McAfee FWEC2050UPGA Datasheet Page 2

  • Download
  • Add to my manuals
  • Print
  • Page
    / 8
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 1
Does Your Current Firewall
Management Help You?
•
Quickly identify who used
whatapplication.
•
Write policies to control user
access to applications.
•
See rule interactions in advance.
•
Easily identify rules that
matchtrafc.
•
Design and validate
appropriaterules.
•
Enable real-time content
andsecurity controls with a
fewclicks.
•
Write ne-grained rules in
yourbusiness’ language: Users
and apps.
•
Maintain threat visibility as
attacksemerge.
•
View analytics, trending, and
visualization of log data in a
single environment.
•
Quickly identify problems and
ndresolutions.
•
Reduce policy size and
complexity.
•
Share data between network
andhost.
•
Automate everyday workows.
•
Streamline compliance reporting.
•
Optimize policies and clean
uprules.
•
Integrate the rewall with
existing IT infrastructure,
changeprocesses, and
organizational structures.
Command Line Controls
With McAfee, advanced users
have the option of broad
command linecontrol:
•
Full Unix shell and tool access.
•
View all rewall log les, historic
or real time.
•
Fully congure or import policy.
•
Access command line interface
(CLI) at console or over SSH.
Firewall Administration
McAfee provides both local and centralized
options for conguring, monitoring, and
maintaining rewall devices and capabilities.
Local administration
The McAfee Firewall Enterprise Admin Console
offers a basic environment for connecting
to and managing one or more rewalls. This
console makes it easy to implement policies that
take advantage of all the options of the next-
generation McAfee Firewall Enterprise. In one view,
you enable granular, targeted security controls,
constructing a single rule for each policy using the
business language of applications and users.
A monitoring dashboard and one-click access
to powerful network tools such as TCPdump,
ARP, Ping, and nslookup bring together the core
processes for managing individual rewalls. Full
conguration and management capabilities are
available at the command line as well.
Fine-grained control of applications
anddefenses
For each rule, a few clicks within one graphical
user interface activate rich security controls,
such as IPS, AV, geo-location, decryption, or
reputation. You can permit use of potentially risky
applications but impose protections that match
the application’s threatvectors. For example:
•
Apply AV and IPS to web conferencing.
•
Limit use of SSH and SSH tunneling to specic
users and block port forwarding to prevent
malicious trafc.
•
Use geo-location to disallow and IPS to scan
trafc to and from a dark portion of the web.
•
Decrypt inbound trafc for content inspection,
exempting based on policy, and re-encrypt.
As you draft each rule, you can control sub-
capabilities of applications, such as games on
websites, and restrict access and capabilities at the
user level to match roles. Rules stay up to date as
users change roles or leave the company. A search
option helps you nd applications, categories, and
capabilities that your policy should reect.
To reduce complexity and troubleshooting, this
console presents rule interactions on a tab. The
display highlights the rules and areas of each rule
that could cause potential problems. You can
immediately identify conicts that could prevent
your new rule from taking effect.
Figure 1. McAfee Firewall Enterprise Admin Console provides quick access and complete control over your firewalls.
Page view 1
1 2 3 4 5 6 7 8

Comments to this Manuals

No comments