- Computers & electronics
- Networking
- Netgear
- STM600 - ProSecure Web And Email Threat Management Appliance
- Reference manual
Using the Setup Wizard to Perform the Initial Configuration. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance
Add to My manuals261 Pages
advertisement
![Using the Setup Wizard to Perform the Initial Configuration. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance | Manualzz Using the Setup Wizard to Perform the Initial Configuration. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance | Manualzz](http://s1.manualzz.com/store/data/007103135_1-92829e6779d984aae68708f02ebe0cf3-360x466.png)
ProSecure Web/Email Security Threat Management (STM) Appliance
•
Cancel. Cancel the operation.
•
Send Now. Send a file or report.
When a screen includes a table, table buttons are displayed to let you configure the table entries. The nature of the screen determines which table buttons are shown. The following figure shows an example:
Figure 19.
Any of the following table buttons might be displayed on screen:
•
Select All. Select all entries in the table.
•
Delete. Delete the selected entry or entries from the table.
•
Enable. Enable the selected entry or entries in the table.
•
Disable. Disable the selected entry or entries in the table.
•
Add. Add an entry to the table.
•
Edit. Edit the selected entry.
•
Up. Move the selected entry up in the table.
•
Down. Move the selected entry down in the table.
Almost all screens and sections of screens have an accompanying help screen. To open the help screen, click the question mark icon. ( ).
Using the Setup Wizard to Perform the Initial
Configuration
The Setup Wizard facilitates the initial configuration of the STM by taking you through
11 screens, the last of which allows you to save the configuration.
To start the Setup Wizard:
1.
Select Global Settings > Network Settings from the menu. The Network Settings submenu tabs display with the Network Settings screen in view.
2.
From the Network Settings configuration menu, select Setup Wizard.
The following sections explain the 11 configuration screens of the Setup Wizard. On the 10th screen, you can save your configuration. The 11th screen is just an informational screen.
The tables in the following sections explain the buttons and fields of the Setup Wizard screens. Additional information about the settings in the Setup Wizard screens is provided in other chapters that explain manual configuration; each following section provides a specific link to a section in another chapter.
32 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 1 of 10: Introduction
Figure 20.
The first Setup Wizard screen is just an introductory screen. Click Next to go to the following screen.
Setup Wizard Step 2 of 11: Networking Settings
Figure 21.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the network settings by selecting Global Settings
> Network Settings. For more information about these network
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 33
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 5. Setup Wizard Step 2: Network Settings
Setting Description (or Subfield and Description)
Management Interface Settings
System Name
IP Address
The name for the STM for purposes of identification and management. The default name is the name of your model (STM150, STM300, or STM600).
Enter the IP address of the STM through which you will access the Web
Management Interface. The factory default IP address is 192.168.1.201.
Subnet Mask
Note:
If you change the IP address of the STM while being connected through the browser, you will be disconnected. You then need to open a new connection to the new IP address and log in again. For example, if you change the default IP address from 192.168.1.201 to 10.0.0.1, you need to enter https://10.0.0.1 in your browser to reconnect to the Web Management Interface.
Enter the IP subnet mask. The subnet mask specifies the network number portion of an IP address. Unless you are implementing subnetting, use 255.255.255.0 as the subnet mask.
Gateway Address
Primary DNS
Secondary DNS
MTU Settings
Enter the IP address of the gateway through which the STM is accessed.
Specify the IP address for the primary DNS server.
As an option, specify the IP address for the secondary DNS server.
Maximum Transmission
Unit
The maximum transmission unit (MTU) is the largest physical packet size that a network can transmit. Packets that are larger than the MTU value are divided into smaller packets before they are sent, an action that prolongs the transmission process. For most Ethernet networks the MTU value is 1500 bytes, which is the default setting.
Note:
NETGEAR recommends synchronizing the STM’s MTU setting with that of your network to prevent delays in transmission.
34 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 3 of 11: Time Zone
Figure 22.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the date and time by selecting Administration >
System Date & Time. For more information about these settings,
Configuring Date and Time Service
Table 6. Setup Wizard Step 3: System Date and Time Settings
Setting Description (or Subfield and Description)
System Date and Time
From the drop-down list, select an NTP server, or select to enter the time manually.
Use Default NTP Servers The STM regularly updates its real-time clock (RTC), which it uses for scheduling, by contacting a default NETGEAR NTP server on the Internet. This is the default setting.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 35
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 6. Setup Wizard Step 3: System Date and Time Settings (Continued)
Setting Description (or Subfield and Description)
Use Custom NTP Servers The STM regularly updates its RTC by contacting one of the two NTP servers
(primary and backup), both of which you need to specify in the fields that become available when you select this option.
Note:
If you select this option but leave either the Server 1 or Server 2 field blank, both fields are automatically set to the default NETGEAR NTP servers.
Note:
A list of public NTP servers is available at
http://support.ntp.org/bin/view/Servers/WebHome
.
Server 1 Name /
IP Address
Enter the IP address or host name of the primary NTP server.
Server 2 Name /
IP Address
Enter the IP address or host name of the secondary NTP server.
Manually Enter the Date and Time
Date
Time
Enter the date in the yyyy-mm-dd (year-month-date) format.
Enter the time in the hh-mm-ss (hour-minutes-seconds) format.
Time Zone
From the drop-down list, select the local time zone in which the STM operates. The correct time zone is required in order for scheduling to work correctly. You do not need to configure daylight savings time, which is applied automatically when applicable. Greenwich Mean Time (GMT) is the default setting.
Note:
When you select a time zone that is not associated with a location, such as (GMT -08:00) GMT-8, daylight savings time is automatically disabled. When you select a time zone that is associated with a location, such as
(GMT -08:00) Pacific Time ( US & Canada), daylight savings time is automatically enabled.
36 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 4 of 11: Email Security
Figure 23.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the email security settings by selecting Email
Security > Policy or Email Security > Anti-Virus. The Email
Anti-Virus screen also lets you specify notification settings and email alert settings. For more information about these settings, see
Tip:
To enhance performance, you can disable scanning of any protocols that are seldom or never used. Be mindful of the difference between user- and server-generated traffic. For example, your mail server might not use
IMAP, but some users might configure IMAP clients.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 37
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 7. Setup Wizard Step 4: Email Security Settings
Setting Description (or Subfield and Description)
Services to Scan
SMTP
POP3
SMTP scanning is enabled by default on standard service port 25.
POP3 scanning is enabled by default on standard service port 110.
To disable any of these services, clear the corresponding check box. You can change the standard service port or add another port in the corresponding Ports to Scan field.
IMAP
Scan Action
SMTP From the SMTP drop-down list, specify one of the following actions to be taken when an infected email is detected:
• Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry.
• Delete attachment. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created.
• Block infected email. This is the default setting. The email is blocked, and a virus log entry or a spyware log entry is created.
• Quarantine infected email. The email is placed in the malware quarantine for further research.
In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry.
• Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted.
POP3
IMAP scanning is enabled by default on standard service port 143.
IMAP
From the POP3 drop-down list, specify one of the following actions to be taken when an infected email is detected:
• Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry.
• Delete attachment. This is the default setting. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created.
• Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted.
From the IMAP drop-down list, specify one of the following actions to be taken when an infected email is detected:
• Quarantine attachment. The email is not blocked, but the attachment is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or a spyware log entry.
• Delete attachment. This is the default setting. The email is not blocked, but the attachment is deleted, and a virus log entry or a spyware log entry is created.
• Log only. Only a virus log entry or a spyware log entry is created. The email is not blocked and the attachment is not deleted.
38 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 7. Setup Wizard Step 4: Email Security Settings (Continued)
Setting Description (or Subfield and Description)
Scan Exceptions
From the drop-down list, specify one of the following actions to be taken when an email attachment exceeds the size that you specify in the file size field:
• Skip. The file is not scanned but skipped, leaving the end user vulnerable. This is the default setting.
• Block. The file is blocked and does not reach the end user.
The default and maximum file sizes are as follows:
• For the STM600, the default setting is to block any attachment larger than 10240 KB. The maximum file size that you can specify is 51200 KB.
• For the STM300, the default setting is to block any attachment larger than 10240 KB. The maximum file size that you can specify is 25600 KB.
• For the STM150, the default setting is to block any attachment larger than 8192 KB. The maximum file size that you can specify is 25600 KB.
Note:
Setting the maximum file size to a high value might affect the STM’s performance. NETGEAR recommends the default value, which is sufficient to detect the vast majority of threats.
Setup Wizard Step 5 of 11: Web Security
Figure 24.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 39
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the Web security settings by selecting Web
Security > Policy or Web Security > HTTP/HTTPS > Malware
Scan. The Malware Scan screen also lets you specify HTML
scanning and notification settings. For more information about these settings, see
Configuring Web and Services Protection
Table 8. Setup Wizard Step 5: Web Security Settings
Setting Description (or Subfield and Description)
Services to Scan
HTTP
HTTPS
HTTP scanning is enabled by default on standard service port 80.
To disable Hypertext Transfer Protocol (HTTP) scanning, clear the corresponding check box. You can change the standard service port or add another port in the corresponding Ports to Scan field.
HTTPS scanning is disabled by default.
To enable Hypertext Transfer Protocol over Secure Socket
Layer (HTTPS) scanning, select the corresponding check box. You can change the standard service port (number 443) or add another port in the corresponding Ports to Scan field.
FTP FTP scanning is enabled by default on standard service port 21.
To disable File Transfer Protocol (FTP) scanning, clear the corresponding check box. You can change the standard service port or add another port in the corresponding Ports to
Scan field.
Scan Action
HTTP From the HTTP drop-down list, specify one of the following actions to be taken when an infected
Web file or object is detected:
• Quarantine file. The Web file or object is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry.
• Delete file. This is the default setting. The Web file or object is deleted, and a virus log entry or spyware log entry is created.
• Log only. Only a virus log entry or spyware log entry is created. The Web file or object is not deleted.
Select the Streaming check box to enable streaming of partially downloaded and scanned HTTP file parts to the end user. This method allows the user to experience more transparent Web downloading. Streaming is enabled by default.
40 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 8. Setup Wizard Step 5: Web Security Settings (Continued)
Setting
HTTPS
Description (or Subfield and Description)
From the HTTPS drop-down list, specify one of the following actions to be taken when an infected
Web file or object is detected:
• Quarantine file. The Web file or object is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry.
• Delete file. This is the default setting. The Web file or object is deleted, and a virus log entry or spyware log entry is created.
• Log only. Only a virus log entry or spyware log entry is created. The Web file or object is not deleted.
Select the Streaming check box to enable streaming of partially downloaded and scanned HTTPS file parts to the end user. This method allows the user to experience more transparent Web downloading. Streaming is enabled by default.
FTP From the FTP drop-down list, specify one of the following actions to be taken when an infected Web file or object is detected:
• Quarantine file. The Web file or object is removed and placed in the malware quarantine for further research. In addition, a malware quarantine log entry is created, and depending on the nature of the malware threat, also a virus log entry or spyware log entry.
• Delete file. This is the default setting. The Web file or object is deleted, and a virus log entry or spyware log entry is created.
• Log only. Only a virus log entry or spyware log entry is created. The Web file or object is not deleted.
Scan Exceptions
From the drop-down list, specify one of the following actions to be taken when a Web file or object exceeds the size that you specify in the file size field:
• Skip. The file is not scanned but skipped, leaving the end user vulnerable. This is the default setting.
• Block. The file is blocked and does not reach the end user.
The default and maximum file sizes are as follows:
• For the STM600 and STM300, the default setting is to block any attachment larger than 10240 KB. The maximum file size that you can specify is 51200 KB.
• For the STM150, the default setting is to block any attachment larger than 8192 KB. The maximum file size that you can specify is 25600 KB.
Note:
Setting the maximum file size to a high value might affect the STM’s performance. NETGEAR recommends the default value, which is sufficient to detect the vast majority of threats.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 41
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 6 of 11: Email Notification Server Settings
Figure 25.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the administrator email notification settings by selecting Global Settings > Email Notification Server. For more
information about these settings, see
Table 9. Setup Wizard Step 6: Email Notification Server Settings
Setting Description (or Subfield and Description)
Email Notification Server Settings
Show as Mail Sender
Send Notifications to
A descriptive name of the sender for email identification purposes. For example, enter [email protected].
The email address to which the notifications should be sent. Typically, this is the email address of a user with administrative privileges.
SMTP Server The IP address and port number or Internet name and port number of your ISP’s outgoing email SMTP server. The default port number is 25.
Mail Server Requires
Authentication
Note:
If you leave this field blank, the STM cannot send email notifications.
If the SMTP server requires authentication, select the Mail Server Requires
Authentication check box and enter the following settings:
User Name
Password
The user name for SMTP server authentication.
The password for SMTP server authentication.
42 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 7 of 11: Update Settings
Figure 26.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the security subscription update settings by selecting Administration > Software Update. For more information about these settings, see
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 43
ProSecure Web/Email Security Threat Management (STM) Appliance
Table 10. Setup Wizard Step 7: Update Settings
Setting
System Information
Description (or Subfield and Description)
You cannot configure this section; it is shown for information only. For the software, scan engine, (signature) pattern file, and operating system (OS), the current version and the date of the last update are displayed.
Click + More to display the versions and most recent downloads for the antispam engine, applications engine, applications pattern file, stream engine, stream pattern file, mini engine, mini pattern file, policyd, scand, urld, update client, and rescue software.
Update Settings
Update From
Update Component
Select one of the following radio buttons:
• Default Update Server. The scan engine and signatures are updated from the
NETGEAR default update server.
• Another Update Server. The scan engine and signatures are updated from a server that you specify by entering the server IP address or host name in the Server Address field.
Server Address The update server IP address or host name.
Make one of the following selections from the drop-down list:
• Update Signature Patterns only. Only the (signature) pattern file is updated. The software, scan engine, and OS are not updated.
• Update all Software and Signature Patterns. The software, scan engine,
(signature) pattern file, and OS are updated. This is the default setting.
Update Frequency
Make one of the following selections:
• Weekly. From the drop-down lists, specify the day, hour, and minutes that the update should occur.
• Daily. From the drop-down lists, specify the hour and minutes that the update should occur.
• Every. From the drop-down list, specify the frequency with which the update should occur.
44 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 8 of 11: HTTP Proxy Settings
Figure 27.
Enter the settings as explained in the following table, and then click Next to go the following screen.
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the security subscription update settings by selecting Global Settings> HTTP Proxy. For more information about these settings, see
Configuring the HTTP Proxy Settings
Table 11. Setup Wizard Step 8: HTTP Proxy Settings
Setting
HTTPS Proxy Settings
Use a Proxy Server to
Connect to the Internet
Description (or Subfield and Description)
If computers on the network connect to the Internet via a proxy server, select the
Use a Proxy Server to Connect to the Internet check box to specify and enable a proxy server. Enter the following settings:
Proxy Server The IP address and port number of the proxy server.
User Name The user name for proxy server authentication.
Password The password for proxy server authentication.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 45
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 9 of 11: Web Categories
Figure 28.
Enter the settings as explained in the following table, and then click Next to go the following screen.
46 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
After you have completed the steps in the Setup Wizard, you can make changes to the content filtering settings by selecting Web
Security > HTTP/HTTPS > Content Filtering. The Content Filtering
screen lets you specify additional filtering tasks and notification settings. For more information about these settings, see
Table 12. Setup Wizard Step 9: Web Categories Settings
Setting Description (or Subfield and Description)
Select the Web Categories You Wish to Block
Select the Enable Blocking check box to enable blocking of Web categories, which is the default setting.
Select the check boxes of any Web categories that you want to block. Use the action buttons in the following way:
• Allow All. All Web categories are allowed.
• Block All. All Web categories are blocked.
• Set to Defaults. Blocking and allowing of Web categories are returned to their default settings. See
on page 85 for information about the Web categories that are blocked by default. Categories that are
preceded by a green rectangle are allowed by default; categories that are preceded by a pink rectangle are blocked by default.
Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 47
ProSecure Web/Email Security Threat Management (STM) Appliance
Setup Wizard Step 10 of 11: Configuration Summary
Figure 29.
Click Apply to save your settings and automatically restart the system, or click Back to make changes to the configuration.
48 | Chapter 2. Using the Setup Wizard to Provision the STM in Your Network
advertisement
Related manuals
advertisement
Table of contents
- 8 What Is the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600?
- 9 What Can You Do with an STM?
- 9 Key Features and Capabilities
- 10 Stream Scanning for Content Filtering
- 11 Autosensing Ethernet Connections with Auto Uplink
- 11 Easy Installation and Management
- 12 Maintenance and Support
- 12 STM Model Comparison
- 12 Service Registration Card with License Keys
- 13 Package Contents
- 14 Hardware Features
- 14 Front Panel Ports and LEDs
- 20 Rear Panel Features
- 22 Bottom Panel with Product Label
- 23 Choosing a Location for the STM
- 24 Using the Rack-Mounting Kit
- 25 Choosing a Deployment Scenario
- 25 Gateway Deployment
- 26 Server Group
- 27 Segmented LAN Deployment
- 27 Understanding the Steps for Initial Connection
- 28 Qualified Web Browsers
- 28 Logging In to the STM
- 30 Understanding the Web Management Interface Menu Layout
- 32 Using the Setup Wizard to Perform the Initial Configuration
- 33 Setup Wizard Step 1 of 10: Introduction
- 33 Setup Wizard Step 2 of 11: Networking Settings
- 35 Setup Wizard Step 3 of 11: Time Zone
- 37 Setup Wizard Step 4 of 11: Email Security
- 39 Setup Wizard Step 5 of 11: Web Security
- 42 Setup Wizard Step 6 of 11: Email Notification Server Settings
- 43 Setup Wizard Step 7 of 11: Update Settings
- 45 Setup Wizard Step 8 of 11: HTTP Proxy Settings
- 46 Setup Wizard Step 9 of 11: Web Categories
- 48 Setup Wizard Step 10 of 11: Configuration Summary
- 49 Setup Wizard Step 11 of 11: Restarting the System
- 49 Verifying Correct Installation
- 49 Testing Connectivity
- 49 Testing HTTP Scanning
- 50 Registering the STM with NETGEAR
- 51 What to Do Next
- 52 Configuring Network Settings
- 56 Configuring Session Limits and Timeouts
- 57 Configuring the Network Refresh and Permanent MAC Address Bindings
- 59 Managing Permanent MAC Address Bindings
- 60 Configuring the HTTP Proxy Settings
- 61 About Users with Administrative and Guest Privileges
- 62 Changing Administrative Passwords and Timeouts
- 64 Configuring Remote Management Access
- 65 Using an SNMP Manager
- 67 Supported MIB Browsers
- 67 Managing the Configuration File
- 68 Backing Up Settings
- 69 Restoring Settings
- 70 Reverting to Factory Default Settings
- 71 Updating the Software
- 71 Scheduling Updates
- 73 Performing a Manual Update
- 74 Critical Updates That Require a Restart
- 74 Configuring Date and Time Service
- 76 Managing Digital Certificates
- 78 Managing the Certificate for HTTPS Scans
- 79 Managing Trusted Certificates
- 80 Managing Untrusted Certificates
- 81 Managing the Quarantine Settings
- 82 Managing the STM’s Performance
- 84 About Content Filtering and Scans
- 85 Default Email and Web Scan Settings
- 87 Configuring Email Protection
- 87 Customizing Email Protocol Scan Settings
- 88 Customizing Email Anti-Virus Settings
- 94 Email Content Filtering
- 97 Protecting Against Email Spam
- 105 Configuring Web and Services Protection
- 105 Customizing Web Protocol Scan Settings
- 107 Configuring Web Malware Scans
- 109 Configuring Web Content Filtering
- 116 Configuring Web URL Filtering
- 119 HTTPS Scan Settings
- 124 Specifying Trusted Hosts
- 125 Configuring FTP Scans
- 127 Configuring Application Control
- 130 Setting Scanning Exclusions and Web Access Exceptions
- 130 Setting Scanning Exclusions
- 132 Setting Access Exception Rules for Web Access
- 139 Creating Custom Groups for Web Access Exceptions
- 142 Creating Custom Categories for Web Access Exceptions
- 147 About Users, Groups, and Domains
- 148 Configuring Groups
- 149 Creating and Deleting Groups by Name
- 150 Editing Groups by Name
- 151 Creating and Deleting Groups by IP Address and Subnet
- 152 Configuring User Accounts
- 153 Creating and Deleting User Accounts
- 154 Editing User Accounts
- 154 Configuring Authentication
- 155 Understanding the STM’s Authentication Options
- 157 Understanding Active Directories and LDAP Configurations
- 161 Creating and Deleting LDAP and Active Directory Domains
- 164 Editing LDAP and Active Directory Domains
- 164 Understanding the ProSecure DC Agent
- 165 Requirements for the ProSecure DC Agent Software and DC Agent Server
- 165 Downloading ProSecure DC Agent Software, and Creating and Deleting DC Agents
- 167 Creating and Deleting RADIUS Domains
- 169 Editing RADIUS Domains and Configuring VLANs
- 170 Global User Settings
- 172 Viewing and Logging Out Active Users
- 175 Configuring Logging, Alerts, and Event Notifications
- 176 Configuring the Email Notification Server
- 177 Configuring and Activating System, Email, and Syslog Logs
- 182 Configuring Alerts
- 184 Monitoring Real-Time Traffic, Security, Statistics, and Web Usage
- 184 Understanding the Information on the Dashboard Screen
- 190 Monitoring Web Usage
- 192 Viewing System Status
- 194 Querying Logs
- 199 Example: Using Logs to Identify Infected Clients
- 199 Log Management
- 200 Viewing, Scheduling, and Generating Reports
- 200 Report Templates
- 202 Generating Reports for Downloading
- 203 Scheduling Automatic Generation and Emailing of Reports
- 204 Advanced Report Filtering Options
- 208 Viewing and Managing the Quarantine Files
- 215 Using Diagnostics Utilities
- 216 Using the Network Diagnostic Tools
- 217 Using the Realtime Traffic Diagnostics Tool
- 218 Gathering Important Log Information and Generating a Network Statistics Report
- 219 Restarting and Shutting Down the STM
- 222 Basic Functioning
- 222 Power LED Not On
- 222 Test LED or Status LED Never Turns Off
- 223 LAN or WAN Port LEDs Not On
- 223 Troubleshooting the Web Management Interface
- 224 When You Enter a URL or IP Address a Time-Out Error Occurs
- 224 Troubleshooting a TCP/IP Network Using a Ping Utility
- 225 Testing the LAN Path to Your STM
- 225 Testing the Path from Your PC to a Remote Device
- 226 Restoring the Default Configuration and Password
- 227 Problems with Date and Time
- 227 Using Online Support
- 227 Enabling Remote Troubleshooting
- 228 Installing Hot Fixes
- 229 Sending Suspicious Files to NETGEAR for Analysis
- 230 Accessing the Knowledge Base and Documentation