McAfee GUARD DOG 2 Installation Guide

Browse online or download Installation Guide for Unknown McAfee GUARD DOG 2. McAfee GUARD DOG 2 Installation guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 25
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Special Topics
version 200510
McAfee
®
IntruShield
®
IPS System
Best Practices
McAfee
®
Network Protection
Industry-leading intrusion prevention solutions
Page view 0
1 2 3 4 5 6 ... 24 25

Summary of Contents

Page 1 - IPS System

Special Topicsversion 200510McAfee®IntruShield® IPS SystemBest PracticesMcAfee® Network ProtectionIndustry-leading intrusion prevention solutions

Page 2

6McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Ensuring connectivity between the sensor and other network d

Page 3 - Table of Contents

7McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Ensuring connectivity between the sensor and other network d

Page 4 - IPS System 2.1

8McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Ensuring connectivity between the sensor and other network d

Page 5 - IntruShield Best Practices

9McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Initial tuning1Auto-negotiationAuto-negotiation issues typic

Page 6 - Hardware requirements

10McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Initial tuning1Many of the top alerts seen on the initial d

Page 7

11McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Initial tuning1Sensor actions There are multiple sensor act

Page 8 - Facilitating troubleshooting

12McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Creating rule sets1Creating rule setsProper creation of rul

Page 9 - Duplex mismatches

13McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Maintenance, backup, and database tuning1Maintenance, backu

Page 10 - <port>

14McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Maintenance, backup, and database tuning1Alerts and disk sp

Page 11

15McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Maintenance, backup, and database tuning1Purge.batThe purge

Page 12

COPYRIGHT© 2002 - 2005 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieva

Page 13 - Initial tuning

16McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Access Control Lists (ACL)1 Test restoration of backups pe

Page 14 - Alert filters

17McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Working on performance issues1Working on performance issues

Page 15 - Response management

18McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices SSL best practices1SSL best practicesNote that there is a p

Page 16 - Creating rule sets

19McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices SSL best practices1Supported Web serversSSL decryption is s

Page 17

20McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Sensor performance with HTTP Response processing1 TLS_RSA_

Page 18 - Dbtuning.bat

21McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Sensor performance with HTTP Response processing1HTTP Respo

Page 19 - Purge.bat

iiiTable of Contents1 IntruShield Best Practices 1Contents of this document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 20 - Access Control Lists (ACL)

ivMcAfee®IntruShield®IPS System 2.1 User-Defined Signatures Developer’s GuideUnsupported SSL functionality. . . . . . . . . . . . . . . . . . . . . .

Page 21 - Sniffer trace

11IntruShield Best PracticesThis document discusses recommended practices for using IntruShield most effectively. Topics covered include installation,

Page 22 - SSL best practices

2McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Pre-installation considerations1Pre-installation considerati

Page 23 - Supported Web servers

3McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Deploying a large number of sensors1Deploying a large number

Page 24 - Unsupported SSL functionality

4McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Facilitating troubleshooting1 Alert Traffic - if “chatty” p

Page 25 - (inbound OR outbound)

5McAfee®IntruShield® IPS System IntruShield Best PracticesSpecial Topics: Best Practices Ensuring connectivity between the sensor and other network d

Comments to this Manuals

No comments