![Trend Micro CR100 Series Installation And Manual Download Page 48](http://html1.mh-extra.com/html/trend-micro/cr100-series/cr100-series_installation-and-manual_1155735048.webp)
Deploying Network VirusWall Enforcer
3-15
Planning for Network Traffic
The scenario presented in
Key Segments and Critical Assets
on page 3-9 is a good example
of how to plan for network traffic. There is a strategic advantage to positioning the
device in front of resources that endpoints access regularly, such as an email server or an
Internet gateway. Because many viruses make their way into networks through email
attachments and Web browsers, forcing traffic to pass through the device significantly
reduces the risk of virus infection. Identify other places on your network through which
large amounts of traffic pass and consider placing the device where it can scan the most
traffic.
Determining the Number of Devices to Deploy
Determine how many devices would best meet your security requirements. Consider the
following factors:
•
Existing network topology
—based on your network topology, identify the
segments that you want the device to protect (see
•
Existing network device interfaces
—because a device handles 10/100Mbps or
1Gbps Fast Ethernet traffic, identify the network device interfaces that handle the
same type of traffic and can therefore connect to Network VirusWall Enforcer
devices
•
Desired effectiveness of protection
—to lower the risk of a virus outbreak
spreading, segment several sections of your network with Network VirusWall
Enforcer devices
•
Desired degree of performance
—consider the number of endpoints and the
amount of traffic that a device can handle