List of Figures

Figure 1: Network Diagram: Sniffer Mode
Figure 2: ACM Configure Virtual Routers Page
Figure 3: Network Diagram: Transparent Mode
Figure 4: Example: Link Aggregation and Asymmetric Routes
Figure 5: ACM Configure Virtual Routers Page
Figure 6: Mixed Deployment Mode
Figure 7: Packet Processing in Simulation Mode
Figure 8: NSM Log Viewer: Simulation Mode Logs
Figure 9: Internal Bypass
Figure 10: External Bypass
Figure 11: Peer Port Modulation
Figure 12: Redundant Path Design: IDP Series HA Depends on NSRP (Juniper Networks SSG Series)
Figure 13: ACM Third-Party HA Pages
Figure 14: NSM Device Cluster
Figure 15: Redundant Path Design: IDP Series HA Depends on STP (Juniper Networks EX Series)
Figure 16: ACM Third-Party HA Pages
Figure 17: NSM Device Cluster
Figure 18: Redundant Path Design: IDP Series HA Depends on STP (Cisco Catalyst Switch)
Figure 19: ACM Third-Party HA Pages
Figure 20: NSM Device Cluster
Figure 21: Coordinated Threat Control Deployment Diagram: SA Series Split Deployment
Figure 22: Coordinated Threat Control Deployment Diagram: SA Series Internal Deployment
Figure 23: Coordinated Threat Control Deployment Diagram: IC Series Deployment
Figure 24: ACM: Generating a One-Time Password for the Connection from an SA Series or IC Series Appliance
Figure 25: IC Series Admin Console: Configuring the Connection to the IDP Series Appliance
Figure 26: Coordinated Threat Control Deployment Diagram: IC Series Deployment
Figure 27: Communication Among User-Role-Based Policy Deployment Components
Figure 28: ACM: Generating a One-Time Password for the Connection from an IC Series Device
Figure 29: IC Series Admin Console: Configuring the Connection to the IDP Series Appliance