Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 27

Segmented LAN Deployment, Understanding the Steps for Initial Connection

Page 27 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Segmented LAN Deployment In a segmented LAN deployment, one STM appliance is installed in front of each network segment. VLAN traffic can pass through the STM and can be scanned by the STM. This type of deployment splits the network load and protects network segments from malware threats coming in through the gateway or originating from other segments. The following figure shows a typical segmented LAN deployment scenario: Figure 13. Understanding the Steps for Initial Connection Generally, five steps are required to complete the basic and security configuration of your STM: 1. Connect the STM physically to your network. Connect the cables and restart your network according to the instructions in the installation guide. See the ProSecure™ Web/Email Security Threat Management Appliance STM150, STM300, or STM600 Installation Guide for complete steps. A PDF of the Installation Guide is on the NETGEAR ProSecure™ website at http://prosecure.netgear.com/resources/document-library.php. 2. Log in to the STM. After logging in, you are ready to set up and configure your STM. See Logging In to the STM on page 28. 3. Use the Setup Wizard to configure basic connections and security. During this phase, you connect the STM to your network. See Using the Setup Wizard to Perform the Initial Configuration on page 32. Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 27

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 2.
Using the Setup Wizard to Provision the STM in Your Network
|
27
ProSecure Web/Email Security Threat Management (STM) Appliance
Segmented LAN Deployment
In a segmented LAN deployment, one STM appliance is installed in front of each network
segment. VLAN traffic can pass through the STM and can be scanned by the STM. This type
of deployment splits the network load and protects network segments from malware threats
coming in through the gateway or originating from other segments. The following figure
shows a typical segmented LAN deployment scenario:
Figure 13.
Understanding the Steps for Initial Connection
Generally, five steps are required to complete the basic and security configuration of your
STM:
1.
Connect the STM physically to your network
. Connect the cables and restart your
network according to the instructions in the installation guide. See the
ProSecureā„¢
Web/Email Security Threat Management Appliance STM150, STM300, or STM600
Installation Guide
for complete steps. A PDF of the
Installation Guide
is on the
NETGEAR ProSecureā„¢ website at
.
2.
Log in to the STM
. After logging in, you are ready to set up and configure your STM. See
Logging In to the STM
on page 28.
3.
Use the Setup Wizard to configure basic connections and security
. During this phase,
you connect the STM to your network. See
Using the Setup Wizard to Perform the Initial
Configuration
on page 32.