![Trend Micro CR100 Series Installation And Manual Download Page 36](http://html1.mh-extra.com/html/trend-micro/cr100-series/cr100-series_installation-and-manual_1155735036.webp)
Deploying Network VirusWall Enforcer
3-3
•
Plan for network traffic, considering the location of critical computers, such as
email, Web, and application servers.
•
Determine the number of devices needed to meet your security needs and their
locations on the network.
•
Conduct a pilot deployment on a test segment of your network.
•
Redefine your deployment strategy based on the results of the pilot
deployment.
Phase 2: Perform Preconfiguration
In phase 2, begin implementing the plan you created in phase 1 by performing the
following tasks:
•
Perform the initial preconfiguration tasks (see
•
Perform preconfiguration on the device(s) (see
•
Connect the device(s) to your network (see
Phase 3: Manage Devices
During phase 3, manage Network VirusWall Enforcer devices from the Web console.
For this phase, consult the following sections of the Administrator’s Guide:
•
Understanding Network VirusWall Enforcer
provides details about relevant concepts,
including management options, endpoints, security risks, policy enforcement, device
ports, fault tolerance, updatable components, SNMP support, and VLAN support.
•
Preparing for Policy Enforcement
discusses the tasks you need to perform before creating
policies and deploying them to your network.
•
Policy Creation and Deployment
covers actual policy creation, providing sample
scenarios and instructions.
Deployment Notes
Consider the following when planning for a deployment:
•
All traffic to and from a network segment must go through the device.