Managing Latency in IPS Networks

Size: px
Start display at page:

Download "Managing Latency in IPS Networks"

Transcription

1 Revision C McAfee Network Security Platform (Managing Latency in IPS Networks) Managing Latency in IPS Networks McAfee Network Security Platform provides you with a set of pre-defined recommended settings using which, you can begin monitoring traffic immediately after adding a Sensor to your network. However, to realize the complete effectiveness of the Sensor, optimal policy tuning on the Sensor is necessary. McAfee provides a considerable amount of configuration flexibility on its Sensors to enable you to tune policies - for proactive blocking and reduced false positives. Once the Sensor starts monitoring your network traffic, the next concern would be the Sensor's performance. Continuous stateful inspection of network packets is bound to have an impact on performance. For an inline device, the key performance metrics are attack coverage, throughput, load balancing, latency, and scalability. To balance the trade-off between security effectiveness and performance, McAfee Network Security Platform provides several configurable options to balance the traffic load with minimal latency. Latency through the Sensor can vary significantly based on packet size, complexity of protocol or presence of attack traffic. Average latency through the Sensor is typically observed under 1 milli second in real-world networks. 1

2 This document helps you identify the options that can be considered while deploying the Sensor inline in your network, to maximize attack coverage with optimal performance, and minimal latency. McAfee recommends a 5-step approach to manage latency, as depicted in the figure below. 1 Select the right Sensor model Each Sensor model has a throughput limit. For example, the M-2850 Sensor is rated at 600 Mbps performance. If the Sensor begins to see traffic more than 600 Mbps, the Sensor may not keep up with the traffic and introduce latency. It is important that you stay within the operating parameters of the device you deploy. If you are running traffic at gigabit speeds, then use an M-3050/M-4050/M-6050/M-8000/NS9x00/NS7x00 Sensor, which have a much higher throughput. The following tables provides the throughput, number of connections, average latency for different Sensor models: NS-series: Maximum Type NS9300 NS9200 NS9100 NS7300 NS7200 NS7100 Aggregate Performance Max Throughput with test equipment sending UDP packet size of 1512 Bytes Concurrent Connections up to 70 up to 35 up to 30 up to 15 up to 10 up to 5 32,000,000 16,000,000 13,000,000 10,000,000 5,000,000 3,000,000 2

3 Maximum Type NS9300 NS9200 NS9100 NS7300 NS7200 NS7100 Connections established per second Default number of supported UDP Flows Supported UDP Flows maximum Supported UDP Flows minimum Latency (Average UDP per packet Latency) Virtual IPS: 1,000, , , , , , , , , , , ,000 12,000,000 6,000,000 6,000,000 3,000,000 3,000,000 3,000,000 1,000 1,000 1,000 1,000 1,000 1,000 <100 µs <100 µs <100 µs <100 µs <100 µs <100 µs Maximum Type IPS-VM600 IPS-VM100 Aggregate Performance 600 Mbps 100 Mbps Maximum throughput with test equipment sending UDP packet size of 1518 bytes Up to 1 Concurrent connections 600, ,000 Connections established per second 20,000 6,000 Default number of supported UDP Flows 25,000 10,000 Supported UDP Flows 254,208 39,168 Latency (Average UDP per packet Latency) M-series: Up to 150 Mbps Maximum Type Aggregate Performance Maximum throughput with test equipment sending UDP packet size of 1518 bytes Concurrent connections Connections established per sec. Default number of supported UDP Flows M-8000 M-6050 M-4050 M-3050 M-2950 M-2850 M-1450 M Mbps Up to 20 Up to 10 Up to 4 Up to 2.5 Up to 1.5 Up to Mbps Up to 300 Mbps 100 Mbps Up to 150 Mbps 5,000,000 2,500,000 2,000,000 1,000, , ,000 80,000 40, ,000 60,000 36,000 18,000 15,000 10,000 4,000 2, , , ,000 50,000 50,000 25,000 10,000 5,000 3

4 Maximum Type Supported UDP Flows Latency (Average UDP per packet Latency) M-8000 M-6050 M-4050 M-3050 M-2950 M-2850 M-1450 M ,000,000 1,500, , , , ,500 60,000 30,000 2 Select the right IPS policy When you first add a Sensor inline in your network, start your policy configuration by applying either the Default Inline IPS or Default IDS or Default IPS Attack Settings policy under Policy <Admin Domain Name> Intrusion Prevention IPS Policies. This enables you to begin monitoring your network immediately. Subsequently, pick the policy that best matches your needs, and clone the policy. Then remove any irrelevant attacks, add any additional attacks, and configure appropriate response actions to respond to detected attacks. Some amount of false positives and irrelevant alerts can occur for the first 3 to 4 weeks. Tune your policies to delete attacks that do not apply to your environment to reduce the amount of insignificant alerts generated by your Sensors. For example, if you use only Apache Web servers, you may wish to disable IIS-related attacks. While deploying the Sensors inline on high throughput networks, it is not recommended to use the All-Inclusive without audit and All-Inclusive with audit policies. While these policies enable you to fully analyze your network traffic, these include many audit signatures, which alerts on benign traffic. A very high alert volume causes latency in your network. 3 Tune your policies to suit your network Consider the following options to better tune your IPS policies in McAfee Network Security Platform. 3.1 Custom Signatures McAfee Network Security Platform allows you to create custom attacks in McAfee's proprietary format as well as using Snort rules language. However, the ability to create a custom attack can sometimes turn tricky. For instance, a mistake in implementation of a signature on a high traffic network could cause a large number of alerts to be generated. Create custom signatures under Policy <Admin Domain Name> Intrusion Prevention Advanced Custom Attacks using the following best practices: Verify that the custom attack you intend to create does not duplicate any attack provided by McAfee Network Security Platform. In case of a duplicate, you have the flexibility to use both or just the custom attack instead of the McAfee supplied attack. If you choose to use both, then note that the Sensor raises two alerts for the same attack traffic. If the pattern your signature searches for occurs too often in the network traffic being analyzed, checking each match to determine whether it fulfills a signature condition reduces Sensor performance. Avoid using many L3/L4 fixed-field tests in the custom signature, since it is examined in IP/TCP/UDP header on each packet. Avoid using very common strings that every flow/packet contains such as ".com" in HTTP traffic. 4

5 If you have configured multiple interfaces on the Sensor, wherein one interface is using All Inclusive with Audit, while other interface is using Default Inline IPS, the All Inclusive with Audit gets preference and is applied to the Sensor. This causes performance/latency issues. It is recommended that you apply Default Inline IPS policy on all interfaces to improve performance and avoid latency. Avoid single byte or two-byte string match tokens in the custom signatures. Remove the attacks that have wrong detection logic and may never be triggered. For example, a signature to check dest-ip=" " AND dest-ip=" ". 3.2 HTTP Response Scanning Based on the needs of your organization, you can enable HTTP response inspection for inbound traffic, outbound traffic, or both directions. To enable HTTP response scanning, go to Policy <Admin Domain Name> Intrusion Prevention Policy manager. In the Interfaces tab, double-click the interface for which you want to enable the response scanning. The <Device Name/Interface> panel opens on the right-side. In the Inspection Options section, click the edit icon to edit the already applied policy. The Inspection Options page opens. In the Traffic Inspection tab, under HTTP, select the direction in which you want to enable from the HTTP Response Traffic Scanning drop-down. However, to minimize the potential performance impact on the Sensor: McAfee recommends that you enable HTTP response processing on the outbound traffic. Consider enabling HTTP response on the inbound traffic only if you suspect that your internal Web Server is/ could be compromised. 3.3 Non-standard Ports Network Security Platform detects threats for certain standard protocols irrespective of which ports they run on. However, if a non-standard port is used in your network for a standard protocol, configure the port number under Policy <Admin Domain Name> Intrusion Prevention Advacned Non Standard Ports to reduce latency caused by re-routing of necessary traffic due to non-standard port number. For example, HTTP by default uses port 80 or 8080; therefore, a Sensor reading a packet with port 80 or 8080 attempts to decode that traffic as HTTP traffic. However, if you are running an HTTP server on port 2560, then configure this as the non-standard port for HTTP, on the Manager. Avoid configuring the port number for one standard protocol as a non-standard port for another protocol. 3.4 Latency Monitoring Latency monitor is configured in either of the following modes to take action when high latency is observed: Issue latency-monitor enable action alert-only to generate an alert when a high latency is observed at the Sensor. Issue latency-monitor enable action layer2-forward to generate an alert and also forwards the traffic to layer 2. You can view these alerts in the Real-Time Threat Analyzer of the Manager. You can use the following CLI commands to enable, set sensitivity level, and check the status of latency monitor feature: latency-monitor enable action Enables latency monitoring in the Sensor and also specifies the action to be performed if high latency is observed in the Sensor. 5

6 The following are the actions that can be specified in this command: alert-only (generates an alert when a high latency is observed in the Sensor) put-in-layer2 (generates an alert and also forwards the traffic to layer 2). Alerts that are generated can be seen in the System faults page in the Manager. Syntax: latency-monitor enable action <alert-only put-in-layer2> This command should be executed with a parameter value, else the command is treated as invalid. Example: If layer2-forward is enabled, it is necessary to set the layer 2 mode to be on. Otherwise the layer2-forward action does not get executed. latency-monitor enable action alert-only latency-monitor sensitivity-level Configures the sensitivity level for latency management. Syntax: latency-monitor sensitivity-level high latency-monitor sensitivity-level medium latency-monitor sensitivity-level low latency-monitor restore-inline When a high latency is observed on the Sensor and the latency monitor is configured, the Sensor remains in layer 2 until a layer2 mode deassert is invoked or the Sensor reboots. This command allows the Sensor to come out of layer 2 mode without layer 2 deassert. The Sensor restores to inline from layer 2 if the following conditions are met: The latency monitor has put the Sensor in layer 2 mode. The Sensor is in good health. If the Sensor is in bad health, a deassert cannot be performed and the Sensor reboots. A substantial amount of time has lapsed, as configured using this command, when the Sensor went into layer 2 due to latency. The default time to trigger an automatic layer 2 deassert is 10 minutes. If the latency continues to exist after the Sensor is restored to inline mode, the Sensor behaves according to the current setting of the latency monitor. Syntax: latency-monitor restore-inline enable <10-60> latency-monitor restore-inline disable Parameter Description <10-60> The time in minutes to trigger the restore inline from layer 2. It is counted since the time the Sensor moved into layer 2 state due to high latency. The latency-monitor status command displays the status of the latency monitor feature, and the status of the restore-inline feature of the latency monitor. 6

7 latency-monitor Disables the latency monitoring feature or displays the status of latency monitoring feature. Syntax: latency-monitor <disable status> Default Value: Latency monitoring feature is disabled by default. If disabled, latency monitoring feature does not generate any alert nor forward the traffic to layer 2 when high latency is observed. If latency monitoring is enabled, the following information is displayed. latency monitoring status (enable or disable) configured action (alert-only or layer2-forward) 3.5 Packet Logging Large amount of packet logging will cause adverse impact on Sensor performance. On high throughput network, it is advisable to stick to default or disable packet logs for alerts that are not required. 3.6 Scanning Exceptions There could be certain traffic that you want the Sensor to allow or block without deeper inspection. Configure stateless access rules to bypass inspection for trusted high throughput applications like database backups. The Sensor allows or blocks packets just based on the L4 information in those packets, thereby saving time and resources. Configure scanning exceptions to bypass scanning of traffic from a configured VLAN, TCP, or UDP port. Once set, these rules take precedence over Firewall access rules. [Failover ports and M 8000 interconnect ports cannot be configured for scanning exceptions.] You can configure scanning exceptions under Devices <Admin Domain Name> Devices <Device Name> Setup Advanced Stateless Scanning Exception. 3.7 Access Rules for Fragmented Traffic Configure access rules for fragmented traffic to selectively specify rules for a host (or network) based on which the Sensor skips reassembly handling of the fragmented traffic. This helps in decreasing the latency of the fragmented traffic for the specified network or host. Use this feature only with a trusted host and only if you are receiving extremely high amount of fragmented traffic. For example, use access rules for fragmented traffic if your NFS server is sending huge amount of fragmented traffic through your Sensor. Using this feature, receiving traffic from an unknown host can mean evasion using IP fragments. All fragmented traffic are reassembled prior to processing if the traffic does not match any access rules configured for fragmented traffic. Also note the following: 7

8 You can use access rules for fragmented traffic only with TCP flow violation set to Permit out of-order. Syn cookie should not be used when access rules for fragmented traffic are applied. Firewall logging is not supported when access rules are configured for fragmented traffic. 3.8 Layer 7 Data Collection If you have layer 7 data collection enabled under Devices <Admin Domain Name> Devices <Device Name> Setup Advanced L7 Data Collection, then disable protocols or specific fields within a protocol. This optimizes the Sensor performance. 3.9 Heuristic Web Application Server Protection If you have configured Policy <Admin Domain Name> Intrusion Prevention Inspection Options Policies, then configure only the critical Website paths that you want to protect as it affects Sensor performance Advanced Traffic Inspection Configure inspection for advanced evasions only if necessary under Policy <Admin Domain Name> Intrusion Prevention Inspection Options Policies. On a deployment with a high percentage of good traffic and some traffic that uses evasions, the Sensor throughput could drop. 4 Monitor Sensor Performance Once you have configured/customized your policies, use the Manager to monitor the Sensor performance to detect early signs of performance/latency issues in your network. 4.1 Monitor via CLI Use the following CLI commands to monitor Sensor performance show sensor-load Syntax: show sensor-load Run the show sensor-load command to view the following statistics: the average load of traffic on the Sensor processing elements maximum load of traffic seen on each Sensor processing element show mem-usage Syntax show mem-usage Run the show mem-usage command to review the following counts: Avg. Used TCP and UDP Flows across all PEs Max. Used TCP and UDP Flows on a single PE Avg. Used Fragmented IP Flows across all PEs 8

9 Max. Used Fragmented IP Flows on a single PE Avg. Used ICMP Flows across all PEs Max. Used ICMP Flows on a single PE Avg. Used SSL Flows across all PEs Max. Used SSL Flows on a single PE Avg. Used Fragment Reassembly Buffers across all PEs Max. Used Fragment Reassembly Buffers on a single PE Avg. Used Packet Buffers across all PEs Max. Used Packet Buffers on a single PE Avg. Used Attack Marker Nodes across all PEs Max. Used Attack Marker Nodes on a single PE Avg. Used Shell Marker Nodes across all PEs Max. Used Shell Marker Nodes on a single PE Avg. Used L7 Dcap Alert Buffers across all PEs Max. Used L7 Dcap Alert Buffers on a single PE Max. Used L7 Dcap Alert Buffers on a single PE Avg. Used L7 Dcap flows across all PEs Max. Used L7 Dcap flows on a single PE show inlinepktdropstat <port> Syntax show inlinepktdropstat <port> Run the show inlinepktdropstat command to know how many packets are dropped at the Sensor port. Information displayed includes the count for each of the following categories: IP checksum errors TCP checksum errors UDP checksum errors ICMP checksum errors ACL-related packets dropped Out-Of-Context/Bad packets dropped Sensor cold-start-related packets dropped Off/HdrLen error packets dropped Dropped attack packets (that is, blocked packets) IP reassembly timeout packets dropped TCP Out-Of-Order timeout packets dropped 9

10 Dropped packets containing TCP protocol errors Dropped packets containing UDP protocol errors Dropped packets containing ICMP protocol errors Dropped packets containing IP protocol errors Packets dropped due to the Sensor being out of resources Dropped packets containing CRC errors Dropped IP-spoofed packets ICMPv6 checksum error drop count IPv6 reassembly timeout drop count ICMPv6 Protocol error drop count IPv6 Protocol error drop count Host Quarantine IPv4 packet drop count Host Quarantine IPv6 packet drop count Other Layer-2 error packets dropped IP sanity check packets dropped IPv6 sanity check packets dropped Total IP No Credit Packets dropped Total Rate Limit Packets dropped sensor-datapath-stat-analysis show Syntax sensor-datapath-stat-analysis show Run the sensor-datapath-stat-analysis show command to view a list of Sensor statistics that affects latency: Total packets received Total TCP packets Total UDP packets Total non TCP/UDP packets Total fragments Total duplicate fragments Total attack detected Total alert generated Total alerts dropped without response Total alerts dropped because of filter setting Total logs sent 10

11 Total packets matching L3/L4 UDS Policy Ruleset on Sensor **Analysis of the statistics** Attack dropped without response action Non TCP/UDP Traffic Attack dropped because of filter setting Traffic matching L3/L4 UDS Traffic detected with attack Count of fragments Fragmented traffic Percentage of logs to alerts sent TCP Traffic Snort signature support UDP Traffic 4.2 Monitor via Manager Use the Threat Analyzer and System Faults pages in the Manager to monitor Sensor performance in your network Threat Analyzer Dashboards In the Manager, set the thresholds and enable alarm for Sensor performance under Devices <Admin Domain Name> Devices <Device Name> Troubleshooting Performance Monitoring. Once the thresholds are configured, the core Sensor performance metrics are monitored using the Threat Analyzer. Metrics such as Utilization-Device TCP/UDP Flow, Utilization-Device Throughput, Status of Activities, and Operational Status Summary are displayed in the default NSP Health dashboard. You can also create custom dashboards and monitors to view various other Sensor statistics: Statistics Flows TCP and UDP flow data processed by a device. Checking your flow rates can help you determine if your device is processing traffic normally, while also providing you with statistics such as the maximum number of flows supported and number of active TCP and UDP flows. Statistics IP Spoofing Number of IP spoofing attacks detected by the Sensor. Statistics are displayed per direction. Statistics Malware Malware detected for a given device. Statistics Port Packet Drops Packet drop rate on an interface. Statistics Rate Limiting Estimated number of packets dropped/bytes dropped by the device. You can view rate limiting statistics for each device (per interface), listed under the Devices tab. Statistics Rx/TX Total number of packets received (Rx) and transmitted (Tx) for a given device. Statistics Device Packet Drops Packet drop rate on a device. The statistics is displayed on a per device basis. The statistics includes the count of number of packets dropped by a device due to the configured rate limiting and sanity check failures Operational Status Faults From the Manager Dashboard page, click any fault in the System Health monitor to view the faults in the System Faults page. Watch out for performance and latency related faults: 11

12 Fault Name Device in high latency mode Device latency monitoring configuration is conflicting with layer 2 monitoring configuration Device performance <Utilization - Device CPU, Utilization - Device TCP/UDP Flows, Utilization - Device Throughput, Utilization - Port Throughput> Action The device attempts to automatically recover from the high latency condition. Disable moving Sensor to layer 2 bypass mode on high latency or enable layer 2 pass through monitoring. Check the Sensor, and tune your policies to bring the affected metric below the configured threshold level Number of Alerts If you are receiving the Sensor: Attack Marker Resources Exhausted alerts in high volume, then monitor the percentages reported for attack marker nodes and the load on the Sensor via Sensor CLI interface. If the latency continues, tune your policies to bring down the latency experienced. Copyright 2018 McAfee, LLC McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. 12 0C00

McAfee Network Security Platform

McAfee Network Security Platform Revision B McAfee Network Security Platform (8.1.7.5-8.1.3.43 M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.5-8.1.3.43 M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.3.6 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.124-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Network Security Platform

McAfee Network Security Platform Network Security Platform v5.1 Page 1 McAfee Network Security Platform [formerly McAfee IntruShield ] Release Version 5.1 (Document was revised on 11/26/09) Software versions in this release This document

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.7.44 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision C McAfee Network Security Platform 8.1 (8.1.7.91-8.1.3.124 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.33-8.1.3.89-2.11.9 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Security Platform Overview

Network Security Platform Overview Quick Tour Revision B McAfee Network Security Platform 8.1 Network Security Platform Overview McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.82-8.1.7.34 Manager-Virtual IPS Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform Administration Course

McAfee Network Security Platform Administration Course McAfee Network Security Platform Administration Course Education Services administration course The McAfee Network Security Platform Administration course from McAfee Education Services is an essential

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.3.6-8.1.3.5 M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.3.39 Manager-M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.64-8.3.3.35 Manager-M-series Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.49-9.1.5.20 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision C Contents About the release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.5.53 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 Revision A McAfee Network Security Platform 8.3 (8.3.7.86-8.3.7.59 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolves issues Installation instructions Known

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform 9.2 (Quick Tour) McAfee Network Security Platform [formerly McAfee IntruShield ] is a combination of network appliances and software that accurately detects and prevents

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.64-8.3.5.47 Manager-NS-series Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision B McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.10 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.28-8.3.3.9 Manager-Mxx30-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision A McAfee Network Security Platform 9.1 (9.1.7.73-9.1.3.11 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.52-8.3.3.27-2.11.9 Manager-XC-Cluster Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.68-8.3.7.55-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.96-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.5-8.1.3.10 NTBA Appliance Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Find

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.5.11-8.3.5.15 Manager-NS-series Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision B McAfee Network Security Platform 9.2 (9.2.7.22-9.2.5.27 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved Issues Installation instructions Known

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.19.23-8.1.15.14 Manager-M-series FIPS Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Known issues Installation instructions

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision E McAfee Network Security Platform (9.1.7.11-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes) Contents About this release New features Enhancements Resolved issues Installation

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.100-8.1.3.130 Manager-M-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Corrigendum 3. Tender Number: 10/ dated

Corrigendum 3. Tender Number: 10/ dated (A premier Public Sector Bank) Information Technology Division Head Office, Mangalore Corrigendum 3 Tender Number: 10/2016-17 dated 07.09.2016 for Supply, Installation and Maintenance of Distributed Denial

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision B McAfee Network Security Platform (9.2.9.3-9.2.5.34 Manager-NS3500 Release Notes) Contents About this release New Features Resolved issues Installation instructions Known issues Product documentation

More information

Network Security Platform 8.1

Network Security Platform 8.1 FIPS Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation About this

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.82-8.1.3.100 Manager-M-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision A McAfee Network Security Platform 9.1 (9.1.7.63-9.1.7.12 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.52-8.3.5.32 Manager-NS-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.33-8.1.5.135 Manager-NS-series Release Notes Network Security Platform 8.1 Revision D Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

Intrusion Prevention Performance Tuning

Intrusion Prevention Performance Tuning The following topics describe how to refine intrusion prevention performance: About, page 1 Limiting Pattern Matching for Intrusions, page 2 Regular Expression Limits Overrides for Intrusion Rules, page

More information

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref )

Request for Proposal (RFP) for Supply and Implementation of Firewall for Internet Access (RFP Ref ) Appendix 1 1st Tier Firewall The Solution shall be rack-mountable into standard 19-inch (482.6-mm) EIA rack. The firewall shall minimally support the following technologies and features: (a) Stateful inspection;

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.15-9.1.3.3 Manager-NTBA Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision J McAfee Network Security Platform 8.1 (Troubleshooting Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1

What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

Chapter 8 roadmap. Network Security

Chapter 8 roadmap. Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 8.4 Securing e-mail 8.5 Securing TCP connections: SSL 8.6 Network layer security: IPsec 8.7 Securing

More information

Monitoring the Device

Monitoring the Device The system includes dashboards and an Event Viewer that you can use to monitor the device and traffic that is passing through the device. Enable Logging to Obtain Traffic Statistics, page 1 Monitoring

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.5.210 Manager-NS-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 9.2

McAfee Network Security Platform 9.2 Revision C McAfee Network Security Platform 9.2 (9.2.7.9-9.2.5.6 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.44-8.3.7.14 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.91-8.1.3.40 NTBA Appliance Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation Instructions Known issues Product

More information

Configuring Dashboards

Configuring Dashboards CHAPTER 2 This chapter describes dashboards, and how to add and delete them. It contains the following topics: Understanding Dashboards, page 2-1 Adding and Deleting Dashboards, page 2-1 Understanding

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.82-8.1.5.175-8.1.3.100 Manager-XC-Cluster Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

Access Control Using Intrusion and File Policies

Access Control Using Intrusion and File Policies The following topics describe how to configure access control policies to use intrusion and file policies: Intrusions and Malware Inspection Overview, page 1 Access Control Traffic Handling, page 2 File

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.12-8.1.5.39 NS-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Resolved issues Installation instructions Known issues Product documentation

More information

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group

WHITE PAPER: BEST PRACTICES. Sizing and Scalability Recommendations for Symantec Endpoint Protection. Symantec Enterprise Security Solutions Group WHITE PAPER: BEST PRACTICES Sizing and Scalability Recommendations for Symantec Rev 2.2 Symantec Enterprise Security Solutions Group White Paper: Symantec Best Practices Contents Introduction... 4 The

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

* Knowledge of Adaptive Security Appliance (ASA) firewall, Adaptive Security Device Manager (ASDM).

* Knowledge of Adaptive Security Appliance (ASA) firewall, Adaptive Security Device Manager (ASDM). Contents Introduction Prerequisites Requirements Components Used Background Information Configuration Step 1. Configure Intrusion Policy Step 1.1. Create Intrusion Policy Step 1.2. Modify Intrusion Policy

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.3 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision E McAfee Network Security Platform 9.1 (Troubleshooting Guide) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated

More information

McAfee Virtual Network Security Platform 8.4 Revision A

McAfee Virtual Network Security Platform 8.4 Revision A 8.4.7.101-8.3.7.18 Manager-Virtual IPS Release Notes McAfee Virtual Network Security Platform 8.4 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.12-9.1.5.15 NS7x50-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Resolved issues Installation instructions Known issues Product documentation

More information

McAfee Network Security Platform

McAfee Network Security Platform NS9x00 Quick Start Guide Revision E McAfee Network Security Platform This quick start guide explains how to quickly set up and activate your McAfee Network Security Platform NS-series Sensor in in-line

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 Revision B McAfee Network Security Platform 9.1 (9.1.7.75-9.1.3.13 Manager-M-series, Mxx30-series, and XC Cluster Release Notes) Contents About the release New features Enhancements Resolved Issues Installation

More information

McAfee Network Security Platform 9.1

McAfee Network Security Platform 9.1 9.1.7.11-9.1.7.4 Manager-Virtual IPS Release Notes McAfee Network Security Platform 9.1 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision A McAfee Next Generation Firewall 5.7.10 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

ASA Access Control. Section 3

ASA Access Control. Section 3 [ 39 ] CCNP Security Firewall 642-617 Quick Reference Section 3 ASA Access Control Now that you have connectivity to the ASA and have configured basic networking settings on the ASA, you can start to look

More information

McAfee Network Security Platform

McAfee Network Security Platform Revision A McAfee Network Security Platform (9.1.7.73-9.1.3.54 Manager-NTBA Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

McAfee Network Security Platform 8.1

McAfee Network Security Platform 8.1 Revision A McAfee Network Security Platform 8.1 (8.1.7.105-8.1.5.219 Manager-NS-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision A McAfee Next Generation Firewall 5.7.9 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision A McAfee Next Generation Firewall 5.7.8 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

The following topics describe how to configure correlation policies and rules.

The following topics describe how to configure correlation policies and rules. The following topics describe how to configure correlation policies and rules. Introduction to and Rules, page 1 Configuring, page 2 Configuring Correlation Rules, page 5 Configuring Correlation Response

More information

McAfee Network Security Platform

McAfee Network Security Platform McAfee Network Security Platform A uniquely intelligent approach to network security McAfee Network Security Platform is a uniquely intelligent security solution that discovers and blocks sophisticated

More information

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS

Pass4sure q. Cisco Securing Cisco Networks with Sourcefire IPS Pass4sure.500-285.42q Number: 500-285 Passing Score: 800 Time Limit: 120 min File Version: 6.1 Cisco 500-285 Securing Cisco Networks with Sourcefire IPS I'm quite happy to announce that I passed 500-285

More information

Detecting Specific Threats

Detecting Specific Threats The following topics explain how to use preprocessors in a network analysis policy to detect specific threats: Introduction to Specific Threat Detection, page 1 Back Orifice Detection, page 1 Portscan

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.13-8.1.5.57 NS-series Release Notes Network Security Platform 8.1 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product documentation

More information

Access Control Using Intrusion and File Policies

Access Control Using Intrusion and File Policies The following topics describe how to configure access control policies to use intrusion and file policies: About Deep Inspection, page 1 Access Control Traffic Handling, page 2 File and Intrusion Inspection

More information

Features and Functionality

Features and Functionality Features and functionality introduced in previous versions may be superseded by new features and functionality in later versions. New or Changed Functionality in Version 6.2.2.x, page 1 Features Introduced

More information

The following topics describe how to use dashboards in the Firepower System:

The following topics describe how to use dashboards in the Firepower System: The following topics describe how to use dashboards in the Firepower System: About, page 1 Firepower System Dashboard Widgets, page 2 Managing, page 14 About Firepower System dashboards provide you with

More information

A10 SSL INSIGHT & SONICWALL NEXT-GEN FIREWALLS

A10 SSL INSIGHT & SONICWALL NEXT-GEN FIREWALLS DEPLOYMENT GUIDE A10 SSL INSIGHT & SONICWALL NEXT-GEN FIREWALLS A10 NETWORKS SSL INSIGHT & FIREWALL LOAD BALANCING SOLUTION FOR SONICWALL SUPERMASSIVE NEXT GENERATION FIREWALLS OVERVIEW This document describes

More information

Device Management Basics

Device Management Basics The following topics describe how to manage devices in the Firepower System: The Device Management Page, on page 1 Remote Management Configuration, on page 2 Add Devices to the Firepower Management Center,

More information

Getting Started with Network Analysis Policies

Getting Started with Network Analysis Policies The following topics describe how to get started with network analysis policies: Network Analysis Policy Basics, page 1 Managing Network Analysis Policies, page 2 Network Analysis Policy Basics Network

More information

Network Security Platform 8.1

Network Security Platform 8.1 8.1.7.13-8.1.5.71 NS9x00-series Release Notes Network Security Platform 8.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 19: Intrusion Detection Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Intruders Intrusion detection host-based network-based

More information

This release of the product includes these new features that have been added since NGFW 5.5.

This release of the product includes these new features that have been added since NGFW 5.5. Release Notes Revision B McAfee Next Generation Firewall 5.7.4 Contents About this release New features Enhancements Known limitations Resolved issues System requirements Installation instructions Upgrade

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Security Configuration Guide Part number: 5998-2686 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part

More information

DATA CENTER IPS COMPARATIVE ANALYSIS

DATA CENTER IPS COMPARATIVE ANALYSIS DATA CENTER IPS COMPARATIVE ANALYSIS Performance 2014 Jason Pappalexis, Thomas Skybakmoen Tested Products Fortinet FortiGate 5140B, Juniper SRX 5800, McAfee NS- 9300, Sourcefire 8290-2 Overview Implementation

More information

Load Balancing with McAfee Network Security Platform

Load Balancing with McAfee Network Security Platform Load Balancing with McAfee Network Security Platform Optimizing intrusion prevention system performance 1 Load Balancing with McAfee Network Security Platform Load Balancing with McAfee Network Security

More information

WHITE PAPER A10 SSL INSIGHT & FIREWALL LOAD BALANCING WITH SONICWALL NEXT-GEN FIREWALLS

WHITE PAPER A10 SSL INSIGHT & FIREWALL LOAD BALANCING WITH SONICWALL NEXT-GEN FIREWALLS WHITE PAPER A10 SSL INSIGHT & FIREWALL LOAD BALANCING WITH SONICWALL NEXT-GEN FIREWALLS TABLE OF CONTENTS EXECUTIVE SUMMARY... 3 INTRODUCTION... 3 SOLUTION REQUIREMENTS... 3 SOLUTION COMPONENTS... 4 SOLUTION

More information

Device Management Basics

Device Management Basics The following topics describe how to manage devices in the Firepower System: The Device Management Page, page 1 Remote Management Configuration, page 2 Adding Devices to the Firepower Management Center,

More information

Security Manager Policy Table Lookup from a MARS Event

Security Manager Policy Table Lookup from a MARS Event CHAPTER 17 Security Manager Policy Table Lookup from a MARS Event This chapter describes how to configure and use Security Manager and MARS so as to enable bi-directional lookup between events recieved

More information

Configuring Flood Protection

Configuring Flood Protection Configuring Flood Protection NOTE: Control Plane flood protection is located on the Firewall Settings > Advanced Settings page. TIP: You must click Accept to activate any settings you select. The Firewall

More information

McAfee Network Security Platform 8.3

McAfee Network Security Platform 8.3 8.3.7.7-8.3.5.6 Manager-NS-series Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known issues

More information

IDS: Signature Detection

IDS: Signature Detection IDS: Signature Detection Idea: What is bad, is known What is not bad, is good Determines whether a sequence of instructions being executed is known to violate the site security policy Signatures: Descriptions

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 20: Intrusion Prevention Department of Computer Science and Engineering University at Buffalo 1 Lecture Overview Firewalls purpose types locations Network perimeter

More information