McAfee MSA-3400-SWGI Installation Guide - Page 20

Workload management, The appliances includes its own internal workload management

Page 20 highlights

Pre-installation Deployment Strategies for Using the device in a DMZ When Exchange servers communicate with each other, they send their initial packets using the RPC protocol (TCP port 135). However, once the initial communication is established, two ports are chosen dynamically and used to send all subsequent packets for the remainder of the communication. You cannot configure a firewall to recognize these dynamically-chosen ports. Therefore, the firewall does not pass the packets. The workaround is to modify the registry on each of the Exchange servers communicating across the firewall to always use the same two "dynamic" ports, then open TCP 135 and these two ports on the firewall. We mention this workaround to provide a comprehensive explanation, but we do not recommend it. The RPC protocol is widespread on Microsoft networks - opening TCP 135 inbound is a red flag to most security professionals. If you intend to use this workaround, details can be found in the following Knowledge Base articles on the Microsoft website: • Q155831 • Q176466 Workload management The appliances includes its own internal workload management, distributing the scanning load evenly between all appliances configured to work together. The blade server includes its own internal workload management, distributing the scanning load evenly between all scanning blades installed within the enclosure. You do not need to deploy an external load balancer. Pre-installation 20 McAfee Email and Web Security Appliance 5.5 Installation Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60

When Exchange servers communicate with each other, they send their initial packets using the
RPC protocol (TCP port 135). However, once the initial communication is established, two ports
are chosen dynamically and used to send all subsequent packets for the remainder of the
communication. You cannot configure a firewall to recognize these dynamically-chosen ports.
Therefore, the firewall does not pass the packets.
The workaround is to modify the registry on each of the Exchange servers communicating
across the firewall to always use the same two “dynamic” ports, then open TCP 135 and these
two ports on the firewall.
We mention this workaround to provide a comprehensive explanation, but we do not recommend
it. The RPC protocol is widespread on Microsoft networks — opening TCP 135 inbound is a red
flag to most security professionals.
If you intend to use this workaround, details can be found in the following Knowledge Base
articles on the Microsoft website:
Q155831
Q176466
Workload management
The appliances includes its own internal workload management, distributing the scanning load
evenly between all appliances configured to work together.
The blade server includes its own internal workload management, distributing the scanning
load evenly between all scanning blades installed within the enclosure.
You do not need to deploy an external load balancer.
Pre-installation
Pre-installation
Deployment Strategies for Using the device in a DMZ
McAfee Email and Web Security Appliance 5.5 Installation Guide
20