Application Note. Protecting Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
|
|
|
- Nicholas Cannon
- 10 years ago
- Views:
Transcription
1 Application Note Protecting Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide highly secure protection for critical control systems for utility, power, energy, water, chemical, and manufacturing industries.
2 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners. 2 Protecting Industrial Control Systems using McAfee Firewall Enterprise
3 About this document In this document... About this document on page 3 ICS security guidelines met by McAfee Firewall Enterprise on page 4 Deployment scenario on page 10 Create your security policy on page 12 Create a VPN to allow corporate users to access the PCN on page 21 Perform post-configuration tasks on page 24 About this document This document describes how to configure McAfee Firewall Enterprise (Sidewinder) to provide secure protection for critical control systems for utility, power, energy, water, chemical, and manufacturing industries. It includes configuration options and firewall rules that ensure compliance to security guidelines recommended by the following organizations: North American Electric Reliability Corporation (NERC): Critical Infrastructure Protection (CIP) Reliability standards CIP National Institute of Standards and Technology (NIST): Special Publication , final public draft (September 2008). Guide to Industrial Control Systems (ICS) Security. National Institute of Standards and Technology (NIST): Special Publication , Rev 2 (December 2007). Information Security; Recommended Security Controls for Federal Information Systems, Appendix I. Centre for Protection of National Infrastructure (CPNI): Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks (February 2005). Note: The security guidelines listed in this document stipulate that remote (off-site) users must be authenticated by the corporate firewall (see Figure 1 on page 10) before their connections are forwarded to the McAfee Firewall Enterprise for re-authentication and access authorization. For instructions, see the application note titled Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder), available at mysupport.mcafee.com. About industrial control systems Industrial control systems (ICS) use commercial information technologies such as Ethernet, TCP/IP, and Windows for both critical and non-critical control and monitoring communications. Use of these commercial technologies results is significantly less isolation from the outside world for vital ICS systems in process control networks (PCNs). About McAfee Firewall Enterprise McAfee Firewall Enterprise employs SecureOS and Type Enforced Access Control as the backbone for strong security. SecureOS is a hardened and enhanced UNIX operating system that employs patented Type Enforcement security technology, resulting in superior network security and no emergency security patches to apply. To enforce network separation, McAfee Firewall Enterprise uses a logical division of network spaces called burbs. Burbs divide networks from each other, and each burb connects the firewall to systems with the same security requirements. By reducing the administration footprint, enforcing separate domains for each process, and using a separate network stack for each network interface, SecureOS and Type Enforcement remove the inherent security risks often found in a network application running on non-security focused commercial operating systems. 1 This document was previously maintained by the NISCC (National Infrastructure Security Co-ordination Centre), which was incorporated into CPNI. Protecting Industrial Control Systems using McAfee Firewall Enterprise 3
4 ICS security guidelines met by McAfee Firewall Enterprise ICS security guidelines met by McAfee Firewall Enterprise This section summarizes guidelines for Industrial Control System security, as extracted from the documents named in About this document on page 3. It also includes McAfee Firewall Enterprise configuration recommendations to address these guidelines. The guidelines are divided into the following sections: Network separation and segmentation on page 4 Access control on page 5 Common protocols on page 6 User authentication on page 7 Network address translation (NAT) on page 7 Remote access guidelines on page 8 Virus scan and intrusion detection/prevention guidelines on page 8 Firewall management, logs, and audit guidelines on page 9 Note: McAfee Firewall Enterprise allows only the traffic that matches the rules you have created. Many of the guidelines listed in the above sections should be addressed by adhering to best security practices when creating policy. Network separation and segmentation Table 1 shows network separation and segmentation security guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 1 Network separation and segmentation guidelines Security guidelines Use security zones (DMZs) to enforce network separation and prevent issues in one area from migrating to another. Group and separate key devices into zones with common security levels. Use segmentation to restrict access: Terminate all traffic in the DMZ. Permit controlled communications between the DMZ and the corporate network and between the DMZ and the PCN. Deny direct communications between the PCN and corporate network. Place the Historian and similar plant information servers in a DMZ where they can communicate with PCN devices using insecure protocols such as MODBUS/TCP or DCOM and communicate with the corporate network using HTTPS, HTTP or SQL. Create an additional DMZ for controlling remote administration and service connections to the PCN. McAfee Firewall Enterprise configuration recommendation To enforce network separation: Create a unique burb for each network you want to isolate. If necessary, use VLANs to sub-divide LAN segments that are contained by burbs. As necessary, create rules that allow selective communication between the following burb pairs: DMZ and corporate DMZ and PCN Do not create any rules that allow direct communication between the PCN and corporate burbs. Create proxy rules to allow the Historian and plant information servers to communicate with: PCN devices using SCADA protocols. The corporate network using the HTTP, HTTPS, or SQL protocols. Create a DMZ burb to contain remote administration and service connections. 4 Protecting Industrial Control Systems using McAfee Firewall Enterprise
5 ICS security guidelines met by McAfee Firewall Enterprise Table 1 Network separation and segmentation guidelines (continued) Security guidelines Protect the PCN from the Internet: Do not directly connect the PCN to the Internet, even if protected by a firewall. Do not allow PCN devices to access the Internet directly or indirectly. Place the firewall at the perimeter of the PCN instead of inside the PCN to avoid blocking a critical alarm sent from a remote substation to your network s control center. McAfee Firewall Enterprise configuration recommendation To ensure the PCN is not vulnerable to Internet threats: Position your McAfee Firewall Enterprise (protecting the PCN) behind your corporate firewall. Do not create rules that allow the PCN to reach the Internet. Deploy your McAfee Firewall Enterprise so that the entire PCN is self-contained inside the PCN burb. Access control Table 2 shows security guidelines for access control based on ports, protocols, addresses, and job function, and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 2 Access control guidelines Security guidelines Configure default firewall policy to disable all ports and services; deny all, permit none. Only allow the SCADA and industrial protocols, such as MODBUS/TCP, EtherNet/IP, and DNP317, within the process control network (PCN). Except for encrypted ICCP, do not allow these protocols to reach the corporate network. Isolate protocols that are allowed from the PCN to the DMZ: Do not allow these protocols to reach corporate networks from the DMZ. Do not allow these protocols to reach the DMZ from corporate networks. Place the following restrictions on outbound traffic from the PCN to corporate networks: Limit all outbound traffic from the PCN to the corporate network to essential traffic only. Use firewall rules to allow only connections with a valid source address, destination IP address, service, and port. Allow users to reach only the nodes on the PCN necessary for their job function. Provide a single or minimal connection that allows the PCN to be severed from the corporate network in times of serious cyber incidents. McAfee Firewall Enterprise configuration recommendation No action required By default, McAfee Firewall Enterprise allows only administrative services. No action required McAfee Firewall Enterprise allows only the traffic that matches the rules you have created. When configuring your firewall to allow SCADA protocols to communicate between the PCN and DMZ, create rules that reference only the PCN and DMZ burbs. When configuring your firewall to allow communication from the PCN to corporate networks, create rules that: Allow only critical traffic to reach the corporate network. Restrict access based on source, destination, protocol, and port. Restrict access to the PCN by creating rules that: Use authentication (for protocols that support it) to verify user identity. Restrict access based on source IP address. Restrict access based on destination IP address. No action required The firewall PCN interface provides a single link between the PCN and your firewall. To sever the link, disable the interface or unplug the cable. Protecting Industrial Control Systems using McAfee Firewall Enterprise 5
6 ICS security guidelines met by McAfee Firewall Enterprise Common protocols Table 3 shows protocol-specific security guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 3 Common protocol guidelines Security guidelines McAfee Firewall Enterprise configuration recommendation DNS: Restrict DNS traffic as much as possible by creating Use local DNS or a host file. DNS proxy rules that: Do not allow DNS requests into the PCN. Only allow traffic from the PCN to the DMZ. Allow DNS requests from the PCN to DMZ on an Use source and destination IP addresses to restrict individual basis by creating firewall rules. access to the hosts that require it. HTTP/HTTPS: If necessary, allow access to specific devices in the In general, do not allow HTTP from corporate PCN from the corporate network by: networks to the PCN. Creating HTTPS proxy rules. If required, allow access to specific PCN devices using either HTTPS or HTTP that is protected by a firewall proxy that blocks inbound scripts and Java Creating HTTP proxy rules using Application Defenses that are configured to block scripting and Java. applications. FTP/TFTP: Allow Secure FTP (SFTP) out of the PCN by creating Block inbound FTP and TFTP. SSH proxy rules that: If possible, use protocols that are more secure, Use Application Defenses that are configured to such as Secure FTP (SFTP) or Secure Copy (SCP). allow SFTP. Allow outbound FTP only if it is secured with Are configured to require user authentication. two-factor authentication and an encrypted tunnel. If you must allow FTP, configure a VPN to the destination FTP site to encrypt the FTP traffic. Telnet: If possible, use SSH instead of Telnet. If Telnet is required: Prohibit inbound Telnet sessions from corporate networks to the PCN unless secured with two-factor authentication and an encrypted tunnel. Do not allow Telnet from the PCN to the DMZ or corporate network. Allow outbound Telnet sessions only to specific devices over encrypted tunnels. SMTP: Do not allow inbound SMTP into the PCN. Outbound SMTP from the PCN to the corporate network is acceptable for sending alert messages. SNMP: If possible, send only V3 commands. Prohibit V1 and V2 commands unless sent over a separate, secured network. RPC/DCOM: Allow only between the PCN and DMZ. Block between the DMZ and corporate networks. Restrict the port ranges by making registry modifications on devices using RPC/DCOM. Allow Telnet from the corporate network to reach the PCN by creating Telnet proxy rules that require user authentication. For outbound Telnet connections, configure a VPN to the destination site to encrypt the Telnet traffic. If you need to allow devices in the PCN to send alert messages to an SMTP server in the corporate network, create SMTP proxy rules that are restricted by source and destination IP address. If you need to allow SNMP traffic across insecure networks, configure a VPN to the destination site to encrypt the SNMP data. Create packet filter rules to allow the required ports between the PCN and DMZ. 6 Protecting Industrial Control Systems using McAfee Firewall Enterprise
7 ICS security guidelines met by McAfee Firewall Enterprise User authentication Table 4 shows authentication security guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 4 User authentication guidelines Security guidelines Enforce secure authentication of all users seeking to gain access to the PCN. Consider using separate authentication mechanisms, accounts, and credentials for access to the PCN and the corporate networks. Lock out accounts with excessive login attempts. Store passwords using non-reversible encryption. Eliminate duplicate or shared passwords and immediately delete vendor-supplied passwords. McAfee Firewall Enterprise configuration recommendation Enable authentication on all rules that allow access to the PCN. Use the Passport authenticator if the protocol does not support conventional authentication. Configure your firewall to perform authentication in conjunction with different external authentication servers. Use the McAfee Firewall Enterprise Authentication Failure Lockout feature to lock out users who fail authentication after a configured number of attempts. No action required McAfee Firewall Enterprise user and administrator passwords are stored using non-reversible encryption. Use an external authentication sever to mitigate password management issues. Network address translation (NAT) NAT involves rewriting the source address of a packet to a new IP address specified by the administrator. Reasons to use NAT include: Hiding your internal network addresses from public view. Replacing private addressing on outbound traffic with publicly routable address. Table 5 shows NAT deployment guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 5 NAT guidelines Security guidelines Do not deploy NAT between the PCN and DMZ because of its impact on protocols such as EtherNet/IP, Foundation Fieldbus, and OPC. If desired, deploy NAT between the DMZ and the corporate network. McAfee Firewall Enterprise configuration recommendation Do not enable NAT on rules that allow access between the PCN and the DMZ. As necessary, enable NAT on rules that allow access between the DMZ and the corporate network. Protecting Industrial Control Systems using McAfee Firewall Enterprise 7
8 ICS security guidelines met by McAfee Firewall Enterprise Remote access Table 6 shows remote access security guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 6 Remote access guidelines Security guidelines Require authentication and use encrypted protocols such as VPN or HTTPS for Internet or dial-up remote access connections. Once connected to the corporate network, require users to re-authenticate a second time with a personal and unique password using a strong two-factor authentication method to access the PCN. For organizations that do not permit unencrypted control traffic to traverse the corporate network, require a secondary tunneling solution, such as an IPsec tunnel between the remote access point and a PCN or DMZ. McAfee Firewall Enterprise configuration recommendation To secure remote access connections: Create VPNs for remote access connections. Create HTTPS proxy rules with SSL decryption enabled that require authentication. To require strong authentication: For VPNs, enable extended authentication using a strong authentication method, such as Aladdin SafeWord. For HTTPS proxy rules with SSL decryption, enable a strong authentication method. Create a VPN between your McAfee Firewall Enterprise and your corporate firewall to encrypt control traffic that passes over the corporate network. Virus scan and intrusion detection/prevention management Table 7 shows virus scan and intrusion detection/prevention management guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 7 Virus scan and intrusion detection/prevention guidelines Security guidelines Deploy intrusion detection software. Deploy antivirus software. Before deploying IDS/IPS software, perform extensive testing to determine that it does not compromise normal operation of the industrial control system (ICS). McAfee Firewall Enterprise configuration recommendation Enable McAfee Firewall Enterprise Signature-based Intrusion Protection Service (IPS) on proxy rules that protect critical devices. McAfee Firewall Enterprise IPS supports over 10,000 signatures that represent known network-based intrusion attacks, including 28 signatures for three SCADA protocols: MODBUS/TCP, DNP3/TCP, and ICCP/TCP. Enable the McAfee Firewall Enterprise anti-virus module on HTTP, FTP, and Sendmail rules to detect and block viruses, spyware, and prohibited MIME extensions. Enable an IPS signature group on an active rule while specifying an Allow response mapping. This allows you to test IPS in an active environment to determine if it will interfere with normal operation of the ICS. If not, enable a response mapping to take action against positive matches. 8 Protecting Industrial Control Systems using McAfee Firewall Enterprise
9 ICS security guidelines met by McAfee Firewall Enterprise Firewall management, logs, and audit Table 8 shows virus scan and intrusion detection/prevention management guidelines and the McAfee Firewall Enterprise configuration necessary to satisfy each guideline. Table 8 Firewall management, logs, and audit guidelines Security guidelines All firewall management traffic must be: Initiated from a management station that is configured with a static IP address. Contained on a separate out-of-band, secured management network or over an encrypted network with two-factor authentication. To keep syslog data secure: Restrict access to syslog data to authorized users. Use VPNs to secure the data outside the PCN and DMZ networks. Record information flow for traffic monitoring, analysis, and intrusion detection. Ensure that each critical component has a redundant counterpart. If a component fails, it should fail in a manner that does not generate unnecessary traffic or cause another problem elsewhere. McAfee Firewall Enterprise configuration recommendation Configure the Admin Console rule to use a strong authentication method. Note: McAfee recommends configuring a secondary authentication method to avoid losing administrative access to your firewall in the event of an authentication server failure. Configure your firewall to send syslog data to a syslog server in the DMZ. If the syslog server is located on an insecure network, create a VPN to the syslog server site to encrypt the audit data. Retain firewall audit data by performing one of the following actions: Configure Audit Management to regularly export the firewall audit data to an external server. Use syslog data sent to a syslog sever to retain audit information. Deploy two firewalls in a High Availability configuration for redundancy. Protecting Industrial Control Systems using McAfee Firewall Enterprise 9
10 Deployment scenario Deployment scenario The deployment scenario shown in Figure 1 depicts an example network configuration that satisfies the requirements in ICS security guidelines met by McAfee Firewall Enterprise on page 4. In this example configuration, a McAfee Firewall Enterprise protects the process control network from the corporate network and isolates systems that need to interact with the PCN in a DMZ. Figure 1 Deployment scenario 10 Protecting Industrial Control Systems using McAfee Firewall Enterprise
11 Deployment scenario Use of burbs in this scenario A burb is used to isolate network interfaces from each other. In this deployment scenario, the McAfee Firewall Enterprise is configured with five burbs: External An external interface and burb connected to the corporate intranet via a network interface card (NIC) Internal An internal interface and burb connected to the PCN via a NIC DMZ An interface and burb connected to the DMZ via a NIC The DMZ hosts the Historian, terminal, web, application, and authentication servers. It also hosts non-time critical resources associated with backup/recovery, network monitoring and management, printing, document control, and other hosts that require restricted PCN access. Virtual-1 A virtual burb (not physically connected to a NIC) for terminating remote access VPNs arriving from the Internet, dial-up, or WANs via the corporate firewall Virtual-2 A virtual burb (not physically connected to a NIC) for terminating VPNs from users on the corporate intranet Scenario assumptions and caveats Network address translation (NAT): On McAfee Firewall Enterprise, network address translation (NAT) is configured on a per-rule basis. In this deployment scenario, it is assumed that the IP addresses on the PCN are routable within the corporate network. Therefore, NAT is unnecessary for users accessing the PCN from the corporate intranet. For IPsec VPN connections from off-site remote users, NAT is optional because IPsec VPNs encapsulate the endpoint addresses inside the encrypted tunnels, making them invisible on the Internet. However, you can use NAT to hide the PCN addresses from the remote user. Virtual private networks (VPNs): In this scenario, the McAfee Firewall Enterprise has no direct connection with the Internet, dial-up connections, or WANs. Therefore, any connections from these sources must first traverse the corporate firewall and intranet. To access the DMZ, remote users must authenticate at the corporate firewall and then re-authenticate at the McAfee Firewall Enterprise guarding the PCN using PCN credentials. This scenario assumes that your organization does not permit unencrypted PCN control traffic to traverse the corporate network for security reasons. To meet this requirement, a separate gateway-to-gateway IPsec tunnel is required to forward the packets to the McAfee Firewall Enterprise from the corporate firewall. Access from dial-up connections or WANs may use existing methods which should include first logging into the corporate firewall. Similar to VPN connections from remote users, the corporate firewall forwards the packets to the McAfee Firewall Enterprise inside the gateway-to-gateway IPsec tunnel. The McAfee Firewall Enterprise will re-authenticate the user, then scan and filter the packets entering the DMZ. Authentication: The security guidelines stipulate that remote users should be authenticated by the corporate firewall before their connections are forwarded to the McAfee Firewall Enterprise for re-authentication and access authorization. A separate application note provides instructions for configuring both the corporate firewall and the McAfee Firewall Enterprise to support this cooperative access method. The configuration in Figure 1 on page 10 does not show an authentication server capable of providing strong two-factor authentication, which the security guidelines strongly recommend. McAfee recommends that you deploy an authentication server such as RSA SecureID or Aladdin SafeWord in the DMZ. Protecting Industrial Control Systems using McAfee Firewall Enterprise 11
12 Create your security policy Create your security policy This section contains a roadmap for configuring McAfee Firewall Enterprise to satisfy your organization s security policy. Use the steps outlined below to configure your McAfee Firewall Enterprise. Plan your security policy on page 12 Perform the initial configuration procedure on page 12 Configure networking on page 13 Configure rule elements on page 15 Create rules on page 18 Plan your security policy To plan your security policy, compare the requirements of your network to the rules listed in the table below. The table contains a minimum set of rules that are valid for the configuration scenario shown in Figure 1 on page 10. Make any necessary additions or changes as required by your network. Note: Because TCP/IP networks are not deterministic, take steps to ensure that time-critical events are not transmitted over the TCP networks. Table 9 Example rules Purpose Service Source Burb Destination Burb Monitoring and control Modbus/TCP proxy Internal DMZ Modbus/TCP proxy DMZ Internal DNP3/TCP proxy Internal DMZ DNP3/TCP proxy DMZ Internal ICCP/TCP proxy Internal DMZ ICCP/TCP proxy DMZ Internal DCOM proxy Internal DMZ DCOM proxy DMZ Internal EtherNet/IP proxy Internal DMZ EtherNet/IP proxy DMZ Internal Alert messages SMTP/UDP proxy PCN External Remote administration and Telnet proxy Virtual-2 DMZ maintenance Remote desktop proxy Virtual-2 DMZ Access to data historian HTTPS proxy External DMZ HTTPS proxy Virtual-1 DMZ HTTPS proxy Virtual-2 DMZ Perform the initial configuration procedure Perform the initial configuration procedure as documented in the McAfee Firewall Enterprise Setup Guide, available at mysupport.mcafee.com. These steps include: Installing the McAfee Firewall Enterprise Management Tools on a Windows-based computer. Running the Quick Start Wizard. Connecting to the firewall using the Admin Console. When initial configuration is complete, continue with Configure networking on page Protecting Industrial Control Systems using McAfee Firewall Enterprise
13 Create your security policy Configure networking To configure your McAfee Firewall Enterprise to connect to the appropriate networks, perform the following procedures: Configure burbs on page 13 Configure network interfaces on page 14 Configure burbs A burb is used to isolate network interfaces from each other. An internal burb and an external burb are defined on your firewall during the installation process. You create, modify, and delete burbs in the Burb Configuration window. You select these burbs as Source and Destination burbs when creating a rule in the Rules window. To create burbs: select Network > Burb Configuration. Figure 2 Burb Configuration window The upper pane lists existing burbs. The external and internal burbs are pre-configured by default. For more detailed information, see the Burbs, Interfaces, and Quality of Service chapter of the McAfee Firewall Enterprise Administration Guide. Protecting Industrial Control Systems using McAfee Firewall Enterprise 13
14 Create your security policy Configure network interfaces An interface is a boundary that two systems communicate across. You assign all the network link elements to the interface, such as IP address, network mask, burb, NIC, and MTU size for outgoing packets. Note: The Network Interface Card (NIC) is the hardware device that the network cable is plugged into. You can create Standard, VLAN, DHCP, or transparent interfaces. An interface can have IPv4 addresses, IPv6 addresses, or both. Note: Transparent interfaces do not support IPv6. You can select Quality of Service Profiles and define alias addresses for an interface. By using VLANs, you can create up to: 512 interfaces on a standalone firewall. 255 interfaces on a High Availability cluster. The internal and external network interfaces of the firewall are defined during the initial configuration. Use the Interfaces window to configure network interfaces: select Network > Interfaces. Figure 3 Interfaces window For detailed instructions, see the Burbs, Interfaces, and Quality of Service chapter of the McAfee Firewall Enterprise Administration Guide. 14 Protecting Industrial Control Systems using McAfee Firewall Enterprise
15 Create your security policy Configure rule elements Rule elements are the building blocks of rules. To create rules, first configure the elements that the rules will reference: Configure Network Objects on page 15 Configure authentication on page 15 Configure services on page 17 Note: You can also create Application Defenses to configure advanced properties for rules. To manage Application Defenses, select Policy > Rule Elements > Application Defenses > Defenses. Configure Network Objects A network object is the source or destination of a connection to or through the McAfee Firewall Enterprise. A network object can be any of the following: Domain IP range Geo-Location Netmap Host Subnet IP address Netgroup Each network object that you create is available for selection from the source and destination Endpoint drop-down lists on the Rules window. Use the Network Objects window to configure network objects: select Policy > Rule Elements > Network Objects. Figure 4 Network Objects window For detailed instructions, see the Network Objects and Time Periods chapter of the McAfee Firewall Enterprise Administration Guide. Configure authentication Authenticators validate a person s identity before he or she is allowed to pass traffic through the firewall. McAfee Firewall Enterprise supports the following authentication methods: Passport Passport (also known as single sign-on) associates an authenticated user with their IP address. A successful Passport authentication caches the source IP address for a specified time. Subsequent connection attempts from the same IP address are allowed without prompting for authentication. Security level: Weak Password Standard password authentication requires a user to enter the same password each time he or she logs in. Security level: Weak LDAP (Lightweight Directory Access Protocol) Four types of LDAP authentication are available: iplanet, Active Directory, OpenLDAP, and Custom LDAP. Security level: Weak Protecting Industrial Control Systems using McAfee Firewall Enterprise 15
16 Create your security policy Windows Domain You can use this authenticator if your organization operates a Windows primary domain controller (PDC) or backup domain controller (BDC). Security level: Weak RADIUS You can use this authenticator if your organization operates a RADIUS server. Security level: Varies with authentication server and method SafeWord SafeWord RemoteAccess and SafeWord PremierAccess interoperate with McAfee Firewall Enterprise. Security level: Varies with authentication server and method Use the Authenticators window to configure authenticators: select Policy > Rule Elements > Authenticators. Figure 5 Authenticators window For detailed instructions, see the Authentication chapter of the McAfee Firewall Enterprise Administration Guide. 16 Protecting Industrial Control Systems using McAfee Firewall Enterprise
17 Create your security policy Configure services A McAfee Firewall Enterprise service associates a traffic s transport layer with a specific agent that is responsible for managing the service s traffic. The transport layer information includes elements such as the protocol, the ports, and the idle timeout. A rule use a service, along with source and destination information, to determine what traffic that rule will allow or deny. You create a service by selecting an agent, assigning it specific transport-layer properties, giving it a name, and then saving it. An agent is responsible for handling traffic and can be one of these types: Proxy Filter Server The firewall provides predefined TCP-based proxy services for a variety of Internet services including HTTP, Telnet, FTP, and many others. The firewall also supports proxy services for routing UDP transmissions for applications based on protocols such as SNMP and NTP. Table 10 contains a non-comprehensive list of services that you may need to create to allow SCADA protocols through your McAfee Firewall Enterprise. Note: The ports shown in Table 10 represent well known or registered ports. Before creating services for these protocols, investigate to determine what ports are in use on your network. Table 10 Services that you may need to create Protocol Port Recommended service type Remote desktop TCP 3389 Generic Proxy SMTP/UDP UDP 161 Generic Proxy Modbus/TCP TCP 502 Generic Proxy DNP3/TCP TCP Generic Proxy UDP ICCP/TCP TCP 102 Generic Proxy DCOM TCP 135 (Windows 95 or later) Generic Proxy UDP 135 (Windows NT 4.0) EtherNet/IP TCP/UDP TCP/UDP 2222 Generic Proxy Protecting Industrial Control Systems using McAfee Firewall Enterprise 17
18 Create your security policy Use the Services window to configure services: select Policy > Rule Elements > Services. Figure 6 Services window For detailed instructions, see the Services chapter of the McAfee Firewall Enterprise Administration Guide. Create rules Rules are the basis of your security policy. They determine what traffic will be allowed to pass through your McAfee Firewall Enterprise and what will be denied. About the Rules window Use the Rules window to manage rules: select Policy > Rules. Figure 7 Rules window 18 Protecting Industrial Control Systems using McAfee Firewall Enterprise
19 Create your security policy This window provides an overview of your security policy. It is where you view rules, adjust rule order, and enable or disable rules. It is also the starting point for creating and modifying rules and rule groups. The order in which rules and nested groups of rules appear is significant. When the firewall is looking for a rule match, it searches the enabled rules sequentially beginning with the first rule or nested group within the group, then the second, and so on. If the traffic does not match the first rule, it is forwarded on to the next rule. Once a rule match is found, the traffic is processed according to that rule and the search stops. You should always place rules that allow or deny the most frequent traffic near the top of your security policy to reduce processing time. The default policy contains a Deny All rule at the end of the policy. This rule denies any traffic that reaches it. The rule itself is a reminder that any traffic that does not match a rule is automatically denied; even if the Deny All rule is deleted, the firewall denies any traffic that does not find an exact match in your security policy. By default all services and ports are disabled until enabled by permit rules. After installation, McAfee Firewall Enterprise remains in a deny all/permit none state until permit rules are configured and applied. Ensure that Deny All is at the bottom of the list. Example of a simple rule This section provides an example of a simple rule to help you better understand how the firewall uses a rule to determine whether to allow or deny a connection request, and how to handle allowed connections. Table 11 lists the condition elements for a rule that permits any client in an internal burb to connect to any Web server located in the external burb. Conditional elements are the elements that a rule examines to see if a packet matches that rule. The fields corresponding to the criteria described in the table are indicated in Figure 8. There are also a number of action elements you can configure for each rule. After a rule determines that a packet matches its condition elements, the rule handles the packet according to the action elements values. The action elements are: whether or not to allow the connection or session, what amount of audit data to generate, if the address should be translated, what Application Defense settings to enforce, and if the traffic will be compared to a set of IPS signatures. Table 11 Rule elements that determine if a packet will match a rule Condition rule Setting Comments elements Enable Checked Disabled rules do not process traffic. Service HTTP (HTTP Proxy) This rule uses the default HTTP proxy service, which accepts HTTP traffic on TCP port 80 and passes traffic transparently (browsers do not need to point to the firewall). Source Burb internal Traffic will originate in the internal burb. Source Endpoint <Any> Traffic can originate from any IP address in the internal burb. Destination Burb external Traffic will be delivered to the external burb. Destination Endpoint <Any> Traffic can be delivered to any IP address reachable via the external burb. Authentication Passport Users must authenticate the first time they use this rule to connect to an external Web server. Subsequent connections will be authenticated from a cache. Protecting Industrial Control Systems using McAfee Firewall Enterprise 19
20 Create your security policy Figure 8 A basic rule with condition elements Create a rule Use the New Rule window to create rules: from the Rules window click New Rule. Specify a name, and then configure the following elements: Service Source Burb Source Endpoint Destination Burb Destination Endpoint Authentication (optional) Tip: The other configurable rule elements are optional and offer additional functionality. Leave these elements at the default values unless you need this additional functionality. For detailed instructions, see the Rules chapter of the McAfee Firewall Enterprise Administration Guide. 20 Protecting Industrial Control Systems using McAfee Firewall Enterprise
21 Create a VPN to allow corporate users to access the PCN Create a VPN to allow corporate users to access the PCN This section creates an example VPN to provide PCN access to users on the corporate network. Its main purpose is to hide the traffic inside an encrypted tunnel as it traverses the corporate network. This VPN has the following attributes: Computer identification by shared secret (also referred to as password). Tip: For large deployments McAfee recommends using either McAfee Firewall Enterprise self-signed or Certificate Authority-issued client certificates. User authentication via the extended authentication (XAUTH) method. While this example configuration uses fixed passwords stored by McAfee Firewall Enterprise, a two-factor authentication method is strongly recommended. VPN termination in a virtual burb named Virtual-2. Note: For this example, it is assumed that NAT is enabled on the corporate firewall. To configure the example VPN: Enable extended authentication on the ISAKMP server on page 21 Allow access to the ISAKMP server on page 22 Create a client address pool on page 22 Create the VPN definition on page 23 For detailed instructions, see the Virtual Private Networks chapter of the McAfee Firewall Enterprise Administration Guide. Enable extended authentication on the ISAKMP server The ISAKMP server is used to generate and exchange keys for VPN sessions and includes properties for audit, negotiating connections, and extended authentication parameters. To enable extended authentication: 1 Select Policy > Rule Elements > Services. 2 Select isakmp and then click Modify. Protecting Industrial Control Systems using McAfee Firewall Enterprise 21
22 Create a VPN to allow corporate users to access the PCN Figure 9 ISAKMP Properties window 3 In the Allowed XAUTH Methods field, select Password. 4 Click OK and save your changes. Allow access to the ISAKMP server Create a rule to allow access to the ISAKMP server: 1 Select Policy > Rules. 2 Click New to create a rule for the ISAKMP service. The rule must contain the following values: Service isakmp (ISAKMP Server) Source Burb external Source Endpoint A netgroup network object containing the IP addresses on the corporate network that can initiate VPN connections Destination Burb external 3 Save your changes. Create a client address pool To create a client address pool: 1 Select Network > VPN Configuration > Client Address Pools. 2 Click New and specify the following: Pool Name Specify a name, such as Corporate_Users_Pool. Virtual Subnet Type a subnet out of which the firewall will assign addresses to VPN clients. Define the Local Subnets available to remote clients Add the network(s) in the PCN that VPN users will be allowed to access. 3 Click Add and then save your changes. 22 Protecting Industrial Control Systems using McAfee Firewall Enterprise
23 Create a VPN to allow corporate users to access the PCN Create the VPN definition To create a VPN definition: 1 Select Network > VPN Configuration > VPN Definitions, and then click New. Figure 10 VPN General tab 2 On the General tab, specify the following: Name Corporate_Users Mode Dynamic IP Restricted Client IKE version V1 Encapsulation Tunnel Enabled Yes Client Address Pool Corporate_Users_Pool Burb Virtual-2 Local IP Use Localhost IP 3 On the Remote Authentication tab, specify the following: Remote Authentication Method XAUTH + Password Enter Remote Password Type a password. Verify Remote Password Confirm the password. Remote Identity Click Remote Identities and create a remote identity that will be shared among corporate VPN users. Protecting Industrial Control Systems using McAfee Firewall Enterprise 23
24 Perform post-configuration tasks 4 On the Local Authentication tab, specify the following: Local Identity Type IP Address Value localhost 5 On the Advanced tab, change the IKE V1 Exchange Type to Aggressive. 6 Click Add. A Confirm window appears. 7 Click Yes and then save your changes. Perform post-configuration tasks After you have created rules to implement your security policy, perform the following tasks: Test your configuration on page 24 Enable command line access on page 24 Create an alternate policy on page 24 Create a configuration backup on page 24 Test your configuration Confirm that the required traffic is passing between the PCN, DMZ, and corporate networks. Use the Audit Viewing window to obtain troubleshooting information: select Monitor > Audit Viewing. Enable command line access For troubleshooting purposes, enable Secure Shell (SSH) command line access. 1 Select Policy > Rules. 2 In the Administration rule group, enable the Secure Shell rule. 3 Modify the rule s endpoints and authentication as needed. 4 Use an SSH client to confirm that you can connect to your firewall. Create an alternate policy Create a policy that enables quick disconnect from the corporate network in case of attack. 1 In the Policy window, create a rule group for the alternate policy. 2 In that group, place all the rules needed to implement the alternate policy. Be sure to create a Deny All rule as the last rule of the alternate policy rule group. Tip: Rule groups can be nested within other groups. 3 When you have finished creating the alternate policy, disable the policy by selecting the alternate policy rule group and clicking Disable. 4 To use the alternate policy, move the alternate policy rule group to the top of the rule list and enable it. The firewall begins enforcing your alternate policy. Create a configuration backup Use the Configuration Backup window to create a backup of your firewall s configuration: select Maintenance > Configuration Backup. Tip: Save the configuration backup to your client system or a remote system to avoid losing it due to hardware failure. 24 Protecting Industrial Control Systems using McAfee Firewall Enterprise
25 Glossary A Admin Console The graphical user interface (GUI) used to configure and manage McAfee Firewall Enterprise. The Admin Console runs on Windows-based platforms. B burb McAfee Firewall Enterprise uses a logical division of network spaces called burbs. Burbs divide networks from each other, and each burb connects the firewall to systems with the same security requirements. D DMZ (demilitarized zone) A network buffer zone that often hosts services that require interaction the Internet, while still protecting internal systems. On McAfee Firewall Enterprise, the DMZ is generally a burb for hosting web servers and other hosts that receiving large volumes of external, untrusted traffic. E extended authentication (XAUTH) An extension of the IKE protocol that allows the administrator enforce user-based authentication in addition to the existing IKE authentication. It initiates after the existing IKE authentication mechanism is successful. XAUTH associates the VPN session to the user who authenticated, and enables use of strong authentication in VPN configurations. F FTP (file transfer protocol) A protocol used on the Internet for transferring files. H HTTP (hypertext transfer protocol) HTTPS (hypertext transfer protocol secure) A protocol that requests and transfers HTML documents on the World Wide Web. An agreed-upon format (protocol) that requests and transfers HTML documents on the World Wide Web in a secured manner. I ICS (industrial control system) IKE (Internet key exchange) IP address IPS (Intrusion Prevention System) IPsec (Internet Protocol Security) A term for control systems used in the industrial and critical infrastructure sectors, including supervisory control and data acquisition (SCADA) systems and distributed control systems (DCS). A key management protocol standard which automates the implementations of other protocols (ISAKMP, Oakley, etc.) used in a VPN connection. For IPv4, a 32-bit address that uses standard dotted quad notation assigned to TCP/IP network devices. An IP address is unique to each machine on the Internet. An IP address contains a network and host field. For IPv6, the address is 128 bits and is normally written as eight groups of four hexadecimal digits. A system for identifying attacks before they pass through the firewall. McAfee Firewall Enterprise has a signature-based IPS feature that is configurable on packet filter, proxy, and server rules, and has an IPS Attack Response feature that sends alerts based on audit events. A set of standards created to provide data integrity and confidentiality at the IP layer of the network stack. Protecting Industrial Control Systems using McAfee Firewall Enterprise 25
26 Glossary ISAKMP (internet security association and key management protocol) A protocol framework which sets the parameters for a VPN connection by defining the payload format, how the key exchange protocol will be implemented, and how the security association will be negotiated. N NAT (network address translation) NIC (network interface card) Rewriting the source address of a packet to a new IP address specified by the administrator. The term NAT is often applied when the firewall rewrites the source address. See redirection for when the firewall rewrites the destination address. Hardware, like a computer circuit board, that contains a port or a jack that enables a computer to connect to network wiring, such as an ethernet cable, a phone line, etc. P packet filter Passport PCN (process control network) port proxy A service that provides the ability to specify rules for IP-based traffic to flow through the firewall at the network layer or the transport layer of the network stack. A login process that requires a user to enter the same password each time he or she logs in. This method is the most common form of authentication security. A network that allows communication between control and measurement units and Supervisory Control and Data Acquisition (SCADA) equipment. The number that identifies the destination application process for transmitted data. Port numbers range from 1 to For example, Telnet typically uses port 23, DNS uses 53, etc. A software agent that acts on behalf of a user requesting a network connection through the firewall. The proxy agent accepts a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, optionally does additional authentication, and then completes a connection on behalf of the user to a remote destination. R rule rule group A rule is a mini policy which contains criteria that is used to inspect incoming or outgoing traffic. Rules determine whether that traffic will be allowed to continue to its destination. Rules are created for three types of firewall services: packet filter, proxy, or server. An organized set of rules. A rule group can consist of both rules and nested rule groups. S SCADA SecureOS service server strong authentication subnet A supervisory control and data acquisition system that monitors and controls a process. The UNIX-based operating system used in a McAfee Firewall Enterprise system. SecureOS is built upon FreeBSD and includes Type Enforcement security mechanisms. A firewall service is a server, proxy, or packet filter that provides the control for a specific internet service, such as HTTP, FTP, or Telnet. It consists of an agent, transport-layer properties, and, depending on the agent, agent-specific properties. A computer system that provides services (such as FTP) to a network, or a program running on a host that offers a service to other hosts on a network. A login process that requires a user to enter a unique, one-time response to a login challenge or special code presented by an authentication server. The user must make the proper response to the challenge using a special hardware or software token. A network addressing scheme that separates a single network into smaller physical networks. T TCP (transmission control protocol) A transport layer networking protocol that provides reliable, ordered delivery of a stream of bytes from one computer to another. 26 Protecting Industrial Control Systems using McAfee Firewall Enterprise
27 Glossary TrustedSource Type Enforcement A reputation service that reduces spam by filtering incoming mail connections and providing precise information about an sender's reputation based on its IP address. A reputation service that reduces spam by filtering incoming mail connections and providing precise information about an sender's reputation based on its IP address. U UDP (user datagram protocol) A connectionless transport layer protocol that transfers data across a network with no reliability checking or error checking. V VLAN interface VPN (virtual private network) An interface that allows administrators to segment a LAN into different broadcast domains regardless of the physical location. A method of authenticating and encrypting data transmissions between hosts (firewall-to-firewall, firewall-to-client). VPN makes it appear as though the remote networks are connected to each other via a pair of routers with a leased line between them. W weak authentication A login process that merely requires a user to enter the same password each time he or she logs in. The standard UNIX password process is considered a weak authentication method. Protecting Industrial Control Systems using McAfee Firewall Enterprise 27
28 A00
Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )
Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide
Application Note. Configuring McAfee Firewall Enterprise for McAfee Web Protection Service
Application Note Configuring McAfee Firewall Enterprise for McAfee Web Protection Service This document explains how to configure McAfee Firewall Enterprise (Sidewinder ) to redirect all web traffic to
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course
McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course The McAfee Firewall Enterprise System Administration course from McAfee University is a fast-paced,
McAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
McAfee VirusScan Enterprise for Linux 1.7.0 Software
Configuration Guide McAfee VirusScan Enterprise for Linux 1.7.0 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication
vcloud Air - Virtual Private Cloud OnDemand Networking Guide
vcloud Air - Virtual Private Cloud OnDemand Networking Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee. Firewall Enterprise
Application Note Configuring Department of Defense Common Access Card Authentication on McAfee Firewall Enterprise McAfee Firewall Enterprise version 7.x and 8.x This application note describes how to
Desktop Release Notes. Desktop Release Notes 5.2.1
Desktop Release Notes Desktop Release Notes 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Release Notes for McAfee epolicy Orchestrator 4.5
Release Notes for McAfee epolicy Orchestrator 4.5 About this document New features Known Issues Installation, upgrade, and migration considerations Considerations when uninstalling epolicy Orchestrator
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide
McAfee epolicy Orchestrator 4.5 Cluster Installation Guide COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
McAfee Firewall Enterprise 8.3.1
Configuration Guide Revision A McAfee Firewall Enterprise 8.3.1 FIPS 140-2 The McAfee Firewall Enterprise FIPS 140-2 Configuration Guide, version 8.3.1, provides instructions for setting up McAfee Firewall
Copyright 2006 Comcast Communications, Inc. All Rights Reserved.
ii Copyright 2006 Comcast Communications, Inc. All Rights Reserved. Comcast is a registered trademark of Comcast Corporation. Comcast Business IP Gateway is a trademark of Comcast Corporation. The Comcast
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
McAfee Optimized Virtual Environments - Antivirus for VDI. Installation Guide
McAfee Optimized Virtual Environments - Antivirus for VDI Installation Guide COPYRIGHT Copyright 2010-2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide
McAfee Host Data Loss Prevention 9.1 Cluster Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Barracuda Link Balancer
Barracuda Networks Technical Documentation Barracuda Link Balancer Administrator s Guide Version 2.2 RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks www.barracuda.com v2.2-110503-01-0503
McAfee Firewall Enterprise 8.2.1
Configuration Guide FIPS 140 2 Revision A McAfee Firewall Enterprise 8.2.1 The McAfee Firewall Enterprise FIPS 140 2 Configuration Guide, version 8.2.1, provides instructions for setting up McAfee Firewall
McAfee Optimized Virtual Environments for Servers. Installation Guide
McAfee Optimized Virtual Environments for Servers Installation Guide COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Multi-Homing Security Gateway
Multi-Homing Security Gateway MH-5000 Quick Installation Guide 1 Before You Begin It s best to use a computer with an Ethernet adapter for configuring the MH-5000. The default IP address for the MH-5000
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
McAfee UTM Firewall Control Center Product Guide. version 2.0
McAfee UTM Firewall Control Center Product Guide version 2.0 COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in
Barracuda Networks Technical Documentation. Barracuda SSL VPN. Administrator s Guide. Version 2.x RECLAIM YOUR NETWORK
Barracuda Networks Technical Documentation Barracuda SSL VPN Administrator s Guide Version 2.x RECLAIM YOUR NETWORK Copyright Notice Copyright 2004-2011, Barracuda Networks, Inc. www.barracuda.com v20-110511w-02-110915jc
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC
CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC 1 Introduction Release date: 11/12/2003 This application note details the steps for creating an IKE IPSec VPN tunnel
Using a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
Barracuda SSL VPN Administrator s Guide
Barracuda SSL VPN Administrator s Guide Version 1.5.x Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2009, Barracuda Networks,
Scenario: IPsec Remote-Access VPN Configuration
CHAPTER 3 Scenario: IPsec Remote-Access VPN Configuration This chapter describes how to use the security appliance to accept remote-access IPsec VPN connections. A remote-access VPN enables you to create
McAfee Agent Handler
McAfee Agent Handler COPYRIGHT Copyright 2009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into
How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (
UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
SSL-VPN 200 Getting Started Guide
Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN
Chapter 4 Customizing Your Network Settings
. Chapter 4 Customizing Your Network Settings This chapter describes how to configure advanced networking features of the Wireless-G Router Model WGR614v9, including LAN, WAN, and routing settings. It
Fireware Essentials Exam Study Guide
Fireware Essentials Exam Study Guide The Fireware Essentials exam tests your knowledge of how to configure, manage, and monitor a WatchGuard Firebox that runs Fireware OS. This exam is appropriate for
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK
TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK 2002 This paper was previously published by the National Infrastructure Security Co-ordination Centre (NISCC) a predecessor organisation to the Centre
Innominate mguard Version 6
Innominate mguard Version 6 Configuration Examples mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str. 14 12489
Using a VPN with CentraLine AX Systems
Using a VPN with CentraLine AX Systems User Guide TABLE OF CONTENTS Introduction 2 What Is a VPN? 2 Why Use a VPN? 2 How Can I Set Up a VPN? 2 Important 2 Network Diagrams 2 Network Set-Up with a VPN 2
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances 2006 nappliance Networks, Inc.
nappliance misa Server 2006 Standard Edition Users Guide For use with misa Appliances The information contained in this document represents the current view of Microsoft Corporation on the issues discussed
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Step-by-Step Configuration
Step-by-Step Configuration Kerio Technologies Kerio Technologies. All Rights Reserved. Printing Date: August 15, 2007 This guide provides detailed description on configuration of the local network which
Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
Firewall VPN Router. Quick Installation Guide M73-APO09-380
Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,
Barracuda Link Balancer Administrator s Guide
Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks
Scenario: Remote-Access VPN Configuration
CHAPTER 7 Scenario: Remote-Access VPN Configuration A remote-access Virtual Private Network (VPN) enables you to provide secure access to off-site users. ASDM enables you to configure the adaptive security
Unified Communications in RealPresence Access Director System Environments
[Type the document title] 3.0 October 2013 3725-78704-001B1 Deploying Polycom Unified Communications in RealPresence Access Director System Environments Polycom Document Title 1 Trademark Information Polycom
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3
Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Hardware Sizing and Bandwidth Usage Guide. McAfee epolicy Orchestrator 4.6.0 Software
Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Chapter 3 LAN Configuration
Chapter 3 LAN Configuration This chapter describes how to configure the advanced LAN features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. This chapter contains the following sections
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
HP ProLiant DL320 Firewall/VPN/Cache Server User Guide
HP ProLiant DL320 Firewall/VPN/Cache Server User Guide Running Microsoft Internet Security and Acceleration Server 2004 June 2005 (Third Edition) Part Number 341672-003 Copyright 2004, 2005 Hewlett-Packard
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses
Professional Integrated Appliance for Small and Medium-sized businesses Benefits Clientless Secure Remote Access Seamless Integration behind the Existing Firewall Infrastructure UTM Security Integration
Proxy Server, Network Address Translator, Firewall. Proxy Server
Proxy Server, Network Address Translator, Firewall 1 Proxy Server 2 1 Introduction What is a proxy server? Acts on behalf of other clients, and presents requests from other clients to a server. Acts as
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1
Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway
Fireware How To VPN How do I set up a manual branch office VPN tunnel? Introduction You use Branch Office VPN (BOVPN) with manual IPSec to make encrypted tunnels between a Firebox and a second IPSec-compliant
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005
State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology
How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS)
NetVanta 2000 Series Technical Note How to Open HTTP or HTTPS traffic to a webserver behind the NetVanta 2000 Series unit (Enhanced OS) This document is applicable to NetVanta 2600 series, 2700 series,
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide
McAfee(R) Email Security Virtual Appliance 5.6 Installation Guide COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored
10 Configuring Packet Filtering and Routing Rules
Blind Folio 10:1 10 Configuring Packet Filtering and Routing Rules CERTIFICATION OBJECTIVES 10.01 Understanding Packet Filtering and Routing 10.02 Creating and Managing Packet Filtering 10.03 Configuring
Networking Security IP packet security
Networking Security IP packet security Networking Security IP packet security Copyright International Business Machines Corporation 1998,2000. All rights reserved. US Government Users Restricted Rights
Release Notes McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software
Release s McAfee Risk Advisor 2.6.2 Software For use with epolicy Orchestrator 4.5.0 and 4.6.0 Software About this document New features System Requirements Supported Upgrades Installing and verifying
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with IBM WebSphere 7
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with IBM WebSphere 7 Table of Contents Table of Contents Deploying the BIG-IP LTM system and IBM WebSphere Servers Prerequisites and configuration notes...1-1
Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0
Millbeck Communications Secure Remote Access Service Internet VPN Access to N3 VPN Client Set Up Guide Version 6.0 COPYRIGHT NOTICE Copyright 2013 Millbeck Communications Ltd. All Rights Reserved. Introduction
Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client
A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder
Chapter 15: Advanced Networks
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls
CEN 448 Security and Internet Protocols Chapter 20 Firewalls Dr. Mostafa Hassan Dahshan Computer Engineering Department College of Computer and Information Sciences King Saud University [email protected]
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC
