- Computers & electronics
- Networking
- Netgear
- STM600 - ProSecure Web And Email Threat Management Appliance
- Reference manual
Using Diagnostics Utilities. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance
Add to My manuals261 Pages
advertisement
![Using Diagnostics Utilities. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance | Manualzz Using Diagnostics Utilities. Netgear STM600 - ProSecure Web And Email Threat Management Appliance, STM300 - ProSecure Web And Email Threat Management Appliance, STM150 - ProSecure Web And Email Threat Management Appliance | Manualzz](http://s1.manualzz.com/store/data/007103135_1-92829e6779d984aae68708f02ebe0cf3-360x466.png)
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
The report includes only quarantined spam emails that contain the email address that is specified in the Send to field.
4.
Click Send Report.
The report provides summary information such as time, sender, recipient, subject, and size, and a retrieve link. The user can retrieve an individual email by clicking the internal or external retrieve link for the email. The presence of an external retrieve links (see the red box in the following figure) depends on the setting of the Set Public Host/IP Address and Port
check box on the Distributed Spam Analysis screen (see
Figure 122.
Using Diagnostics Utilities
The STM provides diagnostic tools that help you analyze traffic conditions and the status of the network. Two sets of tools are available:
•
Network diagnostic tools. These tools include a ping utility, traceroute utility, and DNS
lookup utility.
•
Traffic diagnostic tools. These tools allow you to perform real-time, per-protocol traffic
analysis between specific source and destination addresses and let you generate reports on network usage in your network.
Note:
For normal operation, diagnostic tools are not required.
To display the Diagnostics screen, select Monitoring > Diagnostics from the menu. To facilitate the explanation of the tools, the Diagnostics screen is divided and presented in this
manual in three figures (the following figure,
Chapter 6. Monitoring System Access and Performance | 215
ProSecure Web/Email Security Threat Management (STM) Appliance
Using the Network Diagnostic Tools
This section discusses the Ping or Trace an IP Address section, the Perform a DNS Lookup section, and the Test URL section of the Diagnostics screen:
Figure 123. Diagnostics, screen 1 of 3
Sending a Ping Packet
Use the ping utility to send a ping packet request to check the connection between the STM and a specific IP address. If the request times out (no reply is received), it usually means that the destination is unreachable. However, some network devices can be configured not to respond to a ping. The ping results are displayed on a new screen; click Back on the
Windows menu bar to return to the Diagnostics screen.
To send a ping:
1.
Locate the Ping or Trace an IP Address section on the Diagnostics screen. In the Host field, enter the IP address or host name that you want to ping.
2.
Click the Ping button. The results of the ping are displayed below the Host field.
Tracing a Route
A traceroute lists all routers between the source (the STM) and the destination IP address.
To send a traceroute:
1.
Locate the Ping or Trace an IP Address section on the Diagnostics screen. In the Host field, enter the IP address or host name for which you want trace the route.
2.
Click the Traceroute button. The results of the traceroute are displayed below the Host field.
216 | Chapter 6. Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
Looking Up a DNS Address
A Domain Name Server (DNS) converts the Internet name (for example, www.netgear.com) to an IP address. If you need the IP address of a Web, FTP, mail, or other server on the
Internet, request a DNS lookup to find the IP address.
To look up a DNS address:
1.
Locate the Perform a DNS Lookup section on the Diagnostics screen. In the Domain
Name field, enter a domain name.
2.
Click the Lookup button. The results of the lookup action are displayed below the Domain
Name field.
Testing a URL
Testing a URL allows you to verify that the STM can connect to the Internet. The test performs a DNS lookup and captures the HTTP page.
To test a URL:
1.
Locate the Test URL section on the Diagnostics screen. In the URL field, enter a URL.
2.
Click the Wget button. The results of the URL test are displayed below the URL field:
Figure 124.
Using the Realtime Traffic Diagnostics Tool
This section discusses the Realtime Traffic Diagnostics section of the Diagnostics screen:
Figure 125. Diagnostics, screen 2 of 3
You can use the realtime traffic diagnostics tool to analyze traffic patterns with a network traffic analyzer tool. Depending on the network traffic analyzer tool that you use, you can find
Chapter 6. Monitoring System Access and Performance | 217
ProSecure Web/Email Security Threat Management (STM) Appliance
out which applications are using most bandwidth, which users use most bandwidth, how long users are connected, and other information.
To use the realtime traffic diagnostics tool:
1.
Locate the Realtime Traffic Diagnostics section on the Diagnostics screen. Select one or more check boxes to specify the protocols for which you want to capture the traffic flow.
The check boxes that you can select are HTTP, SMTP, POP3, IMAP, and FTP.
2.
In the Source IP Address field, enter the IP address of source of the traffic stream that you want to analyze.
3.
In the Destination IP Address field, enter the IP address of the destination of the traffic stream that you want to analyze.
4.
Click Start. You are prompted to save the downloaded traffic information file to your computer; however, do not save the file until you have stopped capturing the traffic flow.
5.
When you want to stop capturing the traffic flow, click Stop.
6.
Select a location to save the captured traffic flow. (The default file name is diagnostics.result.dat.) The file is downloaded to the location that you specify.
7.
When the download is complete, browse to the download location you specified and verify that the file has been downloaded successfully.
8.
Send the file to NETGEAR Technical Support for analysis.
Gathering Important Log Information and
Generating a Network Statistics Report
When you request support, NETGEAR Technical Support might ask you to collect the debug logs and other information from your STM.
This section discusses the Gather Important Log Information section, Network Statistics
Report section, and Reboot the System section of the Diagnostics screen:
Figure 126. Diagnostics, screen 3 of 3
218 | Chapter 6. Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
Gathering Important Log Information
To gather log information about your STM:
1.
Locate the Gather Important Log Information section on the Diagnostics screen. Click
Download Now. You are prompted to save the downloaded log information file to your
computer. The default file name is importantlog.gpg.
2.
When the download is complete, browse to the download location you specified and verify that the file has been downloaded successfully.
Generating Network Statistics
The network statistic report provides a detailed overview of the network utilization in the STM managed network environment. The report allows you to see what consumes the most resources on the network.
To generate the network statistic report:
Locate the Network Statistics Report section on the Diagnostics screen. Click Generate
Network Statistics. The network statistic report is sent in an email to the recipient that you
have configured on the email Notification Server screen (see
Restarting and Shutting Down the STM
You can perform a remote restart, for example, when the STM seems to have become unstable or is not operating normally.
Note:
Restarting breaks any existing connections either to the STM (such as your management session) or through the STM (for example,
LAN users accessing the Internet). However, connections to the
Internet are automatically reestablished when possible.
To restart the STM:
Locate the Restart & Shutdown section on the Diagnostics screen (this section is not shown on any of the Diagnostics screen figures in this manual). Click the Restart button. The STM restarts. (If you can see the unit: The reboot process is complete when the Test LED on the front panel goes off.)
Note:
See also
Chapter 6. Monitoring System Access and Performance | 219
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
For the STM150 only, there is an alternate way to restart: Press the
Power button on the rear panel of the STM150 (see
on page 20). The front panel Test LED flashes, and the
STM150 reboots.
To shut down the STM:
Locate the Restart & Shutdown section on the Diagnostics screen (this section is not shown on any of the Diagnostics screen figures in this manual). Click the Shutdown button. The
STM shuts down.
WARNING!
You can shut down the STM using the Web Management Interface, but you cannot start up the STM using the Web Management
Interface.
220 | Chapter 6. Monitoring System Access and Performance
7.
Troubleshooting and Using Online
Support
7
This chapter provides troubleshooting tips and information for the STM. After each problem description, instructions are provided to help you diagnose and solve the problem. For the common problems listed, go to the section indicated.
•
Is the STM on?
•
Have I connected the STM correctly?
•
I cannot access the STM’s Web Management Interface.
Troubleshooting the Web Management Interface
•
A time-out occurs.
When You Enter a URL or IP Address a Time-Out Error Occurs
•
I have problems with the LAN connection.
Troubleshooting a TCP/IP Network Using a Ping Utility
•
I want to clear the configuration and start over again.
Restoring the Default Configuration and Password
•
The date or time is not correct.
•
I need help from NETGEAR.
Note:
The STM’s diagnostic tools are explained in
Chapter 7. Troubleshooting and Using Online Support | 222
advertisement
Related manuals
advertisement
Table of contents
- 8 What Is the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600?
- 9 What Can You Do with an STM?
- 9 Key Features and Capabilities
- 10 Stream Scanning for Content Filtering
- 11 Autosensing Ethernet Connections with Auto Uplink
- 11 Easy Installation and Management
- 12 Maintenance and Support
- 12 STM Model Comparison
- 12 Service Registration Card with License Keys
- 13 Package Contents
- 14 Hardware Features
- 14 Front Panel Ports and LEDs
- 20 Rear Panel Features
- 22 Bottom Panel with Product Label
- 23 Choosing a Location for the STM
- 24 Using the Rack-Mounting Kit
- 25 Choosing a Deployment Scenario
- 25 Gateway Deployment
- 26 Server Group
- 27 Segmented LAN Deployment
- 27 Understanding the Steps for Initial Connection
- 28 Qualified Web Browsers
- 28 Logging In to the STM
- 30 Understanding the Web Management Interface Menu Layout
- 32 Using the Setup Wizard to Perform the Initial Configuration
- 33 Setup Wizard Step 1 of 10: Introduction
- 33 Setup Wizard Step 2 of 11: Networking Settings
- 35 Setup Wizard Step 3 of 11: Time Zone
- 37 Setup Wizard Step 4 of 11: Email Security
- 39 Setup Wizard Step 5 of 11: Web Security
- 42 Setup Wizard Step 6 of 11: Email Notification Server Settings
- 43 Setup Wizard Step 7 of 11: Update Settings
- 45 Setup Wizard Step 8 of 11: HTTP Proxy Settings
- 46 Setup Wizard Step 9 of 11: Web Categories
- 48 Setup Wizard Step 10 of 11: Configuration Summary
- 49 Setup Wizard Step 11 of 11: Restarting the System
- 49 Verifying Correct Installation
- 49 Testing Connectivity
- 49 Testing HTTP Scanning
- 50 Registering the STM with NETGEAR
- 51 What to Do Next
- 52 Configuring Network Settings
- 56 Configuring Session Limits and Timeouts
- 57 Configuring the Network Refresh and Permanent MAC Address Bindings
- 59 Managing Permanent MAC Address Bindings
- 60 Configuring the HTTP Proxy Settings
- 61 About Users with Administrative and Guest Privileges
- 62 Changing Administrative Passwords and Timeouts
- 64 Configuring Remote Management Access
- 65 Using an SNMP Manager
- 67 Supported MIB Browsers
- 67 Managing the Configuration File
- 68 Backing Up Settings
- 69 Restoring Settings
- 70 Reverting to Factory Default Settings
- 71 Updating the Software
- 71 Scheduling Updates
- 73 Performing a Manual Update
- 74 Critical Updates That Require a Restart
- 74 Configuring Date and Time Service
- 76 Managing Digital Certificates
- 78 Managing the Certificate for HTTPS Scans
- 79 Managing Trusted Certificates
- 80 Managing Untrusted Certificates
- 81 Managing the Quarantine Settings
- 82 Managing the STM’s Performance
- 84 About Content Filtering and Scans
- 85 Default Email and Web Scan Settings
- 87 Configuring Email Protection
- 87 Customizing Email Protocol Scan Settings
- 88 Customizing Email Anti-Virus Settings
- 94 Email Content Filtering
- 97 Protecting Against Email Spam
- 105 Configuring Web and Services Protection
- 105 Customizing Web Protocol Scan Settings
- 107 Configuring Web Malware Scans
- 109 Configuring Web Content Filtering
- 116 Configuring Web URL Filtering
- 119 HTTPS Scan Settings
- 124 Specifying Trusted Hosts
- 125 Configuring FTP Scans
- 127 Configuring Application Control
- 130 Setting Scanning Exclusions and Web Access Exceptions
- 130 Setting Scanning Exclusions
- 132 Setting Access Exception Rules for Web Access
- 139 Creating Custom Groups for Web Access Exceptions
- 142 Creating Custom Categories for Web Access Exceptions
- 147 About Users, Groups, and Domains
- 148 Configuring Groups
- 149 Creating and Deleting Groups by Name
- 150 Editing Groups by Name
- 151 Creating and Deleting Groups by IP Address and Subnet
- 152 Configuring User Accounts
- 153 Creating and Deleting User Accounts
- 154 Editing User Accounts
- 154 Configuring Authentication
- 155 Understanding the STM’s Authentication Options
- 157 Understanding Active Directories and LDAP Configurations
- 161 Creating and Deleting LDAP and Active Directory Domains
- 164 Editing LDAP and Active Directory Domains
- 164 Understanding the ProSecure DC Agent
- 165 Requirements for the ProSecure DC Agent Software and DC Agent Server
- 165 Downloading ProSecure DC Agent Software, and Creating and Deleting DC Agents
- 167 Creating and Deleting RADIUS Domains
- 169 Editing RADIUS Domains and Configuring VLANs
- 170 Global User Settings
- 172 Viewing and Logging Out Active Users
- 175 Configuring Logging, Alerts, and Event Notifications
- 176 Configuring the Email Notification Server
- 177 Configuring and Activating System, Email, and Syslog Logs
- 182 Configuring Alerts
- 184 Monitoring Real-Time Traffic, Security, Statistics, and Web Usage
- 184 Understanding the Information on the Dashboard Screen
- 190 Monitoring Web Usage
- 192 Viewing System Status
- 194 Querying Logs
- 199 Example: Using Logs to Identify Infected Clients
- 199 Log Management
- 200 Viewing, Scheduling, and Generating Reports
- 200 Report Templates
- 202 Generating Reports for Downloading
- 203 Scheduling Automatic Generation and Emailing of Reports
- 204 Advanced Report Filtering Options
- 208 Viewing and Managing the Quarantine Files
- 215 Using Diagnostics Utilities
- 216 Using the Network Diagnostic Tools
- 217 Using the Realtime Traffic Diagnostics Tool
- 218 Gathering Important Log Information and Generating a Network Statistics Report
- 219 Restarting and Shutting Down the STM
- 222 Basic Functioning
- 222 Power LED Not On
- 222 Test LED or Status LED Never Turns Off
- 223 LAN or WAN Port LEDs Not On
- 223 Troubleshooting the Web Management Interface
- 224 When You Enter a URL or IP Address a Time-Out Error Occurs
- 224 Troubleshooting a TCP/IP Network Using a Ping Utility
- 225 Testing the LAN Path to Your STM
- 225 Testing the Path from Your PC to a Remote Device
- 226 Restoring the Default Configuration and Password
- 227 Problems with Date and Time
- 227 Using Online Support
- 227 Enabling Remote Troubleshooting
- 228 Installing Hot Fixes
- 229 Sending Suspicious Files to NETGEAR for Analysis
- 230 Accessing the Knowledge Base and Documentation