McAfee HISCDE-AB-IA - Host Intrusion Prevention Product Manual page 57

Product guide for use with epolicy orchestrator 4.5
Table of Contents

Advertisement

Configuring Firewall Policies
Overview of Firewall policies
processed are traffic matching allow rules above the group in the firewall rules list, and traffic
matching the group criteria. All other traffic is blocked.
NOTE:
Any group with connection isolation enabled cannot have associated transport options
or applications.
Figure 2: Network connection isolation
As examples of using the connection isolation option, consider two settings: a corporate
environment and a hotel. The active firewall rules list contains rules and groups in this order:
1
Rules for basic connection
2
VPN connection rules
3
Group with corporate LAN connection rules
4
Group with VPN connection rules
Connection isolation on the corporate network
Connection rules are processed until the group with corporate LAN connection rules is encounterd.
This group contains these settings:
• Media type = Wired
McAfee Host Intrusion Prevention 8.0 Product Guide for ePolicy Orchestrator 4.5
57

Advertisement

Table of Contents
loading

This manual is also suitable for:

Host intrusion prevention 8.0

Table of Contents