Gebruiksaanwijzing /service van het product STM300EW-100NAS van de fabrikant NETGEAR
Ga naar pagina of 254
202-10519-01 1.0 September 2009 NETGEAR , Inc. 350 East Plumeria Drive San Jose, CA 95134 ProSecure W eb/Email Security Threat Management Appliance STM150/300/600 Reference Manual.
ii v1.0, September 2009 © 2009 by NETGEAR, Inc. All rights reserved. T rademarks NETGEAR and the NETGEA R logo are registered trademarks and ProS ecure is a trademark of NETGEAR, Inc. Microsoft, W indows, and Windows NT ar e registered trademarks of Microsof t Corporation.
v1.0, September 2009 iii Federal Of fice for T elecommuni cations Approvals has been notified of the placing of this equipment on the market and has been granted the right to test the series for comp li anc e with the regulations.
v1.0, Septembe r 2009 iv Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitted provided that the following conditions are met: 1.
v1.0, September 2009 v Product and Publication Det ails PPP Copyright (c) 1989 Carnegie Mellon University . All rights reserved. Redistribution and use in source and binary forms are permitted provide.
v1.0, Septembe r 2009 vi.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al vii v1.0, September 2009 Content s About This Manual Conventions, Formats, and Scope .................. ................ ................... .................... .......
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual viii v1.0, September 2009 Understanding the S teps for Initial Connection .. ............. ................ ................ ............... 2-4 Qualified Web Browsers .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al ix v1.0, September 2009 Updating the Software ........ ......... ................. ................ ............. ................ ................ ... 3-19 Scheduling Updates .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual x v1.0, September 2009 Creating and Deleting Groups by Name ... ................ ................ ................ ............. .. 5-3 Editing Groups by Name .......
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xi v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support Basic Functioning ..... ................ ................ ................ ................. .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xii v1.0, September 2009.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al xiii v1.0, September 2009 About This Manual The NETGEAR ® Pr oSecu re™ W eb/Email Security Thr eat Management Appli.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual xiv v1.0, September 2009 • Scope . This manual is written for the STM according to these specifications: For more information abou t network, Internet, firewall, and VP N technologies, c lick the links to the NETGEAR website in Appendix B, “Related Documents .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-1 v1.0, September 2009 Chapter 1 Introduction This chapter provides an overview of the feat ures and capabilities of the ProSecure W eb/Email Security Threat Managem en t Appliance STM150 , STM300, or STM600.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-2 Introduction v1.0, September 2009 In addition to scanning HTTP , HTTPS, FTP , SMTP , POP3, and IMAP traffic, the STM protects networks against spam phishing attacks and un wanted W eb use.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-3 v1.0, September 2009 Key Features and Cap abilities The STM provides the following key features and capabilities: • Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet W AN ports (see “STM Model Comparison” on page 1-5 ).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-4 Introduction v1.0, September 2009 S tream Scanning for Content Filtering Stream Scanni ng is based on the simple observatio n that network traffic travels in streams.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-5 v1.0, September 2009 Easy Inst allation and Management Y ou can install, configure, and operate the STM wi thin minutes after connecting it to the network.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-6 Introduction v1.0, September 2009 Service Registration Card with License Keys Be sure to store the license key card that came with your STM in a secure locatio n.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-7 v1.0, September 2009 Package Content s The STM prod uct package contain s the following items: • Pr.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-8 Introduction v1.0, September 2009 Front Panel Port s and LEDs The front panels of the three STM models pro vid e different components . STM150 Front Panel Figure 1-2 shows the front panel ports and status light-emitting diodes (LEDs) of the STM150.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-9 v1.0, September 2009 The function of each STM150 LED is de scribed in the following table: T able 1-2. LED Descriptions for the STM150 Object Activity Descrip tion Power On (Green) Power is supplied to the STM.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-10 Introduction v1.0, September 2009 Front Panel STM300 Figure 1-3 shows the front panel ports and LEDs of the STM300. From left to righ t, the STM300’ s front panel shows the following ports and LEDs: 1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-11 v1.0, September 2009 The function of each STM300 LED is de scribed in the following table: T able 1-3. LED Descriptions for the STM300 Object Activity Descrip tion Power On (Green) Power is supplied to the STM.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-12 Introduction v1.0, September 2009 Front Panel STM600 Figure 1-4 shows the front panel ports and LEDs of the STM600. From left to righ t, the STM600’ s front panel shows the following ports and LEDs: 1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-13 v1.0, September 2009 The function of each STM600 LED is de scribed in the following table: T able 1-4. LED Descriptions for the STM600 Object Activity Descrip tion Power On (Green) Power is supplied to the STM.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-14 Introduction v1.0, September 2009 Rear Panel Features The rear panel of the STM150 differs from the r ear panels of the STM300 and STM600. Rear Panel STM150 Figure 1-5 shows the rear panel components of the STM150.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-15 v1.0, September 2009 Rear Panel STM300 and STM600 The rear panels of the STM300 and STM600 are identical. Figure 1-6 shows the rear panel components of the STM300 and STM600.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-16 Introduction v1.0, September 2009 STM150 Product Label STM300 Product Label Figure 1-7 Figure 1-8.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Introduction 1-17 v1.0, September 2009 STM600 Product Label Choosing a Location for the STM The STM is su itable for use in an office environm ent where it can be free-standing (on its runner feet) or mounted into a standard 19-inch eq u ipment rack.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 1-18 Introduction v1.0, September 2009 • T emperature operating limits are not likely to be exceeded.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-1 v1.0, September 2009 Chapter 2 Using the Setup Wizard to Provision the STM in Y our Network This chapter describes provisioning the STM in your network.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-2 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Server Group In a server group deployment, one STM appliance is installed at the gateway and another in front of the server group.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-3 v1.0, September 2009 Segmented LAN Deployment In a segmented LAN deployment, one STM app lia nce is installed in front of each network segment.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-4 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the S t ep s for Initial Connection Generally , five steps are required to complete th e basic and security configuration of your STM: 1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-5 v1.0, September 2009 4. V erify the installation . See “V erifying Proper Installation” on page 2-27 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-6 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The NETGEAR Configur ation Manager Login screen displays in th e browser (see Figu re 2-4 , which shows the STM60 0).
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-7 v1.0, September 2009 5. Click Login. The W eb Management Interface appears, displaying the Dashboard screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-8 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Underst anding the W eb Management Interface Menu La yout Figure 2-7 shows the menu at the top of the STM600’ s W eb Management Interface.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-9 v1.0, September 2009 Any of the following action buttons might be disp layed on screen (this list might not be complete): • Apply .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-10 Using the Setup Wizard to Prov ision the STM in Your Network v1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-11 v1.0, September 2009 Setup Wizard S tep 2 of 1 1: Networking Settings Enter the settings as explained in Ta b l e 2 - 1 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-12 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 3 of 1 1: Time Zone Subnet Mask Enter the IP subnet mask. Th e subnet ma sk specifies the network n umber portion of an IP address.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-13 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 2 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-14 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Setup Wizard S tep 4 of 1 1: Email Security Enter the settings as explained in T able 2-3 on page 2-15 , then click Next to go the following screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-15 v1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-16 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 IMAP From the IMAP pull-down menu, spe cify one of the following actions when an infecte d e-mail is detected: • Quaran tine att achment .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-17 v1.0, September 2009 Setup Wizard S tep 5 of 1 1: Web Security Enter the settings as explained in Ta b l e 2 - 4 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-18 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 HTTPS HTTPS scanning is disabled by default. T o enable Hype rtext T ransfer Protocol over Secure Socket Layer (HTTPS) sca nning, select the corresponding checkbox.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-19 v1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-20 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 Enter the settings as explained in T able 2-5 on page 2-20 , then click Next to go the following screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-21 v1.0, September 2009 Setup Wizard S tep 7 of 1 1: Up date Settings Enter the settings as explained in T able 2-6 on page 2-22 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-22 Using the Setup Wizard to Prov ision the STM in Your Network v1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-23 v1.0, September 2009 Setup Wizard S tep 8 of 1 1: HTTP Proxy Settings Enter the settings as explained in Ta b l e 2 - 7 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-24 Using the Setup Wizard to Prov ision the STM in Your Network v1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-25 v1.0, September 2009 Enter the settings as explained in Ta b l e 2 - 8 , then click Next to go the following screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-26 Using the Setup Wizard to Prov ision the STM in Your Network v1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-27 v1.0, September 2009 Click Apply to save your settings and automatically restart the system or click Back to make changes to the configuration.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-28 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 The eicar .com test file is a legitimate DoS prog ram and is safe to use be cause it is not a malware threat and does not include any fragments of malware code.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Using the Setup Wizard to Prov is ion the STM in Your Netw ork 2-29 v1.0, September 2009 2. Enter the license key in the Registration Key field. 3. Fill out the customer and V AR fields.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 2-30 Using the Setup Wizard to Prov ision the STM in Your Network v1.0, September 2009 What to Do Next Y ou have completed setting up and deploying the STM to the networ k.
3-1 v1.0, September 2009 Chapter 3 Performing Network and System Management This chapter describes the network settings, the system management features, and ways to improve the performance of the STM.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-2 Performing Network and System Ma nagement v1.0, September 2009 T o configure the STM’ s network settings: 1. Select Global Setting s > Network Settings from the menu.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-3 v1.0, September 2009 Figure 3-3 shows the Interface Speed & Duplex Set tings section of the Network Settings screen of the STM150.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-4 Performing Network and System Ma nagement v1.0, September 2009 Subnet Mask Enter the IP subnet mask. The subn et mask specifies the network number portion of an IP address.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-5 v1.0, September 2009 3. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-6 Performing Network and System Ma nagement v1.0, September 2009 2.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-7 v1.0, September 2009 4. Click Apply to save your settings. Cha nging any settings in the Sessi on T imeouts section of the screen requires the STM to restart.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-8 Performing Network and System Ma nagement v1.0, September 2009 T o configure the HTTP proxy: 1. Select Global Setting s > HTTP Proxy from the menu. The HTTP Proxy screen displays.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-9 v1.0, September 2009 About Users with Administ rative and Guest Privileges There are two pre-defined user types that can access the STM’ s W eb Management Interface: • Administrator .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-10 Performing Network an d System Management v1.0, September 2009 2. T o modify the administrator or guest settings, select the checkbox and complete the fields as explained in Ta b l e 3 - 4 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-11 v1.0, September 2009 3. Under the Administrator Settings and Guest Settings sections of the screen, click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-12 Performing Network an d System Management v1.0, September 2009 T o configure remote management: 1. Select Administration > Remote Management from the menu The Remote Management screen displays (see Figure 3-7 on page 3-12 ).
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-13 v1.0, September 2009 . Using an SNMP Manager Simple Network Management Protocol (SNMP) fo rms part of the Internet Protocol Suite as defined by the Internet Engineerin g T a sk Fo rce (IETF).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-14 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons and comple te the field s as explained in Ta b l e 3 - 6 . Figure 3-8 T able 3-6.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-15 v1.0, September 2009 3.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-16 Performing Network an d System Management v1.0, September 2009 Managing the Configuration File The configuration settings of the STM are stored in a configuratio n file on the STM.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-17 v1.0, September 2009 Back up your STM settings periodically , a nd store the backup file in a safe place. T o backup settings: 1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-18 Performing Network an d System Management v1.0, September 2009 Reverting to Factory Default Settings T o reset.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-19 v1.0, September 2009 Up dating the Sof tware If you have used th e Setup W izard, you might ha ve already configured the software update settings; the Software Update screen allows you to modi fy these settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-20 Performing Network an d System Management v1.0, September 2009 2. Select the radio buttons, complete the field, and make your selections from the pull-down menus as explained in T able 3-7 on page 3-21 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-21 v1.0, September 2009 3. Click Apply to save your settings. Performing a Manual Up date If you want to immediately check for and download available updates, perform a manual update: 1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-22 Performing Network an d System Management v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-23 v1.0, September 2009 Configuring Date and T ime Service If you have used.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-24 Performing Network an d System Management v1.0, September 2009 3. Click Apply to save your settings. Changing the tim e zone requires the STM to restart. T able 3-8.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-25 v1.0, September 2009 Managing Digit al Certificates The STM uses digital certificates (also known as X509 certificates) for secure web access connections over HTTPS (that is, SSL VPN connections).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-26 Performing Network an d System Management v1.0, September 2009 import. However , NETGEAR recommends that you re place this digital certificate with a digital certificate from a well-known commercial CA pr ior to deploying the STM in your network.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-27 v1.0, September 2009 The top part of the Certificate Used for HTTP S Sca.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-28 Performing Network an d System Management v1.0, September 2009 Managing T rusted Certificates T o manage trusted certificates: Select W eb Security > Certificate Management from the menu.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-29 v1.0, September 2009 Importing a T rusted Certificate T o import a trusted certificate: 1. Click Br owse next to the Import from File field.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-30 Performing Network an d System Management v1.0, September 2009 Deleting an Untrusted Certificate T o delete an untrusted certificate: 1. Select the certificate from the Untrusted Certificates table.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-31 v1.0, September 2009 3.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-32 Performing Network an d System Management v1.0, September 2009 If you want to reduce tra ffic by preventing un.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Performing Network and System Management 3-33 v1.0, September 2009 – Setting the size of W eb files to be scanned . Scann i ng large W eb files requires netw ork resources and might slow down traffic.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 3-34 Performing Network an d System Management v1.0, September 2009.
4-1 v1.0, September 2009 Chapter 4 Content Filtering and Optimizing Scans This chapter describes how to ap ply the content filtering features of the STM and how to opti mize scans to protect you r network. This chapter contains the following sections: • “About Content Filtering and Scans” on this page.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-2 Content Filtering and Optim izing Scans v1.0, September 2009 Default E-mail and W eb Scan Settings For most net.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-3 v1.0, September 2009 To o l s Alexa T oolbar Allowed GoT oMyPC Allowed Wea.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-4 Content Filtering and Optim izing Scans v1.0, September 2009 Configuring E-mail Protection The STM lets you configure the following settings to protect the network’ s e-mail communication: • The e-mail protocols that are scanned for malware threats.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-5 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 2 . 3. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-6 Content Filtering and Optim izing Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 3 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-7 v1.0, September 2009 3. Click Apply to save your settings. Configuring E-mail Anti-V irus Exception Settings T o configure the e-mail anti-virus exception setti ngs: 1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-8 Content Filtering and Optim izing Scans v1.0, September 2009 3. Make your selection from the pull-down menu s and complete the field as explained in Ta b l e 4 - 4 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-9 v1.0, September 2009 Figure 4-4.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-10 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 5 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-11 v1.0, September 2009 4. Click Apply to save your settings. E-mail Content Filtering The STM provides several options to filter unwa nted content from e-mails.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-12 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure e-mail content filtering: 1. Select Email Security > Filters from the menu. The Filters screen displays.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-13 v1.0, September 2009 2. Complete the fields and make your selections from the pull-down menus as explained in Ta b l e 4 - 6 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-14 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Click Apply to save your settings. Protecting Against E-mail S pam The STM integrates multiple anti-spam technologi es to provide comprehensive protection against unwanted e-mail.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-15 v1.0, September 2009 2. Blacklist . E-mails from the specified sources are considered spam and are blocked. 3. Real-time blacklist .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-16 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the whitelist and blacklist: 1. Select Email Security > Anti-Spam from the menu. The Anti-Sp am submenu tabs appear , with the Whitelist/Blacklist screen in view .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-17 v1.0, September 2009 2. Complete the fields as explained in Ta b l e 4 - 6 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-18 Content Filtering and Optimizin g Scans v1.0, September 2009 By default, the STM comes with two pre-define d blacklist providers: Spamhaus, and Spamcop. Y ou can add a maximum of 16 black list providers to the RBL sources.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-19 v1.0, September 2009 Configuring Distributed S pam Analysis Spam, phishing, and other e-mail- borne threats consist of milli ons of messages intentionally composed diff erently to evade co mmonly-used filters.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-20 Content Filtering and Optimizin g Scans v1.0, September 2009 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 8 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-21 v1.0, September 2009 4. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-22 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring W eb and Services Protection The STM .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-23 v1.0, September 2009 2. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 8 . 3. Click Apply to save your settings Figure 4-9 T able 4-9.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-24 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Web Malware Scans If you have used th.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-25 v1.0, September 2009 T able 4-10.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-26 Content Filtering and Optimizin g Scans v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-27 v1.0, September 2009 If you have used the S etup W izard, you might have already config ured the W eb category block ing settings; the Content Filtering screen al lows you to modi fy these settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-28 Content Filtering and Optimizin g Scans v1.0, September 2009 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-29 v1.0, September 2009 . 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in T able 4-1 1 on page 4-30 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-30 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-1 1. Content Filter ing Settings Setting Description Content Filtering Log HTTP T raffic Select this checkbox to log HTTP traffic.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-31 v1.0, September 2009 Web Categorization Schedul e Do Y ou W ant this Schedule to be Active on All Days or S pecific Days? Select one of the following radio butto ns: • All Days .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-32 Content Filtering and Optimizin g Scans v1.0, September 2009 4.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-33 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in T able 4-12 on page 4-34 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-34 Content Filtering and Optimizin g Scans v1.0, September 2009 T able 4-12. URL Filtering Settings Setting Description Whitelist (takes precedence over Blacklist) Enable Select this checkbox to bypass scanning of the URLs that are listed in the URL field.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-35 v1.0, September 2009 4. Click Apply to save your settings. Add URL T ype or copy a URL in the Add URL field. Then, click the add table button to add the URL to the URL field.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-36 Content Filtering and Optimizin g Scans v1.0, September 2009 HTTPS Scan Settings HTTPS traffic is encrypted traf fic that cannot be scanned otherwise the data stream would not be secure.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-37 v1.0, September 2009 If one of these is not satisfied, a security aler t message appears in the browser window (see Figure 4-16 ).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-38 Content Filtering and Optimizin g Scans v1.0, September 2009 T o configure the HTTPS scan settings: 1. Select We b Security > HTTP/HTTPS from the menu. The HTTP/HTTPS submenu tabs appear , with the Malware Scan screen in view .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-39 v1.0, September 2009 3. Complete the fields and select the checkboxe s as exp lained in Ta b l e 4 - 1 3 . 4. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-40 Content Filtering and Optimizin g Scans v1.0, September 2009 Note that c ertain sites contain el ements from dif f erent HTTPS hosts. As an example, assume that the https://example.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-41 v1.0, September 2009 3. Complete the fields and select the checkbox as explaine d in Ta b l e 4 - 1 4 . 4. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-42 Content Filtering and Optimizin g Scans v1.0, September 2009 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Ta b l e 4 - 1 5 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-43 v1.0, September 2009 3. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-44 Content Filtering and Optimizin g Scans v1.0, September 2009 Configuring Application Control The STM lets you control user access to W eb applica tions such as instant messaging, media, peer- to-peer services, and online tools.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-45 v1.0, September 2009 Figure 4-21 [Application Control, scr een 2 of 3] Fi.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-46 Content Filtering and Optimizin g Scans v1.0, September 2009 5. After you have configured each section, first click Apply to save the settings before you continue with the next section.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-47 v1.0, September 2009 Setting Scanning Exclusions T o save resources, you can configur e scanning exclusions for IP addresses and ports that you know are secure.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-48 Content Filtering and Optimizin g Scans v1.0, September 2009 3. In the Add column, click the add table button to add the exclus ion rule to the Scanning Exclusions table.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-49 v1.0, September 2009 2. Under the Exceptions table, click the add table button to specify an exception rule. The Add Exception screen displays.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-50 Content Filtering and Optimizin g Scans v1.0, September 2009 Applies to (continued) All Users C li ck th e ap ply button to apply the exception to all users, both authenticated a nd unauthenticated.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-51 v1.0, September 2009 Applies to (continued) Group Membership by IP Do the following: 1. From the Name pull-down menu, select a grou p that is defined by its IP address.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-52 Content Filtering and Optimizin g Scans v1.0, September 2009 4. Click Apply to save your settings. The new exception rule is added to the Exceptions table. T o return to the Exception screen without adding the rule, click Return .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Content Filtering and Optimi zing Scans 4-53 v1.0, September 2009 2. Click one of the fo llowi ng table buttons: • disable .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 4-54 Content Filtering and Optimizin g Scans v1.0, September 2009.
5-1 v1.0, September 2009 Chapter 5 Managing Users, Group s, and Authentication This chapter describes how to manage users, grou ps, and authentication on the STM. This chapter contains the following sections: • “About Users, Groups, and Domai ns on this page.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-2 Managing Users, Groups, and Authen tication v1.0, September 2009 • Authenticated users .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-3 v1.0, September 2009 Creating and Deleting Group s by Name T o create a local group by name: 1. Select User Management > Groups from the menu.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-4 Managing Users, Groups, and Authen tication v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-5 v1.0, September 2009 4. Click Apply to save your c hanges. Creating and Deleting Group s by IP Address and Subnet T o create a group by IP address and subnet: 1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-6 Managing Users, Groups, and Authen tication v1.0, September 2009 2. In the Add New IP Subnets/Groups section of th e screen, complete the fields as explained in Ta b l e 5 - 3 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-7 v1.0, September 2009 The List of Users table displays the users with the following fields: • Enable . The check box allows you to enab le or disable the user .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-8 Managing Users, Groups, and Authen tication v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-9 v1.0, September 2009 Configuring Authentication The login screen and authentication on the STM de pends on the user type and the authentication method: • Administrative users .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-10 Managing Users, Groups, and Au thentication v1.0, September 2009 After a user has logged in through the User Portal Login screen, th e Authentication screen displays.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-11 v1.0, September 2009 b. Log in again. c. On the Authentication screen (see Figure 5 -8 on page 5-10 ), click the logout link.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-12 Managing Users, Groups, and Au thentication v1.0, September 2009 RADIUS support two types of protocols: – PA P . Password Authentication Protocol (P AP) is a simple protocol in which the client sends a password in clear text.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-13 v1.0, September 2009 If the size limit is exceeded so that “dc=co mpanyname,dc= com” misses some entries during the lookup process, a user can still be properly auth enticated.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-14 Managing Users, Groups, and Au thentication v1.0, September 2009 4. T o verify Jamie Hanson’ s user logon name, c lick the Account tab. The account properties for Jamie Hanson display .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-15 v1.0, September 2009 • The full name, Jamie Hanson ( Figure 5-12 show s only the Bind DN field). • The W indow s account name in e-ma il format such as jhanson@tes t AD.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-16 Managing Users, Groups, and Au thentication v1.0, September 2009 9. Click T est to verify that the LDAP server can actually function with th e bind DN that you hav e modified.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-17 v1.0, September 2009 The List of LDAP table di sp lays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-18 Managing Users, Groups, and Au thentication v1.0, September 2009 3. Click T est to verify that the LDAP server can actu ally function with th e LDAP settings that you have specified.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-19 v1.0, September 2009 T o delete a domain and server from th e List of LDAP table, click the delete table button in the Action column for the domain and se rver that you want to delete.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-20 Managing Users, Groups, and Au thentication v1.0, September 2009 The List of RADIUS table displays the following fields: • Domain Name . The name of the STM’ s domain to which the server has been assigned.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-21 v1.0, September 2009 4. Click T est to verify that the RADIUS server can act ually function with the RADIUS settings that you have specified.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-22 Managing Users, Groups, and Au thentication v1.0, September 2009 Editing RADIUS Domains and Configuring VLANs T o edit a RADIUS domain: 1. Select User Management > Authentication from the me nu.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-23 v1.0, September 2009 4. Modify the fields and make your selections from the pull-do wn menu as explained in T able 5-6 on page 5-20 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-24 Managing Users, Groups, and Au thentication v1.0, September 2009 Global User Settings Y ou can globally set the user session settings fo r authenticated users.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Managing Users, Grou ps, and Authentication 5-25 v1.0, September 2009 3.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 5-26 Managing Users, Groups, and Au thentication v1.0, September 2009 T o view all or selected users: 1. On the Active Users screen (see Figure 5-18 on page 5-25 ), select one of the following radio buttons: • Vi e w A l l .
6-1 v1.0, September 2009 Chapter 6 Monitoring System Access and Performance This chapter describes the system monitoring feat ures of the STM. Y ou can be alerted to importa nt events such as attacks and login failures. Y ou can al so view the system status and real-time traf fic and security information.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-2 Monitoring System Access and Performanc e v1.0, September 2009 Configuring the E-mail Notification Server If yo.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-3 v1.0, September 2009 3. Click Apply to save your settings.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-4 Monitoring System Access and Performanc e v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-5 v1.0, September 2009 5. Click Apply to save your settings. Sending Log to a Syslog Se rvers T o enable and configure logs to be sent to a syslog server: 1.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-6 Monitoring System Access and Performanc e v1.0, September 2009 3.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-7 v1.0, September 2009 6. Click Apply to save your settings. Clearing Logs 1. Select Monitoring > Logs & Reports from the menu.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-8 Monitoring System Access and Performanc e v1.0, September 2009 2. Locate the Clear the Following Log In formation sectio n at the bottom of the screen. 3. Select the checkboxes to speci fy which logs are cleared: • System .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-9 v1.0, September 2009 T o configure and activate the e-mail alerts: 1. Select Monitoring > Logs & Reports from the menu.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-10 Monitoring System Access and Performanc e v1.0, September 2009 4. Click Apply to save your settings. Enable Malware Alerts Select this checkbox to enable malware alerts, and configure the Subje c t an d Message fields.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-11 v1.0, September 2009 Monitoring Real-T ime T raffic, Security , S tatistics, and W eb Usage Y ou can monitor the real-time traffic, security events, and s tatistics from the Da shboard screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-12 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-5 on page 6-13 explains the fields of the S tatus, T otal Threats, Threats (Last 7 Days) sections of the Dashboard screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-13 v1.0, September 2009 T able 6-5. Dashboard: S tatu s, T otal Threats, a nd Threat s (Last 7 Days) formation Item Description Stat us System The current CPU, memory, and hard disk usage.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-14 Monitoring System Access and Performanc e v1.0, September 2009 Threats (Last 7 Days) This is a graphic that sh.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-15 v1.0, September 2009 Ta b l e 6 - 6 explains the fields of the T otal Scanned Services Traf fic, Most Recent 5 and T op 5 sections of the Dashboard screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-16 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-7 on page 6-17 explains the fields of the Service Statistics and Interface Statistics sections of the Dashboard screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-17 v1.0, September 2009 T able 6-7.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-18 Monitoring System Access and Performanc e v1.0, September 2009 Monitoring W eb Usage The W eb Usage screen shows you how the STM’ s W eb resources are being used.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-19 v1.0, September 2009 3. Use the From pull-down menu to select the start date of the W eb usage report (year , month, date) and the To pull-down menu to select the end date of the report (year , month, date).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-20 Monitoring System Access and Performanc e v1.0, September 2009 T able 6-8 on page 6-21 explains the fields of the System Information, Management Interface Information, and Interfaces sections of the System Status screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-21 v1.0, September 2009 T able 6-8.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-22 Monitoring System Access and Performanc e v1.0, September 2009 Querying Logs and Generating Report s The exten.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-23 v1.0, September 2009 Y ou can query and generate each type of log separately and filter the information based on a number of criteria.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-24 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in T able 6-9 on page 6-25 .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-25 v1.0, September 2009 T able 6-9. Log Query Settings Setting Description (or Subfie ld and Description) Log T ype Select one of the following log types from the pull-down menu: • Tr a f f i c .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-26 Monitoring System Access and Performanc e v1.0, September 2009 Search Criteria (continued) Client IP The cli ent IP address that is querie d. This field is available for the following logs : T raffic, Virus, S pyware, S pam, Content filters, and Application.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-27 v1.0, September 2009 4.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-28 Monitoring System Access and Performanc e v1.0, September 2009 T o identify infected clients that are sending .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-29 v1.0, September 2009 – Number of malware incidents – Number of files.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-30 Monitoring System Access and Performanc e v1.0, September 2009 – T op 10 blocked clients by coun t – For e.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-31 v1.0, September 2009 4. Click Generate . After a few minutes, the report are added to the Report List, which can contain a maximum of five saved reports.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-32 Monitoring System Access and Performanc e v1.0, September 2009 3. Select the checkboxes and complete the fields as explained in Ta b l e 6 - 1 1 . Figure 6-13 T able 6-1 1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-33 v1.0, September 2009 4.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-34 Monitoring System Access and Performanc e v1.0, September 2009 Y ou can query and view the spam quarantine file and the malware quarantin e file separately and filter the information based on a number of crite ria.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-35 v1.0, September 2009 3. Select the checkboxes and radio buttons, make yo ur selections from the pull-down menus, and complete the fields as explained in Ta b l e 6 - 9 .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-36 Monitoring System Access and Performanc e v1.0, September 2009 4.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-37 v1.0, September 2009 The Quarantined Spam table shows the following columns: • Checkbox . Lets you select the table entry .
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-38 Monitoring System Access and Performanc e v1.0, September 2009 • Send as Ham . The selected spam e-mail files are not tagged a s spam for Distributed Spam Analysis, ar e dele ted from the quarantine file, and are sent to the intended recipients.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-39 v1.0, September 2009 Figure 6-18 shows the Quarantined Infected Files table with da ta.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-40 Monitoring System Access and Performanc e v1.0, September 2009 2. Select the start date and time from the Begin Date/T ime pull-down menus. 3. Specify the recipient’ s e-mail address in the Send to field.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-41 v1.0, September 2009 Using the Network Diagnostic T ools This section discusses the Ping or Trace an IP Address section and the Perform a DNS Lookup section of the Diagnostics screen.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-42 Monitoring System Access and Performanc e v1.0, September 2009 Looking up a DNS Address A DNS (Domain Name Server) conv erts the Internet name (for ex ample, www .
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-43 v1.0, September 2009 4. In Destination IP Address, enter the IP address of the destination of the traffic stream that you want to analyze.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-44 Monitoring System Access and Performanc e v1.0, September 2009 Gathering Import ant Log Information T o gather log info rmation about your STM: 1. Locate the Gather Important Log Inform ation section on the Diagnostics screen.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Monitoring System Access and Performance 6-45 v1.0, September 2009 T o shut down the STM: 1. Locate the Res tart & Shutdown s ection on the Diagnostics screen (this section is not sh own on any of the Diagnostics screen figures in this manual).
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 6-46 Monitoring System Access and Performanc e v1.0, September 2009.
7-1 v1.0, September 2009 Chapter 7 T roubleshooting and Using Online Support This chapter provides troubleshooting tips and information for the STM. A fter each problem description, instructions are prov ided to help you diagnose and solve the problem.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-2 Troubleshooting and Using Online Support v1.0, September 2009 Basic Functioning After you turn on power to the STM, the fo llowing sequence of events should occur: 1.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-3 v1.0, September 2009 If all LEDs are still more than several minutes minute after power up: • T urn the power off, and then turn it on again to see if the STM recovers.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-4 Troubleshooting and Using Online Support v1.0, September 2009 • Make sure that you are using the SSL https: //addr ess login rather than the http://addr ess login.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-5 v1.0, September 2009 T roubleshooting a TCP/IP Ne twork Using a Ping Utility Most TCP/IP terminal devices and firewalls contain a ping utility th at sends an echo request packet to the designated device.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-6 Troubleshooting and Using Online Support v1.0, September 2009 T esting the Path from Y our PC to a Remote Device After verifying that the LAN path works correctly , test the path from your PC to a remote device.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-7 v1.0, September 2009 The STM restarts. During the reboot process, the Backup & Restore Se ttings screen remains visible.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-8 Troubleshooting and Using Online Support v1.0, September 2009 Using Online Support The STM includes online supp.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-9 v1.0, September 2009 Inst alling Hot Fixes NETGEAR might release hot fixes or patches if certain problems are found in any software release.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-10 Troubleshooting and Using Online Support v1.0, September 2009 6. Navigate to the location on your computer where you have saved the hot fix file, and then select it.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Troubleshooting and Using Online Support 7-11 v1.0, September 2009 3. Click Submit . Accessing the Knowledge Base and Document ation T o access NETGEAR’ s Knowledge Base for the STM, select Support > Knowledge Base from the menu.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual 7-12 Troubleshooting and Using Online Support v1.0, September 2009.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-1 v1.0, September 2009 Appendix A Default Settings and T echnical Spec.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-2 Default Settings and Technical Specifications v1.0, September 2009 Ta b l e A - 2 shows the STM specifications.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Default Settings and Technical Specifications A-3 v1.0, September 2009 Electromagnetic Emissions Meets requirements of FCC Part 1 5 Class A VCCI Class A CE mark, commercial Safety Meets requirements of UL listed C-T ick T able A-2.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual A-4 Default Settings and Technical Specifications v1.0, September 2009.
ProSecure Web/Email Secur ity Threat Management (STM) Appliance Reference Manu al Related Documents B-1 v1.0, September 2009 Appendix B Related Document s This appendix provides links to reference documents yo u c an use to gain a more complete understanding of the technolog ies used in your NETGEAR product.
ProSecure Web/Email Secu rity Threat Man agement (ST M) Applianc e Reference M anual B-2 Related Documents v1.0, September 2009.
Index-1 v2.0, February 2007 Index Numerics 10BaseT , 100BaseT , and 1000BaseT 3-4 A AC input STM150 1-14 STM300 1-15 STM600 1-15 access preventing inherited privileges 5-1 1 read/write and read-only 3.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-2 v2.0, Februar y 2007 keywords, e-mails 4-1 1 , 4-13 sites, reducing traffic 3-32 URLs 4- 34 We b access exceptions 4-49 categories 2-25 , 4-26.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-3 v2.0, February 2007 D date settings 2-13 , 3-23 , 3-24 troubleshooting 7-7 daylight savings time 2-13 , 3-24 debug logs 6-43 dedicated managem.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-4 v2.0, Februar y 2007 exclusions, scanning 4-47 executable files e-mail filtering 4- 14 FTP filtering 4-43 We b f i l t e r i n g 4-30 F facili.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-5 v2.0, February 2007 hot fixes 7-9 HTML, scanning 4-25 HTTP action, infected W e b file or object 2-18 , 4-25 concurrently scanned connections .
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-6 v2.0, Februar y 2007 troubleshooting 7-2 , 7-3 ports STM150 1-8 STM300 1-10 STM600 1-12 LDAP binding a dn 5-12 configuring a dn 5-17 domains 5.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-7 v2.0, February 2007 digital certific ates 3-25 performance 3-31 Management Information Base. See MIB. management ports STM150, not applicable STM300 1-10 STM600 1-12 maximum transmiss ion unit.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-8 v2.0, Februar y 2007 placement, locati on 1-17 polling interval 6-1 1 POP3 action, infected e-mails 2-15 , 4-7 default port 2-15 , 4-5 Distrib.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-9 v2.0, February 2007 real-time protection, capab ilities 1-4 traffic, diagnostics 6-42 real-time black list (RBL ), e-mails 4-17 real-time clock .
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-10 v2.0, Februar y 2007 shutting down 6-44 signatures, pattern file 2-22 Simple Mail T ransfer Protocol.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-11 v2.0, February 2007 rear panel 1-15 Stream Scanning technology overview 1-4 streaming, sca nned file parts 2-18 , 4-25 submenu tabs (W eb Ma .
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-12 v2.0, Februar y 2007 update failure alert 6-8 , 6-9 update servers 2-22 , 3-21 update settings backing up 3-16 security subscriptions configu.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-13 v2.0, February 2007 reports 6-29 , 6-33 scan throughput 1-5 security settings, using the Setup W i zard 2-17 statistics 6-13 usage monitoring.
FVX338 ProSafe VPN Firewall 200 Reference Ma nual Index-14 v2.0, Februar y 2007.
Een belangrijk punt na aankoop van elk apparaat NETGEAR STM300EW-100NAS (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen NETGEAR STM300EW-100NAS heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens NETGEAR STM300EW-100NAS vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding NETGEAR STM300EW-100NAS leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over NETGEAR STM300EW-100NAS krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van NETGEAR STM300EW-100NAS bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de NETGEAR STM300EW-100NAS kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met NETGEAR STM300EW-100NAS . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.