Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 67

Supported MIB Browsers, Managing the Configuration File

Page 67 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance Table 20. SNMP Settings (Continued) Setting Description (or Subfield and Description) Do You Want to Enable SNMP? (continued) Contact Location The SNMP system contact information that is available to the SNMP manager. This setting is optional. The physical location of the STM. This setting is optional. Trusted SNMP Hosts Enter the IP addresses of the computers and devices to which you want to grant read-only (GET) or write (SET) privileges on the STM. Separate IP addresses by a comma. To allow any trusted SNMP host access, leave the field blank, which is the default setting. SNMP Traps Enter the IP addresses of the SNMP management stations that are allowed to receive the STM's SNMP traps. Separate IP addresses by a comma. If you leave the field blank, which is the default setting, no SNMP management station can receive the STM's SNMP traps. 3. Click Apply to save your settings. Supported MIB Browsers After you have configured the SNMP settings, you need to enter the IP address of the STM in the Management Information Base (MIB) browsers through which you want to query or configure the STM. See the documentation of your MIB browser for instructions. NETGEAR recommends the following MIB browsers for receiving the STM SNMP notifications: • MG-Soft • SNMP • Net-SNMP (Linux Text) • SNMP Browser for KDE The STM MIB structure is automatically downloaded by management stations. You should start receiving notifications after you have enabled SNMP on the STM and added its IP address into your MIB browsers. Managing the Configuration File The configuration settings of the STM are stored in a configuration file on the STM. This file can be saved (backed up) to a PC, retrieved (restored) from the PC, or cleared to factory default settings. Once the STM is installed and works correctly, make a backup of the configuration file to a computer. If necessary, you can later restore the STM settings from this file. Chapter 3. Performing Network and System Management | 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 3.
Performing Network and System Management
|
67
ProSecure Web/Email Security Threat Management (STM) Appliance
3.
Click
Apply
to save your settings.
Supported MIB Browsers
After you have configured the SNMP settings, you need to enter the IP address of the STM in
the Management Information Base (MIB) browsers through which you want to query or
configure the STM. See the documentation of your MIB browser for instructions.
NETGEAR recommends the following MIB browsers for receiving the STM SNMP
notifications:
MG-Soft
SNMP
Net-SNMP (Linux Text)
SNMP Browser for KDE
The STM MIB structure is automatically downloaded by management stations. You should
start receiving notifications after you have enabled SNMP on the STM and added its IP
address into your MIB browsers.
Managing the Configuration File
The configuration settings of the STM are stored in a configuration file on the STM. This file
can be saved (backed up) to a PC, retrieved (restored) from the PC, or cleared to factory
default settings.
Once the STM is installed and works correctly, make a backup of the configuration file to a
computer. If necessary, you can later restore the STM settings from this file.
Do You Want to
Enable SNMP?
(continued)
Contact
The SNMP system contact information that is available to the
SNMP manager. This setting is optional.
Location
The physical location of the STM. This setting is optional.
Trusted SNMP Hosts
Enter the IP addresses of the computers and devices to which you want to grant read-only (GET) or write
(SET) privileges on the STM. Separate IP addresses by a comma. To allow any trusted SNMP host access,
leave the field blank, which is the default setting.
SNMP Traps
Enter the IP addresses of the SNMP management stations that are allowed to receive the STM’s SNMP
traps. Separate IP addresses by a comma. If you leave the field blank, which is the default setting, no
SNMP management station can receive the STM’s SNMP traps.
Table 20.
SNMP Settings (Continued)
Setting
Description (or Subfield and Description)