- ページ 2
ネットワーク・ハードウェア Cisco 3D1000のPDF クイック・スタート・マニュアルをオンラインで閲覧またはダウンロードできます。Cisco 3D1000 4 ページ。
3D500/1000/2000
Deploying the Appliance
Your device is typically deployed inside a fi rewall, where it
is connected to your trusted management network and the
various network segments you want to monitor.
In a simple deployment scenario, you connect the management
interface on your device to your trusted management network
using an Ethernet cable, then connect the sensing interfaces
to the network segments you want to monitor using the
appropriate cables (copper or fi ber) in either a passive or inline
cabling confi guration.
The trusted management network (a restricted network
protected from unauthorized access) may have a single secure
connection to the Internet for security updates and similar
functions, but is separate from the rest of your network and is
not accessible to hosts used in daily business operations.
You can connect sensing interfaces to different network
segments dedicated to particular components of your business
that have distinct security requirements to target policies
based on the needs for specifi c segments. These segments
can include the DMZ (outward-facing servers, such as mail,
ftp, and web hosts), your internal network (hosts used in
daily operation and similar applications), and the core (hosts
reserved for critical business assets), and can also include
segments dedicated to remote locations, mobile access, or
other functions.
How you cable your sensing interfaces determines your
confi guration options. If you use passive cabling, you can
confi gure passive sensing interfaces. If you use inline cabling,
you can create passive, inline, or inline with bypass interfaces
on your device. For more information on deployment options
and interface confi gurations and how they affect product
features, see the Sourcefi re 3D System User Guide and the
Sourcefi re 3D System Installation Guide .
Cabling the Device
You can cable your device to confi gure passive or inline interfaces, depending on your deployment needs.
Use passive cabling if you want to:
•
monitor traffi c
•
collect information about hosts, operating systems, applications, users, fi les, networks, and vulnerabilities
Use inline cabling if you want to use the same features as a passive deployment, and use policies to block traffi c based
on access control features such as application control, user control, security intelligence, URL dispositions, fi le control,
malware detection, or intrusion prevention
Use the appropriate cables (as indicated by your interface) and cabling diagram for the interface you want to confi gure,
then use the web interface on the Defense Center to confi gure the interfaces. See Connecting the Sensing Interfaces on
page 3.
Quick Start Guide - 3D500/1000/2000 Devices
Page 2 of 4
DEPLOYMENT and CABLING
2014-5.2-3