ProSecure Unified Threat Management (UTM) Appliance

Figure 130.

2.Enter the settings as explained in the following table:

Table 51. Trusted Hosts screen settings

Setting

Description

Do Not Intercept HTTPS Connections for the following Hosts

Enable

Select this check box to bypass scanning of trusted hosts that are listed in the Hosts field.

 

Users do not receive a security alert for trusted hosts that are listed in the Hosts field.

 

 

Hosts

This field contains the trusted hosts for which scanning is bypassed. To add a host to this field,

 

use the Add Host field or the Import from File tool (see the explanation later in this table). You

 

can add a maximum of 200 URLs.

 

 

 

 

Delete

To delete one or more hosts, highlight the hosts, and click the Delete table

 

 

button.

 

 

 

 

Export

To export the hosts, click the Export table button, and follow the instructions of

 

 

your browser.

 

 

 

Add Host

Type or copy a trusted host in the Add Host field. Then click the Add table button to add the

 

host to the Hosts field.

Import from

To import a list with trusted hosts into the Hosts field, click the Browse button, and navigate to

File

a file in .txt format that contains line-delimited hosts (that is, one host per line). Then click the

 

Upload table button to add the hosts to the Hosts field.

Note: Any existing hosts in the Hosts field are overwritten when you import a list of hosts from

afile.

3.Click Apply to save your settings.

Content Filtering and Optimizing Scans

236

Page 236
Image 236
NETGEAR UTM5EW-100NAS, STM150EW-100NAS manual Trusted Hosts screen settings, 236