Introducing Network VirusWall Enforcer
1-3
Key Concepts
Before proceeding to the succeeding sections of this document, take note of the
following concepts.
T
ABLE
1-1.
Key Concepts in this Document
C
ONCEPT
D
ESCRIPTION
Management port
Dedicated for management purposes. You can specify
only one management port.
Mirror port
Sends all traffic passing the device to a computer to
capture all data. The data can then be used for debug-
ging purposes. You can specify one mirror port. Using
this port type can impact performance.
Regular ports
Carries analyzed traffic to and from segments. You can
specify multiple regular ports.
Regular ports are also referred to as "bridge" ports.
Failopen
A fault-tolerance solution also known as "LAN bypass"
that allows the Network VirusWall Enforcer device to
continue to pass traffic even if a software or hardware
failure occurs within the device.
Preconfiguration
console
The console used to preconfigure a Network VirusWall
Enforcer device.
The preconfiguration process involves port configura-
tion and setup of the management IP address to enable
access to the web console.
Web console
The browser-based administrative console for defining
policies and managing the device.
Summary of Contents for viruswall enforcer 1500i
Page 1: ......
Page 7: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide vi...
Page 13: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide xii...
Page 30: ...Getting Started 2 11 FIGURE 2 7 Standard four port configuration Port 1 Port 3 Port 4 Port 2...
Page 59: ...Trend Micro Network VirusWall Enforcer 1500i Installment and Deployment Guide 3 20...
Page 78: ......