Download Print this page

Trend Micro Network VirusWall Enforcer 1200 Quick Start Manuals

Hide thumbs Also See for Network VirusWall Enforcer 1200:

Advertisement

Quick Links

TREND MICRO
TM
Network VirusWall™ Enforcer 1200
Trend Micro™ Network VirusWall™ Enforcer 1200 (NVWE) controls access to the corporate network
to ensure that all devices-managed or unmanaged, local or remote-comply with corporate security
policies before they connect. It prevents security risks from entering the network by scanning devices
for the most up-to-date security software and critical Microsoft patches.
Use this Quick Start Guide to get Network VirusWall Enforcer 1200 up and running on your network.
To obtain more information on product features and configure more advanced settings, see the
following documentation:
Getting Started Guide — Helps you plan for deployment and perform initial tasks.
Administrator's Guide — Helps you configure all product features.
Online help — Helps you configure all features and is accessible from the Web console. To
access the online help, open the Web console and click the help icon
Readme — Contains late-breaking product information that might not be found in the other
documentation. Topics include a description of features, installation tips, known issues, and
product release history.
Note:
Trend Micro recommends checking the corresponding link from the Update Center
(http://www.trendmicro.com/download) for updates to the Upgrade Guide, Quick Start Guide,
Getting Started Guide, Administrator's Guide, Readme, and program file.
1
1
Open and inspect the Network VirusWall Enforcer 1200 carton
Please verify that the carton contains each of the following items:
Network VirusWall 1200
Power Cord
Ethernet Cable
(RJ-45 Crossover)
Rack Ears
Console Cable (RS-232)
Document Set
Contact Information
• Local offices: http://www.trendmicro.com/en/about/contact/us.htm
• Phone: + 1 (800) 228-5651 or + 1 (408) 257-1500
• Address: Trend Micro, 10101 N. De Anza Blvd, Cupertino, CA - 95014, USA
2
2
Understand Network VirusWall Enforcer 1200
Network VirusWall Enforcer 1200 scans all inbound and outbound traffic.
LCD module
and panel
CONSOLE
Port 1 Port 2
Explanation of front panel items
The front panel of Network VirusWall Enforcer 1200 contains a Liquid Crystal Display (LCD),
panel, ports, and LEDs. The following table describes each front panel element.
E l e m e n t
Descr ip tio n
A 2.6 in x 0.6 in (65mm x 16mm) dot display LCD that is capable of
Liquid Crystal Display (LCD)
displaying messages in 2 rows of 16 characters each.
Panel
5-button control panel that provides LCD navigation.
RESET Button
Resets the device.
Ports 1,2
The Network VirusWall Enforcer 1200 documentation refers to each
port by its number (for example, port 1 or 2).
Management Port
Connect to this port to access the Network VirusWall Enforcer 1200
Web console. This port can also be used as a mirror port.
CONSOLE
Connect to this port to access the Network VirusWall Enforcer
Preconfiguration console.
Quick Start Guide
Quick Start Guide
.
Explanation of LED indicators
Network VirusWall Enforcer 1200 has three light emitting diodes (LEDs) that indicate SYSTEM,
POLICY, and OUTBREAK status. The following table shows the possible behavior for each LED.
L ED
System
Red - flashing
Red - steady
Green - steady
Outbreak
Green - steady
Red - flashing
Green - flashing
Policy
Off (no color)
Fan vent (exhaust)
Management/
Network VirusWall Enforcer 1200 back
Mirror port
The back panel of Network VirusWall Enforcer 1200 contains a power receptacle, power switch,
and fan vents.
E l e m e n t
AC Power Receptacle
Reset button
LEDs
Power Switch
Fan Vent (Intake)
Fan Vent (Exhaust)
3
3
Decide the network configuration
Before proceeding with the Network VirusWall Enforcer 1200 setup, decide how to integrate the
device into your network and determine which topology it will support. Position Network
VirusWall Enforcer 1200 between layer 2 (L2) or layer 3 (L3) devices to scan all packets entering
and leaving that section of the network.
Identify segments of your network to protect by considering which kinds of endpoints may
introduce viruses or violate security policies. Also, consider the location of resources that are
critical to your organization. Policies are applied based on the trigger criteria that the endpoint
matches. Once an endpoint matches the trigger criteria of one policy, only that policy is applied
to the endpoint.
System
Outbreak
Policy
S tat e
D es cr ipt io n
Device is booting.
Power-On Self-Test (POST) error.
Network VirusWall Enforcer 1200 program file (firmware) is ready.
Registered to Control Manager.
OPS is enabled.
Network Scan, or Policy Enforcement is enabled.
No multiple policy scan.
AC power receptacle
Power switch
Fan vent (intake)
Descrip t ion
Connects to the power outlet and the device using the power cord
(included in the package, see Package Contents on page 1-2).
Powers the device on and off.
Intake cooling vent for the device.
Exhaust cooling vent for the device.
Router or Switch
Network VirusWall Enforcer 1200
Router or Switch
Endpoints
Hardware Setup
Use the chart below to prepare the network values for which Network VirusWall Enforcer 1200
will prompt you.
Value
Your Answer
IP address
Netmask
Default gateway
DNS server 1
DNS server 2
VLAN
To register Network VirusWall Enforcer 1200 to Trend Micro Control Manager, you need to
prepare additional Control Manager specific information. Refer to Appendix B in the
Administrator's Guide for more information about Control Manager and instructions on
registering Network VirusWall Enforcer 1200 to Control Manager.
4
4
Mount the Network VirusWall Enforcer 1200 device
Mount the Network VirusWall Enforcer 1200 device in a standard, 19-inch four-post rack
cabinet, or on any stable surface as a freestanding device. Instructions can be found in
the Getting Started Guide, which is available in print, on the Network VirusWall Enforcer
1200 CD, and from the Trend Micro Update Center.
When mounting the device, be sure to allow at least two inches clearance in all directions
for cooling.
5
5
Prepare the Preconfiguration console
The computer you choose for preconfiguration must have HyperTerminal.
To prepare the Preconfiguration console:
1. Connect one end of the included console cable to the CONSOLE port on the front panel of the
device and the other end to the serial port (COM1, COM2, or other COM port) on a computer.
2. Open HyperTerminal:
a. Click Start > Programs > Accessories > Communications > HyperTerminal.
HyperTerminal prompts you for location information.
b. Click Cancel when prompted for dial-up location information.
c. Type the information and press Enter to enter information in the terminal interface.
d. On the HyperTerminal window, click File > Properties.
e. Click the Settings tab.
f. Under Backspace key sends, select Del.
Tip:
Trend Micro recommends configuring HyperTerminal properties so that the
backspace key is set to delete.
3. To prepare HyperTerminal for optimal use, set the following properties:
● Bits per second: 115200
● Data Bits: 8
● Parity: None
● Stop bits: 1
● Flow control: None
● Emulation: VT100
Endpoints

Advertisement

loading
Need help?

Need help?

Do you have a question about the Network VirusWall Enforcer 1200 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Trend Micro Network VirusWall Enforcer 1200

  • Page 1 Microsoft patches. System Network VirusWall Enforcer 1200 Use this Quick Start Guide to get Network VirusWall Enforcer 1200 up and running on your network. Outbreak To obtain more information on product features and configure more advanced settings, see the...
  • Page 2 Test and finish setting up Network VirusWall Enforcer 1200 2. Power on the device. © 2006 by Trend Micro Incorporated. All rights reserved. No part of this publication may be reproduced, photocopied, stored on a retrieval Note: Network VirusWall Enforcer 1200 can handle various interface speed Trend Micro recommends that you update the pattern files and test your installation to confirm system, or transmitted without the prior written consent of Trend Micro Incorporated.