NETGEAR and the NETGEAR logo are registered trademarks and ProSecure is a trademark of NETGEAR, Inc.
Microsoft, Windows, and Windows NT ar e registered trademarks of Microsoft Corporation. Other brand and product
names are registered trademarks or trademarks of their respective holders.
Statement of Conditions
In the interest of improving internal design, operational function, and/or reliability, NETGEAR reserves the right to
make changes to the products described in this document without notice.
NETGEAR does not assume any liability that may occur due to the use or application of the product(s) or circuit
layout(s) described herein.
Federal Communications Commission (FCC) Compliance Notice: Radio Frequency
Notice
This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of
the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the
equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency
energy and, if not installed and used in accordance with the instruction manual, may cause harmful inte rferenc e to radio
communications. Operation of this equipment in a residential area is likely to cause harmful interfere nc e in which case
the user will be required to correct the interference at his own expense.
Changes or modifications not expressly approved by NETGEAR could void the user’s authority to operate the
equipment.
EU Regulatory Compliance Statement
The ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or STM600 is compliant with
the following EU Council Directives: EMC Directive 2004/108/EC and Low Voltage Directive 2006/95/EC.
Compliance is verified by testing to the following standards: EN55022, EN55024, and EN60950-1.
For the EU Declaration of Conformity please visit:
Es wird hiermit bestätigt, daß das ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or
STM600 gemäß der im BMPT-AmtsblVfg 243/1991 und Vfg 46/1992 aufgeführten Bestimmungen entstört ist. Das
vorschriftsmäßige Betreiben einiger Geräte (z.B. Testsender) kann jedoch gewissen Beschränkungen unterliegen. Lesen
Sie dazu bitte die Anmerkungen in der Betriebsanleitung.
Das Bundesamt für Zulassungen in der Telekommunikation wurde davon unterrichtet, daß dieses Gerät auf den Markt
gebracht wurde und es ist berechtigt, die Serie auf die Erfüllung der Vorschriften hin zu überprüfen.
Certificate of the Manufacturer/Importer
It is hereby certified that the ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or
STM600 has been suppressed in accordance with the conditions set out in the BMPT-AmtsblVfg 243/1991 and Vfg 46/
1992. The operation of some equipment (for example, test transmitters) in accordance with the regulations may,
however, be subject to certain restrictions. Please refer to the notes in the operating instructions.
ii
v1.0, September 2009
Federal Office for Telecommunications Approvals has been notified of the placing of this equipment on the market
and has been granted the right to test the series for compliance with the regulations.
Voluntary Control Council for Interference (VCCI) Statement
This equipment is in the second category (information equipment to be used in a residential area or an adjacent area
thereto) and conforms to the standards set by the Voluntary Control Council for Interference by Data Processing
Equipment and Electronic Office Machines aimed at preventing radio interference in such residential areas.
When used near a radio or TV receiver , it may become the cause of radio interference.
Read instructions for correct handling.
Additional Copyrights
AESCopyright (c) 2001, Dr. Brian Gladman, brg@gladman.uk.net, Worcester, UK.
All rights reserved.
TERMS
Redistribution and use in source and binary forms, with or without modification, are permitted
subject to the following conditions:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions, and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions, and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. The copyright holder’s name must not be used to endorse or promote any products
derived from this software without his specific prior written permission.
This software is provided “as is” with no express or implied warranties of correctness or fitness
for purpose.
v1.0, September 2009
iii
Open SSLCopyright (c) 1998–2000 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted
provided that the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of
conditions, and the following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of
conditions, and the following disclaimer in the documentation and/or other materials
provided with the distribution.
3. All advertising materials mentioning features or use of this software must display the
following acknowledgment: “This product includes software developed by the OpenSSL
Project for use in the OpenSSL Toolkit (
4. The names “OpenSSL Toolkit” and “OpenSSL Project” must not be used to endorse or
promote products derived from this software without prior written permission. For written
permission, contact openssl-core@openssl.org.
5. Products derived from this software may not be called “OpenSSL” nor may “OpenSSL”
appear in their names without prior written permission of the OpenSSL Project.
6. Redistributions of any form whatsoever must retain the following acknowledgment: “This
product includes software developed by the OpenSSL Project for use in the OpenSSL
Toolkit (
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT “AS IS,” AND ANY
EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCI DENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This
product includes software written by Tim Hudson (tjh@cryptsoft.com).
MD5 Copyright (C) 1990, RSA Data Security, Inc. All rights reserved.
License to copy and use this software is granted provided that it is identified as the “RSA Data
Security, Inc. MD5 Message-Digest Algorithm” in all material mentioning or referencing this
software or this function. License is also granted to make and use derivative works provided
that such works are identified as “derived from the RSA Data Security, Inc. MD5 MessageDigest Algorithm” in all material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning ei ther the merchantability of
this software or the suitability of this software for any particular purpose. It is provided “as is”
without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or
software.
http://www.openssl.org/).”
http://www.openssl.org/).”
iv
v1.0, September 2009
PPPCopyright (c) 1989 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that the above
copyright notice and this paragraph are duplicated in all such forms and that any
documentation, advertising materials, and other materials related to such distribution and use
acknowledge that the software was developed by Carnegie Mellon University. The name of
the University may not be used to endor se or promote products derived from this software
without specific prior written permission.
THIS SOFTWARE IS PROVIDED “AS IS” AND WITHOUT ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
Zlibzlib.h. Interface of the zlib general purpose compression library version 1.1.4, March 11th,
2002. Copyright (C) 1995–2002 Jean-loup Gailly and Mark Adler.
This software is provided “as is,” without any express or implied warranty. In no event will the
authors be held liable for any damages arising from the use of this software. Permission is
granted to anyone to use this software for any purpose, including commercial applications,
and to alter it and redistribute it freely, subject to the following restrictions:
1. The origin of this software must not be misrepresented; you must not claim that you wrote
the original software. If you use this software in a product, an acknowledgment in the
product documentation would be appreciated but is not required.
2. Altered source versions must be plainly marked as such, and must not be misrepresented
as being the original software.
3. This notice may not be removed or altered from any source distribution.
Jean-loup Gailly: jloup@gzip.org; Mark Adler: madler@alu mni.caltech.edu.
The data format used by the zlib library is described by RFCs (Request for Comments) 1950
to 1952 in the files
format), and rfc1952.txt (gzip format).
The NETGEAR® Pr oSecur e™ Web/Email Security Thre at Management Appliance STM Refer ence
Manual describes how to configure and troubleshoot a ProSecure Web/Email Security Threat
Management Appliance STM150, STM300, or STM600. The information in this manual is
intended for readers with intermediate computer and networking skills.
Conventions, Formats, and Scope
The conventions, formats, and scope of this manual are described in the following paragraphs:
•Typographical conventions. This manual uses the following typographical conventions:
ItalicEmphasis, books, CDs
BoldUser input, IP addresses, GUI screen text
FixedCommand prompt, CLI text, code
italicURL links
•Formats. This manual uses the following formats to highlight special messages:
Note: This format is used to highlight information of importance or special interest.
Tip: This format is used to highlight a procedure that will save time or resources.
Warning: Ignoring this type of note might result in a malfunction or damage to the
equipment.
Danger: This is a safety warning. Failure to take heed of this notice might result in
For more information about network, Internet, firewall, and VPN technologies, click the links to
the NETGEAR website in Appendix B, “Related Documents.”
Note: Product updates are available on the NETGEAR website at
http://prosecure.netgear.com or http://kb.netgear.com/app/home.
Note: Go to http://prosecure.netgear.com/community/forum.php for information about
the ProSecure™ forum and to become part of the ProSecure™ community.
How to Print This Manual
T o print this manual, your computer must have the free Adobe Acrobat reader installed in order to
view and print PDF files. The Acrobat reader is available on the Adobe Web site at
http://www.adobe.com.
Tip: If your printer supports printing two pages on a single sheet of paper, you can save
paper and printer ink by selecting this feature.
Revision History
Manual Part
Number
202-10519-011.0September 2009 Initial publication of this reference manual.
This chapter provides an overview of the features and capabilities of the ProSecure Web/Email
Security Threat Management Appliance STM150, STM300, or STM600. It also identifies the
physical features of the appliances and the contents of the product packages.
This chapter contains the following sections:
•“What Is the ProSecure Web/Email Security Threat Management Appliance STM150,
STM300, or STM600? on this page.
•“What Can You Do with an STM?” on page 1-2.
•“Key Features and Capabilities” on page 1-3.
•“Service Registration Card with License Keys” on page 1-6.
•“Rear Panel Features” on page 1-14.
•“Bottom Panel With Product Label” on page 1-15.
•“Choosing a Location for the STM” on page 1-17.
What Is the ProSecure Web/Email Security Threat
Management Appliance STM150, STM300, or STM600?
The ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or
STM600, hereafter referred to as the STM, is an appliance-based, W eb and e-mail security solution
that protects the network perimeter against Web-borne threats from spyware, viruses, e-mail, and
blended threats. Ideally deployed at the gateway, it serves as the network’s first line of defense
against all types of threats, and complements firewalls, Intrusion Detection Systems (IDS)/
Intrusion Prevention Systems (IPS), dedicated Intranet security products, and endpoint anti-virus
and anti-spyware software.
Powered by patent-pending Stream Scanning technology and backed by one of the most
comprehensive malware databases in the industry, the STM can detect and stop all known spyware
and viruses at the gateway, preventing them from reaching your desktops and servers, where
cleanup would be much more difficult.
In addition to scanning HTTP, HTTPS, FTP, SMTP, POP3, and IMAP traffic, the STM protects
networks against spam phishing attacks and unwanted Web use. The STM is a plug-and-play
device that can be installed and configured within minutes.
What Can You Do with an STM?
The STM combines robust protection against malware threats with ease of use and advanced
reporting and notification features to help you deploy and manage the device with minimal effort.
Here are some of the things that you can do with the STM:
•Protect the network instantly. The STM is a plug-and-play security solution that can be
instantly added to networks without requiring network reconfiguration.
•Scan network traffic for malware. Using the patent-pending Stream Scanning technology,
you can configure the STM to scan HTTP, HTTPS, FTP, SMTP, POP3, and IMAP protocols.
Unlike traditional batch-based scan engines that need to cache the entire file before they can
scan, this scan engine checks traffic as it enters the network, ensuring unimpeded network
performance.
•Set access policies for individual users or groups. You can configure W eb and e-mail access
access policies for individual users and groups based on the STM’s local database, on group IP
address, on LDAP domain, group, or user, or on RADIUS VLAN.
•Receive real-time alerts and generate comprehensive reports. You can configure the STM
to send alerts when a malware attack or outbreak is detected on the network. Real-time alerts
can be sent by e-mail, allowing you to monitor malware events wherever you are.
By configuring the STM to send malware alerts, you can isolate and clean the infected
computer before the malware incident can develop into a full-blown outbreak. The STM also
provides comprehensive reports that you can use to analyze network and malware trends.
•Manage through SNMP support. You can enable and configure the STM’ s SNMP settings to
receive SNMP traps through a supported MIB browser.
•Allow automated component updates. Downloading components regularly is the key to
ensuring updated protection against new threats. The STM makes this administrative task
easier by supporting automatic malware pattern, program, and engine updates.
The STM provides the following key features and capabilities:
•Up to two pairs of 10/100/1000 Mbps Gigabit Ethernet WAN ports (see “STM Model
Comparison” on page 1-5).
•Scalable support (see “STM Model Comparison” on page 1-5) for:
–up to 600 concurrent users
–up to 6000 concurrently scanned HTTP sessions
–up to 239 MB/s HTTP throughput
–up to 960,000 e-mails per hour SMTP throughput.
•Patent-pending Stream Scanning technology that enables scanning of real-time protocols such
as HTTP.
•Comprehensive Web and e-mail inbound and outbound security, covering six major network
protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP.
•URL content filtering with 64 categories.
•Malware database containing hundreds of thousands of signatures of spyware, viruses, and
other malware threats.
•Very frequently updated malware signatures, hourly if required. The STM can automatically
check for new malware signatures as frequently as every 15 minutes.
•Multiple anti-spam technologies to provide extensive protection against unwanted e-mails.
•Spam and malware quarantine for easy analysis.
•Web application control, including access control for instant messaging, media applications,
peer-to-peer applications, and Web-based tools and to olbars.
•User management with LDAP, Active Directory, and RADIUS integration, allowing access
policy configuration per user and per group.
•Easy, Web-based wizard setup for installation and management.
•SNMP-manageable.
•Dedicated management interface. (This feature is model dependent, see “STM Model
Comparison” on page 1-5).
•Hardware bypass port to prevent network disruption in case failure. (This feature is model
dependent, see “STM Model Comparison” on page 1-5).
•Front panel LEDs for easy monitoring of status and activity.
Stream Scanning is based on the simple observation that network traffic travels in streams. The
STM scan engine starts receiving and analyzing traffic as the stream enters the network. As soon
as a number of bytes are available, scanning starts. The scan engine continues to scan more bytes
as they become available, while at the same time another thread starts to deliver the bytes that have
been scanned.
This multithreaded approach, in which the receiving, scanning, and delivering processes occur
concurrently, ensures tha t network performance remains unimpeded. The result is file scanning is
up to five times faster than with traditional anti-virus solutions—a performance advantage that you
will notice.
Stream Scanning also enables organizations to withstand massive spikes in traffic, as in the event
of a malware outbreak. The scan engine has the following capabilities:
•Real-time protection. The patent-pending Stream Scanning technology enables scanning of
previously undefended real-time protocols, such as HTTP. Network activities susceptible to
latency (for example, Web browsing) are no longer brought to a standstill.
•Comprehensive protection. Provides both Web and e-mail security, covering six major
network protocols: HTTP, HTTPS, FTP, SMTP, POP3, and IMAP. The STM uses enterpriseclass scan engines employing both signature-based and Distributed Spam Analysis to stop
both known and unknown threats. The malware database cont ains hundreds of thousands of
signatures of spyware, viruses, and other malware.
•Objectionable traffic protection. The STM prevents objectionable content from reaching
your computers. You can control access to the Internet content by screening for Web
categories, Web addresses, and Web services. You can log and report attempts to access
objectionable Internet sites.
•Automatic signature updates. Malware signatures are updated as frequently as every hour,
and the STM can check automatically for new signatures as frequently as every 15 minutes.
Autosensing Ethernet Connections with Auto Uplink
With its internal 10/100/1000 ports, the STM can connect to either a 10 Mbps standard Ethernet
network, a 100 Mbps Fast Ethernet network, or a 1000 Mbps Gigabit Ethernet network. The
interfaces are autosensing and capable of full-duplex or half-duplex operation.
TM
The STM incorporates Auto Uplink
whether the Ethernet cable plugged into the port should have a “normal” connection such as to a
PC or an “uplink” connection such as to a switch or hub. That port then configures itself to the
correct configuration. This feature eliminates the need to think about crossover cables, as Auto
Uplink accommodates either type of cable to make the right connection.
1-4Introduction
technology. Each Ethernet port automatically senses
You can install, configure, and operate the STM within minutes after connecting it to the network.
The following features simplify installation and management tasks:
•Browser-based management. Browser-based configuration allows you to easily configure
the STM from almost any type of personal computer, such as Windows, Macintosh, or Linux.
A user-friendly Setup Wizard is provided and online help documentation is built into the
browser-based Web Management Interface.
•SNMP. The STM supports the Simple Network Management Protocol (SNMP) to let you
monitor and manage log resources from an SNMP-compliant system manager. The SNMP
system configuration lets you change the system variables for MIB2.
•Diagnostic functions. The STM incorporates built-in diagnostic functions such as a Ping
utility, Trace-route utility, DNS lookup utility, and remote restart.
•Remote management. The STM allows you to log in to the Web Management Interface from
a remote location on the Internet. For security, you can limit remote management access to a
specified remote IP address or range of addresses.
•Visual monitoring. The STM’s front panel LEDs provide an easy way to monitor its status
and activity.
Maintenance and Support
NETGEAR offers technical support seven days a week, 24 hours a day, according to the terms
identified in the Warranty and Support information card provided with your product.
STM Model Comparison
Table 1-1 compares the three STM models to show the differences:
Table 1-1. Differences Between the STM Models
FeatureSTM150STM300STM600
Performance and Sizing Guidelines
Concurrent Usersup to 150up to 300up to 600
Web Scan Throughput43 Mbps148 Mbps239 Mbps
Concurrent Scanned HTTP Connections150030006000
SMTP Throughput (e-mails per hour)139,000420,000960,000
Table 1-1. Differences Between the STM Models (continued)
FeatureSTM150STM300STM600
Hardware
Gigabit RJ-45 PortsTotal of 5 ports:
• 1 uplink
• 4 downlink
Gigabit RJ45 Port Pairs with Failure Bypass 01 pair of ports2 pairs of ports
Dedicated Management VLAN RJ45 Ports 011
a. The STM600 provides two pairs of ports, allowing for support of two separate networks or subnets with strict traffic
separation.
Total of 3 ports:
• 1 pair of ports
(1 uplink and
1 downlink)
• 1 management
Total of 5 ports:
• 2 pairs of ports
(2 uplink and
2 downlink)
• 1 management
Service Registration Card with License Keys
Be sure to store the license key card that came with your STM in a secure location. You do need
these keys to activate your product during the initial setup.
Note: When you reset the STM to the original factory default settings after you have
entered the license keys to activate the STM (see “Registering the STM with
NETGEAR” on page 2-28), the license keys are erased. The license keys and the
different types of licenses that are available for the STM are no longer displayed
on the Registration screen. However, after you have reconfigured the STM to
connect to the Internet and to the NETGEAR registration server, the STM
retrieves and restores all registration information based on its MAC address and
hardware serial number. You do not need to re-enter the license keys and
reactivate the STM.
Package Contents
The STM product package contains the following items:
•ProSecure Web/Email Security Threat Management Appliance STM150, STM300, or
STM600
•One AC power cable
•Rubber feet (4) with adhesive backing
•One rack-mount kit
•Straight through Category 5 Ethernet Cable
•ProSecure™ Web/Email Security Threat Management Applliance STM150, STM300, or
STM600 Installation Guide
•Depending on the model purchased, Service Registration Card with License Key(s)
•Warranty and Support Information Card
If any of the parts are incorrect, missing, or damaged, contact your NETGEAR dealer. Keep the
carton, including the original packing materials, in case you need to return the product for repair.
Hardware Features
The front panel ports and LEDs, rear panel ports, and bottom label of the STM models are
described in this section.
The function of each STM150 LED is described in the following table:
Table 1-2. LED Descriptions for the STM150
ObjectActivityDescription
PowerOn (Green)Power is supplied to the STM.
OffPower is not supplied to the STM.
TestOn (Amber) during
startup.
OffThe system has completed its initialization successfully. The Test LED
Blinking (Amber)The STM is shutting down.
Uplink (WAN) Port
The STM is initializing. After approximately 2 minutes, when the STM
has completed its initialization, the Test LED turns off. If the Test LED
remains on, the initialization has failed.
should be off during normal operation.
Software is being updated.
A hot fix is being installed.
One of the three licenses has expired. To stop the Test LED from
blinking, renew the license, or click the Stop LED Blinking button on
the System Status screen (see “Viewing System Status” on page 6-19).
Left LEDOffThe WAN port has no physical link, that is, no Ethernet cable is plugged
into the STM.
On (Green)The WAN port has a valid connection with a device that provides an
Internet connection.
Blink (Green)Data is being transmitted or received by the WAN port.
Right LEDOffThe WAN port is operating at 10 Mbps.
On (Amber)The WAN port is operating at 100 Mbps.
On (Green)The WAN port is operating at 1000 Mbps.
Downlink (LAN) Ports
Left LEDOffThe LAN port has no link.
On (Green)The LAN port has detected a link with a connected Ethernet device.
Blink (Green)Data is being transmitted or received by the LAN port.
Right LEDOffThe LAN port is operating at 10 Mbps.
On (Amber)The LAN port is operating at 100 Mbps.
On (Green)The LAN port is operating at 1000 Mbps.
Figure 1-3 shows the front panel ports and LEDs of the STM300.
Figure 1-3
From left to right, the STM300’s front panel shows the following ports and LEDs:
1. Console port. Port for connecting to an optional console terminal. The ports has a DB9 male
connector. The default baud rate is 9600 K. The pinouts are: (2) Tx, (3) Rx, (5) and (7) Gnd.
2. Power LED.
3. Status LED.
4. Hard drive (HDD) LED.
5. One non-functioning USB port: this port is included for future management enhancements.
The port is currently not operable on any STM model.
6. Dedicated management (Mgmt) Gigabit Ethernet port with an RJ-45 connector.
7. One uplink (WAN) Gigabit Ethernet port with an RJ-45 connector, left LED, and right LED.
8. One downlink (LAN) Gigabit Ethernet port with RJ-45 connectors, left LEDs, and right LED.
Note: All Gigabit Ethernet ports provide switched N-way, automatic speed-negotiating,
The function of each STM300 LED is described in the following table:
Table 1-3. LED Descriptions for the STM300
ObjectActivityDescription
PowerOn (Green)Power is supplied to the STM.
OffPower is not supplied to the STM.
StatusOn (Amber) during
startup.
OffThe system has completed its initialization successfully. The Status
Blinking (Amber)The STM is shutting down.
HDDOn (Green)Information is being written to the hard drive.
OffNo hard drive activity.
The STM is initializing. After approximately 2 minutes, when the STM
has completed its initialization, the Status LED turns off. If the Status
LED remains on, the initialization has failed.
LED should be off during normal operation.
Software is being updated.
A hot fix is being installed.
One of the three licenses has expired. To stop the Status LED from
blinking, renew the license, or click the Stop LED Blinking button on
the System Status screen (see “Viewing System Status” on page 6-19).
Uplink (WAN) Port
Left LEDOffThe WAN port has no physical link, that is, no Ethernet cable is plugged
into the STM.
On (Green)The WAN port has a valid connection with a device that provides an
Internet connection.
Blink (Green)Data is being transmitted or received by the WAN port.
Right LEDOffThe WAN port is operating at 10 Mbps.
On (Green)The WAN port is operating at 100 Mbps.
On (Amber)The WAN port is operating at 1000 Mbps.
Downlink (LAN) Ports
Left LEDOffThe LAN port has no link.
On (Green)The LAN port has detected a link with a connected Ethernet device.
Blink (Green)Data is being transmitted or received by the LAN port.
Right LEDOffThe LAN port is operating at 10 Mbps.
On (Green)The LAN port is operating at 100 Mbps.
On (Amber)The LAN port is operating at 1000 Mbps.
Figure 1-4 shows the front panel ports and LEDs of the STM600.
Figure 1-4
From left to right, the STM600’s front panel shows the following ports and LEDs:
1. Console port. Port for connecting to an optional console terminal. The ports has a DB9 male
connector. The default baud rate is 9600 K. The pinouts are: (2) Tx, (3) Rx, (5) and (7) Gnd.
2. Power LED.
3. Status LED.
4. Hard drive (HDD) LED.
5. One non-functioning USB port: this port is included for future management enhancements.
The port is currently not operable on any STM model.
6. Dedicated management (Mgmt) Gigabit Ethernet port with an RJ-45 connector.
7. Pair 1 uplink (WAN) and downlink (LAN) Gigabit Ethernet ports with RJ-45 connectors, left
LEDs, and right LEDs.
8. Pair 2 uplink (WAN) and downlink (LAN) Gigabit Ethernet ports with RJ-45 connectors, left
LEDs, and right LEDs.
Note: All Gigabit Ethernet ports provide switched N-way, automatic speed-negotiating,
The function of each STM600 LED is described in the following table:
Table 1-4. LED Descriptions for the STM600
ObjectActivityDescription
PowerOn (Green)Power is supplied to the STM.
OffPower is not supplied to the STM.
StatusOn (Amber) during
startup.
OffThe system has completed its initialization successfully. The Status
Blinking (Amber)The STM is shutting down.
HDDOn (Green)Information is being written to the hard drive.
OffNo hard drive activity.
The STM is initializing. After approximately 2 minutes, when the STM
has completed its initialization, the Status LED turns off. If the Status
LED remains on, the initialization has failed.
LED should be off during normal operation.
Software is being updated.
A hot fix is being installed.
One of the three licenses has expired. To stop the Status LED from
blinking, renew the license, or click the Stop LED Blinking button on
the System Status screen (see “Viewing System Status” on page 6-19).
Uplink (WAN) Port
Left LEDOffThe WAN port has no physical link, that is, no Ethernet cable is plugged
into the STM.
On (Green)The WAN port has a valid connection with a device that provides an
Internet connection.
Blink (Green)Data is being transmitted or received by the WAN port.
Right LEDOffThe WAN port is operating at 10 Mbps.
On (Green)The WAN port is operating at 100 Mbps.
On (Amber)The WAN port is operating at 1000 Mbps.
Downlink (LAN) Ports
Left LEDOffThe LAN port has no link.
On (Green)The LAN port has detected a link with a connected Ethernet device.
Blink (Green)Data is being transmitted or received by the LAN port.
Right LEDOffThe LAN port is operating at 10 Mbps.
On (Green)The LAN port is operating at 100 Mbps.
On (Amber)The LAN port is operating at 1000 Mbps.
The rear panel of the STM150 differs from the rear panels of the STM300 and STM600.
Rear Panel STM150
Figure 1-5 shows the rear panel components of the STM150.
Figure 1-5
From left to right, the STM150’s rear panel components are:
1. Console port. Port for connecting to an optional console terminal. The ports has a DB9 male
connector. The default baud rate is 9600 K. The pinouts are: (2) Tx, (3) Rx, (5) and (7) Gnd.
2. Kensington lock. Attach an optional Kensington lock to prevent unauthorized removal of the
STM150.
3. Power Button. Press to restart the STM150. Restarting does not reset the STM150 to its
factory defaults.
4. Reset Button. Using a sharp object, press and hold this button for about 10 seconds until the
front panel Test light flashes and the STM150 returns to factory default settings.
5. AC power socket. Attach the power cord to this socket.
1-14Introduction
Note: If you reset the STM150, all configuration settings are lost and the default
The rear panels of the STM300 and STM600 are identical.
Figure 1-6 shows the rear panel components of the STM300 and STM600.
Figure 1-6
From left to right, the STM300’s and STM600’s rear panel components (excluding the four fan air
outlets) are:
1. Power switch. Switch to turn the STM300 or STM600 on or off. Restarting does not reset the
STM300 or STM600 to its factory defaults.
Note: The STM300 and STM600 do not provide a Reset button. To reset the
STM300 or STM600 to factory default setting using the Web Management
Interface, see “Reverting to Factory Default Settings” on page 3-18.
2. AC power socket. Attach the power cord to this socket.
Bottom Panel With Product Label
The product label on the bottom of the STM’s enclosure displays the STM’s default IP address,
default user name, and default password, as well as regulatory compliance, input power, and other
information.