NETGEAR STM150EW3-100NAS Switch User Manual


 
ProSecure Web/Email Security Threat Management Appliance STM150 Reference Manual
ix
v1.1, March 2009
Configuring Web Malware Scans ...........................................................................4-13
Configuring Web Content Filtering .........................................................................4-14
Configuring Web URL Filtering ..............................................................................4-17
HTTPS Scan Settings ............................................................................................4-19
The STM150 CA Certificate ...................................................................................4-20
Certificate Management .........................................................................................4-22
Trusted Hosts .........................................................................................................4-24
Configuring FTP Scan ..................................................................................................4-25
Chapter 5
Monitoring System Performance
Viewing the System Status .............................................................................................5-2
Using Statistics and Web Usage Data ............................................................................5-3
Monitoring Security .........................................................................................................5-5
Running Diagnostics .......................................................................................................5-6
Using the Network Diagnostic Tools .........................................................................5-6
Using the Realtime Traffic Diagnostic Tools .............................................................5-7
Gathering Important Log Information .......................................................................5-7
To collect information about your STM150 ...............................................................5-7
Generate Network Statistics Report .........................................................................5-8
Using Reports to Optimize Protection and Performance ................................................5-8
Working with Logs ....................................................................................................5-8
Working with Reports .............................................................................................5-11
Using Online Support ...................................................................................................5-12
Enabling Remote Troubleshooting .........................................................................5-12
Working with Hot Fixes ..........................................................................................5-13
Sending Suspicious Files to NETGEAR for Analysis .............................................5-14
Appendix A
Default Settings and Technical Specifications
Appendix B
Related Documents
Index