McAfee HISCDE-AB-IA Product Guide - Page 136

Appendix B — Troubleshooting, General issues

Page 136 highlights

Appendix B - Troubleshooting KnowledgeBase articles on the McAfee Support site http://mcafee.com offer you the most up-to-date support information on issues and troubleshooting. Refer to KB69184 for the latest information. Contents General issues Host IPS logs Clientcontrol.exe utility General issues Which Host Intrusion Prevention services should be installed and running on the client system for proper functioning of the software? These services should always be active to provide intrusion prevention protection with either or both IPS and firewall: • McAfee Host Intrusion Prevention Service (FireSvc.exe) • McAfee Firewall Core Service (mfefire.exe) • McAfee Validation Trust Protection Service (mfevtps.exe) These services should be active when called: • McAfee Host Intrusion Prevention system tray icon service (FireTray.exe). • McAfee Host Intrusion Prevention client console (McAfeeFire.exe) How do I prevent the firewall from blocking non-IP traffic? Unless specifically indicated in a firewall rule, some types of non-IP traffic are not recognized by the firewall and as a result are blocked. Additionally, the adaptive and learn modes do not dynamically detect and create firewall rules for non-IP protocols. To prevent non-IP protocols from being dropped, select Allow traffic for unsupported protocols in the Firewall Options policy. You can then check the Activity Log for Allowed Incoming/Outgoing Non-IP Protocol: 0xXXX, where 0xXXX indicates the IANA Ethernet number of the protocol (see htttp://www.iana.org/assignments/ethernet-numbers). Use this information to determine the non-IP traffic that is needed and create a firewall rule that allows it. 136 McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Appendix B — Troubleshooting
KnowledgeBase articles on the McAfee Support site
http://mcafee.com
offer you the most
up-to-date support information on issues and troubleshooting. Refer to KB69184 for the latest
information.
Contents
General issues
Host IPS logs
Clientcontrol.exe utility
General issues
Which Host Intrusion Prevention services should be installed and running on the
client system for proper functioning of the software?
These services should always be active to provide intrusion prevention protection with either
or both IPS and firewall:
McAfee Host Intrusion Prevention Service (FireSvc.exe)
McAfee Firewall Core Service (mfefire.exe)
McAfee Validation Trust Protection Service (mfevtps.exe)
These services should be active when called:
McAfee Host Intrusion Prevention system tray icon service (FireTray.exe).
McAfee Host Intrusion Prevention client console (McAfeeFire.exe)
How do I prevent the firewall from blocking non-IP traffic?
Unless specifically indicated in a firewall rule, some types of non-IP traffic are not recognized
by the firewall and as a result are blocked. Additionally, the adaptive and learn modes do not
dynamically detect and create firewall rules for non-IP protocols. To prevent non-IP protocols
from being dropped, select
Allow traffic for unsupported protocols
in the
Firewall Options
policy. You can then check the Activity Log for
Allowed Incoming/Outgoing Non-IP
Protocol:
0xXXX, where 0xXXX indicates the IANA Ethernet number of the protocol (see
htttp://www.iana.org/assignments/ethernet-numbers
). Use this information to determine the
non-IP traffic that is needed and create a firewall rule that allows it.
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
136