05.08.2013 Views

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

Trend Micro InterScan Gateway Security Appliance M-Series ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

fig. 2-03. <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

and clients deployed 2-4<br />

fig. 2-04. Problem: The appliance and clients<br />

deployed in different network segments,<br />

with router as default gateway of the appliance<br />

and no static routes set 2-6<br />

fig. 2-05. Solution:Static route settings tell the<br />

appliance where to forward traffic from clients<br />

deployed, even though they are in a different<br />

network segment 2-7<br />

fig. 2-06. You can set static routes from the<br />

Web console (Administration > IP Address<br />

Settings, Static Routes tab) 2-8<br />

fig. 2-07. In transparent proxy mode, the client’s<br />

IP address becomes that of the appliance<br />

2-10<br />

fig. 2-08. In fully transparent proxy mode, the<br />

client’s IP address becomes that of the appliance<br />

2-12<br />

fig. 2-09. Deployment in a DMZ environment<br />

(requires two appliances) 2-13<br />

fig. 2-10. Two <strong>InterScan</strong> appliances arranged<br />

in a link state failover deployment 2-15<br />

fig. 2-11. Recommended position of <strong>InterScan</strong><br />

<strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> and other network<br />

devices in single- or multi-segment<br />

environments 2-17<br />

<strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong> is not a<br />

firewall or a router 2-2<br />

most common deployment scenario 2-3<br />

options 2-1<br />

Deployment Guide 2-1<br />

Description of <strong>InterScan</strong> <strong>Gateway</strong> <strong>Security</strong> <strong>Appliance</strong><br />

1-2<br />

Device<br />

address checklist E-1<br />

connectivity<br />

ping 1-17, 2-20<br />

testing 1-17, 2-20<br />

dimensions and weight G-2<br />

image 15-4<br />

downloading it from the <strong>Trend</strong> <strong>Micro</strong> Web site<br />

15-7<br />

update 15-4<br />

Device image. See Firmware.<br />

Dimensions and weight G-2<br />

Disk SMART Test<br />

Scheduled disk SMART test, enable 13-9<br />

DMZ environment, deploying in 2-13<br />

Documentation feedback 1-ii<br />

Dynamic Reputation database 3-12<br />

E<br />

Email “Remove” Scenarios 8-7<br />

Email notifications 14-8<br />

Email Reputation Services<br />

Dynamic Reputation database 1-4<br />

Standard Reputation database 1-4<br />

ERS. See Email Reputation Services.<br />

Ethernet cable 14-7<br />

European Institute for Computer Antivirus Research<br />

(EICAR)<br />

EICAR test virus 14-13<br />

Exported query file examples 10-8<br />

EXT port 1-16, 2-19<br />

F<br />

Factory default settings 14-7<br />

False positives C-3<br />

FAQs<br />

Can I ping the appliance? 14-7<br />

Can I use the USB ports to transfer files? 14-7<br />

Is a crossover network cable needed? 14-7<br />

RESET Pinhole 14-7<br />

What is the purpose of the “ID” LED? 14-7<br />

Why am I not receiving email notifications? 14-8<br />

Why does quarantine action fail? 14-8<br />

Why is traffic not passing through the appliance<br />

when power is off? 14-8<br />

Will the <strong>Appliance</strong> still work if the hard disk is not<br />

working? 14-7<br />

Feature execution order C-12<br />

Features and benefits 1-3<br />

Feedback, documentation 1-ii<br />

File Blocking<br />

types 3-18<br />

File formats, blockable F-4<br />

File Handling<br />

handling compressed files 14-14<br />

handling large files 14-16<br />

I–5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!