Main
Page
iii
Voluntary Control Council for Interference (VCCI) Statement
Additional Copyrights
iv
Product and Publication Details
v
Page
Contents
Page
Page
Page
Page
Page
About This Manual
Conventions, Formats, and Scope
How to Print This Manual
Revision History
Chapter 1 Introduction
What Is the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600?
What Can You Do with an STM?
Key Features and Capabilities
Stream Scanning for Content Filtering
Autosensing Ethernet Connections with Auto Uplink
Easy Installation and Management
Maintenance and Support
STM Model Comparison
Service Registration Card with License Keys
Package Contents
Hardware Features
Front Panel Ports and LEDs
Introduction 1-9
The function of each STM150 LED is described in the following table:
Table 1-2. LED Descriptions for the STM150
Page
Introduction 1-11
The function of each STM300 LED is described in the following table:
Table 1-3. LED Descriptions for the STM300
Page
Introduction 1-13
The function of each STM600 LED is described in the following table:
Table 1-4. LED Descriptions for the STM600
Rear Panel Features
Bottom Panel With Product Label
Page
Choosing a Location for the STM
Using the Rack-Mounting Kit
Chapter 2 Using the Setup Wizard to Provision the STM in Your Network
Choosing a Deployment Scenario
Gateway Deployment
Server Group
Segmented LAN Deployment
Understanding the Steps for Initial Connection
Qualified Web Browsers
Logging In to the STM
Page
Page
Understanding the Web Management Interface Menu Layout
Page
Using the Setup Wizard to Perform the Initial Configuration
Setup Wizard Step 1 of 10: Introduction
Setup Wizard Step 2 of 11: Networking Settings
Setup Wizard Step 3 of 11: Time Zone
Using the Setup Wizard to Prov is ion the STM in Your Network 2-13
Table 2-2. Setup Wizard Step 3: System Date and Time Settings
http://ntp.isc.or g/bin/view/Serve rs/W ebHome
Setup Wizard Step 4 of 11: Email Security
Using the Setup Wizard to Prov is ion the STM in Your Network 2-15
Table 2-3. Setup Wizard Step 4: Email Security Settings
2-16 Using the Setup Wizard to Provision the STM in Your Network
Table 2-3. Setup Wizard Step 4: Email Security Settings (continued)
Setup Wizard Step 5 of 11: Web Security
2-18 Using the Setup Wizard to Provision the STM in Your Network
Table 2-4. Setup Wizard Step 5: Web Security Settings (continued)
Setup Wizard Step 6 of 11: Email Notification Server Settings
Page
Setup Wizard Step 7 of 11: Update Settings
Page
Setup Wizard Step 8 of 11: HTTP Proxy Settings
Page
Page
Page
Setup Wizard Step 11 of 11: Restarting the System
Verifying Proper Installation
Testing Connectivity
Testing HTTP Scanning
Registering the STM with NETGEAR
Page
What to Do Next
Chapter 3 Performing Network and System Management
Configuring Network Settings
Page
Page
3-4 Performing Network and System Management
Table 3-1. Network Settings (continued)
Configuring Session Limits and Timeouts
2. Click the Session Limits submenu tab. The Session Limits screen displays.
Configuring the HTTP Proxy Settings
Page
About Users with Administrative and Guest Privileges
Changing Administrative Passwords and Timeouts
Page
Configuring Remote Management Access
Page
Using an SNMP Manager
2. Select the radio buttons and complete the fields as explained in Table 3-6.
Supported MIB Browsers
Managing the Configuration File
Backup Settings
Restore Settings
Reverting to Factory Default Settings
Updating the Software
Scheduling Updates
Page
Performing a Manual Update
Critical Updates That Require a Restart
Configuring Date and Time Service
3. Click Apply to save your settings. Changing the time zone requires the STM to restart.
3-24 Performing Network and System Management
Table 3-8. System Date and Time Settings
http://ntp.isc.or g/bin/view/Servers/W ebHome
Managing Digital Certificates
Managing the Certificate for HTTPS Scans
Page
Managing Trusted Certificates
Managing Untrusted Certificates
Managing the Quarantine Settings
Performance Management
Page
Page
Page
Chapter 4 Content Filtering and Optimizing Scans
About Content Filtering and Scans
4-2 Content Filtering and Optimizing Scans
Default E-mail and Web Scan Settings
Table 4-1. Default E-mail and Web Scan Settings
Content Filtering and Optimizing Scans 4-3
Table 4-1. Default E-mail and Web Scan Settings (continued)
Configuring E-mail Protection
Customizing E-mail Protocol Scan Settings
Customizing E-mail Anti-Virus Settings
Page
Page
Page
Page
4-10 Content Filtering and Optimizing Scans
Table 4-5. E-mail Anti-Virus Notification Settings
E-mail Content Filtering
Page
Content Filtering and Optimizing Scans 4-13
2. Complete the fields and make your selections from the pull-down menus as explained in Table 4-6.
Table 4-6. E-mail Filter Settings
4-14 Content Filtering and Optimizing Scans
3. Click Apply to save your settings.
Protecting Against E-mail Spam
Table 4-6. E-mail Filter Settings (continued)
Page
Page
Page
Page
Page
Page
Content Filtering and Optimizing Scans 4-21
Table 4-8. Distributed Spam Analysis Settings (continued)
Configuring Web and Services Protection
Customizing Web Protocol Scan Settings
Page
Configuring Web Malware Scans
Content Filtering and Optimizing Scans 4-25
Table 4-10. Malware Scan Settings
Configuring Web Content Filtering
Page
Page
Page
4-30 Content Filtering and Optimizing Scans
Table 4-11. Content Filtering Settings
Content Filtering and Optimizing Scans 4-31
Table 4-11. Content Filtering Settings (continued)
Configuring Web URL Filtering
Page
4-34 Content Filtering and Optimizing Scans
Table 4-12. URL Filtering Settings
4. Click Apply to save your settings.
Content Filtering and Optimizing Scans 4-35
Table 4-12. URL Filtering Settings (continued)
HTTPS Scan Settings
Page
Page
Specifying Trusted Hosts
Page
Configuring FTP Scans
Page
3. Click Apply to save your settings.
Content Filtering and Optimizing Scans 4-43
Table 4-15. FTP Scan Settings (continued)
Configuring Application Control
Page
Setting Scanning Exclusions and Web Access Exceptions
Setting Scanning Exclusions
Setting Web Access Exception Rules
Page
Page
Content Filtering and Optimizing Scans 4-51
Table 4-17. Add Exception Settings (continued)
Page
Page
Page
Chapter 5 Managing Users, Groups, and Authentication
About Users, Groups, and Domains
Configuring Groups
Creating and Deleting Groups by Name
Editing Groups by Name
Creating and Deleting Groups by IP Address and Subnet
Configuring User Accounts
Creating and Deleting User Accounts
Page
Editing User Accounts
Configuring Authentication
Page
Page
Understanding Active Directories and LDAP Configurations
Page
Page
Page
Creating and Deleting LDAP and Active Directory Domains
Managing Users, Groups, and Authentication 5-17
Table 5-5. LDAP Settings
Page
Editing LDAP and Active Directory Domains
Creating and Deleting RADIUS Domains
Page
Page
Editing RADIUS Domains and Configuring VLANs
Page
Global User Settings
Viewing and Logging Out Active Users
Page
Chapter 6 Monitoring System Access and Performance
Configuring Logging, Alerts, and Event Notifications
Configuring the E-mail Notification Server
Configuring and Activating System, E-mail, and Syslog Logs
Page
Monitoring System Access and Performance 6-5
Table 6-2. E-mail Logs Settings (continued)
Page
Monitoring System Access and Performance 6-7
Table 6-3. Syslog Settings (continued)
Configuring Alerts
Page
4. Click Apply to save your settings.
6-10 Monitoring System Access and Performance
Table 6-4. Alerts Settings (continued)
Monitoring Real-Time Traffic, Security, Statistics, and Web Usage
Understanding the Information on the Dashboard Screen
Page
Monitoring System Access and Performance 6-13
Table 6-5. Dashboard: Status, Total Threats, and Threats (Last 7 Days) formation
Page
Monitoring System Access and Performance 6-15
Table 6-6. Dashboard: Total Scanned Services Traffic and Most Recent 5 and Top 5 Information
Page
Monitoring System Access and Performance 6-17
Table 6-7. Dashboard: Service Statistics and Interface Statistics Information
Monitoring Web Usage
Viewing System Status
Page
Monitoring System Access and Performance 6-21
Table 6-8. System Status Information
Querying Logs and Generating Reports
Querying the Logs
Page
Page
Monitoring System Access and Performance 6-25
Table 6-9. Log Query Settings
6-26 Monitoring System Access and Performance
Table 6-9. Log Query Settings (continued)
Page
Scheduling and Generating Reports
Page
Page
Page
3. Select the checkboxes and complete the fields as explained in Table 6-11.
Viewing and Managing the Quarantine Files
Page
Page
Page
Page
Page
Page
Using Diagnostics Utilities
Using the Network Diagnostic Tools
Using the Realtime Traffic Diagnostics Tool
Gathering Important Log Information and Generating a Network Statistics Report
Restarting and Shutting Down the STM
Page
Page
Chapter 7 Troubleshooting and Using Online Support
Basic Functioning
Power LED Not On
Test LED or Status LED Never Turns Off
LAN or WAN Port LEDs Not On
Troubleshooting the Web Management Interface
When You Enter a URL or IP Address a Time-out Error Occurs
Troubleshooting a TCP/IP Network Using a Ping Utility
Testing the LAN Path to Your STM
Testing the Path from Your PC to a Remote Device
Restoring the Default Configuration and Password
Problems with Date and Time
Using Online Support
Enabling Remote Troubleshooting
Installing Hot Fixes
Sending Suspicious Files to NETGEAR for Analysis
Accessing the Knowledge Base and Documentation
Page
Default Settings and Technical Specifications A-1
Appendix A Default Settings and Technical Specifications
Table A-1. STM Default Configuration Settings
Table A-2 shows the STM specifications.
A-2 Default Settings and Technical Specifications
Table A-2. STM Specifications
Table A-1. STM Default Configuration Settings (continued)
Page
Page
Appendix B Related Documents
Page
Index-1
Index
Numerics
A
B
Index-2
C
Index-3
D
E
Index-4
F
G
H
Index-5
I
J
K
L
Index-6
M
Index-7
N
O
P
Index-8
Q
R
Index-9
S
Index-10
Index-11
T
U
Index-12
V
W
Index-13
Y
Z