ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual
Testing Connectivity
Do the following to verify that network traffic can pass through the STM150:
•Ping an Internet URL.
•Ping the IP address of a device on either side of the STM150.
Testing HTTP Scanning
If client computers have direct access to the Internet through your LAN, try to download the eicar.com test file from
http://www.eicar.org/download/eicar.com
The eicar.com test file is a legitimate DOS program and is safe to use because it is not a malware and does not include any fragments of malware code. The test file is provided by EICAR, an organization which unites efforts against computer crime, fraud, and misuse of computers or networks.
1.Log on to the STM150 interface, and then verify that HTTP scanning is enabled. For instructions, see “Customizing Email Scanning Settings” on page
2.Check the downloaded file and note the attached malware information file.
What to Do Next
You have completed setting up and deploying the STM150 to the network. The STM150 is now set up to scan the protocols/services you specified for malware and perform updates based on the configured update source and frequency.
If you need to change the settings or to view reports or logs, connect to the STM150 Web interface (using the IP address you assigned to the STM150 during the preconfiguration process), and then log on.
Refer to the succeeding chapters for information on performing additional tasks using the Web interface.
Provisioning Threat Management Services |