McAfee FWE-C3000-UPG FWEC3000UPGP 데이터 시트

제품 코드
FWEC3000UPGP
다운로드
페이지 8
Does Your Current Firewall 
Management Help You?
Quickly identify who used 
what application.
Write policies to control user 
access to applications.
See rule interactions in advance.
Easily identify rules that 
match traffic.
Design and validate 
appropriate rules.
Enable real-time content 
and security controls with a 
few clicks.
Write fine-grained rules in 
your business’ language: Users 
and apps.
Maintain threat visibility as 
attacks emerge.
View analytics, trending, and 
visualization of log data in a 
single environment.
Quickly identify problems and 
find resolutions.
Reduce policy size and 
complexity.
Share data between network 
and host.
Automate everyday workflows.
Streamline compliance reporting.
Optimize policies and clean 
up rules.
Integrate the firewall with 
existing IT infrastructure, 
change processes, and 
organizational structures.
Command Line Controls
With McAfee, advanced users 
have the option of broad 
command line control:
Full Unix shell and tool access. 
View all firewall log files, historic 
or real time.
Fully configure or import policy. 
Access command line interface 
(CLI) at console or over SSH.
Firewall Administration
McAfee provides both local and centralized 
options for configuring, monitoring, and 
maintaining firewall devices and capabilities.
Local administration
The McAfee Firewall Enterprise Admin Console 
offers a basic environment for connecting 
to and managing one or more firewalls. This 
console makes it easy to implement policies that 
take advantage of all the options of the next-
generation McAfee Firewall Enterprise. In one view, 
you enable granular, targeted security controls, 
constructing a single rule for each policy using the 
business language of applications and users. 
A monitoring dashboard and one-click access 
to powerful network tools such as TCPdump, 
ARP, Ping, and nslookup bring together the core 
processes for managing individual firewalls. Full 
configuration and management capabilities are 
available at the command line as well. 
Fine-grained control of applications 
and defenses
For each rule, a few clicks within one graphical 
user interface activate rich security controls, 
such as IPS, AV, geo-location, decryption, or 
reputation. You can permit use of potentially risky 
applications but impose protections that match 
the application’s threat vectors. For example:
Apply AV and IPS to web conferencing.
Limit use of SSH and SSH tunneling to specific 
users and block port forwarding to prevent 
malicious traffic.
Use geo-location to disallow and IPS to scan 
traffic to and from a dark portion of the web. 
Decrypt inbound traffic for content inspection, 
exempting based on policy, and re-encrypt.
As you draft each rule, you can control sub-
capabilities of applications, such as games on 
websites, and restrict access and capabilities at the 
user level to match roles. Rules stay up to date as 
users change roles or leave the company. A search 
option helps you find applications, categories, and 
capabilities that your policy should reflect. 
To reduce complexity and troubleshooting, this 
console presents rule interactions on a tab. The 
display highlights the rules and areas of each rule 
that could cause potential problems. You can 
immediately identify conflicts that could prevent 
your new rule from taking effect.
Figure 1. McAfee Firewall Enterprise Admin Console provides quick access and complete control over your firewalls.