ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual

Chapter 2 Provisioning Threat Management Services

Provisioning the STM150 ProSecure Web/Email Security Threat Management Appliance STM150 in your network is described in this chapter.

This chapter contains the following sections:

“Choosing a Deployment Scenario” on page 2-1

“Use the Installation Guide to Perform Initial Configuration” on page 2-4

“Registering the STM150” on page 2-7

“Use the Setup Wizard to Complete the Configuration” on page 2-8

“Verifying the STM150 Installation” on page 2-9

“What to Do Next” on page 2-10

Choosing a Deployment Scenario

The STM150 is an inline transparent bridge appliance that can easily be deployed to any point on the network without requiring network reconfiguration or additional hardware.

The following are the most common deployment scenarios for the STM150. Depending on your network environment and the areas that you want to protect, you can choose one or a combination of these deployment scenarios.

“Gateway Deployment” on page 2-2

“Server Group” on page 2-3

“Segmented LAN Deployment.” on page 2-4

Provisioning Threat Management Services

2-1

v1.1, March 2009

Page 21
Image 21
NETGEAR STM150EW3-100NAS manual Provisioning Threat Management Services, Choosing a Deployment Scenario