NETGEAR STM300EW-100NAS инструкция обслуживания
- Просмотреть online или скачать инструкцию
- 254 страниц
- 6.22 mb
Идти на страницу of
Похожие руководства по эксплуатации
-
Network Hardware
NETGEAR WNDAP350-100NAS
136 страниц 2.61 mb -
Network Hardware
NETGEAR RN10223D-100NAS
120 страниц 3.63 mb -
Network Hardware
NETGEAR WNA3100-100ENS
48 страниц 0.86 mb -
Network Hardware
NETGEAR XAVB5602-100NAS
12 страниц 1.89 mb -
Network Hardware
NETGEAR RN31200-100NAS
5 страниц 0.87 mb -
Network Hardware
NETGEAR UTM50-100NAS
484 страниц 10.43 mb -
Network Hardware
NETGEAR WG102NA
70 страниц 1.51 mb -
Network Hardware
NETGEAR RN10400100NAS
120 страниц 3.63 mb
Хорошее руководство по эксплуатации
Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации NETGEAR STM300EW-100NAS. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции NETGEAR STM300EW-100NAS или обучающее видео для пользователей. Условием остается четкая и понятная форма.
Что такое руководство?
Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции NETGEAR STM300EW-100NAS можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.
К сожалению немного пользователей находит время для чтения инструкций NETGEAR STM300EW-100NAS, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.
Из чего должно состоять идеальное руководство по эксплуатации?
Прежде всего в инструкции NETGEAR STM300EW-100NAS должна находится:
- информация относительно технических данных устройства NETGEAR STM300EW-100NAS
- название производителя и год производства оборудования NETGEAR STM300EW-100NAS
- правила обслуживания, настройки и ухода за оборудованием NETGEAR STM300EW-100NAS
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам
Почему мы не читаем инструкций?
Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск NETGEAR STM300EW-100NAS это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок NETGEAR STM300EW-100NAS и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта NETGEAR, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания NETGEAR STM300EW-100NAS, как это часто бывает в случае бумажной версии.
Почему стоит читать инструкции?
Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства NETGEAR STM300EW-100NAS, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.
После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции NETGEAR STM300EW-100NAS. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.
Содержание руководства
-
Страница 1
202-10519-01 1.0 September 2009 NETGEAR , Inc. 350 East Plumeria Drive San Jose, CA 95134 ProSecure W eb/Email Security Threat Management Appliance STM150/300/600 Reference Manual[...]
-
Страница 2
ii v1.0, September 2009 © 2009 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR and the NETGEA R logo are registered trademarks and ProS ecure is a trademark of NETGEAR, Inc. Microsoft, W indows, and Windows NT ar e registered trademarks of Microsof t Corporation. Other brand and product names are registered trademarks or trademarks of th[...]
-
Страница 3
v1.0, September 2009 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for comp li anc e with the regulations. V oluntary Control Co uncil for Interference (VCCI) St atement This equipment is in the second category (information eq[...]
-
Страница 4
v1.0, Septembe r 2009 iv Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must reta in the above copyright notice, thi s list of conditions, and[...]
-
Страница 5
v1.0, September 2009 v Product and Publication Det ails PPP Copyright (c) 1989 Carnegie Mellon University . All rights reserved. Redistribution and use in source and binary forms are permitted provide d that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other ma[...]
-
Страница 6
v1.0, Septembe r 2009 vi[...]
-
Страница 7
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al vii v1.0, September 2009 Content s About This Manual Conventions, Formats, and Scope .................. ................ ................... .................... ......... xiii How to Print This Manual ................ ................ ............. ................ .[...]
-
Страница 8
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual viii v1.0, September 2009 Understanding the S teps for Initial Connection .. ............. ................ ................ ............... 2-4 Qualified Web Browsers .. ............. ................ ................ ................ ................ ............[...]
-
Страница 9
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al ix v1.0, September 2009 Updating the Software ........ ......... ................. ................ ............. ................ ................ ... 3-19 Scheduling Updates ..... ................ ................ ................ ................ ............. ....[...]
-
Страница 10
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual x v1.0, September 2009 Creating and Deleting Groups by Name ... ................ ................ ................ ............. .. 5-3 Editing Groups by Name ........... ... ... ... .... ... ............. ... ... ... .... ... ... ... .... ............ .... ... ...[...]
-
Страница 11
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xi v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support Basic Functioning ..... ................ ................ ................ ................. ................ ............. ........ 7- 2 Power LED Not On ................ ................. ..[...]
-
Страница 12
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xii v1.0, September 2009[...]
-
Страница 13
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xiii v1.0, September 2009 About This Manual The NETGEAR ® Pr oSecu re™ W eb/Email Security Thr eat Management Appli ance STM Refer ence Manual describes how to configure and troubleshoo t a ProSecure W eb/Email Security Threat Management Appliance STM150, STM30 0, [...]
-
Страница 14
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xiv v1.0, September 2009 • Scope . This manual is written for the STM according to these specifications: For more information abou t network, Internet, firewall, and VP N technologies, c lick the links to the NETGEAR website in Appendix B, “Related Documents .?[...]
-
Страница 15
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-1 v1.0, September 2009 Chapter 1 Introduction This chapter provides an overview of the feat ures and capabilities of the ProSecure W eb/Email Security Threat Managem en t Appliance STM150 , STM300, or STM600. It also identifies the physical features of [...]
-
Страница 16
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-2 Introduction v1.0, September 2009 In addition to scanning HTTP , HTTPS, FTP , SMTP , POP3, and IMAP traffic, the STM protects networks against spam phishing attacks and un wanted W eb use. The STM is a plug -and-play device that can be installe d and configured[...]
-
Страница 17
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-3 v1.0, September 2009 Key Features and Cap abilities The STM provides the following key features and capabilities: • Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet W AN ports (see “STM Model Comparison” on page 1-5 ). • Scalable support ([...]
-
Страница 18
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-4 Introduction v1.0, September 2009 S tream Scanning for Content Filtering Stream Scanni ng is based on the simple observatio n that network traffic travels in streams. The STM scan engine starts re ceiving and analyz ing tr affic as the stream enters the network[...]
-
Страница 19
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-5 v1.0, September 2009 Easy Inst allation and Management Y ou can install, configure, and operate the STM wi thin minutes after connecting it to the network. The following features simplify in stallation and management tasks: • Browser -base d managem[...]
-
Страница 20
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-6 Introduction v1.0, September 2009 Service Registration Card with License Keys Be sure to store the license key card that came with your STM in a secure locatio n. Y ou do need these keys to activate your product during the initial setup. Hardware Gigabit RJ-45 [...]
-
Страница 21
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-7 v1.0, September 2009 Package Content s The STM prod uct package contain s the following items: • ProSecure W eb/Email Security Threat Ma nagement Appliance STM150, STM300, or STM600 • One AC power cable • Rubber feet (4) with adhesive backin g ?[...]
-
Страница 22
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-8 Introduction v1.0, September 2009 Front Panel Port s and LEDs The front panels of the three STM models pro vid e different components . STM150 Front Panel Figure 1-2 shows the front panel ports and status light-emitting diodes (LEDs) of the STM150. From left to[...]
-
Страница 23
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-9 v1.0, September 2009 The function of each STM150 LED is de scribed in the following table: T able 1-2. LED Descriptions for the STM150 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. T [...]
-
Страница 24
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-10 Introduction v1.0, September 2009 Front Panel STM300 Figure 1-3 shows the front panel ports and LEDs of the STM300. From left to righ t, the STM300’ s front panel shows the following ports and LEDs: 1. Console port. Port for connecting to an option al co nso[...]
-
Страница 25
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-11 v1.0, September 2009 The function of each STM300 LED is de scribed in the following table: T able 1-3. LED Descriptions for the STM300 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. S[...]
-
Страница 26
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-12 Introduction v1.0, September 2009 Front Panel STM600 Figure 1-4 shows the front panel ports and LEDs of the STM600. From left to righ t, the STM600’ s front panel shows the following ports and LEDs: 1. Console port. Port for connecting to an option al co nso[...]
-
Страница 27
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-13 v1.0, September 2009 The function of each STM600 LED is de scribed in the following table: T able 1-4. LED Descriptions for the STM600 Object Activity Descrip tion Power On (Green) Power is supplied to the STM. Off Power is not supplied to the STM. S[...]
-
Страница 28
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-14 Introduction v1.0, September 2009 Rear Panel Features The rear panel of the STM150 differs from the r ear panels of the STM300 and STM600. Rear Panel STM150 Figure 1-5 shows the rear panel components of the STM150. From left to right, the STM15 0’ s rear pan[...]
-
Страница 29
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-15 v1.0, September 2009 Rear Panel STM300 and STM600 The rear panels of the STM300 and STM600 are identical. Figure 1-6 shows the rear panel components of the STM300 and STM600. From left to right, the STM300’ s and STM600’ s rear panel components ([...]
-
Страница 30
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-16 Introduction v1.0, September 2009 STM150 Product Label STM300 Product Label Figure 1-7 Figure 1-8[...]
-
Страница 31
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-17 v1.0, September 2009 STM600 Product Label Choosing a Location for the STM The STM is su itable for use in an office environm ent where it can be free-standing (on its runner feet) or mounted into a standard 19-inch eq u ipment rack. Alternatively , y[...]
-
Страница 32
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-18 Introduction v1.0, September 2009 • T emperature operating limits are not likely to be exceeded. Install the unit in a clean, air- conditioned environment. For informatio n abou t the recommended operating t emperatures for the STM, see Appendix A, “Defaul[...]
-
Страница 33
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-1 v1.0, September 2009 Chapter 2 Using the Setup Wizard to Provision the STM in Y our Network This chapter describes provisioning the STM in your network. This chapter contains the following sections: ?[...]
-
Страница 34
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-2 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Server Group In a server group deployment, one STM appliance is installed at the gateway and another in front of the server group. This type of deployment he lps split the network[...]
-
Страница 35
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-3 v1.0, September 2009 Segmented LAN Deployment In a segmented LAN deployment, one STM app lia nce is installed in front of each network segment. This type of deployme nt helps split the network load and[...]
-
Страница 36
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-4 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the S t ep s for Initial Connection Generally , five steps are required to complete th e basic and security configuration of your STM: 1. Connect the STM physica ll[...]
-
Страница 37
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-5 v1.0, September 2009 4. V erify the installation . See “V erifying Proper Installation” on page 2-27 . 5. Register the STM . “Registering the STM with NETGEAR” on page 2-28 . Each of these task[...]
-
Страница 38
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-6 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The NETGEAR Configur ation Manager Login screen displays in th e browser (see Figu re 2-4 , which shows the STM60 0). 3. In the User field, type admin . Use lower case letters. 4.[...]
-
Страница 39
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-7 v1.0, September 2009 5. Click Login. The W eb Management Interface appears, displaying the Dashboard screen. ( Figure 2-2 on page 2-3 shows the top part of the screen. Fo r information about this scree[...]
-
Страница 40
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-8 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the W eb Management Interface Menu La yout Figure 2-7 shows the menu at the top of the STM600’ s W eb Management Interface. The W eb Management Interface layouts [...]
-
Страница 41
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-9 v1.0, September 2009 Any of the following action buttons might be disp layed on screen (this list might not be complete): • Apply . Save and apply the configuration. • Reset . Reset the configurati[...]
-
Страница 42
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-10 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Using the Setup Wizard to Perf orm the Initial Configuration The Setup W izard facilitates the initial config uration of the STM by taking you through 1 1 screens, the last of wh[...]
-
Страница 43
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-11 v1.0, September 2009 Setup Wizard S tep 2 of 1 1: Networking Settings Enter the settings as explained in Ta b l e 2 - 1 , then click Next to go the following screen. Figure 2-1 1 Note: After you have [...]
-
Страница 44
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-12 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 3 of 1 1: Time Zone Subnet Mask Enter the IP subnet mask. Th e subnet ma sk specifies the network n umber portion of an IP address. Unless yo u are implementin[...]
-
Страница 45
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-13 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 2 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can make chang[...]
-
Страница 46
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-14 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 4 of 1 1: Email Security Enter the settings as explained in T able 2-3 on page 2-15 , then click Next to go the following screen. Figure 2-13 Note: After you h[...]
-
Страница 47
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-15 v1.0, September 2009 T able 2-3. Setup Wizard Step 4: Email Security Set tings Setting Description (or Sub field and Descr iption) Services to Scan SMTP SMTP scanning is enabled by defau lt on standar[...]
-
Страница 48
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-16 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 IMAP From the IMAP pull-down menu, spe cify one of the following actions when an infecte d e-mail is detected: • Quaran tine att achment . The e-mail is not blocked, but the at[...]
-
Страница 49
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-17 v1.0, September 2009 Setup Wizard S tep 5 of 1 1: Web Security Enter the settings as explained in Ta b l e 2 - 4 , then click Next to go the following screen. Figure 2-14 Note: After you have complete[...]
-
Страница 50
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-18 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 HTTPS HTTPS scanning is disabled by default. T o enable Hype rtext T ransfer Protocol over Secure Socket Layer (HTTPS) sca nning, select the corresponding checkbox. Y ou can chan[...]
-
Страница 51
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-19 v1.0, September 2009 Setup Wizard S tep 6 of 1 1: Em ail Notification Server Settings FTP From the FTP pull-down menu, specify one of the follo wing actions when an infected Web file or object is dete[...]
-
Страница 52
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-20 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Enter the settings as explained in T able 2-5 on page 2-20 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can [...]
-
Страница 53
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-21 v1.0, September 2009 Setup Wizard S tep 7 of 1 1: Up date Settings Enter the settings as explained in T able 2-6 on page 2-22 , then click Next to go the following screen. Figure 2-16 Note: After you [...]
-
Страница 54
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-22 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 T able 2-6. Setup Wizar d Step 7: Up date Settings Setting Description (or Subfie ld and Description) System Information Y ou can not configure this section; it is shown for info[...]
-
Страница 55
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-23 v1.0, September 2009 Setup Wizard S tep 8 of 1 1: HTTP Proxy Settings Enter the settings as explained in Ta b l e 2 - 7 , then click Next to go the following screen. Figure 2-17 Note: After you have c[...]
-
Страница 56
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-24 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 9 of 1 1: W eb Categories Figure 2-18[...]
-
Страница 57
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-25 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 8 , then click Next to go the following screen. Note: After you have completed th e steps in the Setup W izard , you can make chang[...]
-
Страница 58
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-26 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 10 of 1 1: Configuration Summary Figure 2-19[...]
-
Страница 59
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-27 v1.0, September 2009 Click Apply to save your settings and automatically restart the system or click Back to make changes to the configuration. Setup Wizard S tep 1 1 of 1 1: Rest arting the System W [...]
-
Страница 60
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-28 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The eicar .com test file is a legitimate DoS prog ram and is safe to use be cause it is not a malware threat and does not include any fragments of malware code. The test file is [...]
-
Страница 61
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-29 v1.0, September 2009 2. Enter the license key in the Registration Key field. 3. Fill out the customer and V AR fields. 4. Click Registe r . 5. Repeat step 2 and step 4 for additional license keys. The[...]
-
Страница 62
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-30 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 What to Do Next Y ou have completed setting up and deploying the STM to the networ k. The STM is now set up to scan the protocols and services that you specif ied for malware thr[...]
-
Страница 63
3-1 v1.0, September 2009 Chapter 3 Performing Network and System Management This chapter describes the network settings, the system management features, and ways to improve the performance of the STM. If you have used the Setup W izard, you have already configured some of these settings, but there are situations in which you might want to modify th[...]
-
Страница 64
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-2 Performing Network and System Ma nagement v1.0, September 2009 T o configure the STM’ s network settings: 1. Select Global Setting s > Network Settings from the menu. The Ne twork Settings submenu tabs appear with the Network Settings screen in view ( Figu[...]
-
Страница 65
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-3 v1.0, September 2009 Figure 3-3 shows the Interface Speed & Duplex Set tings section of the Network Settings screen of the STM150. 2. Complete the fields and make your selections from the pull-down menus as explained in[...]
-
Страница 66
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-4 Performing Network and System Ma nagement v1.0, September 2009 Subnet Mask Enter the IP subnet mask. The subn et mask specifies the network number portion of an IP address. Unless you are implement ing su bnetting, use 255.2 55.255.0 as the subnet mask. Gateway[...]
-
Страница 67
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-5 v1.0, September 2009 3. Click Apply to save your settings. Changing the network settings has the following consequences: • Changing any of the settings in the Manageme nt Interface Settings se ction of the screen causes t[...]
-
Страница 68
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-6 Performing Network and System Ma nagement v1.0, September 2009 2. Click the Session Limits submenu tab. The Session Limits screen displays. 3. Select the radio buttons, make your selectio ns from the pull-down menu, and complete the fields as explained in Ta b [...]
-
Страница 69
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-7 v1.0, September 2009 4. Click Apply to save your settings. Cha nging any settings in the Sessi on T imeouts section of the screen requires the STM to restart. If you click Reset , the STM restar ts to restore the default ne[...]
-
Страница 70
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-8 Performing Network and System Ma nagement v1.0, September 2009 T o configure the HTTP proxy: 1. Select Global Setting s > HTTP Proxy from the menu. The HTTP Proxy screen displays. 2. Select the checkbox and complete the fields as explained in Ta b l e 3 - 3 [...]
-
Страница 71
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-9 v1.0, September 2009 About Users with Administ rative and Guest Privileges There are two pre-defined user types that can access the STM’ s W eb Management Interface: • Administrator . A user who has full access and the [...]
-
Страница 72
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-10 Performing Network an d System Management v1.0, September 2009 2. T o modify the administrator or guest settings, select the checkbox and complete the fields as explained in Ta b l e 3 - 4 . Figure 3-6 T able 3-4. Set Password Settings scr een; Administrator a[...]
-
Страница 73
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-11 v1.0, September 2009 3. Under the Administrator Settings and Guest Settings sections of the screen, click Apply to save your settings. 4. If you modified the administrato r settings and now want to modify the guest setting[...]
-
Страница 74
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-12 Performing Network an d System Management v1.0, September 2009 T o configure remote management: 1. Select Administration > Remote Management from the menu The Remote Management screen displays (see Figure 3-7 on page 3-12 ). 2. In the Secure HTTPS Managemen[...]
-
Страница 75
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-13 v1.0, September 2009 . Using an SNMP Manager Simple Network Management Protocol (SNMP) fo rms part of the Internet Protocol Suite as defined by the Internet Engineerin g T a sk Fo rce (IETF). SNMP is used in network manage[...]
-
Страница 76
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-14 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons and comple te the field s as explained in Ta b l e 3 - 6 . Figure 3-8 T able 3-6. SNMP Settings Setting Description (or Subfie ld and Descript ion) SNMP Settings Do Y ou[...]
-
Страница 77
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-15 v1.0, September 2009 3. Click Apply to save your settings. Supported MIB Browsers After you have configured the SNMP settings, you must enter the IP address of the STM in the Management Information Base (MIB) browsers thro[...]
-
Страница 78
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-16 Performing Network an d System Management v1.0, September 2009 Managing the Configuration File The configuration settings of the STM are stored in a configuratio n file on the STM. This file can be saved (backed up) to a PC, retrieved (restor ed) from the PC ,[...]
-
Страница 79
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-17 v1.0, September 2009 Back up your STM settings periodically , a nd store the backup file in a safe place. T o backup settings: 1. On the Backup and Rest ore Settings screen (see Figure 3-9 on pa ge 3-16 ), next to Save a c[...]
-
Страница 80
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-18 Performing Network an d System Management v1.0, September 2009 Reverting to Factory Default Settings T o reset the STM to the original factory default settings, click the default button next to Revert to factory default settings on the Back up and Restore Sett[...]
-
Страница 81
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-19 v1.0, September 2009 Up dating the Sof tware If you have used th e Setup W izard, you might ha ve already configured the software update settings; the Software Update screen allows you to modi fy these settings. The STM ha[...]
-
Страница 82
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-20 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons, complete the field, and make your selections from the pull-down menus as explained in T able 3-7 on page 3-21 . Figure 3-10[...]
-
Страница 83
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-21 v1.0, September 2009 3. Click Apply to save your settings. Performing a Manual Up date If you want to immediately check for and download available updates, perform a manual update: 1. Select Administration > Softwar e U[...]
-
Страница 84
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-22 Performing Network an d System Management v1.0, September 2009 3. After the update has completed, click Apply to activate the newly updated software. Critical Up dates That Require a Rest art If a downloaded update requires a restart, you are prompted to perfo[...]
-
Страница 85
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-23 v1.0, September 2009 Configuring Date and T ime Service If you have used the Setup W izard, you might have already configured the system date and time settings; the System Date and T ime screen allows you to modify these s[...]
-
Страница 86
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-24 Performing Network an d System Management v1.0, September 2009 3. Click Apply to save your settings. Changing the tim e zone requires the STM to restart. T able 3-8. System Date and Ti me Settings Setting Description (or Sub field and Description) System Date [...]
-
Страница 87
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-25 v1.0, September 2009 Managing Digit al Certificates The STM uses digital certificates (also known as X509 certificates) for secure web access connections over HTTPS (that is, SSL VPN connections). Digital certificates can [...]
-
Страница 88
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-26 Performing Network an d System Management v1.0, September 2009 import. However , NETGEAR recommends that you re place this digital certificate with a digital certificate from a well-known commercial CA pr ior to deploying the STM in your network. The STM’ s [...]
-
Страница 89
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-27 v1.0, September 2009 The top part of the Certificate Used for HTTP S Scans section displays information about the current certificate that is used for HTTPS scans Downloading the Certificate in to Y our Browser T o downloa[...]
-
Страница 90
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-28 Performing Network an d System Management v1.0, September 2009 Managing T rusted Certificates T o manage trusted certificates: Select W eb Security > Certificate Management from the menu. The Certificate Management screen displays. Figure 3-16 shows only th[...]
-
Страница 91
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-29 v1.0, September 2009 Importing a T rusted Certificate T o import a trusted certificate: 1. Click Br owse next to the Import from File field. 2. Navigate to a trusted certificate file on your computer . Follow the instructi[...]
-
Страница 92
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-30 Performing Network an d System Management v1.0, September 2009 Deleting an Untrusted Certificate T o delete an untrusted certificate: 1. Select the certificate from the Untrusted Certificates table. 2. Click Delete Selected . Moving an Untrusted Certificate to[...]
-
Страница 93
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-31 v1.0, September 2009 3. Click Apply to save your settings. Performance Management Performance management consists of controlling th e traffic through the STM so that the necessary traffic gets through when there is a bottl[...]
-
Страница 94
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-32 Performing Network an d System Management v1.0, September 2009 If you want to reduce tra ffic by preventing undesired e-mails from reac hing their destinations or b y preventing access to certain sites on the Internet, you can use the STM’ s content filterin[...]
-
Страница 95
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-33 v1.0, September 2009 – Setting the size of W eb files to be scanned . Scann i ng large W eb files requires netw ork resources and might slow down traffic. Y ou can specify the maximum file size that is scanned, and if fi[...]
-
Страница 96
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-34 Performing Network an d System Management v1.0, September 2009[...]
-
Страница 97
4-1 v1.0, September 2009 Chapter 4 Content Filtering and Optimizing Scans This chapter describes how to ap ply the content filtering features of the STM and how to opti mize scans to protect you r network. This chapter contains the following sections: • “About Content Filtering and Scans” on this page. • “Configuring E-mail Protection” [...]
-
Страница 98
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-2 Content Filtering and Optim izing Scans v1.0, September 2009 Default E-mail and W eb Scan Settings For most network environm ents, the default sca n se ttings and actions that are shown in Ta b l e 4 - 1 work well but you can adjust these to th e needs of your [...]
-
Страница 99
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-3 v1.0, September 2009 To o l s Alexa T oolbar Allowed GoT oMyPC Allowed Weatherbug Allowed Y ahoo T oolbar Allowed Web Object s Embedded Objects (ActiveX/Java/Flash Allowed Javascript Allowed Proxy Allowed Cookies Allowed Web[...]
-
Страница 100
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-4 Content Filtering and Optim izing Scans v1.0, September 2009 Configuring E-mail Protection The STM lets you configure the following settings to protect the network’ s e-mail communication: • The e-mail protocols that are scanned for malware threats. • Act[...]
-
Страница 101
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-5 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 2 . 3. Click Apply to save your settings. Customizing E-mail Anti-V irus Settings If you have used t he Setup W izard, you [...]
-
Страница 102
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-6 Content Filtering and Optim izing Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 3 . Figure 4-2 T able 4-3. E-mail Anti-Virus Action Settings Setting Descr[...]
-
Страница 103
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-7 v1.0, September 2009 3. Click Apply to save your settings. Configuring E-mail Anti-V irus Exception Settings T o configure the e-mail anti-virus exception setti ngs: 1. Select Email Security > Anti-V irus from the menu. T[...]
-
Страница 104
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-8 Content Filtering and Optim izing Scans v1.0, September 2009 3. Make your selection from the pull-down menu s and complete the field as explained in Ta b l e 4 - 4 . 4. Click Apply to save your settings. Configuring E-mail Anti-V irus Notification Settings T o [...]
-
Страница 105
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-9 v1.0, September 2009 Figure 4-4[...]
-
Страница 106
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-10 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 5 . T able 4-5. E-mail Anti-Virus Notification Settings Setting Descripti[...]
-
Страница 107
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-11 v1.0, September 2009 4. Click Apply to save your settings. E-mail Content Filtering The STM provides several options to filter unwa nted content from e-mails. Y o u can filter content from e-mails based on keywords in the s[...]
-
Страница 108
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-12 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure e-mail content filtering: 1. Select Email Security > Filters from the menu. The Filters screen displays. Figure 4-5[...]
-
Страница 109
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-13 v1.0, September 2009 2. Complete the fields and make your selections from the pull-down menus as explained in Ta b l e 4 - 6 . T able 4-6. E-mail Filter Settings Setting Description (or Subfield and Desc ription) Filter by [...]
-
Страница 110
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-14 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Click Apply to save your settings. Protecting Against E-mail S pam The STM integrates multiple anti-spam technologi es to provide comprehensive protection against unwanted e-mail. Y ou can enable [...]
-
Страница 111
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-15 v1.0, September 2009 2. Blacklist . E-mails from the specified sources are considered spam and are blocked. 3. Real-time blacklist . E-mails from known spam sources that are collected by blacklist providers are blocked. 4. [...]
-
Страница 112
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-16 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the whitelist and blacklist: 1. Select Email Security > Anti-Spam from the menu. The Anti-Sp am submenu tabs appear , with the Whitelist/Blacklist screen in view . Figure 4-6[...]
-
Страница 113
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-17 v1.0, September 2009 2. Complete the fields as explained in Ta b l e 4 - 6 . Configuring the Real-time Blacklist Blacklist providers are organizations that collect IP addresses of verified open SMTP relays that might be use[...]
-
Страница 114
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-18 Content Filtering and Optimizin g Scans v1.0, September 2009 By default, the STM comes with two pre-define d blacklist providers: Spamhaus, and Spamcop. Y ou can add a maximum of 16 black list providers to the RBL sources. T o enable the real-time blacklist: 1[...]
-
Страница 115
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-19 v1.0, September 2009 Configuring Distributed S pam Analysis Spam, phishing, and other e-mail- borne threats consist of milli ons of messages intentionally composed diff erently to evade co mmonly-used filters. Nonetheless, [...]
-
Страница 116
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-20 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 8 . Figure 4-8 T able 4-8. Distributed S pam Analysis Settings Setting De[...]
-
Страница 117
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-21 v1.0, September 2009 4. Click Apply to save your settings. The Distributed Spam Analysis sec tion and the Send Quarantine Spam Report section each have their own Apply and Reset buttons to enable you to make changes to thes[...]
-
Страница 118
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-22 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring W eb and Services Protection The STM lets you confi gure the following se ttings to protect the network’ s Internet communication: • The W eb protocols that are scanned for malware th[...]
-
Страница 119
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-23 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 8 . 3. Click Apply to save your settings Figure 4-9 T able 4-9. Web Policy Settings Setting Description Services to Scan H[...]
-
Страница 120
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-24 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Web Malware Scans If you have used the Setup W izard, you might have already configured the W eb malware action and exception scan settings; the Ma lware Scan screen allows you to modify [...]
-
Страница 121
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-25 v1.0, September 2009 T able 4-10. Malware S can Settings Setting Description Action HTTP and HTTPS Action From the HTTP or HTTPS pull-d own menu, specify one of the following actions when an i nfected Web file or object is [...]
-
Страница 122
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-26 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Click Apply to save your settings. Configuring Web Content Filtering If you want to restrict internal LAN users from a ccess to certain types of information and objects on the Internet, use the ST[...]
-
Страница 123
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-27 v1.0, September 2009 If you have used the S etup W izard, you might have already config ured the W eb category block ing settings; the Content Filtering screen al lows you to modi fy these settings. T o configure W eb conte[...]
-
Страница 124
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-28 Content Filtering and Optimizin g Scans v1.0, September 2009 . Figure 4-12 [Content Filtering, scre en 2 of 3][...]
-
Страница 125
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-29 v1.0, September 2009 . 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in T able 4-1 1 on page 4-30 . Figure 4-13 [Content Filtering, scre en 3 of 3][...]
-
Страница 126
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-30 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-1 1. Content Filter ing Settings Setting Description Content Filtering Log HTTP T raffic Select this checkbox to log HTTP traffic. For information about how to view the logged traffic, see ?[...]
-
Страница 127
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-31 v1.0, September 2009 Web Categorization Schedul e Do Y ou W ant this Schedule to be Active on All Days or S pecific Days? Select one of the following radio butto ns: • All Days . The schedule is in effect all days of the [...]
-
Страница 128
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-32 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. Configuring Web URL Filtering If you want to allow or block internal LAN user s from access to certain sites on the Internet, use the STM’ s W eb URL filtering[...]
-
Страница 129
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-33 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in T able 4-12 on page 4-34 . Figure 4-14[...]
-
Страница 130
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-34 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-12. URL Filtering Settings Setting Description Whitelist (takes precedence over Blacklist) Enable Select this checkbox to bypass scanning of the URLs that are listed in the URL field. Users [...]
-
Страница 131
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-35 v1.0, September 2009 4. Click Apply to save your settings. Add URL T ype or copy a URL in the Add URL field. Then, click the add table button to add the URL to the URL field. Import from File T o import a list with URLs int[...]
-
Страница 132
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-36 Content Filtering and Optimizin g Scans v1.0, September 2009 HTTPS Scan Settings HTTPS traffic is encrypted traf fic that cannot be scanned otherwise the data stream would not be secure. However , the STM can scan HTT PS traffic that is transmitted through an [...]
-
Страница 133
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-37 v1.0, September 2009 If one of these is not satisfied, a security aler t message appears in the browser window (see Figure 4-16 ). However , even when a certificate is truste d or still valid, or when the name of a certific[...]
-
Страница 134
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-38 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the HTTPS scan settings: 1. Select We b Security > HTTP/HTTPS from the menu. The HTTP/HTTPS submenu tabs appear , with the Malware Scan screen in view . 2. Click the HTTPS Settings s[...]
-
Страница 135
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-39 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 1 3 . 4. Click Apply to save your settings. S pecifying T rusted Host s Y ou can specify trusted hosts for which the ST M [...]
-
Страница 136
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-40 Content Filtering and Optimizin g Scans v1.0, September 2009 Note that c ertain sites contain el ements from dif f erent HTTPS hosts. As an example, assume that the https://example.com site contains HTTPS elements from the following three hosts: • trustedhos[...]
-
Страница 137
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-41 v1.0, September 2009 3. Complete the fields and select the checkbox as explaine d in Ta b l e 4 - 1 4 . 4. Click Apply to save your settings. Configuring FTP Scans Some malware threats are specifically developed to spread t[...]
-
Страница 138
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-42 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 1 5 . Figure 4-19 T able 4-15. FTP Scan Settings Setting Description Acti[...]
-
Страница 139
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-43 v1.0, September 2009 3. Click Apply to save your settings. Scan Exception From the pull-down menu, specify one of the followin g actions when a f ile or object exceeds the size that you specify in the file size field: • S[...]
-
Страница 140
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-44 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Application Control The STM lets you control user access to W eb applica tions such as instant messaging, media, peer- to-peer services, and online tools. Blocking an application prohibit[...]
-
Страница 141
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-45 v1.0, September 2009 Figure 4-21 [Application Control, scr een 2 of 3] Figure 4-22 [Application Control, scr een 3 of 3][...]
-
Страница 142
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-46 Content Filtering and Optimizin g Scans v1.0, September 2009 5. After you have configured each section, first click Apply to save the settings before you continue with the next section. Y ou must sa ve the configuration changes for each section individuall y .[...]
-
Страница 143
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-47 v1.0, September 2009 Setting Scanning Exclusions T o save resources, you can configur e scanning exclusions for IP addresses and ports that you know are secure. For example, if your network includes a W eb server that hosts[...]
-
Страница 144
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-48 Content Filtering and Optimizin g Scans v1.0, September 2009 3. In the Add column, click the add table button to add the exclus ion rule to the Scanning Exclusions table. The new exclusion rule is enabled by default. T o disable a rule, select the checkbox in [...]
-
Страница 145
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-49 v1.0, September 2009 2. Under the Exceptions table, click the add table button to specify an exception rule. The Add Exception screen displays. 3. Complete the fields and make your selections from the pull-down menus as exp[...]
-
Страница 146
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-50 Content Filtering and Optimizin g Scans v1.0, September 2009 Applies to (continued) All Users C li ck th e ap ply button to apply the exception to all users, both authenticated a nd unauthenticated. Authenticate d Click the apply button to apply the exception [...]
-
Страница 147
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-51 v1.0, September 2009 Applies to (continued) Group Membership by IP Do the following: 1. From the Name pull-down menu, select a grou p that is defined by its IP address. 2. Click the apply button to apply the excepti on to t[...]
-
Страница 148
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-52 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. The new exception rule is added to the Exceptions table. T o return to the Exception screen without adding the rule, click Return . 5. Select the checkbox to the[...]
-
Страница 149
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-53 v1.0, September 2009 2. Click one of the fo llowi ng table buttons: • disable . Disables the rule or rules. The “!” stat us icon changes from a green circle to a grey circle, indicating that the rule is or ru les are [...]
-
Страница 150
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-54 Content Filtering and Optimizin g Scans v1.0, September 2009[...]
-
Страница 151
5-1 v1.0, September 2009 Chapter 5 Managing Users, Group s, and Authentication This chapter describes how to manage users, grou ps, and authentication on the STM. This chapter contains the following sections: • “About Users, Groups, and Domai ns on this page. • “Configuring Groups” on page 5-2 . • “Configuring User Accounts” on page[...]
-
Страница 152
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-2 Managing Users, Groups, and Authen tication v1.0, September 2009 • Authenticated users . User who have a computer behind t he STM, who log in to the STM with a user name and password, and who are a ssigned an access policies that normally differs from the STM[...]
-
Страница 153
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-3 v1.0, September 2009 Creating and Deleting Group s by Name T o create a local group by name: 1. Select User Management > Groups from the menu. The Groups screen displays ( Figure 5-1 contains one example). The List of[...]
-
Страница 154
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-4 Managing Users, Groups, and Authen tication v1.0, September 2009 3. Click the add table button. The new group is added to the List of Groups table. T o delete a group from the List of Groups table, click th e delete table button in the Action column for the gro[...]
-
Страница 155
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-5 v1.0, September 2009 4. Click Apply to save your c hanges. Creating and Deleting Group s by IP Address and Subnet T o create a group by IP address and subnet: 1. Select User Management > IP Subnet/Groups from the menu[...]
-
Страница 156
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-6 Managing Users, Groups, and Authen tication v1.0, September 2009 2. In the Add New IP Subnets/Groups section of th e screen, complete the fields as explained in Ta b l e 5 - 3 . 3. Click the add table button. The new group is added to the Groups Membership by I[...]
-
Страница 157
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-7 v1.0, September 2009 The List of Users table displays the users with the following fields: • Enable . The check box allows you to enab le or disable the user . • Name . The name of the user . • Group . The gr oup t[...]
-
Страница 158
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-8 Managing Users, Groups, and Authen tication v1.0, September 2009 3. Click the add table button. The new user is added to the List of Users table. T o delete a user from the List of Users table, click the de lete table button in the Action column for the user th[...]
-
Страница 159
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-9 v1.0, September 2009 Configuring Authentication The login screen and authentication on the STM de pends on the user type and the authentication method: • Administrative users . Users wi th administrative and guest priv[...]
-
Страница 160
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-10 Managing Users, Groups, and Au thentication v1.0, September 2009 After a user has logged in through the User Portal Login screen, th e Authentication screen displays. The Authentication screen shows the IP address w ith which the user has logged in and lets a [...]
-
Страница 161
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-11 v1.0, September 2009 b. Log in again. c. On the Authentication screen (see Figure 5 -8 on page 5-10 ), click the logout link. In addition to authentication through the STM’ s local user database, the STM supports the [...]
-
Страница 162
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-12 Managing Users, Groups, and Au thentication v1.0, September 2009 RADIUS support two types of protocols: – PA P . Password Authentication Protocol (P AP) is a simple protocol in which the client sends a password in clear text. – CHAP . Challenge Ha ndshake [...]
-
Страница 163
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-13 v1.0, September 2009 If the size limit is exceeded so that “dc=co mpanyname,dc= com” misses some entries during the lookup process, a user can still be properly auth enticated. However , to prevent the size limit fr[...]
-
Страница 164
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-14 Managing Users, Groups, and Au thentication v1.0, September 2009 4. T o verify Jamie Hanson’ s user logon name, c lick the Account tab. The account properties for Jamie Hanson display . 5. Log in to the STM. 6. Select User Management > Authentications fro[...]
-
Страница 165
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-15 v1.0, September 2009 • The full name, Jamie Hanson ( Figure 5-12 show s only the Bind DN field). • The W indow s account name in e-ma il format such as jhanson@tes t AD.com ( Figu re 5-13 shows only the Bind DN fiel[...]
-
Страница 166
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-16 Managing Users, Groups, and Au thentication v1.0, September 2009 9. Click T est to verify that the LDAP server can actually function with th e bind DN that you hav e modified. The automated test procedure checks the connection to the LD AP server; the bind DN,[...]
-
Страница 167
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-17 v1.0, September 2009 The List of LDAP table di sp lays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned. • Server . The IP address of the LDAP or Active Dir[...]
-
Страница 168
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-18 Managing Users, Groups, and Au thentication v1.0, September 2009 3. Click T est to verify that the LDAP server can actu ally function with th e LDAP settings that you have specified. The automated test procedur e check s the con ne cti on to the LDAP server; t[...]
-
Страница 169
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-19 v1.0, September 2009 T o delete a domain and server from th e List of LDAP table, click the delete table button in the Action column for the domain and se rver that you want to delete. Editing LDAP and Acti ve Directory[...]
-
Страница 170
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-20 Managing Users, Groups, and Au thentication v1.0, September 2009 The List of RADIUS table displays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned. • Server . The IP address of the RADIUS server .[...]
-
Страница 171
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-21 v1.0, September 2009 4. Click T est to verify that the RADIUS server can act ually function with the RADIUS settings that you have specified. The automated test procedure checks th e connection to the RAD IUS server; th[...]
-
Страница 172
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-22 Managing Users, Groups, and Au thentication v1.0, September 2009 Editing RADIUS Domains and Configuring VLANs T o edit a RADIUS domain: 1. Select User Management > Authentication from the me nu. The authen tication submenu tabs appear with the LDAP screen i[...]
-
Страница 173
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-23 v1.0, September 2009 4. Modify the fields and make your selections from the pull-do wn menu as explained in T able 5-6 on page 5-20 . 5. Click T est to verify that the RADIUS server can act ually function with the RADIU[...]
-
Страница 174
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-24 Managing Users, Groups, and Au thentication v1.0, September 2009 Global User Settings Y ou can globally set the user session settings fo r authenticated users. T hese settings include the session expiration period, the allowed s ession idle tim e, and the defa[...]
-
Страница 175
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-25 v1.0, September 2009 3. Click Apply to save the session settings. 4. Locate the Users Portal Login Settings sectio n on screen, and specify the default domain settings: •F r o m t h e Default Domain pull-down menu, se[...]
-
Страница 176
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-26 Managing Users, Groups, and Au thentication v1.0, September 2009 T o view all or selected users: 1. On the Active Users screen (see Figure 5-18 on page 5-25 ), select one of the following radio buttons: • Vi e w A l l . This selection returns all active user[...]
-
Страница 177
6-1 v1.0, September 2009 Chapter 6 Monitoring System Access and Performance This chapter describes the system monitoring feat ures of the STM. Y ou can be alerted to importa nt events such as attacks and login failures. Y ou can al so view the system status and real-time traf fic and security information. In addition, the diagnostics utilities are [...]
-
Страница 178
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-2 Monitoring System Access and Performanc e v1.0, September 2009 Configuring the E-mail Notification Server If you have used the Setup W izard, you might have already configured the e-mail notification server; the E-mail Notification Server scr een allows you to [...]
-
Страница 179
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-3 v1.0, September 2009 3. Click Apply to save your settings. Configuring and Activating S ystem, E-mail, and Syslog Logs Y ou can configure the STM to log system events such as a change of time by an NTP server , secure login[...]
-
Страница 180
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-4 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the Enable checkbox to enable the STM to send logs to an e-mail address. 4. Complete the fields, select the radio button and checkboxes, and make your selections from the pull-down men us [...]
-
Страница 181
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-5 v1.0, September 2009 5. Click Apply to save your settings. Sending Log to a Syslog Se rvers T o enable and configure logs to be sent to a syslog server: 1. Select Monitoring > Logs & Reports from the menu. The Logs &[...]
-
Страница 182
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-6 Monitoring System Access and Performanc e v1.0, September 2009 3. 4. Select the Enable checkbox to enable the STM to send logs to a syslog server . 5. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in [...]
-
Страница 183
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-7 v1.0, September 2009 6. Click Apply to save your settings. Clearing Logs 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear , with the Email and Syslog screen in view (see[...]
-
Страница 184
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-8 Monitoring System Access and Performanc e v1.0, September 2009 2. Locate the Clear the Following Log In formation sectio n at the bottom of the screen. 3. Select the checkboxes to speci fy which logs are cleared: • System . The system event logs are cleared. [...]
-
Страница 185
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-9 v1.0, September 2009 T o configure and activate the e-mail alerts: 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear , with the Email and Syslog screen in view . 2. Click[...]
-
Страница 186
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-10 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Apply to save your settings. Enable Malware Alerts Select this checkbox to enable malware alerts, and configure the Subje c t an d Message fields. Subject Enter the subject line for the e-[...]
-
Страница 187
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-11 v1.0, September 2009 Monitoring Real-T ime T raffic, Security , S tatistics, and W eb Usage Y ou can monitor the real-time traffic, security events, and s tatistics from the Da shboard screen. The W eb Usage screen display[...]
-
Страница 188
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-12 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-5 on page 6-13 explains the fields of the S tatus, T otal Threats, Threats (Last 7 Days) sections of the Dashboard screen. Figure 6-6 [Dashboa rd, screen 1 of 3][...]
-
Страница 189
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-13 v1.0, September 2009 T able 6-5. Dashboard: S tatu s, T otal Threats, a nd Threat s (Last 7 Days) formation Item Description Stat us System The current CPU, memory, and hard disk usage. When usage is within safe limits, th[...]
-
Страница 190
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-14 Monitoring System Access and Performanc e v1.0, September 2009 Threats (Last 7 Days) This is a graphic that shows the relative numb er of th reats and access violations over the last week, using different colors for the various applications: Note : IMBlock sta[...]
-
Страница 191
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-15 v1.0, September 2009 Ta b l e 6 - 6 explains the fields of the T otal Scanned Services Traf fic, Most Recent 5 and T op 5 sections of the Dashboard screen. T able 6-6. Dashboard: T ot al Scanned Services T raffic and Most [...]
-
Страница 192
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-16 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-7 on page 6-17 explains the fields of the Service Statistics and Interface Statistics sections of the Dashboard screen. Figure 6-8 [Dashboa rd, screen 3 of 3] Note: Figure 6-8 shows the In[...]
-
Страница 193
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-17 v1.0, September 2009 T able 6-7. Dashboard: Service S tatistics an d Interface St atistics Informa tion Item Description Service S tatist ics For each of the six supported protocols (HTTP , HTTPS, FTP , SMTP , POP3, and IM[...]
-
Страница 194
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-18 Monitoring System Access and Performanc e v1.0, September 2009 Monitoring W eb Usage The W eb Usage screen shows you how the STM’ s W eb resources are being used. Y ou can see , for example, which host on the STM uses most resources. T o view the STM’ s W [...]
-
Страница 195
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-19 v1.0, September 2009 3. Use the From pull-down menu to select the start date of the W eb usage report (year , month, date) and the To pull-down menu to select the end date of the report (year , month, date). 4. Click Vi e [...]
-
Страница 196
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-20 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-8 on page 6-21 explains the fields of the System Information, Management Interface Information, and Interfaces sections of the System Status screen. Figure 6-10[...]
-
Страница 197
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-21 v1.0, September 2009 T able 6-8. System St atus Information Setting Description System Information Firmware Information The current version and most recent update (that is, the most recently downloaded ve rsion) for the so[...]
-
Страница 198
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-22 Monitoring System Access and Performanc e v1.0, September 2009 Querying Logs and Generating Report s The extensive logging and reporting functions of the STM let you perform the fo llowing tasks that help you to monitor the protection of th e network and the p[...]
-
Страница 199
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-23 v1.0, September 2009 Y ou can query and generate each type of log separately and filter the information based on a number of criteria. For example, you can filter the virus logs using the following criteria (other log type[...]
-
Страница 200
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-24 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in T able 6-9 on page 6-25 . Figure 6-1 1[...]
-
Страница 201
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-25 v1.0, September 2009 T able 6-9. Log Query Settings Setting Description (or Subfie ld and Description) Log T ype Select one of the following log types from the pull-down menu: • Tr a f f i c . All scanned incoming and ou[...]
-
Страница 202
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-26 Monitoring System Access and Performanc e v1.0, September 2009 Search Criteria (continued) Client IP The cli ent IP address that is querie d. This field is available for the following logs : T raffic, Virus, S pyware, S pam, Content filters, and Application. S[...]
-
Страница 203
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-27 v1.0, September 2009 4. Click one of the fo llowi ng action buttons: • Search . Query the log according to the search crite ria that you specifie d and view the log through the W eb Management Interfac e, that is, on scr[...]
-
Страница 204
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-28 Monitoring System Access and Performanc e v1.0, September 2009 T o identify infected clients that are sending spywar e or a virus in outbound traffic, query the STM spyware and virus logs and see if any of your internal IP addresses are the source of spyware o[...]
-
Страница 205
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-29 v1.0, September 2009 – Number of malware incidents – Number of files blocked – Number of blackl ist violations (not appli cable to IMAP) – Number of e-mails captured by Distributed Spam Analysis (not applicable to [...]
-
Страница 206
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-30 Monitoring System Access and Performanc e v1.0, September 2009 – T op 10 blocked clients by coun t – For each applicatio n, the number of blocked requests, in a graphic The reports t hat you select ar e generated as MH TML files, which contain headers for [...]
-
Страница 207
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-31 v1.0, September 2009 4. Click Generate . After a few minutes, the report are added to the Report List, which can contain a maximum of five saved reports. (T o delete a a previously saved report, click its delete table butt[...]
-
Страница 208
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-32 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and complete the fields as explained in Ta b l e 6 - 1 1 . Figure 6-13 T able 6-1 1. Schedule Report Settings Setting Description Report Settings Frequency Select one of th[...]
-
Страница 209
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-33 v1.0, September 2009 4. Click Apply to save your settings. V iewing and Managing the Quarantine Files Depending on the selections that you made in the Email Security and W eb Security main menus (see Chapter 4, “Content [...]
-
Страница 210
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-34 Monitoring System Access and Performanc e v1.0, September 2009 Y ou can query and view the spam quarantine file and the malware quarantin e file separately and filter the information based on a number of crite ria. Y ou can filter the spam quarantine file usin[...]
-
Страница 211
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-35 v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in Ta b l e 6 - 9 . Figure 6-14 T able 6-1 2. Quaran ti ne File Settings[...]
-
Страница 212
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-36 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Sear ch . Depending on the selected quarantine f ile (spam or malware), the Quarantine screen displays the Quarantined Spam table or th e Quarantined Infected Files table, which are explai[...]
-
Страница 213
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-37 v1.0, September 2009 The Quarantined Spam table shows the following columns: • Checkbox . Lets you select the table entry . • Date . The date that the e-mail was received. • Pro tocol . The protocol (SMTP) in which t[...]
-
Страница 214
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-38 Monitoring System Access and Performanc e v1.0, September 2009 • Send as Ham . The selected spam e-mail files are not tagged a s spam for Distributed Spam Analysis, ar e dele ted from the quarantine file, and are sent to the intended recipients. • Delete .[...]
-
Страница 215
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-39 v1.0, September 2009 Figure 6-18 shows the Quarantined Infected Files table with da ta. After you have selected one or more table entri e s, take one of the followi ng actions (or click the Return hyperlink to return to th[...]
-
Страница 216
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-40 Monitoring System Access and Performanc e v1.0, September 2009 2. Select the start date and time from the Begin Date/T ime pull-down menus. 3. Specify the recipient’ s e-mail address in the Send to field. 4. Click Send Report . Using Diagnostics Utilities Th[...]
-
Страница 217
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-41 v1.0, September 2009 Using the Network Diagnostic T ools This section discusses the Ping or Trace an IP Address section and the Perform a DNS Lookup section of the Diagnostics screen. Sending a Ping Packet Use the Ping uti[...]
-
Страница 218
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-42 Monitoring System Access and Performanc e v1.0, September 2009 Looking up a DNS Address A DNS (Domain Name Server) conv erts the Internet name (for ex ample, www .netgear .com) to an IP address. If you need the IP address of a W eb, FTP , mail, or other server[...]
-
Страница 219
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-43 v1.0, September 2009 4. In Destination IP Address, enter the IP address of the destination of the traffic stream that you want to analyze. 5. Click St a r t . Y ou are prompted to save the download ed traffic information f[...]
-
Страница 220
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-44 Monitoring System Access and Performanc e v1.0, September 2009 Gathering Import ant Log Information T o gather log info rmation about your STM: 1. Locate the Gather Important Log Inform ation section on the Diagnostics screen. 2. Click Download Now . Y ou are [...]
-
Страница 221
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-45 v1.0, September 2009 T o shut down the STM: 1. Locate the Res tart & Shutdown s ection on the Diagnostics screen (this section is not sh own on any of the Diagnostics screen figures in this manual). 2. Click the Shutdo[...]
-
Страница 222
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-46 Monitoring System Access and Performanc e v1.0, September 2009[...]
-
Страница 223
7-1 v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support This chapter provides troubleshooting tips and information for the STM. A fter each problem description, instructions are prov ided to help you diagnose and solve the problem. For the common problems listed, go to the section indicated. • Is the STM on? Go to “Basic Fu[...]
-
Страница 224
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-2 Troubleshooting and Using Online Support v1.0, September 2009 Basic Functioning After you turn on power to the STM, the fo llowing sequence of events should occur: 1. When power is first applied, ve rify that the PWR LED is on. 2. After approximately two minute[...]
-
Страница 225
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-3 v1.0, September 2009 If all LEDs are still more than several minutes minute after power up: • T urn the power off, and then turn it on again to see if the STM recovers. • Clear the STM’ s configuration to factory defa[...]
-
Страница 226
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-4 Troubleshooting and Using Online Support v1.0, September 2009 • Make sure that you are using the SSL https: //addr ess login rather than the http://addr ess login. • Make sure that your browser has Java, JavaS cript, or ActiveX enabled. If you are using Int[...]
-
Страница 227
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-5 v1.0, September 2009 T roubleshooting a TCP/IP Ne twork Using a Ping Utility Most TCP/IP terminal devices and firewalls contain a ping utility th at sends an echo request packet to the designated device. The device then res[...]
-
Страница 228
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-6 Troubleshooting and Using Online Support v1.0, September 2009 T esting the Path from Y our PC to a Remote Device After verifying that the LAN path works correctly , test the path from your PC to a remote device. From the W indows run menu, type: PING -n 10 <[...]
-
Страница 229
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-7 v1.0, September 2009 The STM restarts. During the reboot process, the Backup & Restore Se ttings screen remains visible. The reboot process is complete after several minutes when the T est LED (STM150) or St atus LED (S[...]
-
Страница 230
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-8 Troubleshooting and Using Online Support v1.0, September 2009 Using Online Support The STM includes online support tools that a llow NETGE A R T echnical Support to securely perform diagnostics of the STM, and that lets you submit suspic ious files for analysis[...]
-
Страница 231
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-9 v1.0, September 2009 Inst alling Hot Fixes NETGEAR might release hot fixes or patches if certain problems are found in any software release. When a hot fix is available, install it immediately to ensure op timum pe rformanc[...]
-
Страница 232
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-10 Troubleshooting and Using Online Support v1.0, September 2009 6. Navigate to the location on your computer where you have saved the hot fix file, and then select it. 7. Click Open. The hot fix file now appears in the Import from File field. 8. Click Apply to i[...]
-
Страница 233
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-11 v1.0, September 2009 3. Click Submit . Accessing the Knowledge Base and Document ation T o access NETGEAR’ s Knowledge Base for the STM, select Support > Knowledge Base from the menu. T o access NETGEAR’ s documenta[...]
-
Страница 234
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-12 Troubleshooting and Using Online Support v1.0, September 2009[...]
-
Страница 235
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-1 v1.0, September 2009 Appendix A Default Settings and T echnical Specifications T o return the STM returns to the default fact ory configuration settings that are shown in Ta b l e A - 1 , click the default button on th[...]
-
Страница 236
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-2 Default Settings and Technical Specifications v1.0, September 2009 Ta b l e A - 2 shows the STM specifications. LAN Connecti ons MAC Address Default address MTU Size 1500 Ports STM150: 5 AutoSense 10/100/1000BASE-T , RJ-45 STM300: 3 AutoSense 10/100/1000BASE-T [...]
-
Страница 237
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-3 v1.0, September 2009 Electromagnetic Emissions Meets requirements of FCC Part 1 5 Class A VCCI Class A CE mark, commercial Safety Meets requirements of UL listed C-T ick T able A-2. STM Specifications (continued) Featu[...]
-
Страница 238
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-4 Default Settings and Technical Specifications v1.0, September 2009[...]
-
Страница 239
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Related Documents B-1 v1.0, September 2009 Appendix B Related Document s This appendix provides links to reference documents yo u c an use to gain a more complete understanding of the technolog ies used in your NETGEAR product. Document Li nk TCP/IP Networking Basics [...]
-
Страница 240
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual B-2 Related Documents v1.0, September 2009[...]
-
Страница 241
Index-1 v2.0, February 2007 Index Numerics 10BaseT , 100BaseT , and 1000BaseT 3-4 A AC input STM150 1-14 STM300 1-15 STM600 1-15 access preventing inherited privileges 5-1 1 read/write and read-only 3-9 remote management 3-1 1 action buttons (W eb Management Interface) 2-8 activating, ser vice licenses 1-6 , 2-28 Active Directory (AD) domains 5-16 [...]
-
Страница 242
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-2 v2.0, Februar y 2007 keywords, e-mails 4-1 1 , 4-13 sites, reducing traffic 3-32 URLs 4- 34 We b access exceptions 4-49 categories 2-25 , 4-26 , 4-30 objects 4-26 , 4-30 bottom panel and label STM150 1-16 STM300 1-16 STM600 1-17 browsers, for W eb Management Interface 2- 5 bundle key , for r[...]
-
Страница 243
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-3 v2.0, February 2007 D date settings 2-13 , 3-23 , 3-24 troubleshooting 7-7 daylight savings time 2-13 , 3-24 debug logs 6-43 dedicated management VLAN port 1-6 defaults configuration restoring 7-6 settings A-1 content filtering settings 4-2 domains, for authent ica ti on 5-25 factory default[...]
-
Страница 244
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-4 v2.0, Februar y 2007 exclusions, scanning 4-47 executable files e-mail filtering 4- 14 FTP filtering 4-43 We b f i l t e r i n g 4-30 F facilities, syslog server 6-7 factory defaults login 1-15 service license s, automatic retrieval 2-30 settings, reverting to 3-18 failure bypass 1-6 feature[...]
-
Страница 245
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-5 v2.0, February 2007 hot fixes 7-9 HTML, scanning 4-25 HTTP action, infected W e b file or object 2-18 , 4-25 concurrently scanned connections 1-5 default port 2-17 , 4-23 enabling scanning 2-17 , 4-23 logging, traffic 4-30 proxy settings configuring manually 3-8 using the Setup W izard 2-23 [...]
-
Страница 246
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-6 v2.0, Februar y 2007 troubleshooting 7-2 , 7-3 ports STM150 1-8 STM300 1-10 STM600 1-12 LDAP binding a dn 5-12 configuring a dn 5-17 domains 5-16 overview 5-1 1 settings 5-17 users and groups 4-51 LEDs Hard drive (HDD) STM150, not applicable STM300 1-1 1 STM600 1-13 LAN STM150 1-9 STM300 1-1[...]
-
Страница 247
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-7 v2.0, February 2007 digital certific ates 3-25 performance 3-31 Management Information Base. See MIB. management ports STM150, not applicable STM300 1-10 STM600 1-12 maximum transmiss ion unit. See MTU (settings). media applications configuring 4-46 defaults 4-2 status 6-13 memory usage 6-13[...]
-
Страница 248
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-8 v2.0, Februar y 2007 placement, locati on 1-17 polling interval 6-1 1 POP3 action, infected e-mails 2-15 , 4-7 default port 2-15 , 4-5 Distributed Spam Analysis 4-20 enabling scanning 2-15 , 4-5 file extension blocking 4-14 file name blocking 4-14 keyword blocking 4-13 password-protected att[...]
-
Страница 249
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-9 v2.0, February 2007 real-time protection, capab ilities 1-4 traffic, diagnostics 6-42 real-time black list (RBL ), e-mails 4-17 real-time clock . See RT C . rear panel STM150 1-14 STM300 1-15 STM600 1-15 rebooting 6-44 reducing traffic 3-32 reference documents B-1 registering with NETGEAR 2-[...]
-
Страница 250
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-10 v2.0, Februar y 2007 shutting down 6-44 signatures, pattern file 2-22 Simple Mail T ransfer Protocol. See SMTP . Simple Network Management Protocol. See SNMP . size, exceptions e-mail attachm ent s 2-16 , 4-8 FTP files and objects 4-43 W eb files and objects 2- 19 , 4-25 size, quara ntine a[...]
-
Страница 251
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-11 v2.0, February 2007 rear panel 1-15 Stream Scanning technology overview 1-4 streaming, sca nned file parts 2-18 , 4-25 submenu tabs (W eb Ma nagement Interface) 2-8 subnet mask, STM 2-12 , 3-4 support, online 7-8 suspicious files 7-10 switch, power STM150 1-14 STM300 1-15 STM600 1-15 syslog[...]
-
Страница 252
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-12 v2.0, Februar y 2007 update failure alert 6-8 , 6-9 update servers 2-22 , 3-21 update settings backing up 3-16 security subscriptions configuring manually 3-19 using the Setup W izard 2-21 updates critical 3-22 product xiv scheduling 2-22 , 3-19 updating software automatic ally 3-21 manuall[...]
-
Страница 253
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-13 v2.0, February 2007 reports 6-29 , 6-33 scan throughput 1-5 security settings, using the Setup W i zard 2-17 statistics 6-13 usage monitoring 6-18 reports 6-19 W eb Management Interface 2-8 browsers, qualified 2-5 layout 2-8 settings 2-1 1 status 6-21 troubleshooting 7-3 whitelist e-mails 4[...]
-
Страница 254
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-14 v2.0, Februar y 2007[...]