Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 136

Group, User&Group, Lookup, Apply, Setting, Description

Page 136 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 40. Add Exception Settings (Continued) Setting Description Domain LDAP User/Group User/Group Search (continued) Do the following: 1. From the Domain drop-down list, select an LDAP domain. 2. From the Type drop-down list, select User, Group, or User&Group. 3. In the Name field, enter the name of the user, group, or user and group, or leave this field blank. 4. Click the Lookup button. If the user or group is found, it is listed to the left of the Apply button. If you left the Name field blank, all users, groups, or users and groups are listed; in this case, make a selection. 5. Click the Apply button to apply the exception to the selected user or group. You can specify LDAP domains, groups, and users on the LDAP screen (see Creating and Deleting LDAP and Active Directory Domains on page 161). RADIUS User Do the following: 1. From the Domain drop-down list, select a RADIUS domain. 2. From the VLAN ID/Name drop-down list, select a VLAN ID or VLAN name. 3. Click the Apply button to apply the exception to the selected VLAN. You can specify RADIUS domains and VLANs on the RADIUS screen (see Creating and Deleting RADIUS Domains on page 167). Custom Groups Do the following: 1. From the Name drop-down list, select a custom group. 2. Click the Apply button to apply the exception to the selected group. You can specify custom groups on the Custom Groups screen (see Creating Custom Groups for Web Access Exceptions on page 139). Start Time The time in 24-hour format (hours and minutes) when the action starts. If you leave these fields empty, the action applies continuously. End TIme The time in 24-hour format (hours and minutes) when the action ends. If you leave these fields empty, the action applies continuously. 136 | Chapter 4. Content Filtering and Optimizing Scans

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

136
|
Chapter 4.
Content Filtering and Optimizing Scans
ProSecure Web/Email Security Threat Management (STM) Appliance
Domain
User/Group
(continued)
LDAP
User/Group Search
Do the following:
1.
From the Domain drop-down list, select an LDAP domain.
2.
From the Type drop-down list, select
User
,
Group
, or
User&Group
.
3.
In the Name field, enter the name of the user, group, or user and
group, or leave this field blank.
4.
Click the
Lookup
button. If the user or group is found, it is listed
to the left of the Apply button. If you left the Name field blank, all
users, groups, or users and groups are listed; in this case, make
a selection.
5.
Click the
Apply
button to apply the exception to the selected user
or group.
You can specify LDAP domains, groups, and users on the LDAP
screen (see
Creating and Deleting LDAP and Active Directory
Domains
on page 161).
RADIUS User
Do the following:
1.
From the Domain drop-down list, select a RADIUS domain.
2.
From the VLAN ID/Name drop-down list, select a VLAN ID or
VLAN name.
3.
Click the
Apply
button to apply the exception to the selected
VLAN.
You can specify RADIUS domains and VLANs on the RADIUS
screen (see
Creating and Deleting RADIUS Domains
on page 167).
Custom Groups
Do the following:
1.
From the Name drop-down list, select a custom group.
2.
Click the
Apply
button to apply the exception to the selected
group.
You can specify custom groups on the Custom Groups screen (see
Creating Custom Groups for Web Access Exceptions
on page 139).
Start Time
The time in 24-hour format (hours and minutes) when the action starts. If you leave these
fields empty, the action applies continuously.
End TIme
The time in 24-hour format (hours and minutes) when the action ends. If you leave these
fields empty, the action applies continuously.
Table 40.
Add Exception Settings (Continued)
Setting
Description