Does Your Current Firewall
Management Help You?
•
Quickly identify who used
whatapplication.
•
Write policies to control user
access to applications.
•
See rule interactions in advance.
•
Easily identify rules that
matchtrafc.
•
Design and validate
appropriaterules.
•
Enable real-time content
andsecurity controls with a
fewclicks.
•
Write ne-grained rules in
yourbusiness’ language: Users
and apps.
•
Maintain threat visibility as
attacksemerge.
•
View analytics, trending, and
visualization of log data in a
single environment.
•
Quickly identify problems and
ndresolutions.
•
Reduce policy size and
complexity.
•
Share data between network
andhost.
•
Automate everyday workows.
•
Streamline compliance reporting.
•
Optimize policies and clean
uprules.
•
Integrate the rewall with
existing IT infrastructure,
changeprocesses, and
organizational structures.
Command Line Controls
With McAfee, advanced users
have the option of broad
command linecontrol:
•
Full Unix shell and tool access.
•
View all rewall log les, historic
or real time.
•
Fully congure or import policy.
•
Access command line interface
(CLI) at console or over SSH.
Firewall Administration
McAfee provides both local and centralized
options for conguring, monitoring, and
maintaining rewall devices and capabilities.
Local administration
The McAfee Firewall Enterprise Admin Console
offers a basic environment for connecting
to and managing one or more rewalls. This
console makes it easy to implement policies that
take advantage of all the options of the next-
generation McAfee Firewall Enterprise. In one view,
you enable granular, targeted security controls,
constructing a single rule for each policy using the
business language of applications and users.
A monitoring dashboard and one-click access
to powerful network tools such as TCPdump,
ARP, Ping, and nslookup bring together the core
processes for managing individual rewalls. Full
conguration and management capabilities are
available at the command line as well.
Fine-grained control of applications
anddefenses
For each rule, a few clicks within one graphical
user interface activate rich security controls,
such as IPS, AV, geo-location, decryption, or
reputation. You can permit use of potentially risky
applications but impose protections that match
the application’s threatvectors. For example:
•
Apply AV and IPS to web conferencing.
•
Limit use of SSH and SSH tunneling to specic
users and block port forwarding to prevent
malicious trafc.
•
Use geo-location to disallow and IPS to scan
trafc to and from a dark portion of the web.
•
Decrypt inbound trafc for content inspection,
exempting based on policy, and re-encrypt.
As you draft each rule, you can control sub-
capabilities of applications, such as games on
websites, and restrict access and capabilities at the
user level to match roles. Rules stay up to date as
users change roles or leave the company. A search
option helps you nd applications, categories, and
capabilities that your policy should reect.
To reduce complexity and troubleshooting, this
console presents rule interactions on a tab. The
display highlights the rules and areas of each rule
that could cause potential problems. You can
immediately identify conicts that could prevent
your new rule from taking effect.
Figure 1. McAfee Firewall Enterprise Admin Console provides quick access and complete control over your firewalls.
Comments to this Manuals