McAfee Host IPS 6.0 Connection Aware Groups

Size: px
Start display at page:

Download "McAfee Host IPS 6.0 Connection Aware Groups"

Transcription

1 White Paper July 2006 McAfee Host IPS 6.0 Connection Aware Groups Usage and Configuration Guide

2 Page 2 Table of Contents Topcis Covered 3 Connection Aware Groups Defined 3 McAfee Host IPS Rule Processing 7 Binding to Network Adapters 7 Using McAfee Host IPS Connection Aware Groups 7 Designing Connection Aware Groups 8 Testing Connection Aware Groups 8 Limitation of Connection Aware Groups 9

3 Page 3 McAfee Host IPS 6.0 Connection Aware Groups Usage and Configuration Guide McAfee Host IPS 6.0 combines the protection of local firewall security and intrusion prevention protection at both the host and network levels. Managed by McAfee epolicy Orchestrator, Host IPS 6.0 provides network and security administrators a comprehensive tool in securing hosts throughout the organization. Enhanced features such as connection aware groups provide even more flexibility in designing a robust firewall rule set. The purpose of this paper is to clarify the use of connection aware groups in McAfee s Host Intrusion Prevention 6.0 application. The goal of this paper is to educate McAfee Host IPS Administrators about the use and limitations of connection aware groups. The authors will endeavor to provide answers to some of the more advanced technical questions associated with connection aware groups. The limitations of connection aware groups will be discussed at a technical level. Main Topics Covered: Defining connection aware groups Using connection aware groups to control IP traffic with access control rules Designing and implementing connection aware groups Limitations inherent to using McAfee Host IPS 6.0 connection aware groups Connection Aware Groups Defined McAfee Host IPS 6.0 Firewall connection aware groups (CAG) are sets of firewall rules that can be applied or ignored depending on the criteria defined by the connection aware group properties (see figure 1 for example). The criteria that define a connection aware group are based upon the IP configuration information acquired during network adapter binding. The ability of the firewall to select which rule set to use to filter traffic based on the connection configuration information allows administrators enhanced functionality in applying security measures for the various connection states clients are utilizing in today s diverse business networking. Figure 1 - McAfee Host IPS CAG Example

4 Page 4 Think of the connection aware group as one of several firewalls within the firewall. If the user connects at the company s LAN, then rules applicable to the company s LAN can be applied against the traffic coming from or going to the LAN. If the user connects to the company s RADIUS environment via dial-up, then a different but applicable set of rules can be applied. But if the user connects to an environment for which there are no predefined connection aware groups, the default generic firewall rule set can still be enforced. Options within the criteria are evaluated by OR. If several options are configured for a criterion, the option 1 OR option 2 OR option 3 (etc.) must be met. As soon as one of the options is met, the criterion is considered met. Connection aware groups are defined by one or more criteria based on the network adapter s logical IP configuration. Figure 2 is an excerpt of the results from an ipconfig /all command displaying the adapter s logical IP information. Most of these properties can be used when defining the connection aware group. Figure 2 - IP Configuration Information For each criterion enabled, one or more options can be configured. As the McAfee Host IPS Firewall analyzes the packets, it verifies the local adapter configuration information conforms to the options of the criteria. As soon as one of the options within the criterion is met, McAfee Host IPS will move to the next criterion and begin verifying the configuration information meets one of those options listed. Therefore not all options need be met, but at least one option of each criterion enabled for the connection aware group must be met for it to be utilized. The McAfee Host IPS connection aware group implementation allows for the following possible criteria in defining a group as shown in figure 3: IP Address or Range - Required Default Gateway DHCP Server Primary DNS Server Secondary DNS Server Figure 3 - CAG Properties or Criteria Side Note: The Connection Type is not one of the criteria used to define the connection aware group. The Connection Type is a label to help McAfee Host IPS administrators govern the rule sets. The icon associated to the connection aware group (figure 4) is based on what Connection Type is selected, but traffic is not compared against a VPN connection. It is compared against the criteria defined for the connection aware group as described in the previous paragraph. Primary WINS Server Secondary WINS Server The criteria are evaluated by AND. If criteria 1 and criteria 2 are configured, then criteria 1 AND Criteria 2 must be met. Figure 4 - Connection Type Icons

5 Page 5 Examples: The McAfee Host IPS Administrator wishes to create a simple connection aware group that contains 20 specific firewall rules his company s security policy requires be active when users are connected to the company s LAN, but provide for stricter filtering with a smaller rule set if the user s computer is connected somewhere other than the company s LAN. He knows that the users will always receive an IP address within the /24 subnet issued from the DHCP Server with the address and a WINS Server of address will be provided with the other DHCP configuration information. The Administrator can use these three criteria Local Subnet (figure 5), DHCP Server address (figure 6) and WINS Server address (figure 7) to define the Company LAN connection aware group. He can apply the required rule set to this connection aware group. He can create the stricter rule set outside the connection aware group. When users connect to the company s LAN and the adapter is bound with the expected logical configuration information, the Host IPS Firewall will analyze the packet, determine that the packet is to or from an adapter that meets the criteria for the Company LAN connection aware group, and process the packet with those associated rules. Figure 5 - IP Information List Taking the example further, the McAfee Host IPS Administrator learns that users might travel to a second office in the next state. The assigned subnet there is slightly different ( /24); as is the DHCP Server ( ); and the WINS Server ( ). The Administrator can add this information to the Company LAN connection aware group he has already created as additional options (figures 6 and 7). If a user connects to either site s LAN and the configuration information of the adapter matches one of the options, the criterion is considered to be met. However, all defined criteria of the connection aware group must be met for the connection aware group rule set to be used. It is important to note that if any of the criteria defined for a connection aware group is not met, the rule set attached to the connection aware group is completely bypassed. If all criteria defined for a connection aware group are met, the attached rule set is used. If the traffic does not match any of the rules within the connection aware group, it will be filtered against the remaining general rules or connection aware groups. In more complex configurations, it is common to find rules repeated throughout the McAfee Host IPS Firewall policy because administrators will want to use the same rule in various configurations. Figure 6 - DHCP Server List Figure 7 - Primery WINS List

6 Page 6 The McAfee Host IPS Administrator has another example: One of the Company VPs calls the Host IPS Administrator frustrated that even though he is connected to the company s LAN, he has very limited access. After some brief troubleshooting, the administrator discovers that the IP configuration information for the adapter has been manually set. Although the IP address is correct, no DHCP Server was defined. Because of this, the VP s firewall noted all three criteria defined by the connection aware group were not met. The VP s firewall did not parse the connection aware group associated rule set but went directly to the general rules, which were very limiting (figure 8). Another common example: While the Host IPS Administrator is managing the firewall rules, he notices a client learned rule that is quite common among the users. Upon investigation, the rule is associated to a new application the company requires employees to use. The Host IPS Administrator determines this is an important allow rule to include in the Company s LAN connection aware group and so he does. Soon thereafter, employees complain that when they attempt to use the application while connected to the company s LAN, it fails to run correctly. The Host IPS Administrator reopens the firewall policy and notes the new rule is listed. However, it is listed in the general firewall rule set below the connection aware group and not included within the connection aware group. Because the Company Required Rule #20 limits that specific traffic, Rule #20 will be used and the New Application Rule will not be processed (figure 9). When the Host IPS Administrator moved the new rule into the Company LAN connection aware group above Company Required Rule # 20 and deployed the updated firewall policy, employees noticed the application began functioning correctly. Figure 8 - CAG Associated Rules & General Rules Figure 9 - New Application Rule Outside CAG

7 Page 7 McAfee Host IPS 6.0 Rule Processing The McAfee Host IPS 6.0 Firewall processes traffic exactly the same within a connection aware group as it does with the general rule set. As packets are received by the firewall for analysis, the packet data is compared to the rules in order from the top down. As soon as a rule condition is met, the packet is processed in accordance with the met rule and no further filtering of the packet happens. If a packet is processed against all listed rules without finding a match, the packet is blocked with a default veto rule which will block all traffic not otherwise allowed by the configured firewall rules. The exception to this is when the firewall is in Learn Mode. Therefore it is important to put the most critical and specific rules at the beginning of rule sets within connection aware group or in the general listing to ensure they are processed before a more all-purpose rule is. This ordering process mandates that connection aware groups should be placed in this hierarchical order so that as the packets are processed they do not match a rule unintentionally prior to matching an intended connection aware group. Using McAfee Host IPS 6.0 Connection Aware Groups Connection aware groups allow for complex administration of the McAfee Host IPS Firewall for systems that are routinely connected to a variety of locations that require different network traffic rule sets. Environments with large and varied networks and thus large and varied rule sets are an ideal setting for using connection aware groups to manage these rules. Creating more open rule configurations in trusted networking configurations and stringent general rules allows administrators to enforce network security when systems are connecting to foreign environments. There are any number of scenarios that connection aware groups address with improvements to managing the traffic to and from systems. Connection aware groups are not recommended for simple static networking environments. They can not be used to manage network adapters. Connection aware groups cannot be used to manage traffic based on remote network adapter information but rules can be created to filter the traffic in this way. Example: The McAfee Host IPS Administrator configures a specific rule to block all FTP requests and puts it at the top of the firewall rule list, above the Company LAN connection aware group. But one of the rules within the Company s LAN connection aware group is configured to allow FTP traffic to a specific company FTP server. Because the rule blocking FTP will be processed prior to the connection aware group, the packets will be blocked and the connection aware group rule set will never be parsed. When users connect to the Company LAN, they will not be allowed to use FTP services. NOTE: There is currently one exception to the top down processing of the firewall rules. Block rules specific to defined domain name(s) are processed out of order and before other rules. Binding to Network Adapters McAfee Host IPS Firewall attempts to bind to all network adapters as they are activated during the OS startup, when an adapter is re-enabled or when the IP configuration information is released and renewed. As packets originate from the local system, the networking stack determines which adapter to use. When the packets are queued to be sent, the firewall examines the packets comparing the packet and adapter information against the connection aware groups and firewall rules. The packets will be allowed or blocked based on the outcome of this comparison. As packets arrive from the network to the various adapters, a similar filtering process is initiated. Again, as a packet is examined, filtering decisions based upon the rules and connection aware groups determines if the packet is allowed or blocked. Please see the Limitations of Connection Aware Groups section for specific information related to multi-homed systems and systems with multiple IP addresses assigned to a single network adapter.

8 Page 8 Designing Connection Aware Groups To build a firewall rule set which utilizes connection aware groups effectively and correctly, the Host IPS Administrator will want to consider the following: Rules that are applicable for all connected states Rules that are applicable for each specific connection state Rules that should be applied if the connection state does not meet any specifically defined state Rules Applicable to All Connected States Rules that are applicable for all connected states such as important system boot network processes or blanket denial rules are not required to be placed within a connection aware group. Rather, if the rule will be applicable for any state, regardless of the connection, the rule should be moved to the beginning of the firewall rule list outside and above any connection aware groups. By doing this, the Host IPS Administrator can ensure the rule is processed prior to any configuration dependent rule set applications. The Host IPS Administrator can also reduce the CPU overhead Host IPS uses to determine if the connection aware group criteria are met by the traffic. The Allow BootP rule is a good example of a rule that would be applicable for most connected states, has limited security issues, and will allow the initial adapter configuration to proceed. Rules Applicable to Specific Connected States Determining specific connection applicable rules is the next major phase of designing the rule set. There are two steps to this phase: Identify specific rules that should be utilized for a given connection Determine the various connections that will have specific or unique rules associated by the connection Define one or two general criteria that define the connection aware group note that this is for initial group creation and more specific criteria can and should be added during testing. Add the rules - using the top-down, specific to general model - that are particular to the connection aware group. Rules particular to multiple groups should be included within each applicable group. Ensure that all required specific rules are included within the connection aware groups. Make sure that any required allow rules are appended to the end of the connection aware groups because the default behavior of the firewall is to block any traffic not specifically allowed. Rules Applicable to Non-Specific States the Host IPS Administrator wished to prevent FTP traffic to certain addresses unless the user is connected to the company LAN, he could ensure an ALLOW rule is included in the connection aware group and a BLOCK rule is added after the connection aware groups. Again, any final required allow rules are appended to the end of the general rules list or the traffic will be blocked. Testing Connection Aware Groups It is important to test the firewall rules to verify the network traffic will be filtered as intended via the general and connection aware group rule sets. It is recommended that the Host IPS Administrator create a test environment on which to test the rules. 1. Test the first rules for functionality. a. These rules should not be associated to a connection aware group. b. These rules should allow the system to boot and initialize the desired networking state. 2. Test the connection aware group. a. Create deny or permit rules immediately after the connection aware group that directly oppose the rules within the connection aware group to verify the traffic is being filtered as expected. b. Work through the rule list within the connection aware group verifying each rule is valid and triggered by the correct adapter connection IP configuration information. c. Test any additional connection aware groups, adding contrary rules directly after the connection aware group to identify if the rule is not working. 3. When all connection aware groups are tested, remove the various contrary rules added for testing, leaving the remaining desired non-connection specific general rule set. 4. Ensure the adapters are not matching any connection aware group criteria and begin testing the general rules. 5. Finally, return to the properties of the connection aware groups and add enough criteria to ensure the connection aware group will be utilized when intended. a. Typically define 3 or more criteria. b. Administrators should retest a few of the rules within the connection aware group to ensure the more specific criteria have not become too specific to the point of exclusion. After the connection aware groups are added, append the general Host IPS Firewall rules with any general rules that should be applied if the system does not have any connection that matches any of the preceding connection aware groups. For example, if

9 Page 9 Limitations of Connection Aware Groups Connection aware groups cannot enable or disable adapters based on their criteria or the adapter s settings. The current McAfee Host IPS 6.0 product will only filter traffic from the connected and enabled adapters. Current technology and logic within the application do not allow for adapter or device control. Adaptive rules or Learned Rules are not appended to connection aware groups. If it becomes apparent that important rules learned by the clients need to be included within the appropriate connection aware groups, the administrator will be required to manually add those rules. Because the rules are learned at the client, there is no automated way to incorporate those rules to the firewall policy pushed down from the epo management policy. Connection aware groups cannot be made to identify rogue network environments. The configuration information of a connection aware group can be made very general; however it is impossible to guess all the possible variations associated with rogue networks. Administrators should build connection aware groups based upon network connections they can specifically define. Three or more criteria provide accurate application of the connection aware group. All other unknown adapter configuration traffic should be filtered by the general rule set. Because many networks use private IP addressing schemas, it is very common to find x.x and x.x environments. If too few criteria for a connection aware group are defined, it is possible to match a configuration because it has common traits of the intended network. Host IPS Administrators are encouraged to specify as many criteria as possible to increase the probability of correct identification. The limitation in this case is the connection aware group rules will be filtered against unintended network environments simply because the match the connection aware criteria. There is a documented defect (BZ280294) that identifies a condition where packet information is associated with an internal adapter and can therefore be filtered by any connection aware groups that match any bound addapters criteria. This condition might manifest on systems with multiple network adapters and connection aware groups. McAfee, Inc Freedom Circle, Santa Clara, CA 95054, , McAfee and/or additional marks herein are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners McAfee, Inc. All Rights Reserved.

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Introduction p. xix Assessment Test p. xxxviii Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network Components

More information

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide

McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Lesson Plans Managing a Windows 2003 Network Infrastructure

Lesson Plans Managing a Windows 2003 Network Infrastructure Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Detecting rogue systems

Detecting rogue systems Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often

More information

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work. Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings . Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It

More information

Chapter 3 LAN Configuration

Chapter 3 LAN Configuration Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections

More information

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab

CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Fundamentals of Windows Server 2008 Network and Applications Infrastructure Fundamentals of Windows Server 2008 Network and Applications Infrastructure MOC6420 About this Course This five-day instructor-led course introduces students to network and applications infrastructure

More information

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier

McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation

More information

Transparent Identification of Users

Transparent Identification of Users Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

How to connect your new virtual machine to the Internet

How to connect your new virtual machine to the Internet This excerpt is taken from book Installing and Configuring SharePoint 2010 2 nd Edition. You can download this FREE ebook from the following link: http://walisystemsinc.com/installing_and_configuring_sharepoint2010_2nd_ed.php

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

Chapter 4 Customizing Your Network Settings

Chapter 4 Customizing Your Network Settings Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the RangeMax Dual Band Wireless-N Router WNDR3300, including LAN, WAN, and routing settings.

More information

Cisco AnyConnect Secure Mobility Solution Guide

Cisco AnyConnect Secure Mobility Solution Guide Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page

More information

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server

Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Lab 8.5.3 Configuring the PIX Firewall as a DHCP Server Objective Scenario Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, students will learn the

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Scenario: Remote-Access VPN Configuration

Scenario: Remote-Access VPN Configuration CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security

More information

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1

Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1 Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the

More information

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software McAfee Global Threat Intelligence File Reputation Service Best Practices Guide for McAfee VirusScan Enterprise Software Table of Contents McAfee Global Threat Intelligence File Reputation Service McAfee

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Hosting more than one FortiOS instance on. VLANs. 1. Network topology

Hosting more than one FortiOS instance on. VLANs. 1. Network topology Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of

More information

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software

Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

1 PC to WX64 direction connection with crossover cable or hub/switch

1 PC to WX64 direction connection with crossover cable or hub/switch 1 PC to WX64 direction connection with crossover cable or hub/switch If a network is not available, or if it is desired to keep the WX64 and PC(s) completely separated from other computers, a simple network

More information

Basic IPv6 WAN and LAN Configuration

Basic IPv6 WAN and LAN Configuration Basic IPv6 WAN and LAN Configuration This quick start guide provides basic IPv6 WAN and LAN configuration information for the ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N. For complete IPv6 configuration

More information

Barracuda Link Balancer

Barracuda Link Balancer Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503

More information

Stateful Inspection Technology

Stateful Inspection Technology Stateful Inspection Technology Security Requirements TECH NOTE In order to provide robust security, a firewall must track and control the flow of communication passing through it. To reach control decisions

More information

McAfee Optimized Virtual Environments for Servers. Installation Guide

McAfee Optimized Virtual Environments for Servers. Installation Guide McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

This chapter describes how to set up and manage VPN service in Mac OS X Server.

This chapter describes how to set up and manage VPN service in Mac OS X Server. 6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure

More information

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview

Configuration Guide. How to Configure SSL VPN Features in DSR Series. Overview Configuration Guide How to Configure SSL VPN Features in DSR Series Overview This document describes how to configure D-Link DSR-500N to enable SSL VPN feature. An SSL VPN is a form of VPN that can be

More information

Configuring Routers and Their Settings

Configuring Routers and Their Settings Configuring Routers and Their Settings When installing a router on your home network the routers settings are usually defaulted to automatically protect your home, and simplify setup. This is done because

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Multi-Homing Security Gateway

Multi-Homing Security Gateway Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000

More information

Fireware Essentials Exam Study Guide

Fireware Essentials Exam Study Guide Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Desktop Release Notes. Desktop Release Notes 5.2.1

Desktop Release Notes. Desktop Release Notes 5.2.1 Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

Configuration Example

Configuration Example Configuration Example Set Up a Public Web Server Behind a Firebox Example configuration files created with WSM v11.10.1 Revised 7/21/2015 Use Case In this configuration example, an organization wants to

More information

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network

Protecting a Corporate Network with ViPNet. Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Protecting a Corporate Network with ViPNet Best Practices in Configuring the Appropriate Security Level in Your ViPNet Network Introduction Scope ViPNet technology protects information systems by means

More information

Microsoft Windows Server System White Paper

Microsoft Windows Server System White Paper Introduction to Network Access Protection Microsoft Corporation Published: June 2004, Updated: May 2006 Abstract Network Access Protection, a platform for Microsoft Windows Server "Longhorn" (now in beta

More information

Network Configuration Settings

Network Configuration Settings Network Configuration Settings Many small businesses already have an existing firewall device for their local network when they purchase Microsoft Windows Small Business Server 2003. Often, these devices

More information

Chapter 3 Security and Firewall Protection

Chapter 3 Security and Firewall Protection Chapter 3 Security and Firewall Protection This chapter describes how to use the basic firewall features of the ADSL2+ Modem Router to protect your network. Firewall Settings You can set up the ADSL2+

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

Product Guide. McAfee Endpoint Protection for Mac 2.1.0

Product Guide. McAfee Endpoint Protection for Mac 2.1.0 Product Guide McAfee Endpoint Protection for Mac 2.1.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

Direct or Transparent Proxy?

Direct or Transparent Proxy? Direct or Transparent Proxy? Choose the right configuration for your gateway. Table of Contents Direct Proxy...3 Transparent Proxy...4 Other Considerations: Managing authentication made easier.....4 SSL

More information

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No.

Implementing, Managing and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Course No. COURSE OVERVIEW This five-day instructor-led course provides students with the knowledge and skills to implement and manage a Microsoft Windows Server 2003 network The course is intended for systems administrator

More information

Using Remote Desktop Software with the LAN-Cell

Using Remote Desktop Software with the LAN-Cell Using Remote Desktop Software with the LAN-Cell Technote LCTN0010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

Configuring PA Firewalls for a Layer 3 Deployment

Configuring PA Firewalls for a Layer 3 Deployment Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

Configuration Example

Configuration Example Configuration Example Use NAT for Public Access to Servers with Private IP Addresses on the Private Network Example configuration files created with WSM v11.7.2 Revised 5/10/2013 Use Case In this use case,

More information

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

More information

Step-by-Step Configuration

Step-by-Step Configuration Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which

More information

Data Center Connector for vsphere 3.0.0

Data Center Connector for vsphere 3.0.0 Product Guide Data Center Connector for vsphere 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,

More information

Configuration Example

Configuration Example Configuration Example Use WatchGuard Application Control with Your Existing Firewall Example configuration files created with WSM v11.10.1 Revised 7/21/2015 Use Case An organization wants to block the

More information

Overview of WebMux Load Balancer and Live Communications Server 2005

Overview of WebMux Load Balancer and Live Communications Server 2005 AVANU Load Balancing for Microsoft Office Live Communications Server 2005 WebMux Delivers Improved Reliability, Availability and Scalability Overview of WebMux Load Balancer and Live Communications Server

More information

epolicy Orchestrator Log Files

epolicy Orchestrator Log Files Reference Guide epolicy Orchestrator Log Files For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Chapter 6 Virtual Private Networking

Chapter 6 Virtual Private Networking Chapter 6 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVX538 VPN firewall. VPN tunnels provide secure, encrypted communications between

More information

Kerio VPN Client. User Guide. Kerio Technologies

Kerio VPN Client. User Guide. Kerio Technologies Kerio VPN Client User Guide Kerio Technologies 2011 Kerio Technologies s.r.o. All rights reserved. This guide provides detailed description on Kerio VPN Client, version 7.1 for Windows. All additional

More information

The McAfee SECURE TM Standard

The McAfee SECURE TM Standard The McAfee SECURE TM Standard December 2008 What is the McAfee SECURE Standard? McAfee SECURE Comparison Evaluating Website s Security Status Websites Not In Compliance with McAfee SECURE Standard Benefits

More information

To Configure Network Connect, We need to follow the steps below:

To Configure Network Connect, We need to follow the steps below: Network Connect Abstract: The Network Connect (NC) provides a clientless VPN user experience, serving as an additional remote access mechanism to corporate resources using an IVE appliance. This feature

More information

Preliminary Course Syllabus

Preliminary Course Syllabus Preliminary Course Syllabus Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure: Network Services Elements of this syllabus are subject to change. Key Data Course

More information

McAfee Certified Product Specialist McAfee epolicy Orchestrator

McAfee Certified Product Specialist McAfee epolicy Orchestrator McAfee Certified Product Specialist McAfee epolicy Orchestrator Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 3 Recommended Exam Preparation 4 Exam Objectives

More information

Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters

Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters Dell SonicWALL SRA 7.0 Geo IP & Botnet Filters This document describes how to configure and use Geo IP locations and Botnet filters, introduced in Dell SonicWALL SRA 7.0. This document contains the following

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure Question Number (ID) : 1 (wmpmsp_mngnwi-121) You are an administrator for an organization that provides Internet connectivity to users from the corporate network. Several users complain that they cannot

More information

Using Remote Desktop Software with the LAN-Cell 3

Using Remote Desktop Software with the LAN-Cell 3 Using Remote Desktop Software with the LAN-Cell 3 Technote LCTN3010 Proxicast, LLC 312 Sunnyfield Drive Suite 200 Glenshaw, PA 15116 1-877-77PROXI 1-877-777-7694 1-412-213-2477 Fax: 1-412-492-9386 E-Mail:

More information

Introduction. Assessment Test

Introduction. Assessment Test 61699ftoc.fm Page ix Friday, May 9, 2008 11:26 AM Introduction Assessment Test xvii xxviii Chapter 1 Understanding Windows Server 2008 Networking 1 Understanding the OSI Model 2 Protocol Stacks 4 Communication

More information

BroadCloud PBX Customer Minimum Requirements

BroadCloud PBX Customer Minimum Requirements BroadCloud PBX Customer Minimum Requirements Service Guide Version 2.0 1009 Pruitt Road The Woodlands, TX 77380 Tel +1 281.465.3320 WWW.BROADSOFT.COM BroadCloud PBX Customer Minimum Requirements Service

More information

Using RADIUS Agent for Transparent User Identification

Using RADIUS Agent for Transparent User Identification Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your

More information

Managing Remote Access

Managing Remote Access VMWARE TECHNICAL NOTE VMware ACE Managing Remote Access This technical note explains how to use VMware ACE to manage remote access through VPN to a corporate network. This document contains the following

More information

Chapter 12 Supporting Network Address Translation (NAT)

Chapter 12 Supporting Network Address Translation (NAT) [Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key Objective This article will detail how to setup Cyberoam VPN Client to securely connect to a Cyberoam for the

More information

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service

Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to

More information

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents:

Module 6. Configuring and Troubleshooting Routing and Remote Access. Contents: Configuring and Troubleshooting Routing and Remote Access 6-1 Module 6 Configuring and Troubleshooting Routing and Remote Access Contents: Lesson 1: Configuring Network Access 6-3 Lesson 2: Configuring

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

icrosoft TMG Replacement with NetScaler

icrosoft TMG Replacement with NetScaler icrosoft TMG Replacement with NetScaler Replacing Microsoft Forefront TMG with NetScaler for secure VPN access Table of contents Introduction 3 Configuration details 3 NetScaler features to be enabled

More information

V Series Rapid Deployment Version 7.5

V Series Rapid Deployment Version 7.5 V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation

More information

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,

More information

Configuring Dynamic DNS

Configuring Dynamic DNS 9 CHAPTER This chapter describes how to configure DDNS update methods, and includes the following topics: Information about DDNS, page 9-1 Licensing Requirements for DDNS, page 9-2 Guidelines and Limitations,

More information

Why an Intelligent WAN Solution is Essential for Mission Critical Networks

Why an Intelligent WAN Solution is Essential for Mission Critical Networks Why an Intelligent WAN Solution is Essential for Mission Critical Networks White Paper Series WP100135 Charles Tucker Director of Marketing June 1, 2006 Abstract: Reliable Internet connectivity is now

More information

Unified Threat Management

Unified Threat Management Unified Threat Management QUICK START GUIDE CR35iNG Appliance Document Version: PL QSG 35iNG/96000-10.04.5.0.007/250121014 DEFAULTS Default IP addresses Ethernet Port IP Address Zone A 172.16.16.16/255.255.255.0

More information

Packet Tracer - Troubleshooting IPv4 and IPv6 Addressing Topology

Packet Tracer - Troubleshooting IPv4 and IPv6 Addressing Topology Topology 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 5 Addressing Table Device Interface IPv4 Address IPv6 Address/Prefix Subnet Mask Default Gateway

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Step-by-Step Guide for Setting Up IPv6 in a Test Lab

Step-by-Step Guide for Setting Up IPv6 in a Test Lab Step-by-Step Guide for Setting Up IPv6 in a Test Lab Microsoft Corporation Published: July, 2006 Author: Microsoft Corporation Abstract This guide describes how to configure Internet Protocol version 6

More information

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface

How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Load balance traffic of Mail server hosted in the Internal network and redirect traffic over preferred Interface How To Configure load sharing and redirect mail server traffic over preferred Gateway

More information

Network Instruments white paper

Network Instruments white paper Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features

More information

McAfee Agent Handler

McAfee Agent Handler McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into

More information

VMware vsphere 5.0 Evaluation Guide

VMware vsphere 5.0 Evaluation Guide VMware vsphere 5.0 Evaluation Guide Auto Deploy TECHNICAL WHITE PAPER Table of Contents About This Guide.... 4 System Requirements... 4 Hardware Requirements.... 4 Servers.... 4 Storage.... 4 Networking....

More information

Configuring DHCP Snooping

Configuring DHCP Snooping CHAPTER 19 This chapter describes how to configure Dynamic Host Configuration Protocol (DHCP) snooping on Catalyst 4500 series switches. It provides guidelines, procedures, and configuration examples.

More information

Domain 3.0 Networking... 1

Domain 3.0 Networking... 1 Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right

More information

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning

VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning VPN Configuration Guide SonicWALL with SonicWALL Simple Client Provisioning SonicOS Enhanced 2010 equinux AG and equinux USA, Inc. All rights reserved. Under copyright law, this manual may not be copied,

More information

If you have questions or find errors in the guide, please, contact us under the following e-mail address:

If you have questions or find errors in the guide, please, contact us under the following e-mail address: 1. Introduction... 2 2. Remote Access via PPTP... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Configuration

More information

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller

NETGEAR ProSAFE WC9500 High Capacity Wireless Controller NETGEAR ProSAFE WC9500 High Capacity Wireless Controller Confi guring Microsoft DHCP for the Wireless LAN APPLICATION NOTES INTRODUCTION NETGEAR ProSAFE WC9500 High Capacity Wireless Controllers support

More information