Netgear STM300 STM 150-300-600 Reference Manual (PDF) - Page 9

What Can You Do with an STM?, Key Features and Capabilities, con the STM to scan HTTP, HTTPS

Page 9 highlights

ProSecure Web/Email Security Threat Management (STM) Appliance What Can You Do with an STM? The STM combines robust protection against malware threats with ease of use and advanced reporting and notification features to help you deploy and manage the device with minimal effort. Here are some of the things that you can do with the STM: • Protect the network instantly. The STM is a plug-and-play security solution that can be instantly added to networks without the need for network reconfiguration. • Scan network traffic for malware. Using the Stream Scanning technology, you can configure the STM to scan HTTP, HTTPS, FTP, SMTP, POP3, and IMAP protocols. Unlike traditional batch-based scan engines that need to cache the entire file before they can scan, this scan engine checks traffic as it enters the network, ensuring unimpeded network performance. • Set access policies for individual users or groups. You can configure Web and email access policies for individual users and groups based on the STM's local database, on a group IP address, on a Lightweight Directory Access Protocol (LDAP) domain, group, or user, or on a RADIUS VLAN. • Receive real-time alerts and generate comprehensive reports. You can configure the STM to send alerts when a malware attack or outbreak is detected on the network. Real-time alerts can be sent by email, allowing you to monitor malware events wherever you are. By configuring the STM to send malware alerts, you can isolate and clean the infected computer before the malware incident can develop into a full-blown outbreak. The STM also provides comprehensive reports that you can use to analyze network and malware trends. • Manage through SNMP support. You can enable and configure the STM's Simple Network Management Protocol (SNMP) settings to receive SNMP traps through a supported management information base (MIB) browser. • Allow automated component updates. Downloading components regularly is the key to ensuring updated protection against new threats. The STM makes this administrative task easier by supporting automatic malware pattern, program, and engine updates. Key Features and Capabilities The STM provides the following key features and capabilities: • Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet WAN ports (see STM Model Comparison on page 12). • Scalable support (see STM Model Comparison on page 12) for: - Up to 600 concurrent users - Up to 6000 concurrently scanned HTTP sessions Chapter 1. Introduction | 9

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261

Chapter 1.
Introduction
|
9
ProSecure Web/Email Security Threat Management (STM) Appliance
What Can You Do with an STM?
The STM combines robust protection against malware threats with ease of use and
advanced reporting and notification features to help you deploy and manage the device with
minimal effort.
Here are some of the things that you can do with the STM:
Protect the network instantly
. The STM is a plug-and-play security solution that can be
instantly added to networks without the need for network reconfiguration.
Scan network traffic for malware
. Using the Stream Scanning technology, you can
configure the STM to scan HTTP, HTTPS, FTP, SMTP, POP3, and IMAP protocols.
Unlike traditional batch-based scan engines that need to cache the entire file before they
can scan, this scan engine checks traffic as it enters the network, ensuring unimpeded
network performance.
Set access policies for individual users or groups
. You can configure Web and email
access policies for individual users and groups based on the STM’s local database, on a
group IP address, on a Lightweight Directory Access Protocol (LDAP) domain, group, or
user, or on a RADIUS VLAN.
Receive real-time alerts and generate comprehensive reports
. You can configure the
STM to send alerts when a malware attack or outbreak is detected on the network.
Real-time alerts can be sent by email, allowing you to monitor malware events wherever
you are.
By configuring the STM to send malware alerts, you can isolate and clean the infected
computer before the malware incident can develop into a full-blown outbreak. The STM
also provides comprehensive reports that you can use to analyze network and malware
trends.
Manage through SNMP support
. You can enable and configure the STM’s Simple
Network Management Protocol (SNMP) settings to receive SNMP traps through a
supported management information base (MIB) browser.
Allow automated component updates
. Downloading components regularly is the key to
ensuring updated protection against new threats. The STM makes this administrative
task easier by supporting automatic malware pattern, program, and engine updates.
Key Features and Capabilities
The STM provides the following key features and capabilities:
Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet WAN ports (see
STM Model
Comparison
on page 12).
Scalable support (see
STM Model Comparison
on page 12) for:
-
Up to 600 concurrent users
-
Up to 6000 concurrently scanned HTTP sessions