
Data Sheet McAfee Firewall Management
Does your current rewall
management help you?
•
Quickly identify who used what
application
•
Write policies to control user access
to applications
•
See rule interactions in advance
•
Easily identify rules that match trafc
•
Design and validate appropriate
rules
•
Enable real-time content and
security controls with a few clicks
•
Write ne-grained rules in your
business’ language: users and apps
•
Maintain threat visibility as
attacksemerge
•
View analytics, trending, and
visualization of log data in a single
environment
•
Quickly identify problems and
ndresolutions
•
Reduce policy size and complexity
•
Share data between network
andhost
•
Automate everyday workows
•
Streamline compliance reporting
•
Optimize policies and clean up rules
•
Integrate the rewall with existing IT
infrastructure, change processes, and
organizational structures
Command Line Controls
With McAfee, advanced users have
the option of broad command
linecontrol:
•
Full Unix shell and tool access
•
View all rewall log les, historic or
real time
•
Fully congure or import policy
•
Access command line interface (CLI)
at Console or over SSH
Firewall Administration
McAfeeprovidesbothlocalandcentralized
optionsforconguring,monitoring,and
maintainingrewalldevicesandcapabilities.
Local Administration
TheMcAfeeAdminConsoleoffersabasic
environmentforconnectingtoandmanagingone
ormorerewalls.Thisconsolemakesiteasyto
implementpoliciesthattakeadvantageofallthe
optionsofthenext-generationMcAfeeFirewall
Enterprise.Inoneview,youenablegranular,
targetedsecuritycontrols,constructingasingle
ruleforeachpolicyusingthebusinesslanguageof
applicationsandusers.
Amonitoringdashboardandone-clickaccess
topowerfulnetworktoolssuchasTCPdump,
ARP,Ping,andnslookupbringtogetherthecore
processesformanagingindividualrewalls.Full
congurationandmanagementcapabilitiesare
availableatthecommandlineaswell.
Fine grained control of applications
anddefenses
Foreachrule,afewclickswithinonegraphical
userinterfaceactivaterichsecuritycontrols,such
asintrusionprevention(IPS),anti-virus(AV),
geo-location,decryption,orreputation.Youcan
permituseofpotentiallyriskyapplicationsbut
imposeprotectionsthatmatchtheapplication’s
threatvectors.Forexample:
•
ApplyAVandIPStowebconferencing
•
LimituseofSSHandSSHtunnelingtospecic
usersandblockportforwardingtoprevent
malicioustrafc
•
Usegeo-locationtodisallowandIPStoscan
trafctoandfromadarkportionoftheweb
•
Decryptinboundtrafcforcontentinspection,
exemptingbasedonpolicy,andre-encrypt
Asyoudrafteachrule,youcancontrolsub-
capabilitiesofapplications,suchasgameson
websites,andrestrictaccessandcapabilitiesatthe
userleveltomatchroles.Rulesstayuptodateas
userschangerolesorleavethecompany.Asearch
optionhelpsyoundapplications,categories,and
capabilitiesthatyourpolicyshouldreect.
Toreducecomplexityandtroubleshooting,this
consolepresentsruleinteractionsonatab.The
displayhighlightstherulesandareasofeachrule
thatcouldcausepotentialproblems.Youcan
immediatelyidentifyconictsthatcouldprevent
yournewrulefromtakingeffect.
McAfee Firewall Enterprise Admin Console provides quick access and complete control over your firewalls
Comentários a estes Manuais