3-1
Chapter 3
Deploying Network VirusWall
Enforcer
Before configuring a Network VirusWall Enforcer device, plan how to integrate the
device into your network. Determine the topology it will support.
This chapter explains how to plan for the deployment. It also provides deployment
scenarios to help you understand the various ways the device can protect your network.
This chapter discusses the following topics:
•
•
•
•
•
•
Redefining Your Deployment Strategy
•
Summary of Contents for viruswall enforcer 1500i
Page 1: ......
Page 7: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide vi...
Page 13: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide xii...
Page 30: ...Getting Started 2 11 FIGURE 2 7 Standard four port configuration Port 1 Port 3 Port 4 Port 2...
Page 59: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide 3 20...
Page 78: ......