Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 215

Using Diagnostics Utilities, Send Report, Network diagnostic tools, Monitoring > Diagnostics

Page 215 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Note: The report includes only quarantined spam emails that contain the email address that is specified in the Send to field. 4. Click Send Report. The report provides summary information such as time, sender, recipient, subject, and size, and a retrieve link. The user can retrieve an individual email by clicking the internal or external retrieve link for the email. The presence of an external retrieve links (see the red box in the following figure) depends on the setting of the Set Public Host/IP Address and Port check box on the Distributed Spam Analysis screen (see Configuring Distributed Spam Analysis on page 102). Figure 122. Using Diagnostics Utilities The STM provides diagnostic tools that help you analyze traffic conditions and the status of the network. Two sets of tools are available: • Network diagnostic tools. These tools include a ping utility, traceroute utility, and DNS lookup utility. • Traffic diagnostic tools. These tools allow you to perform real-time, per-protocol traffic analysis between specific source and destination addresses and let you generate reports on network usage in your network. Note: For normal operation, diagnostic tools are not required. To display the Diagnostics screen, select Monitoring > Diagnostics from the menu. To facilitate the explanation of the tools, the Diagnostics screen is divided and presented in this manual in three figures (the following figure, Figure 125 on page 217, and Figure 126 on page 218). Chapter 6. Monitoring System Access and Performance | 215

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 6.
Monitoring System Access and Performance
|
215
ProSecure Web/Email Security Threat Management (STM) Appliance
Note:
The report includes only quarantined spam emails that contain the
email address that is specified in the Send to field.
4.
Click
Send Report
.
The report provides summary information such as time, sender, recipient, subject, and size,
and a retrieve link. The user can retrieve an individual email by clicking the internal or
external retrieve link for the email. The presence of an external retrieve links (see the red box
in the following figure) depends on the setting of the Set Public Host/IP Address and Port
check box on the Distributed Spam Analysis screen (see
Configuring Distributed Spam
Analysis
on page 102).
Figure 122.
Using Diagnostics Utilities
The STM provides diagnostic tools that help you analyze traffic conditions and the status of
the network. Two sets of tools are available:
Network diagnostic tools
. These tools include a ping utility, traceroute utility, and DNS
lookup utility.
Traffic diagnostic tools
. These tools allow you to perform real-time, per-protocol traffic
analysis between specific source and destination addresses and let you generate reports
on network usage in your network.
Note:
For normal operation, diagnostic tools are not required.
To display the Diagnostics screen, select
Monitoring > Diagnostics
from the menu. To
facilitate the explanation of the tools, the Diagnostics screen is divided and presented in this
manual in three figures (the following figure,
Figure 125
on page 217, and
Figure 126
on
page 218).