Product Guide
Page 2
... PACKAGE). Other names and brands may be claimed as the property of McAfee, Inc. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: ...McAfee® Network Security Platform M-1250/M-1450 Sensor Product Guide IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. COPYRIGHT Copyright © 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee...
... PACKAGE). Other names and brands may be claimed as the property of McAfee, Inc. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: ...McAfee® Network Security Platform M-1250/M-1450 Sensor Product Guide IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. COPYRIGHT Copyright © 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, ePolicy Orchestrator, McAfee ePO, McAfee EMM, McAfee...
Quick Start Guide
Page 12
or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of McAfee, Inc. McAfee and the McAfee logo are trademarks or registered trademarks of others. 12 700-3596A00 Do not copy without permission. Copyright © 2012 McAfee, Inc.
or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of McAfee, Inc. McAfee and the McAfee logo are trademarks or registered trademarks of others. 12 700-3596A00 Do not copy without permission. Copyright © 2012 McAfee, Inc.
Deployment Guide
Page 2
... GPL requires that for any Free Software licenses require that are the sole property of Posts and Telecommunications, (C) 2004. * Software copyrighted by Simon Josefsson,... (C) 2003-2004. * Software copyrighted by the Indiana University Extreme! TRADEMARKS ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT... developed by Cisco, Inc and Information Network Center of Beijing University of their respective owners. Siek (C) 1997-2000 University of McAfee, Inc. All Rights Reserved. English ...
... GPL requires that for any Free Software licenses require that are the sole property of Posts and Telecommunications, (C) 2004. * Software copyrighted by Simon Josefsson,... (C) 2003-2004. * Software copyrighted by the Indiana University Extreme! TRADEMARKS ACTIVE FIREWALL, ACTIVE SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT... developed by Cisco, Inc and Information Network Center of Beijing University of their respective owners. Siek (C) 1997-2000 University of McAfee, Inc. All Rights Reserved. English ...
Deployment Guide
Page 5
...read before beginning a procedure or that alerts you must Type: Sensor-IP-address and then press type based on your specific ENTER. McAfee® Network Security Platform 6.0 Preface Convention Example Terms that identify fields, buttons, tabs, options, selections, and commands on the User Interface (UI) are... Documentation The following documents and on the keyboard Press ENTER. On the Configuration tab, click Backup. The Service field on the Properties tab specifies the name of keys on -line help are denoted using this notation. Warning: Notes that you to prevent injury,...
...read before beginning a procedure or that alerts you must Type: Sensor-IP-address and then press type based on your specific ENTER. McAfee® Network Security Platform 6.0 Preface Convention Example Terms that identify fields, buttons, tabs, options, selections, and commands on the User Interface (UI) are... Documentation The following documents and on the keyboard Press ENTER. On the Configuration tab, click Backup. The Service field on the Properties tab specifies the name of keys on -line help are denoted using this notation. Warning: Notes that you to prevent injury,...
IPS Configuration Guide
Page 2
...SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, McAfee, McAfee (AND IN KATAKANA), McAfee AND DESIGN, McAfee.COM, McAfee...(C) 2001-2003. * Software copyrighted by Sparta, Inc., (C) 2003-2004. * Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Notre Dame. * Software copyrighted by Simone Bordet & Marco Cravero, (C) 2002. * Software copyrighted...
...SECURITY, ACTIVESECURITY (AND IN KATAKANA), ACTIVESHIELD, CLEAN-UP, DESIGN (STYLIZED E), DESIGN (STYLIZED N), ENTERCEPT, EPOLICY ORCHESTRATOR, FIRST AID, FOUNDSTONE, GROUPSHIELD, GROUPSHIELD (AND IN KATAKANA), INTRUSHIELD, INTRUSION PREVENTION THROUGH INNOVATION, McAfee, McAfee (AND IN KATAKANA), McAfee AND DESIGN, McAfee.COM, McAfee...(C) 2001-2003. * Software copyrighted by Sparta, Inc., (C) 2003-2004. * Software copyrighted by Cisco, Inc and Information Network Center of Beijing University of Notre Dame. * Software copyrighted by Simone Bordet & Marco Cravero, (C) 2002. * Software copyrighted...
IPS Configuration Guide
Page 6
... tasks, or the commands necessary to perform particular tasks. McAfee® Network Security Platform 5.1 Preface not necessarily familiar with electricity, or other serious consequences is denoted using this notation. Menu or action group selections are shown enclosed in italics. The Service field on the Properties tab specifies the name of keys on the User Interface...
... tasks, or the commands necessary to perform particular tasks. McAfee® Network Security Platform 5.1 Preface not necessarily familiar with electricity, or other serious consequences is denoted using this notation. Menu or action group selections are shown enclosed in italics. The Service field on the Properties tab specifies the name of keys on the User Interface...
IPS Configuration Guide
Page 35
... attack you click the Commit Changes button in various actions in the Manager. Note 3: If the "iv.ui.commit.comment.isEnforced.isCommentMandatory" property (Default FALSE) is forced to Editing an IPS policy (on page 8). 2 Click Commit Changes. Refer to enter a comment in the... with a summary of the Policy List table. If you have made changes to applicable resources. In this property causes the dialog not to enabled. McAfee® Network Security Platform 5.1 Managing IPS settings 11 Click OK to return to enforce detection. 13 Click the Reconnaissance tab.
... attack you click the Commit Changes button in various actions in the Manager. Note 3: If the "iv.ui.commit.comment.isEnforced.isCommentMandatory" property (Default FALSE) is forced to Editing an IPS policy (on page 8). 2 Click Commit Changes. Refer to enter a comment in the... with a summary of the Policy List table. If you have made changes to applicable resources. In this property causes the dialog not to enabled. McAfee® Network Security Platform 5.1 Managing IPS settings 11 Click OK to return to enforce detection. 13 Click the Reconnaissance tab.
IPS Configuration Guide
Page 45
... the recent changes made to a previous version of the policy. In case, you to 30 versions of time. McAfee® Network Security Platform 5.1 Managing IPS settings Figure 36: Bulk Edit - You can be changed using the ems.properties file. To create a new version of the policy. If you have created, do the following : 1 Select IPS...
... the recent changes made to a previous version of the policy. In case, you to 30 versions of time. McAfee® Network Security Platform 5.1 Managing IPS settings Figure 36: Bulk Edit - You can be changed using the ems.properties file. To create a new version of the policy. If you have created, do the following : 1 Select IPS...
IPS Configuration Guide
Page 222
... policy; The interface node is a specific interface node instance. • Configuring general Interface settings (on page 214): Customize interface properties and create/edit sub-interfaces. • Scanning policies at the interface level (on all configuration and policy decisions are user created ...Sub-interface-x resource node. Note: All procedures in this resource, and can be allocated to form a single logical interface. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node Full-duplex Tap and In-line modes require two physical ports, and each mode uses these two...
... policy; The interface node is a specific interface node instance. • Configuring general Interface settings (on page 214): Customize interface properties and create/edit sub-interfaces. • Scanning policies at the interface level (on all configuration and policy decisions are user created ...Sub-interface-x resource node. Note: All procedures in this resource, and can be allocated to form a single logical interface. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node Full-duplex Tap and In-line modes require two physical ports, and each mode uses these two...
IPS Configuration Guide
Page 224
... to again change . A Bridge VLAN interface functions exactly like a VLAN interface except that post-IPS, if the traffic is the "virtual" property of the child domain, therefore, full ownership cannot be bridged. You can also use the VLAN Bridging feature in which the physical port(s)-thus...CIDR, all of the previous configurations performed at the interface and sub-interface levels for the interface are erased in your system. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node VLANs that of the peer ID. Since the interface has been allocated, it is OK, the ...
... to again change . A Bridge VLAN interface functions exactly like a VLAN interface except that post-IPS, if the traffic is the "virtual" property of the child domain, therefore, full ownership cannot be bridged. You can also use the VLAN Bridging feature in which the physical port(s)-thus...CIDR, all of the previous configurations performed at the interface and sub-interface levels for the interface are erased in your system. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node VLANs that of the peer ID. Since the interface has been allocated, it is OK, the ...
IPS Configuration Guide
Page 244
... view the details configured for a particular sub-interface through the IPS Interface > Sub-Interface action. To edit the properties of a sub-interface, do the following steps are created at the interface resource level. Confirm the deletion. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node • Managing the details of a sub-interface (on page 219).
... view the details configured for a particular sub-interface through the IPS Interface > Sub-Interface action. To edit the properties of a sub-interface, do the following steps are created at the interface resource level. Confirm the deletion. McAfee® Network Security Platform 5.1 The IPS Sensor_Name node • Managing the details of a sub-interface (on page 219).
Network Protection
Page 2
... by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054,...McAfee AND DESIGN, McAfee.COM, McAfee VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are the sole property...McAfee, Inc. All Rights Reserved. All other registered and unregistered trademarks herein are registered trademarks or trademarks of California, (C) 1990, 1993, with security...
... by Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054,...McAfee AND DESIGN, McAfee.COM, McAfee VIRUSSCAN, NET TOOLS, NET TOOLS (AND IN KATAKANA), NETSCAN, NETSHIELD, NUTS & BOLTS, OIL CHANGE, PRIMESUPPORT, SPAMKILLER, THREATSCAN, TOTAL VIRUS DEFENSE, VIREX, VIRUS FORUM, VIRUSCAN, VIRUSSCAN, VIRUSSCAN (AND IN KATAKANA), WEBSCAN, WEBSHIELD, WEBSHIELD (AND IN KATAKANA) are the sole property...McAfee, Inc. All Rights Reserved. All other registered and unregistered trademarks herein are registered trademarks or trademarks of California, (C) 1990, 1993, with security...
Network Protection
Page 5
..., and explains how this guide details best practices for inline mode configuration, information on the Properties tab specifies the name of McAfee Network Security Platform products, including McAfee Network Security Manager (nsm) and McAfee Network Security Sensors (Sensors). McAfee Network Threat Behavior Analysis Appliance provides the capability of deploying Network Security Sensors (Sensors) in this document is organized. The Service field on attack blocking, and...
..., and explains how this guide details best practices for inline mode configuration, information on the Properties tab specifies the name of McAfee Network Security Platform products, including McAfee Network Security Manager (nsm) and McAfee Network Security Sensors (Sensors). McAfee Network Threat Behavior Analysis Appliance provides the capability of deploying Network Security Sensors (Sensors) in this document is organized. The Service field on attack blocking, and...
Upgrade Guide
Page 2
...., or its affiliates in the US and/or other registered and unregistered trademarks herein are the sole property of McAfee brand products. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. All Rights Reserved... THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee® Network Security Platform 6.1 Upgrade Guide McAfee Red in any form or by any means without the written permission of...
...., or its affiliates in the US and/or other registered and unregistered trademarks herein are the sole property of McAfee brand products. IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. All Rights Reserved... THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee® Network Security Platform 6.1 Upgrade Guide McAfee Red in any form or by any means without the written permission of...