McAfee MAP-3300-SWG Product Guide - Page 84

TLS options (advanced), Connection and Protocol Settings (POP3)

Page 84 highlights

Overview of Email features Email Configuration Table 61 Option definitions Option Browse Passphrase to unlock the private key Format Definition Use Browse to locate the file containing your Transport Layer Security certificate and key. Enter the passphrase that you included when you requested the certificate be created. Select either Base-64 encoded certificates and private key, or PKCS#12 secure key file, as applicable. You can also choose to import any CA certificates contained within the file that you import. TLS options (advanced) Use this area to specify the type of ciphers for TLS encryption. Table 62 Option definitions Option Cipher strength Definition Provides a choice of cipher strengths. By default, ciphers with a full range of strengths are supported. If necessary, the range of supported cipher strengths can be limited to 128-bit or greater. Allow no encryption Allow anonymous key exchange If selected, ciphers without encryption are supported. McAfee does not recommend using unencrypted TLS connections, so this setting is disabled by default. If selected, ciphers without authentication are supported. McAfee does not recommend using unauthenticated TLS connections, so this setting is disabled by default. When unauthenticated ciphers are supported, some destination servers might choose these ciphers in preference to authenticated ciphers. Connection and Protocol Settings (POP3) Use this area to specify settings for the POP3 protocol such as port numbers and time-outs. Email | Email Configuration | Protocol Configuration | Connection and Protocol Settings (POP3) Optionally specify periods when some parts of the network will not be scanned. Before turning off scanning of any traffic, consider the security risks. The most secure option is to scan all traffic. If an appliance is operating in a transparent mode, use this feature to exclude some parts of the network from scanning traffic in a protocol during specific periods. You might need to do this if you regularly move many large files through the appliance. Changing these settings can affect scanning performance. If you are not sure about the impact of making any changes, ask your network expert. 84 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Table 61
Option definitions
Option
Definition
Browse
Use
Browse
to locate the file containing your Transport Layer Security
certificate and key.
Passphrase to unlock the
private key
Enter the passphrase that you included when you requested the certificate
be created.
Format
Select either
Base-64 encoded certificates and private key
, or
PKCS#12 secure key file
, as
applicable.
You can also choose to import any CA certificates contained within the file
that you import.
TLS options (advanced)
Use this area to specify the type of ciphers for TLS encryption.
Table 62
Option definitions
Option
Definition
Cipher strength
Provides a choice of cipher strengths.
By default, ciphers with a full range of strengths are supported. If necessary, the
range of supported cipher strengths can be limited to 128-bit or greater.
Allow no encryption
If selected, ciphers without encryption are supported. McAfee does not
recommend using unencrypted TLS connections, so this setting is disabled by
default.
Allow anonymous key
exchange
If selected, ciphers without authentication are supported. McAfee does not
recommend using unauthenticated TLS connections, so this setting is disabled by
default.
When unauthenticated ciphers are supported, some destination servers might
choose these ciphers in preference to authenticated ciphers.
Connection and Protocol Settings (POP3)
Use this area to specify settings for the POP3 protocol such as port numbers and time-outs.
Email
|
Email Configuration
|
Protocol Configuration
|
Connection and Protocol Settings (POP3)
Optionally specify periods when some parts of the network will not be scanned.
Before turning off scanning of any traffic, consider the security risks. The
most secure option is to scan all traffic. If an appliance is operating in a
transparent mode, use this feature to exclude some parts of the network
from scanning traffic in a protocol during specific periods. You might
need to do this if you regularly move many large files through the
appliance.
Changing these settings can affect scanning performance. If you are not
sure about the impact of making any changes, ask your network expert.
Overview of Email features
Email Configuration
84
McAfee Email and Web Security Appliances 5.6.0 Product Guide