Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Configuring Firewall Policies<br />
Overview of Firewall policies<br />
• If the traffic through a NIC does not match the CAG criteria, and the connection isolation<br />
option is enabled, the traffic is blocked.<br />
Figure 18: Network connection isolation<br />
As examples of using the connection isolation option, consider two settings: a corporate<br />
environment and a hotel. The active firewall rules list contains rules and groups in this order:<br />
1 Rules <strong>for</strong> basic connection<br />
2 VPN connection rules<br />
3 CAG with corporate LAN connection rules<br />
4 CAG with VPN connection rules.<br />
<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />
53