Symantec 10521148 Implementation Guide - Page 41

Deployment using in-line mode, Comparing in-line mode to passive mode, Interface grouping

Page 41 highlights

Deploying the 7100 Series 33 Deployment options The 7100 Series node receives incoming network traffic on one interface of the in-line pair, then the Network Security detection software analyzes the traffic for malicious content. Once the analysis is complete, Network Security sends the traffic out on the other interface. You can select alerting or blocking mode for each in-line pair by customizing and applying a protection policy to the in-line pair. A protection policy is a collection of attack types combined with configurable responses. Some protection policies support blocking, and others do not. You can only enable blocking for in-line pairs. For more information about protection policies, see "About protection policies" on page 116, and the Symantec Network Security Administration Guide. Deployment using in-line mode The initial setup for in-line mode requires an interruption to network traffic while you make the necessary cabling changes. The appliance must be physically connected as part of the network path to block malicious traffic from reaching its target inside your network. See "Cabling" on page 49. Comparing in-line mode to passive mode Table 3-1 illustrates the differences and similarities between in-line mode and passive mode on the Symantec Network Security 7100 Series. Table 3-1 In-line mode compared to passive mode Feature or characteristic Alerting Blocking Interrupts traffic during setup Number of interfaces used In-line mode Yes Yes Yes 2 Passive mode Yes No No 1 Interface grouping You can use interface grouping when asymmetric traffic patterns appear in your network. Asymmetric routing occurs when network traffic to and from a given IP address does not follow the same path. Interface grouping is the solution to this problem.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

33
Deploying the 7100 Series
Deployment options
The 7100 Series node receives incoming network traffic on one interface of the
in-line pair, then the Network Security detection software analyzes the traffic
for malicious content. Once the analysis is complete, Network Security sends the
traffic out on the other interface.
You can select alerting or blocking mode for each in-line pair by customizing
and applying a protection policy to the in-line pair. A protection policy is a
collection of attack types combined with configurable responses. Some
protection policies support blocking, and others do not. You can only enable
blocking for in-line pairs. For more information about protection policies, see
“About protection policies”
on page 116, and the
Symantec Network Security
Administration Guide
.
Deployment using in-line mode
The initial setup for in-line mode requires an interruption to network traffic
while you make the necessary cabling changes. The appliance must be
physically connected as part of the network path to block malicious traffic from
reaching its target inside your network. See
“Cabling”
on page 49.
Comparing in-line mode to passive mode
Table 3-1
illustrates the differences and similarities between in-line mode and
passive mode on the Symantec Network Security 7100 Series.
Interface grouping
You can use interface grouping when asymmetric traffic patterns appear in your
network. Asymmetric routing occurs when network traffic to and from a given
IP address does not follow the same path. Interface grouping is the solution to
this problem.
Table 3-1
In-line mode compared to passive mode
Feature or characteristic
In-line mode
Passive mode
Alerting
Yes
Yes
Blocking
Yes
No
Interrupts traffic during setup
Yes
No
Number of interfaces used
2
1