McAfee HISCDE-AB-IA Product Guide - Page 63

How learn and adaptive modes affect the firewall, FAQ - Adaptive mode, Managing Your Protection

Page 63 highlights

Configuring Firewall Policies Overview of Firewall policies Protocol FTP Description of handling • The firewall performs stateful packet inspection on TCP connections opened on port 21. Inspection occurs only on the control channel, the first connection opened on this port. • FTP inspection is performed only on the packets that carry new information. Retransmitted packets are ignored. • Dynamic rules are created depending on direction (client/server) and mode (active/passive): • Client FTP Active Mode: the firewall creates a dynamic incoming rule after parsing the incoming port command, provided the port command RFC 959 compliant. The rule is deleted when the server initiates the data connection or the rule expires. • Server FTP Active Mode: the firewall creates a dynamic outgoing rule after parsing the incoming port command. • Client FTP Passive Mode: the firewall creates a dynamic outgoing rule when it reads the PASV command response sent by the FTP server, provided it has previously seen the PASV command from the FTP client and the PASV command is RFC 959 compliant. The rule is deleted when the client initiates the data connection or the rule expires. • Server FTP Passive Mode: the firewall creates a dynamic incoming rule. How learn and adaptive modes affect the firewall When you enable the firewall, Host Intrusion Prevention continually monitors the network traffic that a computer sends and receives. It allows or blocks traffic based on the Firewall Rules policy. If the traffic cannot be matched against an existing rule, it is automatically blocked unless the firewall is operating in learn mode or adaptive mode. In learn mode, Host Intrusion Prevention displays a learn mode alert when it intercepts unknown network traffic. This alert prompts the user to allow or block any traffic that does not match an existing rule, and automatically creates corresponding dynamic rules for the non-matching traffic. You can enable learn mode for incoming communication only, for outgoing communication only, or both. In adaptive mode, Host Intrusion Preventionn automatically creates an allow rule to allow all traffic that does not match any existing block rule, and automatically creates dynamic allow rules for non-matching traffic. For more information on using the adaptive mode with the firewall, see FAQ - Adaptive mode under Managing Your Protection. For security reasons, when the learn mode or adaptive mode is applied, incoming pings are blocked unless an explicit allow rule is created for incoming ICMP traffic. In addition, incoming traffic to a port that is not open on the host is blocked unless an explicit allow rule is created for the traffic. For example, if the host has not started telnet service, incoming TCP traffic to port 23 (telnet) is blocked even when there is no explicit rule to block this traffic. You can create an explicit allow rule for any desired traffic. Host Intrusion Prevention displays all the rules created on clients through learn mode or adaptive mode, and allows these rules to be saved and migrated to administrative rules. Stateful filtering When adaptive or learn mode is applied with the stateful firewall, the filtering process creates a new rule to handle the incoming packet. This is the filtering process: 1 The firewall compares an incoming packet against entries in the state table and finds no match, then examines the static rule list and finds no match. 2 No entry is made in the state table, but if this is a TCP packet, it is put in a pending list. If not, the packet is dropped. McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5 63

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154

Description of handling
Protocol
FTP
The firewall performs stateful packet inspection on TCP connections opened on port 21.
Inspection occurs only on the control channel, the first connection opened on this port.
FTP inspection is performed only on the packets that carry new information. Retransmitted
packets are ignored.
Dynamic rules are created depending on direction (client/server) and mode (active/passive):
Client FTP Active Mode: the firewall creates a dynamic incoming rule after parsing the
incoming port command, provided the port command RFC 959 compliant. The rule is deleted
when the server initiates the data connection or the rule expires.
Server FTP Active Mode: the firewall creates a dynamic outgoing rule after parsing the
incoming port command.
Client FTP Passive Mode: the firewall creates a dynamic outgoing rule when it reads the
PASV command response sent by the FTP server, provided it has previously seen the PASV
command from the FTP client and the PASV command is RFC 959 compliant. The rule is
deleted when the client initiates the data connection or the rule expires.
Server FTP Passive Mode: the firewall creates a dynamic incoming rule.
How learn and adaptive modes affect the firewall
When you enable the firewall, Host Intrusion Prevention continually monitors the network traffic
that a computer sends and receives. It allows or blocks traffic based on the Firewall Rules policy.
If the traffic cannot be matched against an existing rule, it is automatically blocked unless the
firewall is operating in learn mode or adaptive mode.
In learn mode, Host Intrusion Prevention displays a learn mode alert when it intercepts unknown
network traffic. This alert prompts the user to allow or block any traffic that does not match an
existing rule, and automatically creates corresponding dynamic rules for the non-matching
traffic. You can enable learn mode for incoming communication only, for outgoing communication
only, or both.
In adaptive mode, Host Intrusion Preventionn automatically creates an allow rule to allow all
traffic that does not match any existing block rule, and automatically creates dynamic allow
rules for non-matching traffic. For more information on using the adaptive mode with the firewall,
see
FAQ — Adaptive mode
under
Managing Your Protection
.
For security reasons, when the learn mode or adaptive mode is applied, incoming pings are
blocked unless an explicit allow rule is created for incoming ICMP traffic. In addition, incoming
traffic to a port that is not open on the host is blocked unless an explicit allow rule is created
for the traffic. For example, if the host has not started telnet service, incoming TCP traffic to
port 23 (telnet) is blocked even when there is no explicit rule to block this traffic. You can create
an explicit allow rule for any desired traffic.
Host Intrusion Prevention displays all the rules created on clients through learn mode or adaptive
mode, and allows these rules to be saved and migrated to administrative rules.
Stateful filtering
When adaptive or learn mode is applied with the stateful firewall, the filtering process creates
a new rule to handle the incoming packet. This is the filtering process:
1
The firewall compares an incoming packet against entries in the state table and finds no
match, then examines the static rule list and finds no match.
2
No entry is made in the state table, but if this is a TCP packet, it is put in a pending list. If
not, the packet is dropped.
Configuring Firewall Policies
Overview of Firewall policies
63
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5