User's Manual
Table Of Contents
- ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
- Contents
- About This Manual
- Chapter 1 Introduction
- Chapter 2 Using the Setup Wizard to Provision the STM in Your Network
- Choosing a Deployment Scenario
- Understanding the Steps for Initial Connection
- Logging In to the STM
- Using the Setup Wizard to Perform the Initial Configuration
- Setup Wizard Step 1 of 10: Introduction
- Setup Wizard Step 2 of 11: Networking Settings
- Setup Wizard Step 3 of 11: Time Zone
- Setup Wizard Step 4 of 11: Email Security
- Setup Wizard Step 5 of 11: Web Security
- Setup Wizard Step 6 of 11: Email Notification Server Settings
- Setup Wizard Step 7 of 11: Update Settings
- Setup Wizard Step 8 of 11: HTTP Proxy Settings
- Setup Wizard Step 9 of 11: Web Categories
- Setup Wizard Step 10 of 11: Configuration Summary
- Setup Wizard Step 11 of 11: Restarting the System
- Verifying Proper Installation
- Registering the STM with NETGEAR
- What to Do Next
- Chapter 3 Performing Network and System Management
- Configuring Network Settings
- Configuring Session Limits and Timeouts
- Configuring the HTTP Proxy Settings
- About Users with Administrative and Guest Privileges
- Configuring Remote Management Access
- Using an SNMP Manager
- Managing the Configuration File
- Updating the Software
- Configuring Date and Time Service
- Managing Digital Certificates
- Managing the Quarantine Settings
- Performance Management
- Chapter 4 Content Filtering and Optimizing Scans
- About Content Filtering and Scans
- Configuring E-mail Protection
- Configuring Web and Services Protection
- Configuring Application Control
- Setting Scanning Exclusions and Web Access Exceptions
- Chapter 5 Managing Users, Groups, and Authentication
- About Users, Groups, and Domains
- Configuring Groups
- Configuring User Accounts
- Configuring Authentication
- Global User Settings
- Viewing and Logging Out Active Users
- Chapter 6 Monitoring System Access and Performance
- Chapter 7 Troubleshooting and Using Online Support
- Appendix A Default Settings and Technical Specifications
- Appendix B Related Documents
- Index

FVX338 ProSafe VPN Firewall 200 Reference Manual
Index-5
v2.0, February 2007
hot fixes 7-9
HTML, scanning 4-25
HTTP
action, infected Web file or object 2-18, 4-25
concurrently scanned connections 1-5
default port 2-17, 4-23
enabling scanning 2-17, 4-23
logging, traffic 4-30
proxy settings
configuring manually 3-8
using the Setup Wizard 2-23
proxy, for HTTPS scanning 4-36, 4-39
testing scanning 2-27
trusted hosts 4-39
HTTPS
action, infected Web file or object 2-18, 4-25
default port 2-18, 4-23
enabling scanning 2-18, 4-23
managing certificates 3-26
scanning process 4-36
trusted hosts 4-39
Hypertext Markup Language. See HTML.
Hypertext Transfer Protocol over Secure Socket Layer.
See HTTPS.
Hypertext Transfer Protocol. See HTTP.
I
ICMP time-out 3-7
ICQ 4-2, 4-46
IDS 1-1
IETF 3-13
IMAP
action, infected e-mails 2-16, 4-7
default port 2-15, 4-5
enabling scanning 2-15, 4-5
file extension blocking 4-14
file name blocking 4-14
password-protected attachment blocking 4-13
importing
certificates 3-27
trusted certificates 3-29
trusted hosts 4-41
informational messages, system logs 6-5
initial configuration, Setup Wizard 2-10
installation, steps 2-4
instant messaging services
configuring 4-46
defaults 4-2
statistics 6-13
interfaces
speed and duplex settings 3-4
statistics 6-17
status 6-21
Internet Engineering Task Force. See IETF.
Internet Message Access Protocol. See IMAP.
Intrusion Detection Systems. See IDS.
Intrusion Prevention Systems. See IPS.
IP addresses
DNS servers 2-12, 3-4
STM 2-11, 3-3
subnet mask, STM 2-12, 3-4
IPS 1-1
iTunes 4-2, 4-46
J
Java objects 4-3
Javascript 4-3, 4-30
K
KDE (MIB browser) 3-15
Kensington lock (STM150 only) 1-14
key (bundle), for registering 2-28
keywords, blocking in e-mails 4-11, 4-13
kit, rack-mounting 1-18
Knowledge Base 7-11
L
LAN
default settings A-2
LEDs 7-3
STM150 1-9
STM300 1-11
STM600 1-13