Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 190

Monitoring Web Usage, Table 56.

Page 190 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 56. Dashboard: Service Statistics and Interface Statistics Information (Continued) Item Total Malwares Found Description The total number of detected malware threats. Virus Spyware The total number of detected viruses. The total number of detected spyware threats. Total Emails/Files Blocked The total number of blocked emails and files. Total Malware Quarantined The total number of detected malware threats that were placed in quarantine. Total Spam Quarantined The total number of spam messages that were placed in quarantine. Total URLs Blocked Note: These statistics apply only to SMTP. The total number of URL requests that were blocked. Total Spam Emails Note: These statistics apply only to HTTP and HTTPS. The total number of spam emails that were detected. Note: These statistics apply only to SMTP and POP3. Blacklist & RBL The total number of emails that were detected through the spam blacklist and the real-time blacklist (see Setting Up the Whitelist and Blacklist on page 98 and Configuring the Real-Time Blacklist on page 100). Distributed Spam The total number of spam messages that were detected Analysis through distributed spam analysis (see Configuring Distributed Spam Analysis on page 102). Interface Statistics STM600: MGMT (Management), PAIR1 UPLINK, PAIR1 DOWNLINK, PAIR2 UPLINK, PAIR2 DOWNLINK. STM300: MGMT, UPLINK, DOWNLINK. STM150: LAN1, LAN2, LAN3, LAN4, WAN. For each interface the following statistics are displayed: Status 10BaseT Half duplex, 10BaseT Full duplex, 100BaseT Half duplex, 100BaseT Full duplex, or No Link. TX The number of transmitted packets in KB, MB, or GB (as stated on the screen). RX The number of received packets in KB, MB, or GB (as stated on the screen). Monitoring Web Usage The Web Usage screen shows you how the STM's Web resources are being used. You can see, for example, which host on the STM uses most resources. 190 | Chapter 6. Monitoring System Access and Performance

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

190
|
Chapter 6.
Monitoring System Access and Performance
ProSecure Web/Email Security Threat Management (STM) Appliance
Monitoring Web Usage
The Web Usage screen shows you how the STM’s Web resources are being used. You can
see, for example, which host on the STM uses most resources.
Total Malwares Found
The total number of detected malware threats.
Virus
The total number of detected viruses.
Spyware
The total number of detected spyware threats.
Total Emails/Files Blocked
The total number of blocked emails and files.
Total Malware Quarantined
The total number of detected malware threats that were placed in quarantine.
Total Spam Quarantined
The total number of spam messages that were placed in quarantine.
Note:
These statistics apply only to SMTP.
Total URLs Blocked
The total number of URL requests that were blocked.
Note:
These statistics apply only to HTTP and HTTPS.
Total Spam Emails
The total number of spam emails that were detected.
Note:
These statistics apply only to SMTP and POP3.
Blacklist & RBL
The total number of emails that were detected through the
spam blacklist and the real-time blacklist (see
Setting Up the
Whitelist and Blacklist
on page 98 and
Configuring the
Real-Time Blacklist
on page 100).
Distributed Spam
Analysis
The total number of spam messages that were detected
through distributed spam analysis (see
Configuring Distributed
Spam Analysis
on page 102).
Interface Statistics
STM600: MGMT (Management), PAIR1 UPLINK, PAIR1 DOWNLINK, PAIR2 UPLINK, PAIR2 DOWNLINK.
STM300: MGMT, UPLINK, DOWNLINK.
STM150: LAN1, LAN2, LAN3, LAN4, WAN.
For each interface the following statistics are displayed:
Status
10BaseT Half duplex, 10BaseT Full duplex, 100BaseT Half duplex,
100BaseT Full duplex, or No Link.
TX
The number of transmitted packets in KB, MB, or GB (as stated on the screen).
RX
The number of received packets in KB, MB, or GB (as stated on the screen).
Table 56.
Dashboard: Service Statistics and Interface Statistics Information (Continued)
Item
Description