN Failover
- setting up / Setting up interface tests
- interface / Setting up interface tests
- description / Setting up interface tests
- testing interval / Setting up interface tests
- time out / Setting up interface tests
- failure threshold / Setting up interface tests
- type / Setting up interface tests
- ping test / Setting up interface tests
- ARP test / Setting up interface tests
- DNS test / Setting up interface tests
- HTTP test / Setting up interface tests
- Tor
- about / The cat and mouse game
- Traceroute test / Troubleshooting
- traffic allocation, WAN Balancer
- configuring / Configuring traffic allocation
- traffic capture rules, Captive Portal
- setting / Setting traffic capture rules
- common / Common traffic capture rules
- transparent bridge operation mode
- Transport Layer Security (TLS) / How OpenVPN works
- Trap / Using SNMP
- Trojan horses / Types of attacks
- troubleshooting, WAN Balancer
- about / Troubleshooting
- trusted senders, Untangle NGFW
- configuring / Configuring trusted senders
- Global Safe List / Configuring trusted senders
- Per-User Safe List / Configuring trusted senders
- Tunnelblick
- Typo squatting / Types of attacks
U
- UltraSurf
- about / The cat and mouse game
- Unified Threat Management (UTM) / Introducing Untangle NGFW
- unique ID (UID) / Backing up and restoring all Untangle NGFW configurations
- Untangle
- applications / Untangle NGFW modules
- services / Untangle NGFW modules
- packages / Untangle packages
- licensing / Licensing Untangle
- getting / Getting Untangle
- URL / Getting Untangle
- placement options / Untangle placement options
- administration settings / Configuring the administration settings
- SSL certificates / Managing Untangle SSL certificates
- upgrading / Upgrading Untangle
- Virus Blocker / Understanding the technical details of Untangle Virus Blocker
- Spam Blocker / Understanding the technical details of Untangle Spam Blocker
- Phish Blocker / Technical details of Untangle Phish Blocker
- Ad Blocker / Utilizing Untangle Ad Blocker
- firewall application / Understanding Untangle's Firewall application
- Web Filter / Untangle Web Filter
- HTTPS Inspector / Utilizing HTTPS Inspector
- and HTTPS / Untangle and HTTPS
- Application Control / Untangle Application Control
- Directory Connector / Directory Connector
- connecting, to RADIUS server / Connecting Untangle to a RADIUS server
- Captive Portal / Untangle's Captive Portal
- Policy Manager / Untangle's Policy Manager
- WAN Failover / WAN Failover
- WAN Balancer / WAN Balancer
- OpenVPN, troubleshooting / Troubleshooting Untangle's OpenVPN
- reports / Untangle's Reports
- Branding Manager / Branding Manager
- Live Support / Live Support
- configuration backup / Configuration backup
- in real life / Untangle in real life
- advantages / Untangle's advantages
- for SMB / Untangle for SMB
- for education / Using Untangle in education
- for healthcare / Using Untangle in healthcare
- for government / Using Untangle in government organizations
- for non-for-profit / Using Untangle in nonprofit organizations
- Untangle Inc.
- about / Introducing Untangle, Inc.
- Untangle Interfaces
- URL / Reviewing the change log
- Untangle NGFW
- about / Introducing Untangle, Inc., Introducing Untangle NGFW
- URL / Introducing Untangle, Inc.
- modules / Untangle NGFW modules, Dealing with Untangle NGFW modules
- hardware requisites / Understanding the hardware requirements of Untangle NGFW
- appliances / Untangle NGFW appliances
- box, building / Building your Untangle NGFW box
- virtualizing / Virtualizing your Untangle NGFW
- tweaking / Tweaking your Untangle NGFW
- operation mode, configuring / Step 5 – configuring the Untangle NGFW operation mode
- administration options / Untangle NGFW administration options
- booting, local console used / Untangle NGFW administration options
- architecture / Understanding the architecture of Untangle NGFW
- interfaces / Managing Untangle NGFW interfaces
- high availability, configuring / Configuring Untangle NGFW high availability
- hostname, configuring / Configuring the Untangle NGFW hostname
- services ports, configuring / Configuring Untangle NGFW Services ports
- network services / Untangle NGFW network services
- as router / Untangle NGFW as a router
- DNS service / The Untangle NGFW DNS service
- DHCP service / The Untangle NGFW DHCP service
- rules / Understanding Untangle NGFW rules
- public address, configuring / Configuring the public address of Untangle NGFW
- protocols processing, configuring / Configuring Untangle NGFW processing of protocols
- skins, changing / Changing Untangle NGFW skins
- e-mail settings, configuring / Configuring the e-mail settings of Untangle NGFW
- quarantine, managing / Managing the Untangle NGFW quarantine
- local directory, managing / Managing the local directory of Untangle NGFW
- monitoring / Monitoring your Untangle NGFW
- used, for IPS / Intrusion prevention using Untangle NGFW
- Untangle NGFW, installation
- about / Untangle NGFW installation guide
- mode, booting / Step 1 – booting and selecting the installation mode
- mode, selecting / Step 1 – booting and selecting the installation mode
- wizard language, selecting / Step 2 – selecting the installation wizard language
- system locale, configuring / Step 3 – configuring the system locale
- keymaps, configuring / Step 4 – configuring the keymaps
- server time zone, configuring / Step 5 – configuring the server's time zone
- hardware rating summary, reviewing / Step 6 – reviewing the hardware rating summary
- hard disk, preparing / Step 7 – preparing the hard disk
- finishing / Step 8 – completing the installation
- Untangle NGFW, monitoring
- SNMP used / Using SNMP
- syslog / Syslog and summary reports
- summary reports / Syslog and summary reports
- Untangle SSL certificates
- managing / Managing Untangle SSL certificates
- Untangle VM (UVM)
- about / Untangle NGFW modules
- URL hijacking / Types of attacks
- user authentication method, Captive Portal
- setting / Setting the user authentication method
- User Notification API, Directory Connector
- about / The User Notification API
- URL / The User Notification API
- UNLS / UNLS
- Active Directory Login Monitor Agent / The Active Directory Login Monitor Agent
- User Notification Login Script (UNLS)
- about / The User Notification API, UNLS
V
- virtual appliance
- virtual machine (VM) / Virtualizing your Untangle NGFW
- virtual private networking (VPN) / Introducing Untangle NGFW
- Virtual Router Redundancy Protocol (VRRP)
- virus / Types of attacks
- Virus Blocker / Untangle NGFW modules
- technical details / Understanding the technical details of Untangle Virus Blocker
- settings / Virus Blocker settings
- scan history, reviewing / Reviewing the scan history
- issues / Identifying the common issues with Untangle Virus Blocker
- Lab-based training / Lab-based training
- Virus Blocker, settings
- web traffic scan, configuring / Configuring the scanning of the web traffic
- SMTP traffic scan, configuring / Configuring the scanning of the SMTP traffic
- SMTP traffic scanning, configuring / Configuring the scanning of the SMTP traffic
- FTP traffic settings, scanning / Scanning FTP traffic settings
- Virus Blocker Lite / Untangle NGFW modules
- viruses
- network, protecting from / Protect your network from viruses
- antivirus programs, working / How the antivirus programs work
- VLANS
- VMware tools
- VPN
- about / Understanding VPN
- authentication / Understanding VPN
- data integrity / Understanding VPN
- confidentiality / Understanding VPN
W
- WAN Balancer / Untangle NGFW modules
- about / WAN Balancer
- traffic allocation, configuring / Configuring traffic allocation
- route rules, setting / Setting Route Rules
- status, reviewing / Reviewing the WAN Balancer status
- troubleshooting / Troubleshooting
- WAN Failover / Untangle NGFW modules
- about / WAN Failover
- interface tests, setting up / Setting up interface tests
- tests, setting up / Setting up interface tests
- new tests, setting up / Setting up interface tests
- events, reviewing / Reviewing the WAN Failover events
- Water & Power Authority (WAPA) / Using Untangle in government organizations
- Web Cache / Untangle NGFW modules
- about / Web Cache
- settings / Web Cache settings
- status / Status
- Cache Bypass / Cache Bypass
- caching history, reviewing / Reviewing the caching history
- Lab-based training / Lab-based training
- Web Filter / Untangle NGFW modules
- about / Untangle Web Filter
- working / Working of Web Filter
- technical details / Technical details
- block lists / Block lists
- lists, allowing / Allowing lists
- HTTPS, advanced options / HTTPS' advanced options
- advanced options / Other advanced options
- history, reviewing / Reviewing the history
- settings, configuring / Configuring Web Filter settings
- functionality, testing / Testing the functionality of Web Filter
- Web Filter Lite / Untangle NGFW modules
- web scanning
- testing / Testing web scanning
- web traffic
- scan, configuring / Configuring the scanning of the web traffic
- whaling
- about / Types of attacks
- Windows OS
- OpenVPN client, using with / Using an OpenVPN client with Windows OS
- wizard language, initial configuration wizard
- selecting / Step 1 – selecting the wizard language
- worm / Types of attacks
X
- Xmas attack / Types of attacks