Introducing Trend Micro Control Manager™
B
-
5
when agent sits behinds a NAT device (or TMCM server sits behind a NAT device)
since the connection can only route to the NAT device, not the product behind the
NAT device (or the TMCM server sitting behind a NAT device). One common
work-around is that a specific mapping relationship is established on the NAT device
to direct it to automatically route the in-bound request to the respective agent.
However, this solution needs user involvement and it does not work well when
large-scale product deployment is needed.
The MCP deals with this issue by introducing a one-way communication model.
With one-way communication, only the agent initiates the network connection to the
server. The server cannot initiate connection to the agent. This one-way
communication works well for log data transfers. However, the server dispatching of
commands occurs under a passive mode. That is, the command deployment relies on
the agent to poll the server for available commands.
HTTPS Support
The MCP integration protocol applies the industry standard communication protocol
(HTTP/HTTPS). HTTP/HTTPS has several advantages over TMI:
•
A large majority of people in IT are familiar with HTTP/HTTPS, which makes it
easier to identify communication issues and find solutions those issues
•
For most enterprise environments, there is no need to open extra ports in the
firewall to allow packets to pass
•
Existing security mechanisms built for HTTP/HTTPS, such as SSL/TLS and
HTTP digest authentication, can be used.
Using MCP, Control Manager has three security levels:
•
Normal security:
Control Manager uses HTTP for communication
•
Medium security:
Control Manager uses HTTPS for communication if HTTPS
is supported and HTTP if HTTPS is not supported
•
High security:
Control Manager uses HTTPS for communication
One-Way and Two-Way Communication Support
MCP supports one-way and two-way communication.
Summary of Contents for InterScan M Series
Page 1: ...InterScan TM Gateway Security Appliance M Series...
Page 2: ......
Page 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Page 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Page 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Page 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Page 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Page 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Page 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Page 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Page 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Page 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Page 267: ...Analyzing Your Protection Using Logs 12 9...
Page 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Page 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Page 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Page 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Page 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Page 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Page 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Page 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...