Sie sind auf Seite 1von 5

Data Sheet

McAfee Firewall Enterprise Appliance


Fully characterize and contain every new threat and vulnerability

Sprawling enterprise applications and the broad, fast-changing attack surface of Web
2.0 necessitate a new approach to firewall security. First generation firewalls were
limited to port, protocol, and IP addresses. Today, enhanced next generation McAfee®
firewalls let you confidently discover, control, visualize, and protect new and existing
applications, using visual analytics and user identity for efficient, effective rules. And
McAfee Firewall Enterprise Appliance
Security Features
to detect complex threats within these applications, we interlock proactive threat
AppPrism—Application Discovery and
intelligence with multiple inspection technologies in one cost-effective, easy-to-
Control including: manage appliance.
• Packet, stateful, and full

application filtering
• Full application discovery and control

• Multiple delivery options, including


Firewalls are traditionally only as strong or as weak McAfee Firewall Enterprise Profiler, McAfee
multi-firewall appliances (one as the policies you define. But effective security Firewall Enterprise Control Center, and McAfee
appliance managing up to 32 policies for today’s complex Web 2.0 traffic Firewall Reporter.
virtual firewalls), McAfee Firewall
Enterprise for Riverbed, and a virtual
depend on fine-grained understanding that can
Today, the weakest link in network security is the
firewall appliance be hard to come by. You need rapid insight that
application layer. So we have taken the firewall
• Network address translation (NAT)
goes far beyond port and protocol to encompass
trusted by more ultra-secure environments
McAfee AppPrism™ categories different web applications and users and the
and added broad application discovery and
• Anonymizers / Proxies sophisticated threats that target them.
• Authentication services control. You can now protect new and existing
• Business web applications Where in the past you could await signatures, Web 2.0 applications from the risks of data
• Content management
the breakneck pace of threat evolution today leakage, network abuse, and malicious attacks.
• Commercial monitoring
• Database
demands proactive, predictive diagnosis of risk. With McAfee technology, you can ensure the
• Directory services Multiple attributes, such as source reputation, applications using your network to benefit
• Email content, and behavior, should be assessed to your business.
• Encrypted tunnels
reveal malicious intent before a new threat
• ERP/CRM
• Filesharing
is confirmed. Discover
• Gaming McAfee AppPrism technology uses the innovative
It’s not enough to predict the threat. Accurate,
• Instant messaging Firewall Profiler to identify all traffic and reveal
• Infrastructure services timely blocking demands concerted action that
the applications that are really in use, with
• IT utilities crosses conventional product silos.
• Mobile software helpful context such as source, bandwidth, and
• Peer to Peer (P2P) These demands—plus the call to prove destination. By inspecting encrypted application-
• Photo-Video sharing
compliance—increase the operational burden level traffic, you can eliminate loopholes favored
• Remote administration
• Remote desktop / Terminal services
on the network team. Yet budgets remain under by cyber thieves and attackers.
• Social networking pressure. Something has to change.
• Software / System updates Control
• Storage
The biggest firewall innovation in 15 years Fine-grained control allows comprehensive
• Streaming media
• Toolbars and PC utilities
With version 8 of the McAfee Firewall Enterprise, enforcement of policy based on business needs.
• Voice over IP (VOIP) McAfee reinvents the firewall. Three innovations Instead of policies matched just to IP address, port,
• VPN deliver unprecedented protection at an unheard- or protocol, you can now place a user name with
• Webmail
of price. We combine full application visibility and a role and a set of applications.
• Web browsing
• Web conferencing
control, reputation-aware threat intelligence, and
Construct application usage rules that combine
multi-vector attack protection to improve network
attributes such as:
security while shaving effort and expense.
Data Sheet McAfee Firewall Enterprise Appliance

McAfee Firewall Enterprise Security • Business or recreational purpose Whitelisting


Features (continued) • User identity For advanced control, application whitelisting lets
Authentication • Embedded application control you explicitly allow only traffic from applications
• Local
that have been approved as necessary or
• Microsoft Active Directory • Whitelisting
• Transparent Identities for Active
appropriate. Compared to lengthy blacklists,
• Geo-location
Directory (McAfee Logon Collector) whitelisting whittles down the number of rules
• LDAP (Sun, Open LDAP, you need to write and maintain.
Custom LDAP) User Identity
• RADIUS Without visibility into and control over users and Geo-location
• Microsoft Windows
the context of their use, firewalls cannot defend As botnets proliferate through popular social
Domain Authentication
• Microsoft Windows
against increasingly port-agile, evasive, targeted networking applications, it has become more
NTLM Authentication apps. McAfee Firewall Enterprise applies user- important to be able to lock down rogue
• Passport (single sign-on) aware rules and control over applications. applications that attempt to communicate to
• Strong authentication

(SecurID) When a user connects, the system validates certain locations. Geo-location lets you cut off this
High availability (HA) entitlements in real time from your existing user contact to keep your data from exfiltrating and
• Active/active
directory. The firewall quickly applies policies prevent your systems being used for mischief.
• Active/passive
• Stateful session failover
mapped to user identity that grant explicit use of We give you this fine-grained control while
• Remote IP monitoring an application. making rules development less complex. In
Global Threat Intelligence By tracking to the user, rules are granular enough fact, there’s just one policy in one view. One
• McAfee TrustedSource™ global
for modern business operation. And identity- straightforward console presents the options
reputation service
• Geo-location filtering based rules make good operational sense. More required to efficiently manage all rules and add
• McAfee Labs and more enterprises rely heavily on unified use defenses. This unified model is especially beneficial
Encrypted application filtering of user directories and identity management to over time and across teams, as we also highlight
• SSH support access controls. User changes happen rule interactions and overlaps. With colored fields
• SFTP
once and propagate out. Security policies stay up highlighting potential conflicts, you avoid errors
• SCP
• Bi-directional to date as the user community changes. and enhance performance.
HTTPS decryption
and re-encryption
Embedded Application Control Visualize
Intrusion prevention system (IPS)
• More than 10,000 signatures Embedded application control gives you the power It’s time to move from managing rules to
• Automatic signature updates to tailor rights within an application. For instance, managing risk. McAfee Firewall Enterprise Profiler
• Custom signatures
you might allow Yahoo, but block Yahoo IM, or simplifies assessment of network traffic so you
• Preconfigured signature groups
allow IM only for specific user groups, perhaps can add new applications quickly. Our intuitive
Anti-virus and anti-spyware
customer support or sales, or locations, such as visual analytics give you a way to measure the
• Protects against spyware, Trojans,
and worms the head office. effectiveness of each rule change instantly, so you
• Heuristics can tune policies for the maximum benefit.
• Automatic signature updates
You can also support corporate appropriate use
and blackout policies by specifying when an Rich graphical tools correlate application activities
Web filtering
• Integrated McAfee SmartFilter® application can or cannot be used. Rules could in real time, based on user identity, geo-location,
filtering and management allow MySpace use during lunch time, for example, and usage levels. You can easily see who is using
• Block Java, Active-X, JavaScript,
for customer service teams, while financial what applications. This integrated view lets you
SOAP
applications are not available to anyone via VPN exchange hours of due diligence, experimentation,
Anti-spam
• McAfeeTrustedSource global
on weekends. and troubleshooting for just a few clicks. For
reputation service some users, the biggest advantage is seeing
Many exploits try to benefit from the lax security
VPN immediately whether or not a problem was really
in social networking sites by concealing their
• IKEv1 and IKEv2 due to the firewall and being able to navigate to
• DES, 3DES, AES-128, and
payloads within trendy applets. With McAfee, you
its root cause.
AES-256 encryption can allow access to the beneficial elements of
• SHA-1 and MD5 authentication
sites like Facebook, but still minimize the risk of
• Diffie-Hellmann groups 1, 2, and 5
• Policy-restricted tunnels
compromised applications within each site.
• NAT-T
• Xauth
Data Sheet McAfee Firewall Enterprise Appliance

McAfee SecureOS® Operating System


Features
• McAfee Type Enforcement®
technology
• Preconfigured operating system (OS)

security policy
• OS compartmentalization
• Network stack separation

McAfee Firewall Enterprise


Control Center
• Windows graphical user interface
• Local console
• Full command line
• USB disaster recovery configuration

backup and restore


• Rapid troubleshooting and

firewall rule impact analysis with


McAfee Firewall Enterprise Profiler Global Threat Intelligence featuring McAfee Trusted Source allows or blocks traffic based upon reputation
(sold separately)
Logging, monitoring, and reporting
• On-box logging Protect firewall off line. With the increase in advanced
• Scheduled log archiving

and exporting McAfee AppPrism helps you reduce risks from persistent threats like Operation Aurora, McAfee
• Firewall Enterprise log application-level threats while you optimize use of Global Threat Intelligence is the most sophisticated
softwareExtract format (SEF) corporate bandwidth. Behind AppPrism stands the protection you can own, helping you mitigate
• Export formats (XML, SEF,

W3C, WebTrends)
power of McAfee Labs™. Threat researchers use vulnerabilities, avoid regulatory violations, and
• Syslog McAfee TrustedSource™ technology to continually lower the cost of remediation.
• SNMP v1, v2c, and v3 recognize and assess risk for 31 categories of
• McAfee Firewall Reporter
applications, ranging from anonymizers to video Multi-vector security in one
SEM included
and photo sharing. integrated appliance
Networking and routing
One reason customers choose McAfee is our
• Dynamic routing (RIP v1 and v2, OSPF, By assigning dynamic reputations for sites, senders,
BGP, and PIM-SM) extensive security and compliance portfolio.
and locations, we can block an average 70
• Static routes Now, we place this might right at your door.
• 802.1Q VLAN tagging percent of undesirable traffic before you ever see
Facing off against the complex threats in Web
• DHCP client it. Because of this capability, it can even spot the
• Default route failover
2.0 applications, exploit cocktails, phishing, and
subtle command and control (C and C) channel
• QoS targeted attacks, McAfee Firewall Enterprise now
of botnets.
Secure servers combines multiple crucial threat protections in
• Secure DNS (single or split) every firewall appliance.
• Secure sendmail (single or split)
The only firewall with reputation analysis and
global threat intelligence Before, firewalls were limited to access control and
Appliances and hardware
• Upgrade warranty to four-hour Only McAfee includes reputation technology in segmentation. Adequate protection required the
response for most models a firewall, and it is just one element of McAfee expense of implementing and maintaining several
• Virtualization solutions and rugged
Global Threat Intelligence. At McAfee, over four separate products. Now, one box combines:
appliance options available
• Single-, dual-, and quad-core
hundred security researchers—more than the
• McAfee AppPrism—Full application discovery
processors entire staff at some vendors—collaborate across
• ASIC-based acceleration
and control
web, spam, vulnerability, host and network
• RAID HDD configurations
intrusion, malware, and regulatory compliance
• Intrusion prevention
• Redundant power supplies
research. This breadth allows them to characterize • TrustedSource global reputation analysis
Technical support
• 24/7 telephone-based
every new threat and vulnerability. • URL filtering with McAfee SmartFilter®
technical support technology
• 24/7 technical support with web-
Their efforts, informed by more than one hundred
million sensors around the world, deliver real-
• Encrypted application filtering
based ticketing and knowledgebase
time predictive risk analysis to guard you against • Anti-Virus, anti-spyware, and anti-spam
evolving multi-faceted threats. Our experience building multi-vector solutions
Unlike old-fashioned firewalls that rely on has helped us deliver all these protections without
signatures, automated threat feeds from McAfee compromising performance or productivity. And
Labs keep you up to date without taking your without charging extra.
Data Sheet McAfee Firewall Enterprise Appliance

Fine-grained control made manageable across your network. Robust configuration


Reliable security must also be easy to configure. management lets you centrally track, trace, and
The intuitive Firewall Enterprise administrative validate all policy changes.
console lets your administrators create rules and
McAfee Firewall Enterprise Furthermore, Control Center integrates with
Product Line selectively apply defenses such as application
McAfee ePolicy Orchestrator® (ePO™), providing
The Firewall Enterprise product line filters, IPS signatures, and URL filtering from a
includes appliances appropriate ePO with visibility into firewall health data
single screen. New software feature updates are
for businesses of all sizes, as well as and reports.
companion products such as McAfee delivered automatically via the Internet, reducing
Firewall Enterprise Profiler, McAfee maintenance effort. Simply determine the
Firewall Enterprise Control Center, Most secure firewall hardware platform
schedule with a single click.
and McAfee Firewall Reporter. These At its core, McAfee Firewall Enterprise runs on
products work together to streamline The Firewall Enterprise product line includes the high-speed, high assurance McAfee SecureOS
management activities and reduce
operational costs. Flexible, hybrid additional tools for simplifying management: operating system. Patented McAfee Type
delivery options include physical McAfee Firewall Reporter and McAfee Firewall Enforcement® technology secures the OS itself for
appliances, multi-firewall appliances, Enterprise Control Center. an unparalleled level of platform security. Perhaps
virtual appliances, and appliances
for rugged-use environments. Ask it is why SecureOS has an unparalleled CERT
Included at no additional cost, Firewall Reporter
for individual product datasheets for advisory record: no emergency security patches
more information. software turns audit streams into actionable
have ever been required.
information. This award-winning security
event management (SEM) tool delivers central The pre-configured operating system security
monitoring, and correlated alerting and reporting. policy prevents compromises, and the entire
Choose from more than 500 graphical reports operating system is compartmentalized so
to depict network traffic and help meet all major attackers cannot disrupt its work.
regulatory requirements.
These extra steps allowed us to be the first firewall
Sold separately, McAfee Firewall Enterprise to achieve Common Criteria EAL 4+ certification
Control Center offers centralized firewall policy with US DoD Protection Profile compliance.
management for multiple Firewall Enterprise
Because of our innovation and advanced
appliances. It lets you maximize operational
security, the McAfee Firewall Enterprise protects
efficiency, simplify policy control, optimize rules,
15,000 networks around the world, including
streamline software updates, and demonstrate
thousands of government agencies, Fortune 500
regulatory compliance. You can even compare
organizations, and seven of the top 10 financial
policy configurations on all of your Control
institutions. Put us to work protecting you.
Center-managed devices to ensure consistency
Data Sheet McAfee Firewall Enterprise Appliance

Hardware Specs1 S1004 410 510 1100 2100 2150 2150 VX-XX 4150
Form factor Mini 1U Small 1U Small 1U Enterprise 1U Enterprise 2U Enterprise 2U Enterprise 2U Enterprise 5U
Unlimited user licenses Yes Yes Yes Yes Yes Yes Yes Yes

Recommended users 100 300 600 Med -Large Med-Large Large Large Enterprise

RAID N/A N/A N/A RAID 1 RAID 1 RAID 5 RAID 5 RAID 5


Power supply Single Single Single Dual Dual Dual Dual Dual
Copper interfaces
4–Gb 8–Gb 8–Gb 10/16–Gb 10/22–Gb 10/22–Gb 22/24–Gb 14/26–Gb
(base/max)
Fiber interface option
N/A N/A N/A 6 12 12 N/A 12
(max)
10 Gb interface option
N/A N/A N/A 6 6 6 6 6
(max)
SSL/HTTPS decrypting,
filtering, and Yes Yes Yes Yes Yes Yes Yes Yes
re-encrypting
FCC (U.S. only) Class B, ICES (Canada) Class B, CE Mark (EN 55022 Class B, EN55024, EN61000-3-2, EN61000-3-3), VCC (Japan) Class B, BSMI
Regulatory compliance (Taiwan) Class A, C-Tick (Australia/New Zealand) Class B, SABS (South Africa) Class B, MIC (Korea) Class B, UL 60950, CAN/CSA C22.2 No. 60950,
IEC 60950
Performance1
Firewall performance2 500 Mbps 1 Gbps 2 Gbps 6 Gbps 6 Gbps 10 Gbps 6 Gbps 12 Gbps
Stateful inspection
300 Mbps 750 Mbps 1.5 Gbps 3 Gbps 3 Gbps 5 Gbps 5 Gbps 6.5 Gbps
throughput
Application filtering
100 Mbps 600 Mbps 1.2 Gbps 2.5 Gbps 2.5 Gbps 3.5 Gbps 4 Gbps 5 Gbps
throughput
Anti-virus 50 Mbps 115 Mbps 275 Mbps 500 Mbps 500 Mbps 850 Mbps 850 Mbps 1 Gbps
IPSec VPN throughput 100 Mbps 200 Mbps 275 Mbps 300 Mbps 300 Mbps 400 Mbps 400 Mbps 700 Mbps
Dimensions, weight, environmental
10.7 in 17.6 in 17.6 in 18.9 in 17.4 in 17.4 in 17.4 in 19.00 in
Width
272 mm 44.7 cm 44.7 cm 48.2 cm 44.3 cm 44.3 cm 44.3 cm 48.25 cm
7.7 in 16.75 in 21.5 in 30.4 in 26.8 in 26.8 in 26.8 in 24.4 in
Depth
195 mm 42.54 cm 54.6 cm 77.2 cm 68.1 cm 68.1 cm 68.1 cm 62.1 cm
1.7 in 1.68 in 1.68 in 1.67 in 3.4 in 3.4 in 3.4 in 8.57 in
Height
44 mm 4.2 cm 4.2 cm 4.26 cm 8.64 cm 8.64 cm 8.64 cm 21.77 cm
8.8 lbs 15.3 lbs 26 lbs 39.0 lbs 57.5 lbs 57.5 lbs 57.5 lbs 77 lbs
Weight
4 kg 6.94 kg 11.8 kg 17.7 kg 26.1 kg 26.1 kg 26.1 kg 35 kg
45 W 345 W 345 W Dual 717 W Dual 870 W Dual 870 W Dual 870 W Dual 870 W
Power supply details
110/220 V 110/220 V 110/220 V 110/220 V 110/220 V 110/220 V 110/220 V 110/220 V
0º C – 40º C 10º C – 35º C 10º C – 35º C 10º C – 35º C 10º C – 35º C 10º C – 35º C 10º C – 35º C 10º C – 35º C
Operating temperature
32º F – 104º F 50º F – 95º F 50º F – 95º F 50º F – 95º F 50º F – 95º F 50º F – 95º F 50º F – 95º F 50º F – 95º F

1. All specification and performance results are based on the S- and F-series of appliances.
2. Performance data represents the maximum capabilities of the systems as measured under optimal testing conditions. Deployment and policy considerations may impact performance results.

McAfee, Inc. McAfee and the McAfee logo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other
3965 Freedom Circle countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are
Santa Clara, CA 95054 provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied.
888 847 8766 Copyright © 2010 McAfee, Inc.
www.mcafee.com 8815ds_nts_nextgen-firewall_0410_WH

Das könnte Ihnen auch gefallen