Trend Micro™ Network VirusWall™ Enforcer 1500i Installment and Deployment Guide
3-10
The device can also guard against attacks that not only originate on the Internet, but also
attacks that may originate from within your network. Since traffic first passes through
the device before reaching email and web servers, the device can scan and detect
infected packets that come from endpoints on the LAN.
Dual-Switch VLAN Environment
Network VirusWall Enforcer must be placed in line on the physical network to provide
security. In most situations, this means placing it between an upstream switch and one or
more downstream switches.
Most VLAN configurations will utilize two switches. Single-switch VLAN
configurations are possible; for more information, refer to
on page 3-12. The figures in this section illustrate multiple downstream
switches in a flat topology; however, a single in line configuration is also possible.
In
, the devices are installed between an upstream switch and downstream
switches. This configuration is appropriate when multiple VLANs carry moderate
network traffic, and the upstream switch carries high-bandwidth traffic.
Note:
Ensure that Spanning Tree Protocol (STP) is enabled. If STP is not enabled, packets
may loop for an indefinite period.
Summary of Contents for viruswall enforcer 1500i
Page 1: ......
Page 7: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide vi...
Page 13: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide xii...
Page 30: ...Getting Started 2 11 FIGURE 2 7 Standard four port configuration Port 1 Port 3 Port 4 Port 2...
Page 59: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide 3 20...
Page 78: ......