![Trend Micro viruswall enforcer 1500i Скачать руководство пользователя страница 48](http://html1.mh-extra.com/html/trend-micro/viruswall-enforcer-1500i/viruswall-enforcer-1500i_installation-and-deployment-manual_1155748048.webp)
Deploying Network VirusWall Enforcer
3-9
Key Segments and Critical Assets
Key network segments need to be protected from network-based threats. This may
include a group of endpoint computers or network resources critical to your
organization, such as email, web, or application servers.
F
IGURE
3-5.
Key network segments scenario
The diagram above illustrates a segment of an internal network containing email and
web servers, including endpoints. An internal switch or hub is connected to a regular
port (see
on page 1-3 for information about different types of ports),
creating a segment where all packets going in and out of the segment can be scanned.
Installing the device in this position adds the benefits of virus scanning and segment
isolation in the event of a virus outbreak.
Critical hosts
L2 switch
L3 switch
Содержание viruswall enforcer 1500i
Страница 1: ......
Страница 7: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide vi...
Страница 13: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide xii...
Страница 30: ...Getting Started 2 11 FIGURE 2 7 Standard four port configuration Port 1 Port 3 Port 4 Port 2...
Страница 59: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide 3 20...
Страница 78: ......