Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 123

Managing Digital Certificates, Setting, Description

Page 123 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance 3. Select the check boxes and complete the field and as explained in the following table: Table 36. HTTPS Settings Setting HTTP Tunneling Description Select this check box to allow scanning of HTTPS connections through an HTTP proxy, which is disabled by default. Traffic from trusted hosts is not scanned (see Specifying Trusted Hosts on page 124). Note: For HTTPS scanning to occur correctly, you need to add the HTTP proxy server port in the Ports to Scan field for the HTTPS service on the Services screen (see Configuring the HTTP Proxy Settings on page 60). HTTPS SSL Settings Select the Allow the STM to handle HTTPS connections using SSLv2 check box to allow HTTPS connections using SSLv2, SSLv3, or TLSv1. If this check box is cleared, the STM allows HTTPS connections using SSLv3 or TLSv1, but SSLv2 connections are dropped by the STM. HTTPS 3rd Party Website Certificate Handling Select this check box to allow a Secure Sockets Layer (SSL) connection with a valid certificate that is not signed by a trusted Certificate Authority (CA). The default setting is to allow such as a connection. Show This Message When an SSL Connection Attempt Fails By default, a rejected SSL connection is replaced with the following text, which you can customize: The SSL connection cannot be established. URL: %URL% REASON: %REASON% Note: The text is displayed on the HTTPS Settings screen with HTML tags. Click Preview to open a screen that displays the notification text in HTML format. Note: Make sure that you keep the %URL% and %REASON% metawords in the text to enable the STM to insert the correct URL information and the reason of the rejection. 4. Click Apply to save your settings. Note: For information about certificates that are used for SSL connections and HTTPS traffic, see Managing Digital Certificates on page 76. Chapter 4. Content Filtering and Optimizing Scans | 123

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 4.
Content Filtering and Optimizing Scans
|
123
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Select the check boxes and complete the field and as explained in the following table:
4.
Click
Apply
to save your settings.
Note:
For information about certificates that are used for SSL connections
and HTTPS traffic, see
Managing Digital Certificates
on page 76.
Table 36.
HTTPS Settings
Setting
Description
HTTP Tunneling
Select this check box to allow scanning of HTTPS connections through an HTTP proxy, which is disabled
by default. Traffic from trusted hosts is not scanned (see
Specifying Trusted Hosts
on page 124).
Note:
For HTTPS scanning to occur correctly, you need to add the HTTP proxy server port in the Ports to
Scan field for the HTTPS service on the Services screen (see
Configuring the HTTP Proxy Settings
on
page 60).
HTTPS SSL Settings
Select the
Allow the STM to handle HTTPS connections using SSLv2
check box to allow HTTPS
connections using SSLv2, SSLv3, or TLSv1. If this check box is cleared, the STM allows HTTPS
connections using SSLv3 or TLSv1, but SSLv2 connections are dropped by the STM.
HTTPS 3rd Party Website Certificate Handling
Select this check box to allow a Secure Sockets Layer (SSL) connection with a valid certificate that is not
signed by a trusted Certificate Authority (CA). The default setting is to allow such as a connection.
Show This Message When an SSL Connection Attempt Fails
By default, a rejected SSL connection is replaced with the following text, which you can customize:
The SSL connection cannot be established.
URL: %URL%
REASON: %REASON%
Note:
The text is displayed on the HTTPS Settings screen with HTML tags. Click
Preview
to open a screen
that displays the notification text in HTML format.
Note:
Make sure that you keep the %URL% and %REASON% metawords in the text to enable the STM to
insert the correct URL information and the reason of the rejection.