Summary

In this chapter, we learned how to configure the different settings related to the Untangle NGFW administration and its e-mail configurations. We also learned how to create local Untangle users and how to upgrade a server. In addition, we learned how to configure system-related settings. Finally, we reviewed the system information and license details.

In the next chapter, we will begin to deal with the Untangle NGFW apps. The next chapter will cover how we can utilize Untangle NGFW apps to protect our network against different threats such as malware, spam, phishing e-mails, adware, and tracking cookies.

Get Untangle Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.