X Family Device
usage policy by prohibiting the download of
•Bandwidth management — enforce network usage policy by
•Prioritization of traffic inside and outside VPN tunnels with flexible,
•IP multicast routing
•Device management — option to configure, monitor, and manage the device using either the web- based client application (the Local Security Manager) or the command line interface (CLI).
•Centralized Management — option to configure, monitor, and manage individual or multiple X family devices using the Security Management System (SMS).
•The TippingPoint Intrusion Prevention System (IPS) — identify and stop malicious traffic on the edge of the network using filters that detect and block malicious traffic. Customize default filters to meet the specific needs of your enterprise.
•Digital Vaccine
The following sections describe the X family environment and system components in more detail.
X Family Environment
An X family device can be installed at the perimeter of your network, in your remote offices, on your intranet, or in all three locations. The following diagram shows an example of a corporate network with X family devices deployed in a variety of locations.
X Family LSM User’s Guide V 2.5.1 | 3 |
|
|