NETGEAR STM150EW3-100NAS manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of NETGEAR STM150EW3-100NAS, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of NETGEAR STM150EW3-100NAS one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of NETGEAR STM150EW3-100NAS. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of NETGEAR STM150EW3-100NAS should contain:
- informations concerning technical data of NETGEAR STM150EW3-100NAS
- name of the manufacturer and a year of construction of the NETGEAR STM150EW3-100NAS item
- rules of operation, control and maintenance of the NETGEAR STM150EW3-100NAS item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of NETGEAR STM150EW3-100NAS alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of NETGEAR STM150EW3-100NAS, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the NETGEAR service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of NETGEAR STM150EW3-100NAS.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the NETGEAR STM150EW3-100NAS item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    March 2009 202-10414-02 v1.1 NETGEAR , Inc. 350 East Plumeria Drive San Jose, CA 95134 USA ProSecure W eb/Email Security Threat Management Appliance STM150 Reference Manual[...]

  • Page 2

    ii v1.1, March 2009 T rademarks NETGEAR and the NETGEA R logo are registered trademarks and ProS ecure is a trademark of NETGEAR, Inc. Microsoft, W indows, and Windows NT ar e registered trademarks of Microsof t Corporation. Other brand and product names are registered trademarks or trademarks of their respective holder s. St atement of Co nditions[...]

  • Page 3

    v1.1, March 2009 iii V oluntary Control Council for Interference (VCCI) St atement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the V o luntary Control Council for In terference by Da ta Processing Equipment and Electronic Office Ma[...]

  • Page 4

    v1.1, March 2009 iv Open SSL Copyright (c) 1998-2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or withou t modification, are permitted provided that the follo wing conditions * are met: 1. Redistributions of source code must retain the above copyright n otice, this list of condi tions and the [...]

  • Page 5

    v1.1, March 2009 v Product and Publication Det ails PPP Copyright (c) 1989 Carnegie Mellon University . All rights reserved. Redistribution and use in source and binary forms are permitted provide d that the above copyright notice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other ma ter[...]

  • Page 6

    v1.1, March 2009 vi[...]

  • Page 7

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual vii v1.1, March 2009 Content s About This Manual Conventions, Formats, and Scope .................. ................ ................... ................ .............. xi Revision History .............. .... ............. ... ... ... .... ... ... ............. ... ..[...]

  • Page 8

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual viii v1.1, March 2009 T esting HTTP Scanning .. ................ ................... ................. ................... ................ 2-10 What to Do Next .... ................ ............. ................ ................ ............. ................ ..[...]

  • Page 9

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual ix v1.1, March 2009 Configuring Web Malware Scans .... ............. ... ................ ................. ............ .......... 4-13 Configuring Web Content Filtering .................. ................ .................... ................... 4-14 Configuring Web[...]

  • Page 10

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual x v1.1, March 2009[...]

  • Page 11

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual xi v1.1, March 2009 About This Manual The NETGEAR ® Pr oSecur e™ W eb/Email Security Thr eat Management Appliance STM 150 Refer ence Manual describes how to configure and troubl eshoot a ProSecure W eb/Email Security Threat Management Appliance STM15 0. The inform [...]

  • Page 12

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual xii v1.1, March 2009 • Scope. This manual is written for the threat ma nagement appliance according to these specifications: For more information about networ k, Internet, firewall, and VPN technologies, see the links to the NETGEAR website in Appendix B, “Rel[...]

  • Page 13

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Introduction 1-1 v1.1, March 2009 Chapter 1 Introduction This chapter provides an overview of the feat ures and capabilities of the ProSecure W eb/Email Security Threat Managemen t Appliance STM150. It also identifies the physical features of the appliance and the con[...]

  • Page 14

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 1-2 Introduction v1.1, March 2009 About Stream Scanning Stream scanning is based on the simple observatio n that network traffic travels in streams. The STM150 scan engine starts receiving and analyzing traffic as the stream enters the network. As soon as a number[...]

  • Page 15

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Introduction 1-3 v1.1, March 2009 What Can Y ou Do with an STM150? The STM150 comb ines robust protection against malware with ease-of-use and advanced reporting and notification features to help you de ploy an d manage the device with minimal effort. Here are some of[...]

  • Page 16

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 1-4 Introduction v1.1, March 2009 Service Registration Card with License Key(s) Be sure to store the license key card that came wi th your unit in a secure location. Y ou will need these keys to activate yo ur product during the initial setup, and if you ever have[...]

  • Page 17

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Introduction 1-5 v1.1, March 2009 2. Power on test status 3. USB ports 4. Uplink switched N-way automatic speed ne gotiating auto MDI/MDIX Ethernet port 5. Downlink Ethernet ports Four switched N-way automatic speed nego tiating auto MDI/MDIX Ethernet ports. Rear Pane[...]

  • Page 18

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 1-6 Introduction v1.1, March 2009 Default IP Address, Login Name, and Password Location Check the label on the bottom of the STM150’ s encl osure if you need a rem inder of the following factory default information: Choosing a Location for the STM150 The STM150 [...]

  • Page 19

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Introduction 1-7 v1.1, March 2009 Using the Rack Mounting Kit Use the provided mounting kit fo r the STM150 to install the app liance to a rack. The mounting brackets supplied with the STM150 are usually in stalled before the unit is shipped out. If the brackets are n[...]

  • Page 20

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 1-8 Introduction v1.1, March 2009[...]

  • Page 21

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Provisioning Threat Manageme nt Services 2-1 v1.1, March 2009 Chapter 2 Provisioning Threat Management Services Provisioning the STM150 ProSe cure W eb/Email Secu rity Threat Management Appliance STM150 in your network is described in this chapter . This chapter conta[...]

  • Page 22

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 2-2 Provisioning Threa t Management Services v1.1, March 2009 Gateway Deployment In a typical gateway deploy ment scenario, a single STM150 appliance is installed at the gateway – between the firewall and the LAN core switch – to protect the network against al[...]

  • Page 23

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Provisioning Threat Manageme nt Services 2-3 v1.1, March 2009 Server Group In a server group deployment, one STM150 applia nce is installed at the gateway and another in front of the serv er group. This type of deployment helps spl it the network load and provides the[...]

  • Page 24

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 2-4 Provisioning Threa t Management Services v1.1, March 2009 Segmented LAN Deployment . In a segmented LAN deployment, one STM150 app liance is installed in front of each network segment. This type of deployme nt helps split the network load and protects network [...]

  • Page 25

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Provisioning Threat Manageme nt Services 2-5 v1.1, March 2009 Logging In to the STM150 Follow these steps to lo g in to the STM150. 1. Use a browser to connect to https://192.168.1.201 . 2. When prompted, en ter admin for the User Name and password for the Password. F[...]

  • Page 26

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 2-6 Provisioning Threa t Management Services v1.1, March 2009 3. Click Login. The default Monitoring > Security page displays. The Support tab on the main menu contains links to the onl ine NETGEAR STM150 product documentation and support knowledgebase. Figure [...]

  • Page 27

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Provisioning Threat Manageme nt Services 2-7 v1.1, March 2009 Registering the STM150 T o re ceive threat management com ponent updates and technical supp ort, you need to register your STM150 appliance. The registration key (see “Service Registration Card with Licen[...]

  • Page 28

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 2-8 Provisioning Threa t Management Services v1.1, March 2009 Use the Setup Wizard to Complete the Configuration Follow the wizard prompts to configure these settings: • Network settings - If these were set earlier , skip this page or update these as needed. •[...]

  • Page 29

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Provisioning Threat Manageme nt Services 2-9 v1.1, March 2009 Email Notification Server On this wizard page, type the email address that yo u want to appear in the notification email as sender . For example, you can type ' STM150@mydomain.com '. Enter the SM[...]

  • Page 30

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 2-10 Provisioning Threat Manageme nt Services v1.1, March 2009 T esting Connectivity Do the following to verify that netw ork traf fic can pass through the STM150: • Ping an Internet URL. • Ping the IP address of a device on either side of the STM150. T esting[...]

  • Page 31

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 v1.1, March 2009 Chapter 3 Performing System Management T asks This chapter provides information on other t asks that you can perfo rm after setting up and configuring the STM150. This chapter contains the following sections: ?[...]

  • Page 32

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-2 Perfo rm in g Syst em Ma na g em e nt Task s v1.1, March 2009 For other devices connected to the STM150 (such as a firewall or a switc h), you now have an option to manually change the duplex settings. This feature will allow STM150 to integrate with other dev[...]

  • Page 33

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-3 v1.1, March 2009 Enabling Session Limit s and Timeout s Y ou enable session limits and tim eouts on the Global Settings > Network Setting > Session Limit screen. This page allows you to specify total number sessions per us[...]

  • Page 34

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-4 Perfo rm in g Syst em Ma na g em e nt Task s v1.1, March 2009 Scanning Exclusions T o enhance system performance, you may add trus ted hosts or connections to this list. The STM150 will no longer scan these connections based on the specified hosts or ports. T [...]

  • Page 35

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-5 v1.1, March 2009 Setting the System T ime Setting the correct system time and time zone ensures that the date and time recorded in the STM150 logs are accurate. Changing the time zone requires a reboot to apply the updated setti[...]

  • Page 36

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-6 Perfo rm in g Syst em Ma na g em e nt Task s v1.1, March 2009 S pecifying the Notification Server For the STM150 to send out alerts, re ports, and logs via email, an SMTP server must be specified on the Global Settings > Em ail Notification Server page. Not[...]

  • Page 37

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-7 v1.1, March 2009 5. In Send notification to , type up to the email addresses to which you want to send alerts (for example, admin@company.com ). Y ou ca n send alerts to up to 3 recipients; se para te each email address with a c[...]

  • Page 38

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-8 Perfo rm in g Syst em Ma na g em e nt Task s v1.1, March 2009 T o enable system administrator email alert s 1. On the menu, go to Monitoring > Logs & Reports > Alerts . 2. Configure the Enable Update Failed Alerts, Enable License Expiration Alerts, E[...]

  • Page 39

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-9 v1.1, March 2009 Configuring SNMP Settings Simple Network Management Protocol (SNMP) i s an application layer (Layer 7) prot ocol that is used by network mana gement systems for monitoring th e statu s of network-connec te d dev[...]

  • Page 40

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-10 Performing System Ma na g em e nt T ask s v1.1, March 2009 •I n Contact (optional), type the name o f the person or department responsibl e for managing the STM150 a ppliance. •I n Location (optional), type the physical location of the STM150 appliance. 3[...]

  • Page 41

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 1 v1.1, March 2009 Backing Up and Rest oring Configurations The STM150 provides backu p and restore features to ensure speedy recovery from system errors or configuration on an additional STM150 applia nce with the same language[...]

  • Page 42

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-12 Performing System Ma na g em e nt T ask s v1.1, March 2009 T o Back Up the STM150 Settings 1. On the menu , click Administration > Settings Backup & Restore . The Backup and Restore page appears . 2. For the Save a copy of cu rrent settings option, cli[...]

  • Page 43

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 3 v1.1, March 2009 Resetting to Factory Default s Y ou can use the default button on the Backup & Rest ore Settings page to revert to factory default settings, or you can use the reset button on the back of t he unit. Use th[...]

  • Page 44

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-14 Performing System Ma na g em e nt T ask s v1.1, March 2009 Enabling Remote Management T o enable remote management, go to Administration > Remote Management . Enter the port number you wish to use. Y ou may enter port 44 3 or a port ranging from 1024 to 65[...]

  • Page 45

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 5 v1.1, March 2009 Administering Sof tware Up dates The STM150 has four main comp on ents – pattern f ile, scan engine, OS, and software. T o ensure up-to-date protection against ma lware, perform updates reg ularly . The STM1[...]

  • Page 46

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-16 Performing System Ma na g em e nt T ask s v1.1, March 2009 T o configure scheduled up dates 1. On the menu, go to Administration > Software Update . 2. In Update Fr om , select an update source. The default update source is the NETGEAR update server . If N[...]

  • Page 47

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 7 v1.1, March 2009 Applying a Sof tware Up date that Requires a Re boot If a downloaded update requires a reboot, you will be prompted to perfor m the update upon login to the system. The update notice will prov ide information [...]

  • Page 48

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-18 Performing System Ma na g em e nt T ask s v1.1, March 2009 Administering Admin Logi n T imeout s and Passwords The STM150 specifies one Administrator accoun t (Admin) and one guest account. Y ou can use this section to change the user name or passwo rd for ei[...]

  • Page 49

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Performing System Man agement Tasks 3-1 9 v1.1, March 2009 3. Enter the new password under the New Password field. 4. T o confirm, enter the new password again under the Retype New Password field. 5. Click Apply . T o edit the Guest User Name, from the main me nu, cli[...]

  • Page 50

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 3-20 Performing System Ma na g em e nt T ask s v1.1, March 2009[...]

  • Page 51

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-1 v1.1, March 2009 Chapter 4 Customizing Scans This chapter provides information on how to op timize the ProSecure W eb/Email Security Threat Management Appliance STM150 scan settings . T opics discussed include: • “Default Scan Settings” on [...]

  • Page 52

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-2 Customizing Scans v1.1, March 2009 Customizing Email Scanning Settings The Email Security pages allow you to enable an d disable scanning of supported netwo rk services (protocols), set the scan actions, and configure the maximum file size to scan. In the Emai[...]

  • Page 53

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-3 v1.1, March 2009 End User Email No tification Settings T o configure the notification options for email scan, go to Email Security > Anti-V irus > Notification Settings on th e menu. The following options are availabl e on the Noti fication[...]

  • Page 54

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-4 Customizing Scans v1.1, March 2009 Select the I nsert W arning into Email Subject SMTP check box, and then type a message for Malware found and No malwar e found . The default messages are: • Malware found: [Malware Infected] • No malware found: [Malware F[...]

  • Page 55

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-5 v1.1, March 2009 Email Content Filtering The STM150 provides several options for filtering unwanted content in the email. Y ou can filter mails based on key words in the subject, file type , and file name. Y ou can also set an action to perform o[...]

  • Page 56

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-6 Customizing Scans v1.1, March 2009 Filter by Subject Keywo rds Enter the keyw ords to filter when they appear in the emai l subject line. Use co mmas to separate different keywords. Then select the actions for SMTP and POP3 protocols. A vailable filtering acti[...]

  • Page 57

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-7 v1.1, March 2009 For IMAP and POP3, select either Block attachment & log or No Log . Protecting Against Email Sp am The STM150 integrates multiple anti-spam techno logies to provide co mprehensive protection against unwanted mail. Y ou can en[...]

  • Page 58

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-8 Customizing Scans v1.1, March 2009 T o define the sender whitelist. On the menu, go to Email Security > Anti-Spam > Whitelist and Blacklist . 1. Under the Whitelist column, enter the IP address (or IP ad dress range), domain name, or email address that y[...]

  • Page 59

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-9 v1.1, March 2009 T o define the recipient whitelist. On th e menu, go to Email Security >Anti-Spam > Whitelist and Blacklist . 1. Under the Whitelist column, enter the domain name, or email address that you want set as a trusted source. 2. [...]

  • Page 60

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-10 Customizing Scans v1.1, March 2009 T o add a new provider . 1. In the Add Real-time Blacklist section, type the name of the provider under the Provider column. 2. Under RBL Domain Suffix , type the domain name from which the STM150 will retrieve the real-time[...]

  • Page 61

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-11 v1.1, March 2009 If tag spam email is selected, the STM150 will append a spam tag (customizable) in the mail subject. T o configure distributed spam analysis. 1. On the main menu, go to Email Security > Anti-Spam > Distributed Spam Analysi[...]

  • Page 62

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-12 Customizing Scans v1.1, March 2009 Customizing Web Scanning Settings The STM150 also scans W eb or HTTP traf fic fo r malicious content and performs the specified action, including Delete File , Clean, Audit or S treaming. T o configure W eb security , go to [...]

  • Page 63

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-13 v1.1, March 2009 Configuring Web Malware Scans If you enabled HTTP or HTTPS scan in W eb Security > Policy you can specify what type of action to take against detected malware. Define the action (Delete file, Lo g only) an d check the Streami[...]

  • Page 64

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-14 Customizing Scans v1.1, March 2009 T o replace the original page with warning te xt. check the Replace Page with W arning T ext: checkbox. Customize the wa rning text. If you wish to presen t the wa rnin g page in HTML format instead of plain text check the H[...]

  • Page 65

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-15 v1.1, March 2009 • Record HTTP traf fic log: If you wish to log a ll scanned HTTP traf fic, check the Record HTTP T raffic Log box. Keep in mind that this will slow down performance. • Block Files with the Following Extensions: Select the Bl[...]

  • Page 66

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-16 Customizing Scans v1.1, March 2009 blocked URL and wh ich category it was in. Y ou can prev iew the warning page by pressing Preview . The maximum size for the warning text message is 3 Kilobytes. When the STM150 blocks access to a link of a certain blocked w[...]

  • Page 67

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-17 v1.1, March 2009 Configuring Web URL Filtering T o configure W eb filtering, go to W eb Security > HTTP and HTTPS > URL Filtering . White List Select the Enable check box if you want the STM150 to bypass the sca nning of a URL listed here.[...]

  • Page 68

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-18 Customizing Scans v1.1, March 2009 In addition to manually ente ring URLs one at a time, you may import and export the list. Note that the file to be imported must be in .txt format and must be l ine delimited (one URL per line). Use Notepad or an y other tex[...]

  • Page 69

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-19 v1.1, March 2009 HTTPS Scan Settings T o configure the HTTPS scan settings, go to W eb Security > HTTPS Scan > Settings . T o configure the HTTPS scan settings, click W eb Security > HTTP and HTTPS > HTTPS Settings, and set th e foll[...]

  • Page 70

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-20 Customizing Scans v1.1, March 2009 required, the connection will be rejected with an alert message in the browser window . T o allow access, select the Allow the STM to present the website to the client. check box. Show This Message When an SSL Connection Att[...]

  • Page 71

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-21 v1.1, March 2009 Due to the nature of HTTPS scanni ng and how t he certificates are handled, the end user will see Security Alerts in their web browser as shown in the following figure. This is because the client (browser) will get a certificate[...]

  • Page 72

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-22 Customizing Scans v1.1, March 2009 However , certain HTTPS servers do require clie nt certificate authentication for every HTTPS request. By the design of SSL, th e client needs to present its own certificate rather than using the one from the STM150. The HTT[...]

  • Page 73

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-23 v1.1, March 2009 Before enabling HTTPS scanning, you may specify which certificate to be used by the STM150 to handle HTTPS requests. By default, a certificate is sued by NETGEAR is used. This certificate can be downloaded from the S TM150 login[...]

  • Page 74

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-24 Customizing Scans v1.1, March 2009 T rusted Hosts T o iden tify trusted hosts, go to W eb Security > HTTP and HTTPS > T rusted Hosts Do Not Intercept HTTPS Connections for the Following Hosts: The STM150 will bypass the scanning and certificate authenti[...]

  • Page 75

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Customizing Scans 4-25 v1.1, March 2009 2. Enter the host name (not the URL) of the server into the Add Host box, and then click Add . Click Apply . T o delete host s from the Host Access Control List 1. Select the host you wish to delete from the bypass list. 2. Clic[...]

  • Page 76

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 4-26 Customizing Scans v1.1, March 2009 If you enabled FTP scan in W eb Security > Policy > FTP you can specify what type of action to take agains t detected malware as we ll as which file types to block on FTP . Under Action you can sp ecify what type of ac[...]

  • Page 77

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Perfo rmance 5-1 v1.1, March 2009 Chapter 5 Monitoring System Performance The STM150 provides online su pp ort services along with real- time alerts and comprehensive monitoring, reporting and logging ca pabilities to ensure that you are able to effe[...]

  • Page 78

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-2 Monitoring Sys tem Performa nce v1.1, March 2009 V iewing the System St atus T o view system status information, click Monitoring > System S tatus . The at-a-glanc e table on this page allows you quic kly view the status of important components of the STM15[...]

  • Page 79

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Perfo rmance 5-3 v1.1, March 2009 Using S tatistics and W eb Usage Data T o view system statistics, click Monitoring > St a t i s t i c s . The at-a-glance table on the S tatistics tab page le ts you review the distribution of traf fic going throu[...]

  • Page 80

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-4 Monitoring Sys tem Performa nce v1.1, March 2009 T o view W eb usage statistics, click Monitori ng > St a t i s t i c s > We b U s a g e . Select the time frame for the W eb Usage report then click Vi e w The at-a-glanc e tab l e on this pa ge allows you[...]

  • Page 81

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Perfo rmance 5-5 v1.1, March 2009 Monitoring Security T o view a summary of malware incidents on the network, click Monitoring > Security . Spam and malware detected on the SMTP , IM AP , POP3, HTTP , HTTPS and FTP protocols are listed on this pag[...]

  • Page 82

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-6 Monitoring Sys tem Performa nce v1.1, March 2009 Running Diagnostics The STM150 provides diagnostic tools that help you analyze traf fic conditio ns and the status of the network. T wo sets of tools are available – netw ork diagnostic tools an d traffic diag[...]

  • Page 83

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Perfo rmance 5-7 v1.1, March 2009 Use PING to check the connection between the ST M150 and a specific IP address. Enter the IP address or host name, and then click PING . The PING results appear at the bottom of the page. T o perform DNS lookup, ente[...]

  • Page 84

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-8 Monitoring Sys tem Performa nce v1.1, March 2009 Generate Network St atistics Report The Network S tatistic Report provides the user a detailed overview of t he network utilization in the STM150 managed network environment. Users will be able to see what consu[...]

  • Page 85

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Perfo rmance 5-9 v1.1, March 2009 Querying Logs System logs have their own pa ge on the W eb interfa ce. Use th e following procedure to generate the other log types. 1. T o query logs, go to Logs & Reports > Log Query . 2. In Log T ype , sele[...]

  • Page 86

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-10 Monitoring System Perfo rmance v1.1, March 2009 5. In Select logs to send , select the check boxes for the log ty pes that you want the STM150 to send via email. 6. In Format , click either Plain T ext or CSV . If you want the STM150 to compress the log file [...]

  • Page 87

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Performance 5-11 v1.1, March 2009 This automated log purging takes the burden of managing the size of the STM150 logs of f your shoulders and ensures that the latest ma lware incidents and traffic activities are always recorded. T o manually purge se[...]

  • Page 88

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-12 Monitoring System Perfo rmance v1.1, March 2009 T o delete saved reports. Click the Delete button next to a pre viously saved report to delete it from the STM150. Using Online Support Online support includes: • Remote T rou ble shooting • Hot Fixes • Ma[...]

  • Page 89

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Monitoring System Performance 5-13 v1.1, March 2009 If NETGEAR support cannot access your the STM150 remotely , you may be asked to save a log file to your computer and then email it to NETGEAR for analysis. If asked to do so, log into the STM150 W eb interface, go to[...]

  • Page 90

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual 5-14 Monitoring System Perfo rmance v1.1, March 2009 5. Browse to the location where you saved the hot fix file, and then select it. 6. Click Open. 7. Click Apply to install the hot fix. Sending Suspicious Files to NETGEAR for Analysis Y ou can report any undetect[...]

  • Page 91

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Default Settings and Technical Specifications A-1 v1.1, March 2009 Appendix A Default Settings and T echnical S pecifications Y ou can use the reset button located on the rear pane l to reset all settings to their factory defaults. • T o perform a hard reset, press [...]

  • Page 92

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual A-2 Default Settings and Technical Specifications v1.1, March 2009 The STM150 specifications are listed in the table below . LAN Connecti ons MAC Address Default address MTU Size 1500 Ports 5 AutoSense 10/100/1000 BASE-T , RJ-45 LAN IP Address In line transparent [...]

  • Page 93

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Related Documents B-1 v1.1, March 2009 Appendix B Related Document s This appendix provides links to reference documents yo u c an use to gain a more complete understanding of the technolog ies used in your NETGEAR product. Document Link Internet Networking and TCP/IP[...]

  • Page 94

    ProSecure Web/Email Secu rity Threat Man agement Ap pliance STM1 50 Referen ce Manual B-2 Related Documents v1.1, March 2009[...]

  • Page 95

    ProSecure Web/Email Security Thr eat Management Appliance STM150 Reference Manual Index-1 v1.1, March 2009 Index D default settings 4-1 deployment rack mounting 1-7 testing connectivity 2-10 testing HTTP scanning 2-10 verifying 2-9 deployment scenarios choosing 2-1 gateway 2-2 segment e d LAN 2-4 E EICAR 2-10 F factory default login 1-6 firewall fr[...]