ProSecure Web/Email Security Threat Management (STM) Appliance Reference Manual
Using the Setup Wizard to Provision the STM in Your Network
2-1
v1.0, September 2009
Chapter 2
Using the Setup Wizard to Provision the STM in
Your Network
This chapter describes provisioning the STM in your network. This chapter contains the following
sections:
•
“Choosing a Deployment Scenario
on this page.
•
“Understanding the Steps for Initial Connection” on page 2-4
.
•
“Registering the STM with NETGEAR” on page 2-28
.
•
“Verifying Proper Installation” on page 2-27
.
•
“Verifying Proper Installation” on page 2-27
.
•
“What to Do Next” on page 2-30
.
Choosing a Deployment Scenario
The STM is an inline transparent bridge appliance that can easily be deployed to any point on the
network without requiring network reconfiguration or additional hardware.
The following are the most common deployment scenarios for the STM. Depending on your
network environment and the areas that you want to protect, you can choose one or a combination
of the deployment scenarios that are described in the following sections:
•
“Gateway Deployment” on page 2-1
.
•
“Server Group” on page 2-2
.
•
“Segmented LAN Deployment” on page 2-3
.
Gateway Deployment
In a typical gateway deployment scenario, a single STM appliance is installed at the gateway—
between the firewall and the LAN core switch—to protect the network against all malware threats
entering and leaving the gateway. Installing the STM behind the firewall protects it from DoS
attacks.
Figure 2-1 on page 2-2
shows a typical gateway deployment scenario.
DRAFT
Содержание STM150 - ProSecure Web And Email Threat Management Appliance
Страница 6: ...v1 0 September 2009 vi D R A F T ...