Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 83

File extension blocking, URL blocking

Page 83 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance You can adjust the following features of the STM in such a way that the traffic load on the WAN side decreases. • Email content filtering. To reduce incoming email traffic, you can block emails with large attachments, reject emails based on keywords, file extensions, or file names, and set spam protection rules. There are several ways you can reduce unwanted email traffic: - Setting the size of email files to be scanned. Scanning large email files requires network resources and might slow down traffic. You can specify the maximum file or message size that is scanned, and whether files that exceed the maximum size are skipped (which might compromise security) or blocked. For more information, see Exception Settings on page 90. - Keyword, file extension, and file name blocking. You can reject emails based on keywords in the subject line, file type of the attachment, and file name of the attachment. For more information, see Email Content Filtering on page 94. - Protecting against spam. Set up spam protection to prevent spam from using up valuable bandwidth. For more information, see Protecting Against Email Spam on page 97. • Web content filtering. The STM provides extensive methods to filter Web content in order to reduce traffic: - Web category blocking. You can block entire Web categories because their content is unwanted, offensive, or not relevant, or simply to reduce traffic. For more information, see Configuring Web Content Filtering on page 109. - File extension blocking. You can block files based on their extension. Such files can include executable files, audio and video files, and compressed files. For more information, see Configuring Web Content Filtering on page 109. - URL blocking. You can specify URLs that are blocked by the STM. For more information, see Configuring Web URL Filtering on page 116. - Web services blocking. You can block Web applications such as instant messaging, media, peer-to-peer, and tools. For more information, see Configuring Application Control on page 127. - Web object blocking. You can block the following Web component types: embedded objects (ActiveX, Java, Flash), proxies, and cookies; and you can disable Java scripts. For more information, see Configuring Web Content Filtering on page 109. - Setting the size of Web files to be scanned. Scanning large Web files requires network resources and might slow down traffic. You can specify the maximum file size that is scanned, and whether files that exceed the maximum size are skipped (which might compromise security) or blocked. For more information, see Configuring Web Malware Scans on page 107. For these features (with the exception of Web object blocking and setting the size of files to be scanned), you can set schedules to specify when Web content is filtered (see Configuring Web Content Filtering on page 109) and configure scanning exclusions and access exceptions (see Setting Scanning Exclusions and Web Access Exceptions on page 130). You can use the STM's monitoring functions to assist you with performance management (see Monitoring Real-Time Traffic, Security, Statistics, and Web Usage on page 184). Chapter 3. Performing Network and System Management | 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 3.
Performing Network and System Management
|
83
ProSecure Web/Email Security Threat Management (STM) Appliance
You can adjust the following features of the STM in such a way that the traffic load on the
WAN side decreases.
Email content filtering
. To reduce incoming email traffic, you can block emails with large
attachments, reject emails based on keywords, file extensions, or file names, and set
spam protection rules. There are several ways you can reduce unwanted email traffic:
-
Setting the size of email files to be scanned
. Scanning large email files requires
network resources and might slow down traffic. You can specify the maximum file or
message size that is scanned, and whether files that exceed the maximum size are
skipped (which might compromise security) or blocked. For more information, see
Exception Settings
on page 90.
-
Keyword, file extension, and file name blocking
. You can reject emails based on
keywords in the subject line, file type of the attachment, and file name of the
attachment. For more information, see
Email Content Filtering
on page 94.
-
Protecting against spam
. Set up spam protection to prevent spam from using up
valuable bandwidth. For more information, see
Protecting Against Email Spam
on
page 97.
Web content filtering
. The STM provides extensive methods to filter Web content in
order to reduce traffic:
-
Web category blocking
. You can block entire Web categories because their content
is unwanted, offensive, or not relevant, or simply to reduce traffic. For more
information, see
Configuring Web Content Filtering
on page 109.
-
File extension blocking
.
You can block files based on their extension. Such files can
include executable files, audio and video files, and compressed files. For more
information, see
Configuring Web Content Filtering
on page 109.
-
URL blocking
. You can specify URLs that are blocked by the STM. For more
information, see
Configuring Web URL Filtering
on page 116.
-
Web services blocking
. You can block Web applications such as instant messaging,
media, peer-to-peer, and tools. For more information, see
Configuring Application
Control
on page 127.
-
Web object blocking
. You can block the following Web component types: embedded
objects (ActiveX, Java, Flash), proxies, and cookies; and you can disable Java
scripts. For more information, see
Configuring Web Content Filtering
on page 109.
-
Setting the size of Web files to be scanned
. Scanning large Web files requires
network resources and might slow down traffic. You can specify the maximum file size
that is scanned, and whether files that exceed the maximum size are skipped (which
might compromise security) or blocked. For more information, see
Configuring Web
Malware Scans
on page 107.
For these features (with the exception of Web object blocking and setting the size of files
to be scanned), you can set schedules to specify when Web content is filtered (see
Configuring Web Content Filtering
on page 109) and configure scanning exclusions and
access exceptions (see
Setting Scanning Exclusions and Web Access Exceptions
on
page 130). You can use the STM’s monitoring functions to assist you with performance
management (see
Monitoring Real-Time Traffic, Security, Statistics, and Web Usage
on
page 184).