![Solida systems SL-1000 Скачать руководство пользователя страница 6](http://html.mh-extra.com/html/solida-systems/sl-1000/sl-1000_user-manual_1315532006.webp)
6
©
SOLIDA SYSTEMS INTERNATIONAL 2016
2.1 Typical Configuration
The most common setup is using the Solida appliance as an endpoint device. This allows for all
incoming and outgoing data packets to be inspected. This offers the best protection against any
type of malicious traffic. The SL-1000 appliance operates in stealth mode. It does not require any
IP addresses for its ports other than for the MGNT (management) port.
Figure 2.2 Typical Installation
For larger networks it might be necessary to protect multiple sections of the network with
dedicated security appliances. For those installations make sure that the WAN port is connected
upwards (towards the Internet router side). Conversely make sure the LAN side is connected to
the sub-partitioned network.