McAfee HISCDE-AB-IA Product Guide - Page 53

How firewall rules work, Firewall protocols

Page 53 highlights

Configuring Firewall Policies Overview of Firewall policies How firewall rules work Firewall rules determine how to handle network traffic. Each rule provides a set of conditions that traffic has to meet and an action to allow or block traffic. When Host Intrusion Prevention finds traffic that matches a rule's conditions, it performs the associated action. Host Intrusion Prevention uses precedence to apply rules: the rule at the top of the firewall rules list is applied first. If the traffic meets this rule's conditions, Host Intrusion Prevention allows or blocks the traffic. It does not try to apply any other rules in the list. If, however, the traffic does not meet the first rule's conditions, Host Intrusion Prevention looks at the next rule in the list. It works its way down through the firewall rules list until it finds a rule that the traffic matches. If no rule matches, the firewall automatically blocks the traffic. If learn mode is activated, the user is prompted for an action to be taken. If adaptive mode is activated, an allow rule is created for the traffic. Sometimes the intercepted traffic matches more than one rule in the list. In this case, precedence means that Host Intrusion Prevention applies only the first matching rule in the list. Best practices When you create or customize a firewall rules policy, place the more specific rules at the top of the list, and the more general rules at the bottom. This ensures that Host Intrusion Prevention filters traffic appropriately. For example, to allow all HTTP requests except from a specific address (for example, IP address 10.10.10.1), you need to create two rules: • Block Rule - Block HTTP traffic from IP address 10.10.10.1. This rule is more specific. • Allow Rule - Allow all traffic using the HTTP service. This rule is more general. You must place the more specific Block Rule higher in the firewall rules list than the more general Allow Rule. This ensures that when the firewall intercepts the HTTP request from address 10.10.10.1, the first matching rule it finds is the one that blocks this traffic through the firewall. If you placed the more general Allow Rule higher than the more specific Block Rule, Host Intrusion Prevention would match all HTTP requests against the Allow Rule before it found the Block Rule. It would thus allow the traffic, even though you wanted to block the HTTP request from a specific address. Firewall protocols Firewall protection works at several layers of the network architecture, where different criteria are used to restrict network traffic. This network architecture is built on the Transmission Control Protocol/Internet Protocol (TCP/IP) suite. Link Layer The link layer protocol describes the media access control (MAC) method, and some minor error-detection facilities. Ethernet LAN (802.3), wireless Wi-Fi (802.11x), and virtual LAN (VPN) are in this layer. Both firewall rules and groups distinguish between wired, wireless, and virtual links. Network Layer The network layer protocols define whole-network addressing schemes, routing, and network control schemes. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 53

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

How firewall rules work
Firewall rules determine how to handle network traffic. Each rule provides a set of conditions
that traffic has to meet and an action to allow or block traffic. When Host Intrusion Prevention
finds traffic that matches a rule’s conditions, it performs the associated action.
Host Intrusion Prevention uses precedence to apply rules: the rule at the top of the firewall
rules list is applied first. If the traffic meets this rule’s conditions, Host Intrusion Prevention
allows or blocks the traffic. It does not try to apply any other rules in the list. If, however, the
traffic does not meet the first rule’s conditions, Host Intrusion Prevention looks at the next rule
in the list. It works its way down through the firewall rules list until it finds a rule that the traffic
matches. If no rule matches, the firewall automatically blocks the traffic. If learn mode is
activated, the user is prompted for an action to be taken. If adaptive mode is activated, an
allow rule is created for the traffic. Sometimes the intercepted traffic matches more than one
rule in the list. In this case, precedence means that Host Intrusion Prevention applies only the
first matching rule in the list.
Best practices
When you create or customize a firewall rules policy, place the more specific rules at the top
of the list, and the more general rules at the bottom. This ensures that Host Intrusion Prevention
filters traffic appropriately.
For example, to allow all HTTP requests except from a specific address (for example, IP address
10.10.10.1), you need to create two rules:
Block Rule
— Block HTTP traffic from IP address 10.10.10.1. This rule is more specific.
Allow Rule
— Allow all traffic using the HTTP service. This rule is more general.
You must place the more specific Block Rule higher in the firewall rules list than the more general
Allow Rule. This ensures that when the firewall intercepts the HTTP request from address
10.10.10.1, the first matching rule it finds is the one that blocks this traffic through the firewall.
If you placed the more general Allow Rule higher than the more specific Block Rule, Host
Intrusion Prevention would match all HTTP requests against the Allow Rule before it found the
Block Rule. It would thus allow the traffic, even though you wanted to block the HTTP request
from a specific address.
Firewall protocols
Firewall protection works at several layers of the network architecture, where different criteria
are used to restrict network traffic. This network architecture is built on the Transmission Control
Protocol/Internet Protocol (TCP/IP) suite.
Link Layer
The link layer protocol describes the media access control (MAC) method, and some minor
error-detection facilities.
Ethernet LAN (802.3), wireless Wi-Fi (802.11x), and virtual LAN (VPN) are in this layer. Both
firewall rules and groups distinguish between wired, wireless, and virtual links.
Network Layer
The network layer protocols define whole-network addressing schemes, routing, and network
control schemes.
Configuring Firewall Policies
Overview of Firewall policies
53
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5