Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 131

Global Settings > Scanning Exclusions, Delete, To con scanning exclusion rules

Page 131 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance To configure scanning exclusion rules: 1. Select Global Settings > Scanning Exclusions from the menu. The Scanning Exclusions screen displays. This screen shows the Scanning Exclusions table, which is empty if you have not specified any exclusions. (The following figure shows one exclusion rule in the table as an example.) Figure 73. 2. In the Scanning Exclusions section of the screen, specify an exclusion rule as explained in the following table: Table 39. Add Scanning Exclusion Settings Setting Description Client IP The client IP address and optional subnet mask that are excluded from all scanning. Destination IP The destination IP address and optional subnet mask that are excluded from all scanning. Port The number of the port that is excluded from all scanning. Brief Description A description of the exclusion rule for identification and management purposes. 3. In the Add column, click the Add table button to add the exclusion rule to the Scanning Exclusions table. The new exclusion rule is enabled by default. To disable a rule, select the check box in the Enable column for the rule. To delete an exclusion rule from the Scanning Exclusions table, click the Delete table button in the Action column to the right of the rule that you want to delete. Chapter 4. Content Filtering and Optimizing Scans | 131

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 4.
Content Filtering and Optimizing Scans
|
131
ProSecure Web/Email Security Threat Management (STM) Appliance
To configure scanning exclusion rules:
1.
Select
Global Settings > Scanning Exclusions
from the menu. The Scanning
Exclusions screen displays. This screen shows the Scanning Exclusions table, which is
empty if you have not specified any exclusions. (The following figure shows one
exclusion rule in the table as an example.)
Figure 73.
2.
In the Scanning Exclusions section of the screen, specify an exclusion rule as explained in
the following table:
3.
In the Add column, click the
Add
table button to add the exclusion rule to the Scanning
Exclusions table. The new exclusion rule is enabled by default.
To disable a rule, select the check box in the Enable column for the rule.
To delete an exclusion rule from the Scanning Exclusions table, click the
Delete
table button
in the Action column to the right of the rule that you want to delete.
Table 39.
Add Scanning Exclusion Settings
Setting
Description
Client IP
The client IP address and optional subnet mask that are excluded from all scanning.
Destination IP
The destination IP address and optional subnet mask that are excluded from all
scanning.
Port
The number of the port that is excluded from all scanning.
Brief Description
A description of the exclusion rule for identification and management purposes.