This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Frage UTM

Hallo Zusammen,

ich habe mal eine Frage

ist es möglich die utm zw ein netzwerk zuhängen als real time Virenscanner

(internet verkehr )

ohne etwas am router oder an den cleints zu ändern siehe Bild

 

Vielen Dank im Voraus

 

 

 

 



This thread was automatically locked due to age.
Parents
  • I am operating in bridge mode, and very happy with the results.  If I want to block some traffic completely, I do it in my firewall, rather than with UTM DNAT-to-Nowhere rules.

    Special things to know:

    • AD SSO does not work for Transparent Mode web filtering in bridge mode.
    • Transparent Mode should use "Full Transparent", as Bob indicated.   The checkbox for Full Transparent is not enabled until bridge mode is enabled.
    • Transparent Mode Filter Profiles also serve as Standard Mode profiles.  If you are using both modes, as I recommend, then the Standard Mode profiles must be positioned first in the priority order.

    How I use web filtering:

    • Standard Mode with Authentication=AD-SSO handles browser traffic, including ftp protocol in a browser.
    • Transparent Mode with Authentication=None handles any traffic that bypasses Standard Mode, including PCs that did not get the GPO, non-browser applications that use http or https, and operating system overhead that uses http/https.   Authentication None prevents a lot of useful traffic from being blocked.

    More details are available in my post "Web Filtering Lessons Learned", which is pinned to the top of the Web Filtering sub-topic.   

  • Hi

    how to set up the bridge mode???

  • UTM maps physical interfaces (ETH0, ETH1, ETH2) to virtual interfaces (A0, A1, A2).

    A bridge is create by Adding a new interface (BR1) from two unused interface (A3, A4).

    Assuming that you want to do this without losing your configuration, you need three unused interfaces:   One for your laptop to do the configuration, and two for the bridge.   After the bridge is built, you move the internal IP address to the bridge, and change your default gateway to the firewall address, and move network cables.

    You also need to worry about what etherypes should pass through the bridge.   I know I have written on this in more detail.  I will try to find my post.

Reply
  • UTM maps physical interfaces (ETH0, ETH1, ETH2) to virtual interfaces (A0, A1, A2).

    A bridge is create by Adding a new interface (BR1) from two unused interface (A3, A4).

    Assuming that you want to do this without losing your configuration, you need three unused interfaces:   One for your laptop to do the configuration, and two for the bridge.   After the bridge is built, you move the internal IP address to the bridge, and change your default gateway to the firewall address, and move network cables.

    You also need to worry about what etherypes should pass through the bridge.   I know I have written on this in more detail.  I will try to find my post.

Children