X Family Environment
The Security Management System (SMS) provides functionality beyond that provided by the LSM and CLI. The SMS enables you to manage not one but multiple devices. The SMS coordinates all X Family and IPS devices across your environment for administration, configuration, and monitoring. Most important, the SMS includes
From the SMS, you must set an overall profile of settings for each X Family device. The profile controls how the device responds to traffic that matches filters. The X Family device is always in Active mode and reacts to traffic as specified by the appropriate filter.
The LSM and the X Family device maintain a connection to the Threat Management Center (TMC), which is located at TippingPoint headquarters. The TMC monitors 10,000 sensors around the world for the latest attack information. As a result, your network can be continually inoculated.
Each component of the X Family environment is discussed in more detail in the following sections. Additional information about the X Family devices is available in the X Family Concepts Guide.
Optimized VPN Connectivity
The X Family VPN features support IPSec, L2TP, and PPTP tunneling protocols, as well as DES, 3DES,
Policy Enforcement
Policy enforcement includes the X Family device firewall, content filtering, and the IPS. The X Family device has a stateful inspection firewall with a
Security Zones and Network Interfaces
Security Zones enable you to segment your network into trusted areas. Traffic within a security zone is switched at wire speed and is not inspected. Traffic between two security zones is inspected by the firewall, IPS, and other security services. A security zone can be associated with one or more physical ports or can exist only virtually by logical definition (no ports). A virtual zone is useful for terminating VPNs such that traffic can be inspected within the VPN tunnel after decryption as part of routing to the destination security zone. Policy enforcement is applied to traffic that moves between security zones. Network virtual interfaces enable you to connect multiple Layer 3 networks to the X family device. Each Security Zone needs to be associated with a Virtual Interface. A Virtual Interface can be associated with multiple security zones in a transparent/bridged deployment where security is still enforced but the device is deployed easily into an existing Layer 2 network. Security zones can be defined through 802.1q VLAN tags.
X Family Hardware Installation Guide V 2.5.1 | 19 |
|
|