Understanding Trend Micro™ Network VirusWall™ Enforcer 2500
1
-
19
What happens:
1.
Network VirusWall Enforcer (NVWE) receives traffic with Endpoint 2’s IP and
MAC addresses. The path of the traffic is: Endpoint 2 -> L2 Switch -> NVWE.
2.
Network VirusWall Enforcer (NVWE) sends the blocking page and deploys
Policy Enforcement Agent to Endpoint 2. The path of the traffic is: NVWE -> L3
Switch -> NVWE -> L2 Switch -> Endpoint 2.
3.
After performing an assessment, Policy Enforcement Agent sends the results to
Network VirusWall Enforcer. The path of the traffic is: Endpoint 2 -> L2 Switch
-> NVWE -> L3 Switch -> NVWE.
Network VirusWall Enforcer receives Endpoint 2’s IP address and L3 Switch’s
MAC addresses because L3 Switch forwards the results.
4.
Network VirusWall Enforcer adds a new record with Endpoint 2’s IP address and
L3 Switch’s MAC addresses after receiving the results.
5.
Endpoint 2 tries to refresh the page to continue, but remains in the assessment
stage because the wrong data (Endpoint 2’s IP address and the L3 Switches MAC
addresses) was stored.
F
IGURE
1-5.
An Example of When a Bridge IP Address is Necessary