Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
B
-
4
Data processing performance is slower due to the larger data footprint.
Packet transmissions take longer and the transmission rate is less than other data
formats.
With the issues mentioned above, MCP's data format is devised to resolve these
issues. The MCP's data format is a BLOB (binary) stream with each item composed
of name ID, type, length and value. This BLOB format has the following advantages:
•
Smaller data transfer size compared to XML:
Each data type requires only a
limited number of bytes to store the information. These data types are integer,
unsigned integer, Boolean, and floating point.
•
Faster parsing speed:
With a fixed binary format, each data item can be easily
parsed one by one. Compared to XML, the performance is several times faster.
•
Improved design flexibility:
Design flexibility is also been considered since
each item is composed of name ID, type, length and value. There will be no strict
item order and compliment items can be present in the communication protocol
only if needed.
In addition to applying binary stream format for data transmission, more than one
type of data can be packed in a connection, with/or without compression. With this
type of data transfer strategy, network bandwidth can be preserved and improved
scalability is also created.
NAT and Firewall Traversal Support
With limited addressable IPs on the IPv4 network, NAT (Network Address
Translation) devices have become widely used to allow more end-point computers to
connect to the Internet. NAT devices achieve this by forming a private virtual network
to the computers attached to the NAT device. Each computer that connects to the NAT
device will have one dedicated private virtual IP address. The NAT device will
translate this private IP address into a real world IP address before sending a request
to the Internet. This introduces some problems since each connecting computer uses a
virtual IP and many network applications are not aware of this behavior. This usually
results in unexpected program malfunctions and network connectivity issues.
For products that work with TMCM 2.5/3.0 agents, one pre-condition is assumed.
The server relies on the fact that the agent can be reached by initiating a connection
from server to the agent. This is a so-called two-way communication product, since
both sides can initiate network connection with each other. This assumption breaks
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...