
Data Sheet McAfee Firewall Management
See the “Who” On Your Network
McAfee rewalls leverage McAfee
Logon Collector (MLC) simplies
discovery, logon, and authentication
processes across all McAfee rewall
management tools as well as McAfee
Data Loss Prevention. This non-
invasive process maps IP addresses
to users for all types of trafc to
enable user-based policies without
requiring the user to authenticate
to the rewall or use a protocol that
supports authentication
•
Quickly discover who is using
which application and check
authenticationstatus
•
Enforce user-based access control
policies without a separate
authentication step
•
Leverage users and groups in your
Microsoft Active Directory
•
Enforce additional active
authentication for users not logged
in to the domain
•
Authenticate using captive
portal, NTLM, Radius, LDAP, and
ActiveDirectory
Searchltersletyouselectivelyviewtherulesfor
aparticularrewall,rewallgroup,ortheentire
organization,andtheneasilymodifythoserules.
Oncedened,youcandistributerulestohundreds
ofrewalls,sharingthemacrosslogicalenterprise
groups,suchasglobal,group,cluster,orlocal
domains,orcongurationdomains,suchasthose
offeredbymanagedserviceproviders.
Optimized policies deliver better rewall
performance and better security
Overtime,rulesetstendtogrow,overlap,and
becomeineffective,makingiteasiertomake
mistakes.Toreducethenumberofrules,ourtools
automatecleanup.Wizardshelpyouscanfor,
identify,andmergesimilarrules(acommonsetof
parameters)anddeleteduplicateorunusedrules
tokeeprulesetsmanageable.
Forexample,multipleadministratorsmightcreate
separateobjectsthathavedifferentnames,but
performthesamefunction.The“mergeobjects”
commandwilllookforthissituationandcleanit
upwithasinglecommonobject.Fewerrulesto
considerequalsbetterperformance.
Adaptive objects allow rule grouping
andreuse
Administratorsimplementpoliciesbydening
intelligentobjectsonce,andthenreusingthem
wheneverandwherevertheymakesense.With
objectgrouping,youcandomuchmorewitha
singleruleandconsolidaterulesets.
ControlCentersupportsmanytypesof
objects,includingrewallsandrewallgroups,
hosts,networks,addressranges,applications,
endpointgroups,andservices,includinggeo-
locationobjects.
ControlCenteralsogivesyouvisibilityintorule
usage.Youcanidentifythemostusedrules,least
usedrules,andrulesthathavenotbeenmatched
byrewalltrafcinthelast30days.Thisreal-
worlddataletsyou:
•
Movemost-usedrulestothetopoftherulelist
sotrafccanbeprocessedquickly
•
Investigateleast-usedrulestoseeiftheyare
workingasintended
•
Deleteordisableunusedrulesthatmustbe
justiedduringaudits
Youcanevencomparepolicycongurationson
allofyourControlCenter-manageddevicesto
ensureconsistencyacrossyournetwork.Robust
congurationmanagementletsyoucentrallytrack,
trace,andvalidateallpolicychanges.
Manage and monitor rewall software
Forefcientandconsistentupdates,Control
Centercanautomaticallydetectwhennew
releasesandrmwareareavailableontheMcAfee
site.Simplydownloadthelesyouneedandstore
themonControlCenter’sManagementServerfor
manualorautomatedinstallation.Whenyouare
readytoinstall,youcanpushnewreleasestoone
systemortohundredssimultaneously.
ControlCenterdisplaystheinstallationhistory
forallmanagedrewallsalongwiththeprogress
ofthecurrentdeployment.Ifneeded,youcan
restoreatrusteddevicecongurationinseconds
withafewclicksofthemouse.
Complete access control with role-based
administration and conguration domains
Somecongurationchangesareroutine,while
othersarefar-reaching.Role-basedaccessallows
youtoexertcentralized,consistent,policy-based
controloverdistributedteams,determining
whichmanagementfunctionscanbeviewedor
changedbasedoneachperson’sresponsibilities.
Role-basedaccesscanalsoensurethatonly
approveduserscreateorvalidaterules,reducing
theriskofunauthorizedchangesorruleconicts
breakingtherewall.CustomerssubjecttoPCI
DSSoftenemployrole-basedaccesstoenforce
changecontrols.
Youcancreateanynumberofrolestoaddress
eachorganization’sneedsandprivileges,associate
ruleswithroles(tolimitmodications),and
establishpriorityprotectionsforrules.Different
rolescouldbedenedto:
•
ChangeonlyDomainNameSystem(DNS)entries
•
Vieweventorauditlogs
•
Createrulesassociatedwithaspecicnetwork
serviceorprotectedserver
Youmightdictatethatcertainrulesmustalways
beatthetopofthepolicylistandmovedonlyby
certainprivilegedusers.Roles,liketherulesyou
build,linktousersandgroupsinLDAPandActive
Directorysothesystemcanauto-createorauto-
deactivateusersastheyconnecttoControlCenter
forthersttime.
Cost-Effectively Manage Multiple
Entities or Organizations
Control Center helps managed
service providers and organizations
with multi-tenant management or
reporting requirements administer
the rewalls of multiple customers or
separate entities.
•
Create “domains” or “zones” that
act as separate Control Center
instances—administrators only see
the rewall and policies for their
particular customer or entity.
•
Separate congurations for several
enterprises and hide information
about an enterprise from
administrators of other enterprises
•
Keep conguration simple and
save time and effort with common
rule objects; cross-enterprise policy
objects can still be shared or reused
by all domains
•
Role-based access control helps
enforce change control policies
Comentários a estes Manuais