Trend Micro™ Network VirusWall™ Enforcer 2500 Administrator’s Guide
ii
Bridge IP Address ..................................................................... 1-18
Static Routes .............................................................................. 1-20
An Example of When a Bridge IP Address and
Static Route is Necessary .......................................................... 1-20
Security ...................................................................................... 1-22
SNMP Trap Limitations ............................................................ 1-24
SNMP Traps .............................................................................. 1-24
SNMP Agent Messages ............................................................. 1-25
Tagged and Non-tagged Frames ............................................... 1-25
Native VLAN ............................................................................ 1-26
Network VirusWall Enforcer 2500 ..................................................1-27
Nine User-definable LAN Ports ................................................... 1-27
High Availability .......................................................................... 1-28
Redundant Ports and Devices .................................................... 1-28
Failover ...................................................................................... 1-29
Failopen ..................................................................................... 1-30
Policy Prioritization and Creation ............................................. 1-33
Sample Policy Creation .................................................................... 1-37
Sample Policy 1: Authenticated users ....................................... 1-37
Sample Policy 2: Guest users .................................................... 1-41
Sample Policy 3: Catchall ......................................................... 1-44
Sample Deployment Scenarios ......................................................... 1-50
Deployment Scenario I: Standard Network .................................1-50
Deployment Scenario II: Global Site ........................................... 1-52
Deployment Scenario III: Very Large Enterprise or
Internet Service Provider .............................................................. 1-53
Sample Policy Configuration .................................................... 1-54