McAfee M-1250 IPS Configuration Guide - Page 216

Deleting SSL key files from Manager, Configuring at the interface level

Page 216 highlights

McAfee® Network Security Platform 5.1 The IPS Sensor_Name node Deleting SSL key files from Manager To delete escrowed SSL key files from Manager, do the following: 1 Click Sensor_Name > SSL Decryption > Key Management. 2 Select the radio button in the Update column for the desired Sensor. 3 Click Next. 4 Click Delete. Confirm the deletion. Configuring at the interface level Configuring at the interface level involves enabling McAfee-NAC-based response action for the ports. For ports deployed in inline mode, you can enable McAfee NAC forwarding, Network Security Platform quarantine and remediation for each port in a port-pair. For ports deployed in tap and SPAN modes, you can only enable McAfee NAC forwarding. If a McAfee-NAC-enabled attack is detected passing through a port for which you have enabled McAfee NAC forwarding, then the Network Security Sensor alerts the corresponding McAfee NAC server with the details of the attack. This also depends whether you have enabled McAfee NAC notification at the policy level. Warning: McAfee NAC uses the MAC addresses of attacking hosts to quarantine them. Network Security Sensors forward details of attacking hosts, including their MAC addresses, to the McAfee NAC server. However, if there is a Layer 3 device between the Network Security Sensor and an attacking host, then the device rewrites the source MAC address with its own. That is, the Network Security Sensor will receive the MAC address of the device as the source MAC address instead of the MAC address of the attacking host. Because of this reason, you should not enable alert forwarding to the McAfee NAC server for the Sensor ports that are connected to only Layer 3 devices. If a port is connected to a mixture of Layer 3 and Layer 2 devices, then you should include the MAC addresses of the Layer 3 devices in the Excluded MAC address list so that these devices are not quarantined by McAfee NAC. To enable or disable McAfee NAC forwarding for the ports in a Sensor: 1 Select Sensors > Sensor_Name > NAC > Port Settings or Sensors > Sensor_Name > Interface_Name > NAC. In the Enable Port Settings page, you can view the McAfee NAC configuration details as well as Network Security Sensor quarantine details of the ports in the Sensor. For information on Network Security Sensor quarantine details, Updating Quarantine and Remediation Status, Sensor Configuration Guide. 2 Select a port by clicking the check box adjacent to the Port column and then select or clear the Quarantine, Remediate, and Enable McAfee NAC based on your requirements: To just forward the attack details to McAfee NAC, select only Enable McAfee NAC. To forward the attack details to McAfee NAC and also quarantine the attacking host based on McAfee NAC response, select Quarantine and Enable McAfee NAC. Select Remediate, if required. 208

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259

McAfee® Network Security Platform 5.1
The IPS Sensor_Name node
208
Deleting SSL key files from Manager
To delete escrowed SSL key files from Manager, do the following:
1
Click
Sensor_Name > SSL Decryption > Key Management
.
2
Select the radio button in the
Update
column for the desired Sensor.
3
Click
Next
.
4
Click
Delete
. Confirm the deletion.
Configuring at the interface level
Configuring at the interface level involves enabling McAfee-NAC-based response action
for the ports. For ports deployed in inline mode, you can enable McAfee NAC forwarding,
Network Security Platform quarantine and remediation for each port in a port-pair. For
ports deployed in tap and SPAN modes, you can only enable McAfee NAC forwarding.
If a McAfee-NAC-enabled attack is detected passing through a port for which you have
enabled McAfee NAC forwarding, then the Network Security Sensor alerts the
corresponding McAfee NAC server with the details of the attack. This also depends
whether you have enabled McAfee NAC notification at the policy level.
Warning:
McAfee NAC uses the MAC addresses of attacking hosts to quarantine
them. Network Security Sensors forward details of attacking hosts, including their
MAC addresses, to the McAfee NAC server. However, if there is a Layer 3 device
between the Network Security Sensor and an attacking host, then the device
rewrites the source MAC address with its own. That is, the Network Security Sensor
will receive the MAC address of the device as the source MAC address instead of
the MAC address of the attacking host. Because of this reason, you should not
enable alert forwarding to the McAfee NAC server for the Sensor ports that are
connected to only Layer 3 devices. If a port is connected to a mixture of Layer 3 and
Layer 2 devices, then you should include the MAC addresses of the Layer 3 devices
in the Excluded MAC address list so that these devices are not quarantined by
McAfee NAC.
To enable or disable McAfee NAC forwarding for the ports in a Sensor:
1
Select
Sensors > Sensor_Name > NAC > Port Settings
or
Sensors > Sensor_Name > Interface_Name >
NAC
.
In the Enable Port Settings page, you can view the McAfee NAC configuration details
as well as Network Security Sensor quarantine details of the ports in the Sensor. For
information on Network Security Sensor quarantine details,
Updating Quarantine and
Remediation Status,
Sensor Configuration Guide.
2
Select a port by clicking the check box adjacent to the Port column and then select or
clear the
Quarantine, Remediate,
and
Enable McAfee NAC
based on your requirements:
±
To just forward the attack details to McAfee NAC, select only
Enable McAfee NAC
.
±
To forward the attack details to McAfee NAC and also quarantine the attacking
host based on McAfee NAC response, select
Quarantine
and
Enable McAfee NAC
.
Select
Remediate,
if required.