24.10.2014 Views

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

Host Intrusion Prevention 7.0.0 for ePO 4.0 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring Firewall Policies<br />

Overview of Firewall policies<br />

• If the traffic through a NIC does not match the CAG criteria, and the connection isolation<br />

option is enabled, the traffic is blocked.<br />

Figure 18: Network connection isolation<br />

As examples of using the connection isolation option, consider two settings: a corporate<br />

environment and a hotel. The active firewall rules list contains rules and groups in this order:<br />

1 Rules <strong>for</strong> basic connection<br />

2 VPN connection rules<br />

3 CAG with corporate LAN connection rules<br />

4 CAG with VPN connection rules.<br />

<strong>McAfee</strong> <strong>Host</strong> <strong>Intrusion</strong> <strong>Prevention</strong> 7.0 <strong>Product</strong> <strong>Guide</strong> <strong>for</strong> use with ePolicy Orchestrator <strong>4.0</strong><br />

53

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!