McAfee HARDWARE 1.4 Guida di Installazione Pagina 13

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 61
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 12
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 13 of 61
Figure 1: Architectural Diagram (placement in network)
1.6.2 Virtual hosts
The MEG appliance allows creation of virtual hosts. Using virtual hosts, a single appliance can appear to
behave like several appliances. Each virtual host can manage traffic within specified pools of IP
addresses, enabling the appliance to provide scanning services to traffic from many sources or
customers.
1.6.3 Clustering
The MEG appliance also allows grouping of appliances into clusters. A cluster is a group of appliances
that shares both its configuration and balances the network traffic. The cluster can contain:
One cluster master. The master both synchronizes the configuration and balances the load of
network traffic to the other cluster members.
and at least one of the following:
One cluster failover. If the cluster master fails, the cluster failover will seamlessly take over the
work of the cluster master.
One or more cluster scanners. They scan traffic according to the policies synchronized from the
master.
Note that the master and the failover can also scan traffic.
1.6.4 MEG Operating System
The MEG operating system is a tailored version of Redhat Linux 9, Kernel 2.6.27-31 that integrates the
operation of all McAfee MEG support modules and provides the operational environment for executing the
Vedere la pagina 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 60 61

Commenti su questo manuale

Nessun commento