Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 51

What to Do Next

Page 51 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance 3. In the Registration Key field, enter the license key. 4. Fill out the customer and VAR fields. 5. Click Register. 6. Repeat step 3 and step 5 for additional license keys. The STM activates the licenses and registers the unit with the NETGEAR registration server. Note: If you reset the STM to the original factory default settings after you have entered the license keys to activate the STM (see Registering the STM with NETGEAR on page 50), the license keys are erased. The license keys and the different types of licenses that are available for the STM are no longer displayed on the Registration screen. However, after you have reconfigured the STM to connect to the Internet and to the NETGEAR registration server, the STM retrieves and restores all registration information based on its MAC address and hardware serial number. You do not need to reenter the license keys or reactivate the STM. What to Do Next You have completed setting up and deploying the STM to the network. The STM is now set up to scan the protocols and services that you specified for malware threats and to perform updates based on the configured update source and frequency. If you need to change the settings, or to view reports or logs, log in to the STM Web Management Interface, using the default IP address or the IP address that you assigned to the STM in Setup Wizard Step 1 of 10: Introduction on page 33. The STM is ready for use. However, the following sections describe some important tasks that you might want to address before you deploy the STM in your network: • Changing Administrative Passwords and Timeouts on page 62 • Managing Digital Certificates on page 76 • Configuring Groups on page 148 • Configuring User Accounts on page 152 • Configuring Authentication on page 154 • Setting Scanning Exclusions and Web Access Exceptions on page 130 Chapter 2. Using the Setup Wizard to Provision the STM in Your Network | 51

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 2.
Using the Setup Wizard to Provision the STM in Your Network
|
51
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
In the Registration Key field, enter the license key.
4.
Fill out the customer and VAR fields.
5.
Click
Register
.
6.
Repeat
step 3
and
step 5
for additional license keys.
The STM activates the licenses and registers the unit with the NETGEAR registration server.
Note:
If you reset the STM to the original factory default settings after you
have entered the license keys to activate the STM (see
Registering
the STM with NETGEAR
on page 50), the license keys are erased.
The license keys and the different types of licenses that are
available for the STM are no longer displayed on the Registration
screen. However, after you have reconfigured the STM to connect to
the Internet and to the NETGEAR registration server, the STM
retrieves and restores all registration information based on its MAC
address and hardware serial number. You do not need to reenter the
license keys or reactivate the STM.
What to Do Next
You have completed setting up and deploying the STM to the network. The STM is now set
up to scan the protocols and services that you specified for malware threats and to perform
updates based on the configured update source and frequency.
If you need to change the settings, or to view reports or logs, log in to the STM Web
Management Interface, using the default IP address or the IP address that you assigned to
the STM in
Setup Wizard Step 1 of 10: Introduction
on page 33.
The STM is ready for use. However, the following sections describe some important tasks
that you might want to address before you deploy the STM in your network:
Changing Administrative Passwords and Timeouts
on page 62
Managing Digital Certificates
on page 76
Configuring Groups
on page 148
Configuring User Accounts
on page 152
Configuring Authentication
on page 154
Setting Scanning Exclusions and Web Access Exceptions
on page 130