NETGEAR STM150EW3-100NAS manual What to Do Next, Testing Connectivity, Testing Http Scanning

Page 30

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

Testing Connectivity

Do the following to verify that network traffic can pass through the STM150:

Ping an Internet URL.

Ping the IP address of a device on either side of the STM150.

Testing HTTP Scanning

If client computers have direct access to the Internet through your LAN, try to download the eicar.com test file from

http://www.eicar.org/download/eicar.com

The eicar.com test file is a legitimate DOS program and is safe to use because it is not a malware and does not include any fragments of malware code. The test file is provided by EICAR, an organization which unites efforts against computer crime, fraud, and misuse of computers or networks.

1.Log on to the STM150 interface, and then verify that HTTP scanning is enabled. For instructions, see “Customizing Email Scanning Settings” on page 4-2and “Customizing Web Scanning Settings” on page 4-12.

2.Check the downloaded file and note the attached malware information file.

What to Do Next

You have completed setting up and deploying the STM150 to the network. The STM150 is now set up to scan the protocols/services you specified for malware and perform updates based on the configured update source and frequency.

If you need to change the settings or to view reports or logs, connect to the STM150 Web interface (using the IP address you assigned to the STM150 during the preconfiguration process), and then log on.

Refer to the succeeding chapters for information on performing additional tasks using the Web interface.

2-10

Provisioning Threat Management Services

v1.1, March 2009

Image 30
Contents NETGEAR, Inc EU Regulatory Compliance Statement TrademarksStatement of Conditions Bestätigung des Herstellers/ImporteursVoluntary Control Council for Interference Vcci Statement Additional CopyrightsMD5 Product and Publication Details ZlibV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page About This Manual Conventions, Formats, and ScopeRevision History Manual Part Publication Version Description Number DateChapter Introduction Key Features and Capabilities About Stream ScanningWhat Can You Do with an STM150? Service Registration Card with License Keys Front Panel FeaturesRear Panel Features Default IP Address, Login Name, and Password Location Choosing a Location for the STM150Using the Rack Mounting Kit V1.1, March Provisioning Threat Management Services Choosing a Deployment ScenarioGateway Deployment Server Group Use the Installation Guide to Perform Initial Configuration Segmented LAN DeploymentLogging In to the STM150 V1.1, March Registering the STM150 Click RegisterEmail Security Use the Setup Wizard to Complete the ConfigurationSetup Wizard Options Web SecurityEmail Notification Server Verifying the STM150 InstallationUpdate Settings Web CategoriesTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time Specifying the Notification Server To specify a notification serverClick Save Changes Customizing Email AlertsTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up and Restoring Configurations Backing Up the STM150 ConfigurationTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Resetting to Factory Defaults Restarting the STM150Enabling Remote Management Administering Software Updates Configuring Scheduled UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Default Scan Settings Chapter Customizing ScansCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering File Extension Filter by Password-protected AttachmentsFilter by Subject Keywords Filter by File TypeSetting Up the Whitelist and Blacklist Protecting Against Email SpamTo define the sender whitelist. On the menu, go to Email Security Anti-Spam Whitelist and BlacklistConfiguring the Real-time Blacklist To define the recipient whitelist. On the menu, go toConfiguring Distributed Spam Analysis To add a new providerTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March Configuring Web URL Filtering White ListBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling Show This Message When an SSL Connection Attempt Fails STM150 CA CertificateV1.1, March Certificate Management Web Security Https Scan Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Querying Logs Sending LogsUsing Logs to Identify Infected Clients Log ManagementWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes Sending Suspicious Files to Netgear for Analysis On the menu, go to Support Malware AnalysisAppendix a Default Settings and Technical Specifications Table A-1. STM150 Default Configuration SettingsSTM150 specifications are listed in the table below Appendix B Related Documents Document LinkV1.1, March Index N