McAfee HARDWARE 1.4 Guide d'installation Page 13

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 61
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 12
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 13 of 61
Figure 1: Architectural Diagram (placement in network)
1.6.2 Virtual hosts
The MEG appliance allows creation of virtual hosts. Using virtual hosts, a single appliance can appear to
behave like several appliances. Each virtual host can manage traffic within specified pools of IP
addresses, enabling the appliance to provide scanning services to traffic from many sources or
customers.
1.6.3 Clustering
The MEG appliance also allows grouping of appliances into clusters. A cluster is a group of appliances
that shares both its configuration and balances the network traffic. The cluster can contain:
One cluster master. The master both synchronizes the configuration and balances the load of
network traffic to the other cluster members.
and at least one of the following:
One cluster failover. If the cluster master fails, the cluster failover will seamlessly take over the
work of the cluster master.
One or more cluster scanners. They scan traffic according to the policies synchronized from the
master.
Note that the master and the failover can also scan traffic.
1.6.4 MEG Operating System
The MEG operating system is a tailored version of Redhat Linux 9, Kernel 2.6.27-31 that integrates the
operation of all McAfee MEG support modules and provides the operational environment for executing the
Vue de la page 12
1 2 ... 8 9 10 11 12 13 14 15 16 17 18 ... 60 61

Commentaires sur ces manuels

Pas de commentaire