NETGEAR STM150EW3-100NAS Configuring FTP Scan, To delete hosts from the Host Access Control List

Page 75

ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

2.Enter the host name (not the URL) of the server into the Add Host box, and then click Add. Click Apply.

To delete hosts from the Host Access Control List

1.Select the host you wish to delete from the bypass list.

2.Click Delete.

3.Click Apply.

In addition to manually entering host names and IP addresses one at a time, you may import and export the list. Note that the files to be imported should be in .txt format, and both of the IP addresses and host names are required. Use Notepad or a similar text editor to open the exported file.

Configuring FTP Scan

To configure FTP scanning, go to

Web Security > FTP

Figure 4-16

Customizing Scans

4-25

v1.1, March 2009

Image 75
Contents NETGEAR, Inc Bestätigung des Herstellers/Importeurs TrademarksStatement of Conditions EU Regulatory Compliance StatementAdditional Copyrights Voluntary Control Council for Interference Vcci StatementMD5 Zlib Product and Publication DetailsV1.1, March Contents Chapter Performing System Management Tasks Chapter Monitoring System Performance Page Conventions, Formats, and Scope About This ManualManual Part Publication Version Description Number Date Revision HistoryChapter Introduction About Stream Scanning Key Features and CapabilitiesWhat Can You Do with an STM150? Front Panel Features Service Registration Card with License KeysRear Panel Features Choosing a Location for the STM150 Default IP Address, Login Name, and Password LocationUsing the Rack Mounting Kit V1.1, March Choosing a Deployment Scenario Provisioning Threat Management ServicesGateway Deployment Server Group Segmented LAN Deployment Use the Installation Guide to Perform Initial ConfigurationLogging In to the STM150 V1.1, March Click Register Registering the STM150Web Security Use the Setup Wizard to Complete the ConfigurationSetup Wizard Options Email SecurityWeb Categories Verifying the STM150 InstallationUpdate Settings Email Notification ServerTesting Connectivity Testing Http ScanningWhat to Do Next Modifying System Settings Configuring Network SettingsPerforming System Management Tasks V1.1, March Enabling Session Limits and Timeouts On the menu, click Global Settings Scanning Exclusions Scanning ExclusionsTo enter a scanning exclusion rule Setting the System Time On the menu, click Administration Time ZoneTo set the system time To specify a notification server Specifying the Notification ServerCustomizing Email Alerts Click Save ChangesTo enable system administrator email alerts Configuring Snmp Settings To configure the Snmp settingsOn the menu, click Administration Snmp Supported MIB Browsers Defining Trusted Snmp HostsTo define Snmp Traps Backing Up the STM150 Configuration Backing Up and Restoring ConfigurationsTo Back Up the STM150 Settings Restoring a ConfigurationTo restore the STM150 settings Restarting the STM150 Resetting to Factory DefaultsEnabling Remote Management Configuring Scheduled Updates Administering Software UpdatesTo configure scheduled updates Performing a Manual UpdateOn the menu, go to Administration Software Update Applying a Software Update that Requires a Reboot Administering Admin Login Timeouts and Passwords V1.1, March V1.1, March Chapter Customizing Scans Default Scan SettingsCustomizing Email Scanning Settings End User Email Notification Settings Email Security Anti-Virus Notification Settings on the menuInsert Warning into Email Subject Line Smtp Send Warning Email When Malware Is Found Append Safe Stamp Smtp & POP3Replace Infected Attachment with Warning Message Email Content Filtering Filter by File Type Filter by Password-protected AttachmentsFilter by Subject Keywords File ExtensionProtecting Against Email Spam Setting Up the Whitelist and BlacklistEmail Security Anti-Spam Whitelist and Blacklist To define the sender whitelist. On the menu, go toTo define the recipient whitelist. On the menu, go to Configuring the Real-time BlacklistTo add a new provider Configuring Distributed Spam AnalysisTo configure distributed spam analysis Customizing Web Scanning Settings Configuring Web Malware Scans Configuring Web Content Filtering V1.1, March V1.1, March White List Configuring Web URL FilteringBlacklist Https Scan Settings Http TunnelingHttps Third Party Website Certificate Handling STM150 CA Certificate Show This Message When an SSL Connection Attempt FailsV1.1, March Web Security Https Scan Certificate Management Certificate ManagementTo import a new certificate used for Https scans Trusted Certificate AuthoritiesUntrusted Certificates To add hosts to the Host Access Control List Trusted HostsWeb Security Http and Https Trusted Hosts Configuring FTP Scan To delete hosts from the Host Access Control ListWeb Security FTP V1.1, March Chapter Monitoring System Performance Viewing the System Status Using Statistics and Web Usage Data V1.1, March Monitoring Security Running Diagnostics Using the Network Diagnostic ToolsMonitoring Diagnostics Using the Realtime Traffic Diagnostic Tools Gathering Important Log InformationTo collect information about your STM150 Using Reports to Optimize Protection and Performance Generate Network Statistics ReportWorking with Logs Sending Logs Querying LogsLog Management Using Logs to Identify Infected ClientsWorking with Reports Send Reports by EmailOn the menu, click Logs & Reports Scheduled Report Using Online Support Enabling Remote TroubleshootingSupport Online Support To install a hot fix Working with Hot FixesGo to Support Hot Fixes On the menu, go to Support Malware Analysis Sending Suspicious Files to Netgear for AnalysisTable A-1. STM150 Default Configuration Settings Appendix a Default Settings and Technical SpecificationsSTM150 specifications are listed in the table below Document Link Appendix B Related DocumentsV1.1, March Index N