McAfee IIP-M65K-ISAA Product Guide - Page 8

Network topology considerations, Network Security Platform formerly McAfee - intrushield

Page 8 highlights

1 Overview Network topology considerations If an attack is detected, a Sensor responds according to its configured policy. Sensor can perform many types of attack responses, including generating alerts and packet logs, resetting TCP connections, "scrubbing" malicious packets, and even blocking attack packets entirely before they reach the intended target. Network topology considerations Deployment of a Sensor requires knowledge of your network to help determine the level of configuration and the number of installed Sensors. You also need to determine the number of McAfee® ePolicy Orchestrator (McAfee ePO) /McAfee NAC servers required to protect your network. The Sensor is purpose-built for the monitoring of traffic across one or more network segments. For more information, see the Getting Started Guide. Following is an example of a network topology using Gigabit Ethernet throughput. In the illustration, McAfee® Network Security Platform (formerly McAfee® IntruShield®) provides IPS protection to outsourced servers. High port-density and virtualization provides a highly scalable solution, while Network Security Platform protects against Web and eCommerce mail server exploits. Figure 1-1 A sample Network Security Platform deployment 8 McAfee® Network Security Platform M-6050 Sensor Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38

If an attack is detected, a Sensor responds according to its configured policy. Sensor can perform
many types of attack responses, including generating alerts and packet logs, resetting TCP
connections, "scrubbing" malicious packets, and even blocking attack packets entirely before they
reach the intended target.
Network topology considerations
Deployment of a Sensor requires knowledge of your network to help determine the level of
configuration and the number of installed Sensors. You also need to determine the number of McAfee
®
ePolicy Orchestrator (McAfee ePO) /McAfee NAC servers required to protect your network. The Sensor
is purpose-built for the monitoring of traffic across one or more network segments. For more
information, see the
Getting Started Guide.
Following is an example of a network topology using Gigabit Ethernet throughput. In the illustration,
McAfee
®
Network Security Platform (formerly McAfee
®
IntruShield
®
) provides IPS protection to
outsourced servers. High port-density and virtualization provides a highly scalable solution, while
Network Security Platform protects against Web and eCommerce mail server exploits.
Figure 1-1
A sample Network Security Platform deployment
1
Overview
Network topology considerations
8
McAfee
®
Network Security Platform
M-6050 Sensor Product Guide