NETGEAR STM150EW3-100NAS manual Product and Publication Details, Zlib

Page 5

PPPCopyright (c) 1989 Carnegie Mellon University. All rights reserved.

Redistribution and use in source and binary forms are permitted provided that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materials related to such distribution and use acknowledge that the software was developed by Carnegie Mellon University. The name of the University may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Zlib

zlib.h -- interface of the 'zlib' general purpose compression library version 1.1.4, March 11th,

 

2002. Copyright (C) 1995-2002 Jean-loup Gailly and Mark Adler.

 

This software is provided 'as-is', without any express or implied warranty. In no event will the

 

authors be held liable for any damages arising from the use of this software. Permission is

 

granted to anyone to use this software for any purpose, including commercial applications,

 

and to alter it and redistribute it freely, subject to the following restrictions:

 

1. The origin of this software must not be misrepresented; you must not claim that you wrote

 

the original software. If you use this software in a product, an acknowledgment in the

 

product documentation would be appreciated but is not required.

 

2. Altered source versions must be plainly marked as such, and must not be misrepresented

 

as being the original software.

 

3. This notice may not be removed or altered from any source distribution.

 

Jean-loup Gailly: jloup@gzip.org; Mark Adler: madler@alumni.caltech.edu

 

The data format used by the zlib library is described by RFCs (Request for Comments) 1950

 

to 1952 in the files ftp://ds.internic.net/rfc/rfc1950.txt (zlib format), rfc1951.txt (deflate format)

 

and rfc1952.txt (gzip format)

Product and Publication Details

Model Number:

STM150

Publication Date:

March 2009

Product Family:

Threat Management Appliance

Product Name:

ProSecure Web/Email Security Threat Management Appliance STM150

Home or Business Product:

Business

Language:

English

Publication Part Number:

202-10414-02

Publication Version Number

1.1

v

v1.1, March 2009

Image 5
Contents NETGEAR, Inc Statement of Conditions TrademarksEU Regulatory Compliance Statement Bestätigung des Herstellers/ImporteursAdditional Copyrights Voluntary Control Council for Interference Vcci StatementMD5 Zlib Product and Publication DetailsV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page Conventions, Formats, and Scope About This ManualManual Part Publication Version Description Number Date Revision HistoryChapter Introduction About Stream Scanning Key Features and CapabilitiesWhat Can You Do with an STM150? Front Panel Features Service Registration Card with License KeysRear Panel Features Choosing a Location for the STM150 Default IP Address, Login Name, and Password LocationUsing the Rack Mounting Kit V1.1, March Choosing a Deployment Scenario Provisioning Threat Management ServicesGateway Deployment Server Group Segmented LAN Deployment Use the Installation Guide to Perform Initial ConfigurationLogging In to the STM150 V1.1, March Click Register Registering the STM150Setup Wizard Options Use the Setup Wizard to Complete the ConfigurationEmail Security Web SecurityUpdate Settings Verifying the STM150 InstallationEmail Notification Server Web CategoriesWhat to Do Next Testing ConnectivityTesting Http Scanning Performing System Management Tasks Modifying System SettingsConfiguring Network Settings V1.1, March Enabling Session Limits and Timeouts To enter a scanning exclusion rule On the menu, click Global Settings Scanning ExclusionsScanning Exclusions To set the system time Setting the System TimeOn the menu, click Administration Time Zone To specify a notification server Specifying the Notification ServerCustomizing Email Alerts Click Save ChangesTo enable system administrator email alerts On the menu, click Administration Snmp Configuring Snmp SettingsTo configure the Snmp settings To define Snmp Traps Supported MIB BrowsersDefining Trusted Snmp Hosts Backing Up the STM150 Configuration Backing Up and Restoring ConfigurationsTo restore the STM150 settings To Back Up the STM150 SettingsRestoring a Configuration Restarting the STM150 Resetting to Factory DefaultsEnabling Remote Management Configuring Scheduled Updates Administering Software UpdatesOn the menu, go to Administration Software Update To configure scheduled updatesPerforming a Manual Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Chapter Customizing Scans Default Scan SettingsCustomizing Email Scanning Settings Insert Warning into Email Subject Line Smtp End User Email Notification SettingsEmail Security Anti-Virus Notification Settings on the menu Replace Infected Attachment with Warning Message Send Warning Email When Malware Is FoundAppend Safe Stamp Smtp & POP3 Email Content Filtering Filter by Subject Keywords Filter by Password-protected AttachmentsFile Extension Filter by File TypeProtecting Against Email Spam Setting Up the Whitelist and BlacklistEmail Security Anti-Spam Whitelist and Blacklist To define the sender whitelist. On the menu, go toTo define the recipient whitelist. On the menu, go to Configuring the Real-time BlacklistTo add a new provider Configuring Distributed Spam AnalysisTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March White List Configuring Web URL FilteringBlacklist Https Third Party Website Certificate Handling Https Scan SettingsHttp Tunneling STM150 CA Certificate Show This Message When an SSL Connection Attempt FailsV1.1, March Web Security Https Scan Certificate Management Certificate ManagementUntrusted Certificates To import a new certificate used for Https scansTrusted Certificate Authorities Web Security Http and Https Trusted Hosts To add hosts to the Host Access Control ListTrusted Hosts Web Security FTP Configuring FTP ScanTo delete hosts from the Host Access Control List V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Monitoring Diagnostics Running DiagnosticsUsing the Network Diagnostic Tools To collect information about your STM150 Using the Realtime Traffic Diagnostic ToolsGathering Important Log Information Working with Logs Using Reports to Optimize Protection and PerformanceGenerate Network Statistics Report Sending Logs Querying LogsLog Management Using Logs to Identify Infected ClientsOn the menu, click Logs & Reports Scheduled Report Working with ReportsSend Reports by Email Support Online Support Using Online SupportEnabling Remote Troubleshooting Go to Support Hot Fixes To install a hot fixWorking with Hot Fixes On the menu, go to Support Malware Analysis Sending Suspicious Files to Netgear for AnalysisTable A-1. STM150 Default Configuration Settings Appendix a Default Settings and Technical SpecificationsSTM150 specifications are listed in the table below Document Link Appendix B Related DocumentsV1.1, March Index N