McAfee HARDWARE 1.4 Guia de Instalação Página 17

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 61
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 16
McAfee Email Gateway
Security Target
McAfee Incorporated
Page 17 of 61
module based scanning approach. Traffic is first intercepted as it traverses the appliance, and it is
processed for scanning. Based on protocol, specific scanning module processes are implemented to
scan for various malicious file types or restricted content. Denial of Service (DoS) attacks can also be
identified and thwarted through the scanning function of the McAfee MEG appliance.
Protocols included in scanning are POP3 and, SMTP. All traffic types traversing the appliance are
subject to scanning as configured for scanning by the TOE Administrator.
The McAfee MEG TOE logical description is divided into the following sections:
Security Management
Identification and Authentication
Audit and Alerts
Cryptographic Operations
This section contains the product features, and denotes which are in the TOE.
Note: The Security Management O.S. supports all these functions by supporting the listed modules and
providing Security Management functions to support configuration of these modules
.
1.8.1 Security Management
Management Interface
Security Management functions include an administrator interface, rendered by Apache Webserver, and
functionality to allow for configuration and management of the Appliance.
There are three methods of accessing the administrator interface:
1. Browser-based session on a web console machine from a connected network. This provides
access to the graphical user interface used to configure all aspects of the appliance behaviour.
2. Serial port access. This provides access to a restricted console interface that can be used only to
configure the limited settings of the appliance to allow access to configure the appliance over the
network
1
. This serial based access is typically only used during installation for initial
configuration, and use for any other purpose is not covered in the CC evaluated configuration.
3. Direct monitor/keyboard/pointing device connection. This provides access to the restricted
console interface as described for serial port access above.
Regardless of the physical mode of accessing the appliance, administrators are provided with GUI access
to:
1. The appliance configuration files;
2. The appliance console;
3. The logging subsystem, which manages access to appliance audit logs and reports.
1
The limited settings available via the console interface are those that can be configured in the Basic
Settings using the standard setup wizard via the GUI; namely host name and domain, operational mode
for the appliance, LAN1 and LAN2 settings, NIC settings (IP address, gateway and mask), gateway
information and DNS server settings.
Vista de página 16
1 2 ... 12 13 14 15 16 17 18 19 20 21 22 ... 60 61

Comentários a estes Manuais

Sem comentários