NETGEAR STM150EW3-100NAS manual Use the Installation Guide to Perform Initial Configuration

Page 24

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

Segmented LAN Deployment.

Figure 2-3

In a segmented LAN deployment, one STM150 appliance is installed in front of each network segment. This type of deployment helps split the network load and protects network segments from malware coming in through the gateway or originating from other segments.

Note: In segmented LAN deployment, VLAN is not supported; VLAN traffic cannot pass through the STM150.

Use the Installation Guide to Perform Initial Configuration

Use the installation guide to perform the initial configuration of the STM150’s basic system settings (for example, IP address, netmask, and DNS) so that it can function on the network. To perform the initial configuration, follow the instructions in the NETGEAR Installation Guide, STM150. The installation guide will walk you through connecting the unit, and using the setup wizard to complete the initial configuration. After using the setup wizard to complete the initial configuration, you can log in to make additional changes or to monitor the system using the steps below.

2-4

Provisioning Threat Management Services

v1.1, March 2009

Image 24
Contents NETGEAR, Inc Trademarks Statement of ConditionsEU Regulatory Compliance Statement Bestätigung des Herstellers/ImporteursVoluntary Control Council for Interference Vcci Statement Additional CopyrightsMD5 Product and Publication Details ZlibV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page About This Manual Conventions, Formats, and ScopeRevision History Manual Part Publication Version Description Number DateChapter Introduction Key Features and Capabilities About Stream ScanningWhat Can You Do with an STM150? Service Registration Card with License Keys Front Panel FeaturesRear Panel Features Default IP Address, Login Name, and Password Location Choosing a Location for the STM150Using the Rack Mounting Kit V1.1, March Provisioning Threat Management Services Choosing a Deployment ScenarioGateway Deployment Server Group Use the Installation Guide to Perform Initial Configuration Segmented LAN DeploymentLogging In to the STM150 V1.1, March Registering the STM150 Click RegisterUse the Setup Wizard to Complete the Configuration Setup Wizard OptionsEmail Security Web SecurityVerifying the STM150 Installation Update SettingsEmail Notification Server Web CategoriesTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time Specifying the Notification Server To specify a notification serverClick Save Changes Customizing Email AlertsTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up and Restoring Configurations Backing Up the STM150 ConfigurationTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Resetting to Factory Defaults Restarting the STM150Enabling Remote Management Administering Software Updates Configuring Scheduled UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Default Scan Settings Chapter Customizing ScansCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering Filter by Password-protected Attachments Filter by Subject KeywordsFile Extension Filter by File TypeSetting Up the Whitelist and Blacklist Protecting Against Email SpamTo define the sender whitelist. On the menu, go to Email Security Anti-Spam Whitelist and BlacklistConfiguring the Real-time Blacklist To define the recipient whitelist. On the menu, go toConfiguring Distributed Spam Analysis To add a new providerTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March Configuring Web URL Filtering White ListBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling Show This Message When an SSL Connection Attempt Fails STM150 CA CertificateV1.1, March Certificate Management Web Security Https Scan Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Querying Logs Sending LogsUsing Logs to Identify Infected Clients Log ManagementWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes Sending Suspicious Files to Netgear for Analysis On the menu, go to Support Malware AnalysisAppendix a Default Settings and Technical Specifications Table A-1. STM150 Default Configuration SettingsSTM150 specifications are listed in the table below Appendix B Related Documents Document LinkV1.1, March Index N