Access Control - McAfee SG310 Administration Manual

Utm firewall
Table of Contents

Advertisement

Firewall menu options

Access control

MySQL database
1
http://www.mysql.com/downloads/mysql-4.0.html
http://www.mysql.com/doc/en/index.html
Apache Web server
2
http://httpd.apache.org/download.cgi
http://httpd.apache.org/docs-2.0/
PHP scripting for developing Web pages
3
http://www.php.net/downloads.php
http://www.php.net/download-docs.php
ADODB library to hide differences between databases used by PHP
4
http://phplens.com/adodb/
GD graphics library for GIF image creation used by PHP
5
http://www.boutell.com/gd/
PHPlot graph library for charts written in PHP
6
http://www.phplot.com/
BASE analysis console
7
http://secureideas.sourceforge.net/
Snort is running as an IDS sensor on the UTM Firewall appliance, logging to the MySQL database on the
analysis server. The Downloads section of the BASE Web site contains detailed documents that aid in
installing the above tools on the analysis server.
Access control
Access control minimizes inappropriate Internet use. The access control Web proxy allows you to control
access to the Internet based on the type of Web content being accessed (through Web Filtering), and the
user or workstation that is accessing the Internet content (by means of require user authentication, and IP
lists). Additionally, you can set up global block and allow lists for Web sites you always want to be
accessible or inaccessible (using Web lists), and ensure they are not running network services that may be
exploited (through security policies) before accessing the Internet.
Access control options operate in the following order:
Web lists allow
1
Web lists deny
2
Security policy enforcement
3
ACL allow lists
4
ACL block lists
5
Username/password (if Bypass Content Filtering is set for a specified user)
6
Content filtering (Web Filtering)
7
Note:
Web list and content filtering only apply to Web traffic (HTTP over port 80).
Once a given packet matches any of the access control rules, the associated action is performed on the
packet and the packet is not processed further. If none of the access control rules apply, the packet is
processed according to the default action that was set on the main access control page (either deny or
allow).
McAfee UTM Firewall 4.0.4 Administration Guide
205

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sg560Sg560uSg565Sg580

Table of Contents