About This Guide; Threat Management Center; Threat Suppression Engine - HP TippingPoint Series Hardware Installation And Safety Manual

Table of Contents

Advertisement

by the number of filters installed, the highly-scalable capacity of the hardware engine allows thousands of
filters to run simultaneously with no impact on performance or accuracy.

Threat Management Center

The Threat Management Center (TMC) is a centralized service center that monitors global threats and
distributes up-to-date attack filter packages, software updates, and product documentation.
The Threat Management Center (TMC) collects threat information and creates Digital Vaccine packages
that are made available on the TMC web site. The packages include filters that block malicious traffic and
attacks on your network. The filters provide the following protections:
Application Protection — Defend against known and unknown exploits that target applications and
operating systems:
• Attack Protection filters — Detect and block traffic known to be malicious, suspicious, and to have
known security implications. These filters include the following: Vulnerabilities and Exploits filters.
• Security Policy filters — Detect and block traffic that may or may not be malicious. This traffic may
be different in its format or content from standard business practice, aimed at specific software or
operating systems, or contrary to your company's security policies.
• Reconnaissance filters — Detect and block scans, sweeps, and probes for vulnerabilities and
information about your network. These filters include the following: Probes and Sweeps/Scans
filters.
• Informational filters — Detect and block classic Intrusion Detection System (IDS) infiltration
Infrastructure Protection — Protect network bandwidth and network infrastructure elements such as
routers and firewalls from attack using a combination of filter types:
• Advanced DDoS filters — Available on the 2400E and 5000E. Detect and block denial of service
and flood requests, such as SYN Requests, that can overwhelm a system.
• Network Equipment Protection filters — Protect networked equipment from attacks
• Traffic Normalization filters — Detect and block abnormal or malicious traffic
Performance Protection — Allow key applications to have prioritized bandwidth access setting that
ensure mission critical applications have adequate performance during times of high congestion:
• Misuse and Abuse filters — Protect the resources and usage of file sharing across networks and
personal computers. These filters protect peer-to-peer services.
• Traffic Management filters — Protect the network by shielding against IP addresses or permitting
only a set of IP addresses
TippingPoint 10/110/330 Hardware Installation and Safety Guide
5

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Tippingpoint 110Tippingpoint 10Tippingpoint 330

Table of Contents