Trend Micro™ InterScan™ Gateway Security Appliance M-Series Administrator’s Guide
B
-
4
Data processing performance is slower due to the larger data footprint.
Packet transmissions take longer and the transmission rate is less than other data
formats.
With the issues mentioned above, MCP's data format is devised to resolve these
issues. The MCP's data format is a BLOB (binary) stream with each item composed
of name ID, type, length and value. This BLOB format has the following advantages:
•
Smaller data transfer size compared to XML:
Each data type requires only a
limited number of bytes to store the information. These data types are integer,
unsigned integer, Boolean, and floating point.
•
Faster parsing speed:
With a fixed binary format, each data item can be easily
parsed one by one. Compared to XML, the performance is several times faster.
•
Improved design flexibility:
Design flexibility is also been considered since
each item is composed of name ID, type, length and value. There will be no strict
item order and compliment items can be present in the communication protocol
only if needed.
In addition to applying binary stream format for data transmission, more than one
type of data can be packed in a connection, with/or without compression. With this
type of data transfer strategy, network bandwidth can be preserved and improved
scalability is also created.
NAT and Firewall Traversal Support
With limited addressable IPs on the IPv4 network, NAT (Network Address
Translation) devices have become widely used to allow more end-point computers to
connect to the Internet. NAT devices achieve this by forming a private virtual network
to the computers attached to the NAT device. Each computer that connects to the NAT
device will have one dedicated private virtual IP address. The NAT device will
translate this private IP address into a real world IP address before sending a request
to the Internet. This introduces some problems since each connecting computer uses a
virtual IP and many network applications are not aware of this behavior. This usually
results in unexpected program malfunctions and network connectivity issues.
For products that work with TMCM 2.5/3.0 agents, one pre-condition is assumed.
The server relies on the fact that the agent can be reached by initiating a connection
from server to the agent. This is a so-called two-way communication product, since
both sides can initiate network connection with each other. This assumption breaks
Содержание InterScan M Series
Страница 1: ...InterScan TM Gateway Security Appliance M Series...
Страница 2: ......
Страница 16: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide xiv...
Страница 60: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 2 22...
Страница 82: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 3 22...
Страница 100: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 4 18...
Страница 135: ...SMTP Services 5 35 SMTP Content Filtering Target FIGURE 5 20 SMTP Content Filtering Target...
Страница 140: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 5 40...
Страница 180: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 6 40...
Страница 196: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 7 16...
Страница 250: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 10 12...
Страница 258: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 11 8...
Страница 267: ...Analyzing Your Protection Using Logs 12 9...
Страница 268: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 12 10...
Страница 366: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide 15 46...
Страница 372: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide A 6...
Страница 421: ...Introducing Trend Micro Control Manager B 49 5 Select the report format 6 Click Next to proceed to the Targets tab...
Страница 428: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide B 56...
Страница 446: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide D 6...
Страница 448: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide E 2...
Страница 460: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide G 4...
Страница 480: ...Trend Micro InterScan Gateway Security Appliance M Series Administrator s Guide I 20...