McAfee HISCDE-AB-IA Product Guide - Page 59

Firewall stateful packet filtering and inspection, Hide/Show, Filter Options, Set Filter, Clear

Page 59 highlights

Configuring Firewall Policies Overview of Firewall policies • Location - List of location-specific information for firewall groups Table 7: Host IPS Catalog as source for items Feature Policy Policy item Catalog item Dependency Firewall Firewall Rules Firewall Rule Rule Yes Firewall Firewall Rules Firewall Group Group Yes Firewall Firewall Rules Firewall Group Location Location Yes Firewall Firewall Rules Firewall Rule/Group Network Yes Firewall Firewall Rules Firewall Rule/Group Application Yes Firewall Firewall Rules Firewall Rule/Group Application Executable Yes IPS IPS Rules Application Protection Rule Executable No General Trusted Applications Trusted Application Executable No Catalog filters Each catalog page contains a filter to search for items in the list on the page. Click Hide/Show Filter Options to hide or show the filter, click Set Filter to filter with the criteria entered, click Clear to reset the filter. Copying from the catalog When using the Firewall Rule Builder or Firewall Group Builder, click the Add from Catalog button to add the appropriate item from the catalog. This creates a dependent link between the items, which can be broken when required. Adding to the catalog You add to the catalog in one of three ways: • Click New in the catalog page, enter the information, and save the item. • Click Add to Catalog next to the item when creating or editing rules or groups using the Firewall Rule Builder or Firewall Group Builder. • Click Import to add previously exported Host iPS catalog data in .xml format. NOTE: Policy Catalog exports in .xml format are not compatible with the Host IPS Catalog .xml format. This means you cannot export a Firewall Rules policy from the Policy Catalog and import it in to the Host IPS Catalog to populate it with firewall rules data from the policy. To get firewall policy data into the Host IPS Catalog, use the Add to Catalog links. Firewall stateful packet filtering and inspection The firewall in Host Intrusion Prevention provides both stateful packet filtering and stateful packet inspection. Stateful packet filtering is the stateful tracking of TCP/UDP/ICMP protocol information at Transport Layer 4 and lower of the OSI network stack. Each packet is examined and if the inspected packet matches an existing firewall allow rule, the packet is allowed and an entry is made in a state table. The state table dynamically tracks connections previously matched against a static rule set, and reflects the current connection state of the TCP/UDP/ICMP protocols. If an inspected packet matches an existing entry in the state table, the packet is allowed without further scrutiny. When a connection is closed or times out, its entry is removed from the state table. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 59

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Location — List of location-specific information for firewall groups
Table 7: Host IPS Catalog as source for items
Dependency
Catalog item
Policy item
Policy
Feature
Yes
Rule
Firewall Rule
Firewall Rules
Firewall
Yes
Group
Firewall Group
Firewall Rules
Firewall
Yes
Location
Firewall Group Location
Firewall Rules
Firewall
Yes
Network
Firewall Rule/Group
Firewall Rules
Firewall
Yes
Application
Firewall Rule/Group
Firewall Rules
Firewall
Yes
Executable
Firewall Rule/Group Application
Firewall Rules
Firewall
No
Executable
Application Protection Rule
IPS Rules
IPS
No
Executable
Trusted Application
Trusted Applications
General
Catalog filters
Each catalog page contains a filter to search for items in the list on the page. Click
Hide/Show
Filter Options
to hide or show the filter, click
Set Filter
to filter with the criteria entered, click
Clear
to reset the filter.
Copying from the catalog
When using the Firewall Rule Builder or Firewall Group Builder, click the
Add from Catalog
button to add the appropriate item from the catalog. This creates a dependent link between
the items, which can be broken when required.
Adding to the catalog
You add to the catalog in one of three ways:
Click
New
in the catalog page, enter the information, and save the item.
Click
Add to Catalog
next to the item when creating or editing rules or groups using the
Firewall Rule Builder or Firewall Group Builder.
Click
Import
to add previously exported Host iPS catalog data in .xml format.
NOTE:
Policy Catalog exports in .xml format are not compatible with the Host IPS Catalog
.xml format. This means you cannot export a Firewall Rules policy from the Policy Catalog
and import it in to the Host IPS Catalog to populate it with firewall rules data from the policy.
To get firewall policy data into the Host IPS Catalog, use the
Add to Catalog
links.
Firewall stateful packet filtering and inspection
The firewall in Host Intrusion Prevention provides both stateful packet filtering and stateful
packet inspection.
Stateful packet filtering is the stateful tracking of TCP/UDP/ICMP protocol information at Transport
Layer 4 and lower of the OSI network stack. Each packet is examined and if the inspected
packet matches an existing firewall allow rule, the packet is allowed and an entry is made in a
state table. The state table dynamically tracks connections previously matched against a static
rule set, and reflects the current connection state of the TCP/UDP/ICMP protocols. If an inspected
packet matches an existing entry in the state table, the packet is allowed without further scrutiny.
When a connection is closed or times out, its entry is removed from the state table.
Configuring Firewall Policies
Overview of Firewall policies
59
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5