Ir para a página of
Manuais similares
-
Network Hardware
NETGEAR WNDAP350-100NAS
136 páginas 2.61 mb -
Network Hardware
NETGEAR WNA3100M-100ENS
48 páginas 0.86 mb -
Network Hardware
NETGEAR XAV5501-100NAS
32 páginas 0.68 mb -
Network Hardware
NETGEAR A6200-100NAS
2 páginas 0.57 mb -
Network Hardware
NETGEAR RN10223D-100NAS
120 páginas 3.63 mb -
Network Hardware
NETGEAR WN604-100NAS
2 páginas 0.25 mb -
Network Hardware
NETGEAR RN10400100NAS
120 páginas 3.63 mb -
Network Hardware
NETGEAR XAVB1601-100NAS
12 páginas 0.62 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto NETGEAR STM300EW-100NAS. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoNETGEAR STM300EW-100NAS vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual NETGEAR STM300EW-100NAS você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual NETGEAR STM300EW-100NAS, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual NETGEAR STM300EW-100NAS deve conte:
- dados técnicos do dispositivo NETGEAR STM300EW-100NAS
- nome do fabricante e ano de fabricação do dispositivo NETGEAR STM300EW-100NAS
- instruções de utilização, regulação e manutenção do dispositivo NETGEAR STM300EW-100NAS
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque NETGEAR STM300EW-100NAS não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos NETGEAR STM300EW-100NAS e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço NETGEAR na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas NETGEAR STM300EW-100NAS, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo NETGEAR STM300EW-100NAS, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual NETGEAR STM300EW-100NAS. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
202-10519-01 1.0 September 2009 NETGEAR , Inc. 350 East Plumeria Drive San Jose, CA 95134 ProSecure W eb/Email Security Threat Management Appliance STM150/300/600 Reference Manual[...]
-
Página 2
ii v1.0, September 2009 © 2009 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR and the NETGEA R logo are registered trademarks and ProS ecure is a trademark of NETGEAR, Inc. Microsoft, W indows, and Windows NT ar e registered trademarks of Microsof t Corporation. Other brand and product names are registered trademarks or trademarks of th[...]
-
Página 3
v1.0, September 2009 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for comp li anc e with the regulations. V oluntary Control Co uncil for Interference (VCCI) St atement This equipment is in the second category (information eq[...]
-
Página 4
v1.0, Septembe r 2009 iv Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must reta in the above copyright notice, thi s list of conditions, and[...]
-
Página 5
v1.0, September 2009 v Product and Publication Det ails PPP Copyright (c) 1989 Carnegie Mellon University . All rights reserved. Redistribution and use in source and binary forms are permitted provide d that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other ma[...]
-
Página 6
v1.0, Septembe r 2009 vi[...]
-
Página 7
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al vii v1.0, September 2009 Content s About This Manual Conventions, Formats, and Scope .................. ................ ................... .................... ......... xiii How to Print This Manual ................ ................ ............. ................ .[...]
-
Página 8
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual viii v1.0, September 2009 Understanding the S teps for Initial Connection .. ............. ................ ................ ............... 2-4 Qualified Web Browsers .. ............. ................ ................ ................ ................ ............[...]
-
Página 9
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al ix v1.0, September 2009 Updating the Software ........ ......... ................. ................ ............. ................ ................ ... 3-19 Scheduling Updates ..... ................ ................ ................ ................ ............. ....[...]
-
Página 10
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual x v1.0, September 2009 Creating and Deleting Groups by Name ... ................ ................ ................ ............. .. 5-3 Editing Groups by Name ........... ... ... ... .... ... ............. ... ... ... .... ... ... ... .... ............ .... ... ...[...]
-
Página 11
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xi v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support Basic Functioning ..... ................ ................ ................ ................. ................ ............. ........ 7- 2 Power LED Not On ................ ................. ..[...]
-
Página 12
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xii v1.0, September 2009[...]
-
Página 13
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xiii v1.0, September 2009 About This Manual The NETGEAR ® Pr oSecu re™ W eb/Email Security Thr eat Management Appli ance STM Refer ence Manual describes how to configure and troubleshoo t a ProSecure W eb/Email Security Threat Management Appliance STM150, STM30 0, [...]
-
Página 14
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xiv v1.0, September 2009 • Scope . This manual is written for the STM according to these specifications: For more information abou t network, Internet, firewall, and VP N technologies, c lick the links to the NETGEAR website in Appendix B, “Related Documents .?[...]
-
Página 15
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-1 v1.0, September 2009 Chapter 1 Introduction This chapter provides an overview of the feat ures and capabilities of the ProSecure W eb/Email Security Threat Managem en t Appliance STM150 , STM300, or STM600. It also identifies the physical features of [...]
-
Página 16
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-2 Introduction v1.0, September 2009 In addition to scanning HTTP , HTTPS, FTP , SMTP , POP3, and IMAP traffic, the STM protects networks against spam phishing attacks and un wanted W eb use. The STM is a plug -and-play device that can be installe d and configured[...]
-
Página 17
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-3 v1.0, September 2009 Key Features and Cap abilities The STM provides the following key features and capabilities: • Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet W AN ports (see “STM Model Comparison” on page 1-5 ). • Scalable support ([...]
-
Página 18
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-4 Introduction v1.0, September 2009 S tream Scanning for Content Filtering Stream Scanni ng is based on the simple observatio n that network traffic travels in streams. The STM scan engine starts re ceiving and analyz ing tr affic as the stream enters the network[...]
-
Página 19
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-5 v1.0, September 2009 Easy Inst allation and Management Y ou can install, configure, and operate the STM wi thin minutes after connecting it to the network. The following features simplify in stallation and management tasks: • Browser -base d managem[...]
-
Página 20
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-6 Introduction v1.0, September 2009 Service Registration Card with License Keys Be sure to store the license key card that came with your STM in a secure locatio n. Y ou do need these keys to activate your product during the initial setup. Hardware Gigabit RJ-45 [...]
-
Página 21
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-7 v1.0, September 2009 Package Content s The STM prod uct package contain s the following items: • ProSecure W eb/Email Security Threat Ma nagement Appliance STM150, STM300, or STM600 • One AC power cable • Rubber feet (4) with adhesive backin g ?[...]
-
Página 22
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-8 Introduction v1.0, September 2009 Front Panel Port s and LEDs The front panels of the three STM models pro vid e different components . STM150 Front Panel Figure 1-2 shows the front panel ports and status light-emitting diodes (LEDs) of the STM150. From left to[...]
-
Página 23
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-9 v1.0, September 2009 The function of each STM150 LED is de scribed in the following table: T able 1-2. LED Descriptions for the STM150 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. T [...]
-
Página 24
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-10 Introduction v1.0, September 2009 Front Panel STM300 Figure 1-3 shows the front panel ports and LEDs of the STM300. From left to righ t, the STM300’ s front panel shows the following ports and LEDs: 1. Console port. Port for connecting to an option al co nso[...]
-
Página 25
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-11 v1.0, September 2009 The function of each STM300 LED is de scribed in the following table: T able 1-3. LED Descriptions for the STM300 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. S[...]
-
Página 26
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-12 Introduction v1.0, September 2009 Front Panel STM600 Figure 1-4 shows the front panel ports and LEDs of the STM600. From left to righ t, the STM600’ s front panel shows the following ports and LEDs: 1. Console port. Port for connecting to an option al co nso[...]
-
Página 27
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-13 v1.0, September 2009 The function of each STM600 LED is de scribed in the following table: T able 1-4. LED Descriptions for the STM600 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. S[...]
-
Página 28
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-14 Introduction v1.0, September 2009 Rear Panel Features The rear panel of the STM150 differs from the r ear panels of the STM300 and STM600. Rear Panel STM150 Figure 1-5 shows the rear panel components of the STM150. From left to right, the STM15 0’ s rear pan[...]
-
Página 29
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-15 v1.0, September 2009 Rear Panel STM300 and STM600 The rear panels of the STM300 and STM600 are identical. Figure 1-6 shows the rear panel components of the STM300 and STM600. From left to right, the STM300’ s and STM600’ s rear panel components ([...]
-
Página 30
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-16 Introduction v1.0, September 2009 STM150 Product Label STM300 Product Label Figure 1-7 Figure 1-8[...]
-
Página 31
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-17 v1.0, September 2009 STM600 Product Label Choosing a Location for the STM The STM is su itable for use in an office environm ent where it can be free-standing (on its runner feet) or mounted into a standard 19-inch eq u ipment rack. Alternatively , y[...]
-
Página 32
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-18 Introduction v1.0, September 2009 • T emperature operating limits are not likely to be exceeded. Install the unit in a clean, air- conditioned environment. For informatio n abou t the recommended operating t emperatures for the STM, see Appendix A, “Defaul[...]
-
Página 33
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-1 v1.0, September 2009 Chapter 2 Using the Setup Wizard to Provision the STM in Y our Network This chapter describes provisioning the STM in your network. This chapter contains the following sections: ?[...]
-
Página 34
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-2 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Server Group In a server group deployment, one STM appliance is installed at the gateway and another in front of the server group. This type of deployment he lps split the network[...]
-
Página 35
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-3 v1.0, September 2009 Segmented LAN Deployment In a segmented LAN deployment, one STM app lia nce is installed in front of each network segment. This type of deployme nt helps split the network load and[...]
-
Página 36
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-4 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the S t ep s for Initial Connection Generally , five steps are required to complete th e basic and security configuration of your STM: 1. Connect the STM physica ll[...]
-
Página 37
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-5 v1.0, September 2009 4. V erify the installation . See “V erifying Proper Installation” on page 2-27 . 5. Register the STM . “Registering the STM with NETGEAR” on page 2-28 . Each of these task[...]
-
Página 38
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-6 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The NETGEAR Configur ation Manager Login screen displays in th e browser (see Figu re 2-4 , which shows the STM60 0). 3. In the User field, type admin . Use lower case letters. 4.[...]
-
Página 39
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-7 v1.0, September 2009 5. Click Login. The W eb Management Interface appears, displaying the Dashboard screen. ( Figure 2-2 on page 2-3 shows the top part of the screen. Fo r information about this scree[...]
-
Página 40
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-8 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the W eb Management Interface Menu La yout Figure 2-7 shows the menu at the top of the STM600’ s W eb Management Interface. The W eb Management Interface layouts [...]
-
Página 41
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-9 v1.0, September 2009 Any of the following action buttons might be disp layed on screen (this list might not be complete): • Apply . Save and apply the configuration. • Reset . Reset the configurati[...]
-
Página 42
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-10 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Using the Setup Wizard to Perf orm the Initial Configuration The Setup W izard facilitates the initial config uration of the STM by taking you through 1 1 screens, the last of wh[...]
-
Página 43
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-11 v1.0, September 2009 Setup Wizard S tep 2 of 1 1: Networking Settings Enter the settings as explained in Ta b l e 2 - 1 , then click Next to go the following screen. Figure 2-1 1 Note: After you have [...]
-
Página 44
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-12 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 3 of 1 1: Time Zone Subnet Mask Enter the IP subnet mask. Th e subnet ma sk specifies the network n umber portion of an IP address. Unless yo u are implementin[...]
-
Página 45
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-13 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 2 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can make chang[...]
-
Página 46
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-14 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 4 of 1 1: Email Security Enter the settings as explained in T able 2-3 on page 2-15 , then click Next to go the following screen. Figure 2-13 Note: After you h[...]
-
Página 47
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-15 v1.0, September 2009 T able 2-3. Setup Wizard Step 4: Email Security Set tings Setting Description (or Sub field and Descr iption) Services to Scan SMTP SMTP scanning is enabled by defau lt on standar[...]
-
Página 48
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-16 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 IMAP From the IMAP pull-down menu, spe cify one of the following actions when an infecte d e-mail is detected: • Quaran tine att achment . The e-mail is not blocked, but the at[...]
-
Página 49
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-17 v1.0, September 2009 Setup Wizard S tep 5 of 1 1: Web Security Enter the settings as explained in Ta b l e 2 - 4 , then click Next to go the following screen. Figure 2-14 Note: After you have complete[...]
-
Página 50
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-18 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 HTTPS HTTPS scanning is disabled by default. T o enable Hype rtext T ransfer Protocol over Secure Socket Layer (HTTPS) sca nning, select the corresponding checkbox. Y ou can chan[...]
-
Página 51
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-19 v1.0, September 2009 Setup Wizard S tep 6 of 1 1: Em ail Notification Server Settings FTP From the FTP pull-down menu, specify one of the follo wing actions when an infected Web file or object is dete[...]
-
Página 52
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-20 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Enter the settings as explained in T able 2-5 on page 2-20 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can [...]
-
Página 53
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-21 v1.0, September 2009 Setup Wizard S tep 7 of 1 1: Up date Settings Enter the settings as explained in T able 2-6 on page 2-22 , then click Next to go the following screen. Figure 2-16 Note: After you [...]
-
Página 54
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-22 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 T able 2-6. Setup Wizar d Step 7: Up date Settings Setting Description (or Subfie ld and Description) System Information Y ou can not configure this section; it is shown for info[...]
-
Página 55
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-23 v1.0, September 2009 Setup Wizard S tep 8 of 1 1: HTTP Proxy Settings Enter the settings as explained in Ta b l e 2 - 7 , then click Next to go the following screen. Figure 2-17 Note: After you have c[...]
-
Página 56
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-24 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 9 of 1 1: W eb Categories Figure 2-18[...]
-
Página 57
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-25 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 8 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can make chang[...]
-
Página 58
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-26 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 10 of 1 1: Configuration Summary Figure 2-19[...]
-
Página 59
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-27 v1.0, September 2009 Click Apply to save your settings and automatically restart the system or click Back to make changes to the configuration. Setup Wizard S tep 1 1 of 1 1: Rest arting the System W [...]
-
Página 60
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-28 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The eicar .com test file is a legitimate DoS prog ram and is safe to use be cause it is not a malware threat and does not include any fragments of malware code. The test file is [...]
-
Página 61
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-29 v1.0, September 2009 2. Enter the license key in the Registration Key field. 3. Fill out the customer and V AR fields. 4. Click Registe r . 5. Repeat step 2 and step 4 for additional license keys. The[...]
-
Página 62
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-30 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 What to Do Next Y ou have completed setting up and deploying the STM to the networ k. The STM is now set up to scan the protocols and services that you specif ied for malware thr[...]
-
Página 63
3-1 v1.0, September 2009 Chapter 3 Performing Network and System Management This chapter describes the network settings, the system management features, and ways to improve the performance of the STM. If you have used the Setup W izard, you have already configured some of these settings, but there are situations in which you might want to modify th[...]
-
Página 64
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-2 Performing Network and System Ma nagement v1.0, September 2009 T o configure the STM’ s network settings: 1. Select Global Setting s > Network Settings from the menu. The Ne twork Settings submenu tabs appear with the Network Settings screen in view ( Figu[...]
-
Página 65
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-3 v1.0, September 2009 Figure 3-3 shows the Interface Speed & Duplex Set tings section of the Network Settings screen of the STM150. 2. Complete the fields and make your selections from the pull-down menus as explained in[...]
-
Página 66
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-4 Performing Network and System Ma nagement v1.0, September 2009 Subnet Mask Enter the IP subnet mask. The subn et mask specifies the network number portion of an IP address. Unless you are implement ing su bnetting, use 255.2 55.255.0 as the subnet mask. Gateway[...]
-
Página 67
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-5 v1.0, September 2009 3. Click Apply to save your settings. Changing the network settings has the following consequences: • Changing any of the settings in the Manageme nt Interface Settings se ction of the screen causes t[...]
-
Página 68
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-6 Performing Network and System Ma nagement v1.0, September 2009 2. Click the Session Limits submenu tab. The Session Limits screen displays. 3. Select the radio buttons, make your selectio ns from the pull-down menu, and complete the fields as explained in Ta b [...]
-
Página 69
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-7 v1.0, September 2009 4. Click Apply to save your settings. Cha nging any settings in the Sessi on T imeouts section of the screen requires the STM to restart. If you click Reset , the STM restar ts to restore the default ne[...]
-
Página 70
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-8 Performing Network and System Ma nagement v1.0, September 2009 T o configure the HTTP proxy: 1. Select Global Setting s > HTTP Proxy from the menu. The HTTP Proxy screen displays. 2. Select the checkbox and complete the fields as explained in Ta b l e 3 - 3 [...]
-
Página 71
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-9 v1.0, September 2009 About Users with Administ rative and Guest Privileges There are two pre-defined user types that can access the STM’ s W eb Management Interface: • Administrator . A user who has full access and the [...]
-
Página 72
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-10 Performing Network an d System Management v1.0, September 2009 2. T o modify the administrator or guest settings, select the checkbox and complete the fields as explained in Ta b l e 3 - 4 . Figure 3-6 T able 3-4. Set Password Settings scr een; Administrator a[...]
-
Página 73
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-11 v1.0, September 2009 3. Under the Administrator Settings and Guest Settings sections of the screen, click Apply to save your settings. 4. If you modified the administrato r settings and now want to modify the guest setting[...]
-
Página 74
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-12 Performing Network an d System Management v1.0, September 2009 T o configure remote management: 1. Select Administration > Remote Management from the menu The Remote Management screen displays (see Figure 3-7 on page 3-12 ). 2. In the Secure HTTPS Managemen[...]
-
Página 75
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-13 v1.0, September 2009 . Using an SNMP Manager Simple Network Management Protocol (SNMP) fo rms part of the Internet Protocol Suite as defined by the Internet Engineerin g T a sk Fo rce (IETF). SNMP is used in network manage[...]
-
Página 76
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-14 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons and comple te the field s as explained in Ta b l e 3 - 6 . Figure 3-8 T able 3-6. SNMP Settings Setting Description (or Subfie ld and Descript ion) SNMP Settings Do Y ou[...]
-
Página 77
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-15 v1.0, September 2009 3. Click Apply to save your settings. Supported MIB Browsers After you have configured the SNMP settings, you must enter the IP address of the STM in the Management Information Base (MIB) browsers thro[...]
-
Página 78
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-16 Performing Network an d System Management v1.0, September 2009 Managing the Configuration File The configuration settings of the STM are stored in a configuratio n file on the STM. This file can be saved (backed up) to a PC, retrieved (restor ed) from the PC ,[...]
-
Página 79
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-17 v1.0, September 2009 Back up your STM settings periodically , a nd store the backup file in a safe place. T o backup settings: 1. On the Backup and Rest ore Settings screen (see Figure 3-9 on pa ge 3-16 ), next to Save a c[...]
-
Página 80
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-18 Performing Network an d System Management v1.0, September 2009 Reverting to Factory Default Settings T o reset the STM to the original factory default settings, click the default button next to Revert to factory default settings on the Back up and Restore Sett[...]
-
Página 81
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-19 v1.0, September 2009 Up dating the Sof tware If you have used th e Setup W izard, you might ha ve already configured the software update settings; the Software Update screen allows you to modi fy these settings. The STM ha[...]
-
Página 82
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-20 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons, complete the field, and make your selections from the pull-down menus as explained in T able 3-7 on page 3-21 . Figure 3-10[...]
-
Página 83
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-21 v1.0, September 2009 3. Click Apply to save your settings. Performing a Manual Up date If you want to immediately check for and download available updates, perform a manual update: 1. Select Administration > Softwar e U[...]
-
Página 84
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-22 Performing Network an d System Management v1.0, September 2009 3. After the update has completed, click Apply to activate the newly updated software. Critical Up dates That Require a Rest art If a downloaded update requires a restart, you are prompted to perfo[...]
-
Página 85
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-23 v1.0, September 2009 Configuring Date and T ime Service If you have used the Setup W izard, you might have already configured the system date and time settings; the System Date and T ime screen allows you to modify these s[...]
-
Página 86
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-24 Performing Network an d System Management v1.0, September 2009 3. Click Apply to save your settings. Changing the tim e zone requires the STM to restart. T able 3-8. System Date and Ti me Settings Setting Description (or Sub field and Description) System Date [...]
-
Página 87
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-25 v1.0, September 2009 Managing Digit al Certificates The STM uses digital certificates (also known as X509 certificates) for secure web access connections over HTTPS (that is, SSL VPN connections). Digital certificates can [...]
-
Página 88
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-26 Performing Network an d System Management v1.0, September 2009 import. However , NETGEAR recommends that you re place this digital certificate with a digital certificate from a well-known commercial CA pr ior to deploying the STM in your network. The STM’ s [...]
-
Página 89
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-27 v1.0, September 2009 The top part of the Certificate Used for HTTP S Scans section displays information about the current certificate that is used for HTTPS scans Downloading the Certificate in to Y our Browser T o downloa[...]
-
Página 90
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-28 Performing Network an d System Management v1.0, September 2009 Managing T rusted Certificates T o manage trusted certificates: Select W eb Security > Certificate Management from the menu. The Certificate Management screen displays. Figure 3-16 shows only th[...]
-
Página 91
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-29 v1.0, September 2009 Importing a T rusted Certificate T o import a trusted certificate: 1. Click Br owse next to the Import from File field. 2. Navigate to a trusted certificate file on your computer . Follow the instructi[...]
-
Página 92
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-30 Performing Network an d System Management v1.0, September 2009 Deleting an Untrusted Certificate T o delete an untrusted certificate: 1. Select the certificate from the Untrusted Certificates table. 2. Click Delete Selected . Moving an Untrusted Certificate to[...]
-
Página 93
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-31 v1.0, September 2009 3. Click Apply to save your settings. Performance Management Performance management consists of controlling th e traffic through the STM so that the necessary traffic gets through when there is a bottl[...]
-
Página 94
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-32 Performing Network an d System Management v1.0, September 2009 If you want to reduce tra ffic by preventing undesired e-mails from reac hing their destinations or b y preventing access to certain sites on the Internet, you can use the STM’ s content filterin[...]
-
Página 95
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-33 v1.0, September 2009 – Setting the size of W eb files to be scanned . Scann i ng large W eb files requires netw ork resources and might slow down traffic. Y ou can specify the maximum file size that is scanned, and if fi[...]
-
Página 96
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-34 Performing Network an d System Management v1.0, September 2009[...]
-
Página 97
4-1 v1.0, September 2009 Chapter 4 Content Filtering and Optimizing Scans This chapter describes how to ap ply the content filtering features of the STM and how to opti mize scans to protect you r network. This chapter contains the following sections: • “About Content Filtering and Scans” on this page. • “Configuring E-mail Protection” [...]
-
Página 98
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-2 Content Filtering and Optim izing Scans v1.0, September 2009 Default E-mail and W eb Scan Settings For most network environm ents, the default sca n se ttings and actions that are shown in Ta b l e 4 - 1 work well but you can adjust these to th e needs of your [...]
-
Página 99
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-3 v1.0, September 2009 To o l s Alexa T oolbar Allowed GoT oMyPC Allowed Weatherbug Allowed Y ahoo T oolbar Allowed Web Object s Embedded Objects (ActiveX/Java/Flash Allowed Javascript Allowed Proxy Allowed Cookies Allowed Web[...]
-
Página 100
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-4 Content Filtering and Optim izing Scans v1.0, September 2009 Configuring E-mail Protection The STM lets you configure the following settings to protect the network’ s e-mail communication: • The e-mail protocols that are scanned for malware threats. • Act[...]
-
Página 101
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-5 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 2 . 3. Click Apply to save your settings. Customizing E-mail Anti-V irus Settings If you have used t he Setup W izard, you [...]
-
Página 102
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-6 Content Filtering and Optim izing Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 3 . Figure 4-2 T able 4-3. E-mail Anti-Virus Action Settings Setting Descr[...]
-
Página 103
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-7 v1.0, September 2009 3. Click Apply to save your settings. Configuring E-mail Anti-V irus Exception Settings T o configure the e-mail anti-virus exception setti ngs: 1. Select Email Security > Anti-V irus from the menu. T[...]
-
Página 104
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-8 Content Filtering and Optim izing Scans v1.0, September 2009 3. Make your selection from the pull-down menu s and complete the field as explained in Ta b l e 4 - 4 . 4. Click Apply to save your settings. Configuring E-mail Anti-V irus Notification Settings T o [...]
-
Página 105
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-9 v1.0, September 2009 Figure 4-4[...]
-
Página 106
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-10 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 5 . T able 4-5. E-mail Anti-Virus Notification Settings Setting Descripti[...]
-
Página 107
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-11 v1.0, September 2009 4. Click Apply to save your settings. E-mail Content Filtering The STM provides several options to filter unwa nted content from e-mails. Y o u can filter content from e-mails based on keywords in the s[...]
-
Página 108
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-12 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure e-mail content filtering: 1. Select Email Security > Filters from the menu. The Filters screen displays. Figure 4-5[...]
-
Página 109
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-13 v1.0, September 2009 2. Complete the fields and make your selections from the pull-down menus as explained in Ta b l e 4 - 6 . T able 4-6. E-mail Filter Settings Setting Description (or Subfield and Desc ription) Filter by [...]
-
Página 110
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-14 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Click Apply to save your settings. Protecting Against E-mail S pam The STM integrates multiple anti-spam technologi es to provide comprehensive protection against unwanted e-mail. Y ou can enable [...]
-
Página 111
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-15 v1.0, September 2009 2. Blacklist . E-mails from the specified sources are considered spam and are blocked. 3. Real-time blacklist . E-mails from known spam sources that are collected by blacklist providers are blocked. 4. [...]
-
Página 112
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-16 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the whitelist and blacklist: 1. Select Email Security > Anti-Spam from the menu. The Anti-Sp am submenu tabs appear , with the Whitelist/Blacklist screen in view . Figure 4-6[...]
-
Página 113
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-17 v1.0, September 2009 2. Complete the fields as explained in Ta b l e 4 - 6 . Configuring the Real-time Blacklist Blacklist providers are organizations that collect IP addresses of verified open SMTP relays that might be use[...]
-
Página 114
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-18 Content Filtering and Optimizin g Scans v1.0, September 2009 By default, the STM comes with two pre-define d blacklist providers: Spamhaus, and Spamcop. Y ou can add a maximum of 16 black list providers to the RBL sources. T o enable the real-time blacklist: 1[...]
-
Página 115
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-19 v1.0, September 2009 Configuring Distributed S pam Analysis Spam, phishing, and other e-mail- borne threats consist of milli ons of messages intentionally composed diff erently to evade co mmonly-used filters. Nonetheless, [...]
-
Página 116
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-20 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 8 . Figure 4-8 T able 4-8. Distributed S pam Analysis Settings Setting De[...]
-
Página 117
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-21 v1.0, September 2009 4. Click Apply to save your settings. The Distributed Spam Analysis sec tion and the Send Quarantine Spam Report section each have their own Apply and Reset buttons to enable you to make changes to thes[...]
-
Página 118
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-22 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring W eb and Services Protection The STM lets you confi gure the following se ttings to protect the network’ s Internet communication: • The W eb protocols that are scanned for malware th[...]
-
Página 119
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-23 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 8 . 3. Click Apply to save your settings Figure 4-9 T able 4-9. Web Policy Settings Setting Description Services to Scan H[...]
-
Página 120
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-24 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Web Malware Scans If you have used the Setup W izard, you might have already configured the W eb malware action and exception scan settings; the Ma lware Scan screen allows you to modify [...]
-
Página 121
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-25 v1.0, September 2009 T able 4-10. Malware S can Settings Setting Description Action HTTP and HTTPS Action From the HTTP or HTTPS pull-d own menu, specify one of the following actions when an i nfected Web file or object is [...]
-
Página 122
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-26 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Click Apply to save your settings. Configuring Web Content Filtering If you want to restrict internal LAN users from a ccess to certain types of information and objects on the Internet, use the ST[...]
-
Página 123
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-27 v1.0, September 2009 If you have used the S etup W izard, you might have already config ured the W eb category block ing settings; the Content Filtering screen al lows you to modi fy these settings. T o configure W eb conte[...]
-
Página 124
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-28 Content Filtering and Optimizin g Scans v1.0, September 2009 . Figure 4-12 [Content Filtering, scre en 2 of 3][...]
-
Página 125
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-29 v1.0, September 2009 . 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in T able 4-1 1 on page 4-30 . Figure 4-13 [Content Filtering, scre en 3 of 3][...]
-
Página 126
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-30 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-1 1. Content Filter ing Settings Setting Description Content Filtering Log HTTP T raffic Select this checkbox to log HTTP traffic. For information about how to view the logged traffic, see ?[...]
-
Página 127
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-31 v1.0, September 2009 Web Categorization Schedul e Do Y ou W ant this Schedule to be Active on All Days or S pecific Days? Select one of the following radio butto ns: • All Days . The schedule is in effect all days of the [...]
-
Página 128
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-32 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. Configuring Web URL Filtering If you want to allow or block internal LAN user s from access to certain sites on the Internet, use the STM’ s W eb URL filtering[...]
-
Página 129
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-33 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in T able 4-12 on page 4-34 . Figure 4-14[...]
-
Página 130
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-34 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-12. URL Filtering Settings Setting Description Whitelist (takes precedence over Blacklist) Enable Select this checkbox to bypass scanning of the URLs that are listed in the URL field. Users [...]
-
Página 131
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-35 v1.0, September 2009 4. Click Apply to save your settings. Add URL T ype or copy a URL in the Add URL field. Then, click the add table button to add the URL to the URL field. Import from File T o import a list with URLs int[...]
-
Página 132
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-36 Content Filtering and Optimizin g Scans v1.0, September 2009 HTTPS Scan Settings HTTPS traffic is encrypted traf fic that cannot be scanned otherwise the data stream would not be secure. However , the STM can scan HTT PS traffic that is transmitted through an [...]
-
Página 133
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-37 v1.0, September 2009 If one of these is not satisfied, a security aler t message appears in the browser window (see Figure 4-16 ). However , even when a certificate is truste d or still valid, or when the name of a certific[...]
-
Página 134
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-38 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the HTTPS scan settings: 1. Select We b Security > HTTP/HTTPS from the menu. The HTTP/HTTPS submenu tabs appear , with the Malware Scan screen in view . 2. Click the HTTPS Settings s[...]
-
Página 135
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-39 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 1 3 . 4. Click Apply to save your settings. S pecifying T rusted Host s Y ou can specify trusted hosts for which the ST M [...]
-
Página 136
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-40 Content Filtering and Optimizin g Scans v1.0, September 2009 Note that c ertain sites contain el ements from dif f erent HTTPS hosts. As an example, assume that the https://example.com site contains HTTPS elements from the following three hosts: • trustedhos[...]
-
Página 137
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-41 v1.0, September 2009 3. Complete the fields and select the checkbox as explaine d in Ta b l e 4 - 1 4 . 4. Click Apply to save your settings. Configuring FTP Scans Some malware threats are specifically developed to spread t[...]
-
Página 138
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-42 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 1 5 . Figure 4-19 T able 4-15. FTP Scan Settings Setting Description Acti[...]
-
Página 139
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-43 v1.0, September 2009 3. Click Apply to save your settings. Scan Exception From the pull-down menu, specify one of the followin g actions when a f ile or object exceeds the size that you specify in the file size field: • S[...]
-
Página 140
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-44 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Application Control The STM lets you control user access to W eb applica tions such as instant messaging, media, peer- to-peer services, and online tools. Blocking an application prohibit[...]
-
Página 141
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-45 v1.0, September 2009 Figure 4-21 [Application Control, scr een 2 of 3] Figure 4-22 [Application Control, scr een 3 of 3][...]
-
Página 142
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-46 Content Filtering and Optimizin g Scans v1.0, September 2009 5. After you have configured each section, first click Apply to save the settings before you continue with the next section. Y ou must sa ve the configuration changes for each section individuall y .[...]
-
Página 143
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-47 v1.0, September 2009 Setting Scanning Exclusions T o save resources, you can configur e scanning exclusions for IP addresses and ports that you know are secure. For example, if your network includes a W eb server that hosts[...]
-
Página 144
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-48 Content Filtering and Optimizin g Scans v1.0, September 2009 3. In the Add column, click the add table button to add the exclus ion rule to the Scanning Exclusions table. The new exclusion rule is enabled by default. T o disable a rule, select the checkbox in [...]
-
Página 145
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-49 v1.0, September 2009 2. Under the Exceptions table, click the add table button to specify an exception rule. The Add Exception screen displays. 3. Complete the fields and make your selections from the pull-down menus as exp[...]
-
Página 146
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-50 Content Filtering and Optimizin g Scans v1.0, September 2009 Applies to (continued) All Users C li ck th e ap ply button to apply the exception to all users, both authenticated a nd unauthenticated. Authenticate d Click the apply button to apply the exception [...]
-
Página 147
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-51 v1.0, September 2009 Applies to (continued) Group Membership by IP Do the following: 1. From the Name pull-down menu, select a grou p that is defined by its IP address. 2. Click the apply button to apply the excepti on to t[...]
-
Página 148
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-52 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. The new exception rule is added to the Exceptions table. T o return to the Exception screen without adding the rule, click Return . 5. Select the checkbox to the[...]
-
Página 149
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-53 v1.0, September 2009 2. Click one of the fo llowi ng table buttons: • disable . Disables the rule or rules. The “!” stat us icon changes from a green circle to a grey circle, indicating that the rule is or ru les are [...]
-
Página 150
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-54 Content Filtering and Optimizin g Scans v1.0, September 2009[...]
-
Página 151
5-1 v1.0, September 2009 Chapter 5 Managing Users, Group s, and Authentication This chapter describes how to manage users, grou ps, and authentication on the STM. This chapter contains the following sections: • “About Users, Groups, and Domai ns on this page. • “Configuring Groups” on page 5-2 . • “Configuring User Accounts” on page[...]
-
Página 152
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-2 Managing Users, Groups, and Authen tication v1.0, September 2009 • Authenticated users . User who have a computer behind t he STM, who log in to the STM with a user name and password, and who are a ssigned an access policies that normally differs from the STM[...]
-
Página 153
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-3 v1.0, September 2009 Creating and Deleting Group s by Name T o create a local group by name: 1. Select User Management > Groups from the menu. The Groups screen displays ( Figure 5-1 contains one example). The List of[...]
-
Página 154
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-4 Managing Users, Groups, and Authen tication v1.0, September 2009 3. Click the add table button. The new group is added to the List of Groups table. T o delete a group from the List of Groups table, click th e delete table button in the Action column for the gro[...]
-
Página 155
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-5 v1.0, September 2009 4. Click Apply to save your c hanges. Creating and Deleting Group s by IP Address and Subnet T o create a group by IP address and subnet: 1. Select User Management > IP Subnet/Groups from the menu[...]
-
Página 156
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-6 Managing Users, Groups, and Authen tication v1.0, September 2009 2. In the Add New IP Subnets/Groups section of th e screen, complete the fields as explained in Ta b l e 5 - 3 . 3. Click the add table button. The new group is added to the Groups Membership by I[...]
-
Página 157
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-7 v1.0, September 2009 The List of Users table displays the users with the following fields: • Enable . The check box allows you to enab le or disable the user . • Name . The name of the user . • Group . The gr oup t[...]
-
Página 158
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-8 Managing Users, Groups, and Authen tication v1.0, September 2009 3. Click the add table button. The new user is added to the List of Users table. T o delete a user from the List of Users table, click the de lete table button in the Action column for the user th[...]
-
Página 159
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-9 v1.0, September 2009 Configuring Authentication The login screen and authentication on the STM de pends on the user type and the authentication method: • Administrative users . Users wi th administrative and guest priv[...]
-
Página 160
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-10 Managing Users, Groups, and Au thentication v1.0, September 2009 After a user has logged in through the User Portal Login screen, th e Authentication screen displays. The Authentication screen shows the IP address w ith which the user has logged in and lets a [...]
-
Página 161
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-11 v1.0, September 2009 b. Log in again. c. On the Authentication screen (see Figure 5 -8 on page 5-10 ), click the logout link. In addition to authentication through the STM’ s local user database, the STM supports the [...]
-
Página 162
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-12 Managing Users, Groups, and Au thentication v1.0, September 2009 RADIUS support two types of protocols: – PA P . Password Authentication Protocol (P AP) is a simple protocol in which the client sends a password in clear text. – CHAP . Challenge Ha ndshake [...]
-
Página 163
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-13 v1.0, September 2009 If the size limit is exceeded so that “dc=co mpanyname,dc= com” misses some entries during the lookup process, a user can still be properly auth enticated. However , to prevent the size limit fr[...]
-
Página 164
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-14 Managing Users, Groups, and Au thentication v1.0, September 2009 4. T o verify Jamie Hanson’ s user logon name, c lick the Account tab. The account properties for Jamie Hanson display . 5. Log in to the STM. 6. Select User Management > Authentications fro[...]
-
Página 165
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-15 v1.0, September 2009 • The full name, Jamie Hanson ( Figure 5-12 show s only the Bind DN field). • The W indow s account name in e-ma il format such as jhanson@tes t AD.com ( Figu re 5-13 shows only the Bind DN fiel[...]
-
Página 166
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-16 Managing Users, Groups, and Au thentication v1.0, September 2009 9. Click T est to verify that the LDAP server can actually function with th e bind DN that you hav e modified. The automated test procedure checks the connection to the LD AP server; the bind DN,[...]
-
Página 167
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-17 v1.0, September 2009 The List of LDAP table di sp lays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned. • Server . The IP address of the LDAP or Active Dir[...]
-
Página 168
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-18 Managing Users, Groups, and Au thentication v1.0, September 2009 3. Click T est to verify that the LDAP server can actu ally function with th e LDAP settings that you have specified. The automated test procedur e check s the con ne cti on to the LDAP server; t[...]
-
Página 169
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-19 v1.0, September 2009 T o delete a domain and server from th e List of LDAP table, click the delete table button in the Action column for the domain and se rver that you want to delete. Editing LDAP and Acti ve Directory[...]
-
Página 170
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-20 Managing Users, Groups, and Au thentication v1.0, September 2009 The List of RADIUS table displays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned. • Server . The IP address of the RADIUS server .[...]
-
Página 171
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-21 v1.0, September 2009 4. Click T est to verify that the RADIUS server can act ually function with the RADIUS settings that you have specified. The automated test procedure checks th e connection to the RAD IUS server; th[...]
-
Página 172
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-22 Managing Users, Groups, and Au thentication v1.0, September 2009 Editing RADIUS Domains and Configuring VLANs T o edit a RADIUS domain: 1. Select User Management > Authentication from the me nu. The authen tication submenu tabs appear with the LDAP screen i[...]
-
Página 173
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-23 v1.0, September 2009 4. Modify the fields and make your selections from the pull-do wn menu as explained in T able 5-6 on page 5-20 . 5. Click T est to verify that the RADIUS server can act ually function with the RADIU[...]
-
Página 174
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-24 Managing Users, Groups, and Au thentication v1.0, September 2009 Global User Settings Y ou can globally set the user session settings fo r authenticated users. T hese settings include the session expiration period, the allowed s ession idle tim e, and the defa[...]
-
Página 175
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-25 v1.0, September 2009 3. Click Apply to save the session settings. 4. Locate the Users Portal Login Settings sectio n on screen, and specify the default domain settings: •F r o m t h e Default Domain pull-down menu, se[...]
-
Página 176
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-26 Managing Users, Groups, and Au thentication v1.0, September 2009 T o view all or selected users: 1. On the Active Users screen (see Figure 5-18 on page 5-25 ), select one of the following radio buttons: • Vi e w A l l . This selection returns all active user[...]
-
Página 177
6-1 v1.0, September 2009 Chapter 6 Monitoring System Access and Performance This chapter describes the system monitoring feat ures of the STM. Y ou can be alerted to importa nt events such as attacks and login failures. Y ou can al so view the system status and real-time traf fic and security information. In addition, the diagnostics utilities are [...]
-
Página 178
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-2 Monitoring System Access and Performanc e v1.0, September 2009 Configuring the E-mail Notification Server If you have used the Setup W izard, you might have already configured the e-mail notification server; the E-mail Notification Server scr een allows you to [...]
-
Página 179
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-3 v1.0, September 2009 3. Click Apply to save your settings. Configuring and Activating S ystem, E-mail, and Syslog Logs Y ou can configure the STM to log system events such as a change of time by an NTP server , secure login[...]
-
Página 180
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-4 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the Enable checkbox to enable the STM to send logs to an e-mail address. 4. Complete the fields, select the radio button and checkboxes, and make your selections from the pull-down men us [...]
-
Página 181
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-5 v1.0, September 2009 5. Click Apply to save your settings. Sending Log to a Syslog Se rvers T o enable and configure logs to be sent to a syslog server: 1. Select Monitoring > Logs & Reports from the menu. The Logs &[...]
-
Página 182
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-6 Monitoring System Access and Performanc e v1.0, September 2009 3. 4. Select the Enable checkbox to enable the STM to send logs to a syslog server . 5. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in [...]
-
Página 183
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-7 v1.0, September 2009 6. Click Apply to save your settings. Clearing Logs 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear , with the Email and Syslog screen in view (see[...]
-
Página 184
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-8 Monitoring System Access and Performanc e v1.0, September 2009 2. Locate the Clear the Following Log In formation sectio n at the bottom of the screen. 3. Select the checkboxes to speci fy which logs are cleared: • System . The system event logs are cleared. [...]
-
Página 185
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-9 v1.0, September 2009 T o configure and activate the e-mail alerts: 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear , with the Email and Syslog screen in view . 2. Click[...]
-
Página 186
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-10 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Apply to save your settings. Enable Malware Alerts Select this checkbox to enable malware alerts, and configure the Subje c t an d Message fields. Subject Enter the subject line for the e-[...]
-
Página 187
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-11 v1.0, September 2009 Monitoring Real-T ime T raffic, Security , S tatistics, and W eb Usage Y ou can monitor the real-time traffic, security events, and s tatistics from the Da shboard screen. The W eb Usage screen display[...]
-
Página 188
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-12 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-5 on page 6-13 explains the fields of the S tatus, T otal Threats, Threats (Last 7 Days) sections of the Dashboard screen. Figure 6-6 [Dashboa rd, screen 1 of 3][...]
-
Página 189
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-13 v1.0, September 2009 T able 6-5. Dashboard: S tatu s, T otal Threats, a nd Threat s (Last 7 Days) formation Item Description Stat us System The current CPU, memory, and hard disk usage. When usage is within safe limits, th[...]
-
Página 190
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-14 Monitoring System Access and Performanc e v1.0, September 2009 Threats (Last 7 Days) This is a graphic that shows the relative numb er of th reats and access violations over the last week, using different colors for the various applications: Note : IMBlock sta[...]
-
Página 191
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-15 v1.0, September 2009 Ta b l e 6 - 6 explains the fields of the T otal Scanned Services Traf fic, Most Recent 5 and T op 5 sections of the Dashboard screen. T able 6-6. Dashboard: T ot al Scanned Services T raffic and Most [...]
-
Página 192
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-16 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-7 on page 6-17 explains the fields of the Service Statistics and Interface Statistics sections of the Dashboard screen. Figure 6-8 [Dashboa rd, screen 3 of 3] Note: Figure 6-8 shows the In[...]
-
Página 193
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-17 v1.0, September 2009 T able 6-7. Dashboard: Service S tatistics an d Interface St atistics Informa tion Item Description Service S tatist ics For each of the six supported protocols (HTTP , HTTPS, FTP , SMTP , POP3, and IM[...]
-
Página 194
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-18 Monitoring System Access and Performanc e v1.0, September 2009 Monitoring W eb Usage The W eb Usage screen shows you how the STM’ s W eb resources are being used. Y ou can see , for example, which host on the STM uses most resources. T o view the STM’ s W [...]
-
Página 195
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-19 v1.0, September 2009 3. Use the From pull-down menu to select the start date of the W eb usage report (year , month, date) and the To pull-down menu to select the end date of the report (year , month, date). 4. Click Vi e [...]
-
Página 196
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-20 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-8 on page 6-21 explains the fields of the System Information, Management Interface Information, and Interfaces sections of the System Status screen. Figure 6-10[...]
-
Página 197
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-21 v1.0, September 2009 T able 6-8. System St atus Information Setting Description System Information Firmware Information The current version and most recent update (that is, the most recently downloaded ve rsion) for the so[...]
-
Página 198
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-22 Monitoring System Access and Performanc e v1.0, September 2009 Querying Logs and Generating Report s The extensive logging and reporting functions of the STM let you perform the fo llowing tasks that help you to monitor the protection of th e network and the p[...]
-
Página 199
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-23 v1.0, September 2009 Y ou can query and generate each type of log separately and filter the information based on a number of criteria. For example, you can filter the virus logs using the following criteria (other log type[...]
-
Página 200
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-24 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in T able 6-9 on page 6-25 . Figure 6-1 1[...]
-
Página 201
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-25 v1.0, September 2009 T able 6-9. Log Query Settings Setting Description (or Subfie ld and Description) Log T ype Select one of the following log types from the pull-down menu: • Tr a f f i c . All scanned incoming and ou[...]
-
Página 202
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-26 Monitoring System Access and Performanc e v1.0, September 2009 Search Criteria (continued) Client IP The cli ent IP address that is querie d. This field is available for the following logs : T raffic, Virus, S pyware, S pam, Content filters, and Application. S[...]
-
Página 203
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-27 v1.0, September 2009 4. Click one of the fo llowi ng action buttons: • Search . Query the log according to the search crite ria that you specifie d and view the log through the W eb Management Interfac e, that is, on scr[...]
-
Página 204
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-28 Monitoring System Access and Performanc e v1.0, September 2009 T o identify infected clients that are sending spywar e or a virus in outbound traffic, query the STM spyware and virus logs and see if any of your internal IP addresses are the source of spyware o[...]
-
Página 205
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-29 v1.0, September 2009 – Number of malware incidents – Number of files blocked – Number of blackl ist violations (not appli cable to IMAP) – Number of e-mails captured by Distributed Spam Analysis (not applicable to [...]
-
Página 206
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-30 Monitoring System Access and Performanc e v1.0, September 2009 – T op 10 blocked clients by coun t – For each applicatio n, the number of blocked requests, in a graphic The reports t hat you select ar e generated as MH TML files, which contain headers for [...]
-
Página 207
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-31 v1.0, September 2009 4. Click Generate . After a few minutes, the report are added to the Report List, which can contain a maximum of five saved reports. (T o delete a a previously saved report, click its delete table butt[...]
-
Página 208
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-32 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and complete the fields as explained in Ta b l e 6 - 1 1 . Figure 6-13 T able 6-1 1. Schedule Report Settings Setting Description Report Settings Frequency Select one of th[...]
-
Página 209
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-33 v1.0, September 2009 4. Click Apply to save your settings. V iewing and Managing the Quarantine Files Depending on the selections that you made in the Email Security and W eb Security main menus (see Chapter 4, “Content [...]
-
Página 210
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-34 Monitoring System Access and Performanc e v1.0, September 2009 Y ou can query and view the spam quarantine file and the malware quarantin e file separately and filter the information based on a number of crite ria. Y ou can filter the spam quarantine file usin[...]
-
Página 211
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-35 v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in Ta b l e 6 - 9 . Figure 6-14 T able 6-1 2. Quaran ti ne File Settings[...]
-
Página 212
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-36 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Sear ch . Depending on the selected quarantine f ile (spam or malware), the Quarantine screen displays the Quarantined Spam table or th e Quarantined Infected Files table, which are explai[...]
-
Página 213
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-37 v1.0, September 2009 The Quarantined Spam table shows the following columns: • Checkbox . Lets you select the table entry . • Date . The date that the e-mail was received. • Pro tocol . The protocol (SMTP) in which t[...]
-
Página 214
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-38 Monitoring System Access and Performanc e v1.0, September 2009 • Send as Ham . The selected spam e-mail files are not tagged a s spam for Distributed Spam Analysis, ar e dele ted from the quarantine file, and are sent to the intended recipients. • Delete .[...]
-
Página 215
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-39 v1.0, September 2009 Figure 6-18 shows the Quarantined Infected Files table with da ta. After you have selected one or more table entri e s, take one of the followi ng actions (or click the Return hyperlink to return to th[...]
-
Página 216
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-40 Monitoring System Access and Performanc e v1.0, September 2009 2. Select the start date and time from the Begin Date/T ime pull-down menus. 3. Specify the recipient’ s e-mail address in the Send to field. 4. Click Send Report . Using Diagnostics Utilities Th[...]
-
Página 217
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-41 v1.0, September 2009 Using the Network Diagnostic T ools This section discusses the Ping or Trace an IP Address section and the Perform a DNS Lookup section of the Diagnostics screen. Sending a Ping Packet Use the Ping uti[...]
-
Página 218
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-42 Monitoring System Access and Performanc e v1.0, September 2009 Looking up a DNS Address A DNS (Domain Name Server) conv erts the Internet name (for ex ample, www .netgear .com) to an IP address. If you need the IP address of a W eb, FTP , mail, or other server[...]
-
Página 219
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-43 v1.0, September 2009 4. In Destination IP Address, enter the IP address of the destination of the traffic stream that you want to analyze. 5. Click St a r t . Y ou are prompted to save the download ed traffic information f[...]
-
Página 220
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-44 Monitoring System Access and Performanc e v1.0, September 2009 Gathering Import ant Log Information T o gather log info rmation about your STM: 1. Locate the Gather Important Log Inform ation section on the Diagnostics screen. 2. Click Download Now . Y ou are [...]
-
Página 221
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-45 v1.0, September 2009 T o shut down the STM: 1. Locate the Res tart & Shutdown s ection on the Diagnostics screen (this section is not sh own on any of the Diagnostics screen figures in this manual). 2. Click the Shutdo[...]
-
Página 222
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-46 Monitoring System Access and Performanc e v1.0, September 2009[...]
-
Página 223
7-1 v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support This chapter provides troubleshooting tips and information for the STM. A fter each problem description, instructions are prov ided to help you diagnose and solve the problem. For the common problems listed, go to the section indicated. • Is the STM on? Go to “Basic Fu[...]
-
Página 224
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-2 Troubleshooting and Using Online Support v1.0, September 2009 Basic Functioning After you turn on power to the STM, the fo llowing sequence of events should occur: 1. When power is first applied, ve rify that the PWR LED is on. 2. After approximately two minute[...]
-
Página 225
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-3 v1.0, September 2009 If all LEDs are still more than several minutes minute after power up: • T urn the power off, and then turn it on again to see if the STM recovers. • Clear the STM’ s configuration to factory defa[...]
-
Página 226
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-4 Troubleshooting and Using Online Support v1.0, September 2009 • Make sure that you are using the SSL https: //addr ess login rather than the http://addr ess login. • Make sure that your browser has Java, JavaS cript, or ActiveX enabled. If you are using Int[...]
-
Página 227
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-5 v1.0, September 2009 T roubleshooting a TCP/IP Ne twork Using a Ping Utility Most TCP/IP terminal devices and firewalls contain a ping utility th at sends an echo request packet to the designated device. The device then res[...]
-
Página 228
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-6 Troubleshooting and Using Online Support v1.0, September 2009 T esting the Path from Y our PC to a Remote Device After verifying that the LAN path works correctly , test the path from your PC to a remote device. From the W indows run menu, type: PING -n 10 <[...]
-
Página 229
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-7 v1.0, September 2009 The STM restarts. During the reboot process, the Backup & Restore Se ttings screen remains visible. The reboot process is complete after several minutes when the T est LED (STM150) or St atus LED (S[...]
-
Página 230
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-8 Troubleshooting and Using Online Support v1.0, September 2009 Using Online Support The STM includes online support tools that a llow NETGE A R T echnical Support to securely perform diagnostics of the STM, and that lets you submit suspic ious files for analysis[...]
-
Página 231
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-9 v1.0, September 2009 Inst alling Hot Fixes NETGEAR might release hot fixes or patches if certain problems are found in any software release. When a hot fix is available, install it immediately to ensure op timum pe rformanc[...]
-
Página 232
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-10 Troubleshooting and Using Online Support v1.0, September 2009 6. Navigate to the location on your computer where you have saved the hot fix file, and then select it. 7. Click Open. The hot fix file now appears in the Import from File field. 8. Click Apply to i[...]
-
Página 233
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-11 v1.0, September 2009 3. Click Submit . Accessing the Knowledge Base and Document ation T o access NETGEAR’ s Knowledge Base for the STM, select Support > Knowledge Base from the menu. T o access NETGEAR’ s documenta[...]
-
Página 234
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-12 Troubleshooting and Using Online Support v1.0, September 2009[...]
-
Página 235
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-1 v1.0, September 2009 Appendix A Default Settings and T echnical Specifications T o return the STM returns to the default fact ory configuration settings that are shown in Ta b l e A - 1 , click the default button on th[...]
-
Página 236
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-2 Default Settings and Technical Specifications v1.0, September 2009 Ta b l e A - 2 shows the STM specifications. LAN Connecti ons MAC Address Default address MTU Size 1500 Ports STM150: 5 AutoSense 10/100/1000BASE-T , RJ-45 STM300: 3 AutoSense 10/100/1000BASE-T [...]
-
Página 237
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-3 v1.0, September 2009 Electromagnetic Emissions Meets requirements of FCC Part 1 5 Class A VCCI Class A CE mark, commercial Safety Meets requirements of UL listed C-T ick T able A-2. STM Specifications (continued) Featu[...]
-
Página 238
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-4 Default Settings and Technical Specifications v1.0, September 2009[...]
-
Página 239
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Related Documents B-1 v1.0, September 2009 Appendix B Related Document s This appendix provides links to reference documents yo u c an use to gain a more complete understanding of the technolog ies used in your NETGEAR product. Document Li nk TCP/IP Networking Basics [...]
-
Página 240
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual B-2 Related Documents v1.0, September 2009[...]
-
Página 241
Index-1 v2.0, February 2007 Index Numerics 10BaseT , 100BaseT , and 1000BaseT 3-4 A AC input STM150 1-14 STM300 1-15 STM600 1-15 access preventing inherited privileges 5-1 1 read/write and read-only 3-9 remote management 3-1 1 action buttons (W eb Management Interface) 2-8 activating, ser vice licenses 1-6 , 2-28 Active Directory (AD) domains 5-16 [...]
-
Página 242
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-2 v2.0, Februar y 2007 keywords, e-mails 4-1 1 , 4-13 sites, reducing traffic 3-32 URLs 4- 34 We b access exceptions 4-49 categories 2-25 , 4-26 , 4-30 objects 4-26 , 4-30 bottom panel and label STM150 1-16 STM300 1-16 STM600 1-17 browsers, for W eb Management Interface 2- 5 bundle key , for r[...]
-
Página 243
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-3 v2.0, February 2007 D date settings 2-13 , 3-23 , 3-24 troubleshooting 7-7 daylight savings time 2-13 , 3-24 debug logs 6-43 dedicated management VLAN port 1-6 defaults configuration restoring 7-6 settings A-1 content filtering settings 4-2 domains, for authent ica ti on 5-25 factory default[...]
-
Página 244
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-4 v2.0, Februar y 2007 exclusions, scanning 4-47 executable files e-mail filtering 4- 14 FTP filtering 4-43 We b f i l t e r i n g 4-30 F facilities, syslog server 6-7 factory defaults login 1-15 service license s, automatic retrieval 2-30 settings, reverting to 3-18 failure bypass 1-6 feature[...]
-
Página 245
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-5 v2.0, February 2007 hot fixes 7-9 HTML, scanning 4-25 HTTP action, infected W e b file or object 2-18 , 4-25 concurrently scanned connections 1-5 default port 2-17 , 4-23 enabling scanning 2-17 , 4-23 logging, traffic 4-30 proxy settings configuring manually 3-8 using the Setup W izard 2-23 [...]
-
Página 246
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-6 v2.0, Februar y 2007 troubleshooting 7-2 , 7-3 ports STM150 1-8 STM300 1-10 STM600 1-12 LDAP binding a dn 5-12 configuring a dn 5-17 domains 5-16 overview 5-1 1 settings 5-17 users and groups 4-51 LEDs Hard drive (HDD) STM150, not applicable STM300 1-1 1 STM600 1-13 LAN STM150 1-9 STM300 1-1[...]
-
Página 247
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-7 v2.0, February 2007 digital certific ates 3-25 performance 3-31 Management Information Base. See MIB. management ports STM150, not applicable STM300 1-10 STM600 1-12 maximum transmiss ion unit. See MTU (settings). media applications configuring 4-46 defaults 4-2 status 6-13 memory usage 6-13[...]
-
Página 248
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-8 v2.0, Februar y 2007 placement, locati on 1-17 polling interval 6-1 1 POP3 action, infected e-mails 2-15 , 4-7 default port 2-15 , 4-5 Distributed Spam Analysis 4-20 enabling scanning 2-15 , 4-5 file extension blocking 4-14 file name blocking 4-14 keyword blocking 4-13 password-protected att[...]
-
Página 249
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-9 v2.0, February 2007 real-time protection, capab ilities 1-4 traffic, diagnostics 6-42 real-time black list (RBL ), e-mails 4-17 real-time clock . See RT C . rear panel STM150 1-14 STM300 1-15 STM600 1-15 rebooting 6-44 reducing traffic 3-32 reference documents B-1 registering with NETGEAR 2-[...]
-
Página 250
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-10 v2.0, Februar y 2007 shutting down 6-44 signatures, pattern file 2-22 Simple Mail T ransfer Protocol. See SMTP . Simple Network Management Protocol. See SNMP . size, exceptions e-mail attachm ent s 2-16 , 4-8 FTP files and objects 4-43 W eb files and objects 2- 19 , 4-25 size, quara ntine a[...]
-
Página 251
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-11 v2.0, February 2007 rear panel 1-15 Stream Scanning technology overview 1-4 streaming, sca nned file parts 2-18 , 4-25 submenu tabs (W eb Ma nagement Interface) 2-8 subnet mask, STM 2-12 , 3-4 support, online 7-8 suspicious files 7-10 switch, power STM150 1-14 STM300 1-15 STM600 1-15 syslog[...]
-
Página 252
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-12 v2.0, Februar y 2007 update failure alert 6-8 , 6-9 update servers 2-22 , 3-21 update settings backing up 3-16 security subscriptions configuring manually 3-19 using the Setup W izard 2-21 updates critical 3-22 product xiv scheduling 2-22 , 3-19 updating software automatic ally 3-21 manuall[...]
-
Página 253
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-13 v2.0, February 2007 reports 6-29 , 6-33 scan throughput 1-5 security settings, using the Setup W i zard 2-17 statistics 6-13 usage monitoring 6-18 reports 6-19 W eb Management Interface 2-8 browsers, qualified 2-5 layout 2-8 settings 2-1 1 status 6-21 troubleshooting 7-3 whitelist e-mails 4[...]
-
Página 254
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-14 v2.0, Februar y 2007[...]