Netgear ProSecure UTM150

Netgear is better known for its network routers and switches than its security appliances. Karl Wright takes a look under the hood of the ProSecure UTM150 to see if the new unified threat management appliance is right for you.


As well as being a switch, internet gateway and a security appliance, the UTM150 is also a VPN gateway, with support for both IPSEC and browser-based SSL VPNs. Setup is relatively easy, using the built-in VPN wizard. The SSL VPN is particularly useful, allowing users to access the local network from any computer with an internet connection and a browser, no client software required. We used the VPN to remotely access our network over the course of a week, working remotely with all the machines on our server accessing files and taking over some of the systems using Remote Desktop Connection. The VPN connection was reliable throughout.

By segmenting devices on the LAN into groups, by IP address, it’s easy to apply different settings to different users, or gro

One of the things we liked most about the UTM150 was its flexibility. With it, you can block or allow access to content for everyone on your network or for certain groups only. In the Network Configuration screen, you simply arrange devices by IP address into groups. Then apply to each group the appropriate level of content filtering. You can also apply different schedules to different groups, for instance allowing a group of machines restricted access to the internet during the week. but unrestricted at the weekend. This level of specificity was very useful, making it possible to prevent some users on our network gaming and using certain websites except at the weekends.

We did have trouble with the appliance's handling of SSL certificates. Even when we had installed the UTM's root certificate in our client browsers and told the UTM to trust some of our test sites' certificates, we still had problems accessing the sites, with some content not displaying properly. There was no reason we could see for this and we couldn't find a way around it.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now

Most Popular

identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019

Five signs that it’s time to retire IT kit

29 Nov 2019