Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 155

Understanding the STM’s Authentication Options, Administrative Users and Users with Guest Privileges

Page 155 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance • Downloading ProSecure DC Agent Software, and Creating and Deleting DC Agents on page 165 • Creating and Deleting RADIUS Domains on page 167 • Editing RADIUS Domains and Configuring VLANs on page 169 Understanding the STM's Authentication Options The login screen and authentication on the STM depend on the user type. There are two basic user types on the STM that are explained in the following sections: • Administrative users and users with guest privileges • Users with special access privileges Administrative Users and Users with Guest Privileges Users with administrative and guest privileges on the STM need to log in through the NETGEAR Configuration Manager Login screen (see the following figure), where they are authenticated through the STM's local user database. These users need to provide their user name and password. For information about the predefined administrator and guest user accounts, see About Users with Administrative and Guest Privileges on page 61. For information about how to change the administrator default name and password or guest default name and password, see Changing Administrative Passwords and Timeouts on page 62. Figure 87. Users with Special Access Privileges Users who have a computer behind the STM and who are assigned access policies that differ from the STM's default email and Web access policies (see Setting Access Exception Rules for Web Access on page 132) need to log in through the User Portal Login screen (see the following figure). These users need to provide their user name and password, and select the domain to which they have been assigned. Chapter 5. Managing Users, Groups, and Authentication | 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 5.
Managing Users, Groups, and Authentication
|
155
ProSecure Web/Email Security Threat Management (STM) Appliance
Downloading ProSecure DC Agent Software, and Creating and Deleting DC Agents
on
page 165
Creating and Deleting RADIUS Domains
on page 167
Editing RADIUS Domains and Configuring VLANs
on page 169
Understanding the STM’s Authentication Options
The login screen and authentication on the STM depend on the user type. There are two
basic user types on the STM that are explained in the following sections:
Administrative users and users with guest privileges
Users with special access privileges
Administrative Users and Users with Guest Privileges
Users with administrative and guest privileges on the STM need to log in through the
NETGEAR Configuration Manager Login screen (see the following figure), where they are
authenticated through the STM’s local user database. These users need to provide their user
name and password.
For information about the predefined administrator and guest user accounts, see
About
Users with Administrative and Guest Privileges
on page 61. For information about how to
change the administrator default name and password or guest default name and password,
see
Changing Administrative Passwords and Timeouts
on page 62.
Figure 87.
Users with Special Access Privileges
Users who have a computer behind the STM and who are assigned access policies that differ
from the STM’s default email and Web access policies (see
Setting Access Exception Rules
for Web Access
on page 132) need to log in through the User Portal Login screen (see the
following figure). These users need to provide their user name and password, and select the
domain to which they have been assigned.