Table of Contents
Table of Contents
Table of Contents | i |
List of Figures | v |
List of Tables | vii |
About This Guide | ix |
Overview | ix |
Target Audience | ix |
Organization | x |
Conventions | xi |
Headings | xi |
Typeface | xi |
Cross References | xi |
Messages | xi |
Related Documentation | xiii |
Customer Support | xv |
Contact Information | xv |
Chapter 1: Overview | 1 |
Overview | 1 |
TippingPoint | 1 |
Core Functionality | 2 |
TippingPoint | 2 |
Optimized VPN Connectivity | 3 |
Policy Enforcement | 3 |
Security Zones and Network Interfaces | 3 |
TippingPoint IPS | 3 |
Threat Suppression Engine | 4 |
Local Security Manager | 4 |
Security Management System | 5 |
Threat Management Center | 5 |
i