X Family Device

usage policy by prohibiting the download of non-work related web sites and offensive or illegal Web content.

Bandwidth management — enforce network usage policy by rate-limiting applications such as peer- to-peer file sharing and instant messaging applications.

Prioritization of traffic inside and outside VPN tunnels with flexible, policy-based controls.

IP multicast routing (PIM-DIM) over IPSec, supporting next-generation IP conferencing applications — prioritizes real-time traffic and provides secure connectivity for IP multicast traffic.

Device management — option to configure, monitor, and manage the device using either the web- based client application (the Local Security Manager) or the command line interface (CLI).

Centralized Management — option to configure, monitor, and manage individual or multiple X family devices using the Security Management System (SMS).

The TippingPoint Intrusion Prevention System (IPS) — identify and stop malicious traffic on the edge of the network using filters that detect and block malicious traffic. Customize default filters to meet the specific needs of your enterprise.

Digital Vaccine real-time protection — the Threat Management Center monitors global network security threats and continually develops new attack filters which are automatically distributed to preemptively protect against the exploit of new and zero day vulnerabilities.

The following sections describe the X family environment and system components in more detail.

X Family Environment

An X family device can be installed at the perimeter of your network, in your remote offices, on your intranet, or in all three locations. The following diagram shows an example of a corporate network with X family devices deployed in a variety of locations.

X Family LSM User’s Guide V 2.5.1

3