Job Management Partner 1/Client Security Control Description, User's Guide and Operator's Guide

[Contents][Glossary][Index][Back][Next]


4.1.2 Designing a system configuration

After giving consideration to the functionality to be used, design a system configuration to suit the scale and environment for the system.

This section describes a basic configuration, and a configuration for a large-scale system. This section also describes a system configuration for operating a client security control system with a remote management server, and a configuration using a quarantine system.

Organization of this subsection
(1) Basic configuration
(2) Configuration for a large-scale system
(3) Configuration for operation with a remote management server
(4) Configuration for using a quarantine system

(1) Basic configuration

In a basic configuration of a client security control system, client monitoring is performed using one management server and one network control server.

The following figure shows a basic configuration.

Figure 4-1 Basic configuration

[Figure]

(2) Configuration for a large-scale system

For organizations with a large number of clients or sites, a relay system is used to achieve a hierarchical configuration. On the relay system, install either JP1/Software Distribution Client (relay system) or JP1/Software Distribution SubManager.

The following figure shows a configuration for a large-scale system.

Figure 4-2 Configuration for a large-scale system

[Figure]

(3) Configuration for operation with a remote management server

To control client network connections from another system or to automatically update the judgment policies for anti-virus products by linkage with JP1/CSC - Manager Remote Option, you must use a system configuration that links with the other system, such as a model system for your anti-virus product. In such a configuration, JP1/CSC - Manager Remote Option must be installed on the remote management server.

The following figure shows a configuration with a remote management server.

Figure 4-3 Configuration with a remote management server

[Figure]

(4) Configuration for using a quarantine system

If clients with a high security risk level are detected, you can use a quarantine system to take security measures on these clients.

The following figures show the configuration of a system linked to JP1/Network Monitor and the configuration of a system linked to an authentication server.

Figure 4-4 Quarantine system configuration for linkage with JP1/NM

[Figure]

Figure 4-5 Quarantine system configuration for linkage with an authentication server

[Figure]

For details about operating a quarantine system, see Part 5. Quarantine Systems.

[Contents][Back][Next]


[Trademarks]

All Rights Reserved. Copyright (C) 2009, 2011, Hitachi, Ltd.
Copyright, patent, trademark, and other intellectual property rights related to the "TMEng.dll" file are owned exclusively by Trend Micro Incorporated