NETGEAR STM150 Appliance Reference Manual

NETGEAR STM150 Appliance Reference Manual

Prosecure web/email security threat management (stm)
Hide thumbs Also See for STM150:
Table of Contents

Advertisement

Quick Links

ProSecure Web/Email
Security Threat
Management (STM)
Appliance Reference
Manual
NETGEAR, Inc.
350 East Plumeria Drive
San Jose, CA 95134
202-10519-01
1.0
September 2009

Advertisement

Table of Contents
loading

Summary of Contents for NETGEAR STM150

  • Page 1 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134 202-10519-01 September 2009...
  • Page 2 In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to make changes to the products described in this document without notice. NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
  • Page 3 Voluntary Control Council for Interference (VCCI) Statement This equipment is in the second category (information equipment to be used in a residential area or an adjacent area thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
  • Page 4 Open SSL Copyright (c) 1998–2000 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions, and the following disclaimer.
  • Page 5 (gzip format). Product and Publication Details Model Number: Publication Date: September 2009 Product Family: Product Name: ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600 Home or Business Product: Business Language: English Publication Part Number: 202-10519-01 Publication Version Number v1.0, September 2009...
  • Page 6 v1.0, September 2009...
  • Page 7: Table Of Contents

    How to Print This Manual ....................xiv Revision History ....................... xv Chapter 1 Introduction What Is the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600? ........................1-1 What Can You Do with an STM? ..................1-2 Key Features and Capabilities ..................1-3 Stream Scanning for Content Filtering ..............1-4...
  • Page 8 Setup Wizard Step 11 of 11: Restarting the System ..........2-27 Verifying Proper Installation ..................2-27 Testing Connectivity ....................2-27 Testing HTTP Scanning ..................2-27 Registering the STM with NETGEAR ................2-28 What to Do Next ......................2-30 Chapter 3 Performing Network and System Management Configuring Network Settings ..................3-1 Configuring Session Limits and Timeouts ..............3-5...
  • Page 9 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Updating the Software ....................3-18 Scheduling Updates ....................3-19 Performing a Manual Update .................3-21 Critical Updates That Require a Restart ..............3-22 Configuring Date and Time Service ................3-23 Managing Digital Certificates ..................3-25 Managing the Certificate for HTTPS Scans ............3-27 Managing Untrusted Certificates ................3-30 Managing the Quarantine Settings ................3-31 Performance Management ...................3-32...
  • Page 10 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Creating and Deleting Groups by Name ..............5-3 Editing Groups by Name ..................5-4 Creating and Deleting Groups by IP Address and Subnet ........5-6 Configuring User Accounts .....................5-7 Creating and Deleting User Accounts ..............5-7 Editing User Accounts ....................5-8 Configuring Authentication .....................5-9 Understanding Active Directories and LDAP Configurations .........
  • Page 11 Troubleshooting and Using Online Support Basic Functioning ......................7-2 Power LED Not On ....................7-2 Test LED (STM150) or Status LED (STM300 and STM600) Never Turns Off ..7-2 LAN or WAN Port LEDs Not On ................7-3 Troubleshooting the Web Management Interface ............7-3 When You Enter a URL or IP Address a Time-out Error Occurs ........7-4...
  • Page 12 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual v1.0, September 2009...
  • Page 13: About This Manual

    The NETGEAR ® ProSecure™ Web/Email Security Threat Management Appliance STM Reference Manual describes how to configure and troubleshoot a ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600. The information in this manual is intended for readers with intermediate computer and networking skills.
  • Page 14: How To Print This Manual

    For more information about network, Internet, firewall, and VPN technologies, click the links to the NETGEAR website in Appendix B, “Related Documents.” Note: Product updates are available on the NETGEAR, Inc. website at http://prosecure.netgear.com. Note: Go to http://prosecure.netgear.com/community/forum.php for information about the ProSecure™...
  • Page 15: Revision History

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Revision History Manual Manual Part Publication Version Description Number Date Number 202-10519-01 September 2009 Initial publication of this reference manual. v1.0, September 2009...
  • Page 16 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual v1.0, September 2009...
  • Page 17: Introduction

    Introduction This chapter provides an overview of the features and capabilities of the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600. It also identifies the physical features of the appliances and the contents of the product packages. This chapter contains the following sections: •...
  • Page 18: What Can You Do With An Stm

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual In addition to scanning HTTP, HTTPS, FTP, SMTP, POP3, and IMAP traffic, the STM protects networks against spam phishing attacks and unwanted Web use. The STM is a plug-and-play device that can be installed and configured within minutes. What Can You Do with an STM? The STM combines robust protection against malware with ease of use and advanced reporting and notification features to help you deploy and manage the device with minimal effort.
  • Page 19: Key Features And Capabilities

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Key Features and Capabilities The STM provides the following key features and capabilities: • Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet WAN ports (see “STM Model Comparison” on page 1-5).
  • Page 20: Stream Scanning For Content Filtering

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Stream Scanning for Content Filtering Stream Scanning is based on the simple observation that network traffic travels in streams. The STM scan engine starts receiving and analyzing traffic as the stream enters the network. As soon as a number of bytes are available, scanning starts.
  • Page 21: Easy Installation And Management

    Visual monitoring. The STM’s front panel LEDs provide an easy way to monitor its status and activity. Maintenance and Support NETGEAR offers technical support seven days a week, 24 hours a day, according to the terms identified in the Warranty and Support information card provided with your product. STM Model Comparison...
  • Page 22: Service Registration Card With License Keys

    The STM600 provides two pairs of uplink and downlink ports, allowing for support of two separate networks or subnets with strict traffic separation. b. All STM models including the STM150 support failover with the use of STP on a switch Service Registration Card with License Keys Be sure to store the license key card that came with your STM in a secure location.
  • Page 23: Package Contents

    • Warranty and Support Information Card If any of the parts are incorrect, missing, or damaged, contact your NETGEAR dealer. Keep the carton, including the original packing materials, in case you need to return the product for repair. Hardware Features The front panel ports and LEDs, rear panel ports, and bottom label of the STM models are described below.
  • Page 24 5) Downlink Ports 4) Uplink Port Figure 1-2 From left to right, the STM150’s front panel shows the following ports and status LEDs: 1. Power LED. 2. Test LED. 3. One non-functioning USB port: this port is included for future management enhancements.
  • Page 25 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 1-2. LED Descriptions for the STM150 (continued) Object Activity Description Test On (Amber) during The STM is initializing. After approximately 2 minutes, when the STM startup. has completed its initialization, the Test LED turns off. If the Test LED remains on, the initialization has failed.
  • Page 26 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Front Panel STM300 Figure 1-3 shows the front panel ports and status (LEDs) of the STM300. 2) Power LED 7) Uplink LEDs 6) Mgmt Port 8) Downlink LEDs 3) Status LED 5) USB Port 8) Downlink Port 1) Console Port...
  • Page 27 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The function of each STM300 LED is described in the following table: Table 1-3. LED Descriptions for the STM300 Object Activity Description Power On (Green) Power is supplied to the STM. Power is not supplied to the STM.
  • Page 28 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Front Panel STM600 Figure 1-4 shows the front panel ports and status (LEDs) of the STM600. 7) Pair 1 LEDs 2) Power LED 8) Pair 2 LEDs 3) Status LED 6) Mgmt Port 8) Pair 2 Ports 5) USB Port 1) Console Port...
  • Page 29 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The function of each STM600 LED is described in the following table: Table 1-4. LED Descriptions for the STM300 Object Activity Description Power On (Green) Power is supplied to the STM. Power is not supplied to the STM.
  • Page 30: Rear Panel Features

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Rear Panel Features The rear panel of the STM150 differs from the rear panels of the STM300 and STM600. Rear Panel STM150 Figure 1-5 shows the rear panel components of the STM150.
  • Page 31: Bottom Panel With Product Label

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 1-6 shows the rear panel components of the STM300 and STM600. 1) Power Switch 2) AC Power Socket Figure 1-6 From left to right, the STM600’s rear panel components (excluding the four fan air outlets) are: 1.
  • Page 32 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual STM150 Product Label Figure 1-7 STM300 Product Label Figure 1-8 1-16 Introduction v1.0, September 2009...
  • Page 33: Choosing A Location For The Stm

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual STM600 Product Label Figure 1-9 Choosing a Location for the STM The STM is suitable for use in an office environment where it can be free-standing (on its runner feet) or mounted into a standard 19-inch equipment rack. Alternatively, you can rack-mount the STM in a wiring closet or equipment room.
  • Page 34: Using The Rack-Mounting Kit

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Temperature operating limits are not likely to be exceeded. Install the unit in a clean, air- conditioned environment. For information about the recommended operating temperatures for the STM, see Appendix A, “Default Settings and Technical Specifications.”...
  • Page 35: Choosing A Deployment Scenario

    • “Choosing a Deployment Scenario on this page. • “Understanding the Steps for Initial Connection” on page 2-4. • “Registering the STM with NETGEAR” on page 2-28. • “Verifying Proper Installation” on page 2-27. • “Verifying Proper Installation” on page 2-27.
  • Page 36: Server Group

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual <<Bad quality illustration>> Figure 2-1 Server Group In a server group deployment, one STM appliance is installed at the gateway and another in front of the server group. This type of deployment helps split the network load and provides the e-mail server with dedicated protection against malware, including e-mail-borne viruses and spam.
  • Page 37: Segmented Lan Deployment

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 2-2 Segmented LAN Deployment In a segmented LAN deployment, one STM appliance is installed in front of each network segment. This type of deployment helps split the network load and protects network segments from malware coming in through the gateway or originating from other segments.
  • Page 38: Understanding The Steps For Initial Connection

    See the ProSecure™ Web/Email Security Threat Management Applliance STM150, STM300, or STM600 Installation Guide for complete steps. A PDF of the Installation Guide is on the NETGEAR ProSecure™ website at: http://prosecure.netgear.com. 2. Log in to the STM. After logging in, you are ready to set up and configure your STM. See “Logging In to the STM”...
  • Page 39: Qualified Web Browsers

    4. Verify the installation. See “Verifying Proper Installation” on page 2-27. 5. Register the STM. “Registering the STM with NETGEAR” on page 2-28. Each of these tasks is described separately in this chapter. Qualified Web Browsers To configure the STM, you must use a Web browser such as Microsoft Internet Explorer 5.1 or higher, Mozilla Firefox l.x or higher, or Apple Safari 1.2 or higher with JavaScript, cookies, and...
  • Page 40 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The NETGEAR Configuration Manager Login screen displays in the browser (see Figure 2-4, which shows the STM600). Figure 2-5 3. In the User field, type admin. Use lower case letters. 4. In the Password field, type password. Here too, use lower case letters.
  • Page 41 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Note: The first time that you remotely connect to the STM with a browser via an SSL VPN connection, you might get a warning message regarding the SSL certificate. If you are using a Windows computer with Internet Explorer 5.5 or higher, simply click Yes to accept the certificate.
  • Page 42: Understanding The Web Management Interface Menu Layout

    Understanding the Web Management Interface Menu Layout Figure 2-7 shows the menu at the top of the STM600’s Web Management Interface. The Web Management Interface layouts of the STM150 and STM300 are identical. 3rd Level: Submenu Tab (blue) 2nd Level: Configuration Menu Link (gray)
  • Page 43 Test. Test the configuration before you decide whether or not to save and apply the configuration. The security threat management appliance will attempt to connect to the NETGEAR Web site. If a successful connection is made, NETGEAR’s Web site appears. •...
  • Page 44: Using The Setup Wizard To Perform The Initial Configuration

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Using the Setup Wizard to Perform the Initial Configuration The Setup Wizard facilitates the initial configuration of the STM by taking you through 11 screens, the last of which allows you to save the configuration. To start the Setup Wizard: 1.
  • Page 45: Setup Wizard Step 2 Of 11: Networking Settings

    Management Interface Settings System Name The name for the STM for purposes of identification and management. The default name is the name of your model (STM150, STM300, or STM600). Using the Setup Wizard to Provision the STM in Your Network 2-11...
  • Page 46 For most Ethernet networks the Maximum Transmit Unit (MTU) value is 1500 Unit Bytes, which is the default setting. Note: NETGEAR recommends synchronizing the STM’s MTU setting with that of your network to prevent delays in transmission. 2-12 Using the Setup Wizard to Provision the STM in Your Network...
  • Page 47: Setup Wizard Step 3 Of 11: Time Zone

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setup Wizard Step 3 of 11: Time Zone Figure 2-12 Enter the settings as explained in Table 2-2 on page 2-14, then click Next to go the following screen. Note: After you have completed the steps in the Setup Wizard, you can make changes to the date and time by selecting Administration >...
  • Page 48 From the pull-down menu, select an NTP server, or select to enter the time manually. Use Default NTP Servers The STM’s real-time clock (RTC), which it uses for scheduling. is updated regularly by contacting a default Netgear NTP server on the Internet. This is the default setting. Use Custom NTP Servers The STM’s RTC is updated regularly by contacting one of the two NTP servers...
  • Page 49: Setup Wizard Step 4 Of 11: Email Security

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setup Wizard Step 4 of 11: Email Security Figure 2-13 Enter the settings as explained in Table 2-3 on page 2-16, then click Next to go the following screen.. Note: After you have completed the steps in the Setup Wizard, you can make changes to the email security settings by selecting Email Security >...
  • Page 50 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 2-3. Setup Wizard Step 4: Email Security Settings Setting Description (or Subfield and Description) Services to Scan SMTP SMTP scanning is enabled by default on standard To disable any of these services, deselect service port 25.
  • Page 51: Setup Wizard Step 5 Of 11: Web Security

    For the STM600 and STM300, the default setting is to block any attachment larger than 10240 KB. For the STM150, the default setting is to block any attachment larger than 8192 KB. Note: Setting the maximum file size to a high value might affect the STM’s performance. NETGEAR recommends the default value, which is sufficient to detect the vast majority of threats.
  • Page 52 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Enter the settings as explained in Table 2-4 on page 2-18, then click Next to go the following screen. Note: After you have completed the steps in the Setup Wizard, you can make changes to the Web security settings by selecting Web Security >...
  • Page 53 For the STM600 and STM300, the default setting is to block any Web file or object larger than 10240 KB. For the STM150, the default setting is to block any Web file or object larger than 8192 KB.
  • Page 54: Setup Wizard Step 6 Of 11: Email Notification Server Settings

    Email Notification Server Settings Show as Mail sender A descriptive name of the sender for e-mail identification purposes. For example, enter stm600notification@netgear.com. Send Notifications to The email address to which the notifications should be sent. Typically, this is the e-mail address of a user with administrative privileges.
  • Page 55: Setup Wizard Step 7 Of 11: Update Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 2-5. Setup Wizard Step 6: Email Notification Server Settings (continued) Setting Description (or Subfield and Description) Mail Server Requires If the SMTP server requires authentication, select the Mail Server Requires Authentication Authentication checkbox and enter the following settings: User Name...
  • Page 56 Select one of the following radio buttons: • Default update server. The scan engine and signatures are updated from the NETGEAR default update server. • Another Server address. The scan engine and signatures are updated from a server that you specify by entering the server IP address or host name in the Server Address field.
  • Page 57: Setup Wizard Step 8 Of 11: Http Proxy Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setup Wizard Step 8 of 11: HTTP Proxy Settings Figure 2-17 Enter the settings as explained in Table 2-7 on page 2-23, then click Next to go the following screen. Note: After you have completed the steps in the Setup Wizard, you can make changes to the security subscription update settings by selecting Global Settings>...
  • Page 58: Setup Wizard Step 9 Of 11: Web Categories

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setup Wizard Step 9 of 11: Web Categories Figure 2-18 2-24 Using the Setup Wizard to Provision the STM in Your Network v1.0, September 2009...
  • Page 59 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Enter the settings as explained in Table 2-8, then click Next to go the following screen. Note: After you have completed the steps in the Setup Wizard, you can make changes to the content filtering settings by selecting Web Security >...
  • Page 60: Setup Wizard Step 10 Of 11: Configuration Summary

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setup Wizard Step 10 of 11: Configuration Summary Figure 2-19 2-26 Using the Setup Wizard to Provision the STM in Your Network v1.0, September 2009...
  • Page 61: Setup Wizard Step 11 Of 11: Restarting The System

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Click Apply to save your settings and automatically restart the system or click Back to make changes to the configuration. Setup Wizard Step 11 of 11: Restarting the System Figure 2-20 Wizard screen 11 is just an informational screen to let you know that the S restarts automatically with the new configuration.
  • Page 62: Registering The Stm With Netgear

    Registering the STM with NETGEAR To receive threat management component updates and technical support, you must register your STM with NETGEAR. The support registration key is provided with the product package (see “Service Registration Card with License Keys” on page 1-6).
  • Page 63 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual If your STM is connected to the Internet, you can activate the service licenses: 1. Select Support > Registration from the menu. The Registration screen displays. Figure 2-21 2. Enter the license key in the Registration Key field. 3.
  • Page 64: What To Do Next

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The STM will activate the licenses and register the unit with the NETGEAR registration server. Note: When you reset the STM to the original factory default settings after you have entered the license keys to activate the STM (see “Registering the STM with...
  • Page 65: Performing Network And System Management

    Network Settings screen also allows you to specify the interface speed and duplex settings for the management interface, for the STM600 or STM300 uplink and downlink interfaces, or for the STM150’s WAN and LAN interfaces. v1.0, September 2009...
  • Page 66 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To configure the STM’s network settings: 1. Select Global Settings > Network Settings from the menu. The Network Settings submenu tabs appear with the Network Settings screen in view (see Figure 3-1, which shows the STM600)..
  • Page 67 System Name The name for the STM for purposes of identification and management. The default name is the name of your model (STM150, STM300, or STM600). IP Address Enter the IP address of the STM through which you will access the Web Management Interface.
  • Page 68 3-3) • 100baseT/Full. Fast Ethernet speed at full duplex. Note: All LAN interfaces share the same MAC address, speed, and duplex mode. Note: The STM150 does not provide a dedicated management interface. Performing Network and System Management v1.0, September 2009...
  • Page 69: Configuring Session Limits And Timeouts

    For most Ethernet networks the MTU value is 1500 Bytes, which is the default setting. Note: NETGEAR recommends synchronizing the STM’s MTU setting with that of your network to prevent delays in transmission. 3. Click Apply to save your settings. Changing any of the settings in the Management Interface Settings section or Interface Speed &...
  • Page 70 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the Session Limits submenu tab. The Session Limits screen displays. Figure 3-4 3. Select the radio buttons, make your selections from the pull-down menu, and complete the fields as explained in Table 3-2 on page 3-7.
  • Page 71: Configuring The Http Proxy Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 3-2. Session Limits Settings Setting Description (or Subfield and Description) Session Limits Select the Yes radio button to enable session limits, and then specify the Limit Type and Limit Value fields. The No radio button is selected by default. Limit Type From the Limit Type pull-down menu, make one of the following selections:...
  • Page 72 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To configure the HTTP proxy: 1. Select Global Settings > HTTP Proxy from the menu. The HTTP Proxy screen displays. Figure 3-5 2. Select the check box and complete the fields as explained in Table 3-3.
  • Page 73: About Users With Administrative And Guest Privileges

    NETGEAR recommends that you change these passwords to more secure passwords. The login window that is presented to the administrator and guest user is the NETGEAR Configuration Manager Login screen (see Figure 5-6 on page 5-10).
  • Page 74 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 1. Select Administration > Set Password from the menu. The Set Password screen displays. Figure 3-6 2. To modify the administrator or guest settings, select the check box and complete the fields as explained in Table 3-4.
  • Page 75: Configuring Remote Management Access

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 3-4. Set Password Settings screen; Administrator and Guest Settings (continued) Setting Description (or Subfield and Description) New Password Enter the new password. Retype New Password Confirm the new password. 3. Under the Administrator Settings and Guest Settings sections of the screen, click Apply to save your settings.
  • Page 76 Note: The STM is accessible to anyone who knows its IP address and default password. Because a malicious WAN user can reconfigure the STM and misuse it in many ways, NETGEAR highly recommends that you change the admin and guest default passwords before continuing (see “Changing Administrative Passwords...
  • Page 77: Using An Snmp Manager

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. In the Access Control List section of the screen, you can specify IP addresses or IP address ranges that you want to grant access to the Web Management Interface for increased security. To specify a range, separate the beginning IP address and the ending IP address by a dash (-).To allow access from all IP addresses and IP address ranges, leave this field blank.
  • Page 78 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To enable SNMP and to configure the SNMP settings: 1. Select Administration > SNMP from the menu. The SNMP screen displays. Figure 3-8 2. Select the radio buttons and complete the fields as explained in Table 3-6 on page 3-15.
  • Page 79: Supported Mib Browsers

    After you have configured the SNMP settings, you must add the IP address of the STM in the Management Information Base (MIB) browsers on which you want to receive the SNMP notifications. See the documentation of your MIB browser for instructions. NETGEAR recommends the following MIB browsers for receiving the STM SNMP notifications: • MG-Soft •...
  • Page 80: Managing The Configuration File

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The STM MIB structure is automatically downloaded by management stations. You should start receiving notifications after you have enabled SNMP on the STM and added its IP address into your MIB browsers. Managing the Configuration File The configuration settings of the STM are stored in a configuration file on the STM.
  • Page 81: Restore Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Update settings. Update source, update frequency, and so on. • Anti-spam settings. Whitelist, blacklist, content filtering settings, and so on. Back up your STM settings periodically, and store the backup file in a safe place. Tip: You can use a backup file to export all settings to another STM that has the same language and management software versions.
  • Page 82: Reverting To Factory Default Settings

    LAN IP address will be 192.168.1.201. Note: For the STM150 only, there is an alternate way to return the settings to factory default: using a sharp object, press and hold the Reset button on the rear panel of the STM150 (see “Rear Panel STM150”...
  • Page 83: Scheduling Updates

    15 minutes, to ensure that your network protection is current. Scheduling Updates Enabling scheduled updates ensures that the STM automatically downloads the latest components from the NETGEAR update server. To configure scheduled updates: 1. Select Administration > Software Update from the menu. The Software Update screen...
  • Page 84 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 3-10 2. Select the radio buttons, complete the field, and make your selections from the pull-down menus as explained in Table 3-7 on page 3-21. 3-20 Performing Network and System Management v1.0, September 2009...
  • Page 85: Performing A Manual Update

    Select one of the following radio buttons: • Default update server. The scan engine and signatures are updated from the NETGEAR default update server. • Another Server address. The scan engine and signatures are updated from a server that you specify by entering the server IP address or host name in the Server Address field.
  • Page 86: Critical Updates That Require A Restart

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 3-11 3. After the update has completed, click Apply to activate the newly updated software. Critical Updates That Require a Restart If a downloaded update requires a restart, you are prompted to perform the update when you log in to the STM.
  • Page 87: Configuring Date And Time Service

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring Date and Time Service If you have used the Setup Wizard, you might have already configured the system date and time settings; the System Date and Time screen allows you to modify these settings. Configure date, time and NTP server designations on the System Date and Time screen.
  • Page 88 Note: If you select this option but leave either the Server 1 or Server 2 field blank, both fields will be set to the default NETGEAR NTP servers. Note: A list of public NTP servers is available at http://ntp.isc.org/bin/view/Servers/WebHome...
  • Page 89: Managing Digital Certificates

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Note: If you select the default NTP servers or if you enter a custom server FQDN, the STM will determine the IP address of the NTP server by performing a DNS lookup.
  • Page 90 CA provides a strong assurance of the server’s identity. The STM contains a self-signed digital certificate from NETGEAR. This certificate can be downloaded from the STM login screen or from the Certificate Management screen for browser import.
  • Page 91: Managing The Certificate For Https Scans

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Managing the Certificate for HTTPS Scans To manage the STM’s active certificate that is used for HTTPS scans: Select Web Security> Certificate Management from the menu. The Certificate Management screen displays. Figure 3-15 shows only the Certificate Used for HTTPS Scans section of the screen.
  • Page 92 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Reloading the Default NETGEAR Certificate To reload the default NETGEAR certificate: 1. Select the Use NETGEAR default certificate. radio button. 2. Click Apply to save your settings. Importing a New Certificate To import a new certificate: 1.
  • Page 93: Managing Trusted Certificates

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Managing Trusted Certificates To manage trusted certificates: Select Web Security> Certificate Management from the menu. The Certificate Management screen displays. Figure 3-16 shows only the Trusted Certificate Authorities section of the screen. Figure 3-16 The Trusted Certificate Authorities table contains the trusted certificates from third-party Web sites that are signed by the Certificate Authorities.
  • Page 94: Managing Untrusted Certificates

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Importing a Trusted Certificate To import a trusted certificate: 1. Click Browse next to the Import from File field. 2. Navigate to a trusted certificate file on your computer. Follow the instructions of your browser to place the certificate file in the Import from File field.
  • Page 95: Managing The Quarantine Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Deleting an Untrusted Certificate To delete an untrusted certificate: 1. Select the certificate from the Untrusted Certificates table. 2. Click Delete Selected. Moving an Untrusted Certificate to the Trusted Certificate Authorities Table To move an untrusted certificate to the Trusted Certificate Authorities table: 1.
  • Page 96: Performance Management

    For the STM600, the default setting is 200 MB and the maximum setting is 512 MB. For the STM150 and STM300, the default setting is 100 MB and the maximum setting is 512 MB. Note: After the limit has been exceeded, old items are automatically purged from the malware quarantine to make space for new items.
  • Page 97 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual If you want to reduce traffic by preventing undesired e-mails from reaching their destinations or by preventing access to certain sites on the Internet, you can use the STM’s content filtering feature. By default, this feature is disabled;...
  • Page 98 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual – Setting the size of Web files to be scanned. Scanning large Web files requires network resources and might slow down traffic. You can specify the maximum file size that will be scanned, and if files that exceed the maximum size will be skipped (which might compromise security) or blocked.
  • Page 99: Content Filtering And Optimizing Scans

    Chapter 4 Content Filtering and Optimizing Scans This chapter describes how to apply the content filtering features of the STM and how to optimize scans to protect your network. This chapter contains the following sections: • “About Content Filtering and Scans” on this page.
  • Page 100: Default E-Mail And Web Scan Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Default E-mail and Web Scan Settings For most network environments, the default scan settings and actions that are shown in Table 4-1 work well but you can adjust these to the needs of your specific environment. Table 4-1.
  • Page 101 Uncategorized Blocked a. For the STM300 and STM600, files and messages that are larger than 10240 KB are skipped by default.. For the STM150, files and messages that are larger than 8192 KB are skipped by default. Content Filtering and Optimizing Scans...
  • Page 102: Configuring E-Mail Protection

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring E-mail Protection The STM lets you configure the following settings to protect the network’s e-mail communication: • The e-mail protocols that will be scanned for malware. • Actions that will be taken when infected e-mails are detected. •...
  • Page 103: Customizing E-Mail Anti-Virus Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Complete the fields and select the checkboxes as explained in Table 4-2. Table 4-2. E-mail Policy Settings Setting Description Services to Scan SMTP Select the SMTP checkbox to enable Simple Mail Transfer Protocol (SMTP) scanning. This service is enabled by default and uses default port 25.
  • Page 104 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-2 2. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Table 4-3. Table 4-3. E-mail Anti-Virus Action Settings Setting Description Action SMTP From the SMTP pull-down menu, specify one of the following actions when an infected e-mail is detected:...
  • Page 105 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-3. E-mail Anti-Virus Action Settings (continued) Setting Description POP3 From the POP3 pull-down menu, specify one of the following actions when an infected e-mail is detected: • Quarantine attachment. The e-mail is not blocked, but the attachment is removed and placed in the malware quarantine for further research.
  • Page 106 • For the STM600 and STM300, the default setting is to block any attachment larger than 10240 KB. The maximum file size that you can specify is 51200 KB. • For the STM150, the default setting is to block any attachment larger than 8192 KB. The maximum file size that you can specify is 25600 KB.
  • Page 107 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring E-mail Anti-Virus Notification Settings To configure the e-mail anti-virus notification settings: 1. Select Email Security > Anti-Virus from the menu. The anti-virus submenu tabs appear with the Action screen in view. 2.
  • Page 108 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual <<Adjust size?>> Figure 4-4 4-10 Content Filtering and Optimizing Scans v1.0, September 2009...
  • Page 109 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Table 4-5. Table 4-5. E-mail Anti-Virus Notification Settings Setting Description Notification Settings Insert Warning into Email For SMTP e-mail messages, select this checkbox to insert a warning into Subject (SMTP) the e-mail subject line:...
  • Page 110: E-Mail Content Filtering

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-5. E-mail Anti-Virus Notification Settings (continued) Setting Description Email Alert Settings Note: Ensure that the Email Notification Server (see “Configuring the E-mail Notification Server” on page 6-2) is configured before you specify the e-mail alert settings. Send alert to In addition to inserting an warning message to replace an infected e-mail, you can configure the STM to send a notification e-mail to the sender, the...
  • Page 111 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • File name blocking. You can block e-mails based on the names of attached files. Such names can include, for example, names of known malware such as the Netsky worm (which normally arrives as netsky.exe).
  • Page 112 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Complete the fields and make your selections from the pull-down menus as explained in Table 4-6. Table 4-6. E-mail Filter Settings Setting Description (or Subfield and Description) Filter by Subject Keywords Keywords Enter keywords that will be detected in the e-mail subject line.
  • Page 113: Protecting Against E-Mail Spam

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-6. E-mail Filter Settings (continued) Setting Description (or Subfield and Description) Filter by File Type File Extension By default, the File Extension field lists the most common file extensions that will be detected.
  • Page 114 3. Real-time blacklist. E-mails from known spam sources that are collected by blacklist providers are blocked. 4. Distributed spam analysis. E-mails that are detected as spam by the NETGEAR Spam Classification Center are either tagged or blocked. This order of implementation ensures the optimum balance between spam prevention and system performance.
  • Page 115 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-6 Content Filtering and Optimizing Scans 4-17 v1.0, September 2009...
  • Page 116 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Complete the fields as explained in Table 4-6. Table 4-7. Whitelist/Blacklist Settings Setting Description Sender IP Address (SMTP) Whitelist Enter the source IP addresses from which e-mails can be trusted. Blacklist Enter the source IP addresses from which e-mails will be blocked.
  • Page 117 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual By default, the STM comes with two pre-defined blacklist providers: Spamhaus, and Spamcop. You can add a maximum of 16 blacklist providers to the RBL sources. To enable the real-time blacklist: 1.
  • Page 118 Note: Unlike other scans, you do not need to configure the spam score because the NETGEAR Spam Classification Center performs the scoring automatically as long as the STM is connected to the Internet. However, this does mean that the STM must be connected to the Internet for the spam analysis to be performed correctly.
  • Page 119 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the Distributed Spam Analysis submenu tab. The Distributed Spam Analysis screen displays. Figure 4-8 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Table 4-8.
  • Page 120 When the option “Tag spam email” is selected from the Action SPAM to mail header pull-down menu (see above), select this checkbox to add the “X-NETGEAR-SPAM” tag to the e-mail header. The default setting is to add the default tag to the e-mail header. Send Quarantine Spam Report Note: Ensure that the Email Notification Server (see “Configuring the E-mail Notification Server”...
  • Page 121: Configuring Web And Services Protection

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring Web and Services Protection The STM lets you configure the following settings to protect the network’s Internet communication: • The Web protocols that will be scanned for malware. • Actions that will be taken when infected Web files or objects are detected. •...
  • Page 122 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-9 2. Complete the fields and select the checkboxes as explained in Table 4-8. Table 4-9. Web Policy Settings Setting Description Services to Scan HTTP Select the HTTP checkbox to enable Hypertext Transfer Protocol (HTTP) scanning. This service is enabled by default and uses default port 80.
  • Page 123: Configuring Web Malware Scans

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring Web Malware Scans If you have used the Setup Wizard, you might have already configured the Web malware action and exception scan settings; the Malware Scan screen allows you to modify these settings. Whether or not the STM detects Web-based malware, you can configure it to take a variety of actions (some of the default actions are listed in Table 4-1 on page...
  • Page 124 • For the STM600 and STM300, the default setting is to block any attachment larger than 10240 KB. The maximum file size that you can specify is 51200 KB. • For the STM150, the default setting is to block any attachment larger than 8192 KB. The maximum file size that you can specify is 25600 KB.
  • Page 125: Configuring Web Content Filtering

    4-2, all requested traffic from any Web site is allowed. You can specify a message such as “Blocked by NETGEAR” that is displayed on screen if a user attempts to access a blocked site (see the Notification Settings section that is described at the bottom of Table 4-11 on page 4-32.).
  • Page 126 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Note: You can bypass any type of Web blocking for trusted domains by adding the exact matching domain names to the trusted host list (see “Specifying Trusted Hosts” on page 4-41). Access to the domains on the trusted host list is allowed for PCs in the groups for which file extension, object, or category blocking, or a combination of these types of Web blocking has been enabled.
  • Page 127 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the Content Filtering submenu tab. The Content Filtering screen displays. Because of the large size of this screen, it is presented in this manual in three figures (Figure 4-11, Figure 4-12 on page 4-30, and Figure 4-13 on page...
  • Page 128 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-12 [Content Filtering, screen 2 of 3] 4-30 Content Filtering and Optimizing Scans v1.0, September 2009...
  • Page 129 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-13 [Content Filtering, screen 3 of 3] 3. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Table 4-11 on page 4-32. Content Filtering and Optimizing Scans 4-31 v1.0, September 2009...
  • Page 130 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-11. Content Filtering Settings Setting Description Content Filtering Log HTTP Traffic Select this checkbox to log HTTP traffic. For information about how to view the logged traffic, see “Querying Logs and Generating Reports” on page 6-21.
  • Page 131 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-11. Content Filtering Settings (continued) Setting Description Web Categorization Schedule Do You Want this Select one of the following radio buttons: Schedule to be • All Days. The schedule is in effect all days of the week. Active on All Days •...
  • Page 132: Configuring Web Url Filtering

    STM must acquire the Web categorizations remotely instead of from its local cache. Click here to To submit a misclassified or uncategorized URL to NETGEAR for analysis, click on Report a URL the Click here to Report a URL Misclassification hyperlink. A screen opens that...
  • Page 133 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-14 3. Complete the fields and select the checkboxes as explained in Table 4-12 on page 4-36. Content Filtering and Optimizing Scans 4-35 v1.0, September 2009...
  • Page 134 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-12. URL Filtering Settings Setting Description Whitelist (takes precedence over Blacklist) Enable Select this checkbox to bypass scanning of the URLs that are listed in the URL field. Users will be allowed to access the URLs that are listed in the URL field. This field contains the URLs for which scanning will be bypassed.
  • Page 135 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-12. URL Filtering Settings (continued) Setting Description This field contains the URLs that will be blocked. To add a URL to this field, use the Add URL field or the Import from File tool (see below). You can add a maximum of 200 URLs.
  • Page 136: Https Scan Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual HTTPS Scan Settings HTTPS traffic is encrypted traffic that cannot be scanned otherwise the data stream would not be secure. However, the STM can scan HTTPS traffic that is transmitted through an HTTP proxy, that is, HTTPS traffic is scanned as a proxy between the HTTPS client and the HTTPS server.
  • Page 137 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual If one of these is not satisfied, a security alert message appears in the browser window (see Figure 4-16). Figure 4-16 However, even when a certificate is trusted or still valid, or when the name of a certificate does match the name of the Web site, a security alert message still appears when a user who is connected to the STM visits an HTTPS site.
  • Page 138 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To configure the HTTPS scan settings: 1. Select Web Security > HTTP/HTTPS from the menu. The HTTP/HTTPS submenu tabs appear, with the Malware Scan screen in view. 2. Click the HTTPS Settings submenu tab. The HTTPS Settings screen displays (see Figure 4- 17 on page 4-40).
  • Page 139: Specifying Trusted Hosts

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Complete the fields and select the checkboxes as explained in Table 4-13. Table 4-13. HTTPS Settings Setting Description HTTP Tunneling Select this checkbox to allow scanning of HTTPS connections through an HTTP proxy, which is disabled by default.
  • Page 140 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • trustedhostserver1.example.com • trustedhostserver2.example.com • imageserver.example.com To completely bypass the scanning of the https://example.com site, you must add all three hosts to the trusted hosts list because different files from these three hosts are also downloaded when a user attempts to access the https://example.com site.
  • Page 141: Configuring Ftp Scans

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Complete the fields and select the checkbox as explained in Table 4-14. Table 4-14. Trusted Hosts Settings Setting Description Do Not Intercept HTTPS Connections for the following Hosts Enable Select this checkbox to bypass scanning of trusted hosts that are listed in the Hosts field.
  • Page 142 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To configure the FTP scan settings: 1. Select Web Security > FTP from the menu. The FTP screen displays. Figure 4-19 4-44 Content Filtering and Optimizing Scans v1.0, September 2009...
  • Page 143 The maximum file size that you can specify is 51200 KB. • For the STM150, the default setting is to block any file or object larger than 8192 KB. The maximum file size that you can specify is 25600 KB.
  • Page 144: Configuring Application Control

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Configuring Application Control The STM lets you control user access to Web applications such as instant messaging, media, peer- to-peer services, and online tools. Blocking an application prohibits all traffic to and from the application, which can be useful when you want to control the STM’s throughput.
  • Page 145 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 4-21 [Application Control, screen 2 of 3] Figure 4-22 [Application Control, screen 3 of 3] Content Filtering and Optimizing Scans 4-47 v1.0, September 2009...
  • Page 146 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 5. After you have configured each section, first click Apply to save the settings before you continue with the next section. You must save the configuration changes for each section individually. For reference, you can specify access control for the following applications: •...
  • Page 147: Setting Scanning Exclusions And Web Access Exceptions

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Setting Scanning Exclusions and Web Access Exceptions After you have specified which IP addresses and ports the STM will scan for malware, you can set scanning exclusion rules for certain IP addresses and ports. Similarly, after you have specified which content the STM will filter, you can set exception rules for users and members of a group.
  • Page 148: Setting Web Access Exception Rules

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. In the Scanning Exclusions section of the screen, specify an exclusion rule as explained in Table 4-16. Table 4-16. Add Scanning Exclusion Settings Setting Description Client IP The client IP address and optional subnet mask that will be excluded from all scanning.
  • Page 149 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To set Web access exception rules: 1. Select Global Settings > Exceptions from the menu. The Exceptions screen displays. This screen shows the Exceptions table, which is empty if you have not specified any exception rules.
  • Page 150 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Complete the fields and make your selections from the pull-down menus as explained in Table 4-17. Table 4-17. Add Exception Settings Setting Description Action From the pull-down menu, select the action that the STM will apply: •...
  • Page 151 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-17. Add Exception Settings (continued) Setting Description Applies to Authenticated Click the apply button to apply the exception to all authenticated (continued) users. These are users who have actively logged in to the STM and who have been authenticated.
  • Page 152 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 4-17. Add Exception Settings (continued) Setting Description Applies to RADIUS User Do the following to specify a RADIUS domain to which the exception (continued) will be applied: 1. From the Domain pull-down menu, select a RADIUS domain. 2.
  • Page 153 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To make changes to an existing exception rule: 1. In the Action column to the right of to the exception rule, click the edit table button. The Edit Exception screen displays. This screen is identical to the Add Exception screen (see Figure 4- 24 on page 4-51).
  • Page 154 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 4-56 Content Filtering and Optimizing Scans v1.0, September 2009...
  • Page 155: Managing Users, Groups, And Authentication

    Chapter 5 Managing Users, Groups, and Authentication This chapter describes how to manage users, groups, and authentication on the STM. This chapter contains the following sections: • “About Users, Groups, and Domains on this page. • “Configuring Groups” on page 5-2.
  • Page 156: Configuring Groups

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Authenticated users. User who have a computer behind the STM, who log in to the STM with a user name and password, and who are assigned an access policies that normally differs from the STM’s default e-mail and Web access policies.
  • Page 157: Creating And Deleting Groups By Name

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Groups defined by IP address and subnet. These are groups that you previously created on another device in your network. The STM does not let you add or remove users from such groups.
  • Page 158: Editing Groups By Name

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. In the Add New Group section of the screen, complete the fields as explained in Table 5-1. Table 5-1. Group Settings Setting Description Name A descriptive (alphanumeric) name of the group for identification and management purposes.
  • Page 159 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. In the Action column of the List of Groups table, click the edit table button for the group that you want to edit. The Group Edit screen displays (Figure 5-2 contains some examples).
  • Page 160: Creating And Deleting Groups By Ip Address And Subnet

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Creating and Deleting Groups by IP Address and Subnet To create a group by IP address and subnet: 1. Select User Management > IP Subnet/Groups from the menu. The IP Subnet/Groups screen displays.
  • Page 161: Configuring User Accounts

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To delete a group from the List of Groups table, click the delete table button in the Action column for the group that you want to delete. Note: When you delete a group, an exception rule that might be associated with this group no longer has any effect.
  • Page 162: Editing User Accounts

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The List of Users table displays the users with the following fields: • Enable. The checkbox allows you to enable or disable the user. • Name. The name of the user. •...
  • Page 163: Configuring Authentication

    Authentication on the STM depends on the user type and the authentication method: • Administrative users. Users with administrative and guest privileges on the STM must log in through the NETGEAR Configuration Manager Login screen (see Figure 5-6 on page 5-10) where they are authenticated through the STM’s local user database.
  • Page 164 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 5-6 • All users with special access privileges. User who have a computer behind the STM and who are assigned an access policies that differs from the STM’s default e-mail and Web access policies must log in through the User Portal Login screen.
  • Page 165: Understanding Active Directories And Ldap Configurations

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual In addition to authentication through the STM’s local user database, the STM supports the following external authentication methods for users logging in through the User Portal Login screen: • LDAP. A network-validated domain-based authentication method that functions with a Lightweight Directory Access Protocol (LDAP) authentication server.
  • Page 166: How An Active Directory Works

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual How an Active Directory Works Understanding how a typical Active Directory (AD) works might be of help when specifying the settings for the LDAP and Active Directory domains on the STM. The following applies to a typical AD: •...
  • Page 167 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Select the user Jamie Hanson. 3. Click the General tab. The general properties for Jamie Hanson display. Figure 5-8 Managing Users, Groups, and Authentication 5-13 v1.0, September 2009...
  • Page 168 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 4. To verify Jamie Hanson’s user logon name, click the Account tab. The account properties for Jamie Hanson display. Figure 5-9 5. Log on to the STM. 6. Select User Management > Authentications from the menu The LDAP screen displays. 7.
  • Page 169 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 5-10 • The full name, Jamie Hanson (Figure 5-11 shows only the Bind DN field).. Figure 5-11 • The Windows account name in e-mail format such as jhanson@testAD.com (Figure 5-12 shows only the Bind DN field).
  • Page 170: Creating And Deleting Ldap And Active Directory Domains

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 9. Click Test to verify that the LDAP server will actually function with the bind DN that you have modified. The automated test procedure checks the connection to the LDAP server; the bind DN, and the bind password.
  • Page 171 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The List of LDAP table displays the following fields: • Domain Name. The name of the STM’s domain to which the server has been assigned. • Server. The IP address of the LDAP or Active Directory server. •...
  • Page 172 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 5-5. LDAP Settings (continued) Setting Description Search Base The distinguished name (dn) at which to start the search, specified as a sequence of relative distinguished names (rdn), connected with commas and without any blank spaces.
  • Page 173: Editing Ldap And Active Directory Domains

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 4. Click Apply to save your settings. The LDAP or Active Directory domain and server are added to the List of LDAP table. To delete a domain and server from the List of LDAP table, click the delete table button in the Action column for the domain and server that you want to delete.
  • Page 174 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the RADIUS submenu tab. The RADIUS screen displays. (Figure 5-14 contains one example.) Figure 5-14 The List of RADIUS table displays the following fields: • Domain Name. The name of the STM’s domain to which the server has been assigned. •...
  • Page 175 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Complete the fields and make your selections from the pull-down menu as explained in Table 5-5. Table 5-6. RADIUS Settings Setting Description Domain A descriptive (alphanumeric) name of the RADIUS authentication server for identification and management purposes.
  • Page 176: Editing Radius Domains And Configuring Vlans

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To delete a domain and server from the List of RADIUS table, click the delete table button in the Action column for the domain and server that you want to delete. Warning: After their session has expired, users can no longer log in to the STM if the domain that has been assigned to them is the domain that you deleted.
  • Page 177 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 5-15 4. Modify the fields and make your selections from the pull-down menu as explained in Table 5-6 on page 5-21. 5. Click Test to verify that the RADIUS server will actually function with the RADIUS settings that you have modified.
  • Page 178: Global User Settings

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Creating and Deleting VLANs for Use with RADIUS Domains After you have created a RADIUS domain by specifying a RADIUS server, you can add a virtual LAN (VLAN), and then set access exceptions for the logged-in RADIUS users (see “Setting Web Access Exception Rules”...
  • Page 179 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 5-16 2. Locate the Sessions Parameters section on screen, and specify the session settings: • Session Expiration Length. The period after which a session expires and a user must log in again.
  • Page 180: Viewing And Logging Out Active Users

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 4. Locate the Users Portal Login Settings section on screen, and specify the default domain settings: • From the Default Domain pull-down menu, select a domain that will be presented as the default domain on the User Portal Login screen.
  • Page 181 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the Logout All Users button in the gray Settings bar at the top of the Active Users screen. To view all or selected users: 1. On the Active Users screen (see Figure 5-17 on page 5-26), select one of the following radio buttons:...
  • Page 182 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Last Seen. The most recent time that traffic associated with the user (that is, IP address) passed through the STM. To log out selected active users: 1. Om the search result screen select the checkboxes to the left of the users that you want to log out.
  • Page 183: Monitoring System Access And Performance

    Chapter 6 Monitoring System Access and Performance This chapter describes the system monitoring features of the STM. You can be alerted to important events such as attacks and login failures. You can also view the system status and real-time traffic and security information.
  • Page 184: Configuring The E-Mail Notification Server

    Description (or Subfield and Description) Show as Mail sender A descriptive name of the sender for e-mail identification purposes. For example, enter stm600notification@netgear.com. Send Notifications to The email address to which the notifications should be sent. Typically, this is the e-mail address of a user with administrative privileges.
  • Page 185: Configuring And Activating System, E-Mail, And Syslog Logs

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-1. E-mail Notification Settings (continued) Setting Description (or Subfield and Description) SMTP server The IP address and port number or Internet name and port number of your ISP’s outgoing e-mail SMTP server. The default port number is 25. Note: If you leave this field blank, the STM cannot send e-mail notifications.
  • Page 186 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-2 3. Select the Enable checkbox to enable the STM to send logs to an e-mail address. 4. Complete the fields, select the radio button and checkboxes, and make your selections from the pull-down menus as explained in Table 6-2.
  • Page 187 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual E-mailing Logs Table 6-2. Settings (continued) Setting Description (or Subfield and Description) Frequency Select a radio button to specify how often the log file will be sent: • When the space is full. Logs are sent when the storage space that is assigned to the logs is full.
  • Page 188 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-3 4. Select the Enable checkbox to enable the STM to send logs to a syslog server. 5. Complete the fields, select the checkboxes, and make your selections from the pull-down menus as explained in Table 6-3.
  • Page 189 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Syslog Table 6-3. Settings (continued) Setting Description (or Subfield and Description) Facility The facility indicates from which internal part of the STM the log message originates. For each log that you have selected to be sent to the syslog server (see above), select one of the following facilities from the pull-down menu: •...
  • Page 190: Configuring Alerts

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Locate the Clear the Following Log Information section at the bottom of the screen. Figure 6-4 3. Select the checkboxes to specify which logs will be cleared: • System. The system event logs will be cleared. •...
  • Page 191 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To configure and activate the e-mail alerts: 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear, with the Email and Syslog screen in view. 2.
  • Page 192: Monitoring Real-Time Traffic, Security, Statistics, And Web Usage

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-4. Alerts Settings (continued) Setting Description (or Subfield and Description) Enable Malware Select this checkbox to enable malware alerts, and configure the Subject and Alerts Message fields. Subject Enter the subject line for the e-mail alert. The default text is “[Malware alert]”.
  • Page 193: Understanding The Information On The Dashboard Screen

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Understanding the Information on the Dashboard Screen When you start up the STM, the default screen that displays is the Dashboard screen, which lets you monitor the following items: • CPU, memory, and hard disk status. •...
  • Page 194 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-6 [Dashboard, screen 1 of 3] Table 6-5 on page 6-13 explains the fields of the Status, Total Threats, Threats (Last 7 Days) sections of the Dashboard screen. 6-12 Monitoring System Access and Performance v1.0, September 2009...
  • Page 195 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-5. Dashboard: Status, Total Threats, and Threats (Last 7 Days) formation Item Description Status System The current CPU, memory, and hard disk usage. When usage is within safe limits, the status bars show green.
  • Page 196 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-7 [Dashboard, screen 2 of 3] Table 6-6 explains the fields of the Total Scanned Services Traffic, Most Recent 5 and Top 5 sections of the Dashboard screen. 6-14 Monitoring System Access and Performance v1.0, September 2009...
  • Page 197 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-6. Dashboard: Total Scanned Services Traffic and Most Recent 5 and Top 5 Information Item Description Total Scanned Services Traffic (Last 7 Days) This is a graphic that shows the relative number of traffic in bytes over the last week. Category Most Recent 5 Description Top 5 Description...
  • Page 198 Figure 6-8 [Dashboard, screen 3 of 3] Note: Figure 6-8 shows the Interface Statistics section of the STM600. The STM300 and STM150 have different interfaces (see Table 6-7 on page 6-17). Table 6-7 on page 6-17 explains the fields of the Service Statistics and Interface Statistics sections of the Dashboard screen.
  • Page 199 Interface Statistics STM600: MGMT (Management), PAIR1 UPLINK, PAIR1 DOWNLINK, PAIR2 UPLINK, PAIR2 DOWNLINK. STM300: MGMT, UPLINK, DOWNLINK. STM150: LAN1, LAN2, LAN3, LAN4, WAN. For each interface the following statistics are displayed: Status 10BaseT Half duplex, 10BaseT Full duplex, 100BaseT Half duplex, 100BaseT Full duplex, or No Link.
  • Page 200: Monitoring Web Usage

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Monitoring Web Usage The Web Usage screen shows you how the STM’s Web resources are being used. You can see, for example, which host on the STM uses most resources. To view the STM’s Web usage: 1.
  • Page 201: Viewing System Status

    To view the System Status screen click Monitoring > System Status. Figure 6-10 on page 6-20 displays the System Status screen of the STM600. The Interfaces section of the System Status screen differ for STM300 and STM150 (see Table 6-8 on page 6-21).
  • Page 202 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-10 Table 6-8 on page 6-21 explains the fields of the System Information, Management Interface Information, and Interfaces sections of the System Status screen. 6-20 Monitoring System Access and Performance v1.0, September 2009...
  • Page 203: Querying Logs And Generating Reports

    STM600: MGMT (Management), PAIR1 DOWNLINK, PAIR1 UPLINK, PAIR2 DOWNLINK, PAIR2 UPLINK. STM300: MGMT, DOWNLINK, UPLINK. STM150: LAN, WAN. (The four LAN interfaces share a single MAC address.) Querying Logs and Generating Reports The extensive logging and reporting functions of the STM let you perform the following tasks that...
  • Page 204: Querying The Logs

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Querying and downloading logs • Generating and downloading e-mail, Web, and system reports • Scheduling automatic e-mail, Web, and system reports, and e-mailing these reports to specified recipients. For information about e-mailing logs and sending logs to a syslog server, see “Configuring and Activating System, E-mail, and Syslog Logs”...
  • Page 205 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • User name • Client IP address • Server IP address • Recipient e-mail address • URL or subject To query and download logs: 1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear, with the Email and Syslog screen in view.
  • Page 206 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Depending on the selection that you make from the Log Type pull-down menu, the screen adjusts to display the settings for the selected type of log. Figure 6-11 displays the Virus log information settings as an example.
  • Page 207 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Select the checkboxes and radio buttons, make your selections from the pull-down menus, and complete the fields as explained in Table 6-9. Table 6-9. Logs Query Settings <<Reorder Search Criteria rows in table? TBD.>> Setting Description (or Subfield and Description) Log Type...
  • Page 208 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-9. Logs Query Settings <<Reorder Search Criteria rows in table? TBD.>> Setting Description (or Subfield and Description) Search Criteria User The user name that will be queried. (continued) This field is available for the following logs: Traffic, Virus, Spyware, Spam, Email filters, Content filters, and Application.
  • Page 209 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-9. Logs Query Settings <<Reorder Search Criteria rows in table? TBD.>> Setting Description (or Subfield and Description) Search Criteria URL/Subject The URL and subject that will be queried. (continued) This field is available for the following logs: Traffic, Virus, and Spyware.
  • Page 210 Note: After the STM has restarted, traffic logs are lost. Therefore, NETGEAR recommends that you connect the STM to a syslog server to save the traffic logs externally.
  • Page 211: Scheduling And Generating Reports

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Scheduling and Generating Reports The STM lets you schedule and generate four types of reports: • Email Reports. For each protocol (SMTP, POP3, and IMAP), the report shows, the following information per day, both in in tables and graphics: –...
  • Page 212 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual – The CPU usage per day in percentage, in a graphic – The memory usage per day in percentage, in a graphic • Application Reports. The report shows the following information: –...
  • Page 213 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Click the Generate Report submenu tab. The Generate Report screen displays. Figure 6-12 3. Make your selections from the pull-down menus and select the checkboxes as explained in Table 6-10. Table 6-10.
  • Page 214 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 4. Click Generate. After a few minutes, the report will be added to the Report List, which can contain a maximum of five saved reports. (To delete a a previously saved report, click its delete table button.) 5.
  • Page 215: Viewing And Managing The Quarantine Files

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Select the checkboxes and complete the fields as explained in Table 6-11. Table 6-11. Schedule Report Settings Setting Description Report Settings Frequency Select one of the following checkboxes to specify the frequency with which the reports will be generated and e-mailed.
  • Page 216 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Note: To specify the quarantine settings, see “Managing the Quarantine Settings” on page 3-31. You can query and view the spam quarantine file and the malware quarantine file separately and filter the information based on a number of criteria. You can filter the spam quarantine file using the following criteria: •...
  • Page 217 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 2. Depending on the selection that you make from the Quarantine File Type pull-down menu, the screen adjusts to display the settings for the selected type of quarantine file. Figure 6-14 displays the spam quarantine file settings as an example.
  • Page 218 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table 6-12. Quarantine File Settings (continued) Setting Description (or Subfield and Description) View All Select one of the following radio buttons: • View All. Display or download the entire selected quarantine file. Search Criteria •...
  • Page 219 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-15 The Quarantined Spam table shows the following columns: • Checkbox. Lets you select the table entry. • Date. The date that the e-mail was received. • Protocol. The protocol (SMTP, POP3, IMAP) in which the spam was found. •...
  • Page 220 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Send as Ham. The selected spam e-mail files are not tagged as spam for Distributed Spam Analysis, are deleted from the quarantine file, and are sent to the intended recipients. •...
  • Page 221 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-18 shows the Quarantined Infected Files table with data. Figure 6-18 After you have selected one or more table entries, take one of the following actions (or click the Return hyperlink to return to the previous screen): •...
  • Page 222: Using Diagnostics Utilities

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Figure 6-19 2. Select the start date and time from the Begin Date/Time pull-down menus. 3. Specify the recipient’s email address in the Send to field 4. Click Send Report. Using Diagnostics Utilities The STM provides diagnostic tools that help you analyze traffic conditions and the status of the network.
  • Page 223: Using The Network Diagnostic Tools

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual To display the Diagnostics screen, select Monitoring > Diagnostics from the menu. To facilitate the explanation of the tools, the Diagnostics screen is divided and presented in this manual in three figures (Figure 6-20 on page 6-41,...
  • Page 224: Using The Realtime Traffic Diagnostics Tool

    3. Click the traceroute button. The results of the traceroute are displayed below the Host field. Looking up a DNS Address A DNS (Domain Name Server) converts the Internet name (for example, www.netgear.com) to an IP address. If you need the IP address of a Web, FTP, mail, or other server on the Internet, request a DNS lookup to find the IP address.
  • Page 225: Gathering Important Log Information And Generating A Network Statistics Report

    8. When the download is complete, browse to the download location you specified and verify that the file has been downloaded successfully. 9. Send the file to NETGEAR Technical Support for analysis or open the file in a network traffic analyzer tool.
  • Page 226 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual This section discusses the Gather Important Log Information section, Network Statistics Report section, and Reboot the System section of the Diagnostics screen. Figure 6-22 [Diagnostics, screen 3of 3] Gathering Important Log Information To gather log information about your STM: 1.
  • Page 227: Restarting And Shutting Down The Stm

    Note: See also “Updating the Software” on page 3-18. Note: For the STM150 only, there is an alternate way to restart: press the Power button on the rear panel of the STM150 (see “Rear Panel STM150” on page 1-14). The front panel Test LED flashes and the STM150 reboots.
  • Page 228 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 6-46 Monitoring System Access and Performance v1.0, September 2009...
  • Page 229 • The date or time is not correct. Go to “Problems with Date and Time” on page 7-7 • I need help from NETGEAR. Go to “Using Online Support” on page 7-7. Note: The STM’s diagnostic tools are explained in “Using Diagnostics Utilities”...
  • Page 230: Basic Functioning

    Test LED (STM150) or Status LED (STM300 and STM600) Never Turns Off When the STM is powered on, the Test LED (STM150) or Status LED (STM300 and STM600) turns on for approximately 2 minutes and then turns off when the STM has completed its initialization.
  • Page 231: Lan Or Wan Port Leds Not On

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual If the error persists, you might have a hardware problem and should contact NETGEAR Technical Support. LAN or WAN Port LEDs Not On If either the LAN LEDs or WAN LEDs do not light when the Ethernet connection is made, check the following: •...
  • Page 232: When You Enter A Url Or Ip Address A Time-Out Error Occurs

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual • Make sure that you are using the correct login information. The factory default login name is admin and the password is password. Make sure that Caps Lock is off when entering this information.
  • Page 233: Testing The Path From Your Pc To A Remote Device

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 1. From the Windows toolbar, click Start and choose Run. 2. In the field provided, type “ping” followed by the IP address of the STM; for example: ping 192.168.1.201 3. Click OK. A message, similar to the following, should display: Pinging <IP address>...
  • Page 234: Restoring The Default Configuration And Password

    The STM restarts. During the reboot process, the Backup & Restore Settings screen remains visible. The reboot process is complete after several minutes when the Test LED (STM150) or Status LED (STM300 and STM600) on the front panel goes off.
  • Page 235: Problems With Date And Time

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Note: For the STM150 only, there is an alternate way to return the settings to factory default: using a sharp object, press and hold the Reset button on the rear panel of the STM150 (see “Rear Panel STM150”...
  • Page 236: Installing Hot Fixes

    1. Select Support > Online Support from the menu The Online Support screen displays. Figure 7-2 2. In the Support Key field, enter the support key that was given to you by NETGEAR 3. Click Connect. When the tunnel is established, the tunnel status field will display ON.
  • Page 237 Hot Fix Name. The name of the hot fix. To install a hot fix: 1. Obtain the hot fix from NETGEAR or its authorized reseller. 2. Save the hot fix file on the computer that you will use to access the STM.
  • Page 238: Sending Suspicious Files To Netgear For Analysis

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual The Test LED (STM150) or Status LED (STM300 and STM600) blinks during the hot fix installation. Sending Suspicious Files to NETGEAR for Analysis You can report any undetected malware file or malicious e-mail to NETGEAR for online for analysis.
  • Page 239: Accessing The Knowledge Base And Documentation

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 3. Click Submit. Accessing the Knowledge Base and Documentation To access NETGEAR’s Knowledge Base for the STM, select Support > Knowledge Base from the menu. To access NETGEAR’s documentation library for your STM model, select Support >...
  • Page 240 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual 7-12 Troubleshooting and Using Online Support v1.0, September 2009...
  • Page 241: Default Settings And Technical Specifications

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Appendix A Default Settings and Technical Specifications To return the STM returns to the default factory configuration settings that are shown in Table A-1, click the default button on the Backup and Restore Settings screen (see “Reverting to Factory Default Settings”...
  • Page 242 Physical Specifications Dimensions (H x L x W ) STM150: 43.5 x 258 x 440 mm (1.7 x 10.2 x 17.3 in.) STM300: 44.4 x 500 x 426 mm (1.75 x 19.7 x 16.8 in.) STM600: 44.4 x 500 x 426 mm (1.75 x 19.7 x 16.8 in.) Weight STM150: 3.68 kg (8.1 lb.)
  • Page 243 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Table A-2. STM Specifications (continued) Feature Specification Electromagnetic Emissions Meets requirements of FCC Part 15 Class A VCCI Class A CE mark, commercial Safety Meets requirements of UL listed C-Tick Default Settings and Technical Specifications v1.0, September 2009...
  • Page 244 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Default Settings and Technical Specifications v1.0, September 2009...
  • Page 245: Appendix B Related Documents

    ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Appendix B Related Documents This appendix provides links to reference documents you can use to gain a more complete understanding of the technologies used in your NETGEAR product. Document Link TCP/IP Networking Basics http://documentation.netgear.com/reference/enu/tcpip/index.htm...
  • Page 246 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual Related Documents v1.0, September 2009...
  • Page 247: Index

    Index deployment scenarios choosing access gateway remote management 3-11 segmented LAN attached devices, monitoring with SNMP 3-13 DHCP Auto Uplink DNS server address 2-12, 3-4 server IP address 2-12, 3-4 backup and restore settings 3-17 Block Sites reducing traffic 3-33 EICAR 2-28 e-mail logs...
  • Page 248 ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual LEDs sniffer explanation of 1-8, 1-10, 1-11, 1-12, 1-13 SNMP troubleshooting 7-2, 7-3 about 3-13 configuring 3-14 3-15 TCP/IP network, troubleshooting testing Network Time Protocol. See NTP. connectivity 2-27 3-23 HTTP scanning 2-27 troubleshooting Time...

This manual is also suitable for:

Stm300Stm600

Table of Contents